StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Systems in Business and Challenges - Essay Example

Cite this document
Summary
From the paper "Information Systems in Business and Challenges" it is clear that the contemporary world has seen the advent of computers and new technology products. These products are influential for the storage of user information for safekeeping and simplicity…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.8% of users find it useful
Information Systems in Business and Challenges
Read Text Preview

Extract of sample "Information Systems in Business and Challenges"

?Information Systems in Business and Challenges XXXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX The contemporary world has seen the advent of computers and new technology products. These products are influential for the storage of user information for safekeeping and simplicity. The fact that many people feed information ranging from general to public has been a major issue of concern. It is important to have databases having privileged information in order to manage the various transactions that people carry out and consequently avoid fraud and also take care of the individual’s accounts in case they become victims of hacking. Data warehouses on the other hand give certain personnel the ability to review the operations of people using their data transmitters. The private sector is a sector that has a lot of funds from the fact that the proprietors and the board members of these companies get their capital from their long periods of existence in the various fields. It is important for these people to work hand in hand with public organizations to ensure that they offer their assistance with regard to information and data improvement in the information systems field. These personnel ought to have the qualifications and ethical stature required for this responsibility and with an increase in under-qualified people, civilians feel threatened by the ware houses which is understandable (Ross, 2011, 62). One way through which private enterprises make it far is through their highly efficient and developed data warehouses. Data Warehouses are very important in the running of business. It is important to understand that the private sector can assist the public sector with human resource in this as they have the ability to hire highly educated and experienced technicians with regard to the systems (Bouwman, 2008). Depending on the type of business that one intends to run, there are various sources that the data warehouse can get its data (Brown, 2011, 89). The type of business to major in this case is an alcohol manufacturing company. An example of a source is the Bureau of Labor and Statistics. This is an organization that majors in the identification of the labor market and the various traits that it exhibits. This is with regard to the notion that the area bears with regards to alcohol. Another example is the Census bureau of the location where one identifies the types of people in the area in an effort to recognize the market intended. The type of people in the location might be young mothers and children which definitely offsets any plans of having huge profits in the alcohol industry. The assumptions to be made when introducing such a company is ensuring that the people in the industry are free drinkers and do not have a specific drinking time. This can come in as a vital factor in ensuring that even more sources due to a wider net of information availability. The best decision support applications that can be incorporated in the running of the alcohol business is by cloud computing. There are different kinds of cloud computing and the incorporation of all of them in the company leads to a well established data warehouse. Applications that are cloud based are not easily acquired and thus the importance of getting a security system in the warehouse that can only enable several people to access the cloud (Resich, 2009, 46). The system is complex and yet easy to use. This is from the fact that these web based applications concerning the cloud can be accessed through various simple means. One of these is the use of websites whereby the business owner even at his home, if he has the expertise and understanding of the security system in the industry can manage to acquire all the information that he needs from the comfort of his workplace office or even at his home. The stated system comes in handy from the fact that the alcohol business has no limits and given the previous assumption that the business is free, people are always busy purchasing alcohol and the cloud application’s easy accessibility ensures that the security management is always aware of the purchasing habits of customers and the business data accumulation. Data mining is easily applicable in this type of business. This is from the fact that there are very many types of alcoholic beverages divided by either the make or the manufacture and they all come in large amounts. Data mining ensures that the different set of data accumulated from the systems per brand or type of alcohol purchased is corrected and analyzed. After this, the mining sums up all the information regarding the statistics of the people that purchased a certain brand of alcohol provided, with machine learning and then breaks this down to information that one can easily understand ensuring that everything is accounted for and consequently ensuring the profitability of the company. One challenge as presented in the module is through cloud hacking. Many computer based companies have ECM software that ensures that their customer companies have an efficient way of storing their information (Zureny, 2009, 135). An example is the Microsoft Corporation. This is one of the greatest computer manufactures and has the credibility that many companies formed after it only seek but cannot attain. Its market leadership has seen it develop a great deal of systems that have different software that assist the people that they serve. Known software is the firewall drives that they install in all their computers. This ensures that their computers are not subject to the high amount of hacking that the contemporary environment has. With the revolution in the computer industry, systems are getting more complex by the day and thus the necessity of the company to produce this firewall that prevents any type of encoded hacking. Another company that has come up with such software though of a different purpose is Adobe. Adobe is known for having ways through which it can update files that are very old through the automatic updater and also their adobe plug ins that enable one to have video calls. This is important in that it ensures that people are managed in an even better manner. If an employee has issues regarding data that had been stored as early as 10yrs ago, the software has the ability to search and recover the file in an updated format. Regarding their plug-ins, this has revolutionized business in that there is the ability of companies with different branches or even business partners to communicate visually with each other over varying geographical locations. These plug-in have assisted businesses all around the world and with a venture such as the alcohol industry, there is the communication between breweries and wholesale industries and