Information Management Report: Analysis of Ensoft Inc. Strategies

Verified

Added on  2020/10/22

|18
|4956
|264
Report
AI Summary
This report delves into the realm of Information Management (IM) within Ensoft Inc., an UK-based technology and information firm. It initiates with a comprehensive overview of IM, encompassing its definition and the pivotal organizational resources it entails, such as people, information and technology, and processes. The report then explores the impact of IM tools and techniques on organizational effectiveness, followed by an examination of information processing and its applications. A significant portion is dedicated to analyzing Ensoft's organizational strategy, with specific references to how its Management Information Systems (MIS) enable this strategy, particularly through the use of technology and systems like supply chain management. The report also addresses the vulnerabilities of computer and network information, offering protective measures, and includes a discussion of a cybersecurity incident. Furthermore, it covers key elements of a Knowledge Management (KM) system and the impact of people's behavior on knowledge creation. Ethical considerations in IM, including identity theft, are also discussed, along with practical steps to protect personal information. The report concludes with an explanation of structured and unstructured data, the role of Business Intelligence, and the impact of Cloud Computing and Social Media. Finally, it presents Nonaka and Takeuchi’s SECI model of organizational knowledge generation.
Document Page
Information
Management.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................5
Question 1........................................................................................................................................5
(a)Define Information Management (IM) and describe the three important organizational
resources within it...................................................................................................................5
b) Elaborate on the role of each specific element and how IM tools, techniques, skills and
values impact on organizational effectiveness.......................................................................6
Question 2........................................................................................................................................6
a) What is the main purpose(s) of information processing and application in organizations?6
QUESTION 3 ..................................................................................................................................7
(a)Describe your organizational strategy and how your MIS enable that strategy by referring
specifically to the technology and systems............................................................................7
QUESTION 4 ..................................................................................................................................7
a) Choose any ONE of the IT systems in your organizations with which you are the most
familiar Define what this system is and describe in what way your choice gives your
organization competitive opportunities..................................................................................7
Question 5........................................................................................................................................8
a) Describe the ways in which information on your computer (or network) is vulnerable and
list measures you can take to protect it...................................................................................8
b) Describe a specific incident in which you have been a victim or target related to cyber
security / cybercrime such as phishing or identity theft and what you have learned from that
incident...................................................................................................................................9
QUESTION 6 ..................................................................................................................................9
a) Describe the key elements of a KM system and how technology enables the development of
knowledge in an organization. ...............................................................................................9
b) Provide an example of people behaviour and how it can positively or negatively impact on
the creation of knowledge....................................................................................................10
QUESTION 7.................................................................................................................................10
a) What are ethics and do ethics apply to information management and collection within a
business’s environment? ......................................................................................................10
b) What is identify theft and give an example how it works in practice?............................10
Document Page
(c)Give two practical examples what you personally can do to protect and safeguard your
information on your PC?......................................................................................................11
d) What kind of controls has your business implemented to prevent the misuse of
information?.........................................................................................................................11
e) What anti-virus software do you use to protect your PC or laptop from attacks?...........11
QUESTION 8 ................................................................................................................................12
a) Explain the difference between structured and unstructured data and provides specific
examples how these data types are present in organizational information. ........................12
b) Explain where the concept Business Intelligence fits into these two data types.............12
QUESTION 9.................................................................................................................................12
a) Explain what are (1) Cloud Computing and (2) Social Media and how these will impact on
the management of Information...........................................................................................12
QUESTION 10...............................................................................................................................13
a) Describe Nonaka and Takeuchi’s SECI model and their model of organizational knowledge
generation with specific reference to the role of tacit and explicit knowledge. ..................13
CONCLUSION..............................................................................................................................13
REFERENCES .............................................................................................................................15
Document Page
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INTRODUCTION
Information management is an cycle of organisational works and activities, acquisition of
knowledge and information from more than one sources and then custodianship or distribution of
information person who need it. Information management is one of important aspect to give best
attribute in organisational development by managing works and procedures. This report is based
on Ensoft Inc which is an UK based organisational and deals in information and technology. This
report is based on role and importance of information management and various tools and
techniques that are effective for organisation. Further it elaborates about processing of
information and support of MIS in organisational strategy.
