Management Information Systems Report: NZ Bicultural Context

Verified

Added on  2023/04/08

|12
|2319
|147
Report
AI Summary
This report provides a comprehensive overview of Management Information Systems (MIS), focusing on security and privacy threats, coding errors, and the impact of technology on individuals and businesses. It delves into various types of security breaches, mitigation procedures, and the ethical considerations surrounding IT devices. The report also explores the integration of Maori values and the bicultural context of New Zealand within the framework of MIS, discussing how these values can be protected and incorporated into information systems for sustainable development and conflict minimization. The literature review covers a range of topics, including the impact of technology on privacy, the role of the government, and the importance of efficient IT product design. The reflection section examines the importance of Maori values in the strategic and planning phases of information systems to minimize conflicts and ensure sustainable development.
Document Page
Running head: MANAGEMENT OF INFORMATION SYSTEM
Management of Information System
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1MANAGEMENT OF INFORMATION SYSTEM
Table of Contents
1. Literature Review........................................................................................................................2
1.1 Mitigation procedures of the security attacks........................................................................3
1.2 Different types of security breaches......................................................................................3
1.3 Codding errors.......................................................................................................................4
2. Reflection.....................................................................................................................................5
3. Reference.....................................................................................................................................8
Document Page
2MANAGEMENT OF INFORMATION SYSTEM
1. Literature Review
How does technology pose a threat to individuals’ privacy
The increasing using of the advanced technologies is having both positive as well as
negative impact on our society. The main focus of this paper is on the negative impact of the
technologies (Luppicini & So, 2016). The privacy threats of the applications such as website
tracking facility from the cookies of the websites can have a direct negative impact on our
society as well as for the national security of the country. The different types of real-life
examples of privacy threats are the ability of Google Maps which can be used to track the real-
time and history wise (O’Brolcháin et al., 2016). The main advantage of the paper is that is
focused on the security threats coming from the governments as well as the threat coming from
Google Map. There are no real limitations or disadvantages of this paper.
The connectivity of the smart tv, fridges, thermostats, IOT based devices with our mobile
devices is a significant security and privacy threat (Weizenbaum, 2017). The smart alarms and
smart speakers also have a significant disadvantage considering the security and privacy of the
consumers of those devices (Bennett & Raab, 2017). The connection between public WiFi with
our mobile devices can also be a privacy threat to our mobile devices as well. Different
techniques are used by the security agencies which can be a significant privacy threat for the
society (Lopez et al., 2017). A wide range of privacy issues which are currently faced being
faced in our society and the prime limitation of the paper is that it does not provides a case study
providing the details of a particular security threat on our society.
Document Page
3MANAGEMENT OF INFORMATION SYSTEM
1.1 Mitigation procedures of the security attacks
Technology offers both benefits as well as limitations to our society and also in
workplaces. The excessive use of technology has resulted in serious privacy issues. The privacy
issue in our workplaces can be a direct impact on both the personal growth of the employees as
well as business loss from the view of the main stakeholders of the business (Plachkinova,
Andrés & Chatterjee, 2015). There are lots of new technologies which can be used in the future
to protect the security and privacy of the business data which are circulated in the business
environment of business organizations such as there the latest encryption techniques such as the
symmetric and the symmetric key ciphers (Bennett & Liu, 2018). Identity Management is the
other way in order to secure the online transactions which are done both in organizations as well
as personal applications. The user-centric authentication systems can be very much useful to
secure the devices which are often compromised due to the security attacks (Laudon & Laudon,
2016). The security and the privacy issue can be also managed using the location detection
technologies, the laptops, personal digital assistants, gaming controls all can be tracked using the
location detection technologies, at the same time it can be said that the location detection
technologies are very much important to compromise the privacy of the users (Fickel et al.,
2018). The other very important way to improve the privacy and security of the services
provided by the IT technologies is the efficient designing of the IT products (Miller, Tait &
Saunders, 2015). The EU Data Protection Directive and the EU privacy laws are also very much
useful in order to protect the data which are access to buy advanced IT technologies.
1.2 Different types of security breaches
The technologies which are increasingly used in the business industries as well in our
personal mobile devices have lots of privacy and security issues. The issues are having a
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4MANAGEMENT OF INFORMATION SYSTEM
negative impact on the productivity of an employee as well as in our personal life (Eckhoff &
Wagner, 2018). The use of features such as Facebook Live in social media has resulted in the
growth in business sectors but at the same time, it helps in breaching privacy and security of the
users as all the other accounts get to know about the location of the video and all the other
facilities associated. There are lots of ethical issues associated with the use of the IT devices
which is a serious concern as these ethical issues may give rise to different security issues as well
(Mera Lee-Penehira, Smith & Martin, 2018). The communications facilities which are practiced
in most of the business organizations are also compromised as the cybercriminals are using new
ways of network breaching technologies such as the SQL injection attacks (De Luca & Annals,
2006). The wearable devices which are increasingly been used on our society is a huge source of
concern as its improved connectivity is making it very much probe to security breaches
(Harmsworth, Awatere & Robb, 2016). Most of the time users of mobile devices do not read the
offer documents of the software before the installation procedure but the unread authorization
