Impact of Technology on Business and Society
VerifiedAdded on 2020/03/28
|12
|2716
|65
AI Summary
This assignment analyzes the disadvantages of information systems and technology. It discusses how automation can lead to job losses, highlights cybersecurity threats posed by online hackers, and examines the financial burden of implementing and maintaining sophisticated IT infrastructure. The text also emphasizes the need for a balanced approach to technological advancement, considering both its benefits and potential downsides.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
ICT SERVICES MANAGEMENT
1
ICT SERVICES MANAGEMENT
Course
Professor
Institution
Date
1
ICT SERVICES MANAGEMENT
Course
Professor
Institution
Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ICT SERVICES MANAGEMENT
2
Task #1
Alan Turing and the Ace computer
http://news.bbc.co.uk/2/hi/technology/8498826.stm
BIBLIOGRAPHY
Ward, M. (5 February 2010). Alan Turing and the Ace computer. Alan Turing and the Ace computer.
Automated computing Engine was the earliest electronic stored program planned by Alan
Turing. He was competent in engineering of the theoretical computer which could formalize the
idea of the algorithm and the computation which can be identified as general purpose machine.
He is considered to be the father of the artificial intelligence. Artificial intelligence may look like
the realm of the science fiction but one might be surprised to discover that we have been using it.
Virtual Personal Assistance is most intelligent digital personal assistants being used in every day
operating system thus helping in gathering of useful information and also interacts with the
systems one can interact with them using voices to get such directions. They are also important
since they collect user information and store it and then make use of that information in
recognition of the user speech as programmed by its user.
Microsoft launched Contana as AI which continues learning users requirements and give
assistance where required. The other artificial intelligence which is widely used is gaming they
are adapting to user character which learns user behaviors and also respond to the stimuli and
then responds to unpredictable ways. Other technologies invented such as smart cars, Google
2
Task #1
Alan Turing and the Ace computer
http://news.bbc.co.uk/2/hi/technology/8498826.stm
BIBLIOGRAPHY
Ward, M. (5 February 2010). Alan Turing and the Ace computer. Alan Turing and the Ace computer.
Automated computing Engine was the earliest electronic stored program planned by Alan
Turing. He was competent in engineering of the theoretical computer which could formalize the
idea of the algorithm and the computation which can be identified as general purpose machine.
He is considered to be the father of the artificial intelligence. Artificial intelligence may look like
the realm of the science fiction but one might be surprised to discover that we have been using it.
Virtual Personal Assistance is most intelligent digital personal assistants being used in every day
operating system thus helping in gathering of useful information and also interacts with the
systems one can interact with them using voices to get such directions. They are also important
since they collect user information and store it and then make use of that information in
recognition of the user speech as programmed by its user.
Microsoft launched Contana as AI which continues learning users requirements and give
assistance where required. The other artificial intelligence which is widely used is gaming they
are adapting to user character which learns user behaviors and also respond to the stimuli and
then responds to unpredictable ways. Other technologies invented such as smart cars, Google
ICT SERVICES MANAGEMENT
3
self-driven cars are good example of the smart cars. The car is able scan the road ahead of it
hence interpreting information on what have seen thus helping to learn the process. Such
technologies are being used on the road predicting these technologies will soon be implemented.
Task #2
A Brief History of Google's Android Operating System
http://www.ipwatchdog.com/2014/11/26/a-brief-history-of-googles-android-operating-system/
id=52285/
Brachmann, S. (November 26, 2014). History of Google’s Android Operating System. A Brief History of
Google’s Android Operating System.
Android operating systems was not initially designed and programmed to be used mobile
phones they were meant to be used in cameras as compared to other operating system on mobile
platforms android has been upgraded in number of times while resulting into a web based service
which has a huge comparison as compared to other operating systems. The idea of implementing
android operating system in the digital cameras which could access computer services thus the
team noted that they will be low demand of such kind of cameras thus the team decided to focus
on the mobiles phones.
Android have gone a huge and tremendous step forward when it availed the open hand
set Alliance which is a consortium of technology manufacture to work together in creating an
open source mobile devices. Android operating system which used to power computing devices
from mobile phone to huge work station are mostly targeted and also keeps in updating on a
regular intervals which enables to fix error and other technical challenges thus improving user
3
self-driven cars are good example of the smart cars. The car is able scan the road ahead of it
hence interpreting information on what have seen thus helping to learn the process. Such
technologies are being used on the road predicting these technologies will soon be implemented.
