Wednesday, May 6, 2020
Management Information System and Information Technology Sample
Question: Discuss about Management Information Systyem. Answer: Introduction Information technology is to make use of computers for enterprise or business purposes such as study, store, retrieve, manipulate and transmit the data. The article by Nicolas Carr examines the development of Information technology in business and it shows that the IT industry follow the same pattern as the earlier technologies did. According to the author, IT does not matter much in business technologies much. This assignment highlights the terms related to Management Information System (MIS) and Information technology (IT). The questions related to the article have been answered on qualitative and quantitative perspectives. Various information systems have been discussed which support decision making in an organization. The ethical issues, which rise in an organization, have also been discussed. The assignment gives a brief of the overall activities in an organization. Individual research assignment Management information system and its importance to organization. According to Nicolas Carr, use of has vanished from organizations. IT does not matters much in an organization in recent areas. But, Information system has emerged in the last decade and it is affecting every aspect of human life. The management information system has brought up untapped opportunities for business such as the secured payment process, web-based processes for business and managing the business from anywhere without being present in the office[1]. All the management functions are functioned through decision making in an organization. MIS in an organization helps the management to take reliable and timely actions and form a well-structured and reliable information system in the organization by the means of processing, collecting and disseminating the decision makers of the organization. Basic concepts of IT, computer system, software and hardware. According to Nicolas Carr, the system is called for in the business which is cost-conscious. But, There are many hardware as well as software components which form the IT system. In any organization, these components must be set up to implement proper Information system. The hardware components indulge the mouse, keyboard, monitor, central processing unit and the software components indulge the windows and other applications for smooth running of the system. Internet connection is a must factor to set up information system and make it work properly in an organization[2]. The organization can get huge benefits only if the system is set up properly. According to Nicolas Carr, the strategic implantation in the organization is clear. It is of two types which are the proprietary and the mid 1980s. There are different types of MIS which can be implemented in an organization. The first type is transaction processing system, which is designed to handle bulk of routine and recurring transactions. It is often used in banks to record the deposit and payments in the accounts. it is efficiency oriented and is not limited to internal or external boundaries[3]. The second type is management information system which is used by middle managers. It is based on the internal information flow in an organization and it deals with the past and present and past happenings rather than the future. The third type is decision support system which is an interactive computer system used by the managers. It supports the ill or semi structured decisions of an organization and is connected with the prediction of future. According to Nicolas Carr, internet is making human dumb. But, Internet can be refereed as the connection of devices on global basis which are linked together by routers and use a set of protocols known as the TCP/IP protocol. World Wide Web (WWW) is the assembly of numerous internet sites which are accessed by a hypertext interface. The links contain the document which can be anywhere in the world. the basic components of WWW are the browser which is a software which allows the access of world wide web, hypertext and hypermedia which electronic links to other texts, Hyper Text Markup Language (HTML) which is a set of commands which are used to create the WWW, the Uniform Resource Locator (URL) which links the documents through addressing scheme, Hyper Text Transfer Protocol which is a protocol used to exchange media, home page which is the starting location at WWW site and the client/server which provides internet services[4]. According to Nicolas Carr, data storage needs a proper warehouse environment. Database is the most essential component of nay organization. There are many key benefits of database, data warehouse and business intelligence in any organization. They are- these Factors standardizes the data in an organization, it helps the company to make smarter decision and move towards the decisions which are fact-based, it reduces cost and helps the company to drop the products which are no longer useful to the firm. These also help the organization to increase the revenue and work on the high-selling products in the market. As stated by Nicolas Carr, object oriented programmings concept are taken through the coordination theory. Object oriented technology has brought revolution in the computer industry and it has an association with the geographical information technology (GIS). The graphical objects include the things which can be dragged, slide, dropped, pushed, toggled