Analyzing Information Systems and Big Data: A Detailed Report

Verified

Added on  2023/06/08

|8
|1666
|80
Report
AI Summary
This report provides a comprehensive analysis of information systems and big data, covering theories, methods, and techniques related to the design and development of IT solutions such as McAfee and Moodle. It defines and provides examples of various systems including DSS, ESS, TPS, MIS, and KSM, highlighting their applications in different contexts. The report also discusses the impact of IT on globalization, emphasizing the economic, financial, cultural, political, and technological dimensions. Furthermore, it addresses the risks associated with Information Systems Outsourcing (ISO) and the critical role of IT infrastructure in digital transformation, including the digital barriers and communication modulations. The report concludes with references to books and journals, supporting the analysis and findings presented.
Document Page
Information System &
Big Data Analysis
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
SECTION A...................................................................................................................................3
SECTION B....................................................................................................................................5
REFERENCES..............................................................................................................................7
Document Page
MAIN BODY
SECTION A
1.0 Describe the theories, methods and the techniques related to the design and the development
of the following IT solutions:
McAfee: It is a malware scanner that is specifically designed to firsts detect and then
completely remove each and every type of identified malware from the system. The
utilization of real time engines by McAfee can help in the blocking of these corrupted files,
from being downloaded in the device. The development of this software makes used of the
Agile or the Continuous Integration or Delivery methodology (Chen and Rao, 2022). The
Waterfall methodology is no longer a part of the McAfee technologies. The services of this
software are in regards to the All in on protection, PC optimization, Web protection and the
VPN mobile security.
Moodle: It is a renowned platform that enables the user in regards to the creation of online
courses, keep a distinctive eye over the progress of the students and the provision to add
assignments. The basic theory behind this application is the Idealist Curriculum Theory that
permits constructive learning of the students. The application furthermore helps in the
communication process between the teachers and the students through the utilization of
forums and discussions. It is thereby acts as a host for a cohesive collaborative learning
through the facility of access of the data with its usage to be completely free. The best feature
of this IT solution is the modernized and an easy-to-use dashboard with convenient file
management techniques (Du, 2022).
2.0 Define and provide examples for each of the systems given below:
DSS (Decision Support System): It can be used for the planning and forecasting of a
company’s strategical development in regards to the provision of the improvement in their
decision-making capabilities. The most noteworthy example of DSS can be the optimum
utilization of a GPS route planning which helps in analyzing the available options to opt for
the travel, through the monitoring of real time traffic in the route
ESS (Executive Support System): This particular system proves to be an assistant for the
top-level managers to effectively and securely access the internal as well as the external
information of the strategical planning which is significantly reactive to the decision-making
Document Page
process and their relative executive responsibilities. The external data bases, financial
reports, patents records and the technical reports can be the persuasive examples of ESS.
TPS (Transaction Processing System): This system tends to works in regards to the
collection, storage, modifications and the retrieval of the data transaction of a company. They
can even help in the delivery of predictable responses in terms to the requests that are
generated. The order processing mechanisms, hotel reservation systems and the employees’
records are all suitable examples of TPS (Rath, 2022).
MIS (Management Information System): This helps in the study and examination of the
technology, people and the comprehensive relationship between the two. MIS helps a firm to
realize the maximum amount of benefits from the investment that are made in the equipment,
business process and the personnel. The significant examples of MIS can be payroll
processing, order processing for the E-commerce business and etc.
KSM (Knowledge Management System): This system helps in the application and the
utilization of the knowledge management principles for the provision of significant creation,
sharing and identification of relative information with the employees and the customers. This
helps in the improvision of the quality of the management. The Online Community Forums,
Research and Insights Libraries and Learning Management Systems can be the noteworthy
examples of KSM (Tian, Zhang and Mei, 2022).
3.0 What is Globalization? What are the effects of IT on Globalization?
Globalization implies the speedup of developments and trades of individuals,
merchandise, and administrations, capital, advances or social practices, all around the planet.