even foster supply chain relations. A structured approach to an information system is very important and is advantageous from the fact that it has the ability to ensure that the amount of data and processes reviewed are done so in a proper more efficient manner. The system is also recognized to be faster and this is completely different from the previous ad-hoc method that companies used. This change in technology has come in vital for large businesses that used to suffer a great deal of losses prior to the inception of the mow internationally recognized SSADM method (Daniels, 2008, 171). In the contemporary world, even small businesses have started using this method which has assured them of great success in terms of expansion and management. There are three major methods through which a systems analyst can use in the identification of the problems in a system. One of the methods is the Logic Data modeling. This one is important in that it identifies the various issues that revolve the data entrance. This is one of the most important stages in a data warehouse because it is from this that one has the ability to determine the problems associated with the source or the internal systems management. This comes in as a great advantage in terms of fault finding. However, the disadvantage of this modeling analysis method is the fact that it is expensive and consumes a lot of time. Another method incorporated is the Data flow management. Through this method, the analyst has the ability to oversee the flow of data within the system. The advantage of this method is the fact that it is simple and can be carried out from one control room or even one machine. However, the disadvantage comes in from the fact that it does not look at all the data coming into the system. A large amount of data might be lost while carrying out this task and thus the importance of ensuring that there is always a backup plan in place. The most common technique that a data analyst uses in an effort to get information from the systems is that of using a chart and a diagram simultaneously. Charts are important in that they show the manner in which the various data servers are arranged. This simplifies his work in that he has the ability to show and understand the working of each of the sub-systems. However, this alone is not sufficient and there is the incorporation of flow diagrams that come in sufficiently enough to show the many in which data flows within the system (Woods, 2012, 70). All this is important in that they can manage to show the various weaknesses in the system and consequently have it corrected in time. There are different kinds of information systems that are present in the contemporary world. It is basic importance that companies dwell in hiring the younger more advanced generation in terms of information systems. This is from the fact that without information systems, it is difficult for any business, however simple, to survive. Incorporation of various design models in terms of databases comes in as another key factor with regard to the working of these systems. Understanding all this is key in information and technology for both the contemporary time and the future. Another challenge involves the supply chain as some of the people installing information systems may leak the information to the entire supply chain of the public organization. There are many risks that come from leakage as from the module. Occurrence of risks is one of the leading causes of business failure over the past few years. This is happens because of the poor management of the risks by the responsible teams. Managing risk in supply chain management is very vital for the success of any company from the fact that in the unfortunate case of one of the risks occurring, all levels of the supply chain are affected, regardless of the point at which the product was during the risk occurrence (Conroe, 2008, 63). It is thus the duty of every player in the chain to ensure that recognition and evaluation of all risks takes place in an effort to put into place the important strategies to evade the risk. The research aims at showing the different levels of a supply chain and indulge deeply in the risks that each of the level managers go through. Moreover, there ought to be the identification of the two key classes of supply chain risks for the purpose of risk assessment. I chose management of risks in supply chain because I have had various experiences where companies languish from the amount of ignorance portrayed by their administration. An example of this is the BP case where there was the loss of a lot of the company’s credit from the oil spill that happened having the company in a recession for a few months (Adams, 2011, 473). The ignorance is mostly in terms of recognizing the source of the risks. Many are cases when companies fail due to the fact that the management thinks that the problem is a minor one and does not have much weight. However, I seek to change this notion in an effort to make people understand that each part of the chain has a role to play in either the success or the failure of the commodity they seek to establish. It all depends on the type of risk management. The issue at hand has had people always take risk management classes in an effort to solve the various arising matters that may have the company in a position to have a risk occurring. Research has shown that companies that do not take the steps end up regretting and consequently having a poor reputation due to customer dissatisfaction. Gaps in the research are in that it has been impossible to find cases that show immediate resolution of a risk taking place unlike the many present cases of risk occurrence in the managing of information systems. References Daniels, V. 2008. Information Systems in Business. London: Oxford University Press. Resich, B. 2009. Cloud Computing. New York: Cengage Learning. Brown, D. 2011. Data Sources for Data Warehousing. Chicago: Chicago University Press. http://infogoal.com/datawarehousing/data_sources.htm Zureny, C. 2009. Information Technology. New York: McGraw Hill Publishers. Woods, M. 2012. Contemporary Business Building: A Guide. New York: Palgrave Macmillan. Ross, F. 2011. Developmental Technology. New York: Cengage Learning. Adams, R. 2010. Oil Extraction, Journal of Environmental Psychology. 8 (73), 467-481. Conrow, E. 2008. Effective Risk Management. London: Oxford University Press. Bouwman H. et al (2008) Information & Communication Technology in Organizations, SAGE Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Discuss the challenges from the introduction and implementation of Essay”, n.d.)
Discuss the challenges from the introduction and implementation of Essay. Retrieved from https://studentshare.org/systems-science/1496127-discuss-the-challenges-from-the-introduction-and
(Discuss the Challenges from the Introduction and Implementation of Essay)
Discuss the Challenges from the Introduction and Implementation of Essay. https://studentshare.org/systems-science/1496127-discuss-the-challenges-from-the-introduction-and.
“Discuss the Challenges from the Introduction and Implementation of Essay”, n.d. https://studentshare.org/systems-science/1496127-discuss-the-challenges-from-the-introduction-and.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Systems in Business and Challenges

