StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Business Information Systems - Book Report/Review Example

Summary
The present review entitled "Business Information Systems" dwells on the main types of software that are used to process data to give information. As the text has it, this software includes proprietary, which is also called closed source software and the open source software. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
Business Information Systems
Read Text Preview

Extract of sample "Business Information Systems"

Business Information Systems In running of businesses, there are two main types of software that are used to process data to give information. These software include proprietary, which is also called closed source software and the open source software. One of the differences between them is that, proprietary software does not allow modification of data by other people apart from its administrators. Copyright software on the other hand does not allow other people to interfere with data kept. Proprietary software also, does not allow for distribution of data or use of the data freely. Those who use this software have limited access and passage of information to other people. This means that this software has security problems because in its making, some requirements for security are usually overlooked (Sosinsky, 2011 p.73). As opposed to proprietary software, open source software allows another person rather than the producer to distribute it without notification. Open source software develops at a high rate because users are allowed to make changes in it, in the course of its usage. This means that aspects of similar open source software may be different according the changes made on it by people to whom it is distributed. The copyright holder does not regulate the modification of the software by those who buy it. On the other hand, this is a different case for open source software. In using the two types of software, there are clear advantages that are associated with usage of open source despite its lower level of security. For example, open source software is relatively cheaper compared to proprietary software. This is the case because copyright holder allows redistribution to other people. Its ease to manipulate allows for addition of tools which can be used to keep various records. It has a generic interface that can be used to generate different information according to the need of the people (Luo, 2010 p. 143). Although open source software is most preferred, it has some disadvantages. One of them is that changes in configuration and coding can only be done by people who have a clear understanding of the business involved. Also another disadvantage is that it is not easy for small businesses to obtain and use because it require a lot of investment in guidance on usage (Sosinsky, 2011 p. 1346-1347). It is also viewed as having security issues. In this regard, therefore, Tesco Supermarket chain should consider using open source software as they introduce their e-learning. This is because apart from being cheap and flexible, it can be used to access very many people within a short time. In addition, open source software will allow addition of tools that can ensure a wide variety of information passage. In addition it is cost effective software. In terms of regulating information on computer systems, it would not be advisable to employ cloud computing. This may increase insecurity. This is because the system allows one in possession of software to make manipulation and configuration which will be felt by people in distant places. Cloud computing system allows people to seek assistance from a person in another place. This system allows a different person to make changes and distribute software without prior communication to copyright holder. Cloud based systems are different from the proprietary systems. The differences are seen in both administration and in terms of the amount of data that can be passed through such system. A cloud based system allows users to run different projects. In making the standardisation of data cloud computing performs better than proprietary system. This is because it offers services within a short time and in wide variety. Cloud based systems are used to reach to a larger population than would be the proprietary. This is because a single modification of a database from a data centre is realised by everyone who accesses it. Data is stored in such way that it can be accessed from different places in the world. This is because of the links created between the different software in a system. Such information also is easy to upgrade and give additions. According to Mondejar et al. (2013 p.375), this system reduces the cost of production. This is because fewer IT experts are employed to run the whole system. A disadvantage associated with this system is that there are hidden costs like compliancy regulations, back up, restore, disaster recovery and problem solving. It is also not flexible since it cannot be customized therefore, enhancing security. Data security is important to Tesco since it helps in protecting the reputation of the business and the brand. To acquire this, Tesco should encrypt any sensitive data whether in transit or in storage. Storing data as plain text attracts security breach (Langer, 2008 p. 123). The customers should be provided with the opportunity to create strong passwords and be encouraged to do so. Involving a vetted outside dealer with security and privacy expertise can aid to address any blind spot and it often makes the development more cost effectual and efficient than developing equal programmes internally (Bradley, 2007, p. 119). Today Tesco’s website and discovered passwords are not being sent in plain text anymore. If one wants to reset their password, is sent a link directing them to a page where they can get a new login (International Conference on Business Information Systems & Abramowicz, 2007, p. 13). The mobile business has a potential as the main business process will perhaps drive the evolution of enterprise mobile wireless technologies towards achieving excellence characteristics. Without underestimating the value of mobile technology, true business benefits will only be achieved if only the state of art technologies are applied within improved business process and rest on the basis of a sound technical structure that enhances security. According to the identified potential benefits, the process for complaint handling should be modernised in order to meet the needs of the customers with privacy (Bocij et al., 2006 p. 47). Usually a chief information officer (CIO) recommends the information technology a business will require to achieve its objectives and the works with a financial plan to realize the plan. He is concerned with analyzing and reworking active business processes, with recognizing and developing the ability to use new tools, with redesigning the business’s physical infrastructure and network contact, and identifying and developing the projects knowledge resources. He should make sure that the systems recommended suits the business even in terms of security. Many CIO heads the business efforts to incorporate the internet and the World Wide Web into both its lasting plan and its direct business plans (Luo, 2010 p. 87). The CIO should have strong business planning, operational management, conceptual and analytical skills. He should also demonstrate strong written and oral communication skills, negotiation skills with the ability to influence others towards educated sound judgement in decision making for the organization (Calder & Watkins, 2008 p. 77). The decisions made should not risk any information concerning the business or its customers. The CIO is important since he or she is responsible for the computer systems and information technology that supports business goals. Since information technology is important the CIO is the main contributor in formulating strategic goals of the enterprise. In case of any failure with the system he should be answerable. References Bocij, P., Chaffey, D., Hickie, S., & Greasley, A., 2006, Business information systems: technology, development and management for the e-business. Harlow, England, Financial Times/Prentice Hall. Bradley, T., 2007, PCI compliance implementing effective PCI data security standards. Burlington, Mass, Syngress. Calder, A., & Watkins, S, 2008, IT governance a manager's guide to data security and ISO 27001/ISO 27002. London, Kogan Page Ltd. International Conference on Business Information Systems, & Abramowicz, W., 2007, Business information systems 10th international conference, BIS 2007, Poznań, Poland, April 25-27, 2007. proceedings. New York, Springer. Langer, A. M., 2008, Analysis and design of information systems. London, Springer. Luo, Q., 2010, Advances in wireless networks and information systems. Berlin, Springer. http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=374194. Mondejar, R., Garcia-Lopez, P., Pairot, C., & Pamies-Juarez, L. , 2013, ‘CloudSNAP: A transparent infrastructure for decentralized web deployment using distributed interception.’ Future Generation Computer Systems, vol. 29 pp.370-380. Sosinsky, B. A., 2011, Cloud computing bible. Indianapolis, IN, Wiley Read More

