Analysis of Information Systems: Components, Models, and Security
VerifiedAdded on 2022/08/24
|9
|1652
|42
Essay
AI Summary
This essay comprehensively analyzes various aspects of information systems (IS). It begins by identifying the five components of an IS according to the five-component framework: hardware, software, database, network, and people, providing a brief summary of each. The essay then explains Porter's five forces model, a framework for analyzing industry competition. It proceeds to define and provide examples of different Management Information Systems (MIS), including collaboration systems, database management systems, content management systems, knowledge management systems, customer relationship management systems, enterprise resource planning systems, social media IS, business intelligence systems, and enterprise IS. The essay also identifies and discusses both technical and human safeguards to protect against IS security threats. Furthermore, it compares and contrasts the Systems Development Life Cycle (SDLC) and Scrum methodologies for IS development, highlighting similarities and differences. Finally, the essay concludes by emphasizing the importance of MIS in enhancing organizational processes through effective data management and decision-making.

Running head: MANAGING INFORMATION SYSTEM
MANAGING INFORMATION SYSTEM
Name of student
Name of university
Author’s note:
MANAGING INFORMATION SYSTEM
Name of student
Name of university
Author’s note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
MANAGING INFORMATION SYSTEM
Analysis of the components of an information system (IS)
There are various components which are associated with an information system and
these components are analyzed considering the five-component framework.
According to this model an information system consists of five important components
(Aouhassi & Hanoune, 2018). These components are the followings:
Hardware
Software
Database
Network
People
Hardware refers to physical component of an information system and it is associated
with flow of information within information system. Hardware components refer to
peripheral devices that are connected with computers, storage devices that contain
data and other physical devices that are connected with information system.
Software refers to virtual components that are considered for designing and
implementing an information system. In order to ensure that hardware components are
working properly, it is important to control these hardware and this is what is done by
software. Therefore, this is an important for an information system.
Database refers to process of storing data in sever and access those data through
proper database queries. However, it is important to identify that this is not a physical
storage but a logical storage that is implemented through software.
Network refers to components that are responsible for flow of information between
computer systems. When information flows from one computer to another computer,
MANAGING INFORMATION SYSTEM
Analysis of the components of an information system (IS)
There are various components which are associated with an information system and
these components are analyzed considering the five-component framework.
According to this model an information system consists of five important components
(Aouhassi & Hanoune, 2018). These components are the followings:
Hardware
Software
Database
Network
People
Hardware refers to physical component of an information system and it is associated
with flow of information within information system. Hardware components refer to
peripheral devices that are connected with computers, storage devices that contain
data and other physical devices that are connected with information system.
Software refers to virtual components that are considered for designing and
implementing an information system. In order to ensure that hardware components are
working properly, it is important to control these hardware and this is what is done by
software. Therefore, this is an important for an information system.
Database refers to process of storing data in sever and access those data through
proper database queries. However, it is important to identify that this is not a physical
storage but a logical storage that is implemented through software.
Network refers to components that are responsible for flow of information between
computer systems. When information flows from one computer to another computer,

2
MANAGING INFORMATION SYSTEM
then internet connection is required and therefore network is an important for an
information system.
People refers to human resource who are responsible for managing and accessing
information system. They ensure that application of information is effective and
efficient as well. For this, people are most important aspect of an information system.
Explain Porter’s five forces model
Porter’s five forces model is a popular model for analyzing competition in a business
in a business with respect to external environment that might affect business process
(Moreno-Izquierdo, Ramón-Rodríguez & Perles-Ribes, 2016). It helps organization to
identify their performance in market in terms of competition and helps in identifying
their strengths and weakness. As strengths and weakness are identified, it helps in
defining business strategies accordingly and ensure that it maximizes profit while
enhancing business process as well.
According to Porter’s five forces model, five important forces that affects business
process and competition in market are the followings:
Industry competition
New entrants
Supplier power
Consumer power
Threat of alrernate products
Explanation of management information system
Management IS (MIS) integrates software and hardware technologies for providing
information that is effective for decision-making. In this context, some management
MANAGING INFORMATION SYSTEM
then internet connection is required and therefore network is an important for an
information system.