Question 1
(a)Define Information Management (IM) and describe the three important organizational
resources within it.
Information management is an collection or management of information and knowledge
from different sources and distribution of that sources to different kinds of audience. In that
aspect management means control or balance over structure, processing and at last deliver of
knowledge and information (Altay and Labonte, 2014 ). Information in which includes both
electronic and physical information. In that management structure plays very important role to
manage and deliver right kind of information through out life cycle. In information management
environment consist of enterprise content management, electronic record management and
business process management that are very important factors that helps in bring safety and
security in business environment. There are very important resources in organisation that helps in
bring effective results.
People:
People is an important resource that plays very important role in information
management system (.Beaven, VirtualAgility Inc, 2012..). People are obligatory to manage or
coordinate information and information technology. People helps in process information that an
machinery can not implement successfully. The reason is people have different way to think and
behave before taking important decision.
Information and information technology:
Document Page
The another best resource in manage or deliver right kind of knowledge and information
with help of information and information technology that helps by using software applications
and computer hardware ( Bocking and et.al , 2012). Information and their technology deals with
avail computer and various software to safely convert, protect and store, transmit and then
retrieve information so that desirable objectives can be achieve.
Process:
The one of most important resource is process which is a series of actions to reach at
desirable goal and objective. Information technology become more integrated with
organisational process. In case of Ensoft Plc. By using definite distribution network they reach at
desirable goals and objective.
b) Elaborate on the role of each specific element and how IM tools, techniques, skills and values
impact on organizational effectiveness.
In information management to bring effective results and desirable goals and objectives
organisation have to adopt various information management elements. There are various
components that are as follows:
Computer hardware:
Computer hardware is an physical technology that works simultaneously with
information. Hardware is as small that it fits in smartphone as a pocket or as large to set in
supercomputer. In hardware includes peripheral devices and tools that work with computer such
as key board, external disk and drives.
Computer software:
the another main element of information system that is software which divides into two
types that is system software and application software (.Borja and Castells, 2013). In system
software consist of operating system and application software design for accomplishing specific
tasks and duties.
In information management tools and techniques plays very major role in managing all
components that are very useful in accomplishing desirable goals and objectives. Skills that are
require to manage all important attributes in system are one of significant values that after
managing all system it give to Ensoft Inc.
for example Ensoft Inc build technology that helps employees to solve their problem in creative
way their hardware and versatile platform bring uniqueness by developing apps.
Document Page
Question 2
a) What is the main purpose(s) of information processing and application in organizations?
Information processing refers to manipulation of information with help of computer and
other digital tools and techniques that collectively known as information technology. Information
processing describes things that change in whole world. It is an form of changing in processor in
presentation in text file and data. The one of main purpose of information processing in
organisation is to deliver right kind of knowledge and information that proved fruitful in
organisational development and enhancement (Costa, Soares and de Sousa, 2016.). In
information processing is helpful in coordinating and managing different people to reap benefits
out of them and deliver right kind of information to everyone. To coordinate with various
departments information processing should be very obligatory to deliver right kind of
information so that they can work in self interest of organisation and deliver their efforts in right
direction. Information processing should be apply to reap out benefits by adopting at every
sphere in an organisation.
For example in context of Ensoft Inc. when they wish to maintain a liberal satisfaction policy,
customer service re presenter must be trained by using various advance technologies and
applications.
QUESTION 3
(a)Describe your organizational strategy and how your MIS enable that strategy by referring
specifically to the technology and systems.
To attain goals and objectives organisation have to implement various strategies and
tactics. In case of Ensoft plc they for managing their assets and concern about return on their
assets with help of risk, cost and performance that help in remain always relevant in organisation
al goals and objectives (Drucker, 2012). An asset management information system is computer
based system which helps to user for maintaining documentation for asset management function.
With the help to computerized maintenance management system that is a part of information
technology. CMMS is an management system that is an software package that coordinate or
maintains computer based data and information for organisation's maintenance operations. That
is one of important technology and system that helpful in achieving organisational goals and
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
objectives that management system give accuracy in work and system and in specified time
period.
For example in Context of Ensoft Inc. to record all necessary information and data they use asset
management based information system so that accurate results should be accomplished and data
remain secure.
QUESTION 4
a) Choose any ONE of the IT systems in your organizations with which you are the most familiar
Define what this system is and describe in what way your choice gives your organization
competitive opportunities.
In any organisation information technology plays very important role in achieving
organisational goals and objectives. In case of Ensoft plc they use supply chain management
which is one of the best system that helps in bring efficiency and accuracy in works an d
procedures. Supply chain management is an management activity of flow of goods and services
and procedures that helps in transform raw material into final goods and services. It works on
active steam lining of supply side of business activities for enhancement of consumer value to
gain competitive advantage and bring accuracy in work flow (Galliers and Leidner, 2014.).
SCM cover the efforts of supplier for develop and deliver as efficiently and economically. In
supply chain cover everything from product development to information system that needs direct
undertakings.
For example In case of ensoft plc use supply chain and its management tools and techniques to
coordinate and manage production to supply it to ultimate consumer base that brings efficiency
in their work and procedures. It can be possible by effective information technology
measurement tools and techniques and internal inventories, internal production system, direct
distribution and maintaining sales according to consumer preferences. Supply chain is an large
network of people in which various individuals, teams and organisation, resources and
technologies to manufacture and sale produced goods and services to end user ( Gaskill and
et.al , 2013.). SCM is an significant attribute of products and services from initial up to final
sales of them. It is one of the most effective information technology system that helps in deliver
right kind of products and services by using appropriate distribution network and chain which
can be vary from organisation to organisation. In case of Ensoft plc they use large chain of
Document Page
distribution their products and services to their end user by using traditional supply chain in
which they passes from definite path.
Question 5
a) Describe the ways in which information on your computer (or network) is vulnerable and list
measures you can take to protect it.
In the competitive world it is very obligatory to protect the networks or computers from
cyber monsters to invade business. In case of Ensoft plc they use various measures and tactics
that helps in gain competitive advantage to enlarge business opportunities. In organisation
various kinds of vulnerabilities exist one of them are:
Networks and systems:
Networks are discreet, very much functioning and portable enough by including
operating system and information. To remain sustainable in market organisation have to use
strong network that is error free and record all information and give deliverables in best manner.
In case of Ensoft Inc. their network sometime suffer from denial of service attacks and viruses
and to protect it they use various measures that are Bolster access control that leaves data and
systems susceptible from unauthorized access.
b) Describe a specific incident in which you have been a victim or target related to cyber security
/ cybercrime such as phishing or identity theft and what you have learned from that
incident.
Pishing is an technique in which cyber criminals by craft emails to target by taking some
harmful actions. It by tricked downloading malware that disguise documents such as cyber
security is one of harmful effect that hinders self interest of an individuals and harm it from
many aspects (Gaskill and et.al , 2014). In Ensoft plc in an organisation some malpractices
happen and data should be corrupted by an criminal that proved harmful for organisation because
it become cause of financial loss of company and many people.
From that theft and incident Ensoft Inc. should be understand that necessary and important
information and data should be protect by using various software's and beware from criminals
and not log to any unknown and protected webs that hinders self interest of an individual and
organisation.
Document Page
QUESTION 6
a) Describe the key elements of a KM system and how technology enables the development of
knowledge in an organization.
Knowledge management is one of important factor that developed to support knowledge
intensive ways, actions and construction to optimize works and procedures in effective manner.
There are various elements of knowledge management system that helps in giving direction to
reach at desirable goals and objectives. In elements includes strategy that helps in identification
of problems or opportunities (Holtshouse, 2013). The another main factor is actors that are
people that belong from different backgrounds and have experiences. The another important
element is manage knowledge source by using authenticity, reliability and knowledge of
currency that are important for organisation to achieve goals and objectives. Interface,
functionality, infrastructure and continuous improvement is important factor that helps in
bringing development of organisation. By bringing all these factors or elements in to an
organisation brings harmonious results or outputs.
For example Ensoft Inc. by adopting continuous improvement in major spheres where
improvements are very much necessary. Such as in it network and system is very much
important to comply with best security.
b) Provide an example of people behaviour and how it can positively or negatively impact on the
creation of knowledge.
