BMP4005 Information Systems & Big Data Analysis Solution 2019/20
VerifiedAdded on 2023/06/14
|10
|3233
|258
Report
AI Summary
This report provides a detailed analysis of information systems and big data, covering theories, methods, and techniques related to IT solution design and development, specifically focusing on McAfee and MS Office. It explains various types of information systems, including DSS, ESS, TPS, MIS, and KSM, with relevant examples. The report also discusses the effects of IT on globalization, highlighting the opening of new markets, reduction of conveyance costs, and technological innovations. Furthermore, it defines digital infrastructure, provides examples, and discusses the advantages and disadvantages of cloud computing. Finally, the report touches upon the risks associated with information systems outsourcing and the critical role of IT infrastructure in digital transformation. This student contributed assignment is available on Desklib, a platform offering a wide range of study resources for students.

BSc (Hons) Business Management
Cohort 2
BMP4005
Information Systems and Big Data
Analysis
Information Systems & IT Solution
2019/2020
February 2020/Semester 1
Submitted by:
Name:
ID:
1
Cohort 2
BMP4005
Information Systems and Big Data
Analysis
Information Systems & IT Solution
2019/2020
February 2020/Semester 1
Submitted by:
Name:
ID:
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
Introduction 3
Task 1: Theories, methods and techniques which relate to
the design and development for TWO of the IT solutions
listed here: (i) McAfee; (ii) Moodle; (iii) Canvas; (iv) MS
Office 3
Task 2: Explanation of the systems below with relevant
examples 4
Task 3: Globalisation and the effects of IT on globalisation
6
Task 4: Definition, example, advantages and
disadvantages of digital infrastructure 7
Task 5: Risks associated with information systems
outsourcing and why is IT infrastructure so critical to
digital transformation! 8
Conclusion 9
References 9
2
Introduction 3
Task 1: Theories, methods and techniques which relate to
the design and development for TWO of the IT solutions
listed here: (i) McAfee; (ii) Moodle; (iii) Canvas; (iv) MS
Office 3
Task 2: Explanation of the systems below with relevant
examples 4
Task 3: Globalisation and the effects of IT on globalisation
6
Task 4: Definition, example, advantages and
disadvantages of digital infrastructure 7
Task 5: Risks associated with information systems
outsourcing and why is IT infrastructure so critical to
digital transformation! 8
Conclusion 9
References 9
2

Introduction
The availability and demand of Information Technology systems in the recent time
has grown so much that its existence in the daily chores and business might be forgotten. It is
the primary tool to carry out any business by the availability of online information so that it
can remain updated with its competition in the market place. This can help the business to use
the information effectively by inculcating it in the decision making by the company's
management. Thus this term has a very broad meaning. It can be defined as the joint study of
all the software and hardware that are included in a business and companies so that they can
use it to gather, create, filter things, operate and carry out dis-pension of the required data. On
the other hand, Big data analytics is used to provide assistance to the companies and business
by the way of disclosing that data which is usually not found due to its hidden nature which
helps them to make decisions which prospers the business(Agwu, 2020). This report will
cover in detail the different methods, theories and techniques which help in the development
and designing of IT and also the types of IT systems and their effect on globalization. It shall
also cover risks which are associated with outsourcing of systems.
Task 1: Theories, methods and techniques which relate to
the design and development for TWO of the IT solutions
listed here: (i) McAfee; (ii) Moodle; (iii) Canvas; (iv) MS
Office
McAfee- This company is famous by its name of McAfee Corporation. John McAfee found it
in the year 1987. it has its headquarters established in San Jose, California. In February 2011,
this company was acquired by Intel which made it a part of Intel Security Division. It is a
global computer security company of America which works in developing digital security
tools for the server devices of the personal computers and in the recent time for mobile
devices. The main characteristics of McAfee includes blocking multiple threats, where it
primarily provides protection to the systems for different attacks like bots, viruses and
worms, etc. it also helps in defending systems from malicious codes even in the situation of
their presence in compressed files. It also works as a shield against the potential threats which
are mostly anti viruses and URL filtering systems like Phishing attacks, spam mails, spam
websites, etc (Hustad and Olsen, 2021). Safely guarding the email programs, by this it helps
in cleaning and detecting viruses from the Microsoft Outlook which also includes HTML
texts. The other feature is providing lesser or lower damage from the outbreaks, this helps in
limiting the effects and risks which arise due to an outbreak.