Task #2
A Brief History of Google's Android Operating System
http://www.ipwatchdog.com/2014/11/26/a-brief-history-of-googles-android-operating-system/
id=52285/
Brachmann, S. (November 26, 2014). History of Google’s Android Operating System. A Brief History of
Google’s Android Operating System.
Android operating systems was not initially designed and programmed to be used mobile
phones they were meant to be used in cameras as compared to other operating system on mobile
platforms android has been upgraded in number of times while resulting into a web based service
which has a huge comparison as compared to other operating systems. The idea of implementing
android operating system in the digital cameras which could access computer services thus the
team noted that they will be low demand of such kind of cameras thus the team decided to focus
on the mobiles phones.
Android have gone a huge and tremendous step forward when it availed the open hand
set Alliance which is a consortium of technology manufacture to work together in creating an
open source mobile devices. Android operating system which used to power computing devices
from mobile phone to huge work station are mostly targeted and also keeps in updating on a
regular intervals which enables to fix error and other technical challenges thus improving user
ICT SERVICES MANAGEMENT
4
experiences. It’s quite clear that the android will remain unbeaten at the moment since it is a low
cost services and it is user friendly which is attractive and compatible to the hardware makers
and the operators.
Task #3
The next Evolution of the Internet Is Changing Everything
https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf
Evans, D. (April 2011). The Internet of Things. How the Next Evolution of the Internet.
The article describes the emergence of internet and changes of modern devices. We feel
better when the internet makes our lives more interesting while using smart home devices.
Majority of these plug-in gadgets comes integrated with Wi-Fi capabilities with other companion
applications thus making a streamlined life. Home automation or the “Internet of Things” most
of our devices and other appliances are networked together in order to provide a seam less
control over all aspects of homes and business. The idea of home automation has been there in a
decade in areas of lighting, security features and other simple appliances.
In the recent technology and the growth of internet idea of inter connecting devices and
having full control of our homes from anywhere without necessary being there since the
automation dictates what a particular device should responds in a certain manner as scheduled.
Schedules are made according to our preferences hence providing conveniences, control and
resources controls and the best part having smart home. The automation can also make alert of
4
experiences. It’s quite clear that the android will remain unbeaten at the moment since it is a low
cost services and it is user friendly which is attractive and compatible to the hardware makers
and the operators.
Task #3
The next Evolution of the Internet Is Changing Everything
https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf
Evans, D. (April 2011). The Internet of Things. How the Next Evolution of the Internet.
The article describes the emergence of internet and changes of modern devices. We feel
better when the internet makes our lives more interesting while using smart home devices.
Majority of these plug-in gadgets comes integrated with Wi-Fi capabilities with other companion
applications thus making a streamlined life. Home automation or the “Internet of Things” most
of our devices and other appliances are networked together in order to provide a seam less
control over all aspects of homes and business. The idea of home automation has been there in a
decade in areas of lighting, security features and other simple appliances.
In the recent technology and the growth of internet idea of inter connecting devices and
having full control of our homes from anywhere without necessary being there since the
automation dictates what a particular device should responds in a certain manner as scheduled.
Schedules are made according to our preferences hence providing conveniences, control and
resources controls and the best part having smart home. The automation can also make alert of
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ICT SERVICES MANAGEMENT
5
events which are key while there is absences of person such leaking water or eruption of
electricity malfunction. The owner only requires to take out a smart phones are makes query
desired settings of the house or report to the authority in case of emergency.
In the automated home it is more convenience since each and every device and
appliances are controlled remotely with or with absence of the user. There is safety since the
system provides security while safeguarding homes devices such as IP cameras will make alerts
in case of a possible leakage.
Task #4
Point-to-Point Communications
http://www.linktionary.com/p/point2point.html
SHeldom, T. (2012). Point to Point Communication. Point to Point Communication (TCPIP).
Point- to- Point connection is the one of the widely used types of the WAN connections, they are
used to connect LANs to service providers and also connect LAN segments in an entity network.
