This website uses cookies to ensure you have the best experience. Learn more

The Identification And Analysis Of Information System In The Business Enterprise At Each Management Level, The Suitability Of Information System For The Chosen Firm, The Security Of The Information System And Suitability Of Cloud Computing.

3968 words - 16 pages

Untitled

ASSIGNMENT

Course: BABS Semester 02

Module: Information Systems & Technologies

TABLE OF CONTENTS

Sr. No.

Content/Topic

Pg. No

1.1

REPORT

INTRODUCTION:

In this modern time, it is impossible to run a business without any information system. Whether the business is small or large, information system is very much needed for the survival of the business. This report will deal with the identification and analysis of information system in the business enterprise at each management level, the suitability of information system for the chosen firm, the security of the information system and suitability of cloud computing.

What is an Information System?

According to Kenneth C. Lauden, "an information system is a set of interrelated components that collect, process, store and distribute information to support decision making, coordination and control in an organisation.

(Lauden, K C. pg 7)

Why Information systems are used?

For big firms like British Gas, British Telecom (BT) and British Electrical Company (BEC), it is very difficult to calculate manually the bills of customers every month or quarter. So they need an information system to do automatic calculations. This saves time and money. Information systems are not only useful for big companies but they also play a vital role for smaller companies.

(www.1)

LEVELS OF MANAGEMENT:

We have already discussed that information system is very much necessary for the survival of business. There are several levels of management, which are enlisted below:

Senior level/ Top level/ Administrative level

Middle level/ Executory

Low level/ Supervisory/ Operative/ First-line managers

The diagram on the next page shows the above levels of managers.

(www.2)

SELECTION OF BUSINESS ENTERPRISE:

The purpose of this report is to select a business enterprise like transportation, education, finance, health and many others. The business enterprise selected by me is Virgin Media. Virgin media is the first company in the UK that offers TV, broadband, phone and Mobile. Virgin media offers TV, broadband, phone and mobile phones services throughout the UK.

(www.3)

IDENTIFICATION OF BUSINESS PROCESSES:

As discussed before, Virgin Media provides services to people like phone, broadband TV and mobile phone. This is the business of the company.

One of the business is to be identified is when one person buys the deal of contract mobile phone from Virgin Media. The over-all process is illustrated in the diagram shown on next page.

...

Find Another Essay On the identification and analysis of information system in the business enterprise at each management level, the suitability of information system for the chosen firm, the security of the information system and suitability of cloud computing.

The Components of a Computer and Information Processing System

975 words - 4 pages The Components of a Computer and Information Processing System In today’s world, computers are everywhere. People use them in a wide range of ways in every aspect of life whether it is interacting with friends, cooking a meal, or transferring funds from one account to another. However, many people do not think about the many aspects of computing and the various devices and software that are part of the information process. Basics of the

Evaluate the contribution of Management Information System to Organisations

1507 words - 6 pages the rise of information economies, it have to improve the role of information systems in business and management. Software is the detailed instructions that control the operation of a computer system. Without software, computer hardware could not perform the tasks we associate with computers. The functions of software are to (1) manage the computer resources of the organisation (2) provide tools for human beings to take advantage of these

The Role Geofgraphic Information System

714 words - 3 pages THE ROLE OF GIS The geographic information system (GIS) incorporates software, hardware and data for capturing, observing, analysing, managing and displaying all varieties of geographically referenced information. With GIS, service providers are able to analyse, question, interpret, visualise and understand data that reveals trends, relationships and patterns through maps, charts and reports. This then enables service providers to make

Benefit Of Information System For Business

702 words - 3 pages information, they formulate strategy in ways that make management of enterprise and they use technology-mediated channels which are subject to measurement and tracking in unprecedented and granular ways. With those advantages, the company can gain a better position in the furious competition.Among the main advantages of the information system been used in the business are its ability to facilitate business activities with huge amount of information

Management of information system for libraries

1838 words - 7 pages issue. The book is covered with protective and transparent material.2. Issue of a book/journal/video cassette/CD:A book can be issued to only one user at a time. At the time of issue the Bar Code behind the book is read for relevant information about the book and its present status by using a Gun-Style Hand Held Bar Code Reader. The system automatically changes the status of the book to "issued" and also enters the due date in the system. Issue