3
The availability and demand of Information Technology systems in the recent time
has grown so much that its existence in the daily chores and business might be forgotten. It is
the primary tool to carry out any business by the availability of online information so that it
can remain updated with its competition in the market place. This can help the business to use
the information effectively by inculcating it in the decision making by the company's
management. Thus this term has a very broad meaning. It can be defined as the joint study of
all the software and hardware that are included in a business and companies so that they can
use it to gather, create, filter things, operate and carry out dis-pension of the required data. On
the other hand, Big data analytics is used to provide assistance to the companies and business
by the way of disclosing that data which is usually not found due to its hidden nature which
helps them to make decisions which prospers the business(Agwu, 2020). This report will
cover in detail the different methods, theories and techniques which help in the development
and designing of IT and also the types of IT systems and their effect on globalization. It shall
also cover risks which are associated with outsourcing of systems.
Task 1: Theories, methods and techniques which relate to
the design and development for TWO of the IT solutions
listed here: (i) McAfee; (ii) Moodle; (iii) Canvas; (iv) MS
Office
McAfee- This company is famous by its name of McAfee Corporation. John McAfee found it
in the year 1987. it has its headquarters established in San Jose, California. In February 2011,
this company was acquired by Intel which made it a part of Intel Security Division. It is a
global computer security company of America which works in developing digital security
tools for the server devices of the personal computers and in the recent time for mobile
devices. The main characteristics of McAfee includes blocking multiple threats, where it
primarily provides protection to the systems for different attacks like bots, viruses and
worms, etc. it also helps in defending systems from malicious codes even in the situation of
their presence in compressed files. It also works as a shield against the potential threats which
are mostly anti viruses and URL filtering systems like Phishing attacks, spam mails, spam
websites, etc (Hustad and Olsen, 2021). Safely guarding the email programs, by this it helps
in cleaning and detecting viruses from the Microsoft Outlook which also includes HTML
texts. The other feature is providing lesser or lower damage from the outbreaks, this helps in
limiting the effects and risks which arise due to an outbreak.
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Further the benefits or advantages of McAfee are as follows:
its task of detection and cleaning of malware is unbeatable
it provides retroactive protection from potential attacks
it provides real time security by its global intelligence technology
it improves faster performance
effectively manages emails and their security with proper scanning system
auto updates are available
MS Office- Known by the name of Microsoft Office it has a range of applications within it
which makes it really worthy in the business environment to carry out its functions. Microsoft
Corporation has produced the product of Microsoft Office which came out first in the year
1990. This software has been enjoying its position from a very long time in delivering office
related documents which are helpful in the modern world. Microsoft Office is currently
available in thirty five languages under Windows and Mac. There are six major components
present in Microsoft Office's original form. They are Word, Excel, Power point, Access, One
note and publisher. And among these there are three leasing ones they are Power point, which
is visual representation tool where one can write and present with pictures and sounds,
second is Microsoft word which helps to create documents and third is Excel which is a type
of spreadsheet that helps in maintaining data. With time MS Office has adapted with mobile
phones as well which is why it is helpful in giving add on plug ins which is also another
major development within it. So today, it easier for the service users to operate MS office and
take advantages of its web based apps which are available on android and apple.
Developments have also taken place due to which other types of word processors have
merged online like Hemingway which comes with editing options. Still, MS word remains
the most popular among the word processors (Jin, Xing and Wang, 2020).
