Creating and managing digital systems: Vulnerability and dependency in the context of the information system
VerifiedAdded on 2023/06/18
|14
|4519
|123
AI Summary
This report discusses the vulnerability and dependency of information systems and how to protect individual privacy and intellectual property rights in the digital business environment. It covers tools and techniques for data privacy and IP protection, including informed consent, legislation, industry self-regulation, and technological tools. The report also provides ways to maintain intellectual property rights, such as arranging evidence while innovating and creating awareness among employees about IP rights.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Creating and managing digital
systems
systems
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
INTRODUCTION...........................................................................................................................3
Vulnerability and dependency in the context of the information system.............................3
Protection of individual and Intellectual Property challenged by Internet:........................4
Tools that help in protection of Individual privacy of internet users..................................6
Ways that Protect Intellectual Property Rights:....................................................................8
CONCLUSION..............................................................................................................................12
REFERENCES................................................................................................................................1
INTRODUCTION...........................................................................................................................3
Vulnerability and dependency in the context of the information system.............................3
Protection of individual and Intellectual Property challenged by Internet:........................4
Tools that help in protection of Individual privacy of internet users..................................6
Ways that Protect Intellectual Property Rights:....................................................................8
CONCLUSION..............................................................................................................................12
REFERENCES................................................................................................................................1
INTRODUCTION
Crown Digital Systems Ltd. is a new company dealing in enterprise business and
contemporary digital innovations sector. The company deals in digitalization so it takes the
privacy and information systems of its clients very seriously. The internet technology and the
contemporary Information System technology can challenge traditional systems for protection of
data privacy. Some of the websites are not strong and does not send consent for data usage. This
report will discuss the vulnerability and dependency of IS and how this security is challenged by
the internet. It will discuss the tools that can be used for protecting IP and privacy of internet
users.
Vulnerability and dependency in the context of the information system
Information system:
It is a formal and organizational system that is used for collection, processing, storing and
distribution of information. It will act as a base that will lead to deliver the information to the
concerned person along with assistance in decision-making (Azmi and Sri 2020).
In the words of Vysotska and et al., (2019) information system includes the use of
internet technology that will assist the companies to make interaction and perform e-commerce
transaction between the customers and suppliers.
With the changing technology and its raising use, use of information system with the
context of companies including CDS-Ltd is common nowadays. This is also common as per the
meeting of trend of digitalization. On the one hand it enables the company to be well aware and
inculcate internet connection and at the same side it also makes them vulnerable and depended
on over them. This can be understood with an example that before the use of information system
every transaction is being performed by human capital but with the use of information system in
the working practice of the company along with its advantage of reduction of human errors and
raising of efficiency companies now become more depended on them. This means that along
with enabling advantages to CDS-Ltd with respect to information system, the level of
dependency and the vulnerability has increased and now the situation is like that no company
including CDS-Ltd can survive with internet connectivity and the information system in their
operation.
Likewise, it can also be understood that along with delivering the advantages and positive
aspect with respect to the information system in the context of the companies, the CDS-Ltd are
Crown Digital Systems Ltd. is a new company dealing in enterprise business and
contemporary digital innovations sector. The company deals in digitalization so it takes the
privacy and information systems of its clients very seriously. The internet technology and the
contemporary Information System technology can challenge traditional systems for protection of
data privacy. Some of the websites are not strong and does not send consent for data usage. This
report will discuss the vulnerability and dependency of IS and how this security is challenged by
the internet. It will discuss the tools that can be used for protecting IP and privacy of internet
users.
Vulnerability and dependency in the context of the information system
Information system:
It is a formal and organizational system that is used for collection, processing, storing and
distribution of information. It will act as a base that will lead to deliver the information to the
concerned person along with assistance in decision-making (Azmi and Sri 2020).
In the words of Vysotska and et al., (2019) information system includes the use of
internet technology that will assist the companies to make interaction and perform e-commerce
transaction between the customers and suppliers.
With the changing technology and its raising use, use of information system with the
context of companies including CDS-Ltd is common nowadays. This is also common as per the
meeting of trend of digitalization. On the one hand it enables the company to be well aware and
inculcate internet connection and at the same side it also makes them vulnerable and depended
on over them. This can be understood with an example that before the use of information system
every transaction is being performed by human capital but with the use of information system in
the working practice of the company along with its advantage of reduction of human errors and
raising of efficiency companies now become more depended on them. This means that along
with enabling advantages to CDS-Ltd with respect to information system, the level of
dependency and the vulnerability has increased and now the situation is like that no company
including CDS-Ltd can survive with internet connectivity and the information system in their
operation.
Likewise, it can also be understood that along with delivering the advantages and positive
aspect with respect to the information system in the context of the companies, the CDS-Ltd are
now become habitual with the use of information system. This is clear from the example that
with the use and inculcation of the media for the purpose of sharing of information, it now
became very easy for the companies to make share of information (Mir and Quadri, 2017).
