Beruflich Dokumente
Kultur Dokumente
1. With the aid of a diagram(s) outline how the cost theories affect the size and
agency costs of an organization implementing Information systems.
Cost theories have often been used to support the idea that information systems can
reduce imperfection in the economic system. Online markets have repeatedly been
described as solutions to inefficiencies in the organization of transactions in
complex and uncertain settings. Traditionally, organizations have tried to reduce
transaction costs through vertical integration, by getting bigger, hiring more
employees, and buying their own suppliers and distributors.
Information technology, especially the use of networks, can help firms lower the
cost of market participation (transaction costs), making it worthwhile for firms to
contract with external suppliers instead of using internal sources. As a result, firms
can shrink in size (numbers of employees) because it is far less expensive to
outsource work to a competitive marketplace rather than hire employees
Information-related problems represent only some of the elements contributing to
transacting costs. The diffusion of information systems in society is always
associated with an increased amount of information becoming available. Moreover,
‘information society’ is not only defined by the greater amount of information
required in an ever increasing range of human activities, but also by the expanded
number of sources from which information emanates.
Information systems have become fundamental, online and deeply interactive in
every operation and decision making of large organizations. Over the last decade,
information systems have altered the economics of organizations increasing the
possibilities for organizing work, theories and concepts from economics and
sociology helping us understand the changes it brings about.
From the point of view of economics, IT changes both the relative costs of capital
and the costs of information. Information systems technology can be viewed as a
factor of production that can be substituted for traditional capital and labor. As the
cost of information technology decreases, it is substituted for labor, which
historically has been a rising cost. Organizations grow in size because they can
obtain certain products or services internally at lower cost than by using external
firms in the marketplace. By lowering the cost of market participation (transaction
costs) information technology allows firms to obtain goods and services more
cheaply from outside sources than through internal means. Information systems
can thus help firms increase revenue while shrinking in size. Organizations
traditionally grew in size to reduce transaction costs. While information systems
potentially reduce the costs for a given size, shifting the transaction cost curve
inward, opening up the possibility of revenue growth without increasing size, or
even revenue growth accompanied by shrinking size
The agency theory is widely used in economics, finance, marketing, legal, and
social sciences Jensen and Meckling (1976) defined the agency relationship as “a
contract under which one or more persons (the principal) engage another person
(the agent), to perform some service on their behalf which involves delegating
some decision making authority to the agent” pp.308. Assuming that both parties’
utility maximizes, the agents are not possible to act in the best interest of the
principal. The agency costs are generated if the organization sells equity claims on
the firms, which are identical.
It is also generated by the divergence between interests and those of the outside
shareholders, since they bear only a fraction of the costs of any non-pecuniary
benefits they take out maximizing his own utility. There are two types of conflicts
in the firm; First of all, the conflict between shareholders and managers arises
because managers hold less than a hundred percent of the residual claim.
Therefore, they do not capture the entire gain from their profit enhancement
activities, but they do bear the entire cost of these activities. For example,
managers can invest less effort in managing organizational resources and may be
able to transfer firm resources to their own, personal benefit, i.e., by consuming
“perquisites” such as a fringe benefits. The manager bears the entire cost of
refraining from these activities but captures only a fraction of the gain.
As a result, managers over indulge in these interests relative to the level that would
maximize the organizational value. This inefficiency reduced the large fraction of
the equity owned by the manager. Holding constant the manager’s absolute
investment in the firm, thereby increasing the fraction of the firm financed by debt
increases by the manager’s share of the equity and mitigates the loss from conflict
between the managers and shareholders.
However, with information systems, managers carefully analysis the agencies
contracts and carefully supervise them to be certain they pursue the interests of the
organization. Information technology can help reduce agency costs which is the
cost of coordinating many different people and activities, so that each manager can
oversee a larger number of employees without challenges. As the organization
grows in size and complexity, traditionally they experience rising agency costs. IT
shifts the agency cost curve down and to the right, enabling firms to increase size
while lowering agency costs.
