Comprehensive Management Information System Report: Business Insights

Verified

Added on  2023/01/19

|29
|9435
|26
Report
AI Summary
This report delves into various aspects of Management Information Systems (MIS), starting with an examination of e-commerce, including the use of customization and personalization, and their business value. It then explores the impact of the internet on competitive rivalry, followed by a discussion on the importance of data mining tools, the information they generate, and their applications. The report defines Geographic Information Systems (GIS) and highlights their business applications. It also covers authentication technologies, organizational policies, and an analysis of different Information Systems (IS) levels within business firms, along with the benefits of a socio-technical design approach. Part B of the report focuses on developing international information systems architectures, challenges in global business systems, the benefits of the Internet for global systems, and global internet user statistics. It applies Porter's Five Forces to the Internet, examines cultural and business factors driving globalization, and explores the benefits of globalization systems and challenges in international networks.
Document Page
Management
Information System
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
PART A...........................................................................................................................................1
Question 1........................................................................................................................................1
Mention Use of customisation and personalisation in e-commerce. Mention business value of
these techniques......................................................................................................................1
How internet make competitive rivalry among businesses more intense ..............................2
Question 2........................................................................................................................................3
Importance of data mining tools and discuss about what kind of information they generate. In
what circumstances a company can use data mining.............................................................3
Describe the term “data base” and mention three reasons why DBMS are good than flat files. 3
Question 3........................................................................................................................................4
Define the term GIS? Mention three ways by which GIS can be used by businesses
organisations...........................................................................................................................4
Mention two benefits of using enterprise system...................................................................5
Question 4........................................................................................................................................6
Name Authentication technologies that benefits in preventing hackers from getting access to
organisational systems............................................................................................................6
Discuss why organisations require to implement policies to protect themselves..................7
Question 5........................................................................................................................................8
Analyse the illustration and tell which IS does it represent and why. At which level this IS is
used in business firms.............................................................................................................8
Mention benefits of socio-technical design approach to information system......................10
PART B..........................................................................................................................................11
a. What steps should you take to develop an international information systems architecture? 11
b. What are the four specific types of business challenges to global business systems? Which
one do you think will be easiest to solve? Why?..................................................................12
Document Page
c. How does the Internet benefit the development of a global information system? Should all
global systems be based on the Internet?.............................................................................13
d. Explore the Web for latest World Internet Users Population Stats for 2019 comparing at
least four regions in terms of Internet users distribution % and penetration rate (%
population)............................................................................................................................14
e. Apply Porter's Five Forces analytical framework to the internet with justification.........15
Porter’s Five Forces model:..................................................................................................15
f. Four general cultural factors and four specific business factors driving global business
including two elements most problematic at current moment and why?.............................17
g. General benefits can the retailer expect from a globalisation system..............................18
h. Describe four of the challenges involved with international networks...........................19
References .....................................................................................................................................22
Document Page
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
PART A
Question 1
Mention Use of customisation and personalisation in e-commerce. Mention business value of
these techniques
Personalisation in E-commerce is referred to the practice of developing personal
connection, experience and interaction on e-commerce applications or sites with the help of
product recommendations and media content. E-commerce personalisation is used to remove
obstacles so that customer experience can be improved and people can purchase services or
product without any complexities. Customisation in E-commerce is defined as adjustment of a
service or product in accordance with the opinion and perception of customer. Customisation is
used to increase the satisfaction of users by offering them the chance to personalise their services
and products as per their requirements. This benefits the business organisations in sustaining a
positive image in marketplace (Abiteboul, André and Kaplan, 2015).
