Wednesday, February 19, 2020

Discuss the nature of an effective performance management system. In Essay

Discuss the nature of an effective performance management system. In your discussion, recommend the process that should be used - Essay Example It argues that there is no singular nature of effective performance management, instead effective performance management exists in a fluid and contextually specific reality. The essay also considers the nature of effective performance management within the real world context of service and consultancy firms. In considering the nature of effective performance management measures, one of the crucial elements is that of situating performance management in terms of a structural framework. This essay argues that in large part there are different levels of understanding that can be brought to performance management systems, with structural or overarching frameworks representing a general qualitative perspective on the nature of effectiveness, as well as defining the boundaries of performance management. One such framework is that proposed by Fitzgerald and Moon (1996) who broadly argue that there are a number of core competencies that must be implemented to achieve effective performance ma nagement. Within this context, they have outlined the most effective measures to be understanding one’s intentions, developing a range of performance standards, developing patterns of comparison, and implement a top down system. While Fitzgerald and Moon (1996)’s framework is powerful in its simplistic message, other researchers have articulated the characteristics of effective performance management from a different perspective. In these regards, Otley (2005) has advanced a notion of effective performance management from a more complex angle. In these regards, Otley states that performance management must heavily consider strategic measures, emphasize effectiveness or efficiency patterns, consider incentives, and follow a bottom down structure. The elements indicated by Otley and Fitzgerald and Moon constitute a broadly framed perspective on the nature of performance management. At this level of abstraction, the defining elements represent more of general overview of effective elements. One will note that the definitions contain contradictory elements. In these regards, it seems that the benefits of one method over the other are linked to the nature of the business system in which the measures are implemented. Another framework that articulates effective performance management is that which has been implemented by Otley (2007). In this research Otley examines previous conceptions of effective performance management, specifically those presented by Johnson and Kaplan (1987), as Otley argues that it is no longer relevant to consider performance management within the ‘management accounting’ paradigm. Ferreira and Otley (2009) considered the literature involving performance management systems and argued that traditional critical assumptions did not go far enough in articulating the essence of effective performance management. As such they proposed a new critical framework that examines the issue in terms of an extended framework of perf ormance management systems. Within this framework, some of the critical assumptions regarding what constitutes effective performance management are articulated as a means of advancing past critical assumptions. The framework developed is referred to as performance management systems, and it incorporates a number of elements from Otley’s previous theoretical matrices, augmenting them through the

Tuesday, February 4, 2020

Systems and Operations Management Essay Example | Topics and Well Written Essays - 2000 words - 1

Systems and Operations Management - Essay Example The main importance of such strategies is to ensure that the relationship with customers is enhanced in order to improve the processes of sales and marketing. Nonetheless, the lack of or presence of internet security is likely to be a major topic of discussion among different countries as well as in a large number of corporations (Peng, 2008). Part One: Option 4 Summary of the text; Achieving Operational Excellence and Customer Intimacy Technology has been extensively applied in transforming the shape of marketing as is used in different organizations. However, with the development and implementation of these advanced technologies a number of changes are experienced within the operational functions of the business. There is thus need to safeguard and protect the information systems, data as well as other information technologies. In this chapter, the major processes associated with advanced technology in the form of online and internet use of the computer is highlighted. The number o f challenges is depicted to be related to Facebook whose users are warned to watch out. In relation to this, there have been a number of reported cases related to theft and presence of malicious software. These are associated with spam, malware as well as other serious security issues. With time, several destructive elements have been introduced into these systems. Similarly to the other viruses circulating within the computer system, these areas were faced with the introduction of Koobface worm in December 2008, the 18 month hacker scam for passwords, which resulted in the entry of the Trojan horse. It is as a result of this that financial data was stolen around the year 2009. The other main challenge was the emails that were created in May 2010 with an intention of stealing logins (Laudon & Laudon, 2013). In comparison to other online tools such as e-mails social sites and especially Facebook is shown as the main target that is used by hackers. It has been related to a high gullib ility level of the users. This is despite the high security measures that have been placed by its dedicated team to include up-to-date measures. The hackers thus make use of â€Å"social engineering† malicious software to develop the attacks aimed at the consumers. As such, it is indicated that there main activities include the theft of passwords and data as well as using botnets. As Laudon and Laudon indicate, it is because of this that different organizations are faced with the task of constantly developing advanced security policies. This is done through the people who include stakeholders within the organization. With this, the organization and specifically its management are presented with the duty to deploy a serious security team to ensure that security is always maintained. These have to be achieved through the application of current technological advancements. They may include the implementation of the website security system, technology that is able to authenticate and security technologies that are applied on an individual basis (2013). The most appropriate way to attain this is through the identification of most of the malicious codes normally used, to identify the different sources of spam and to protect user data. All this is stated as the effort towards responding while making use of the information systems and operations. As such, these steps enhance the action towards providing a number of business solutions since