People behaviour vary from situation to situation and according to circumstances they
behave in both positive and negative manner. In an organisation when people come from
different backgrounds that creates many problems. In that condition various conflicts arise in
organisation and people behave in negative way. Negative attitude does not mean to put someone
in bad mood but it should be tangible, measurable that impacts on adversely on creation of
knowledge and information (Kivinen and Lammintakanen, 2013.). On other hand Ensoft plc
invest money to create positive environment at workplace by giving flexible working hours,
compensation and best packages to them in that case people respond in positive way and give
their best to achieve goals and objectives. So positive attitude of people give positive outcomes
in achieve organisational goals and objectives. For example in case of Ensoft Plc. By giving
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
training and development and flexible working hours organisation helps in productivity of
employees that plays major role in organisational development and enhancement.
QUESTION 7
a) What are ethics and do ethics apply to information management and collection within a
business’s environment?
Ethics is an moral philosophy in which involves systematizing, defending and
recommend what is right and wrong in particular situation. It helps in resolving questions related
to human morality about defining concepts about what is good or evil, virtue and vice. An
information system widely use in organisation and they rely totally on internet and other devices
to smooth operations of business (Laudon and Laudon, 2015). Ensoft depends on information
system to protect from vulnerable attacks on their precious techniques. There are some ethical
concerns that face by organisation while deals with information technology that affect on their
environment of business. Such as Ensoft Inc. faces privacy issue of data and information that are
majorly important for them to remain always competitive in marketplace.
b) What is identify theft and give an example how it works in practice?
Identify theft is an predetermined avail of others identity to gain financial advantages or
to attain credits and other benefits in name of other person, perhaps for disadvantage of other
person. There are various ways and methods with the help of them, identity theft come into
practice.
From trash:
An individual can be able to gain personal knowledge and information with help of old
bills, financial statements, name, account no., bank details etc.. theft can use that information in
opening new account and assume identity entirely.
Mail:
By stealing mail and other related information in that aspect theft may be capable to take
advantage about pre approved credit card, account and can take advantages.
(c)Give two practical examples what you personally can do to protect and safeguard your
information on your PC?
Protect system and network for that individuals use various methods and tools that
safeguard information of PC that are Encrypt data by using relevant software that give regulation
Document Page
of investigatory powers act that helps in protect data and information to deals in proper way
(Liang and et.al ., 2014.).
The another best way is to back up data and information by relevant tool in which duplicate of
data should be prepare so individual not have to suffer from lose, stolen and do not have to
compromise by using external hard devices it could be possible. In case of Ensoft Inc. they save
and keep duplicate data and information so that if original data get damage they use it and get
positive results.
d) What kind of controls has your business implemented to prevent the misuse of information?
Data misuse is concerned with using data in such a way that it was not intended, it should
be described in laws, standards and corporate policies and under various agreements (Lim,
NEXTLABS Inc, 2012.). There are various ways and methods that helps in data protection that
use by organisation in which consist of manage data access, monitor user actions, stay informed
and educate employees are one of important kind of controls that adopted by Ensoft to saving
misusing of data and information.
e) What anti-virus software do you use to protect your PC or laptop from attacks?
Antivirus software develop to eliminate or remove viruses of computer, it is designed in
such a way that it helps in protection of computer system or network in against viruses threat.
Anti-virus scan their files or other information from computer memory.
There are various kinds of anti-virus software in which Comodo, avira, avast and AVG are kinds
of software that protect data and information from kinds of malpractices.
The Ensoft plc uses Kaspersky anti-virus that is one of powerful software that protect data and
information from misuse.
QUESTION 8
a) Explain the difference between structured and unstructured data and provides specific
examples how these data types are present in organizational information.
Structured defined as clearly defined data type and information that structured in a
definite format and makes easy to understand. On other hand in unstructured data it is not easily
searchable including in various formats such as audio, video and social media postings are
examples of unstructured data (Lim, NEXTLABS Inc, 2013.). Consumers of data can select any
one of data and information according to their purpose of usefulness. Structured data and
chevron_up_icon
1 out of 18
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]