Steps of Kolb’s Learning Cycle Reflective Report 2022

Verified

Added on  2022/09/22

|11
|2135
|30
AI Summary
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: REFLECTIVE REPORT
Reflective Report
Name of the Student:
Name of the University:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1REFLECTIVE REPORT
Steps of Kolb’s learning cycle
The Kolb’s typical experimental theory of learning style is comprises of four stages
concrete experience, reflective observation, abstract or conceptualization and active
experimentation. Throughout the course of MIS500 I have also followed the steps of Kolb’s
learning cycle to experience, observe, conceptualize and experiment the role, importance and
impact of Information System inside the organization.
Experience
The module 1 was an introductory session on Information System (IS). This new era is
completely dependent on technology or the world has almost become completely digitalized
therefore, Information System has become an important part of our daily life. In order to
compete or to stay competitive and to achieve a large market share, all the business organizations
and companies are needed to use Information System. From module 2 learning session I have
experienced that information system and technology have these days become a source of
competitive strategic advantages. I have learn that the power of data in business and
organizational management is not easy to understand but I have learnt that in the field of data
economy data are the core driving agent I innovation.
I have also experienced that using the concept of Information System and artificial
Intelligence how Netflix, Disney+ have become customer preferred streaming channels. I have
experienced how to scrum. In Module 3 the discussion was on Porter’s value chain and its
importance in different business related activities. I have experienced that if I become a CEO of
an organization then using the concept porter’s value chain I would be able to understand
whether the departmental activities are running all well as per the expectations or not. From the
Document Page
2REFLECTIVE REPORT
module 4 sessions I have experienced the application of business Information System (IS). I
have experienced the importance of decision making in business and IS gives this opportunity to
the business associates to take the best suited decision for the business progress and
organizational success as well.
However, security is another essential aspect that is also important for project, business
and organizational success. It is very essential for the business associates to keep focused on
information security and privacy. The confidential data related to the business organization that
are stored in the server must keep secured from the external attackers and unwanted users as
well. I have experienced that security and privacy of information are very essential to fulfill
business related activities successfully.
Reflective observation
I have observed that, Information System is an integrated collection of digital
components that helps to store, retrieve, delete and update data as per the changing requirements
of the business organizations and enterprises. Information System helps to process data and give
information on different digital products. I have observed that in order to sustain the current
competitive digitalized market it is very essential to use the concept of Information System (IS).
From different real life examples discussed throughout the module I have learnt that, Information
System enables diverse human level activities.
It also helps people to develop as well as maintain the daily life activities and business
activities at the same time. These days Information and knowledge has become a vital resource
of economy I have observed the detail landscape format of the organization which is comprises
of IT professionals, IT services, IT components. The IT infrastructure and the IT platform help
Document Page
3REFLECTIVE REPORT
the organization to process the transaction processing system actively. Infact the business
intelligence system dashboard is also elaborated accurately and I have observed the activities run
through the dashboard. I have also observed how the activities become easier and effective after
the implementation of Information System in the business organization. The landscape that was
discussed in the module is a generic one and common for also all the business organization.
Infact I have observed that with the help of this IT infrastructure the management of all the
activities will become easier. I have observed that for complex operational systems also IS and
IT is very beneficial. Enterprise Resource Planning (ERP), Customer Relationship Management
(CRM), business intelligence and for enterprise architecture also the Information System is very
effective. In order to bring radical and rapid changes in business organization
I think that Information System is one of the beneficial and effective infrastructures. It
helps to give strategic users experiences and high time security to the intra organizational
activities. From the module 2 learning session I have learnt that information management and
knowledge management are two interconnected processes. Infact IT and IS are the two sources
of strategic competitive advantages. I have observed the current business model canvas of
Netflix and Disney+ and I have realized that both of the companies are completely dependent on
digital IT infrastructure and using this concept only, Netflix has become one of the most
demanding channel.
Abstract or conceptualization
The concept of information system and its impact in business enterprises are now clear to
me. I have understood the role of Information System (IS) in business progress and business
success as well. I have also understood that mega value chain and its usefulness in business
activities. The concept of porter’s value chain is also absolutely clear to me after completion of
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4REFLECTIVE REPORT
the learning session. I have also understood that, enterprise application, collaboration,
communication also become clear after the successful completion of the learning session.
Usually for the business functionalities IT plays essential role. The concept on scrum has also
become absolutely clear to me after the completion of the class. Now I have detail ideas on time
management and regulations. The issues of additional time consumptions get resolved and thus,
companies that are using the IS as a part of their business operation has become successful.
Facilitating all the operations will become easier and effective after the implementation of
Information System. The issues of decision making and other operations also get reduced with
this concept.
Active experimentation
After experimenting the real time application of IS I have successfully achieved the key
concept if Information System, technologies, contemporary business activities and profit of using
IS in business organizations. I think after successful after the completion of this course I would
be able to develop collaborative strategies that can embodies the agile project management
methodology principles with the stakeholders of any organization. I also feel that, in order to
improve organizational performance, enterprise applications, collaboration and communication
Information system plays effective role. I have understood the application of IS knowledge
areas. I can say that in order to achieve the organizational goals, aims and objectives it is very
essential to use IS these days. The role of stakeholders in organizations and how it helps to
improve the organizational decision making process are also discussed in the session.
Document Page
5REFLECTIVE REPORT
Learning Journal
Date Learning
activity
Impact (what it means to
You)
Evidence (attach record of
activity).
This might be a set of slides, word
Document or pictures of work you
Have completed in class
<
Pleas
e fill
>
Introduction to
information
system
The primary benefits of
Information System are
learnt from this module
content. Have learnt that
information system has
the ability to custom
information. It give real
time information and also
ensure huge adaptability
opportunity from the
competitive market.
<
Pleas
e fill
>
Data,
information
management and
knowledge
management
I have learnt that many
organizations are there
that are continuously
raising concern regarding
information privacy and
data security. Artificial
Document Page
6REFLECTIVE REPORT
intelligence is referred to
as one of the most
effective tool that helps to
dominate the unwanted
activities. In order to
achieve huge market share
and effective profit
margin from the
competitive market it is
essential to use IS.
<
Pleas
e fill
>
Business
Information
System
ERP, CRM, SCM are the
business IS, used by the
business organization to
increasing the business
efficiency and reduce the
chances of errors. It also
helps to improve the
overall business quality.
From the functional
perspectives it can be said
that executive leadership
is required to meet the
business objectives and
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7REFLECTIVE REPORT
make sure that strategies
are useful.
<
Pleas
e fill
>
Applications of
business IS
Business Information
stem is a collection of IT
related procedures that
help the project manager
and other business
associates to take effective
decisions. Enterprises and
business become aligned
to the project objectives
and goals. In order to
select the best suitable
vendors for the business
activity fulfillment the
role of Information
System is measurable.
<
Pleas
e fill
>
Information
security and
privacy
I have learnt that
information system plays
essential role to keep
information secured from
the external attackers and
unwanted users. In order
Document Page
8REFLECTIVE REPORT
to maintain the
organizational data
privacy and security as
well each business
organization should use
the concept of IS. The
security system of IS
allows only the authorized
users to access
information from the
server. None of the
unwanted users are
allowed to access data
from the server without
authentic permission.
Document Page
9REFLECTIVE REPORT
References
Cassidy, A. (2016). A practical guide to information systems strategic planning. CRC press.
D'Arcy, J., & Lowry, P. B. (2019). Cognitiveaffective drivers of employees' daily compliance
with information security policies: A multilevel, longitudinal study. Information Systems
Journal, 29(1), 43-69.
Grusho, A. A., Timonina, E. E., & Shorgin, S. (2017). Modelling For Ensuring Information
Security Of The Distributed Information Systems. In ECMS (pp. 656-660).
Lopes, I. M., & Oliveira, P. (2016). Adoption of an information systems security policy in small
and medium sized enterprises. Journal of Information Systems Engineering &
Management, 1(1), 3-13.
Mwambe, O. O., & Echizen, I. (2017, March). Security Oriented Malicious Activity Diagrams to
Support Information Systems Security. In 2017 31st International Conference on
Advanced Information Networking and Applications Workshops (WAINA) (pp. 74-81).
IEEE.
Njenga, K., & Jordaan, P. (2016). We want to do it our way: The neutralisation approach to
managing information systems security by small businesses. The African Journal of
Information Systems, 8(1), 3.
Schatz, D., & Bashroush, R. (2017). Economic valuation for information security investment: a
systematic literature review. Information Systems Frontiers, 19(5), 1205-1228.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10REFLECTIVE REPORT
Shedden, P., Ahmad, A., Smith, W., Tscherning, H., & Scheepers, R. (2016). Asset identification
in information security risk assessment: A business practice approach. Communications
of the Association for Information Systems, 39(1), 15.
Siponen, M., & Baskerville, R. L. (2018). Intervention effect rates as a path to research
relevance: information systems security example. Journal of the Association for
information Systems, 19(4).
Tan, T. H., Maynard, S. B., Ahmad, A., & Ruighaver, T. (2017, July). Information Security
Governance: A Case Study of the Strategic Context of Information Security. In PACIS (p.
43).4
Tun, H., Lupin, S., Oo, S., Paing, A. N., & Oo, K. K. (2017, February). Probabilistic and
deterministic analysis the security of information systems. In 2017 IEEE Conference of
Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) (pp.
591-594). IEEE.
White, G. L., Hewitt, B., & Kruck, S. E. (2019). Incorporating global information security and
assurance in IS education. Journal of Information Systems Education, 24(1), 1.
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]