In accordance to agency cost theory, information technology can reduce internal
management costs. A principle also known as owner employs “agents” or
employees to perform work to accomplish the company tasks and objectives. As
the company grows in size and scope, the coordination costs or called as agency
would also be growing. The information technology makes the manager’s task
easier to oversee and coordinate with a greater number of employee. The employee
payroll, performance, duties, roles and responsibilities can be coordinated in much
efficient manner with very few clerks and managers (Laudon, 2016) [1]
Data manipulation
Human error during input especially for mathematical data which immediately
affects the output
Duplicate data
For proper control and management of risks, as insurers, we should always keep
the following in mind with regard to any project or subject-matter of insurance:
What are the possible sources of loss?
What is the probable impact of a loss should it at all occur?
What should be done when a loss takes place? Should the loss be allowed to
enhance or something should be done to minimize it? The question of protection of
salvage in the best possible way and also the question of checking the future
possibility of such events should be considered.
The probable expenditure or the economy of loss prevention, (it should be
remembered that any extra expenditure for loss prevention would be economically
justified so long the expenditure made is smaller than or at best equal to the
savings made by way of loss reduction.
As already mentioned, in insurance the risk is isolated from the whole business
venture and the pure risk portion of it is assumed entirely by a different group of
people of an organization (insurer) in a most technical, expert and economic way.
This is possible only through the proper diagnosis of the risk in matters of finding
out the possible sources of loss and the impact of loss should it at all occur. The
question of minimizing a loss and preventing future causation of a loss should not
also lose sight of. Keeping these factors in view would come up with the question
of properly rating a risk, as this would be the basis of charging a premium or price
for running a risk. In this context of risk management the ‘mathematical valuation
of risk’ is indeed important.
7 steps of risk management are;
1. Establish the context,
2. Identification,
3. Assessment,
4. Potential risk treatments,
5. Create the plan,
6. Implementation,
7. Review and evaluation of the plan.
The risk management system has seven(7) steps which are actually a cycle.
steps of risk management process
2. Identification
After establishing the context, the next step in the process of managing risk is to
identify potential risks. Risks are about events that, when triggered, will cause
problems.
Hence, risk identification can start with the source of problems, or with the
problem itself.
3. Assessment
Once risks have been identified, they must then be assessed as to their potential
severity of loss and to the probability of occurrence. These quantities can be either
simple to measure, in the case of the value of a lost building, or impossible to
know for sure in the case of the probability of an unlikely event occurring.
Risk Transfer
Risk Transfer means that the expected party transfers whole or part of the losses
consequential o risk exposure to another party for a cost. Insurance contracts
fundamentally involve risk transfers. Apart from the insurance device, there are
certain other techniques by which the risk may be transferred.
Risk Avoidance
Avoid the risk or the circumstances which may lead to losses in another way,
Includes not performing an activity that could carry risk. Avoidance may seem the
answer to all risks, but avoiding risks also means losing out on the potential gain
that accepting (retaining) the risk may have allowed. Not entering a business to
avoid the risk of loss also avoids the possibility of earning the profits.
Risk Retention
Risk-retention implies that the losses arising due to a risk exposure shall be
retained or assumed by the party or the organization. Risk-retention is generally a
deliberate decision for business organizations inherited with the following
characteristics. Self-insurance and Captive insurance are the two methods of
retention.
Risk Control
Risk can be controlled either by avoidance or by controlling losses. Avoidance
implies that either a certain loss exposure is not acquired or an existing one is
abandoned. Loss control can be exercised in two ways.
6. Implementation
Follow all of the planned methods for mitigating the effect of the risks. Purchase
insurance policies for the risks that have been decided to be transferred to an
insurer, avoid all risks that can be avoided without sacrificing the entity’s goals,
reduce others, and retain the rest.
All Java Persistence API (JPA)-specific cascade operations are represented by the
javax.persistence.CascadeType enum containing entries:
ALL
PERSIST
MERGE
REMOVE
REFRESH
DETACH
Hibernate supports three additional Cascade Types along with those specified by
JPA. These Hibernate-specific Cascade Types are available in
org.hibernate.annotations.CascadeType:
REPLICATE
SAVE_UPDATE
LOCK
The merge operation copies the state of the given object onto the persistent
object with the same identifier. CascadeType.MERGE propagates the merge
operation from a parent to a child entity.
