StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

On the Deep Structure of Information Systems - Assignment Example

Cite this document
Summary
"On the Deep Structure of Information Systems" paper explains IT's data, technology, people, and organizational components, describes the functions of the system, and explains broad areas or fields in which the system is used and how the system has improved the way work is done in that area…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful

Extract of sample "On the Deep Structure of Information Systems"

Information Systems Student’s Name Subject Professor University/Institution Location Date Table of Contents Table of Contents 2 3. What is cloud computing? 4 10. List the different types of technological safeguards employed by organizations. 9 References 11 1. Define the term “information systems” (IS) Explain its data, technology, people, and organizational components. Describe the functions of the system. According to Wand & Weber (2008), Information system (IS) studies the design and coordination of hardware and software system used by people and organizations for collecting, filtering, processing, creating and distributing data. Its knowledge integrates information technology solutions to business processes in order to meet enterprises and business information needs. The various information systems help in processing information particularly within organizations such as business enterprises, thus sharing its benefits with the modern society. It essentially emphasizes over the functionality of a design through the theoretical approach to information and computation. Through the study, business models are analyzed and related to various computer sciences. The data involved with information system include office information, electronic data, business records and day to day updates of the business. The role involved in information systems has had specialists as it is a flexible resource that is available for executives. Many of organization has specialized role carried out by Chief Information Officer, Technical officer, Operating officer and Information Security Officer for information security management. Other common roles includes the IT Managers, Network and System Administrators, Programmers/Developers, IS Trainer and Helpdesk. The roles are distinct, though overlapping in most instances; they are separated when it comes to a vast organization with multiple information system processes. Their roles are to implement, manage the system according to the set policies and procedures. The technology used with Information Systems has both the hardware and software components. The hardware is physical facilities laid down to support the information technology software. The software integrate data through access databases and support the core technology and data infrastructure with their functional requirements. The function of information systems is demonstrated from its diverse application in nearly every part of organization. Its aims are to enable sharing of resources, reduce effort duplication, inefficiency and streamline information resources to support changing organization goals. This mainly integrates and improves knowledge across and outside the organization. The system creates and enables effective and efficient transactions, database management and office information. Information technologies enable the performance of tasks that are difficult with human brains. These enable organizations handle large amounts of data, control simultaneous process and perform complex calculations. They are suitable due to their specificity to each department. Its tools assist the staff meet the business needs, broader community expectations and relevant standards. They also improve the creation, capture and access of relevant I formation, facilitating effective and efficient program delivery, decision making and policy information. Along with these, it provides the capacity for explaining and providing evidence of organizational actions and decisions (Wand & Weber 2008). 2. Four examples of Information systems Explain broad areas or fields in which the system is used and how the system has improved or changed the way work is done in that area. As Wand & Weber (2008) discusses, Information Systems have had a diversity of application leading to its various modes and functionality. Management Information System has three broad areas including the technology, people and data. This provides the organization with information needed for efficient and effective management. The distinct roles of management system arise from its functions of analyzing and facilitating strategic and other operational activities. These help organizations, individuals and groups evaluate, design, manage and utilize the system that generates information for improved decision making. Managers in the business get relevant information to make decisions. Complex computer applications involved with management information systems enable managers to seek information of sales, inventories and data for managing the enterprises. This has broadened to decision support system, human resource and resource management, enterprise performance and resource planning and project management. Knowledge management System is involved with the practices and strategies of organization that help it in identifying, creation, representation and distribution of insights and experiences. The knowledge is either embodied with individuals or organizations for processes and practices. The system has improved research which then enables a continuous application of knowledge in business processes. It has also enabled human resource development through training ad sharing of ideas relevant to processes. Customer Relationship Management system is a model that mange companies’ interactions with their current and future customers. The system use technology to organize and synchronize sales, customer service, marketing procedures and technical support. There are multiple channels used to measure campaigns and marketing track through multiple channels. This uses emails, social media, and telephone and search options to continuously interact with customers. Its benefits range from streamlining the sales process, tracking and recording the stages of sale process with prospective client. Its applications has been important for creating opportunities, new market zones, sales forecast and workflow automation. Supply chain management system manage network of connected business to provide the required product and services package that end customer require in a supply chain. It integrates the storage of raw materials, process inventory and movement of finished goods from original point to the point of consumption. The core functions are control and monitoring the supply chain activities in order to create value. Apart from value, the system has allowed organization and businesses build a competitive infrastructure, synchronize supply with demand, measure performance and leverage worldwide logistics. It also improves the long-term performance of companies and supply chain including suppliers, resellers and final consumers. 