Task 2: Explanation of the systems below with relevant
examples
Usually each enterprise comprises five different types of information systems, where
each one provides assistance to the different levels of the organization like the management
level, functional level, strategies level and knowledge level. The following are the different
types of information system. They are as follows:
DSS (Decision Support System)
4
its task of detection and cleaning of malware is unbeatable
it provides retroactive protection from potential attacks
it provides real time security by its global intelligence technology
it improves faster performance
effectively manages emails and their security with proper scanning system
auto updates are available
MS Office- Known by the name of Microsoft Office it has a range of applications within it
which makes it really worthy in the business environment to carry out its functions. Microsoft
Corporation has produced the product of Microsoft Office which came out first in the year
1990. This software has been enjoying its position from a very long time in delivering office
related documents which are helpful in the modern world. Microsoft Office is currently
available in thirty five languages under Windows and Mac. There are six major components
present in Microsoft Office's original form. They are Word, Excel, Power point, Access, One
note and publisher. And among these there are three leasing ones they are Power point, which
is visual representation tool where one can write and present with pictures and sounds,
second is Microsoft word which helps to create documents and third is Excel which is a type
of spreadsheet that helps in maintaining data. With time MS Office has adapted with mobile
phones as well which is why it is helpful in giving add on plug ins which is also another
major development within it. So today, it easier for the service users to operate MS office and
take advantages of its web based apps which are available on android and apple.
Developments have also taken place due to which other types of word processors have
merged online like Hemingway which comes with editing options. Still, MS word remains
the most popular among the word processors (Jin, Xing and Wang, 2020).
Task 2: Explanation of the systems below with relevant
examples
Usually each enterprise comprises five different types of information systems, where
each one provides assistance to the different levels of the organization like the management
level, functional level, strategies level and knowledge level. The following are the different
types of information system. They are as follows:
DSS (Decision Support System)
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

It is a type of application usable on computers which helps in the organization to make
decisions at the management level. DSS helps to make analyses of all the options that are
available to the company and then it gives out the best option among them so that it can help
in the growth of the company. Thus the main work of DSS is to bring all the knowledge and
information together from specific target areas which is not commonly found. So its primary
aim is to help the management in taking proper decisions in the benefit of the company
(Jusoh and Ahmad, 2019). DSS generally has 3 components that are knowledge database,
user interface and software. Some examples of this are policies and procedures, specifications
of the product, catalogs of the brand, etc.
ESS (Executive Support System)
This tool serves and helps the top management of the company who are related t making
decisions while also providing the required information. The nature of decisions taken by the
top levels are which can directly impact the functioning of the entire company including the
employees working within it. Thus these require to have a strong base and present authentic
data. ESS serves better and improved display choices and communications in relation to DSS.
TPS (Transaction Processing System)
Transactions are very essential in ensuring the smooth and effective functioning of the daily
activities that are conducted by any business. This generally differs from company to
company depending on their type and size of operations. Some examples of this type are
receipts that are given on receiving goods, on their shipping and transportation, etc. which
related to their manufacturing units.
MIS (Management Information System)
This information system is specifically formed to aid the middle managers of the company in
their decision making. Thus the main work of MIS is collection of the transactions and their
data information from the TPS system to facilitate and forward it while also making
combinations of the various forms like response, displays and reports, etc.
KSM (Knowledge Management System)
5
decisions at the management level. DSS helps to make analyses of all the options that are
available to the company and then it gives out the best option among them so that it can help
in the growth of the company. Thus the main work of DSS is to bring all the knowledge and
information together from specific target areas which is not commonly found. So its primary
aim is to help the management in taking proper decisions in the benefit of the company
(Jusoh and Ahmad, 2019). DSS generally has 3 components that are knowledge database,
user interface and software. Some examples of this are policies and procedures, specifications
of the product, catalogs of the brand, etc.
ESS (Executive Support System)
This tool serves and helps the top management of the company who are related t making
decisions while also providing the required information. The nature of decisions taken by the
top levels are which can directly impact the functioning of the entire company including the
employees working within it. Thus these require to have a strong base and present authentic
data. ESS serves better and improved display choices and communications in relation to DSS.
TPS (Transaction Processing System)
Transactions are very essential in ensuring the smooth and effective functioning of the daily
activities that are conducted by any business. This generally differs from company to
company depending on their type and size of operations. Some examples of this type are
receipts that are given on receiving goods, on their shipping and transportation, etc. which
related to their manufacturing units.
MIS (Management Information System)
This information system is specifically formed to aid the middle managers of the company in
their decision making. Thus the main work of MIS is collection of the transactions and their
data information from the TPS system to facilitate and forward it while also making
combinations of the various forms like response, displays and reports, etc.
KSM (Knowledge Management System)
5

The primary task of KWS is towards boosting the creation and formation of information
while also ensuring that the technical or technological skills and the information processed
can be properly incorporated in the business. It also involves the information relating to the
external environment of the company as it helps to clearly analyze the current market trends.
Some examples of knowledge work system are computer aided design systems, the financial
status of workstations and the systems of virtual realities (Lv and Singh, 2021).
Task 3: Globalisation and the effects of IT on globalisation
Globalisation implies a very vast concept which is why it is often difficult to define it in one
line. But generally it refers to the opening up and expansion of the local and national
boundaries to wider aspects which facilitate interdependent and interrelated world of
activities that helps in free flow of goods and services and the capitals across the international
fronts. It can also be regarded as the consolidation of all the economies of the world and their
culture as well as politics from one nation upon other nations. It also relates to the thought of
having a world as the single huge market rather than having distinct individual markets for
each state (Queiroz, 2020). For the first time the advancement of globalization happened
happened in the 1900s which developed with technical progression which helped people to
upgrade from telegram to telephone and the invention of airplanes facilitated communication
between people by easing travel and transportation across borders. But actually the
advancement of globalization in technology happened during 2000s. The major effects of the
Information Technology sector are as follows:
one of the crucial form of globalization is said to be technology which has changed
the dynamics of the world. Thus it implies an essential form for strategies of
competition and has driven the world towards ethical and moral standards.
New markets have opened up due to the advent of globalization and have given rise to
technological competition which has essentially removed the barriers in trade which
were present earlier.
Also the reduction of the conveyance costs and lag in time, this technology has helped
to disable the experts of software which are present around the world turning the
world at a speedy rate.
This has helped the companies in bringing technological innovations which has
initiated the growth of of the technological advancement and has helped in increasing
6
while also ensuring that the technical or technological skills and the information processed
can be properly incorporated in the business. It also involves the information relating to the
external environment of the company as it helps to clearly analyze the current market trends.
Some examples of knowledge work system are computer aided design systems, the financial
status of workstations and the systems of virtual realities (Lv and Singh, 2021).
Task 3: Globalisation and the effects of IT on globalisation
Globalisation implies a very vast concept which is why it is often difficult to define it in one
line. But generally it refers to the opening up and expansion of the local and national
boundaries to wider aspects which facilitate interdependent and interrelated world of
activities that helps in free flow of goods and services and the capitals across the international
fronts. It can also be regarded as the consolidation of all the economies of the world and their
culture as well as politics from one nation upon other nations. It also relates to the thought of
having a world as the single huge market rather than having distinct individual markets for
each state (Queiroz, 2020). For the first time the advancement of globalization happened
happened in the 1900s which developed with technical progression which helped people to
upgrade from telegram to telephone and the invention of airplanes facilitated communication
between people by easing travel and transportation across borders. But actually the
advancement of globalization in technology happened during 2000s. The major effects of the
Information Technology sector are as follows:
one of the crucial form of globalization is said to be technology which has changed
the dynamics of the world. Thus it implies an essential form for strategies of
competition and has driven the world towards ethical and moral standards.
New markets have opened up due to the advent of globalization and have given rise to
technological competition which has essentially removed the barriers in trade which
were present earlier.
Also the reduction of the conveyance costs and lag in time, this technology has helped
to disable the experts of software which are present around the world turning the
world at a speedy rate.
This has helped the companies in bringing technological innovations which has
initiated the growth of of the technological advancement and has helped in increasing
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

the foreign Direct Investments which is creating more and more possibilities for the
growth and development of commercial enterprises.
Task 4: Definition, example, advantages and
disadvantages of digital infrastructure
Digital infrastructure means that the companies carry out their functions and
operations based on the information technology system (Rusyn, Vysotska and Pohreliuk,
2018). Some of the most common examples of digital infrastructure are broadband, mobile
telecom services and the internet websites of the company, the apps of the organization, cloud
services, software, data encryption, etc. among all of these cloud computing is one of the
most trending technologies that is in use. In recent time, most organizations are shifting their
services towards usage of cloud computing because it helps in increasing growth of the
business. But it comes with advantages and disadvantages which are as follows:
Advantages:
the first advantage that it offers is that after losing certain data it is easier to get it back
when it is stored in the cloud.
It also facilitates collaboration by allowing the users to easily share their data which is
present in the cloud system. Thus it helps in shared storage of data.
Cloud computing offers easy access where it allows its users to quickly and with ease
to approach nay of the stored data at any given time at any place by just the use of
internet connectivity.
Digital cloud infrastructure helps in the efficiency and productivity of the company by
ensuring that the data of the company is easily accessible for its users.
It is also beneficial due to its low maintenance costs, because it helps to cut down the
maintenance costs of the software and hardware for the company.
And most beneficial of all is the data privacy and security services which ensures that
the data of the users is securely stored and handled.
Disadvantages:
the access of the data stored on cloud requires internet connection which is why it
becomes essential for the users to have a good internet which is sometimes difficult.
It offers limited control because the cloud infrastructure can be easily retained and
controlled by the one who provide services so there is lesser control on its executive
functioning.
7
growth and development of commercial enterprises.
Task 4: Definition, example, advantages and
disadvantages of digital infrastructure
Digital infrastructure means that the companies carry out their functions and
operations based on the information technology system (Rusyn, Vysotska and Pohreliuk,
2018). Some of the most common examples of digital infrastructure are broadband, mobile
telecom services and the internet websites of the company, the apps of the organization, cloud
services, software, data encryption, etc. among all of these cloud computing is one of the
most trending technologies that is in use. In recent time, most organizations are shifting their
services towards usage of cloud computing because it helps in increasing growth of the
business. But it comes with advantages and disadvantages which are as follows:
Advantages:
the first advantage that it offers is that after losing certain data it is easier to get it back
when it is stored in the cloud.
It also facilitates collaboration by allowing the users to easily share their data which is
present in the cloud system. Thus it helps in shared storage of data.
Cloud computing offers easy access where it allows its users to quickly and with ease
to approach nay of the stored data at any given time at any place by just the use of
internet connectivity.
Digital cloud infrastructure helps in the efficiency and productivity of the company by
ensuring that the data of the company is easily accessible for its users.
It is also beneficial due to its low maintenance costs, because it helps to cut down the
maintenance costs of the software and hardware for the company.
And most beneficial of all is the data privacy and security services which ensures that
the data of the users is securely stored and handled.
Disadvantages:
the access of the data stored on cloud requires internet connection which is why it
becomes essential for the users to have a good internet which is sometimes difficult.
It offers limited control because the cloud infrastructure can be easily retained and
controlled by the one who provide services so there is lesser control on its executive
functioning.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Other major disadvantage of this is it has vendor lock which makes it difficult for the
companies to transport the services from one service provider to another. Technically
it can cause problems in transferring due to different platforms that are used by
different service providers.
Task 5: Risks associated with information systems
outsourcing and why is IT infrastructure so critical to
digital transformation!
Risks associated with information systems outsourcing
It is highly misinterpreted that outsourcing of information systems offers only benefits
to the companies, but the reality is different. It can be very unsafe for the company to
outsource its IT system functioning. It can become a major factor of the risks that are
connected with the outsourcing of information system like hidden costs, losing of control,
being dependent on the service providers, less experienced staff, etc (Simamora, 2019) .