Let's test the merge operation:
1 @Test
2 public void whenParentSavedThenMerged() {
3 int addressId;
4 Person person = buildPerson("devender");
Address address = buildAddress(person);
5
person.setAddresses(Arrays.asList(address));
6 session.persist(person);
7 session.flush();
8 addressId = address.getId();
9 session.clear();
10
Address savedAddressEntity = session.find(Address.class, addressId);
11 Person savedPersonEntity = savedAddressEntity.getPerson();
12 savedPersonEntity.setName("devender kumar");
13 savedAddressEntity.setHouseNumber(24);
14 session.merge(savedPersonEntity);
15 session.flush();
}
When we run the above test case, the merge operation generates the following
SQL:
1 Hibernate: select address0_.id as id1_0_0_, address0_.city as city2_0_0_,
2 address0_.houseNumber as houseNum3_0_0_, address0_.person_id as person_i6_0_0_,
3 address0_.street as street4_0_0_, address0_.zipCode as zipCode5_0_0_ from Address
4 address0_ where address0_.id=?
Hibernate: select person0_.id as id1_1_0_, person0_.name as name2_1_0_ from Person
5 person0_ where person0_.id=?
6 Hibernate: update Address set city=?, houseNumber=?, person_id=?, street=?, zipCode=?
7 where id=?
8 Hibernate: update Person set name=? where id=?
When we run the above test case, we'll see the following SQL:
1 Hibernate: delete from Address where id=?
2 Hibernate: delete from Person where id=?
The address associated with the person also got removed as a result
of CascadeType REMOVE.
The detach operation removes the entity from the persistent context. When we
use CascaseType.DETACH, the child entity will also get removed from the
persistent context.
Let's see it in action:
1 @Test
2 public void whenParentDetachedThenChildDetached() {
Person person = buildPerson("devender");
3
Address address = buildAddress(person);
4 person.setAddresses(Arrays.asList(address));
5 session.persist(person);
6 session.flush();
7
8 assertThat(session.contains(person)).isTrue();
assertThat(session.contains(address)).isTrue();
9
10 session.detach(person);
11 assertThat(session.contains(person)).isFalse();
12 assertThat(session.contains(address)).isFalse();
13 }
Here, we can see that after detaching person, neither person nor address exists in
the persistent context.
As we can see, when using CascadeType.LOCK, we attached the entity person and
its associated address back to the persistent context.
Refresh operations re-read the value of a given instance from the database. In
some cases, we may change an instance after persisting in the database, but later
we need to undo those changes.
In that kind of scenario, this may be useful. When we use this operation with
CascadeType REFRESH, the child entity also gets reloaded from the database
whenever the parent entity is refreshed.
For better understanding, let's see a test case for CascadeType.REFRESH:
1 @Test
public void whenParentRefreshedThenChildRefreshed() {
2 Person person = buildPerson("devender");
3 Address address = buildAddress(person);
4 person.setAddresses(Arrays.asList(address));
5 session.persist(person);
6 session.flush();
person.setName("Devender Kumar");
7 address.setHouseNumber(24);
8 session.refresh(person);
9
10 assertThat(person.getName()).isEqualTo("devender");
11 assertThat(address.getHouseNumber()).isEqualTo(23);
}
12
Here, we made some changes in the saved entities person and address. When we
refresh the person entity, the address also gets refreshed.
The replicate operation is used when we have more than one data source, and we
want the data in sync. With CascadeType.REPLICATE, a sync operation also
propagates to child entities whenever performed on the parent entity.
Now, let's test CascadeType.REPLICATE:
1
2 @Test
3 public void whenParentReplicatedThenChildReplicated() {
Person person = buildPerson("devender");
4 person.setId(2);
5 Address address = buildAddress(person);
6 address.setId(2);
7 person.setAddresses(Arrays.asList(address));
8 session.unwrap(Session.class).replicate(person, ReplicationMode.OVERWRITE);
session.flush();
9
10 assertThat(person.getId()).isEqualTo(2);
11 assertThat(address.getId()).isEqualTo(2);
12 }
Because of CascadeType REPLICATE, when we replicate the person entity, then its
associated address also gets replicated with the identifier we set.