It’s also referred to as serial connection since the serial connection is dedicated to be used by the
company. This is normally done when a connection is done in between the internet service
provider and while one desires to make multiple connections on the network thus the connection
made or established in such connection is a Point to Point Protocol. PPP is also widely used on
satellites, fiber-optic lines and the twisted pair transmission of the data. It also allows one to
authenticate connections while using pre shared key. It has the following components one it has a
method of encapsulating multiple protocol datagrams thus multiple network layer are
5
events which are key while there is absences of person such leaking water or eruption of
electricity malfunction. The owner only requires to take out a smart phones are makes query
desired settings of the house or report to the authority in case of emergency.
In the automated home it is more convenience since each and every device and
appliances are controlled remotely with or with absence of the user. There is safety since the
system provides security while safeguarding homes devices such as IP cameras will make alerts
in case of a possible leakage.
Task #4
Point-to-Point Communications
http://www.linktionary.com/p/point2point.html
SHeldom, T. (2012). Point to Point Communication. Point to Point Communication (TCPIP).
Point- to- Point connection is the one of the widely used types of the WAN connections, they are
used to connect LANs to service providers and also connect LAN segments in an entity network.
It’s also referred to as serial connection since the serial connection is dedicated to be used by the
company. This is normally done when a connection is done in between the internet service
provider and while one desires to make multiple connections on the network thus the connection
made or established in such connection is a Point to Point Protocol. PPP is also widely used on
satellites, fiber-optic lines and the twisted pair transmission of the data. It also allows one to
authenticate connections while using pre shared key. It has the following components one it has a
method of encapsulating multiple protocol datagrams thus multiple network layer are
ICT SERVICES MANAGEMENT
6
simultaneously transported on the same link hence enabling compatibility of most supporting
network devices. Two it uses the Link Control Protocol which is used to propel communication
over a PPP link. Every link sends packets in order to be configured and also examine data link
while the link is propelled the node may be verified by authorization. Last but not the list once
the link has been established the Network Control Protocol is used to inaugurate and configured
single or multiple layer protocol will be used to initiate connection.
Task #5
The Great Cyber heist
http://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html?mcubz=1
VERINI, J. (NOV. 10, 2010). The Great Cyberheist. New york Magazine.
A night in July 2003 at mid night the N.Y.P.D detective in the streets of the Manhattan as
they were investigating a series of car theft, surprisingly a suspicious looking entered ATM room
and withdrew hundreds of dollars in cash, on the same time he pulled another ATM card and did
the same again multiple times while the detective around noted the man was not stealing cars but
stealing something. Later the guy confessed that he had programmed multiple blank debit cards
comprising of stolen card numbers and he has been withdrawing a much as possible from each
account. The guy was wearing woman’s wig but after being interrogated he politely confessed
the truth he is “Albert Gonzalez”.
After a number of interviews by the federal he agreed that he will help the government
rather than facing prosecutions. The agents won his trust and decided to pay his bills while
6
simultaneously transported on the same link hence enabling compatibility of most supporting
network devices. Two it uses the Link Control Protocol which is used to propel communication
over a PPP link. Every link sends packets in order to be configured and also examine data link
while the link is propelled the node may be verified by authorization. Last but not the list once
the link has been established the Network Control Protocol is used to inaugurate and configured
single or multiple layer protocol will be used to initiate connection.
Task #5
The Great Cyber heist
http://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html?mcubz=1
VERINI, J. (NOV. 10, 2010). The Great Cyberheist. New york Magazine.
A night in July 2003 at mid night the N.Y.P.D detective in the streets of the Manhattan as
they were investigating a series of car theft, surprisingly a suspicious looking entered ATM room
and withdrew hundreds of dollars in cash, on the same time he pulled another ATM card and did
the same again multiple times while the detective around noted the man was not stealing cars but
stealing something. Later the guy confessed that he had programmed multiple blank debit cards
comprising of stolen card numbers and he has been withdrawing a much as possible from each
account. The guy was wearing woman’s wig but after being interrogated he politely confessed
the truth he is “Albert Gonzalez”.
