BA4UK53O - ICT: Information Handling, Policy at McDonald's (UKCBC)
VerifiedAdded on 2023/06/12
|6
|541
|167
Report
AI Summary
This report analyzes the role of information for McDonald's, focusing on how it's shared and used effectively. It appraises the handling of information within McDonald's, particularly concerning cloud and database management systems. Key factors in matching information systems to user requirements, such as compatibility and technical resources, are identified. The report concludes by formulating ideas for generating an IT policy, emphasizing data protection, password management, and employee education, referencing the General Data Protection Regulation Act. Desklib provides access to similar solved assignments and study resources.

Assignment 1 ICT
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents

Introduction......................................................................................................................................1
Explain the value of the role of information for McDonald’s and identify how it can be shared
and used effectively................................................................................................................1
Main Body.......................................................................................................................................1
Appraise the handling of information in McDonald’s...........................................................1
Identify key factors in matching information systems to user requirements..........................1
Conclusion.......................................................................................................................................1
Formulate ideas which could contribute towards generating a policy regarding IT issues and
recognise the need for on-going evaluation............................................................................1
References........................................................................................................................................2
Explain the value of the role of information for McDonald’s and identify how it can be shared
and used effectively................................................................................................................1
Main Body.......................................................................................................................................1
Appraise the handling of information in McDonald’s...........................................................1
Identify key factors in matching information systems to user requirements..........................1
Conclusion.......................................................................................................................................1
Formulate ideas which could contribute towards generating a policy regarding IT issues and
recognise the need for on-going evaluation............................................................................1
References........................................................................................................................................2
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Introduction
Explain the value of the role of information for McDonald’s and identify how it can be shared
and used effectively
McDonald's is one of the fastest growing food chains across the world. It has utilised the
big data and analysed in an effective and efficient manner. They have used the information in
introducing the digital menus and enriching the customer experience as well. They have
estimated and predicted the data about the needs and requirements of the customers for the
strategic decision making (Taulli and Oni, 2019).
Main Body
Appraise the handling of information in McDonald’s
McDonald's handles its big data in the form of cloud management and database
management systems. They are also used in various information systems such as management
information systems and decision support systems so that the data can be stored and processed in
a potential manner (Montasari, Carroll, Macdonald and Daneshkhah, 2021).
Identify key factors in matching information systems to user requirements
There are several key factors which are identified by McDonald's while matching the
information systems to user requirements. such as the compatibility and the sufficient technical
resources are the major factors which helps in the feasibility study and proper working of the
information systems in a user friendly manner (Beheshti, Benatallah, Sheng and Schiliro, 2020).
Conclusion
Formulate ideas which could contribute towards generating a policy regarding IT issues and
recognise the need for on-going evaluation
General data protection regulation act is the act which provides guidance about data
management and how the company can protect its big data from losses and breaches. Password
management and access control along with the frequent updates and educating the employees are
some of the ideas which help in generating the policy regarding the information technology
issues.
1
Explain the value of the role of information for McDonald’s and identify how it can be shared
and used effectively
McDonald's is one of the fastest growing food chains across the world. It has utilised the
big data and analysed in an effective and efficient manner. They have used the information in
introducing the digital menus and enriching the customer experience as well. They have
estimated and predicted the data about the needs and requirements of the customers for the
strategic decision making (Taulli and Oni, 2019).
Main Body
Appraise the handling of information in McDonald’s
McDonald's handles its big data in the form of cloud management and database
management systems. They are also used in various information systems such as management
information systems and decision support systems so that the data can be stored and processed in
a potential manner (Montasari, Carroll, Macdonald and Daneshkhah, 2021).
Identify key factors in matching information systems to user requirements
There are several key factors which are identified by McDonald's while matching the
information systems to user requirements. such as the compatibility and the sufficient technical
resources are the major factors which helps in the feasibility study and proper working of the
information systems in a user friendly manner (Beheshti, Benatallah, Sheng and Schiliro, 2020).
Conclusion
Formulate ideas which could contribute towards generating a policy regarding IT issues and
recognise the need for on-going evaluation
General data protection regulation act is the act which provides guidance about data
management and how the company can protect its big data from losses and breaches. Password
management and access control along with the frequent updates and educating the employees are
some of the ideas which help in generating the policy regarding the information technology
issues.
1

References
Books and Journals
Beheshti, A., Benatallah, B., Sheng, Q.Z. and Schiliro, F., 2020, January. Intelligent knowledge
lakes: The age of artificial intelligence and big data. In International conference on web
information systems engineering (pp. 24-34). Springer, Singapore.
Montasari, R., Carroll, F., Macdonald, S. and Daneshkhah, A., 2021. Application of artificial
intelligence and machine learning in producing actionable cyber threat intelligence.
In Digital Forensic Investigation of Internet of Things (IoT) Devices (pp. 47-64). Springer,
Cham.
Taulli, T. and Oni, M., 2019. Artificial intelligence basics (p. 9). Berkeley: Apress.
2
Books and Journals
Beheshti, A., Benatallah, B., Sheng, Q.Z. and Schiliro, F., 2020, January. Intelligent knowledge
lakes: The age of artificial intelligence and big data. In International conference on web
information systems engineering (pp. 24-34). Springer, Singapore.
Montasari, R., Carroll, F., Macdonald, S. and Daneshkhah, A., 2021. Application of artificial
intelligence and machine learning in producing actionable cyber threat intelligence.
In Digital Forensic Investigation of Internet of Things (IoT) Devices (pp. 47-64). Springer,
Cham.
Taulli, T. and Oni, M., 2019. Artificial intelligence basics (p. 9). Berkeley: Apress.
2
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.