Business value of personalisation and customisation
Personalisation is very essential for business organisations as it forms an important part
of customer's experience. With the help of personalisation, a company is able to retain their
customers for maximum time period as each customer is targeted on individual basis. Business
value of customisation is that it assists an organisation in effectively targeting potential and
existing customers in accordance to their needs, opinion, choices and preferences. This will
allow the customers to have repeat visits due to which business firms can earn high revenues and
competitive advantage within marketplace. Both personalisation and customisation multiplies the
value of business. In earlier time, when these techniques or concepts were not popular, people
prefer to avoid purchasing if they do not get product of their choice. But now, this concept has
changed. With the help of these techniques, individuals can themselves design the products and
pattern they need to satisfy themselves (Shobaki and Naser, 2016). Main benefits of
personalisation and customisation to a business are enhanced sales and profits due to improved
conversions. According to the study carried out by Infosys, 86% of customers and approx 96%
of retailers thinks that personalisation and customisation influences their purchasing decisions in
a considerable manner. Also, these aspects benefits a business firm to gain high loyalty from
customers due to their increased satisfactions with the products and services offered by a
1
Document Page
company. This shows that both personalisation and customisation has positive business value
and benefits e-commerce firm in sustaining strong place within marketplace and minds of
customers.
How internet make competitive rivalry among businesses more intense
Intensity in competitive rivalry is defined as an extent up to which a business firm in a
business sector exerts pressure on another firm and limits profits of each other. Earlier, business
firms were competitive and tries to surpass the profits of rivals within a specific region. But due
to the advancement of internet, different business sectors and regions have integrated due to
which competition among business firms for survival has became more severe. Due to internet,
people are able to do digital shopping where that get substitute of every product. This is the
reason, customer is not dependent on the products of a single brand. This has create insecurity in
the minds of business organisation about their position and market shares. To avoid such
situation, every organisation is beaming digital and provide offers via online sites so that their
customer base can be maintained (Allen, Karanasios and Norman, 2014). For example, in
today's time entry and exit barriers are declining due to less cost of digital business models. This
is the reason without any infrastructure and physical assets also, a company can successfully
operate in market.
One instance in this respect is Club Factory or Amazon which are UK based online
shopping sites. These business do not have retail outlets but still it is successfully operating in
global manner and giving tough competition to big retail brands. Other than this, with the use of
internet, business firms can get customer data and identify their buying habits due to which they
can formulate effective marketing strategies to allure them. With the help of online shopping
sites and digital media, a company can snatch away the customers of other companies by
offering good discounts and benefits. Internet is the main reason due to which customers are
becoming more particular about their choice and shift their preference towards those companies
which are offering good value in less amount (Almarashdeh, 2016). To avoid this situation,
other company also retaliate and tries to provide best services in genuine prices. This creates a
rift between business firms and their main objective became to overcome the revenues of
opposite firm rather than comparing their overall performance with previous results. In this way,
competitive rivalry increases in businesses due to the increased use of internet.
2
Document Page
Question 2
Importance of data mining tools and discuss about what kind of information they generate. In
what circumstances a company can use data mining
Data mining is referred to the set of different methodologies that are used to analyse data
from different perspectives and dimensions along with searching of hidden patterns, grouping
and classification of data in a systematic manner. Important tools of data mining are oracle,
python, spark etc. These tools are very useful for a business organisation as it benefits the
manager of a company to analyse a data and convert it in some meaningful information. This
helps the firms in taking strategically right decisions against rivals so that high revenues and
profits can be earned in a considerable manner. Other than this, with the help of data mining, a
company a take smart decisions related to marketing and advertisement due to to which
maximum attention from customers can be take without any compromise.
There are different circumstances in which a business firm can use data mining tools like
rapid miner, python, oracle data mining, IBM SPSS modeler and various others. For an instance,
data mining can be utilised for fraud detection as traditional methods are complex as well as time
consuming. Through this, patterns can be analysed easily through which relevant information can
be attained(Anderson and et. al.,2015). When there is compromise with integrity and
confidentiality, data mining can be utilised for anomaly detection. Furthermore, there are
different circumstances in which this is being used like customer segmentation, financial
banking, corporate surveillance, research analysis, criminal investigation and many others.
Describe the term “data base” and mention three reasons why DBMS are good than flat files.