Likewise, storage of bulk of information is also easy under the concept of information system.
This means that the dependency rate of the companies considering CDS-Ltd in the context of
information system has raised.
Likewise, the use and exposure of the information system has also raised the vulnerability
of the company. This is because with the use of information system there has increased risk of
threats, data loose, leak of confidential information of customers, generalization of bank and
private information and various others. This will lad to raise the vulnerability among the
companies with the use of the information system along with enabling and grabbing its
advantages.
This clearly means that the use of information system enable and deliver various
advantages with respect to companies together with CDS-Ltd in terms of raising their efficiency
and enhancing their performance. But at the same time along with raising use of information
system, companies have now started dependending upon information system and as a result their
work in the long run is being affected. Like, being a system generated outcome is far away from
the human capital and their contribution and it would also not be wrong to said that this has
raised the employees dissatisfaction and motivation which would again affect the company in
turns of raising turnover. Thus, it is again wrong from this perspective too (Wang and et al.,
2020).
Likewise, with a greater use of information system and increased rate of cyber crimes, the
percentage of vulnerability with reference to companies has also increased which also puts a
major and adverse impact towards the company's brand image and its reputation in the
competitive market.
Hence, it can right to said that although the use of information system has raised the
efficiency and company's performance but at the same time it has also affected it in the form of
raising dependency and vulnerability.
Protection of individual and Intellectual Property challenged by Internet:
Internet allows the people to imitate and copy contents and display that on their sites to
make money, which creates a big challenge for the protection of IP rights of an organisation.
with the use and inculcation of the media for the purpose of sharing of information, it now
became very easy for the companies to make share of information (Mir and Quadri, 2017).
Likewise, storage of bulk of information is also easy under the concept of information system.
This means that the dependency rate of the companies considering CDS-Ltd in the context of
information system has raised.
Likewise, the use and exposure of the information system has also raised the vulnerability
of the company. This is because with the use of information system there has increased risk of
threats, data loose, leak of confidential information of customers, generalization of bank and
private information and various others. This will lad to raise the vulnerability among the
companies with the use of the information system along with enabling and grabbing its
advantages.
This clearly means that the use of information system enable and deliver various
advantages with respect to companies together with CDS-Ltd in terms of raising their efficiency
and enhancing their performance. But at the same time along with raising use of information
system, companies have now started dependending upon information system and as a result their
work in the long run is being affected. Like, being a system generated outcome is far away from
the human capital and their contribution and it would also not be wrong to said that this has
raised the employees dissatisfaction and motivation which would again affect the company in
turns of raising turnover. Thus, it is again wrong from this perspective too (Wang and et al.,
2020).
Likewise, with a greater use of information system and increased rate of cyber crimes, the
percentage of vulnerability with reference to companies has also increased which also puts a
major and adverse impact towards the company's brand image and its reputation in the
competitive market.
Hence, it can right to said that although the use of information system has raised the
efficiency and company's performance but at the same time it has also affected it in the form of
raising dependency and vulnerability.
Protection of individual and Intellectual Property challenged by Internet:
Internet allows the people to imitate and copy contents and display that on their sites to
make money, which creates a big challenge for the protection of IP rights of an organisation.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Internet is open platform for all and it becomes very easy for the hackers to get access to various
sites very easily (Bican, Guderian and Ringbeck, 2017). CDS-Ltd is involved in digital business
which puts it at higher risks including
Failure of Technical protection:
It is to be noted that there are many softwares that provide protection to the IP rights of
the owners but with the evolving technology the previous versions of these softwares
become less secure. With the defeat of these security systems, it attracts the interest of
more population.
Technology can only provide methods through which IP rights can be protected. It does
not put an end to those practices. It can not provide security to all the external forces like
social, legal and economical elements of the society.
Different IP need different security and not all the technologies are compatible with all
the IPs.
Technology softwares are also subjected to create errors.
Technological protections created within a specific special purpose device are usually
incompatible with the general purpose PCs on which the program is to be used.
The technical protection systems are considered as much more difficult to implement in
information services and open organisations.
Threat of Digital business environment: With the rapid changes in external environment the
companies are adopting new ways to compete with those changes (Sestino, A. and et al, 2020).
One of the major recent change in market trend is introduction of digitalization in business.
CDS-Ltd is in one of them. This means all the business and its activities are to be done through
the internet and digital platforms.
In the large companies, all the data is circulated among all the employees. This includes
sales data, customer records, supply chain information and pricing data. This causes
potential IP risk to the cyber security of the firm.
