This report discusses the methods and techniques of information technology, the impact of IT on globalization, and the importance of IT infrastructure in digital transformation. It also covers the risks associated with information systems outsourcing and provides examples of various systems such as McAfee, MS Office, and more.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Business Management Cohort 2 BMP4005 Information Systems and Big Data Analysis Information Systems & IT Solution 2019/2020 February 2020/Semester 1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents INTRODUCTION...........................................................................................................................1 Task 1: Theories, methods and techniques to design and develop McAfee and MS Office...........1 Task 2: Explanation of the systems given below.............................................................................2 Task 3: Globalisation and the effects of IT on globalization...........................................................4 Task 4: Definition, example, advantages and disadvantages of digital infrastructure.....................5 Task 5: Risks associated with information systems outsourcing and why is IT infrastructure so critical to digital transformation.......................................................................................................6 Why is IT infrastructure so critical to digital transformation!.........................................................7 CONCLUSION................................................................................................................................7 REFERENCES................................................................................................................................8
INTRODUCTION Information technology refers to the use of digital platforms and modern techniques for the purpose of performing various functions. The application of information system has become relevant and significant in context to organizational backgrounds as it supports a range of operationsforenterprisesandcorporations.Informationsystemsareeffectivelyusedby companies for analysing and storing necessary data and information (Ayoub and et. al., 2019). In this report, the methods and techniques of information technology are discussed and explained in detail. It reflects upon development of IT solutions and how they are used fulfilling a variety of purposes. In addition to this, it also includes concept of globalization and how invention of information technology has led to a highly globalized business environment. It also covers areas of digital infrastructure stating its advantages as well as disadvantages. At last, it discuss risks associated with outsourcing of information technology as well as well as it states why IT infrastructure is so significant for transformation and modern advancements. Task 1: Theories, methods and techniques to design and develop McAfee and MS Office McAfee This is computer-based system software developed by John McAfee in 1987. This is a well-known antivirus application that is used to detect viruses and malware and provides strong protection for your laptop or desktop. (Chen, 2018). It scans the whole system and enhances the learning without troubling about the viruses. Agile or continuous integration is the methodology which helps to develop the design of all the software of McAfee. Agile is a methodology that allows developers to build software using an iterative process that includes three phases (planning, collaboration, and shipping), a general methodology realized by collecting comments. Iterative devices help improve performance by finding bugs and fixing the same bugs. McAfee is effectively used to find viruses and malware, as well as threats that the same virus and malware can pose to your computer. This allows agencies to update their databases on a regular basis by identifying different techniques for dealing with virus attacks by removing them from their devices. (Colombo, Oderkirk and Slawomirski, 2020). 1
MS Office Microsoft workplace is gadget-based tally software developed through Microsoft and introduced by using Bill Gates. It far taken into consideration a collection of server and consumer software and includes various applications such as MS word, MS Excel, MS Power Point, and e mail Outlook. The programming language of MS office is C ++, which lets in the software to work efficiently and efficiently. It use distinct types of generation to improve the capability of the software, inclusive of: allow MS office to create a variety of web packages and improvise software program using more advanced techniques, including the .internet Framework. Task 2: Explanation of the systems given below SS (Decision Support System) A selection guide is a computer utility used to enhance selections made using authority. The principle of this system is to examine a large volume of information of the employer and allow him to choose an effective database for an organization. It gathers all the statistics from specific regions to provide effective factual information to the customers. It is implemented to help customers make higher choices (Devi, Solanki & Laskar, 2020). It is largely an information widget that provides the client with relevant information from the record asset set to help him or her make a powerful decision. An example related to this device is GPS software that helps users navigate and locate multiple routes by considering various factors such as time, distance and cost. ESS (Executive Support System) Executive support systems allow clients to show corporate facts into quickly handy, executive-degree reports, particularly utilized by large agencies. It enables to enhance choice making for corporation and application-dependent EHS frameworks and gear. The characteristics of ESS are written down below:- It enables the user to extract the data and solve complex adversity that is related to computer based. It offers a fast and direct access to management reports and timely information. It is able to get entry to two kinds of records, external records and internal records. 2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