People refers to human resource who are responsible for managing and accessing
information system. They ensure that application of information is effective and
efficient as well. For this, people are most important aspect of an information system.
Explain Porter’s five forces model
Porter’s five forces model is a popular model for analyzing competition in a business
in a business with respect to external environment that might affect business process
(Moreno-Izquierdo, Ramón-Rodríguez & Perles-Ribes, 2016). It helps organization to
identify their performance in market in terms of competition and helps in identifying
their strengths and weakness. As strengths and weakness are identified, it helps in
defining business strategies accordingly and ensure that it maximizes profit while
enhancing business process as well.
According to Porter’s five forces model, five important forces that affects business
process and competition in market are the followings:
Industry competition
New entrants
Supplier power
Consumer power
Threat of alrernate products
Explanation of management information system
Management IS (MIS) integrates software and hardware technologies for providing
information that is effective for decision-making. In this context, some management
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
MANAGING INFORMATION SYSTEM
information system are analyzed which include overview of each management
information system and an example for comprehensive idea regarding this
management information system (Rakhmasari & Anwar, 2017).
a collaboration information system
It refers to a set of IT tolls that are helps in creating workflow for providing
information to specific teams and also team members. It allows to share ideas
between team members and ensure collaboration for effective decision making
process.
Example: enterprise resource management system or ERP
a database management system
It is a software package which helps in defining, manipulating, retrieving and
managing data in a database.
Example: MySQL
a content management system
It is a software application that manages process to create and modify digital
content.
Example: Squarespace
a knowledge management/expert system
Knowledge management systems helps in storing and retrieving knowledge
which enhances collaboration (Mustafa et al., 2016).
Example: consumer relationship management or CRM
a customer relationship management system
MANAGING INFORMATION SYSTEM
information system are analyzed which include overview of each management
information system and an example for comprehensive idea regarding this
management information system (Rakhmasari & Anwar, 2017).
a collaboration information system
It refers to a set of IT tolls that are helps in creating workflow for providing
information to specific teams and also team members. It allows to share ideas
between team members and ensure collaboration for effective decision making
process.
Example: enterprise resource management system or ERP
a database management system
It is a software package which helps in defining, manipulating, retrieving and
managing data in a database.
Example: MySQL
a content management system
It is a software application that manages process to create and modify digital
content.
Example: Squarespace
a knowledge management/expert system
Knowledge management systems helps in storing and retrieving knowledge
which enhances collaboration (Mustafa et al., 2016).
Example: consumer relationship management or CRM
a customer relationship management system
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
MANAGING INFORMATION SYSTEM
Consumer relationship management or CRM refers to expert system that
automates process of managing consumer queries, feedback and provide them
required solution through effective communication.
Example: HubSpot CRM
an enterprise resource planning system
It is a software system that integrates various enterprise applications and
automates various business process that requires resource planning
(Murugesan, 2019).
Example: Zoho ERP
a social media IS
A social media IS refers to an information system that helps in storing,
retrieving and sharing ideas among people through virtual and digital platform
as well (VORONKOVA et al., 2017).
Example: LinkedIn
a business intelligence/decision support system
It refers to information system that automates decision making process
through intelligent data processing (Kruse et al., 2017).
Example: chats and instant messaging software
an enterprise IS
An enterprise IS refers to a type of information system that helps in integrating
business process and enhances business process as well (Carcary et al., 2016).
Example: supply chain management
MANAGING INFORMATION SYSTEM
Consumer relationship management or CRM refers to expert system that
automates process of managing consumer queries, feedback and provide them
required solution through effective communication.
Example: HubSpot CRM
an enterprise resource planning system
It is a software system that integrates various enterprise applications and
automates various business process that requires resource planning
(Murugesan, 2019).
Example: Zoho ERP
a social media IS
A social media IS refers to an information system that helps in storing,
retrieving and sharing ideas among people through virtual and digital platform
as well (VORONKOVA et al., 2017).
Example: LinkedIn
a business intelligence/decision support system
It refers to information system that automates decision making process
through intelligent data processing (Kruse et al., 2017).
Example: chats and instant messaging software
an enterprise IS
An enterprise IS refers to a type of information system that helps in integrating
business process and enhances business process as well (Carcary et al., 2016).
Example: supply chain management

5
MANAGING INFORMATION SYSTEM
Identify and discuss one technical and one human safeguard to protect against IS
security threats
In order to protect IS against threats it is important to apply proper strategies. In this
context one technical and one human safe guard is analyzed for information system
security.
Technical: integrate access control with information system and it will help in ensuing
that data is not accessed without authorization (Rao, Kumar & Reddy, 2018).
Human: do not provide account password with anyone for enhancing security of data
and information system as well.
Analysis of design of an IS
There are several processes that are considered for designing IS and applications for
example, systems development life cycle (SDLC) and scrum (agile development).
In information systems the systems development life cycle refers to a process that is
considered to plan, create, test and deploy an information system (Vogelzang,
Admiraal & Van Driel, 2020).
Scrum is a framework for designing information system while considering agile
principles for software design.
Similarity:
Applicable for designing, deploying and testing information system and this is done
through iteration.
Difference:
MANAGING INFORMATION SYSTEM
Identify and discuss one technical and one human safeguard to protect against IS
security threats
In order to protect IS against threats it is important to apply proper strategies. In this
context one technical and one human safe guard is analyzed for information system
security.
Technical: integrate access control with information system and it will help in ensuing
that data is not accessed without authorization (Rao, Kumar & Reddy, 2018).
Human: do not provide account password with anyone for enhancing security of data
and information system as well.
Analysis of design of an IS
There are several processes that are considered for designing IS and applications for
example, systems development life cycle (SDLC) and scrum (agile development).
In information systems the systems development life cycle refers to a process that is
considered to plan, create, test and deploy an information system (Vogelzang,
Admiraal & Van Driel, 2020).
Scrum is a framework for designing information system while considering agile
principles for software design.
Similarity:
Applicable for designing, deploying and testing information system and this is done
through iteration.
Difference:
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
MANAGING INFORMATION SYSTEM
SDLC refers is a process for information system design and Scrum is a framework
applied in agile methodology for designing of information system.
Analysis of the importance of MIS
In order to enhance organizational process, it is important to make intelligent
decisions and for this access to data is so important. However, only access to data is
not enough, it is also important to manage this data properly for effective data
processing (Karlík et al., 2019).
Management information system or MIS helps in managing data for effective access
to data and data processing as well.
MANAGING INFORMATION SYSTEM
SDLC refers is a process for information system design and Scrum is a framework
applied in agile methodology for designing of information system.
Analysis of the importance of MIS
In order to enhance organizational process, it is important to make intelligent
decisions and for this access to data is so important. However, only access to data is
not enough, it is also important to manage this data properly for effective data
processing (Karlík et al., 2019).
Management information system or MIS helps in managing data for effective access
to data and data processing as well.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
MANAGING INFORMATION SYSTEM
References:
Aouhassi, S., & Hanoune, M. (2018, January). Information system qualification by
component. In Proceedings of the 2018 International Conference on Software
Engineering and Information Management (pp. 11-16).
Carcary, M., Renaud, K., McLaughlin, S., & O'Brien, C. (2016). A framework for
information security governance and management. It Professional, 18(2), 22-30.
Karlík, O., Šik, M., Vévoda, P., Skřivan, T., & Křivánek, J. (2019). MIS compensation:
optimizing sampling techniques in multiple importance sampling. ACM Transactions
on Graphics (TOG), 38(6), 1-12.
Kruse, C. S., Smith, B., Vanderlinden, H., & Nealand, A. (2017). Security techniques for the
electronic health records. Journal of medical systems, 41(8), 127.
Mehraeen, E., Ayatollahi, H., & Ahmadi, M. (2016). Health information security in hospitals:
the application of security safeguards. Acta informatica medica, 24(1), 47.
Moreno-Izquierdo, L., Ramón-Rodríguez, A. B., & Perles-Ribes, J. F. (2016). Pricing
strategies of the European low-cost carriers explained using Porter's Five Forces
Model. Tourism Economics, 22(2), 293-310.