3. What is cloud computing? Discuss its characteristics and issues to be considered by an organization when considering use of cloud computing. List two example cloud computing services for personal use. Cloud computing are the use of computing resources; the hardware and software, to deliver various network services. It is an integration of complex infrastructure that works together. The complex system includes the functions of infrastructure, platform, network, software, security, data and many others. Software used as service enables the user to access databases and application software. Since in cloud computing, the user data is stored n cloud server, it becomes prone to unauthorized access. A business adopting cloud computing has to consider how to manage the platform and infrastructure where the applications run. They must consider the end-users and how they will access the applications and the price per use. Most enterprises using cloud computing has enabled their applications to be up and running faster. This also improves manageability and encompasses less maintenance. The business IT becomes more rapid in resources adjustment in order to meet the business demands. Cloud computing is easily used in personal and business life. The services make life easier and help a person promote, manage and operate a business. Social networking is a famous mode that uses cloud computing, Facebook, Twitter, LinkedIn and MySpace are some of its Websites. Most enable a person connect with diverse audiences, communicating through text, comment, like and dislikes of product, issue and comments. E-Mail is another common and most demanded for personal use and identification. Web-based e-mails that use cloud computing allow e-mails to be accessible anywhere (Marchesini, 2010). 4. View the following sites:  www.informationweek.com; www.itwire.com www.delimiter.com.au  www.computerworld.com.au Then write a paragraph on which technologies and issues seem to be current (‘hot’) at the moment, and which seem to be most important to business managers, according to each of these sites. www.informationweek.com site issues and technologies involves innovation, IT solution, social media, IT human resource, the challenges of huge technologies and giants companies strategic plan for 2013 and ahead. Looking at some of interesting news, innovation has always been in spotlight, covering famous consulting groups but neglecting other leading companies. IT implementation should aim at increasing human and functional universality if it has to be defined as modern. The drives of social media are traced by the way they are setting standards for cheaper, more efficient server systems. The best IT people are a concern just as the company’s customers are. Microsoft has an open discussion with the public dubbed “What Microsoft Must Do in 2013” which is described as a make or break year.  www.itwire.com site news traces some viewpoints on mobile applications, iPad application, information on useful windows and maintenance and the leading multinational corporation’s moves. The main focus is on news including the current advances in Telstra; acquiring TrueLocal a News Limited that own online directory businesses. News of Microsoft expanding Mobile Devises Management markets and MT Panorama real racing 3 are covered which is highly anticipated. The site is significant to help customers and online shoppers get updated on global company’s moves and innovations. The managers use it to review customers’ response to an innovation and how it can be improved. www.delimiter.com.au  site on telecommunications has National Broadband Network news on redundant of head of construction. This traces how the leadership of the company has changed in the past few years. The chief operating officer, speaking on adjustments, emphasized that it was for to place the company on the best move to reach its targets. Other major issues included are government IT, Medicare, iPad trials and success, Twitter improvements among others. www.computerworld.com.au traces the history of devices development, software projects, company acquirements and commonly used technological such as Desktop Linux. The scariest software projects carried out in 2012 which lost billions of dollars and were never realized. Other news traces the growth and development of cloud computing in 2013 as a way by which enterprises seek to boost innovation and reduce costs. 5. List the Latest version of three popularly used operating systems in personal computers. Discuss the features of the operating system you would prefer and why. There are many Operating Systems, but listed here are the newest and the most popular as the latest releases: Microsoft: Windows 7 Ubuntu Linux: 10.10 Maverick Meerkat Apple OSX: Lion The wide range of OS provides feature as we use them sometimes by choice or necessity. Some has better impression compared to others but most of them has unique revolutionary to help work done. Other features attract the attention and the need to dig further to understand its working and master what it does. Ubuntu, with simplified Linux Setup is an up system which when one figures out its details and creates a powerful, highly customizable secure system which runs well in modest hardware. It’s easy to access configuration, installation information even via the Internet makes it probable used by many audiences. It has also high-quality, free and open-source software which is appealing. For Ubuntu installation there is a lot of software thus possible to work and play right away with e-mails, chats apps, media apps, OpenOffice, browsers like Firefox and Chrome and many others. For a developer, there are lots of tools that Linux offers. Ubuntu Software Centre gives a one-click access for huge library of apps. It is simple and automatic to update the software. A preemptive multitasking Windows operating system is a very effective to enable run programs and work efficiently and simultaneously. Microsoft operating systems which are compatible with many computers are offering a good functionality across computer. An OS with UNIX program offer multitasking and multi-user OS. Its significance is seen in commercial adaptation. There are also many available UNIX based programs that can be downloaded online such as Ubuntu. It is free and has open source program which is designed for personal computer (Dorsey, 2011). 