With the complex framework of digitalization, it becomes difficult for the companies to
individually own all the IP required for manufacturing of the digital devices. In order to
take all the rights the companies will have to create Sign-In Licence contracts prior the
product launch.
sites very easily (Bican, Guderian and Ringbeck, 2017). CDS-Ltd is involved in digital business
which puts it at higher risks including
Failure of Technical protection:
It is to be noted that there are many softwares that provide protection to the IP rights of
the owners but with the evolving technology the previous versions of these softwares
become less secure. With the defeat of these security systems, it attracts the interest of
more population.
Technology can only provide methods through which IP rights can be protected. It does
not put an end to those practices. It can not provide security to all the external forces like
social, legal and economical elements of the society.
Different IP need different security and not all the technologies are compatible with all
the IPs.
Technology softwares are also subjected to create errors.
Technological protections created within a specific special purpose device are usually
incompatible with the general purpose PCs on which the program is to be used.
The technical protection systems are considered as much more difficult to implement in
information services and open organisations.
Threat of Digital business environment: With the rapid changes in external environment the
companies are adopting new ways to compete with those changes (Sestino, A. and et al, 2020).
One of the major recent change in market trend is introduction of digitalization in business.
CDS-Ltd is in one of them. This means all the business and its activities are to be done through
the internet and digital platforms.
In the large companies, all the data is circulated among all the employees. This includes
sales data, customer records, supply chain information and pricing data. This causes
potential IP risk to the cyber security of the firm.
With the complex framework of digitalization, it becomes difficult for the companies to
individually own all the IP required for manufacturing of the digital devices. In order to
take all the rights the companies will have to create Sign-In Licence contracts prior the
product launch.
Although companies uses their own internal softwares build into their digital products
from within the companies, but sometimes it uses free softwares for various activities.
Companies might not realize that these softwares are open to all the community and can
therefore are accessible by all. There a lot of trade secrets that the companies cannot disclose to the outer people of the
company. For managing those trading secrets the companies have to be very precise in
identification, organisation, enforcing and protecting its data separately.
Botnet attacks: A botnet refers to a collection of devices that are connected to internet but are
infected by some malware. That malware gives access to hackers to control those devices. The
hackers uses various kinds of softwares viruses to attack a computer security system before they
implement control and commands softwares. This enables them to carry out these activities on a
large scale (Fabiano, 2017). Sometimes they sell the access to other hackers for money. Then the
other hackers uses these networks to carry out their malicious activities like spam campaign.
These attacks can affect the organisation
By slowing down the working or performance of several devices at one time.
Botnet attacks also gives the control to hackers to steal the important data of the company
and provide it to the rivals.
They cause huge internet bills to the company.
Sometimes botnet attacks can cause legal implications to the company by carrying out
illegal and malicious activities.
These can include IP theft, Property trespass, hiring away employees, cyber attacks and
wiretapping on competitors.
The most common targets of industrial espionage are Trade secrets, client information,
financial information, R&D information and marketing information a company.
Tools that help in protection of Individual privacy of internet users.
There are a number of tools and techniques that helps CDS-Ltd and other companies in
protection of their privacy on the internet
Informed consent: Many counties have formed laws that insist the users to ask for consent first
and then use the data. This enables the individuals and the companies to track or monitor granted
data usage. It also helps them to maintain certain controls over their private information and data
and also enables them to revoke the usage at any time. It creates a clarity of what data and how,
from within the companies, but sometimes it uses free softwares for various activities.
Companies might not realize that these softwares are open to all the community and can
therefore are accessible by all. There a lot of trade secrets that the companies cannot disclose to the outer people of the
company. For managing those trading secrets the companies have to be very precise in
identification, organisation, enforcing and protecting its data separately.
Botnet attacks: A botnet refers to a collection of devices that are connected to internet but are
infected by some malware. That malware gives access to hackers to control those devices. The
hackers uses various kinds of softwares viruses to attack a computer security system before they
implement control and commands softwares. This enables them to carry out these activities on a
large scale (Fabiano, 2017). Sometimes they sell the access to other hackers for money. Then the
other hackers uses these networks to carry out their malicious activities like spam campaign.
These attacks can affect the organisation
By slowing down the working or performance of several devices at one time.
Botnet attacks also gives the control to hackers to steal the important data of the company
and provide it to the rivals.
They cause huge internet bills to the company.
Sometimes botnet attacks can cause legal implications to the company by carrying out
illegal and malicious activities.
These can include IP theft, Property trespass, hiring away employees, cyber attacks and
wiretapping on competitors.
The most common targets of industrial espionage are Trade secrets, client information,
financial information, R&D information and marketing information a company.
Tools that help in protection of Individual privacy of internet users.