One of the impacts of globalization is that it advances and increments communications
between various locales and populaces all over the planet. The significant examples of
globalization can be the economical, financial, cultural, political and the technological
dimensions that it covers in regards to their growth and evolution in the modern-day business
environment. Additionally, Information Technology (IT) works with the easy trade of data
across borders, as well as the extension of assets from nations all over the world (Xie and et.
al., 2022). This extension prompts novel thoughts and items, as well as better approaches for
carrying on with work. The significant effects of IT over the globalization can be in regards
to the economic specialisation, enhancement in the scope of awareness in the society and the
delivery of the information exchanges in the external business environment.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
SECTION B
Optional Question 2
1. What are the risks associated with Information Systems Outsourcing?
Information Systems Outsourcing remains behind entrusting information storing
and dealing with data frameworks through the help and assistance from the external
suppliers. Organizations might consider data frameworks moving to lessen consumptions
on information capacity, and guarantee that the information is secure. The serious
implications of the ISO can be in terms of the risks that are associated with it. The issues
are:
Lack of experiences in the staff
Loss of control over the functions of the information system
Susceptibility of the strategic information
The hidden costs involvement
The relative dependency on the business of vendor
Possibility of weak management
Outdates technological skills
Lack of innovative capacity
Uncertainties in the business
The greatest gamble of outsourcing is the absence of control. A business cycle
that has been executed by the in-house group when moved to outside organizations
passes on you with next to zero command over it (Yang and Altrjman, 2022). Also, when
bungled by the specialist co-op, it can influence the nature of the rethought
administration.
2. Why is IT infrastructure so critical to digital transformation?
The definition of digital transformation is the method involved with utilizing
advanced innovations to make new or alter the current business cycles, culture, and client
encounters to meet changing business and market prerequisites. This reconsidering of
business in the advanced age is the constructive computerized change which is required
for the relative growth and development of the technological dimensions. The signified
examples of digital transformation can be the invention of customer eccentric digital tools
Document Page
such the varied mobile applications that are specifically designed for the improvement of
a customer’s journey.
The digital barriers that are present in the society can be in regards to the
communication that affects interface of the digital transformation. These barriers can be
in terms of the physical, emotional, identical, semantic, accessibility, attention and
credibility. The digital communication modulations have to encounter with these barriers
and formulate inferences so as to how to solve the pertaining problem (Ye and et. al.,
2022).
IT infrastructure is the arrangement of equipment, programming, offices and
administration parts that help the conveyance of business frameworks and IT-empowered
processes. Advanced framework alludes to the computerized innovations that give the
establishment to an association's data innovation and activities. Instances of computerized
foundation include: Internet spine, broadband, Mobile telecom and advanced
correspondence suites. The significance of digital infrastructure is basic for the
conveyance of administrations to distant regions. In metropolitan and local urban
communities, new advances are being utilized to work on the productivity, supportability
and administrations of framework networks from transport to energy administrations.
Document Page
REFERENCES
Books and Journals
Chen, B. and Rao, Z., 2022. Research on the Construction of Students’ Vocational Core Literacy
Evaluation System of Big Data Analysis. In International Conference on 5G for Future
Wireless Networks (pp. 676-685). Springer, Cham.
Du, M., 2022. Application of information communication network security management and
control based on big data technology. International Journal of Communication Systems,
35(5), p.e4643.
Rath, M., 2022. Intelligent Information System for Academic Institutions: Using Big Data
Analytic Approach. In Research Anthology on Big Data Analytics, Architectures, and
Applications (pp. 788-806). IGI Global.
Tian, T., Zhang, Y. and Mei, Y., 2022. Intelligent analysis of precision marketing of green
agricultural products based on big data and GIS. Earth Science Informatics, pp.1-12.
Xie, Y., and et. al., 2022. Ower Big Data Analysis Technology and Application Based on Cloud
Computing. In Innovative Computing (pp. 1559-1564). Springer, Singapore.
Yang, X. and Altrjman, C., 2022. Application of Big Data in Management Information System.
In International conference on Smart Technologies and Systems for Internet of Things
(pp. 594-603). Springer, Singapore.
Ye, N., and et. al., 2022. Research on Personal Privacy Risks and Countermeasures in the Era of
Big Data. In International Conference on Artificial Intelligence and Security (pp. 222-
234). Springer, Cham.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]