Use of Information Technology to Support the Drive E-Business in Organizations

Therefore, it is important for organizational managers to identify these challenges and overcome them so that the advantages of applying information systems in business processes are achieved.... Information systems and their incorporation in business functions enhance business activities.... Challenges in the integration of new information systems into business processes and information needs of an organization are inevitable.... Through e-commerce for example, web based information systems are able to increase efficiency and effectiveness in transactions, communication, collaboration and information sharing within the supply chain....
16 Pages (4000 words) Research Paper

Enterprise Resource Planning Systems

PeopleSoft is among the leading ERP systems designed to provide comprehensive business and industrial solutions to organisations who desire better management.... The software infrastructure also presents an opportunity for the business to sustain a competitive advantage in the evolving world of information technology in business.... However, there are challenges associated with the acquisition and maintenance of enterprise resource planning systems....
3 Pages (750 words) Essay

Recommendation for E-Business Systems and Enterprise Business System

The paper "Recommendation for E-business Systems and Enterprise business System" discusses that adoption of the latest technology is a guarantee of success to any business.... Generally, the Internet has allowed companies to venture into e-business, where they save a lot in terms of advertising while at the same time reaching out to customers from all ends of the globe.... The use of mobile devices comprising of mobile phones, tablets, and laptops has boosted e-business in a big way....
8 Pages (2000 words) Essay

Subject: Managment Information System

The implementation of the information system faces problems and challenges in its implementation into various organization.... usiness intelligence (BI) is a core contemporary trend in business information management.... The business intelligence plays a role in business organization development.... business intelligence has become the mainstay of information management in the contemporary world.... Most of the organizations integrates and implements different business intelligence tools and techniques in....
12 Pages (3000 words) Research Paper

Business Information Systems

alsmeer Flower Auction (AFA) has been successfully operating its business through a successful supply chain system in which auction plays mediating role among wholesalers, retailers, exporters, and importers but recently, emergence of electronically driven flower markets and e-commerce, changing consumer and retailer tastes regarding fresher goods and recent trends of merger and acquisition among retailers are some of the changes in the market and challenges faced by Aalsmeer (Khosrowpour....
16 Pages (4000 words) Research Paper

Information Security Challenges and Technologies

This coursework "Information Security challenges and Technologies" describes some of the major information security issues.... This paper presents an overview of information security, information security challenges, and the latest techniques to deal with these challenges.... This paper is the first assignment that is given to me by Secretary Napolitano to provide her with a briefing regarding the challenges of securing information, identifies the next-generation techniques and tools for avoidance....
6 Pages (1500 words) Coursework

Information System Evaluation

o evaluating information systems, some consideration has to be put on the components of the information system.... (1988) Points out that, there are different contemporary approaches in evaluating information systems, some of these approaches consist, the formal- rational model and interpretative approach which deals with quantitative measures and the likely or achieved cost/benefit.... he importance associated with IS is in line with supporting business activities as well as management decisions....
12 Pages (3000 words) Case Study

Information Systems Theory - Foundations of Business Computing

The paper "information systems Theory - Foundations of Business Computing" tells that information technology can be deemed to lie under information systems, since they focus on the technology involved in systems and an example is an information system such as Facebook.... While information systems are a broad field that refers to systems specifically designed to store, manipulate, disseminate, or create information.... Due to the technology advancements, organizations are opting to out-source business activities due to reasons such as reducing or controlling expenses a simple example would be doing away with staff salaries would have been paid if the activities were done locally, they are also out to free up some internal resources such as rooms that would have been occupied by staff, internet charges and maybe seats....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us