and clicked. On the desktop, file-folders, program shortcuts and recycle bin is included in this. Widgets are used in the development of computer codes under this technology. The object oriented programming languages allows the user to generate the codes by just making a flowchart of the logic of the program. The key factors of this technology are encapsulation which refers to the bundling of elements of data and processing them in specific functions, polymorphism, class structure and inheritance. According to Nicolas Carr, use of IT is no longer fruitful in the IT sector. But in general, The information system which helps the management of any organization to make decisions is the Management Information System (MIS). The combination of raw data into equivalent information in an organization is the major role of Management Information System. It helps the organization to make decision as it has all the facts and figures collected and thus any data can be withdrawn from the system[5]. It saves a lot of time of the management as the time needs not to be wasted in searching the data. According to Nicolas Carr, the initial phase is the preliminary phase followed by other phases. The phases of system development life indulge various steps. The first step is planning which includes defining the system which is to be developed, setting the scope of the project and developing the plans of the project. The second phase is the analysis phase which indulges the gathering of requirements for any business. The third phase is the design phase which includes designing the system model and technical architecture. The fourth phase is the testing phase which includes the writing and performing of test conditions. The final phase is the maintenance phase which includes the building of help desk for supporting the users of the system. The methodologies used are rapid application development, extreme programming and agile methodology. The three tools used are the in sourcing, self-sourcing and the outsourcing. According to Nicolas Carr, the e-commerce business models vary throughout the world. The business models used in e-commerce are the Business-to-Business (B2B), the Business-to-Consumer (B2C), the Consumer-to-Consumer (C2C), the Consumer-to-Business (C2B), the Business-to-Government (B2G), the Government-to-Business (G2B) and the Government-to-Citizen (G2C). The trends in e-commerce are providing dynamic shopping experience, signal-driven and real time analytics, rigorous and live support engagement of the customers and customer retention programs. According to Nicolas Carr, ethical issues may rise from privacy to piracy. There are various ethical issues which have come up regarding the privacy, copyright and intellectual properties. They are- the access and control of information in the organization, the piracy of data by any ill-member if the organization, misuse of data by anti parties of the organization and the international considerations of the organization[6]. The data of the organization needs to be kept sensitive and confidential in order to safeguard the strategies of the organization[7]. The ethical issues also indulge the taking and sharing of the data by any member of the organization. According to Nicolas Carr, ethical issues may rise heavily due to the use of information technology. Digital forensics is the investigation done to find out the root of computer crimes. It is the science of analyzing, extracting and the presenting the evidence of digital things that has been stored in any particular digital device. Numerous tools and techniques are used to find the digital traces. The investigation process has several phases which are collection, examination, analyzing and reporting phase[8]. The suspects can hide the evidence in various devices and storage places such as the file slack, volume slack, deleted file spaces and file clusters[9]. The extraction process of data related to computer crime is referred to as cyber mining. According to Nicolas Carr, glorified typewriters and calculators are the tools for IT. Many terms have emerged in the passing decade regarding the Management Information System (MIS). These trends and technologies govern the processes of managing the information system in any organization. The emerging trends include the Big data analytics which refers to the organization, collection and the analysis of the data[10]. The two areas of MIS where big data can be applied are data mining and raw data maintenance. Raw data maintenance in any organization refers to managing of the raw data in any organization thorough database and other systems. Data mining refers to turning of raw data into useful information[11]. The other trend is cloud computing which utilizes than the personal computers and local servers[12]. It refers to store data on internet rather than the hard drive of the computer[13]. The other trend is mobile computing which refers to use of mobile rather than the personal comp uters. The other trend used is Smart machines which have widespread and deep impacts on business[14]. They are capable of making decisions and learn on their own. These machines are capable of increasing the efficiency and affectivity of the organization to much extent. The professionals of MIS should make use of the smart machines to get efficient profit from the business undergoing. Conclusion Hence, from the above discussion it can be concluded that Information system has emerged in the last decade