Information Systems and Big Data Analysis

Verified

Added on  2023/06/11

|10
|3263
|54
AI Summary
This report discusses the methods and techniques of information technology, the impact of IT on globalization, and the importance of IT infrastructure in digital transformation. It also covers the risks associated with information systems outsourcing and provides examples of various systems such as McAfee, MS Office, and more.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Business Management
Cohort 2
BMP4005
Information Systems and Big Data Analysis
Information Systems & IT Solution
2019/2020
February 2020/Semester 1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................1
Task 1: Theories, methods and techniques to design and develop McAfee and MS Office...........1
Task 2: Explanation of the systems given below.............................................................................2
Task 3: Globalisation and the effects of IT on globalization...........................................................4
Task 4: Definition, example, advantages and disadvantages of digital infrastructure.....................5
Task 5: Risks associated with information systems outsourcing and why is IT infrastructure so
critical to digital transformation.......................................................................................................6
Why is IT infrastructure so critical to digital transformation!.........................................................7
CONCLUSION................................................................................................................................7
REFERENCES................................................................................................................................8
Document Page
INTRODUCTION
Information technology refers to the use of digital platforms and modern techniques for the
purpose of performing various functions. The application of information system has become
relevant and significant in context to organizational backgrounds as it supports a range of
operations for enterprises and corporations. Information systems are effectively used by
companies for analysing and storing necessary data and information (Ayoub and et. al., 2019). In
this report, the methods and techniques of information technology are discussed and explained in
detail. It reflects upon development of IT solutions and how they are used fulfilling a variety of
purposes. In addition to this, it also includes concept of globalization and how invention of
information technology has led to a highly globalized business environment. It also covers areas
of digital infrastructure stating its advantages as well as disadvantages. At last, it discuss risks
associated with outsourcing of information technology as well as well as it states why IT
infrastructure is so significant for transformation and modern advancements.
Task 1: Theories, methods and techniques to design and develop McAfee and
MS Office
McAfee
This is computer-based system software developed by John McAfee in 1987. This is a
well-known antivirus application that is used to detect viruses and malware and provides strong
protection for your laptop or desktop. (Chen, 2018). It scans the whole system and enhances the
learning without troubling about the viruses. Agile or continuous integration is the methodology
which helps to develop the design of all the software of McAfee. Agile is a methodology that
allows developers to build software using an iterative process that includes three phases
(planning, collaboration, and shipping), a general methodology realized by collecting comments.
Iterative devices help improve performance by finding bugs and fixing the same bugs. McAfee is
effectively used to find viruses and malware, as well as threats that the same virus and malware
can pose to your computer. This allows agencies to update their databases on a regular basis by
identifying different techniques for dealing with virus attacks by removing them from their
devices. (Colombo, Oderkirk and Slawomirski, 2020).
1
Document Page
MS Office
Microsoft workplace is gadget-based tally software developed through Microsoft and
introduced by using Bill Gates. It far taken into consideration a collection of server and
consumer software and includes various applications such as MS word, MS Excel, MS Power
Point, and e mail Outlook. The programming language of MS office is C ++, which lets in the
software to work efficiently and efficiently. It use distinct types of generation to improve the
capability of the software, inclusive of: allow MS office to create a variety of web packages and
improvise software program using more advanced techniques, including the .internet Framework.
Task 2: Explanation of the systems given below
SS (Decision Support System)
A selection guide is a computer utility used to enhance selections made using authority.
The principle of this system is to examine a large volume of information of the employer and
allow him to choose an effective database for an organization. It gathers all the statistics from
specific regions to provide effective factual information to the customers. It is implemented to
help customers make higher choices (Devi, Solanki & Laskar, 2020). It is largely an information
widget that provides the client with relevant information from the record asset set to help him or
her make a powerful decision. An example related to this device is GPS software that helps users
navigate and locate multiple routes by considering various factors such as time, distance and
cost.
ESS (Executive Support System)
Executive support systems allow clients to show corporate facts into quickly handy,
executive-degree reports, particularly utilized by large agencies. It enables to enhance choice
making for corporation and application-dependent EHS frameworks and gear. The characteristics
of ESS are written down below:-
It enables the user to extract the data and solve complex adversity that is related to
computer based.
It offers a fast and direct access to management reports and timely information.
It is able to get entry to two kinds of records, external records and internal records.
2

