logo

Information System | Literature Review

7 Pages1475 Words230 Views
   

Added on  2020-03-16

Information System | Literature Review

   Added on 2020-03-16

ShareRelated Documents
Running head: INFORMATION SYSTEM1Information systemNameInstitution
Information System | Literature Review_1
INFORMATION SYSTEM2Literature reviewUnderstandably information system is a dynamic module in every organization functioning. Relative to research over the last decade technology has rapidly evolved and because of these technology progresses people have developed a greater demand for more sophisticated information system (IS). Relative to ( Kalja & Robal, 2014) the programs, and methods used to protect critical information in firms are probably outdated and malfunctioned. Notably, there is a mounting demand for higher levels of information system hence more of high-level IS would be necessitated in future.The past of information systemsAccording to Bertino (2017), information in the past was shared in minor area networks which confined a single business. In order to keep this information secured the existing businesses had to ensure unauthorized users do not access their network. Furthermore, as the network grew to accommodate the dynamic changes in business so did the computer security. Due to the vigorous changes computer security needed to adjust from small to a large area network that spanned globally as a result global business.. Moreover, most organizations are not directly connected to the Internet but do access the internet.. In addition, these networks and Internet has enabled the companies to send information all over the world effectively.The present information systemUnfortunately in the process of ensuring information is accessible to every individual especially clients and employees it has contributed to an insecurity of information such as hacking and viruses. Cronin &American Society for Information Science and Technology (2017)research shows that over the past decade the number of viruses increased to about 1260 and over
Information System | Literature Review_2
INFORMATION SYSTEM31300 viruses was also identified in 1997.Besides, the key reason for the high growth of viruses isbecause of the increased number of Microsoft Products which are highly targeted. As a result protection methods such as encryption have been established to protect sensitive in communication.Future management information systemAccording to M-Brain survey on the impact of technology on the future of MIS which surveyed over 139 business managers around Europe. Three key technology trends would impactthe future of MIS in the next coming years as predicted. The survey attributed that companies in future must implement systems that would ensure data automation so as to respond to the market opportunities and be able to sustain the competition (Zhang, Y. 2012). In addition, there is the need to expand and implement information analysis automation and cross function integration. For example, in cross function integration most companies need to integrate pertinent systems like social media platforms, ERP, market intelligence portal and CRM. Relatively these MIS should always sustain the data movement from other systems, regardless of the level of integration applied. As the developers are critical in advancing the current technology the MIS design hub would shift from database orientation to focus on critical decisions companies. Designs teams would be established to utilize the methods of management and operation research. Moreover, data processing approach in MIS would undergo an extension so as to deliver a range of EDP maintenance in MIS and thus data management system would ensure database development.With the introduction of smartphones and the idea of “an app” there has been an extendeduse of information systems in mobile phones. These apps may handle a variety of functions such
Information System | Literature Review_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Literature Survey: Network Security and Data Privacy Protection
|14
|3790
|402

Risk Assessment of Southern Cross University
|13
|2466
|317

Network Security Fundamentals
|4
|699
|200

Information Security Issues
|11
|2946
|370

Information Security Assignment Sample (pdf)
|10
|3084
|33

Integrated Professional Skills in the Digital Age
|11
|3335
|41