After a number of interviews by the federal he agreed that he will help the government
rather than facing prosecutions. The agents won his trust and decided to pay his bills while
ICT SERVICES MANAGEMENT
7
waiting for Gonzalez to work though his withdrawal of cybercrimes. Gonzalez worked with the
federal for several years and was able together with his crew of hackers illegally gain access to
more than one hundred and fifty million payment card accounts from the customers databases
and other corporations in the United State of America. During his sentences hearing in the mid-
march, Gonzalez received a two con current twenty years jail term which is the longest sentence
ever handed down to American for a cyber-crime.
Task #6
Technology Trends
http://changes-of-tomorrow.hyperisland.com/technology
Patrick, A. (2017). Technology Trends. Technology Trends.
Social media has offered new ways of intra enterprise communication which are
beneficial of creativity and the innovation of technology globally. Most of the enterprises use
online social networks among clients who desegregate business interest and other important
activities within the business. Companies are heavily implementing social networks to promote
and collaborate to their employees. Other companies are starting to educate their stakeholders on
clouding computing and SaaS, while vendors are using these trending technologies to reach most
of the companies.
These technologies they are added to enterprise on the social networks platforms. Then
the technologies in place are being implemented in order for employees to collaborate and share
7
waiting for Gonzalez to work though his withdrawal of cybercrimes. Gonzalez worked with the
federal for several years and was able together with his crew of hackers illegally gain access to
more than one hundred and fifty million payment card accounts from the customers databases
and other corporations in the United State of America. During his sentences hearing in the mid-
march, Gonzalez received a two con current twenty years jail term which is the longest sentence
ever handed down to American for a cyber-crime.
Task #6
Technology Trends
http://changes-of-tomorrow.hyperisland.com/technology
Patrick, A. (2017). Technology Trends. Technology Trends.
Social media has offered new ways of intra enterprise communication which are
beneficial of creativity and the innovation of technology globally. Most of the enterprises use
online social networks among clients who desegregate business interest and other important
activities within the business. Companies are heavily implementing social networks to promote
and collaborate to their employees. Other companies are starting to educate their stakeholders on
clouding computing and SaaS, while vendors are using these trending technologies to reach most
of the companies.
These technologies they are added to enterprise on the social networks platforms. Then
the technologies in place are being implemented in order for employees to collaborate and share
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
ICT SERVICES MANAGEMENT
8
ideas on how to improve the work place. Firm are using social networks in order to exchange
information and data to other shareholders in the company such as trading documents done on
real time. Majority of the companies have adopted social networking while creating their internal
networking sites thus encouraging employees to use these platforms to either connect to other
employees enabling them to solve work related issues. Social networks sites such as Facebook,
Twitter are used by companies in order to get more clients based on their likes and the
preferences since every companies want to gain trust to their customers.
Task #7
A brief history of Facebook
https://www.theguardian.com/technology/2007/jul/25/media.newmedia
Phillips, S. (2007). A brief history of Facebook. The Gurdian Journal.
Facebook founder Mark Zuckerberg while he studying psychology at Havard University,
He had developed multiple of social networks websites for collage mates such as Course match
which allowed student who are undertaking degrees would they could match and rate peoples
attractiveness. Within the next day more than thousands students had signed up and within the
course of the month half of the undergraduate had created a profile. The network spread to the
next Universities such as Boston University, Ivy League and spread across other universities of
the US.In the year 2005 it became Facebook.com and its address was purchased. By the end of
September it had already started to spread worldwide reaching UK Universities and by the end of
2006 the network had grown even beyond educational institutions.
8
ideas on how to improve the work place. Firm are using social networks in order to exchange
information and data to other shareholders in the company such as trading documents done on
real time. Majority of the companies have adopted social networking while creating their internal
networking sites thus encouraging employees to use these platforms to either connect to other
employees enabling them to solve work related issues. Social networks sites such as Facebook,
Twitter are used by companies in order to get more clients based on their likes and the
preferences since every companies want to gain trust to their customers.
Task #7
A brief history of Facebook
https://www.theguardian.com/technology/2007/jul/25/media.newmedia
Phillips, S. (2007). A brief history of Facebook. The Gurdian Journal.
Facebook founder Mark Zuckerberg while he studying psychology at Havard University,
He had developed multiple of social networks websites for collage mates such as Course match
which allowed student who are undertaking degrees would they could match and rate peoples
attractiveness. Within the next day more than thousands students had signed up and within the
course of the month half of the undergraduate had created a profile. The network spread to the
next Universities such as Boston University, Ivy League and spread across other universities of
the US.In the year 2005 it became Facebook.com and its address was purchased. By the end of
September it had already started to spread worldwide reaching UK Universities and by the end of
2006 the network had grown even beyond educational institutions.
