Monday, April 8, 2019
Group Support Systems Essay Example for Free
Group Support Systems auditionGroup Support System is technology that is solely designed to spur the work of groups. It can be used to cooperate, compete, negotiate, coordinate, communicate or solve problems. Whilst conventional technologies, such as the teleph matchless qualify as GSS, the term is customarily used in reference to a definite class of technologies relying on modern computer networks like newsgroups, email, chat or videophones. GSSs have the ability to reduce communication barriers, thereby better organizational effectiveness.The technology facilitates clearer, faster and more persuasive communication and allows communication where it wouldnt otherwise be feasible or possible. Whats more, Group Support Systems facilitate new-fangled means of communication like incorporated interactions and anonymous interchanges, in so doing, they significantly reduce communication barriers. Similarly, Group Support Systems enhance group productivity in the organization by al lowing team members to collaborate from anywhere, share contact and information at a time and access email accounts from a single inbox.Besides, GSS lessens on time-consuming phone calls, travel expenses and organizational meetings. It as well curbs expensive overnight couriers and mailings, thereby improving organizational efficient through increased productivity. Facilitating decision-making activities is one of the cardinal features of Group Support System. The technology is applauded for knowledge management and brings to fore expertise as well as multiple perspectives regarding organizational decision making.Furthermore, it leverages professional expertise in making pertinent decisions to the objectives, goals, cathexis and vision of an organization. Finally, the benefits of Group Support Systems that I have experienced in the workplace are various(a) and far-reaching. The technology enables members to back up imperative documents in a secure location, in that way reduces risk of infection of information loss as a result of computer theft or damage.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment