Management Information System: Facebook's Data Privacy Crisis and GDPR

Verified

Added on  2023/01/12

|19
|6748
|64
AI Summary
This document provides insights into the steps taken by Facebook to overcome data privacy crisis, the purpose of GDPR, and the challenges faced by social networking websites. It also explores Facebook's e-business and revenue models, their benefits and challenges.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
MANAGEMENT
INFORMATION
SYSTEM

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................1
PART A...........................................................................................................................................1
Explanation of steps Facebook took to overcome data privacy crisis....................................1
Explanation of purpose of GDPR and description of privacy and data protection requirements
................................................................................................................................................2
Description of Facebook’s e-business and revenue models, their benefits and challenges.. .3
Evaluation of challenges faced by social networking websites and preparation for the same5
PART 2............................................................................................................................................6
Ques1. Examples of Mobile Applications and their business functions................................6
Ques2. Distinguishing between data and information............................................................7
Ques3. Features of the system chosen and reasons behind choice........................................8
Ques4. Description of input, processing, and output of the UPS’s package tracking system8
Ques5. Three examples of RFID for three business...............................................................9
Geographical information system.......................................................................................9
Three primary component of customer relationship management.................................9
Ques6. Comparison of numbers and application of Porter’s Five Forces and Competitive
Strategies..............................................................................................................................10
Ques7. Ethical Concerns and Security threats, Challenges and Vulnerabilities of Website 11
Ques8. Description of OLAP, Cloud Computing and other MIS software..........................13
CONCLUSION..............................................................................................................................14
REFERENCES..............................................................................................................................16
Document Page
INTRODUCTION
Management Information System refers to information system that is associated with
decision making within companies, along with analysing, control and coordination of
information available with the firm. With rise in digitalisation, it is one of the most crucial
systems which could be incorporated in an organisation, due to its effectiveness in managing a
range of information, which is necessary for the company to sustain, as well as grow within their
respective sectors. Furthermore, it also provides effective assistance to companies in regards to
using a range of technological alternatives that could dynamically and flexibly be used within
their respective organisations (Paré and et. al., 2015).
Therefore, in regards to the report below is divided into two parts. The first one is
associated with the case study of Facebook in relation to their Data Privacy issue, which includes
the steps which were taken by the organisation to overcome its data privacy crisis. Along with
this, it also includes purpose of GDPR and its several key requirements. Moreover, the overall e-
Business model of the company has been covered, including evaluation of key challenges which
social networking sites face. As for the report’s second part, it covers purposes of several mobile
applications, difference between data and information, an insight within the UPS tracking
system, examples related to RFID and information about GIS and CRM. Along with this, the
second part of this report also includes application of Porter’s Five Forces and Competitive
Strategies, along with ethical concerns related to storing and analysis of data and details about
OLAP and DBMS systems/
PART A
Explanation of steps Facebook took to overcome data privacy crisis
As per the case, it is clear that Facebook breached the privacy concerns of a lot of
individuals and surely jeopardised their personal and confidential information. However, in this
regard, the company took certain steps that are being explained below:
Restriction on Data Access: Facebook restricted the access of data that could have been
accessed by developers. The reason for this is because this data could also be hacked by
unethical parties, which could lead to breach of privacy (Chatterjee and et, al., 2015).
“Access Your Information” feature: Another step which the company took to overcome
its privacy issue is associated providing a feature to individuals in context of accessing
1
Document Page
whatever activity they have performed on the website, as well as ways in which they
could manage their personal information and induce restrictions for third parties to view
specific information about them (Walsham, 2015).
Investigation of Applications: Another prominent step which was taken by this
organisation to overcome its data crisis issue is related to effective investigation
applications that has been using the data of customers through Facebook. This led the
company in taking action against the parties which are suspicious and deals in unethical
activities.
Hence, the company has taken effective steps in context of overcoming the data crisis issue
and providing safe and appropriate alternatives to customers who shares their personal
information with the company. Apart from this, the firm’s privacy policy is quite effective when
it comes to assisting individuals of managing and deleting their personal data. Both these
elements are explored as under:
Managing Data: In terms of managing the data, Facebook allow its users to have access
to their posts, profile, friend lists, comments, search histories, news feeds, as well as
locations. This provides the power to individuals in managing their own data, as well as
regulates the same in context of being seen or accessed by third parties.