Information Systems and the Organization of Modern Enterprise

4693 words - 19 pages , modern enterprise is undergoing major restructuring.In this short paper we briefly discuss the newly emerging organizational paradigms and their relationship to the prevailing trends in information technology (IT). We argue that IT is an important driver of this transformation. Finally, we place the studies selected for this special issue of the Journal of Organizational Computing within this context.1. Emerging Organizational Paradigms: Symptoms

An Integrated System Theory of Information Security Management

678 words - 3 pages based on authors are planning, forming consensus, organization, drafting, implementing and reviewing. 2.3 Risk management theory Planning and investigation are required to detect risk, threats and vulnerability of the information system. The result is to control and cover the level of the organization. 2.4 Control and auditing theory Information security management should recognize type of risk that can attack the information and protect

The Requirements for Developing and Managing a Comprehensive Management Information System

4238 words - 17 pages known and stable 9.     Overall Management Information Systems require a lengthy analysis and design process A FRAMEWORK FOR MIS EFFECTIVENESS Information systems are costly to purchase, deploy, and maintain. Therefore, in today’s business where business enterprise is operated for value maximization according to the theory of rational choice, it is natural to suppose that MIS offers economic value and that this value overcomes the costs

Chromatography: Validation, SOPS and System Suitability

1563 words - 6 pages that the reagents, columns and components are the proper conditions for the intended analysis at hand. It is generally run to verify the resolution, efficiency and precision of the instrument. With this information, the adequacy of the chromatographic instrument within the specific analysis can be ascertained.SST is generally performed at the beginning of the experimentation. This is done by running a set of known standards from the same prepared

The XYZ Ltd Booking Information System Website

1547 words - 7 pages - Security - Architecture and management - Meaning - Data quality (Ethan Jewett., 2014) Looked at these six challenges, SAP HANA is a monster in performance, it shares a fairly even ground with SAP BW on security and integration, But SAP BW still has an edge over HANA in terms of Architecture, Meaning and Data Quality, So looking at the current state of SAP BI and HANA one would say that both complement each other. (Ethan Jewett., 2014

Strengths and Weaknesses of the Ontological Argument - A Level - Information

1525 words - 7 pages everybody has a concept of God and therefore, God exists in the mind. However, for God to be the greater than anything conceivable, Anselm argues, that He must also exist in reality. However, the philosopher Gaunilo criticised Anselm’s argument; by using the same process in which Anselm moved from God’s definition to His existence, Gaunilo describes the ‘most perfect island’, which has to exist due to it’s perfection. If the Ontological Argument works

Similar Essays

Information Management In Industry: The Case Of Hitachi Transport System

713 words - 3 pages three basic activities: input, processing, and output. From Business point of view, an information system prove to be a solution to a problem or challenge facing a firm and provides real economic value to the business. INFORMATION MANAGEMENT IN HITACHI TRANSPORT SYSTEM (M) SDN BHD Hitachi Transport System (M) SDN BHD is one of the branches of main Headquarter in Japan called Hitachi Transport System, Ltd. Hitachi Transport System (M) is a

Information Security System: The Case Of Target Corp

1105 words - 5 pages respondents. It took up to 67.1% of all cases of cyber-attacks in the past ten years (Kroenke 315).The breach at Target Corp. occurred sometime before Thanksgivings 2013 when a group of European hackers installed malware in Target’s information security and payment system to “steal every credit card used at the company’s 1,797 U.S. stores (Riley, Elgin, Lawrence, and Matlack). For weeks, the invasion of malware went undetected because it escaped

Cloud Computing Virtualization – A Threat To Security Of The System

2040 words - 9 pages The main aim of this paper is to study the concept of cloud computing through virtualization, how security is compromised in cloud computing and how we can secure the system from security breach in case of virtualization. Keywords: cloud computing, Hypervisor, Virtual machine, Virtualization Security. 1. INTRODUCTION Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing

Information Technology And Expansion Of The European International System

2860 words - 11 pages information across time and space. This paper will analyze the role of IT in the expansion of the European international system. Specifically, the analysis will look at the effect of IT on international security and socio-economic development. Within the realm of international security, several concerns over the role of IT arise. First, what new risks are associated with the development of IT in terms of national security as well as international