6. You are hired as an enterprise consultant by a leading financial institution. While doing requirement study, you notice that the company is using a number of legacy systems. Identify the challenges that you would face in converting these legacy systems to enterprise applications. Legacy systems entail an old method, application program, computer system and technology used by an organization. Some of the reasons for its use or preservation are its continuous impact on compact for a historical role. It can be converted into a new system format or just exist in data warehouse. The effects of operational reporting and business intelligence are of significance. There are various reasons why legacy systems may continue to be used. However it is past vendor-supported lifetime support and maintenance becomes a challenge. It may provide for the user needs, though new technology with efficient systems and methods perform the task better. A main challenge that one can encounter in transforming a legacy system is involved economic reasons. The return on investment might be very little and thus the management may find the legacy system to be useful for its functioning. An inherent challenge is change management which in a way may affect the structure and dissolve its synchronized roles which are adapted as institutional culture (Matos 2008). Continuing his discussion Matos (2008), argues that, one of the most difficulties involved with such a project is managing change. Since the project would impact a larger part or every individual in the enterprise including those who receive and creates records, the users are needed to adjust and shift in the ways the records are classified. This mainly is from subjects to functions and activities which take much time to learn. Some staffs can experience difficulties to adjust to new processes and the use of a new technology. The change management issue may involve; steps to ensure that that project appear an integral part of the enterprise by staffs. To have the sponsor of the project, there need members or committee that champions the project and steer its application. The process is rigorous if implementation is allowed since there is need to keep staff informed on project progress through meetings, discussions, newsletters and Internet sites that supports its objectives. Regular consultations with staff require set sessions, one-to-one discussions, training and briefing as integral part of system application. There is also the need of set suitable feedback mechanisms for instance a system for registering issues, help desk, workshops and quality controllers. After completion there is also needs to make schedules, guidelines, policy, reference guide and templates accessible via established mode. Another challenge involves assisting in creation of suitable tools for assisted use and identifying training needs as induction training in record management. 7. What are intelligent systems? Discuss the different types of intelligent systems and their use in different fields. Intelligence systems are a combination of a system and its environment which learns and acts to reach an objective. IS combines systems to environment, receive communication from that environment to elaborate its present situation. IS has an objective of checking its functionality and then responds accordingly with the past favorable situations. It learns by building on the last favorable response and act to that response. IS having temporary objectives and thus senses its environment that captures elements such as light and a sound of an object. The systems then store the senses impressions as their elementary concepts. The concepts store information creating new ones and storing relationship to total, part, concrete and abstract concepts. It embodies its responses to enable its earning process with the past favorable outcomes. Intelligence system must the act in order to accomplish its selected response. The recent trend of technology increases the intelligent systems realm. Some types of intelligent systems can be identified with their roles. First there are intelligent motion detection in security supplies involving integrated digital video recorder, camera that detect intelligent motion and human movements. However the system does not distinguish human and animal movements. The system trigger alarm when an object particularly stationary one is found missing from camera’s field of view. Suspicious behavior detectors intelligence systems help security in their work. CCTV system has an ability to see and alarm if a suspicious object is left behind by a person. All this has helped institutions safeguard and create security to valued resources, limit unauthorized entry and assure safety information processes. Other common intelligent systems include the facial recognition devices, asset tracking, temporary security options, danger management and door sense motions (Gibson, 2010). 8. Explain the concept of “web services” and why they are important to e-businesses. As Al-Masri & Mahmoud (2008), argues, Web service uses World Wide Web to communication between two or more electronic devices. As a software function it is provided over the web or cloud with a network address. The web service supports an interoperable machine-to-machine interaction via a network. Its interface involving service requester, service broker and service provider is enabled by systems such as SOAP and WSDL. There are systems that are compatible with web service such as acronym, messages which are conveyed by http with Web-related standards. The strategic capability of web service can be seen by many elements they employ to potentially contribute to e-business functionalities. First, e-business use it as an asset; using technology and money to devise and use strategies in virtual worldwide market. They do this through utilization of human resources, the buyers, seller’s information and feedback. E-business leadership, employee skills mechanisms and management team use web service to contribute to competitiveness. The capability for e-business competitive advantage is realized by the way of dealing with the virtual worldwide market. Therefore, through web services offer them with communication which is highly efficient between buyers and sellers. Through the modern customer tracking system, they enable continuous improvement, constant feedback from its customers. Business has done teleconferencing, education programs and group meetings with these efforts promote their development worldwide. Web services specific to e-business use rules and norms and customers create a smooth transactions to enhance automatic control. It is possible to establish connections and network with other platforms like Skype and Google to advertise and promote the e-commerce. The product names are created in a way every time a letter or a main word is written on a network, that product is listed to appeal to viewers. 