A database is a cluster of information of several data and compiling it together. In simple
terms its called as procedure which involves searching, collecting, analysing and filtering all
information. This definition generally defines whole process in gist. Their is a large amount of
data which is taken from web sites of different logins and databases. These are collected and
collaborated together in form of patterns, data relationship and co-relation to each other. In
business industry big multinational companies and government bodies all are in drastic collection
of information which will get them lot of purpose for doing business, plus research development.
Their are several information portals which do not provide exact information quotient,
3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
this makes it more difficult to put together correct information in co-relation (Bhatt and et. al.,
2014).
The term DBMS is used for correct collection of data and it is a way better process than
flat files. this can be distinctive by three following reasons.
Data Consistency and Integrity: This is a very important advantage any DBMS provides
as main cause of it is data redundancy which in basic terms known as duplication of data
which is very common in file system. In DBMS, root cause of it is data redundancy, data
normalization is one to cool down to fixing issue like data redundancy. This procedure
takes care of this thing specifically so multiplication or repetition of same information is
totally avoided and space of storing files is also saved in this procedure.
Data Security: Main aim of securing data is to have it secure through unauthorised
access, for example employee of an company should not be able to access payslip of his
seniors in organisation. DBMS provides a easier access to supply correct information to
particular person, no other person shall be able to get information out of that person.
Every person who has access to information should have separate login system which
will help them in giving data which is required for them to know. This saves them form
data theft and protects term of privacy of data.
Easy recovery: In this process if information is lost in server and has to be collected back
one can seek information from having data back up, one of primary feature of DBMS.
Question 3
Define the term GIS? Mention three ways by which GIS can be used by businesses organisations
It is known as Geographic information system, its is a system created for capturing,
storing, manipulating, managing, analysing which will present all the information about
geographical data's. The main element in this system is geography, this state that some ratio of
data is actually spatial(Brocke and Rosemann, 2014).This data is related to most locations on
earth, which are either discover or yet to be discovered. This data is presented with attribute data,
which is any additional information related to spatial features. The correct balance of both these
information makes an successful operation of GIS, it makes it enable the specialise feature of
special analysis and makes it an problem solving technique or tool for it.
4
Document Page
It is not just a software there are several individuals & methods which can mix tools of
geospatial software then to activate this analysis one has to manage several large sets of data and
in the end display information in geographical form.
Their are three main ways in which this technologies are used in the day tot day lifestyle,
some of them are mentioned below:
Mapping: this technology is provided by the GIS mapping which is actually an virtual
representation of data. For example gesture by google known ad “google maps” is best
example to understand this concept. People use it for daily navigation purposes, in their
smart phone and cars. This technology has developed since several years and now its
being used by several cities, their municipalities and especially by private industry.
Telecom & network service: Any organisation can transform their incorporate
geographic area into an complex design of networks, maintenance & planning,
optimization of activities. It is important to define the networking procedure and this
technology helps in designing and creating healthy & safe networking for companies
(Demian and Walters, 2014).
Accident analysis & hot spot analysis: this feature has invented itself in many section
which involves to locate any accidental citation on GPS immediately. This helps in many
situation where a person is incapable of locating the exact place of accident or without
much information can reach on time (Fenz and et. al., 2014).
Mention two benefits of using enterprise system
The technological standard one should use is very difficult to decide since they have to
provide and regulate at several stages of incorporation and deciding to do investment in such is
quite difficult. So the correct investment to do so shall be over ERP software investment.
Enterprise software can work in benefit for any size and type of organisation. The enterprise
resource software is a customizable application that is used in allowing businesses for integral
research and manage most of their important information. Their are several companies globally
which use this procedure and give a correct representation of resource planning. These are
actually considered as one of assets of an organisation. It makes working procedures very
smooth plus protect information on several grounds. Their are several advantages of this
technology two of them are mentioned below:
5
Document Page
Focus IT costs: If one will compare between both ERP actually said to be more costlier
investment, but its one time solution for plenty things as well. Its reduces costing from IT
then instead for paying moderately for resources on different systems which needs to
have a big dedicated staffing system, proper infrastructure, licenses & support teams. All
these costs will be calculated into one investment of ERP but its only one time. If one
shall reduce the costing of IT and these investments and install ERP, a lot of IT costs can
be saved in overall usage (García-Holgado and et. al., 2015).Also, there are many feature
which are used in core functioning areas, such as customer resource management, human
resource management and importantly supply chain management system. In simple terms
it acts as an glue which binds all systems together with all essential data required to do
so.