There are a number of tools and techniques that helps CDS-Ltd and other companies in
protection of their privacy on the internet
Informed consent: Many counties have formed laws that insist the users to ask for consent first
and then use the data. This enables the individuals and the companies to track or monitor granted
data usage. It also helps them to maintain certain controls over their private information and data
and also enables them to revoke the usage at any time. It creates a clarity of what data and how,
it is collected, stored processed, used and transferred to other companies. It also helps the
organizations to comply with their framework and guidelines (Lazariuc, 2021).
Legislation: The government has formulated The Data Privacy Act, 2018. The Act protects the
user from offences that include using or obtaining personal data without any prior consent,
storing and maintaining that data collected knowingly or unknowingly, without the consent of
controlled user. Anyone using personal data must consider
The information must be legal, transparent and is used fairly for some specific purpose.
The purpose of which must be relevant, accurate and limited for the necessity only.
The information must not be stores for more than the necessary time period.
It is kept updated whenever necessary. It must be handled in an appropriate way that ensures the security and protection against
illegal and unauthorized processing and as well as protection against loss, damage or
destructions of data (Krausová).
Industry self regulation:It is a process in which the industries or the companies can protect,
control and monitor their own operations related to data privacy rather than hiring a third party
like agency or government to monitor or enforce such laws. Industry can maintain its standards
and operations by successfully implementing self regulating. This will also cut the cost of
external enforcement installation. If the company is successful in keeping their internal errors
from public, it can repair those damages from becoming public. Industry self regulations
generate conflicts because the companies can easily hide or erase the unethical practices or
behaviours rather than eliminating or correcting them.
Technological tools: Technological tools that can be used by CDS-Ltd for protection of their
privacy on internet are Data access governance: In this platform the company or the individuals can provide
clarity on which data is sensitive and also allows the organizations to manage access
permissions of the same. Data privacy solutions: There a lot of platforms that helps the individuals and the
organizations to manage their privacy processes which support privacy by their design
and requirements and also initiate audits in workflow (Abi Sen and et al., 2018). Proteus-
Cyber is one of them.
organizations to comply with their framework and guidelines (Lazariuc, 2021).
Legislation: The government has formulated The Data Privacy Act, 2018. The Act protects the
user from offences that include using or obtaining personal data without any prior consent,
storing and maintaining that data collected knowingly or unknowingly, without the consent of
controlled user. Anyone using personal data must consider
The information must be legal, transparent and is used fairly for some specific purpose.
The purpose of which must be relevant, accurate and limited for the necessity only.
The information must not be stores for more than the necessary time period.
It is kept updated whenever necessary. It must be handled in an appropriate way that ensures the security and protection against
illegal and unauthorized processing and as well as protection against loss, damage or
destructions of data (Krausová).
Industry self regulation:It is a process in which the industries or the companies can protect,
control and monitor their own operations related to data privacy rather than hiring a third party
like agency or government to monitor or enforce such laws. Industry can maintain its standards
and operations by successfully implementing self regulating. This will also cut the cost of
external enforcement installation. If the company is successful in keeping their internal errors
from public, it can repair those damages from becoming public. Industry self regulations
generate conflicts because the companies can easily hide or erase the unethical practices or
behaviours rather than eliminating or correcting them.
Technological tools: Technological tools that can be used by CDS-Ltd for protection of their
privacy on internet are Data access governance: In this platform the company or the individuals can provide
clarity on which data is sensitive and also allows the organizations to manage access
permissions of the same. Data privacy solutions: There a lot of platforms that helps the individuals and the
organizations to manage their privacy processes which support privacy by their design
and requirements and also initiate audits in workflow (Abi Sen and et al., 2018). Proteus-
Cyber is one of them.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Consent data management: This includes the management of the consent of the
employees and the customers with implementing certain rights of the data shared. It
allows them to identify, search, and control personal data as per the necessities. TrustArc
in one of them.
Ways that Protect Intellectual Property Rights:
Intellectual properties are considered as a portrayal of intangible things/properties like
copyrights, trade marks, unique ideas and patents. According to the rules, these properties have
equal legal protection as the tangible properties have. They are created through innovative
thinking and unique ideas. Intellectual properties are considered as assets of the organization that
is why they require protection (Pravalikha, 2017). They creates a distinguish image of the
company. The ways through which a person or business can maintain its Intellectual Property
Rights are
1. Arranging evidence while innovating: Intellectual properties are the most important
asset (intangible) that any company can have. They can be used for formulating
competitive advantages over the competitors. With the increasing competition and
Digitization, the innovation and idea leaks have became very common. There are many
cases where a competitor leaks the original idea of a firm and request it for copyrighting
before the original firm does. To avoid these situations the owners needs to arrange any
evidence in advance that proves the idea was invented by them. This can be done through
maintaining the records of those proofs or the documents which can be used while
applying for copyrights. Advocacy of the IP gives company various advantages such as
transparency. The evidence can be anything qualitative data or the quantitative data. In
case the company have solid evidence of the creation or evolution of the innovation of
Intellectual property, then the company can sue the other company for violating their
rights. This is the reason why the governments are encouraging the evidence based rights
to the owners of Intellectual properties. The company should maintain their Intellectual
properties a secret until it gets property rights or licence of the same.