CascadeType.SAVE_UPDATE propagates the same operation to the associated
child entity. It's useful when we use Hibernate-specific operations like save,
update, and saveOrUpdate.
Let's see CascadeType.SAVE_UPDATE in action:
1
@Test
2 public void whenParentSavedThenChildSaved() {
3 Person person = buildPerson("devender");
4 Address address = buildAddress(person);
5 person.setAddresses(Arrays.asList(address));
6 session.saveOrUpdate(person);
session.flush();
7 }
8
Because of CascadeType.SAVE_UPDATE, when we run the above test case, then
we can see that the person and address both got saved. Here's the resulting SQL:
Hibernate: insert into Person (name, id) values (?, ?)
1 Hibernate: insert into Address (city, houseNumber, person_id, street, zipCode, id)
2 values (?, ?, ?, ?, ?, ?)
As we well know, there are risks inherent in almost every major business decision.
Even if decision-makers opt out of an opportunity because it seems too risky, that
decision in itself can still be hazardous. Being too timid could lead to things like
new markets not being pursued, new products not being developed or allowing
competitors to gain the advantage. Therefore, it's crucial to have a detailed, data-
backed strategy in place to measure and reduce risk.
Risk mitigation strategies are designed to eliminate, reduce or control the impact
of known risks intrinsic with a specified undertaking, prior to any injury or fiasco.
With these strategies in place, risks can be foreseen and dealt with. Fortunately,
today’s technology allows businesses to formulate their risk mitigation strategies
to the greatest capacity yet. While every organization needs to identify the
strategies that are most appropriate for them, here are a few simple strategies to
perfect the process.
The four types of risk mitigating strategies include risk avoidance, acceptance,
transference and limitation.
Avoid: In general, risks should be avoided that involve a high probability impact
for both financial loss and damage.
Transfer: Risks that may have a low probability for taking place but would have a
large financial impact should be mitigated by being shared or transferred, e.g. by
purchasing insurance, forming a partnership, or outsourcing.
Accept: With some risks, the expenses involved in mitigating the risk is more than
the cost of tolerating the risk. In this situation, the risks should be accepted and
carefully monitored.
Limit: The most common mitigation strategy is risk limitation, i.e. businesses take
some type of action to address a perceived risk and regulate their exposure. Risk
limitation usually employs some risk acceptance and some risk avoidance.
References;
[01] Kenneth C. Laudon Jane P. Laudon (2016),“Management Information
Systems, Managing the Digital Firm”, Global Edition Text Book, Fourteenth Edition
pg. 121 – 122
[02] Josh Bendickson Jeff Muldoon Eric W. Liguori Phillip E. Davis, (2016),“Agency
theory: background and epistemology “, Journal of Management History, Vol. 22
Iss 4 pp. 437 – 449
[03] Mary S. Logan, (2000),“Using Agency Theory to Design Successful Outsourcing
Relationships”, The International Journal of Logistics Management, Vol. 11 Iss 2
pp. 21 – 32
[04] Naomi Wangari Mwai Joseph Kiplang’at David Gichoya , (2014),“Application
of resource dependency theory and transaction cost theory in analysing
outsourcing information communication services decisions A case of selected
public university libraries in Kenya “, The Electronic Library, Vol. 32 Iss 6 pp. 786 –
805
[05] Ogan M. Yigitbasioglu, (2010),”Information sharing with key suppliers: a
transaction cost theory
Perspective”, International Journal of Physical Distribution & Logistics
Management, Vol. 40 Iss. 7 pp. 550 – 578
Lynch, C., & Garcia-Molina, H. (1995) Interoperability, scaling, and the digital
libraries research agenda: A report on the May 18-19, 1995 IITA Digital Libraries
Workshop, August 22, 1995. Online: http://www-
diglib.stanford.edu/diglib/pub/reports/iita-dlw/main.html [Accessed: April 30,
2001]
Markey, K. (1984) Subject searching in library catalogs: before and after the
introduction of online catalogs. Dublin, OH: OCLC Online Computer Library Center.