These risks are as follows:
The most probable risk that comes with outsourcing is the danger of employing
inexperienced workers for handling the outsourcing because it is important for an
employee to have a good knowledge of outsourcing.
The dependency on service providers can prove to be costly with increased prices and
also it results in loss of control for the users.
One risk is of hidden costs because the user might remain unaware of the costs and
might not be able to anticipate its technical discontinuity.
Thus in outsourcing the company users can become more and more dependent which
can raise issues among the clients to k now the financial position of the company(Ye,
Zheng and Tu, 2020) .
Why is IT infrastructure so critical to digital transformation!
Moreover, digital transformation depends critically on the information technology
infrastructure. It is considered the pillar of a companies IT system. It is also essential to
understand the relevance of data center and networking which can help in the improvement of
agility while dealing with risks. It is not easy to implement and use the digital transformation
because it requires heavy investments so that any company or business can grow and make
their future secure. Some of the basic examples of this technology are flash storage, an
8
companies to transport the services from one service provider to another. Technically
it can cause problems in transferring due to different platforms that are used by
different service providers.
Task 5: Risks associated with information systems
outsourcing and why is IT infrastructure so critical to
digital transformation!
Risks associated with information systems outsourcing
It is highly misinterpreted that outsourcing of information systems offers only benefits
to the companies, but the reality is different. It can be very unsafe for the company to
outsource its IT system functioning. It can become a major factor of the risks that are
connected with the outsourcing of information system like hidden costs, losing of control,
being dependent on the service providers, less experienced staff, etc (Simamora, 2019) .
These risks are as follows:
The most probable risk that comes with outsourcing is the danger of employing
inexperienced workers for handling the outsourcing because it is important for an
employee to have a good knowledge of outsourcing.
The dependency on service providers can prove to be costly with increased prices and
also it results in loss of control for the users.
One risk is of hidden costs because the user might remain unaware of the costs and
might not be able to anticipate its technical discontinuity.
Thus in outsourcing the company users can become more and more dependent which
can raise issues among the clients to k now the financial position of the company(Ye,
Zheng and Tu, 2020) .
Why is IT infrastructure so critical to digital transformation!
Moreover, digital transformation depends critically on the information technology
infrastructure. It is considered the pillar of a companies IT system. It is also essential to
understand the relevance of data center and networking which can help in the improvement of
agility while dealing with risks. It is not easy to implement and use the digital transformation
because it requires heavy investments so that any company or business can grow and make
their future secure. Some of the basic examples of this technology are flash storage, an
8

information center, network technologies with plus generation 6 fibre which can help in
improved performance that is a must for a good future(Zhang, Huang and Bompard, 2018).
Conclusion
It can be concluded from the project that the technology can be integrated into the
business and company because it offers competitive advantages. But to implement it, it
requires a detailed understanding of what it can or cannot do. With the change of time,
nowadays all the companies are increasing their use of technology so that they can enhance
the communication information systems. Information system is understandable as any system
can be used to maintain and organize the data within a company. Also, it does not need to be
heavily dependent on computer and digital technologies. It can act as a mere tool which can
support any company in running their business so it should be used accordingly.
References
Agwu, E., 2020. Trends and Issues in International Planning for Businesses: Effects of
Globalization. In Trends and Issues in International Planning for Businesses (pp. 1-
16). IGI Global.
Hustad, E. and Olsen, D.H., 2021. Creating a sustainable digital infrastructure: the role of
service-oriented architecture. Procedia Computer Science, 181, pp.597-604.
Jin, L., Xing, M. and Wang, R., 2020, April. Operation Framework of the Command
Information System Based on Big Data Analysis. In 2020 IEEE 5th International
Conference on Cloud Computing and Big Data Analytics (ICCCBDA) (pp. 459-462).
IEEE.
Jusoh, N. and Ahmad, H., 2019. Usage Of Microsoft Excel Spreadsheet As Accounting
Tools In Sme Company. INWASCON Technology Magazine (i-TECH MAG), 1,
pp.23-25.