Delete their Own Information: Facebook also provides its customers with the feature
associated with deleting their own personal information. It could be associated with their
posts, pictures, timelines, shares, likes, friends and even the search history, which
enhances the level of privacy and security for the customers and provides them with full
control and autonomy in relation to deleting the information they wish to (Vom Brocke
and Rosemann, 2014).
Explanation of purpose of GDPR and description of privacy and data protection requirements
GDPR refers to General Data Protection Regulation, which is a law imposed upon
protection of data and information, along with privacy of individuals within the European Union,
as well as European Economic Area. Through this regulation is imposed on people living in
these areas only, however, it also regulates the transfer of data from these geographical locations.
There are several purposes which GDPR fulfils for people in these areas, some of these are
explored below:
2

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Rules Data Protection: The most appropriate purpose which GDPR fulfils is associated
with imposing rules for data protection. It imposes several norms for organisations, as
well as for customers to share their information to other websites or portals, which allows
exercising effective protection of information that is shared by the public (Prat, Comyn-
Wattiau and Akoka, 2015).
Law Enforcement: Another prominent purpose of GDPR is that it imposes several laws
and policies over sharing, receiving and using data and information that is available
online. It further helps in restricting the users or developers to unethically use these
information for their own personal objectives.
Alongside the purpose, it is also necessary to understand several privacy and data protection
requirements of the GDPR to further elaborate the working of this regulation. Therefore, few of
these requirements are described below:
Consent: The most crucial requirements of GDPR in relation to privacy and data
protection is that it is crucial that consent of parties is acquired before processing the
data that is directly related to them.
Anonymous Status: Another crucial requirement of GDPR is related to changing the
status of the acquired information as anonymous so that crucial information of
individuals could appropriately and effectively be protected from misuse.
Notifications: This is yet another crucial requirement in relation to privacy and data
protection that is practiced by GDPR is related to the fact that proper and timely
notifications be provided to individuals in case their data is being accessed by third
party, or is being used anonymously. This would provide better and more effective
protection to the people as well as to their personal data and information.
Data Protection Officers: GDPR is very particular when it comes to advising and
suggesting companies towards data protection and privacy and hence, one requirement
of this regulation is that firms must appoint data protection officers within the companies
to enhance the safety and security provided to the personal information of individuals
(Galliers and Leidner, 2014).
Description of Facebook’s e-business and revenue models, their benefits and challenges
Facebook’s E-business Model:
3
Document Page
The e-business model of Facebook is very diverse, as it provides a range of services to
the customers worldwide. For instance, it has a social media handle by the name Facebook, as
well as a messaging application by the name of Facebook Messenger, which allows customers to
share messages, pictures, videos and animations to one another. Moreover, this attention based
business model also has companies associated with the same like Whatsapp, Instagram and
Oculus, which are very effective in providing services to individuals (Liang, and et. al., 2015).
Facebook’s Revenue Model:
Facebook has a vast revenue model as it generates its revenue from a range of methods.
For example, it generates revenue from advertisements from other companies, along with the
payments which individuals provide to the company for their business operations through the
portal. Moreover, it also generates revenue through Oculus and using social media as a
workplace.
There are several benefits and challenges that are related to Facebook and are necessary to
be understood. Some of these elements are described below:
Benefits:
Social Integration: On an individual level, the major business benefit of Facebook is
related to social integration. It allows individuals from global ends to integrate socially
through this web portal, which provides a two-way benefit. For the firm, it means higher
individuals are attached form the company, which brings in more revenue. As for the
people, it becomes the means of networking, which helps them in enhancing their
business and corporate operations globally.
Promotion: Another prominent business benefit of Facebook is that it has transformed as
a means of promotion for various national and multinational organisations. Hence, with
every promotional material, this portal earns high profit which allows it to sustain and
grow within the marketplace. As for the companies which promote their offerings,
Facebook provides an opportunity for them to enhance their brand awareness which is
effective to increase their sales and revenue numbers (D'Arcy, Herath and Shoss, 2014).
Challenges:
Time Constraint: Setting and running up pages on Facebook requires a lot of time, as
well as investment to ensure that their brand awareness and likings are enhancing and is
4
Document Page
preferred by customers. However, this could be a very big challenge for small companies
which don’t have ample human resources and effective time to ensure this aspect.