9. Do you think that educational institutions should be allowed to monitor e-mail sent and received on school computers? Why or why not? Do you think that any e-mail messages sent or received over a computer at work should be considered company property? Why or why not? Privacy and relevant law are set with modern and easily accessible forms of communication. The privacy of each and every person is a matter of concern promoted through responsibility of site developers and regulators. Any information taken by another person from its users, demand their consent and the person collecting it need to make themselves known by clear identity. Education institutions are should not be allowed to personal identification documents and other sensitive financial information by accessing their e-mails and the social sites. An example with social cite on privacy prohibit tagging users or emailing invitations to its non-users. However continuous improved features enable privacy and settings so that a person can control the way information and content is shared. This is enabled immediately when a user sign up. Educational institutions should be controlled to the extent to which they control personal and sensitive information. This is against personal rights which might limit the free use of Internet based platforms. However, a person should choose to share status update, comments and photos on personal choice. An important feature is how the sites obtain information for a person visiting other people’s timelines, or get data from third parties, customers, and advertising partners. It is expected for school computer to regulate some content if the students’ age would not assume responsibility. E-mail messages sent or received over a computer at work should not be considered company property. This should follow a laid down procedure explained by the company to its workers. Workers feel insecure when their personal information is accessed by others and these limit interactions. Except for critical company that deals with critical investigations for highly sensitive workers information it is not legal to take e-mails as company property. Instead, company should enhance the creation and updating of members privacy, through policy and procedures that align with legislation. They should continuously distribute the new and revised procedures and policy to employees while implementing new work procedures to collect feedback from workers. This will ensure the integrity, security, and confidentiality of information required by set policy. 10. List the different types of technological safeguards employed by organizations. Also explain encryption and how does it help to secure information by taking any popular encryption software as an example. In order to prevent any impermissible use and disclosure of protected electronic information, technological safeguards are used appropriately. According to HIPAA security standards and implementation, the specifications are classified as physical, administrative and technical safeguards. The physical safeguards include physical measures, procedures and policies that protect covered entities of electronic information systems, equipment and related buildings from unauthorized intrusion, environmental and natural hazards. The basic elements involved with it are workstation use, security, device, facility access and media controls. This is to limit physical access to facilities which house electronic information systems. Only the authorized personnel access, and contingency operations are allowed. Restrictions are also implemented to avoid access to workstations and specifying appropriate use and access. Administrative safeguard entails actions, policies and procedures that manage selection, the development and implementation, together with maintenance of the security measures that protect electronic information. It involves the security management process, assigned security responsibility, workforce security, information access management, security awareness and training, incident procedures, contingency plan, and evaluation of security plans and procedures. Technical safeguard uses technology and policy to protect electronic information. This is done through access and audit controls, integrity and transmission security (De Hert, et al 2009). Encryption is a process that encodes messages and information in a manner that is impossible to be hacked, read or heard but allowing authorized parties to do it. The information is encrypted through an encryption key specifying on how a message is to be encoded and turning it into unreadable ciphertext. Ill intentional viewers cannot determine anything with the original message or information. Authorized parties can decode the information by use of decryption secret key. Encryption software encrypt and decrypt data in files form on hard drives, email messages, removable media and packets sent via computer networks. Rijndael is faster software and has fewer rounds which are applied to data such as disk encryption. The software OTFE limit access to most data that are stored transmitted and carried using disk, compatible with many technologies (Lewko, et al 2010). References Al-Masri, E., & Mahmoud, Q. H 2008, April, ‘Investigating web services on the world wide web’, In Proceedings of the 17th international conference on World Wide Web (pp. 795-804). ACM. De Hert, P., et al. 2009, ‘Legal safeguards for privacy and data protection in ambient intelligence’, Personal and ubiquitous computing, 13(6), 435-444. Dorsey, T. (2011, 02 10). 10 Great Features in 10 Different OSes. Retrieved 01 18, 2013, from Redmondmag.com: http://redmondmag.com/articles/2011/01/25/10 Gibson, R. ( 2010, July 14th,). Types of Intelligence Systems. Retrieved 1 18, 2013, from I Watch Systems. Lewko, et al 2010, ‘Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption’, Advances in Cryptology–EUROCRYPT 2010, 62-91. Marchesini, M. G. (2010, 3 26). Types of Cloud Computing. Retrieved 1 18, 2013, from Cloud Computing: http://www.unc.edu Matos, C 2008, ‘Service extraction from legacy systems’, Graph Transformations, 505-507. Wand, Y., & Weber, R 2008, ‘On the deep structure of information systems’, Information Systems Journal, 5(3), 203-223. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(On the Deep Structure of Information Systems Assignment, n.d.)
On the Deep Structure of Information Systems Assignment. https://studentshare.org/information-technology/2049500-information-system-question
(On the Deep Structure of Information Systems Assignment)
On the Deep Structure of Information Systems Assignment. https://studentshare.org/information-technology/2049500-information-system-question.
“On the Deep Structure of Information Systems Assignment”. https://studentshare.org/information-technology/2049500-information-system-question.
  • Cited: 0 times