CHECK THESE SAMPLES OF Business Information Systems

Business Information Systems of Bognor Marine Watercraft

The author examines information systems of Bognor Marine Watercraft and state that an IS is greatly relevant as it renders the company various avenues to reach out to the consumers as well as achieve benefits in all levels.... BMW requires modifying and adapting information systems for quality management.... These are categorized into five types, namely: office information systems, management information systems, transaction processing systems, expert systems, and decision support systems....
11 Pages (2750 words) Case Study

Variety of Business Information Systems

The paper "Variety of Business Information Systems" highlights that the primary disadvantage is the exposure of business logic and the formulas that are open for one to hack and use it for other sensitive purposes.... The stress is more on the variety of information required for getting the right attitude for the spreadsheet....
6 Pages (1500 words) Coursework

Business Information Systems and Education

The paper "Business Information Systems and Education" states that if the CPC School is to adapt the aforementioned recommendations taking into account all the relevant measures that they need to put in place so as to be competitive and survive in the education business.... here are no computer-based records or information systems to aid the CPS administration in their work therefore, still doing their work manually.... Connectivity in the systems and learning that is based on experience and practical learning makes the thinking capacity to be low as it confines the students to the theory (POLSET AL (2007)....
7 Pages (1750 words) Coursework

Business Information Systems of Lenovo Company

The paper 'Business Information Systems of Lenovo Company' is an excellent example of an information technology case study.... The paper 'Business Information Systems of Lenovo Company' is an excellent example of an information technology case study.... The paper 'Business Information Systems of Lenovo Company' is an excellent example of an information technology case study....
7 Pages (1750 words) Case Study

Knowledge Discovery for Business Information Systems

This paper "Knowledge Discovery for Business Information Systems" is going to look into CRISP and data modeling algorithms in the process of loan processing.... The paper "Knowledge Discovery for Business Information Systems" is a wonderful example of an assignment on information technology.... Moreover, these facts have to be based on factual information backed with evidence for proper decisions to be undertaken.... business intelligence informs organizations to make use of data mining in the process of analyzing different sets of data....
11 Pages (2750 words) Assignment

Introduction to Business Information Systems

The paper "Introduction to Business Information Systems" is a good example of a term paper on business.... The paper "Introduction to Business Information Systems" is a good example of a term paper on business.... ost successful business organizations have Business Intelligence (BI) as they implement enterprise systems such as Supply Chain Management (SCM), Customer Relationship Management (CRM), and Enterprise Resource Planning (ERP) and in their decision making processes....
13 Pages (3250 words) Term Paper

Business Information Systems - Cedar Hardware

The paper "Business Information Systems - Cedar Hardware " is an outstanding example of an information technology case study.... The paper "Business Information Systems - Cedar Hardware " is an outstanding example of an information technology case study.... The paper "Business Information Systems - Cedar Hardware " is an outstanding example of an information technology case study.... The business is looking forward to improving efficiency and increasing its market share through strategic expansion to five other cities and the installation of a new information system....
13 Pages (3250 words) Case Study

Introduction to Business Information Systems - CMP Ltd

The paper "Introduction to Business Information Systems - CMP Ltd " is an outstanding example of an information technology case study.... The paper "Introduction to Business Information Systems - CMP Ltd " is an outstanding example of an information technology case study.... The paper "Introduction to Business Information Systems - CMP Ltd " is an outstanding example of an information technology case study.... Hameed (2004) defines Business Intelligence (BI) as a set of methodologies and theories capable of handling large quantities of information and data to be used in decision-making by organizational managers....
10 Pages (2500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us