BHP Billiton: Implementation Of Digital Disruption Technologies And Risks
Implementation of Digital Disruption Technologies
Discuss about the Evaluation Technology Of BHP Billiton.
BHP Billiton is the company that deals with the mining, metals and the petroleum dual-listed public company. The digital disruption proposed for the company can assumed to have the positive impact on this organization. The evaluation of the effectiveness of the implemented technology in the organization is based on the possible outcome after the implementation of the digital disruption. In order to implement the technology in a right way the right documentation of the requirement gathering is needed to be done (Arvidsson, Holmström and Lyytinen 2014). The clarity in the requirement gathering can help to implement the project in such a way that the outcome of the project meet all the requirements of the client or the organization. The evaluation of the effectiveness of the software includes the checking of this requirement gathering part. The company has planned to implement the technologies those will be beneficial for the mining process. The effectiveness of those technologies can be evaluated based on the comparison of the outcome in the mining process before the deployment of those technologies and the outcome after the deployment of those technologies (Wu,Straub and Liang 2015). In case, if it can be seen that the production in the mining process has been increased, it can be said the implementation of those technologies are effective for the company (Dwivedi et al., 2015). Apart from the mining process the organization has to deal with maintaining the different internal process. In order to do this certain software are required. In order to implement the improvisation of the entire process of the organization BHP Hilliton has adopted the Enterprise Resource Management system. In this implementation process, the organization has though of implementation of the cloud for the storage process, which is a welcome move. Recently the company is facing the over flow of the memory storage (Manoharan, Melitski and Bromberg 2015). Implementation of the cloud can eliminate this problem as it provides large storage space. In order to implement the cloud the company has decided to adopt the hybrid cloud so that the data can be migrated partially (Whittington 2014). The choosing of the vendor or the cloud provider can be selected by the company. Apart from that the organization has decided to implement some of the accounting software and the software that can help them to detect different geological aspects. This will help them in the mining process.
Evaluation of Technology Effectiveness
There are certain risks which are associated with the processed modification of the business processes. Some of the risks are related to the initiation of using the advanced technology in the business process while some risks are associated with the managing the human resource of the company.
Cyber crime: The organization has decided to implement the business process which will have the use of the advanced accounting technology and the software those will help to detect the geographical aspects during the mining process (Kavanagh and Johnson 2017). These process and the technologies are inter related over the internet. The unauthorized entity can try get the access of these data using the different system breaching methods. The websites of the company and the system used for the workings of the internal organization can be affected due to the threats appeared from the happening of the cyber crime.
Security risks in the cloud architecture: The organization has decided to implement the cloud computing architecture in order to store the large amount of the information. Certain security risks are associated with the implementation of the cloud (Van Der Aalst, La Rosa and Santoro 2016). The company is going to adopt the hybrid cloud, which allows the use of public cloud and the private cloud. The security of the private cloud can be managed by the organization of the third party cloud provider whereas the security of the public cloud is maintained by the third party cloud vendor (Gardner, Boyer and Gray 2015). In that case, the cloud provider may not able to provide the required security to the data stored in the cloud. The breaching and the loss of the data can cause the company a great loss. Moreover those data holds the information regarding the internal process of the organization, disclosing of the confidentiality of the company is not desirable.
Maintaining the technologies that are used for the mining: In order to improve the mining process the company has adopted some of the technologies. However, the risk associated with this adaptation is associated with improper handling of those technologies by the workers (Peppard and Ward 2016). Most of the workers are not familiar with the use of the advanced technology. In this case, there is a chance that the mismanagement at the work place may happen.
There are various ways that can be helpful to mitigate the above mentioned threats. Some of the steps are regarding the technical processes those are helpful for prevention of the risks associated with the system, some of the processes are management of the human resource in a proper way.
Internal Processes and Enterprise Resource Management System
Right documentation of the requirement: The requirement gathering and the documentation of the proposed process is the important part (Maharaj and Brown 2015). This part plays a significant role in understanding the right requirements , that the outcome of the implementation holds. The clarity of the requirement can be achieved through the continuous discussion between the managers and the project management team and the other stakeholders of the company.
Selection of the cloud vendor: The selection of the cloud vendor is important, as the data of the organization will be stored in the cloud. The security of the public cloud is the responsibility of the cloud vendor. In this case, it is important to select the right cloud vendor, so the security of the data can be maintained. Implementation of the cloud can eliminate this problem as it provides large storage space. In order to implement the cloud the company has decided to adopt the hybrid cloud so that the data can be migrated partially (Whittington 2014). The choosing of the vendor or the cloud provider can be selected by the company.
Use of the firewalls in the system: The systems used in the organization are needed to be kept secured from the external threats. In order to do this the firewall can be setup in those system. The firewall identifies the unnecessary traffics in the network and prevents them to access the secured network. This mechanism helps the system to get attacked by the external threats. The process and the technologies are inter related over the internet. The unauthorized entity can try get the access of these data using the different system breaching methods. The websites of the company and the system used for the workings of the internal organization can be affected due to the threats appeared from the happening of the cyber crime.
Giving the training to the human resource: Many of the people in the organization are not aware of using the advanced technology in the business process. Some of the employees are not familiar with the use of the newly implemented systems and software in the organization. In this case certain mismanagement can happen in the workplace. This can be eliminated by giving the proper training to the human resource so that the employees can get familiar with the modified working environment and they can use the software and the technologies in a proper way.
References
Arvidsson, V., Holmström, J. and Lyytinen, K., 2014. Information systems use as strategy practice: A multi-dimensional view of strategic information system implementation and use. The Journal of Strategic Information Systems, 23(1), pp.45-61.
Dwivedi, Y.K., Wastell, D., Laumer, S., Henriksen, H.Z., Myers, M.D., Bunker, D., Elbanna, A., Ravishankar, M.N. and Srivastava, S.C., 2015. Research on information systems failures and successes: Status update and future directions. Information Systems Frontiers, 17(1), pp.143-157.
Gardner, J.W., Boyer, K.K. and Gray, J.V., 2015. Operational and strategic information processing: Complementing healthcare IT infrastructure. Journal of Operations Management, 33, pp.123-139.
Kavanagh, M.J. and Johnson, R.D. eds., 2017. Human resource information systems: Basics, applications, and future directions. Sage Publications.
Maharaj, S. and Brown, I., 2015. The impact of shared domain knowledge on strategic information systems planning and alignment. South African Journal of Information Management, 17(1), pp.1-12.
Manoharan, A., Melitski, J. and Bromberg, D., 2015. State strategic information system plans: An assessment integrating strategy and operations through performance measurement. International Journal of Public Sector Management, 28(3), pp.240-253.
Peppard, J. and Ward, J., 2016. The strategic management of information systems: Building a digital strategy. John Wiley & Sons.
Van Der Aalst, W.M., La Rosa, M. and Santoro, F.M., 2016. Business process management.
Whittington, R., 2014. Information systems strategy and strategy-as-practice: a joint agenda. The Journal of Strategic Information Systems, 23(1), pp.87-91.
Wu, S.P.J., Straub, D.W. and Liang, T.P., 2015. How information technology governance mechanisms and strategic alignment influence organizational performance: Insights from a matched survey of business and IT managers. Mis Quarterly, 39(2), pp.497-518.