CHECK THESE SAMPLES OF On the Deep Structure of Information Systems

Passive cooling and ventillation

The historical design patterns alternatively relied on natural systems of internal environment control, known as passive cooling and ventilation.... Most important information they need include the sun's positions throughout the year and direction of winds (Youtube 1).... Structural designs that involved window designs, wall thickness and shading, roofing styles, low heat conductance material, external microclimate control, water bodies and structure stance characterized the era....
3 Pages (750 words) Research Paper

Variety of Business Information Systems

The paper "Variety of Business information systems" highlights that the primary disadvantage is the exposure of business logic and the formulas that are open for one to hack and use it for other sensitive purposes.... The stress is more on the variety of information required for getting the right attitude for the spreadsheet.... The first section outlines the structure of the model and the various design principals which would be vividly discussed with screen dumps....
6 Pages (1500 words) Coursework

Identifying Stakeholders and Developing Charter

This essay stresses that organizational structure has a very deep impact on the project management and PM decision making process this also includes the company's size and its business requirements.... The organization functioning horizontally or vertically the organizational structure is used to uphold and mange the resources, time line, expenditure, and quality/performance....
6 Pages (1500 words) Essay

The customer pyramid ethical issues

This subunit includes Cloud and Enterprise, Devices, Applications and Services, and Operating systems.... perations and LogisticsMicrosoft has systems and structures in place to ensure that workflow is achieved.... Its other affiliate; Microsoft Research sources it further with data and information on how and what the company should improve.... It has regional branches, virtually, across the globe to allow for easy access to information and facilitate logistical operations....
2 Pages (500 words) Essay

Entrepreneurship: Business Startups

For instance, acquiring financing through public financial support programs is a difficult problem due to the vast numbers of programs and the enormous amount of information which have to be taken into account (ibid, 12).... In starting up a business the entrepreneur is faced with countless problems, such as keeping in touch with government officials, being aware of state regulations, getting hold of financial supports, designing a deed of partnership, deciding a legal status, choosing prospective suppliers, developing a structure of distribution, appraising the market, which the entrepreneur may find too much to handle (Thierauf 2003)....
3 Pages (750 words) Essay

System and Structure of Unified Communication

Pleasant (2008) has defined the Unified communications as an integration of real-time communication services like the presence of information, instant messaging (chat), video conferencing, IP telephony, speech recognition and call control by means of non-real-time communication services is acknowledged as unified messaging.... This coursework "System and structure of Unified Communication" focuses on providing a detailed analysis of Unified communication technology that is intended to offer all the facilities and quality of better communication at the same place and package....
6 Pages (1500 words) Coursework

Is the Knowledge Management the Real Future of HRM

Increasing amounts of information are being generated but without the corresponding increase in the ability to manage, interpret and act on relevant information resulting in an information overload.... There are no commonly accepted definitions of these terms, but if no working definitions of these concepts are debated there will be little progress in the discussion of these concepts especially in the field of information science.... Horton indicated in 2002 in his evolution of resource management functions that the management of knowledge already began during the 1980s which comprised of expert systems and artificial intelligence and which recognised the economic and cultural value of knowledge (Horton 2002)....
10 Pages (2500 words) Essay

Managerial Issues in Managing an Organizations Is Infrastructure

nbsp;… Organizations use information systems for the inspirations driving finishing and managing their ordinary exercises, working together with their customers and suppliers to give an affiliation with high ground in genuine markets.... information systems are delicate, taking into account the tricky information that is taken care of in them.... This requires the IS directors to practice a lot of ready while managing information systems since the loss of this data suggests a significant setback to the affiliation....
4 Pages (1000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us