Total visibility: its one of the most important feature of ERP as one of the most biggest
selling points for software industry. It gives access to all important processes. In any
business by which making data from every department which is easily accessible. Its very
important to keep all information which is related to information in a very centralized
location which will allow for any increased collaboration and better completion of every
tasks.
Question 4
Name Authentication technologies that benefits in preventing hackers from getting access to
organisational systems
The procedure of authentication is weather determining someone or something is in fact
who or what they declare themselves to be. This technology provides access control over
systems by keeping constant watch to see if any user's credentials match the exact credentials in
the managed database of information. This is an authorised users portal or protection of data
authentication server(Hammer, 2015).Users are given their unique special id and its password to
access information in their account. Generally people are familiar with the password security as
it feels more secure than any other options. In this only general pieces of information is given to
users.
6
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Many authentication technologies are present for correct implementation under
preventing their data from hackers & securing information of organisation. Some of them are
mentioned below:
Two factor authentication: this type of protection adds an extra layer of information to
core and can provide several or multiple costing of information which will allow it for the
individual to give 2-3 verification factor then only it will enable it for getting information. In
general these include first an SMS password verification then login password and one more step
which utilizes correct id and password fort entering main server (Han and et. al.,2014).
Multi factor authentication: here the user has to provide authentication for more than
one factor and also had to establish strong grounds to prove that they have to guide and provide
correct authentication for gaining their personal details of banks, employee statements or any
other legal organisation.
One time password: This feature enable every time a person seeks authentication in
banks or buying some product online. Transferring money from one to another account. Here an
OTP(one time password) is generated which when put in server access to the information.
Biometrics: this technology identifies people who access information on basis of either
physical attributes like thumb print scan or face identification methods. The best example for this
is new smartphone which have the feature in which the phones are unlocked by scanning face of
the user. This lets only the main user of the phone enter the information only.
Discuss why organisations require to implement policies to protect themselves
Their are several organisations which require to have many citations and working
capabilities for correct working in organisation. The information every organisation has needs to
be clarified and provided correct data to authorised individual is very important. In this era of
hacking and phishing one needs to control plus protect their server in case there is an urgent need
for fact that there are several information on portal which will help in seeking correct
information and if its gone into wrong hand (Kailash and et. al., 2015). person or organisation
can miss-use it in many ways.
Their is a term called record management policy in which there are strict regulation in
which it is clearly stated that one has to guide and render plenty provisions. Their are several
specific organisation which have to provide a record management policy in which it shall be
described as per the regulations. Some of them are mentioned below:
7
Document Page
Compliance with law: these most policies are actually the litigated provisions which
have to be mentioned in books. Several are mentioned in contract agreement policies which have
to be mandatory uplifted for circumstantial provisions and should be done in context of fact that
there are multiple reasons one should have to be done properly. Their are several reasons where
one has to guide and provide several provision is passed by legal government bodies. The
company is always running under risk of winding up or huge fine if they do not follow obligated
rules and provisions.
Data hygiene: Its is very economically unfeasible if one does not maintain proper
protection of files and information of company. Even several electronic records have to acquire
space in data storage section which can occupy a lot space in hard drives. Their are finite
capacities which have to be kept clean and properly in which they have to be defined that there
are several resources and software which help in cleaning such process(Lemmey and et. Al.,
2015).
Inconsistency: any place where there are several employees goes through issue of data
multiplication and inconsistency in maintain correct records. To avoid such issues one has to
guide and provide a treatment for similar types of records, a correctly allied record or enforced
records which are management policy in which they are maintained and is widely enforced.
Question 5
Analyse the illustration and tell which IS does it represent and why. At which level this IS is
used in business firms
8
chevron_up_icon
1 out of 29
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]