Lv, Z. and Singh, A.K., 2021. Big data analysis of Internet of Things system. ACM
Transactions on Internet Technology, 21(2), pp.1-15.
Queiroz, M., et. al., 2020, January. Digital Infrastructure, Business Unit Competitiveness,
and Firm Performance Growth: The Moderating Effects of Business Unit IT
Autonomy. In Proceedings of the 53rd Hawaii International Conference on System
Sciences.
Rusyn, B., Vysotska, V. and Pohreliuk, L., 2018, September. Model and architecture for
virtual library information system. In 2018 IEEE 13th International Scientific and
Technical Conference on Computer Sciences and Information Technologies
(CSIT) (Vol. 1, pp. 37-41). IEEE.
Simamora, R.H., 2019. Socialization of information technology utilization and knowledge of
information system effectiveness at Hospital Nurses in Medan, North
Sumatra. Editorial Preface From the Desk of Managing Editor, 10(9).
Ye, Z., Zheng, J. and Tu, R., 2020. Network evolution analysis of e-business
entrepreneurship: big data analysis based on taobao intelligent information
system. Information Systems and e-Business Management, 18(4), pp.665-679.
9
improved performance that is a must for a good future(Zhang, Huang and Bompard, 2018).
Conclusion
It can be concluded from the project that the technology can be integrated into the
business and company because it offers competitive advantages. But to implement it, it
requires a detailed understanding of what it can or cannot do. With the change of time,
nowadays all the companies are increasing their use of technology so that they can enhance
the communication information systems. Information system is understandable as any system
can be used to maintain and organize the data within a company. Also, it does not need to be
heavily dependent on computer and digital technologies. It can act as a mere tool which can
support any company in running their business so it should be used accordingly.
References
Agwu, E., 2020. Trends and Issues in International Planning for Businesses: Effects of
Globalization. In Trends and Issues in International Planning for Businesses (pp. 1-
16). IGI Global.
Hustad, E. and Olsen, D.H., 2021. Creating a sustainable digital infrastructure: the role of
service-oriented architecture. Procedia Computer Science, 181, pp.597-604.
Jin, L., Xing, M. and Wang, R., 2020, April. Operation Framework of the Command
Information System Based on Big Data Analysis. In 2020 IEEE 5th International
Conference on Cloud Computing and Big Data Analytics (ICCCBDA) (pp. 459-462).
IEEE.
Jusoh, N. and Ahmad, H., 2019. Usage Of Microsoft Excel Spreadsheet As Accounting
Tools In Sme Company. INWASCON Technology Magazine (i-TECH MAG), 1,
pp.23-25.
Lv, Z. and Singh, A.K., 2021. Big data analysis of Internet of Things system. ACM
Transactions on Internet Technology, 21(2), pp.1-15.
Queiroz, M., et. al., 2020, January. Digital Infrastructure, Business Unit Competitiveness,
and Firm Performance Growth: The Moderating Effects of Business Unit IT
Autonomy. In Proceedings of the 53rd Hawaii International Conference on System
Sciences.
Rusyn, B., Vysotska, V. and Pohreliuk, L., 2018, September. Model and architecture for
virtual library information system. In 2018 IEEE 13th International Scientific and
Technical Conference on Computer Sciences and Information Technologies
(CSIT) (Vol. 1, pp. 37-41). IEEE.
Simamora, R.H., 2019. Socialization of information technology utilization and knowledge of
information system effectiveness at Hospital Nurses in Medan, North
Sumatra. Editorial Preface From the Desk of Managing Editor, 10(9).
Ye, Z., Zheng, J. and Tu, R., 2020. Network evolution analysis of e-business
entrepreneurship: big data analysis based on taobao intelligent information
system. Information Systems and e-Business Management, 18(4), pp.665-679.
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Zhang, Y., Huang, T. and Bompard, E.F., 2018. Big data analytics in smart grids: a
review. Energy informatics, 1(1), pp.1-24.
10
review. Energy informatics, 1(1), pp.1-24.
10
1 out of 10
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.