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
It provides in-depth overview of on line analytics like scenario evaluation, fashion
evaluation, etc.
An applicable instance for this device is Cambridge Systematics, which has advanced an
ESS included into the department of shipping's investment plan in Canada.
TPS (Transaction Processing System)
It is a processed system that mainly records and executes routine every day transactions
necessary to conduct enterprise activities. it is considered as an statistics processing system for
business transactions, mainly involved with the amendment, collection and retrieval of all
statistics related in one way or another to the transactions (Elhoseny et al., 2018). It is also called
real-time processing. Therefore, all transactions and activities going on within the business or at
the system do now not cause any delay in the execution. The gadget may be very consistent,
reliable and efficient in terms of buying and selling process. It is the most broadly used
technology for carrying out on line transactions and consequently it is also known as on-line
Transaction Processing device. A applicable instance for this machine is that it is used inside the
reservation systems of any business where a service or product is furnished to a specific
customer.
MIS (Management Information System)
This system is essentially a study of technology, human beings, agencies and the look at
of the relationships between them. It’s far a hard and fast of structures and processes that help
users gather statistics from numerous resources then compile the data and present it in a readable
layout (Haleem, 2021). A huge a part of the management of organizations use this machine to
generate an awesome report, which gives the control group a top level view of all of the data
collected for effective decision making. . As an instance, this device is used to set the price range
plan for the following year. Thus, the supervisor can collect information and have a look at the
outside and internal traits and with the assist of these records and developments, the manager can
plan for this reason to forecast, next trend, finances for the year.
KSM (Knowledge Management System)
3
Document Page
This system is utilized by companies to easily convert complicated documents, queries
and different records into a format easily available to external and internal clients. It enables
companies’ assist customers locate their very own answers and keeps the documentation
technique updated. In essence, it is a gadget used by employees and customers to share, create,
and discover relevant statistics as quickly as possible. An example related to this gadget is
putting in an employee referral system that may offer in-depth knowledge to new employees
about the company's work lifestyle (Hassan Zadeh and et. al., 2019).
Task 3: Globalisation and the effects of IT on globalization
Globalization refers to the growing interaction and collaboration among various
geographical territories implying exchange of ideas and innovations among various nations
supporting business in a broad context. Globalization has resulted in increasing dependence of
countries for the purpose of outsourcing and to facilitate exchange of technologies indicating a
global business environment. Information technology plays a critical role in growing
globalization among countries and it has redefined the processes in which businesses interacts
and collaborates (Ijab and et. al., 2019). Greater inventions of information technology have made
it possible for businesses to maintain interaction without maintaining physical presence.
Advancement in digital platforms has supported growth of multinational companies
through exchange of ideas and innovations in a highly competitive environment (Morgulev, Azar
and Lidor, 2018). Moreover, these technical advancements have ensured fast procedures without
delays due to enhanced services of information technology ensuring high accuracy while
eliminating errors.
Information technology has significantly reduced transportation costs and other
employment costs through facilitating communication through online platforms and also through
reducing manual processes thus saving personnel costs.
Development of World Wide Web is one of the greatest inventions of all time which has
drastically expanded the scope of globalization. It promotes exchange of information to a great
extent through internet of things which allows buyers and sellers to quickly interact and process
transactions. Consumers all over the world belonging from different regions are becoming more
aware about businesses through internet and fostering globalization significantly.
4
Document Page
Task 4: Definition, example, advantages and disadvantages of digital
infrastructure
Digital infrastructure states the technologies that provide the organisation essential
information about operations (Moutselos, Kyriazis and Maglogiannis, 2018). This facilitates
businesses become smarter and might supply excellent experiences to satisfy customer desires
and improve worker productivity. The principle purpose of digital infrastructure is to do its
pleasant to make the advancement of generation by breaking down the bounds of geographical
barriers. There are numerous examples of virtual infrastructure including internet, broadband,
cease-consumer system, communique satellites, and records facilities.
Advantages of digital infrastructure
Enhance Productivity: - Digital infrastructure enables the firms and organisation to
exchange the innovations and notions which improvise the scope increase and
development opportunities. On line enterprise has significantly multiplied and this is
because of the green use of technology that permits the world's (Patel, Shah and Shah,
2020).
Connection between the people: - Digital infrastructure makes the access of transmission
of data and it enables all the people from every corner of the world to interact with each
other and share the valuable information. This makes very easy for the entire person to
communicate or convey the message to other individual by just simple steps.
Boost economic growth: - The whole globe is changing very fast with a continuous
improvement in the technologies which enables to have interaction with each other and
proportion valuable facts. This makes it smooth for both people to communicate or
deliver messages to others through easy steps.
Adoption of new technologies: - The complete global is changing very unexpectedly with
the non-stop development of technology assisting to develop the economic system. It
enables businesses to enhance their operations and lets in them to create extra job
possibilities, which has an effect at the growth of the employment rate.
Disadvantages of digital infrastructure
Increasing activities of crime: - The improvement of virtual infrastructure has one
principal hassle which is the growth of digital crime. Hackers successfully use digital
5