It provides in-depth overview of on line analytics like scenario evaluation, fashion evaluation, etc. An applicable instance for this device is Cambridge Systematics, which has advanced an ESS included into the department of shipping's investment plan in Canada. TPS (Transaction Processing System) It is a processed system that mainly records and executes routine every day transactions necessary to conduct enterprise activities. it is considered as an statistics processing system for business transactions, mainly involved with the amendment, collection and retrieval of all statistics related in one way or another to the transactions (Elhoseny et al., 2018). It is also called real-time processing. Therefore, all transactions and activities going on within the business or at the system do now not cause any delay in the execution. The gadget may be very consistent, reliable and efficient in terms of buying and selling process. It is the most broadly used technology for carrying out on line transactions and consequently it is also known as on-line Transaction Processing device. A applicable instance for this machine is that it is used inside the reservation systems of any business where a service or product is furnished to a specific customer. MIS (Management Information System) This system is essentially a study of technology, human beings, agencies and the look at of the relationships between them. It’s far a hard and fast of structures and processes that help users gather statistics from numerous resources then compile the data and present it in a readable layout (Haleem, 2021). A huge a part of the management of organizations use this machine to generate an awesome report, which gives the control group a top level view of all of the data collected for effective decision making. . As an instance, this device is used to set the price range plan for the following year. Thus, the supervisor can collect information and have a look at the outside and internal traits and with the assist of these records and developments, the manager can plan for this reason to forecast, next trend, finances for the year. KSM (Knowledge Management System) 3
This system is utilized by companies to easily convert complicated documents, queries and different records into a format easily available to external and internal clients. It enables companies’ assist customers locate their very own answers and keeps the documentation technique updated. In essence, it is a gadget used by employees and customers to share, create, and discover relevant statistics as quickly as possible. An example related to this gadget is putting in an employee referral system that may offer in-depth knowledge to new employees about the company's work lifestyle (Hassan Zadeh and et. al., 2019). Task 3: Globalisation and the effects of IT on globalization Globalizationreferstothegrowinginteractionandcollaborationamongvarious geographical territories implying exchange of ideas and innovations among various nations supporting business in a broad context. Globalization has resulted in increasing dependence of countries for the purpose of outsourcing and to facilitate exchange of technologies indicating a globalbusinessenvironment.Informationtechnologyplaysacriticalroleingrowing globalization among countries and it has redefined the processes in which businesses interacts and collaborates (Ijab and et. al., 2019). Greater inventions of information technology have made it possible for businesses to maintain interaction without maintaining physical presence. Advancement in digital platforms has supported growth of multinational companies through exchange of ideas and innovations in a highly competitive environment (Morgulev, Azar and Lidor, 2018). Moreover, these technical advancements have ensured fast procedures without delays due to enhanced services of information technology ensuring high accuracy while eliminating errors. Informationtechnologyhassignificantlyreducedtransportationcostsandother employment costs through facilitating communication through online platforms and also through reducing manual processes thus saving personnel costs. Development of World Wide Web is one of the greatest inventions of all time which has drastically expanded the scope of globalization. It promotes exchange of information to a great extent through internet of things which allows buyers and sellers to quickly interact and process transactions. Consumers all over the world belonging from different regions are becoming more aware about businesses through internet and fostering globalization significantly. 4
Task4:Definition,example,advantagesanddisadvantagesofdigital infrastructure Digital infrastructure states the technologies that provide the organisation essential information about operations (Moutselos, Kyriazis and Maglogiannis, 2018). This facilitates businesses become smarter and might supply excellent experiences to satisfy customer desires and improve worker productivity. The principle purpose of digital infrastructure is to do its pleasant to make the advancement of generation by breaking down the bounds of geographical barriers. There are numerous examples of virtual infrastructure including internet, broadband, cease-consumer system, communique satellites, and records facilities. Advantages of digital infrastructure Enhance Productivity: - Digital infrastructure enables the firms and organisation to exchangetheinnovationsandnotionswhichimprovisethescopeincreaseand development opportunities. On line enterprise has significantly multiplied and this is because of the green use of technology that permits the world's (Patel, Shah and Shah, 2020). Connection between the people: -Digital infrastructure makes the access of transmission of data and it enables all the people from every corner of the world to interact with each other and share the valuable information. This makes very easy for the entire person to communicate or convey the message to other individual by just simple steps. Boost economic growth: -The whole globe is changing very fast with a continuous improvement in the technologies which enables to have interaction with each other and proportion valuable facts. This makes it smooth for both people to communicate or deliver messages to others through easy steps. Adoption of new technologies: - The complete global is changing very unexpectedly with the non-stop development of technology assisting to develop the economic system. It enables businesses to enhance their operations and lets in them to create extra job possibilities, which has an effect at the growth of the employment rate. Disadvantages of digital infrastructure Increasing activities of crime: - The improvement of virtual infrastructure has one principal hassle which is the growth of digital crime. Hackers successfully use digital 5
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
