Thursday, December 12, 2019
Management Information System Studying
Question: Discuss about the Management Information System for Studying. Answer: Introduction The Information System is a part of the businesses that uses the information for performing several tasks such as, studying, storing, manipulating, transmitting and retrieving the data realted to the organization (Bakersville and Wood-Harper 2016). In the article by Nicolas Carr there has been mention about the development of the Information Technology in the business and it also displays the pattern of the IT industry at present in comparison to the earlier technologies. The author thinks that the IS does not have much of an effect on the business technologies. The terms related to the MIS and the IT have been described in this essay. All the questions that had arisen related to the article have been answered on the basis of quantitative and qualitative point of view (Laudon and Laudon 2013). In addition to this some basic Internet and web application concepts have also been provided in this essay. In addition to this the concepts of the database, data warehouse, and the object oriented concepts have also be described in the essay. In addition to this the System Development tools have also been described. In addition to this some ethical issues related to this and the computer crimes and the Digital Forensics have also been described in this essay. According to Nicolas Carr, the Information systems does not matter in the recent times in the organizational areas. Although it has emerged in the last few years and is affecting various aspects of life of the people. There are various types of Information Systems and the Management Information System is one of them (Schwalbe 2015). With the emergence of the Management Information System the businesses have been allotted various opportunities such securing the payment procedures, and availability of web based procedures for conducting the business procedures and also managing the businesses from remote location without actually being in the office. All the function for managing the business are done after conducting thorough decision making session in an organization. The MIS for an organization helps them to manage the performance of the timely and the reliable actions and also helps in forming reliable and a well-structured information system within the organization by collecting, disseminating and processing the decision makers in the organizations. The article has also provided the basic concepts of IT, computer system, software and hardware. According to Nicolas Carr the Management Information System is mainly designed for the businesses that very conscious about the cost incurred in the business. In addition to this there are many hardware and software components that form the Information System (Patterson and Hennesey 2013). The hardware and the software components are very essential for an organization to set up the Information System for the organization. The hardware components required for the implementation of the system are the basic components such as the input devices that is the mouse and keyboards and the output devices such as the monitors and the printers and the processing units such as the processor. In addition to this, there are some software components such as the operating system that is required for ruining the Information systems in the company very smoothly. In this the internet connection must be enable s within the organization and also the organization must possess an efficient networking system within the organization for the Management Information System to be efficient. According to the article by Nicolas Carr the Strategic implication of the MIS can be clearly stated. It can be divided into two sections, firstly the propriety and secondly the mid-1980s. In addition to this, there are various types of MIS which can be implemented within the structures of an organization (McKeen et al. 2013). Firstly, the process of the transaction system, is designed to handle the routine and the recurring transactions in a bulk. In addition to this, it is also used in the banks to record the deposits and the payments in the accounts of the customers. This is an efficiency oriented procedure and hence, there are no type of limitations for the boundaries of the procedure. Secondly, there are middle man managers in addition to this. The process is based on the flow of information internally, and it basically deals with the past and the present situations of the company rather than focus on the future of the company. The third type of MIS is the Decision support system . The system is an interactive system and are generally very useful for the managers. This system supports the semi structured decision of the organization and is basically based on predicting the future. According to the article by Nicolas Carr, the usage of the internet is making the human being dumber (Dorogovtsev and Mendes 2013). Although the internet is the most useful tool at this moment of time in the world. It can link all the hubs and the routers and all other interconnecting devices in the world with the help of several protocols. The World Wide Web is the platform which connects the interconnected networks throughout the world. The HTTP protocol is the protocol which helps in transferring the network throughout the network. The WWW is included in the within the HTTP. The URL or the uniform resource locator is one of the part of the internet and it is used to provide address to different destinations. These protocols work together to spread the information throughout the world. According to the article by Nicolas Carr, a proper warehouse environment is required by the storage of the data. The most important component of any organization is the database (Zhou et al. 2014). The essential part of an organization are the database, data warehouse and the data storage facilities. These are the tools that helps the organizations in making smarter decisions and taking the organization forward. In addition to this these tools help the organizations in recognizing the facts. In addition to this the cost of the company can also be reduced efficiently with the help of these tools. The revenue of the company can also be increased based on these results. According to the article of Nicolas Carr, the concept of the Object Oriented Programs are taken from the theory of Co-Ordination (Team 2015). The Technology has helped in revolutionizing the Software Industry. The technology involves the use of the Geographical Information System (GIS). The geographical objects consists of the tools that can be slide, dragged, toggled, pushed or dropped and clicked. This concepts can be implemented in any desktop. The desktop elements such as the files, application shortcuts and the recycle bin are included in this. The widgets are implemented in the desktop with help of these computer technologies. The language of the object oriented program allows the users to easily generate the codes just by drawing and constructing the flow charts and the logic of the programs. The most important factor of the technology is the property of encapsulation which can combine and hide the data that is required and show only the required information to the user so tha t the user ids able to perform the tasks without any difficulty. In addition to this, the language also provides several other feature to the user such as the polymorphism, abstraction and inheritance. According to the article by the author Nicolas Carr, the stature of the IT industry has decreased in the recent past (Baltzan and Phillips 2016). But, generally the Information system is very useful for any kind of