Reputation: When it comes to data privacy, the new policies have been effective, but it
does not stop individuals to criticise a brand. People sometimes go to extremes to defame
a brand which then gets viral and becomes negative for its reputation.
Evaluation of challenges faced by social networking websites and preparation for the same
There are several social networking websites available for individuals to socialise and
develop a personal and professional network on. However, these social networking sites face
several challenges which are crucial to be understood and dealt with in order to enhance their
sustainability and smooth business functioning within the marketplace.
Hence, in regards to this, below are certain challenges and preparations for the same:
Privacy Concerns: One of the major challenges which social networking websites is facing
is related to privacy. There are several individuals and corporations that share crucial and
confidential data with the websites which is later used for either the firm’s business purposes
or for other corporate function. However, this data could be hacked or could be accessed due
to weaker encryption and protection that could jeopardise the safety and privacy of the
information. In order to prepare for the same, the companies must ensure proper encryption
associated with their personal data, along with hiring professionals which could track the
usage of data and any unauthorised access as well.
Competition: Another prominent challenge related to social networking websites is
associated with enhanced competition within the social media. There are several websites
which have now grabbed the attention of individuals globally that makes tough for
companies to sometimes track, which leads to wastage of efforts and investment. Hence, in
order to deal with the same, it is very crucial for the firms to keep a track on the web traffic
of each of the networking sites, as well as ensure that it has a presence of each of the major
social networking portals to enhance the customer base and gain a competitive edge.
Brand Name: As mentioned above, social networking sites could be a source of promotion
as well as could present challenges in terms of brand name of the country. This could be
done by competitive organisations, critics or other individuals who might have had negative
experiences with the company. to prepare from this, firm must prepare communication
channels which could ensure that a constant medium of information exchanges be
5

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
appropriately and effectively formulated and is used. This would help companies to resolve
customer queries and enhance transparency (Abdul-Hamid, 2014).
PART 2
Ques1. Examples of Mobile Applications and their business functions
Mobile applications are now become one of the crucial parts of everyone’s life, where it
supports people to simplify their day to day work, it also helps businesses to improve their
operations by getting connected over a network to their stakeholders. There are number of
mobile applications that are used within business functions such as LinkedIn which support in
performing recruitment business functions, Hootsuite that help in monitoring marketing function
and google analytical app that support in performing market research function of an organisation
(Kim, 2015). These all are the mobile based application which support a business in decision
making, improving its efficiency and solving the business problem which can be better
understood using following description,
LinkedIn: This is an application which help in connecting the business and job aspirants at a
single platform. An organisation can pool talent from LinkedIn which allow it in assessing
range of people having different skills and expertise to make better decision over
recruitment that further help in enhancing performance of organisation.
Hootsuite: It is an application which allows a business to access all its social media pages
over a single application. This saves time and allows the marketer to put their focuses
toward the marketing strategies or stuff without rooming around different applications which
support in improving operational efficiency. Other than this by assessing all app at single
platform it becomes easier to identify gap that are creating issues so that appropriate
decision can be undertaken to resolve them.
Google Analytical App: It helps in keeping track of the people that visit website of
organisation and product which is being viewed by people. This helps it in making decision
to represent the new arrivals with the product that capture their decision (Shi, Lee. and
Whinston, 2016). Other than this analytic data will further support in assessing the areas
where a business is lacking behind so that effective strategies can be formulated to resolve
those problems in timely manner which further support in improving efficiency.
6
Document Page
Ques2. Distinguishing between data and information
Information system is basically defined as the software which support in organising and
analysing the raw data and convert it into a more meaningful information so that it can be used as
a base to take effective decision for the functioning of a business. The data and information are
different from one another that can be understood using following information,
Data Information
Data is a raw ands unorganised facts which is
required to be proceed in order to extract
meaning behind it as gathered data is useless
until it gets organised.
For example, when an organisation gathered
data regarding number of responses it get from
customers within particular set of time period.
When a gathered data is being processed,
structured, organised and presented within a
given context so that it can be become more
useful, then it is known as information.
For example, when the gathered data is
characterised in term of sales order, sources
through customers access and positive or
negative feedback, then it became the
information which help in formulating
decision.