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
technology to dedicate crimes because they can hide human beings via digital generation
(Rashid, 2018). Cybercriminal activities are growing every day because of the
proliferation of virtual networks.
Issues regarding the securities of data: - Digital infrastructure that permits the
transmission of large quantities of information over the net which additionally carries
personal records. Because of increasing or stepped forward digitization, it is tough to
maintain facts secure. Leaking a user's private statistics can cause the user being taken
benefit of if the facts are passed directly to the wrong man or woman.
Social media manipulation: - Digital infrastructure or virtual infrastructure offers all
users with a new generation referred to as social media. This allows people to be
manipulated through horrific facts.
Concerns regarding privacy: - Digitization encourages invasion of user privacy between
data exchanges throughout on-line systems. Because of the development of technology,
it's miles tough for an normal character to secure their statistics from hackers.
Task 5: Risks associated with information systems outsourcing and why is IT
infrastructure so critical to digital transformation
Risks associated with information systems outsourcing
Information system outsourcing is a business practice that leverages external carriers to
adopt the abilities of information generation: infrastructure solutions, software development, and
software support. The risks related to data gadget outsourcing are defined beneath.-
Dubious accessibility: - The companies which fully rely on the outside service have a
major risk of failing its operation due to the failure of system which moreover leads to
great loss of productivity of the firm.
Threat of vulnerability: - Dealing with huge quantities of sensitive records may be very
hard and is processed very often due to the involvement of third parties, which will
increase the danger of maintaining sensitive information.
Declining technical understanding: - Due to the lack of knowledge of the customer's IT
services, ineffective outsourcing can occur. This will increase the chance that the
6
Document Page
business enterprise will depend upon a third party and reduces the performance of the
agency's operations.
Hidden Costs: - Outsourcing of information systems sometimes causes different costs
that are remain unidentified but they usually occurred in conducting the process which
also involves the cost that is related to the third party service provider (Wang, Zheng and
Zhang, 2020).
Why is IT infrastructure so critical to digital transformation!
IT infrastructure is the root of foundation of digitalization and the expansion of digital
transformation. The firms who will fail to recognize the imperative of data centre infrastructure
and centre will limit them agility. It is complex to implement a digital transformation in an
organization because the firm requires investing in technology at the critical time if it wants to
stable its business in future. Automation is the major requirement in the business that is
considered as the key theme for the Digital infrastructure. It brings three key benefits to the firms
that are speed, reliability and realms of costs. A strong and secure IT infrastructure is very much
essential for the smoothly implementation of digital process. It enables a better coordination and
collaboration between and within the organization.
CONCLUSION
From the above report, it has been concluded that technological advancements have brought
a great deal of ease for businesses and is transforming the whole process of businesses as well as
environment in which they operate. It has been analysed that development of information
systems has facilitated a variety of functions in business enterprises as it helps in storing
information and supporting multiple operations at a time. It has been determined that information
technology plays a major role in expansion of businesses and globalization through invention of
various collaborative tools. The internet of things facilitates exchange of information on a
massive level implying larger scope and multiplied the dimensions of globalization to a huge
extent. The outsourcing of information technology has its risks too which implies breach of
privacy and arise security concerns.
7
Document Page
REFERENCES
Books and Journals
Ayoub and et. al., 2019, December. The Impact of Organizational Culture on the Internal
Controls Components of Accounting Information Systems in the City of Beirut,
Lebanon. In International Conference on Big Data and Security (pp. 157-177). Springer,
Singapore.
Chen, P.T., 2018. Medical big data applications: Intertwined effects and effective resource
allocation strategies identified through IRA-NRM analysis. Technological Forecasting
and Social Change, 130, pp.150-164.
Colombo, F., Oderkirk, J. and Slawomirski, L., 2020. Health information systems, electronic
medical records, and big data in global healthcare: Progress and challenges in OECD
countries. Handbook of Global Health, pp.1-31.
Devi, S.S., Solanki, V.K. and Laskar, R.H., 2020. Recent advances on big data analysis for
malaria prediction and various diagnosis methodologies. Handbook of data science
approaches for biomedical engineering, pp.153-184.
Elhoseny and et. al., 2018. A hybrid model of internet of things and cloud computing to manage
big data in health services applications. Future generation computer systems, 86,
pp.1383-1394.
Haleem, A., 2021. Big Data Usage Intentionusing Toe Framework: Sri Lankan Context. Journal
of Contemporary Issues in Business & Government, 27(1).
Hassan Zadeh and et. al., 2019. Social media for nowcasting flu activity: Spatio-temporal big
data analysis. Information Systems Frontiers, 21(4), pp.743-760.
Ijab and et. al., 2019, December. Investigating big data analytics readiness in higher education
using the technology-organisation-environment (TOE) framework. In 2019 6th
International Conference on Research and Innovation in Information Systems
(ICRIIS) (pp. 1-7). IEEE.
Morgulev, E., Azar, O.H. and Lidor, R., 2018. Sports analytics and the big-data era. International
Journal of Data Science and Analytics, 5(4), pp.213-222.
Moutselos, K., Kyriazis, D. and Maglogiannis, I., 2018, July. A web based modular environment
for assisting health policy making utilizing big data analytics. In 2018 9th International
Conference on Information, Intelligence, Systems and Applications (IISA) (pp. 1-5).
IEEE.
Patel, D., Shah, D. and Shah, M., 2020. The intertwine of brain and body: a quantitative analysis
on how big data influences the system of sports. Annals of Data Science, 7(1), pp.1-16.
Rashid, M.H., 2018, August. AMI smart meter big data analytics for time series of electricity
consumption. In 2018 17th IEEE International Conference On Trust, Security And
Privacy In Computing And Communications/12th IEEE International Conference On
Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 1771-1776). IEEE.
Wang, J., Zheng, P. and Zhang, J., 2020. Big data an
8
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]