and it is affecting every aspect of human life. The management information system has brought up untapped opportunities for business such as the secured payment process, web-based processes for business and managing the business from anywhere without being present in the office. The information system which helps the management of any organization to make decisions is the Management Information System (MIS). The combination of raw data into equivalent information in an organization is the major role of Management Information System. The methodologies used are rapid application development, extreme programming and agile methodology. The three tools used are the in sourcing, self-sourcing and the outsourcing. References Cole, K.A., Gupta, S., Gurugubelli, D. and Rogers, M.K., 2015, January. A Review of Recent Case Law Related to Digital Forensics: The Current Issues. InProceedings of the Conference on Digital Forensics, Security and Law(p. 95). Association of Digital Forensics, Security and Law. Coronel, C. and Morris, S., 2016.Database systems: design, implementation, management. Cengage Learning. Dennis, A., Wixom, B.H. and Tegarden, D., 2015.Systems analysis and design: An object-oriented approach with UML. John Wiley Sons. File, T. and Ryan, C., 2014. Computer and Internet use in the United States: 2013.American Community Survey Reports. Gerpott, T.J., Thomas, S. and Weichert, M., 2013. Characteristics and mobile Internet use intensity of consumers with different types of advanced handsets: An exploratory empirical study of iPhone, Android and other web-enabled mobile users in Germany.Telecommunications Policy,37(4), pp.357-371. Hough, M., Bradford, B., Jackson, J. and Quinton, P., 2016. Does Legitimacy Necessarily Tame Power? Some Ethical Issues in Translating Procedural Justice Principles into Justice Policy. Laudon, K.C. and Laudon, J.P., 2013. Management Information Systems 13e. Mall, R., 2014.Fundamentals of software engineering. PHI Learning Pvt. Ltd.. Mocanu, D., Rossi, L., Zhang, Q., Karsai, M. and Quattrociocchi, W., 2015. Collective attention in the age of (mis) information.Computers in Human Behavior,51, pp.1198-1204. Monn, M.F., Bahler, C.D., Schneider, E.B. and Sundaram, C.P., 2013. Emerging trends in robotic pyeloplasty for the management of ureteropelvic junction obstruction in adults.The Journal of urology,189(4), pp.1352-1357. Carr, N.G., 2003. IT doesn't matter.Educause Review,38, pp.24-38. Patterson, D.A. and Hennessy, J.L., 2013.Computer organization and design: the hardware/software interface. Newnes. Rogers, R. and Marres, N., 2016. Landscaping climate change: A mapping technique for understanding science and technology debates on the World Wide Web.Public Understanding of Science. Rybalchenko, A. and Steinebach, M., 2014, December. Towards a Process Model for Hash Functions in Digital Forensics. InDigital Forensics and Cyber Crime: Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers(Vol. 132, p. 170). Springer. Wastell, D. and White, S., 2014. Beyond bureaucracy: Emerging trends in social care informatics.Health informatics journal,20(3), pp.213-219 Laudon, K.C. and Laudon, J.P., 2013. Management Information Systems 13e. Patterson, D.A. and Hennessy, J.L., 2013.Computer organization and design: the hardware/software interface. Newnes. Mall, R., 2014.Fundamentals of software engineering. PHI Learning Pvt. Ltd.. Mocanu, D., Rossi, L., Zhang, Q., Karsai, M. and Quattrociocchi, W., 2015. Collective attention in the age of (mis) information.Computers in Human Behavior,51, pp.1198-1204 Gerpott, T.J., Thomas, S. and Weichert, M., 2013. Characteristics and mobile Internet use intensity of consumers with different types of advanced handsets: An exploratory empirical study of iPhone, Android and other web-enabled mobile users in Germany.Telecommunications Policy,37(4), pp.357-371. Dennis, A., Wixom, B.H. and Tegarden, D., 2015.Systems analysis and design: An object-oriented approach with UML. John Wiley Sons. Rogers, R. and Marres, N., 2016. Landscaping climate change: A mapping technique for understanding science and technology debates on the World Wide Web.Public Understanding of Science. Hough, M., Bradford, B., Jackson, J. and Quinton, P., 2016. Does Legitimacy Necessarily Tame Power? Some Ethical Issues in Translating Procedural Justice Principles into Justice Policy. File, T. and Ryan, C., 2014. Computer and Internet use in the United States: 2013.American Community Survey Reports. Cole, K.A., Gupta, S., Gurugubelli, D. and Rogers, M.K., 2015, January. A Review of Recent Case Law Related to Digital Forensics: The Current Issues. InProceedings of the Conference on Digital Forensics, Security and Law(p. 95). Association of Digital Forensics, Security and Law. Wastell, D. and White, S., 2014. Beyond bureaucracy: Emerging trends in social care informatics.Health informatics journal,20(3), pp.213-219. Monn, M.F., Bahler, C.D., Schneider, E.B. and Sundaram, C.P., 2013. Emerging trends in robotic pyeloplasty for the management of ureteropelvic junction obstruction in adults.The Journal of urology,189(4), pp.1352-1357. Coronel, C. and Morris, S., 2016.Database systems: design, implementation, management. Cengage Learning. Rybalchenko, A. and Steinebach, M., 2014, December. Towards a Process Model for Hash Functions in Digital Forensics. InDigital Forensics and Cyber Crime: Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers(Vol. 132, p. 170). Springer.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.