The information system is mainly consisting of three dimensions such as organisational,
management and technological dimensions. Among them organisational dimension of
information system consists of functional specialties, culture, business process, organisational
hierarchy and political interest group which all support in planning and executing the
information system effectively (Al-Mamary. and et. al.,2014). On other side, management
dimension involves strategy, leadership and management behaviour that support in coordinating
and monitoring different work so that; organisational objectives can be achieved. While,
technological dimension involves computer software, hardware, technology and networking for
carrying out functions effectively. These all technologies mainly represent the resources that are
being shared in whole organisation and constitute an information technology infrastructure
which ensure smooth execution of operations as it help an organisation in building up a specific
system which provide a smooth flow of information and execution of actions effectively.
7
Document Page
Ques3. Features of the system chosen and reasons behind choice
By evaluating the problem of VES manufacturer it has been identified that Transaction
processing system would be more beneficial for the company as it help in keeping track with all
the transactions being performed. It is mainly a information processing system for a business
which involves the collection, modification as well as retrieval of all the transaction data. This
support in keeping track of all the data consolidated within a single system that help in ensuring
better management of data for effective functioning of business. The main reason behind
adopting this information system is that VES as it purchases majority of its vacuum part from
overseas suppliers which require it to keep track of all the transaction which make it easier to
keep record of order processing, billing, payment etc. Other than this it also maintains three
warehouses where stock is required to be tracked so that them remain product available as per
demand.
The Transaction processing system consider to be helpful as it is a system designed for
keeping track of transaction program and more helpful when deal is made over internet or
without a direct interaction among dealer as in case of VES. Its beneficial features are rapid
response, as TPS system help in providing quicker responses about product delivery so that
customers are not required to wait for longer period to get their product. Another important
feature is that it is a stock control system which process all the movement into within or outside
the business. It also acts as a system that support in tracking the record for requirement of raw
material in term of production process so that delay in work can be avoided.
Ques4. Description of input, processing, and output of the UPS’s package tracking system
It is an automated packaging tracking system which support in monitoring the packages
throughout the whole delivery process. This processing system mainly contains of three stages
such as input, processing and output. Among them Input stage includes the information related
with packaging, customer signature, delivery, current location, billing, time-card data as well as
clearance documentation. On other side, processing stage involve transition of data from central
computer and storage for its retrieval. This storage of data further helps in tracking the customer
account, drivers and other criteria for ensuring effective delivery of product. At last output stage
involve pickup and delivery time, location, route and package recipient. Additionally, it also
includes several reports such as packages for specific account or driver route for preparing a
management report.
8

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
There are three main dimensions on which UPS tracking system depends such as
organisational, management and technological dimension. Among them organisational
dimension involves a procedure of tracking packages as well as managing inventory and
providing information to centres (Ming, eBay Inc, 2014). This all help in organising all the
activities at one end to ensure efficient delivery. Management dimension help the people
working at service level by enhancing the ease of sending a package through UPS and checking
delivery status. Technology dimension involve software, network and compute system that
provide access to worldwide and provide better services.
Ques5. Three examples of RFID for three business
A Radio frequency identification is mainly used by several retailers in order to enhance the
customer shopping experience by simplifying their purchasing process. For example, Luxury
retailer Neiman Marcus uses RIFD as MemoMi memory mirror which allow the shoppers to get
a 360-degree view of product and its appearance in term of colour, pattern etc. Another example
of RFID can be seen as ‘Amazon GO store’ which allow the customers to grab item from store
and leave, the payment will automatically be deducted from their registered account. Another
example of RIFD can be seen as a minimising the issue of out of stock situation, as it help in
keeping track of stock items from warehouse shelves to sales floor (Shin and Eksioglu, 2014).
Geographical information system
It is a computer-based system used for capturing, checking, storing and displaying the data
related with the position on earth’s surface. GIS help in showing different kind of data on a
single map such as building, street etc. which enable people to easily analyse as well as
understand the pattern and relationship among different things.
Three primary component of customer relationship management
The customers relationship management is a software that act as a gateway for getting business
from customers by improving sale. There are three main components of CRM, such as,
Marketing Automation: CRM automatize several marketing practices such as streaming
marketing campaign across email, website etc, lead analytics and ensuring a better flow
of information to customers that help in attracting them to organisational offers.
Sales Force Automation: It provide a link between marketing and sales department,
where by arranging campaign the marketing can push leads to sale team which then help
9
Document Page
in converting them into customer with appropriate strategy (Fan, Tao, Deng and Li,
2015).
Customer Services: It is most effective component that help a company in keeping
customers satisfied by tracking their responses and feedback to resolve their issues and
provide after sale services.
Ques6. Comparison of numbers and application of Porter’s Five Forces and Competitive
Strategies
Comparison and Interpretation of numbers in relation to above mentioned numbers
Illustration 1: WORLD INTERNET USAGE AND POPULATION STATISTICS, 2020
(Source: Internet World Stats, 2020)
According to the above mentioned data, there are several interpretations that could be
done which are mentioned below:
United States:
As for 2016 data, almost 10 percent users belonged to US, which has substantially reduced to
around 5% in the first quarter of 2020.
China
In context to China, around 61.2% of the overall population has enhanced the internet usage
within the country and which was just 23% in 2013 (China has 854 mln internet users: report,
2020). Hence, this number has appropriately increased.
India:
10
Document Page
As of India, the study showed an estimate of around 16% of the population within the country
having access to internet. However, recent data related to the same has seen the overall growth of
this number to around 87% in 2019, which is a massive increase in the within the same (Internet
users in India to reach 627 million in 2019, 2020).
Discussion of new numbers in relation to globalisation
The above mentioned numbers and the changes denoted above have been quite effective
for the overall internet sector of the world, as there is a huge jump to around 1.5 billion of the
total world population. In context of globalisation, this means that the global landscape of
business has enhanced and would continue to expand in the years to come. Hence, there are
several opportunities that have been arising from these numbers, which are mentioned below:
Integration: One of the major opportunities which the related to the usage of internet is
that it would allow communities, businesses and individuals to integrate in an even more
appropriate manner. This enhances the scope of trade within the world and global
expansion of industries which would be making it easier for the organisations to share
their resources in an appropriate and effective manner (Chatterjee, Sarker and Valacich,
2015).
Competitiveness: As for Porter’s Five Forces, it could be interpreted that the existing
rivalry, as well as new entrants would definitely be stronger and threatening for the
companies providing these services and hence, this would be an opportunity for these
organisations to be more competitive and innovative to stay ahead in the market.
Cost and Differentiation: In relation to the competitive strategies, the firms have a major
opportunity to further enhance these numbers by offering differentiated, as well as lower
cost services to customers within their region so that more customers become engaged
with the firm and ensures better digitalisation and internet usage in future.
Ques7. Ethical Concerns and Security threats, Challenges and Vulnerabilities of Website
Ethical Concerns related with storing and analysis of user data
For an e-Commerce website that is associated with dealing in a variety of products and
services, there are several ethical concerns associated with storing and analysing user data that is
required to be analysed by the organisation. Some of these concerns are explored below:
Consent: One of the most severe concerns which the web site must have towards acquiring
data from the users is their consent. There must be terms and conditions highlighted within
11

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
the logs where customers are supposed to fill out their personal details and hence, their
consents to these terms must be acquired by the company before proceeding towards storing
their valuable information within the firm’s databases (Abualoush, and et, al., 2018).
Ethical Usage: After acquiring and storing the information, another ethical consideration for
the website would be the ethical usage of the information. This means, that under no
circumstances should the firm use the personal information of clients without their consent,
or for the organisation’s personal gain. Moreover, the sharing of information must only be
done interdepartmentally and with a safe and secured manner to enhance the protection
given to these pieces of information (Al Shobaki and Naser, 2016).
Limiting Access: This ethical concern is related to providing access to individuals to use the
personal information of individuals. This access must be limited and should only be
provided to responsible and ethical individuals on whom the company could exercise their
authority and share responsibility towards protecting this data from any misuse.
Security Threats, Challenges and Vulnerabilities associated with website and its
minimisation
There are certain security threats, challenges and vulnerabilities which this e-commerce
website could encounter that are necessary to be eliminated to strengthen its application towards
privacy and data protection. Some of these elements are highlighted as under
Authentication Breach: One crucial threat for the company is related to breach in
authentication in context of accessing and sharing the information. This might be a big
threat as this could put the safety of confidential information into risk. Hence, to prevent
the same, In order to minimise the threat, the company is required to develop a
framework that has its own codes encrypted, which makes it practically impossible for
others to breach the information.
