logo

Assignment Management Information System

   

Added on  2020-06-06

13 Pages4141 Words61 Views
MANAGEMENT INFORMATION SYSTEM

Table of ContentsEXECUTIVE SUMMARY.............................................................................................................1INTRODUCTION...........................................................................................................................1Development of information security policies............................................................................2Analysis of information security with ethical and legal frameworks.........................................6Impact of technological changes on management of information system..................................8Management information system has helped to understand strength and limitation ofcompany. ..................................................................................................................................10CONCLUSION..............................................................................................................................10REFERENCES..............................................................................................................................11

EXECUTIVE SUMMARYManagement information system is a computerised database that has the informationsthat is collected from day to day operations of the company. This is a important functional unit ofan organisation and helps every other functional units in their performance. This helps to providefeedback to the managers about the companies products and policies in the market. For everyorganisation there is threat of data being stolen and vulnerability about issues that company facesin future. MIS has helped company in safeguarding against its legal, ethical, cultural and politicalissues. Policy development needs to be very clear in terms of assigning responsibilities of eachand every stakeholders. INTRODUCTIONManagement information system is a database generally computer based that has data andfinancial information organised in such a manner that it produces reports on operations andfunctionality of management at every levels (Laudon and et. al., 2012). It helps to give feedbackto managers on the performance of various organisational units. It is used to monitor wholecompany's operations. These data are collected from day to day activities of the organisationalfunctional units. These are very big database that can be used for making future plans and goalsof an organisation. With the increasing use of technological databases, it is easy to sort andmanage data and take out necessary informations as an when required. Preventing theseinformation by applying different approaches to security is essential so as to have competitiveedge over others. Companies like Volkswagen use this management system. This reporthighlights the development of information security policies and its importance in addressingpotential threats and vulnerabilities so as to ensure business continuity especially in the processof technological change (Van De Walle, Turoff and Hiltz, 2014). It also showcases the ways inwhich this system has fulfilled the queries of various stake holder and helped company inmaking its business plans according to legal, cultural and ethical issues.1

Development of information security policies.Information security policy is the prime requirement of every organisation. These policiesprovides the framework for addressing potential threats that can be encountered by the companyin the future business processes (Lee and Yu, 2012). These controls are effective in safeguardingagainst vulnerabilities that occur in day to day business operations. In the era of technologicalchanges companies are going through rigorous processes so as to implement these.Importance of information security can be understood by these points:Confidentiality: It helps organisation to protect all the necessary data by providingaccess only to those people who are authorised stake holders. Integrity: This security helps to safeguard accuracy of information as well as itsprocessing methods are also enhanced.Accountability: It helps in accounting of the actions by individuals. This can be done bymonitoring there activities.Information security needs a governance mechanism to ensure the ways in which securitypolicies will be implemented within an organisation. It also ensures the constant monitoring andimprovement for the used security systems. It will be governed by senior management team leadby information security manager. Main task of this group is to access and address security relatedissues on regular intervals, stating strategic guidance, checking of information security threatsand taking decisions to safeguard against these vulnerabilities (Romney and Steinbart, 2012).Information security policy for a company:Purpose and scope:Purpose of this policy is to set aims for management information system throughout thecompany. This policy ensures safe guarding against the vulnerabilities and threat that can hampercompanies future growth and business continuity. It is defined for the preservation ofconfidentiality, availability and integrity of information.Scope of this policy is to storing, transmitting and destruction of information in thebusiness process of the company. Hence it is applied to the conduct of employees, topmanagement, customers and other stake holders with access to that data. It can be locatedanywhere as well as systems, applications equipments and premises that creates, transmits,processes, stores or hosts information (it can be in house, can be personally owned or can begiven by external suppliers).2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment On Information Security (Docs)
|13
|2309
|96

Enterprise System And Information Technology
|16
|4283
|17

Cyber Security Analysis Report
|7
|1356
|51

Security and Risk Management in Information Systems: A Case Study of Amazon
|6
|1052
|212

Information Security: Vulnerabilities, Threats, and Controls
|14
|4132
|432

Information Security Management and Compliance
|8
|1683
|15