ICT SERVICES MANAGEMENT
9
Facebook remained free and anyone who has a registered email or mobile phone number
could join. The sites make profits via advertising revenue and it has incorporated features such as
gifts and offers free classified adverts. Today Facebook have more than Thirty billion registered
users which makes it the largest social networking site for education and business purpose. With
this huge number of registered users companies uses these platforms for brand awareness
business on Facebook gains more exposure to clients which drive them to rate a particular
product, reviewing thus increase online visits.
Task #8
Data mining at supermarkets
http://www.freshplaza.com/article/176587/Data-mining-at-supermarkets
Alex, J. (2017). Data mining at supermarkets. Fresh Plaza.
Super markets mostly use data mining and other business intelligence in action.
Supermarkets use loyalty cards to the customers which are used to gather compressive
information about particular customer for use in data mining. The supermarkets developers
establish rules in to predict the customer way of purchasing such as fashions and electronics thus
by looking the contents of the purchases of the customers in the troy or the baskets they can
identify products which he or she uses and they can start to begin targeting promotions for the
extra products to the customers. Depending on the purchase of the target customer firm start
9
Facebook remained free and anyone who has a registered email or mobile phone number
could join. The sites make profits via advertising revenue and it has incorporated features such as
gifts and offers free classified adverts. Today Facebook have more than Thirty billion registered
users which makes it the largest social networking site for education and business purpose. With
this huge number of registered users companies uses these platforms for brand awareness
business on Facebook gains more exposure to clients which drive them to rate a particular
product, reviewing thus increase online visits.
Task #8
Data mining at supermarkets
http://www.freshplaza.com/article/176587/Data-mining-at-supermarkets
Alex, J. (2017). Data mining at supermarkets. Fresh Plaza.
Super markets mostly use data mining and other business intelligence in action.
Supermarkets use loyalty cards to the customers which are used to gather compressive
information about particular customer for use in data mining. The supermarkets developers
establish rules in to predict the customer way of purchasing such as fashions and electronics thus
by looking the contents of the purchases of the customers in the troy or the baskets they can
identify products which he or she uses and they can start to begin targeting promotions for the
extra products to the customers. Depending on the purchase of the target customer firm start
ICT SERVICES MANAGEMENT
10
sending promotion coupons to the client and create awareness of the particular product in the
store.
In order for a business to stay competitive they therefor requires viable customer
retention strategy and since the key success of the developed strategy rest with customer relation,
business requires to identify the most profitable ways to build and maintain customer in toes. In
order to achieve this implementing a data mining techniques in the business can help understand
customer shopping behavior while retaining esteemed customers. In conclusion collection of data
together with other social economic data supermarkets are able to make evidence based decisions
when devising market operations strategies.
Task #9
How M-Pesa changed banking in Africa. (Monks, 2017)
http://edition.cnn.com/2017/02/21/africa/mpesa-10th-anniversary/index.html
Monks, K. (2017). How M-Pesa changed banking in Africa . Market Place Africa.
In year 2003 Nick Hughes worker at Vodafone as the head of social enterprise made a
proposal to deliver a financial service over mobile phone. The idea was to be implemented in a
service provider in East Africa known as Safaricom which has 0.4 per cent stake to Vodafone.
He got funding from UK department for International Development to venture with one million
pounds of which was matched by Vodafone in terms of cash and staff time. He worked with East
Africa people and financial experts in figuring the needs of the people in this particular area. In
10
sending promotion coupons to the client and create awareness of the particular product in the
store.
In order for a business to stay competitive they therefor requires viable customer
retention strategy and since the key success of the developed strategy rest with customer relation,
business requires to identify the most profitable ways to build and maintain customer in toes. In
order to achieve this implementing a data mining techniques in the business can help understand
customer shopping behavior while retaining esteemed customers. In conclusion collection of data
together with other social economic data supermarkets are able to make evidence based decisions
when devising market operations strategies.
Task #9
How M-Pesa changed banking in Africa. (Monks, 2017)
http://edition.cnn.com/2017/02/21/africa/mpesa-10th-anniversary/index.html
Monks, K. (2017). How M-Pesa changed banking in Africa . Market Place Africa.