2. Creating awareness among employees about IP Rights: In some companies IP can be
its software, in some it can be formulas to create something and majority of the
companies it is their brand names and logo designs. In a majority of the cases the
employees and the customers with implementing certain rights of the data shared. It
allows them to identify, search, and control personal data as per the necessities. TrustArc
in one of them.
Ways that Protect Intellectual Property Rights:
Intellectual properties are considered as a portrayal of intangible things/properties like
copyrights, trade marks, unique ideas and patents. According to the rules, these properties have
equal legal protection as the tangible properties have. They are created through innovative
thinking and unique ideas. Intellectual properties are considered as assets of the organization that
is why they require protection (Pravalikha, 2017). They creates a distinguish image of the
company. The ways through which a person or business can maintain its Intellectual Property
Rights are
1. Arranging evidence while innovating: Intellectual properties are the most important
asset (intangible) that any company can have. They can be used for formulating
competitive advantages over the competitors. With the increasing competition and
Digitization, the innovation and idea leaks have became very common. There are many
cases where a competitor leaks the original idea of a firm and request it for copyrighting
before the original firm does. To avoid these situations the owners needs to arrange any
evidence in advance that proves the idea was invented by them. This can be done through
maintaining the records of those proofs or the documents which can be used while
applying for copyrights. Advocacy of the IP gives company various advantages such as
transparency. The evidence can be anything qualitative data or the quantitative data. In
case the company have solid evidence of the creation or evolution of the innovation of
Intellectual property, then the company can sue the other company for violating their
rights. This is the reason why the governments are encouraging the evidence based rights
to the owners of Intellectual properties. The company should maintain their Intellectual
properties a secret until it gets property rights or licence of the same.
2. Creating awareness among employees about IP Rights: In some companies IP can be
its software, in some it can be formulas to create something and majority of the
companies it is their brand names and logo designs. In a majority of the cases the
Intellectual properties gets leaked because of the incompetency of the humans working in
an organization. Although they can happen unintentionally, but can cause serious
damages to the company. All this happens because the employees are not aware of the IP
and are also uncertain about the ways through which they can protect the IP rights.
Although the engineers and the scientists of the company are very attentive towards the
IP of the company, they can avoid doing these mistakes by paying close attention to the
matters. On the other hand a workforce that is not aware of IP rights can breach these
rights unintentionally. That is why they are considered as a weak defensive chain. They
do not acknowledge the IP of their company precisely because of which they are unable
to recognize the imitation or very close similarities of IP of their own company by its
competitors (Chapman, 2019).
To avoid these mistakes the company can provide awareness training to all employees
which will help them in fixing or avoiding possible Intellectual Property leaks. This can be done
through maintaining that training between a small and certain group of employees. If the circle is
large the changes of leaks are also large. Employees should be aware of possible violations of the
company's IP. Atleast they must be having a basic understanding of IP of their company, and
they should know how violation of these rights can cause harm to the company and its brands. IP
awareness is required at all the levels of management even to the shopkeepers and the company's
call management.
TASK 2
Introduction –
Introduction to the Reflective Journal – The reflective journal consist of the creating and
managing digital systems which helped in creating and valuing the forms in which various digital
systems are helpful and making the organization value the systems which have been creating and
contributing to the journal in the ways that it has expanded in the forms such as having to
provide greater technology with the help of the digital systems (Wain, 2017). Digital systems
have created and helped in various ways through which all the sources of how the journal can be
made and formed is denoted in a reflective manner and through that all the possible functions of
how digitally the technology has taken over older process is done on large scale and in an
effective manner possible.
an organization. Although they can happen unintentionally, but can cause serious
damages to the company. All this happens because the employees are not aware of the IP
and are also uncertain about the ways through which they can protect the IP rights.
Although the engineers and the scientists of the company are very attentive towards the
IP of the company, they can avoid doing these mistakes by paying close attention to the
matters. On the other hand a workforce that is not aware of IP rights can breach these
rights unintentionally. That is why they are considered as a weak defensive chain. They
do not acknowledge the IP of their company precisely because of which they are unable
to recognize the imitation or very close similarities of IP of their own company by its
competitors (Chapman, 2019).
To avoid these mistakes the company can provide awareness training to all employees
which will help them in fixing or avoiding possible Intellectual Property leaks. This can be done
through maintaining that training between a small and certain group of employees. If the circle is
large the changes of leaks are also large. Employees should be aware of possible violations of the
company's IP. Atleast they must be having a basic understanding of IP of their company, and
they should know how violation of these rights can cause harm to the company and its brands. IP
awareness is required at all the levels of management even to the shopkeepers and the company's
call management.