organization. The combined raw data are successfully transformed into useful information by the MIS. It helps the organizations inn making useful decisions and act accordingly with the help of the facts. The MIS can help the organization in saving the time for gathering the knowledge that would help the organizations. According to the article by Nicolas Carr, there are several phases of the system development. The starting phase is followed by the other phases of the phases in the cycle of the development of the system (Gupta and Laxmi 2015). The first phase includes the planning phase of the system, where the project scope is set and the plan according to which the project is to be conducted is framed in this phase. After the planning phase the analysis phase of the project is started, which is involved with gathering the information and the requirements for the project. Thirdly, there is the analysis phase of the project where the analysis of the project is done weather it is working properly or not and also some analysis of the designing and the technicalities of the system is done. In addition to this there is the fourth phase where the testing of the system is done and the efficiency of the system is also checked in this phase. In addition to this the maintenance phase is conducted in the las t phase where, the system is set up and the maintenance of the system is done in this phase. There are various type of methodologies such as the rapid development of the applications and the extreme programming methods are also followed. In addition to this the waterfall model and the agile model are followed for constructing the project. In addition to this the tools that are used for the implementation of the system are sourcing, outsourcing and self-sourcing. According to the article by Nicolas Carr, there exists various types of business models (Cohen and Kietzmann 2014). The business models that are applicable in the e-commerce sector are the B2B or the Business to business model, the B2C or the Business to Consumer model, the C2C or the Consumer to Consumer model and the Consumer to Business model or C2B. In addition to this there are various other models such as Government to Business model or the G2B and the G2C model. According to the article by Nicolas Carr, the ethical issues might rise from a various kind of situation such as privacy or piracy (Slade and Prinsloo 2013). Various issues regarding the copyright, Intellectual Property and the copyright issues have come up in the past few years. The various types of issues that have come up are the access to data without proper authorization and misuse of this data. In addition to this uninformed intrusion into the systems also come under the ethical issues. In addition to this inability of the organization to provide data security to their clients also gives rise to the unethical situations. For the safety of the data and resolving the copyright issues the owner of the Intellectual Property need to obtain the patent or the copyright for their work so that their ideas cannot be stolen or copied without their authorization or recognition. According to the article by the author Nicolas Carr, the ethical issues and the rate of cybercrimes have increased with the increasing rate of the use of the Information Technology. The digital forensic policies are adopted to investigate the cases of the computer crimes that are taking place on the networks. In addition to this the digital forensics use several tools that could protect the data and also check the ownership of the data (Sang 2013). They would gather ownership details of a certain work and also check if the work s copied from any source or not and in addition to this they also check if some other work has been copied from the source or not. The suspects are identified with this methods and they also implement some methods to induce the crime from the suspects and catch the offender red handed. According to the article by Nicolas Carr, many types of the MIS have been explained. The emerging techniques of the MIS include the Big Data Analytics that generally refers to the collection and the analysis of organizational data (Zakir, Seymour and Berg 2015). The Big Data Analytics can be applied in the raw data maintenance and the data mining techniques in the Management Information System. In addition to this there are other techniques that are available for the MIS. The cloud computing is one of the major trends that help in the data mining techniques. In addition to this there are mobile computing techniques that enables the users to access the data remotely. The other techniques that exists are the Smart Machines. They can make the decisions by themselves and increase the efficiency of the company to a great extent. For conclusion it can be said that the Information System have had a steady development in the last few years and this has affected the various sectors of the human life. The essay provides the effect of the MIS on the organizations and various other information about the MIS within the report. There has been a rapid development in the MIS process with the use of efficient tools and in addition to this, the various methodologies that could be adopted for the MIS have also been mentioned in the report. In addition to the instances of various threats and their possible remedies have also been provided. References Baltzan, P. and Phillips, A., 2016.Business driven information systems. McGraw Hill Education. Baskerville, R.L. and Wood-Harper, A.T., 2016. A critical perspective on action research as a method for information systems research. InEnacting Research Methods in Information Systems: Volume 2(pp. 169-190). Springer International Publishing. Bhoola, K., Kruger, K., Peick, P., Pio, P. and Tshabalala, N.A., 2014. Big Data Analytics. InProceedings of The Actuarial Society of South Africas 2014 Convention(pp. 106-144). Dorogovtsev, S.N. and Mendes, J.F., 2013.Evolution of networks: From biological nets to the Internet and WWW. OUP Oxford. GUPTA, R.S. and LAXMI, V., 2015. Software Development Life Cycle (SDLC) Implementationin Information Technology Management.International Journal of Recent Advances in Information Technology Management,1(1). GUPTA, R.S. and LAXMI, V., 2015. Software Development Life Cycle (SDLC) Implementationin Information Technology Management.International Journal of Recent Advances in Information Technology Management,1(1). Kumar, G.B. and Bhatnagar, V., 2017. Big Data Analytics. Laudon, K.C. and Laudon, J.P., 2013. Management Information Systems 13e. McKeen, F., Alexandrovich, I., Berenzon, A., Rozas, C.V., Shafi, H., Shanbhogue, V. and Savagaonkar, U.R., 2013, June. Innovative instructions and software model for isolated execution. InHASP@ ISCA(p. 10). Patterson, D.A. and Hennessy, J.L., 2013.Computer organization and design: the hardware/software interface. Newnes. Sang, T., 2013, January. A log based approach to make digital forensics easier on cloud computing. InIntelligent System Design and Engineering Applications (ISDEA), 2013 Third International Conference on(pp. 91-94). IEEE. Schwalbe, K., 2015.Information technology project management. Cengage Learning. Slade, S. and Prinsloo, P., 2013. Learning analytics: Ethical issues and dilemmas.American Behavioral Scientist,57(10), pp.1510-1529. Team, S., 2015. Object-Oriented Programming. Zakir, J., Seymour, T. and Berg, K., 2015. Big data analytics.Issues in Information Systems,16(2), pp.81-90. Zhou, B., Lapedriza, A., Xiao, J., Torralba, A. and Oliva, A., 2014. Learning deep features for scene recognition using places database. InAdvances in neural information processing systems(pp. 487-495).
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.