1, the goal of information system operation management
Since the information system was put into use, the management and maintenance of the information system has become the main task of enterprise informatization. The goal of information system operation management is to control the operation of information system in real time, record its running state, and make necessary modifications and extensions, so that the information system can truly meet the needs of management decision-making and serve management decision-makers.
Without scientific organization and management, the information system will not automatically provide high-quality information services for the management, and the system itself will fall into chaos. The management of the system cannot be equated with the management of the machinery and equipment itself. The task of information system is to serve management. Its management aims to provide necessary information for enterprises or other organizations and meet the information needs of managers. The management and maintenance of the machine itself is only a small part of this work, which only provides hardware guarantee. To really provide information for managers, we still need to do a lot of work such as software operation, data collection and achievement provision. Therefore, the operation, management and maintenance of enterprise information system must be the full-time responsibility of information management professionals who understand the system functions and objectives and can directly contact with enterprise managers.
2. Contents of information system operation and management
The operation management of enterprise information system is the continuation of system development and the basis of whether the system can achieve the expected goal, which mainly includes daily operation management, operation records and inspection and evaluation of system operation.
(1) Daily operation management of information system.
After the information system is put into use, the daily operation and management workload is huge. Through the information system, four tasks must be completed: data collection, daily information processing and service, operation and maintenance of the computer itself, and security management of the system:
① Data collection.
Generally, it includes three subtasks: data acquisition, data verification and data entry.
If the data collection of the system is not done well, the whole system will become a castle in the air. System administrators should strive to improve the technical level and sense of responsibility of data collectors through various methods, and evaluate, guide and help their work, so as to improve the quality of collected data and lay a solid foundation for the effective work of the system.
Data validation is suitable for smaller systems. Usually done by the system administrator himself. In a larger system, it is generally necessary to set up a full-time data administrator to complete this task. Generally speaking, the data collector is a professional, and administratively does not belong to the full-time department of information processing. Therefore, it is essential to check the data.
The requirement of data input is fast and accurate. The responsibility of the input personnel is to input the verified data into the computer. They should input the received data into the computer system strictly, timely and accurately. Input personnel do not consider the logic and specific business meaning of data, and are not responsible for it. This responsibility is borne by the inspectors, who only need to ensure that the data sent to the computer is strictly consistent with the data on paper, and can never be replaced by the input personnel.
② Complete daily information processing and service. Common work includes: routine data update, statistical analysis, report generation, data copy and preservation, and regular data exchange with the outside world. Generally speaking, these tasks are to run some pre-programmed programs regularly or irregularly according to certain rules, which are completed by software operators. These working procedures should be specified in detail in the system development, and the operators should undergo strict training to clearly understand the operating rules and the handling methods of various situations. Organizing software operators to complete these daily information processing and information services is another routine task of system administrators.
③ Arrange full-time personnel to be responsible for the operation and maintenance of the computer itself. For large computers, this work needs more full-time personnel to complete, while for microcomputers, it doesn't need so many personnel and special equipment, which is an important advantage of microcomputers. However, this does not mean that the microcomputer has no hardware operation and maintenance work to do. On the contrary, if no one is responsible for the operation and maintenance of hardware equipment, the equipment will be easily damaged, thus losing the material basis for the normal operation of the whole system. This situation has happened many times in many units. The operation and maintenance work mentioned here includes equipment use management, regular maintenance, preparation and use of spare parts, use and management of various consumables (such as floppy disks and printing paper), management of power supply and working environment, and so on. For microcomputers, although many full-time personnel are not needed to complete these tasks, at least someone who can be responsible should be appointed to take charge of these things. Nobody is in charge.
④ Safety management of the system. It is an important part of daily work, and it is a means to prevent illegal use and access to system resources from outside the system, to ensure that the hardware, software and data of the system are not destroyed, leaked, modified or copied by accidents or human factors, to maintain proper information activities and to ensure the safe operation of the information system. The security of information system is embodied in four aspects: confidentiality, controllability, auditability and anti-attack.
The above four tasks must be carefully organized and effectively completed in daily operation. As managers of enterprise information systems, we must comprehensively consider these issues. Organize relevant personnel to implement according to the prescribed procedures, with strict requirements and strict management. Otherwise, it is difficult for the information system to play its due practical benefits. In addition, there are often some temporary information service requirements outside of daily work that will be put forward to the computer application system. These information services are not within the daily work scope of the system. However, their functions are often much greater than those of banks. With the improvement of management level and the strengthening of information awareness of leaders at all levels, this requirement will be more and more. Leaders and managers often evaluate and treat computer application systems more by meeting these needs. Therefore, efforts to meet these requirements should be one of the problems that computer application system managers should pay special attention to. The person in charge of the system should accumulate these temporary requirements, find out the rules, extract some general requirements, form general requirements, and expand the system to make it a regular service. This is an important aspect of information system improvement. Of course, this work cannot be entirely undertaken by the system administrator himself. Therefore, information systems often need some skilled and capable programmers.
In a word, the daily management of information system is very heavy and cannot be taken lightly. In particular, the management of information system is not only the management of machines, but also the management of personnel, data and software.