TASK 2
Introduction –
Introduction to the Reflective Journal – The reflective journal consist of the creating and
managing digital systems which helped in creating and valuing the forms in which various digital
systems are helpful and making the organization value the systems which have been creating and
contributing to the journal in the ways that it has expanded in the forms such as having to
provide greater technology with the help of the digital systems (Wain, 2017). Digital systems
have created and helped in various ways through which all the sources of how the journal can be
made and formed is denoted in a reflective manner and through that all the possible functions of
how digitally the technology has taken over older process is done on large scale and in an
effective manner possible.
Two objectives to demonstrate understanding of project management basic practice – The two
objectives which helps in demonstrating the understanding of project management basic practice
helps in demonstrating that the objectives are framed for knowing that the project management
can only be prepared with the objectives on which the project is being done (Sarnoe and et.al.,
2019). There are two objectives of project management which are described as follows –
To successfully develop all the process and procedures which are mentioned in the
project management.
To achieve main goal of the project so that all the possible factors are achieved along
with the goals (Harrison and et.al., 2017).
Thus, these are two main objectives which help in demonstrating the understanding of project
management’s basic practice and through this the project management is formed on high scale.
Content and Analysis –
Six objectives to be identified and analyzed and strategies of their application – The six
objectives to be identified and analyzed are as follows –
1. To explain the importance and strategic relevance of digital systems used in an
organization (Bjerke and et.al., 2017).
2. To evaluate the suitability of the methodologies and processes of project.
3. To analyze role of information systems in the business environment.
4. To know the perspectives of managers and entrepreneurs.
5. To assess the challenges posed by strategic information system and management
solutions.
6. To identify the business opportunities with the help of value chain analysis (Guyadeen
and et.al., 2018).
These are the six objectives which are being identified and analyzed for purpose of how they are
being framed and the strategies which are being framed for their application are formulated
effectively.
Describe in words how the knowledge was gained in the week – The different types of digital
systems helped me in knowing that how different types are taking the concerns in digital
developing and gaining technology aspects along with the strategic relevance of the digital
objectives which helps in demonstrating the understanding of project management basic practice
helps in demonstrating that the objectives are framed for knowing that the project management
can only be prepared with the objectives on which the project is being done (Sarnoe and et.al.,
2019). There are two objectives of project management which are described as follows –
To successfully develop all the process and procedures which are mentioned in the
project management.
To achieve main goal of the project so that all the possible factors are achieved along
with the goals (Harrison and et.al., 2017).
Thus, these are two main objectives which help in demonstrating the understanding of project
management’s basic practice and through this the project management is formed on high scale.
Content and Analysis –
Six objectives to be identified and analyzed and strategies of their application – The six
objectives to be identified and analyzed are as follows –
1. To explain the importance and strategic relevance of digital systems used in an
organization (Bjerke and et.al., 2017).
2. To evaluate the suitability of the methodologies and processes of project.
3. To analyze role of information systems in the business environment.
4. To know the perspectives of managers and entrepreneurs.
5. To assess the challenges posed by strategic information system and management
solutions.
6. To identify the business opportunities with the help of value chain analysis (Guyadeen
and et.al., 2018).
These are the six objectives which are being identified and analyzed for purpose of how they are
being framed and the strategies which are being framed for their application are formulated
effectively.
Describe in words how the knowledge was gained in the week – The different types of digital
systems helped me in knowing that how different types are taking the concerns in digital
developing and gaining technology aspects along with the strategic relevance of the digital
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
systems which helped me in framing it within an organization (Kabanikhin and et.al., 2018).
Along with this, the methodologies and processes helped me in knowing how to frame it within
the project management. The role of information systems helped me in analysing the business
environment which is competitive in nature at the outside business world. Thus, I learned many
things and was able to analyze the way in which all the work was being processed by me.
Describe in words how the knowledge was gained in the week – I learned the details of how
the organization incurs in its processes and what an organization is. The main aspect which I
learned was that the important features which the managers need in an organization in making
the organization work more effectively and efficiently. Also, along with this, I learned that how
value chain contributed to the business in identifying the opportunities on large scale in the
business environment (Bansal and et.al., 2020). Furthermore, how information systems helped in
building the use of synergies and network based strategies were framed which made me learn
that the organizations not only work on the internal business scales rather they are also aware of
the external opportunities which are being offered to them in a significant manner.
Few words applied the knowledge in the week – In the last week, I gained knowledge of how
ethical and social issues in information systems helped in gaining knowledge about topic and
along with that political and social issues were also identified which helped me in knowing that
due to such issues there are many problems which can be created for the information system
(Azmi and et.al., 2020). Furthermore, contemporary information systems and challenges which
are related to internet also made me realise that there can be ways through which the problems
can be occurred through technological perspectives which are to be solved. Along with this, how
information system affected laws and regulations were also identified by me in which I learned
that how law is contributing towards ethics and the social concerns.