Mis-configuration: A challenge that could be faced by this website is related to mis-
configuration within the security elements. This could cause viruses or malware to enter
the user’s medium as soon as they access the website, which again, could be a risk
directed towards corruption of their systems. To minimise this challenge, the company
must hire professional help to ensure that the configuration of this website is done
effectively without any flaws and scope of errors (Naser and Al Shobaki, 2016).
12
Document Page
Exposure of Data: This vulnerability is related to exposure of sensitive information
either out in the public or to inappropriate third parties, which could be a big challenge
for the firm. To eliminate the same, the firm must follow simple norms, such as storing
credit card information of users, or other payment methods that would contribute towards
its threat of exposure.
Ques8. Description of OLAP, Cloud Computing and other MIS software
Explanation of benefits of Online Analytical Processing (OLAP) for business
Online Analytical Processing (OLAP) is a method to perform multiple analysis over data
and information stored within the software of the firm. It a range of benefits for business that are
explained as under:
It provides a very high speed of processing the data to businesses, which could be
accessed any time simultaneously and could provide a detailed insight onto the
information, such as answering the queries about a particular customer.
The representation of data within OLAP is in cubes and each edge of this cube includes
several attributes of businesses processes that are analysed. Hence, this allows users to
view a multidimensional representation of data that is very effective for business (Shiau,
Chen and Tsai, 2015).
Discussion of Cloud Computing in terms of Fuelling Open Innovation
Cloud Computing is a system of storing data over a network which could be available on
demand. In context of innovations, it fuels open innovation in an appropriate manner. The most
appropriate manner in which this takes place is associated with resource allocation, where it
allows the firm to save up costs in relation to investment in innovation. Another way through
which it fuels open innovation is associated with the fact that it allows the systems of the
company to integrate, along with creation of a hub, which helps in facilitating open innovation
through improved business intelligence, better communication and interaction amongst
individuals and components.
Distinguishing between traditional File Organisation and DBMS
There are a number of differences between the traditional file organisation, as well as
Database Management System. For instance, the former allows in storing the data within a hard
disk and has a simple application, whereas DBMS allows user to store, access, as well as
manipulate the stored information conveniently. In context of automation, the traditional file
13
Document Page
organisation requires the users to store, change, access and remove data manually, which
consumes time (Wager, Lee and Glaser, 2017). On the other hand, DBMS uses interfaces such as
SQL to ensure that the data is searched, manipulated and effectively accessed quickly and more
conveniently. Another point of difference between these two methods is that the traditional
method could not recover the lost data due to limitations in its backup, whereas DBMS is
programmed in a manner that it is efficient towards backing up data required by the users.
Explanation of connection between Firm, its IT Infrastructure and Business Capabilities
There is a very direct and effective connection between the company, its IT
infrastructure, as well as business capabilities. For instance, the infrastructure of the company
handles several business functions, such as telecommunications, computing platforms,
management of information, Research and Development and so forth, which are crucial to drive
its performance within the market. Hence, the stronger this infrastructure is, the more benefit the
firm would be acquiring in terms of enhancing its capabilities within the marketplace (Laudon
and Laudon, 2015).
CONCLUSION
Thus, it could be concluded from the report above that Management Information System
is very crucial and important for an organisation to adopt in context of appropriately and
effectively managing the data and information in a sound manner. It is necessary to take
organisations like Facebook to study and analyse the issues that are related to data privacy, the
importance for organisations to follow the same, along with steps which could be taken by such
companies to ensure effectiveness in protecting data of their stakeholders. Furthermore, it is
crucial that certain mobile applications are analysed on the basis of business functions which
they support.
In addition to this, it is imperative that difference between data and information is
understood using information system. Furthermore, there are several terms which are associated
with management information system, such as UPS’ package tracking system, RFID, GIS and
CRM which are necessary to be understood in terms of their characteristics and components
within them respectively. Lastly, it is important to understand application of Porter’s Five Forces
and Competitive Strategy is crucial to determine changes in globalisation and identification of
business opportunities, along with respective ethical concerns for organisations after owning
14

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
websites, as well as usage, benefits and nature of different systems like OLAP, Cloud Computing
and DBMS within an organisation.