Matthews, J.R., Lawrence, G.S., & Ferguson, D.K. (Eds.) (1983) Using online
catalogs: a nationwide survey: a report of a study sponsored by the Council on
Library Resources. New York: Neal-Schuman.
Miller, J. (Ed.) (1994) Sears list of subject headings. 15th ed. New York: Wilson.
Norman, D.A. & Draper, S.W. (1986) User centered system design: New
perspectives on human-computer interaction. London: Lawrence Erlbaum
Associates.
Payette, S.D., & Rieger, O.Y. (1998) Supporting scholarly inquiry; Incorporating
users in the design of the digital library. Journal of Academic Librarianship, 24 (2):
121-129.
Petersen, T., (dir.) (1994) Art & architecture thesaurus. 2nd ed. New York: Oxford.
Also: http://www.getty.edu/research/tools/vocabulary/ [Accessed: April 27,
2001]
Robertson, S.E. (1977) Theories and models in information retrieval. Journal of
Documentation, 33 (2): 126-148.
Rowley, J. & Farrow, J. (2000) Organizing knowledge: An introduction to managing
access to information. 3nd ed. Aldershot, Hampshire, England: Gower.
Salton, G. & McGill, J.M. (1983) Introduction to modern information retrieval. New
York: McGraw-Hill.
Saracevic, T. (1996) Modeling interaction in information retrieval (IR): A review
and proposal. Proceedings of the 59th Annual Meeting of the American Society for
Information Science, 33: pp. 3-9.
Saracevic, T. (1997) The stratified model of information retrieval interaction:
Extension and application. In Schwartz, C. & Rorvig, M. (Eds.), Proceedings of the
60th ASIS Annual Meeting, 34, (pp. 313-327). Medford, NJ: Information Today.
Saracevic, T., & Kantor, P. (1988) A study of information seeking and retrieving. II.
Users, questions, and effectiveness. Journal of the American Society for
Information Science, 39 (3): 177-196.
Schatz, B.R., Johnson, E.H., Cochrane, P.A., & Chen, H. (1996) Interactive term
suggestion for users of digital libraries: using subject thesauri and co-occurrence
lists for information retrieval. In Proceedings of the 1st ACM International
Conference on Digital Libraries. (pp. 126-133). New York: Association for
Computing Machinery.
Shneiderman, B. (1998) Designing the user interface: Strategies for effective
human-computer interaction. 3rd ed. Reading, Mass.: Addison Wesley Longman.
Shor, R. (1991) A uniform graphics front-end. Computers in Libraries, 11 (11): 48-
51.
Siegfried, S., Bates, M.J., & Wilde, D.N. (1993) A profile of end-user searching
behavior by humanities scholars: the Getty Online Searching Project report no.
2. Journal of the American Society for Information Science, 44 (5): 273-291.
Spink, A. (1997) Information science: A third feedback framework. Journal of the
American Society for Information Science, 48 (8): 728-740.
Syan, C.S. & Menon, U. (1994) Concurrent engineering: Concepts, implementation
and practice. London: Chapman & Hall.
Taube, M. (1953- ) Studies in coordinate indexing. Washington: Documentation,
Inc.
Text Encoding Initiative. [Home page] http://www.tei-c.org/ [Accessed: Arpil 27,
2001]
Vickery, B., & Vickery, A. (1993) Online search interface design. Journal of
Documentation, 49 (2): 103-187.
Weibel, S.L., & Lagoze, C. (1997) An element set to support resource
discovery. International Journal on Digital Libraries, 1 (2): 176-186. Also:
http://dublincore.org/ [Accessed April 27, 2001]
Zhang, J. & Fine, S. (1996) The effect of human behavior on the design of an
information retrieval system interface. International Information and Library
Review, 28 (3): 249-260.
Zhu, Z. (2001) Towards an integrating programme for information systems design:
An Oriental case. International Journal of Information Management, 21 (1): 69-90