Conclusion – Thus, I concluded from the above mentioned work which was performed in
different weeks as an analysis of how they all contributed to the things and the aspects which
helped in different ways in knowing the scale of how effective and efficient the main scale
constituted. Along with this, the criteria of how the digital systems and the information system
helped in knowing that the technology has made its way through which the aspects of
information and advanced systems are being identified on large scale and through this all the
Along with this, the methodologies and processes helped me in knowing how to frame it within
the project management. The role of information systems helped me in analysing the business
environment which is competitive in nature at the outside business world. Thus, I learned many
things and was able to analyze the way in which all the work was being processed by me.
Describe in words how the knowledge was gained in the week – I learned the details of how
the organization incurs in its processes and what an organization is. The main aspect which I
learned was that the important features which the managers need in an organization in making
the organization work more effectively and efficiently. Also, along with this, I learned that how
value chain contributed to the business in identifying the opportunities on large scale in the
business environment (Bansal and et.al., 2020). Furthermore, how information systems helped in
building the use of synergies and network based strategies were framed which made me learn
that the organizations not only work on the internal business scales rather they are also aware of
the external opportunities which are being offered to them in a significant manner.
Few words applied the knowledge in the week – In the last week, I gained knowledge of how
ethical and social issues in information systems helped in gaining knowledge about topic and
along with that political and social issues were also identified which helped me in knowing that
due to such issues there are many problems which can be created for the information system
(Azmi and et.al., 2020). Furthermore, contemporary information systems and challenges which
are related to internet also made me realise that there can be ways through which the problems
can be occurred through technological perspectives which are to be solved. Along with this, how
information system affected laws and regulations were also identified by me in which I learned
that how law is contributing towards ethics and the social concerns.
Conclusion – Thus, I concluded from the above mentioned work which was performed in
different weeks as an analysis of how they all contributed to the things and the aspects which
helped in different ways in knowing the scale of how effective and efficient the main scale
constituted. Along with this, the criteria of how the digital systems and the information system
helped in knowing that the technology has made its way through which the aspects of
information and advanced systems are being identified on large scale and through this all the
various forms through which ethical and social issues in information systems were also analyzed
on an effective and efficient way.
CONCLUSION
From the above report it can be concluded that although an inculcation of internet and
information system will lead to benefits the companies in terms of raising their performance and
enable it success, but on the same side it also impacts its functioning in terms of making the
organizations to be vulnerable. It also affects and challenges the intellectual property rights and
customer's privacy and thus on broader scales affects the company too. Likewise, it is also
understood that with the use of these systems and internet the companies along with rising
benefits also affected in terms of affection towards their working and their processing of
conduction of business operation.
on an effective and efficient way.
CONCLUSION
From the above report it can be concluded that although an inculcation of internet and
information system will lead to benefits the companies in terms of raising their performance and
enable it success, but on the same side it also impacts its functioning in terms of making the
organizations to be vulnerable. It also affects and challenges the intellectual property rights and
customer's privacy and thus on broader scales affects the company too. Likewise, it is also
understood that with the use of these systems and internet the companies along with rising
benefits also affected in terms of affection towards their working and their processing of
conduction of business operation.
REFERENCES
Books and journals
Abi Sen, A.A. and et al., 2018. Preserving privacy in internet of things: a survey. International
Journal of Information Technology. 10(2). pp.189-200.
Azmi, F. and Sri, M., 2020. Factors that affect accounting information system success and its
implication on accounting information quality. SIMILIARITY.
Bican, P.M., Guderian, C.C. and Ringbeck, A., 2017. Managing knowledge in open innovation
processes: an intellectual property perspective. Journal of Knowledge Management.
Chapman, L., 2019. Intellectual Property Rights (IPRs). In Management for Scientists. Emerald
Publishing Limited.
Fabiano, N., 2017, June. Internet of things and blockchain: legal issues and privacy. the
challenge for a privacy standard. In 2017 IEEE International Conference on Internet of
Things (iThings) and IEEE Green Computing and Communications (GreenCom) and
IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data
(SmartData). (pp. 727-734). IEEE.
Krausová, A., Socially Responsible Virtual Assistant for Privacy Protection: Implementing
Trustworthy AI .⋆
Lazariuc, C., 2021. Digital Education as a Strategy for the Protection of Intellectual Property
Rights. Eastern European Journal for Regional Studies (EEJRS). 7(1). pp.132-155.
Mir, S.Q. and Quadri, S.M.K., 2017. METRIC FOR EVALUATING AVAILABILITY OF AN
INFORMATION SYSTEM: AQuantitative APPROACH BASED ON COMPONENT
DEPENDENCY.