In year 2003 Nick Hughes worker at Vodafone as the head of social enterprise made a
proposal to deliver a financial service over mobile phone. The idea was to be implemented in a
service provider in East Africa known as Safaricom which has 0.4 per cent stake to Vodafone.
He got funding from UK department for International Development to venture with one million
pounds of which was matched by Vodafone in terms of cash and staff time. He worked with East
Africa people and financial experts in figuring the needs of the people in this particular area. In
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ICT SERVICES MANAGEMENT
11
order to manage and work efficiently on the ground he en corporate Susie Lonie who had a
know-how on mobile commerce in Europe, she exercised a small scale pilot to improve micro
finance loan granting and repayment.
Mpesa Application was invented in 2007 with a target of more than 30000 user in the
first year the decision was wise since having subscribers using Mpesa could hardly leave
Safaricom thus bonding the customers. Ideally Kenyans who received loans could send to their
families’ miles away and to ease this mobile money transfer would be efficient. Mpesa is one of
the revolutions that has widely employed and empowered millions of individual around the
globe. Mpesa have enhanced customer in daily lives.
Task #10
Drawbacks of Information systems and technology
https://blogs.deusto.es/master-informatica/advantages-and-disadvantages-of-information-systems/
Anonymus. (2017). Drawbacks of Information systems and technology. OPINIONS ON THE WORLD OF
INFORMATION SYSTEMS.
The core factor of information systems is providing information to the right people at the
right time. Information system should be in place to track, store, manipulate and so to specific
people. Through use of information system can contribute to high opportunities to the firms on
their daily transactions giving them un upper hand whereas on the other side can result to a group
of individuals jobless since most of work forces are automated such as mechanic works. With the
growth of the technology tasks which were performed on hands are carried by the computers
systems, thus industry personnel argues that internet has made job security challenge because
technology keeps on improving each and every day. On the other information systems has raised
11
order to manage and work efficiently on the ground he en corporate Susie Lonie who had a
know-how on mobile commerce in Europe, she exercised a small scale pilot to improve micro
finance loan granting and repayment.
Mpesa Application was invented in 2007 with a target of more than 30000 user in the
first year the decision was wise since having subscribers using Mpesa could hardly leave
Safaricom thus bonding the customers. Ideally Kenyans who received loans could send to their
families’ miles away and to ease this mobile money transfer would be efficient. Mpesa is one of
the revolutions that has widely employed and empowered millions of individual around the
globe. Mpesa have enhanced customer in daily lives.
Task #10
Drawbacks of Information systems and technology
https://blogs.deusto.es/master-informatica/advantages-and-disadvantages-of-information-systems/
Anonymus. (2017). Drawbacks of Information systems and technology. OPINIONS ON THE WORLD OF
INFORMATION SYSTEMS.
The core factor of information systems is providing information to the right people at the
right time. Information system should be in place to track, store, manipulate and so to specific
people. Through use of information system can contribute to high opportunities to the firms on
their daily transactions giving them un upper hand whereas on the other side can result to a group
of individuals jobless since most of work forces are automated such as mechanic works. With the
growth of the technology tasks which were performed on hands are carried by the computers
systems, thus industry personnel argues that internet has made job security challenge because
technology keeps on improving each and every day. On the other information systems has raised
ICT SERVICES MANAGEMENT
12
security issues concerning online hackers who get into corporate and organization and
manipulate information.
Implantation of the information systems becomes another challenge to firms because they
require good amount of resources such a software’s, supporting technicians, and hardware’s.
Workers needs to be trained on how to use the new system thus incurring other expenses to the
organization. In conclusion by understanding the pros and cons of the information systems it can
results effort should be put in place to make the advantages much better than the negative
impacts can results in the business world and society.
12
security issues concerning online hackers who get into corporate and organization and
manipulate information.
Implantation of the information systems becomes another challenge to firms because they
require good amount of resources such a software’s, supporting technicians, and hardware’s.
Workers needs to be trained on how to use the new system thus incurring other expenses to the
organization. In conclusion by understanding the pros and cons of the information systems it can
results effort should be put in place to make the advantages much better than the negative
impacts can results in the business world and society.
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.