15
Document Page
REFERENCES
Books and Journals
Abdul-Hamid, H., 2014. What matters most for education management information systems: A
framework paper.
Abualoush, S.H., and et, al., 2018. The role of employees’ empowerment as an intermediary
variable between knowledge management and information systems on employees’
performance. VINE Journal of Information and Knowledge Management Systems.
Al Shobaki, M.J. and Naser, S.S.A., 2016. Performance development and its relationship to
demographic variables among users of computerized management information systems in
Gaza electricity Distribution Company.
Al-Mamary, Y.H. and et. al.,2014. The role of different types of information systems in business
organizations: a review. International Journal of Research (IJR). 1(7).
Chatterjee, S., and et, al., 2015. Strategic relevance of organizational virtues enabled by
information technology in organizational innovation. Journal of Management
Information Systems. 32(3). pp.158-196.
Chatterjee, S., Sarker, S. and Valacich, J.S., 2015. The behavioral roots of information systems
security: Exploring key factors related to unethical IT use. Journal of Management
Information Systems. 31(4). pp.49-87.
D'Arcy, J., Herath, T. and Shoss, M.K., 2014. Understanding employee responses to stressful
information security requirements: A coping perspective. Journal of management
information systems. 31(2). pp.285-318.
Fan, T., Tao, F., Deng, S. and Li, S., 2015. Impact of RFID technology on supply chain decisions
with inventory inaccuracies. International Journal of Production Economics. 159.
pp.117-125.
Fan, T.J. and et. al., 2014. Benefits of RFID technology for reducing inventory
shrinkage. International Journal of Production Economics. 147. pp.659-665.
Galliers, R.D. and Leidner, D.E., 2014. Strategic information management: challenges and
strategies in managing information systems. Routledge.
Kim, Y.J., 2015. Convergence of Business Information System Process using Knowledge-based
Method. Journal of the Korea Convergence Society. 6(4). pp.65-71.
Laudon, K.C. and Laudon, J.P., 2015. Management information systems (p. 143). Upper Saddle
River: Pearson.
Liang, H., and et. al., 2015. Employees’ exploration of complex systems: An integrative
view. Journal of Management Information Systems. 32(1). pp.322-357.
Ming, E.C., eBay Inc, 2014. Automated package tracking. U.S. Patent Application 13/686,149.
Naser, S.S.A. and Al Shobaki, M.J., 2016. The Impact of Management Requirements and
Operations of Computerized Management Information Systems to Improve Performance
(Practical Study on the employees of the company of Gaza Electricity Distribution).
Paré, G., and et. al., 2015. Synthesizing information systems knowledge: A typology of literature
reviews. Information & Management. 52(2). pp.183-199.
Prat, N., Comyn-Wattiau, I. and Akoka, J., 2015. A taxonomy of evaluation methods for
information systems artifacts. Journal of Management Information Systems. 32(3).
pp.229-267.
Shi, Z., Lee, G.M. and Whinston, A.B., 2016. Toward a Better Measure of Business Proximity:
Topic Modeling for Industry Intelligence. MIS quarterly. 40(4).
16
Document Page
Shiau, W.L., Chen, S.Y. and Tsai, Y.C., 2015. Management information systems issues: co-
citation analysis of journal articles. " International Journal of Electronic Commerce
Studies". 6(1). pp.145-162.
Shin, S. and Eksioglu, B., 2014. Effects of RFID technology on efficiency and profitability in
retail supply chains. Journal of Applied Business Research (JABR). 30(3). pp.633-646.
Vom Brocke, J. and Rosemann, M. eds., 2014. Handbook on business process management 1:
Introduction, methods, and information systems. Springer.
Wager, K.A., Lee, F.W. and Glaser, J.P., 2017. Health care information systems: a practical
approach for health care management. John Wiley & Sons.
Walsham, G., 2015. Interpreting information systems in organizations.
Online
China has 854 mln internet users: report. 2020. [Online] Available Through: <
http://www.xinhuanet.com/english/2019-08/30/c_138351278.htm>
Internet users in India to reach 627 million in 2019: Report. 2020. [Online] Available Through:
< https://economictimes.indiatimes.com/tech/internet/internet-users-in-india-to-reach-
627-million-in-2019-report/articleshow/68288868.cms?from=mdr>
17
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]