Pravalikha, B.D., 2017. Legal Strategies for the Protection and Exploitation of Intellectual
Property Rights for Startups.
Sestino, A. and et al., 2020. Internet of Things and Big Data as enablers for business
digitalization strategies. Technovation. p.102173.
Vysotska, V. and et al., 2019. Development of Information System for Textual Content
Categorizing Based on Ontology. In COLINS. (pp. 53-70).
Wang, W. and et al., 2020. Detecting software security vulnerabilities via requirements
dependency analysis.IEEE Transactions on Software Engineering.
Wain, A., 2017. Learning through reflection. British Journal of Midwifery.25(10).pp.662-666.
1
Books and journals
Abi Sen, A.A. and et al., 2018. Preserving privacy in internet of things: a survey. International
Journal of Information Technology. 10(2). pp.189-200.
Azmi, F. and Sri, M., 2020. Factors that affect accounting information system success and its
implication on accounting information quality. SIMILIARITY.
Bican, P.M., Guderian, C.C. and Ringbeck, A., 2017. Managing knowledge in open innovation
processes: an intellectual property perspective. Journal of Knowledge Management.
Chapman, L., 2019. Intellectual Property Rights (IPRs). In Management for Scientists. Emerald
Publishing Limited.
Fabiano, N., 2017, June. Internet of things and blockchain: legal issues and privacy. the
challenge for a privacy standard. In 2017 IEEE International Conference on Internet of
Things (iThings) and IEEE Green Computing and Communications (GreenCom) and
IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data
(SmartData). (pp. 727-734). IEEE.
Krausová, A., Socially Responsible Virtual Assistant for Privacy Protection: Implementing
Trustworthy AI .⋆
Lazariuc, C., 2021. Digital Education as a Strategy for the Protection of Intellectual Property
Rights. Eastern European Journal for Regional Studies (EEJRS). 7(1). pp.132-155.
Mir, S.Q. and Quadri, S.M.K., 2017. METRIC FOR EVALUATING AVAILABILITY OF AN
INFORMATION SYSTEM: AQuantitative APPROACH BASED ON COMPONENT
DEPENDENCY.
Pravalikha, B.D., 2017. Legal Strategies for the Protection and Exploitation of Intellectual
Property Rights for Startups.
Sestino, A. and et al., 2020. Internet of Things and Big Data as enablers for business
digitalization strategies. Technovation. p.102173.
Vysotska, V. and et al., 2019. Development of Information System for Textual Content
Categorizing Based on Ontology. In COLINS. (pp. 53-70).
Wang, W. and et al., 2020. Detecting software security vulnerabilities via requirements
dependency analysis.IEEE Transactions on Software Engineering.
Wain, A., 2017. Learning through reflection. British Journal of Midwifery.25(10).pp.662-666.
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Sarnoe, L. and et.al., 2019. Using SSM in Project Management: aligning objectives and
outcomes in organizational change projects. In Problem Structuring Approaches for the
Management of Projects (pp. 247-276). Palgrave Macmillan, Cham.
Harrison, F. and et.al., 2017. Advanced project management: a structured approach. Routledge.
Bjerke, M.B. and et.al., 2017. Being smart about writing SMART objectives. Evaluation and
program planning.61.pp.125-127.
Guyadeen, D. and et.al., 2018. Evaluation theory and practice: Comparing program evaluation
and evaluation in planning. Journal of Planning Education and Research.38(1).pp.98-
110.
Kabanikhin, S.I. and et.al., 2018. Digital field. Георесурсы.20(3 (eng)).
Azmi, F. and et.al., 2020. Factors that affect accounting information system success and its
implication on accounting information quality. SIMILIARITY.
Bansal, G. and et.al., 2020. Information system security policy noncompliance: the role of
situation-specific ethical orientation. Information Technology & People.
2
outcomes in organizational change projects. In Problem Structuring Approaches for the
Management of Projects (pp. 247-276). Palgrave Macmillan, Cham.
Harrison, F. and et.al., 2017. Advanced project management: a structured approach. Routledge.
Bjerke, M.B. and et.al., 2017. Being smart about writing SMART objectives. Evaluation and
program planning.61.pp.125-127.
Guyadeen, D. and et.al., 2018. Evaluation theory and practice: Comparing program evaluation
and evaluation in planning. Journal of Planning Education and Research.38(1).pp.98-
110.
Kabanikhin, S.I. and et.al., 2018. Digital field. Георесурсы.20(3 (eng)).
Azmi, F. and et.al., 2020. Factors that affect accounting information system success and its
implication on accounting information quality. SIMILIARITY.
Bansal, G. and et.al., 2020. Information system security policy noncompliance: the role of
situation-specific ethical orientation. Information Technology & People.
2
1 out of 14
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.