technology to dedicate crimes because they can hide human beings via digital generation (Rashid,2018).Cybercriminalactivitiesaregrowingeverydaybecauseofthe proliferation of virtual networks. Issuesregardingthesecuritiesofdata:-Digitalinfrastructurethatpermitsthe transmission of large quantities of information over the net which additionally carries personal records. Because of increasing or stepped forward digitization, it is tough to maintain facts secure. Leaking a user's private statistics can cause the user being taken benefit of if the facts are passed directly to the wrong man or woman. Social media manipulation: - Digital infrastructure or virtual infrastructure offers all users with a new generation referred to as social media. This allows people to be manipulated through horrific facts. Concerns regarding privacy: - Digitization encourages invasion of user privacy between data exchanges throughout on-line systems. Because of the development of technology, it's miles tough for an normal character to secure their statistics from hackers. Task 5: Risks associated with information systems outsourcing and why is IT infrastructure so critical todigital transformation Risks associated with information systems outsourcing Information system outsourcing is a business practice that leverages external carriers to adopt the abilities of information generation: infrastructure solutions, software development, and software support. The risks related to data gadget outsourcing are defined beneath.- Dubious accessibility: - The companies which fully rely on the outside service have a major risk of failing its operation due to the failure of system which moreover leads to great loss of productivity of the firm. Threat of vulnerability: - Dealing with huge quantities of sensitive records may be very hard and is processed very often due to the involvement of third parties, which will increase the danger of maintaining sensitive information. Declining technical understanding: - Due to the lack of knowledge of the customer's IT services, ineffective outsourcing can occur. This will increase the chance that the 6
business enterprise will depend upon a third party and reduces the performance of the agency's operations. Hidden Costs: - Outsourcing of information systems sometimes causes different costs that are remain unidentified but they usually occurred in conducting the process which also involves the cost that is related to the third party service provider (Wang, Zheng and Zhang, 2020). Why is IT infrastructure so critical to digital transformation! IT infrastructure is the root of foundation of digitalization and the expansion of digital transformation. The firms who will fail to recognize the imperative of data centre infrastructure and centre will limit them agility. It is complex to implement a digital transformation in an organization because the firm requires investing in technology at the critical time if it wants to stable its business in future. Automation is the major requirement in the business that is considered as the key theme for the Digital infrastructure. It brings three key benefits to the firms that are speed, reliability and realms of costs. A strong and secure IT infrastructure is very much essential for the smoothly implementation of digital process. It enables a better coordination and collaboration between and within the organization. CONCLUSION From the above report, it has been concluded that technological advancements have brought a great deal of ease for businesses and is transforming the whole process of businesses as well as environment in which they operate. It has been analysed that development of information systems has facilitated a variety of functions in business enterprises as it helps in storing information and supporting multiple operations at a time. It has been determined that information technology plays a major role in expansion of businesses and globalization through invention of various collaborative tools. The internet of things facilitates exchange of information on a massive level implying larger scope and multiplied the dimensions of globalization to a huge extent. The outsourcing of information technology has its risks too which implies breach of privacy and arise security concerns. 7
REFERENCES Books and Journals Ayoub and et. al., 2019, December. The Impact of Organizational Culture on the Internal ControlsComponentsof AccountingInformationSystemsin theCity of Beirut, Lebanon. InInternational Conference on Big Data and Security(pp. 157-177). Springer, Singapore. Chen, P.T., 2018. Medical big data applications: Intertwined effects and effective resource allocation strategies identified through IRA-NRM analysis.Technological Forecasting and Social Change,130, pp.150-164. Colombo, F., Oderkirk, J. and Slawomirski, L., 2020. Health information systems, electronic medical records, and big data in global healthcare: Progress and challenges in OECD countries.Handbook of Global Health, pp.1-31. Devi, S.S., Solanki, V.K. and Laskar, R.H., 2020. Recent advances on big data analysis for malaria prediction and various diagnosis methodologies.Handbook of data science approaches for biomedical engineering, pp.153-184. Elhoseny and et. al., 2018. A hybrid model of internet of things and cloud computing to manage bigdatainhealthservicesapplications.Futuregenerationcomputersystems,86, pp.1383-1394. Haleem, A., 2021. Big Data Usage Intentionusing Toe Framework: Sri Lankan Context.Journal of Contemporary Issues in Business & Government,27(1). Hassan Zadeh and et. al., 2019. Social media for nowcasting flu activity: Spatio-temporal big data analysis.Information Systems Frontiers,21(4), pp.743-760. Ijab and et. al., 2019, December. Investigating big data analytics readiness in higher education usingthetechnology-organisation-environment(TOE)framework.In20196th InternationalConferenceonResearchandInnovationinInformationSystems (ICRIIS)(pp. 1-7). IEEE. Morgulev, E., Azar, O.H. and Lidor, R., 2018. Sports analytics and the big-data era.International Journal of Data Science and Analytics,5(4), pp.213-222. Moutselos, K., Kyriazis, D. and Maglogiannis, I., 2018, July. A web based modular environment for assisting health policy making utilizing big data analytics. In2018 9th International Conference on Information, Intelligence, Systems and Applications (IISA)(pp. 1-5). IEEE. Patel, D., Shah, D. and Shah, M., 2020. The intertwine of brain and body: a quantitative analysis on how big data influences the system of sports.Annals of Data Science,7(1), pp.1-16. Rashid, M.H., 2018, August. AMI smart meter big data analytics for time series of electricity consumption. In2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)(pp. 1771-1776). IEEE. Wang, J., Zheng, P. and Zhang, J., 2020. Big data an 8