Murugesan, S. (2019). The Cybersecurity Renaissance: Security Threats, Risks, and
Safeguards. IEEE ICNL, Jan-Mar.
Mustafa, N. U., Armejach, A., Ozturk, O., Cristal, A., & Unsal, O. S. (2016, July).
Implications of non-volatile memory as primary storage for database management
systems. In 2016 International Conference on Embedded Computer Systems:
Architectures, Modeling and Simulation (SAMOS) (pp. 164-171). IEEE.
MANAGING INFORMATION SYSTEM
References:
Aouhassi, S., & Hanoune, M. (2018, January). Information system qualification by
component. In Proceedings of the 2018 International Conference on Software
Engineering and Information Management (pp. 11-16).
Carcary, M., Renaud, K., McLaughlin, S., & O'Brien, C. (2016). A framework for
information security governance and management. It Professional, 18(2), 22-30.
Karlík, O., Šik, M., Vévoda, P., Skřivan, T., & Křivánek, J. (2019). MIS compensation:
optimizing sampling techniques in multiple importance sampling. ACM Transactions
on Graphics (TOG), 38(6), 1-12.
Kruse, C. S., Smith, B., Vanderlinden, H., & Nealand, A. (2017). Security techniques for the
electronic health records. Journal of medical systems, 41(8), 127.
Mehraeen, E., Ayatollahi, H., & Ahmadi, M. (2016). Health information security in hospitals:
the application of security safeguards. Acta informatica medica, 24(1), 47.
Moreno-Izquierdo, L., Ramón-Rodríguez, A. B., & Perles-Ribes, J. F. (2016). Pricing
strategies of the European low-cost carriers explained using Porter's Five Forces
Model. Tourism Economics, 22(2), 293-310.
Murugesan, S. (2019). The Cybersecurity Renaissance: Security Threats, Risks, and
Safeguards. IEEE ICNL, Jan-Mar.
Mustafa, N. U., Armejach, A., Ozturk, O., Cristal, A., & Unsal, O. S. (2016, July).
Implications of non-volatile memory as primary storage for database management
systems. In 2016 International Conference on Embedded Computer Systems:
Architectures, Modeling and Simulation (SAMOS) (pp. 164-171). IEEE.

8
MANAGING INFORMATION SYSTEM
Rakhmasari, A. A., & Anwar, D. (2017). An Analysis and Design of a Virtual Collaboration
Information System of the Jamu Supply Chain Network Based on a Fair Adaptive
Contract'. Proceedings of MICoMS, 539-545.
Rao, P. V., Kumar, V. P., & Reddy, B. P. K. (2018). Applying Agile Software Methodology
for the Development of Software Development Life Cycle Process (SDLC). Journal
for Research| Volume, 4(02).
Vogelzang, J., Admiraal, W. F., & Van Driel, J. H. (2020). A teacher perspective on Scrum
methodology in secondary chemistry education. Chemistry Education Research and
Practice.
VORONKOVA, O. V., KUROCHKINA, A. A., FIROVA, I. P., & BIKEZINA, T. V. (2017).
Implementation of an information management system for industrial enterprise resource
planning. Revista ESPACIOS, 38(49).
MANAGING INFORMATION SYSTEM
Rakhmasari, A. A., & Anwar, D. (2017). An Analysis and Design of a Virtual Collaboration
Information System of the Jamu Supply Chain Network Based on a Fair Adaptive
Contract'. Proceedings of MICoMS, 539-545.
Rao, P. V., Kumar, V. P., & Reddy, B. P. K. (2018). Applying Agile Software Methodology
for the Development of Software Development Life Cycle Process (SDLC). Journal
for Research| Volume, 4(02).
Vogelzang, J., Admiraal, W. F., & Van Driel, J. H. (2020). A teacher perspective on Scrum
methodology in secondary chemistry education. Chemistry Education Research and
Practice.
VORONKOVA, O. V., KUROCHKINA, A. A., FIROVA, I. P., & BIKEZINA, T. V. (2017).
Implementation of an information management system for industrial enterprise resource
planning. Revista ESPACIOS, 38(49).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.