procedure is usually very risks as it gives them access to the existing data of the mobile devices
such as the access to the gallery (Santamaría et al., 2016). The technological risks and security
threats usually have a negative impact on the national economy as well. Most of the promotional
messages are being sent with the phishing emails which are considered as a security breach
(Quaratiello, 2000). The privacy threats of the IT technologies involve the loss of control of the
data which are circulated in the business environment.
1.3 Codding errors
There are different categories of coding errors associated with the Information Systems
which causes numerous types of security issues for the users (George, 2008). The security laws
and the policies which are there for the protection of the organizational assets or the personal
Document Page
5MANAGEMENT OF INFORMATION SYSTEM
devices are breached due to the coding errors (Hart, 2018). The risk mitigation approaches which
are usually followed by the organizations have no role to play in the coding errors. The coding
errors were supposed to be identified by the testers of the organization before it is available for
the users. The other significant security issue with the use of the IT technologies is the DDoS
where the cybercriminals break down the control chain in a private network (Wallace & Wray,
2016). These kinds of attacks have the potential to comprise the installation of any other software
or hardware in the infected system. The integrity of the data is generally compromised during the
DDoS attack. New and modified computer worms such as the Stuxnet virus are used in the data
security attacks. The use of the older version of the operating systems is also a significant cause
of security concerns as it does not provide the exact security measures which are required to
protect the computer system from these kinds of attacks (Bennett & Liu, 2018). Storm shield
endpoint security can be used to deal with such security threats on a computer system with an
obsolete operating system.
Thus, the use of different categories of technologies have both negative and positive
impacts in our workplaces as well as in our society, the above unit of the paper is very much
useful to understand the security constraints of the IT innovations.
2. Reflection
The Maori values can be protected using the Management Information System (MIS).
The recent advanced patches are very much important to protect the rich bicultural cultural
heritage of Aotearoa New Zealand. The Maori value has to be understood in the first place and
its application in society for future generations (Rawson, 2016). The connection between the
social and the cultural issues and implications can be also managed using the MIS (Findsen,
Document Page
6MANAGEMENT OF INFORMATION SYSTEM
2016). The ethical principles followed in the Maori values can be maintained by MIS.
(Berryman, Glynn & Woller, 2017). The Maori values such as their traditional ways of living,
holistic approaches, water management facilities can be managed using the MIS. The
maintenance cost of the MIS will not be having an impact on those peoples (Harrison, Svetieva
& Vishwanath, 2016). The aspiration of the community can be also implemented with the help of
the Information systems (Santamaría et al., 2016). The concept of biculturalism can be very
much improved with the use of the Information System such as the Management Information
System (MIS). The concept of bicultural has to be understood in a better way so that the Maori
values and the non-Maori values are differentiated used for different aspects.
The bicultural environment can be very much useful for managing Information Systems
also. The Maori value and the business practices which can be used in the context of the
Information Systems are auahatanga, kaitiakitanga, manaakitanga, whakawhanaungatanga and
auahatanga (Bennett & Raab, 2017). The behavior of the workers of the business organizations,
their commitment level in the workplaces can be improved if the Maori values are followed
effectively.
The role of the bicultural of New Zealand and the Maori values must be very much
beneficial in nature as it will be helping the users of the Information Technology to with the
complexities of a bicultural environment (Luppicini & So, 2016). The natural resources of both
the Maoris and the non-Maoris are very much important to be protected by the governments, at
the same time bicultural partnership can have a significant advantage for the Maori community
as well.
The Maori value can be very much useful in having an effect in the Information System
as it will be helping the community to have sustainable development (Mead, 2016). The values
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7MANAGEMENT OF INFORMATION SYSTEM
can be used in the strategic and planning phase as it can be very much useful to minimize any
categories of conflicts.
Document Page
8MANAGEMENT OF INFORMATION SYSTEM
3. Reference
Bennett, C. J., & Raab, C. D. (2017). The governance of privacy: Policy instruments in global
perspective. Routledge.
Bennett, S. T., & Liu, J. H. (2018). Historical trajectories for reclaiming an indigenous identity in
mental health interventions for Aotearoa/New Zealand—Māori values, biculturalism, and
multiculturalism. International Journal of Intercultural Relations, 62, 93-102.
Berryman, M., Glynn, T., & Woller, P. (2017). Supervising research in Māori cultural contexts: a
decolonizing, relational response. Higher Education Research & Development, 36(7),
1355-1368.
Eckhoff, D., & Wagner, I. (2018). Privacy in the smart city—Applications, technologies,
challenges, and solutions. IEEE Communications Surveys & Tutorials, 20(1), 489-516.
Fickel, L., Abbiss, J., Brown, L., & Astall, C. (2018). The Importance of Community Knowledge
in Learning to Teach: Foregrounding Māori Cultural Knowledge to Support Preservice
Teachers' Development of Culturally Responsive Practice. Peabody Journal of
Education, 93(3), 285-294.
Findsen, B. (2016). Learning in later life: a bicultural perspective from Aotearoa/New Zealand.
International Journal of Lifelong Education, 35(5), 555-568.
Harmsworth, G., Awatere, S., & Robb, M. (2016). Indigenous Māori values and perspectives to
inform freshwater management in Aotearoa-New Zealand. Ecology and Society, 21(4).
Document Page
9MANAGEMENT OF INFORMATION SYSTEM
Harrison, B., Svetieva, E., & Vishwanath, A. (2016). Individual processing of phishing emails:
How attention and elaboration protect against phishing. Online Information Review,
40(2), 265-281.
Laudon, K. C., & Laudon, J. P. (2016). Management information system. Pearson Education
India.
Lopez, J., Rios, R., Bao, F., & Wang, G. (2017). Evolving privacy: From sensors to the Internet
of Things. Future Generation Computer Systems, 75, 46-57.
Luppicini, R., & So, A. (2016). A technoethical review of commercial drone use in the context of
governance, ethics, and privacy. Technology in Society, 46, 109-119.
Mead, H. M. (2016). Tikanga Maori (Revised Edition): Living By Maori Values. Huia
publishers.
Mera Lee-Penehira, D., Smith, H., & Martin, J. (2018). A Kaupapa Māori Facebook Group for
Māori and Indigenous Doctoral Scholars: Maryann Lee in Conversation With. Global
Perspectives on Social Media in Tertiary Learning and Teaching: Emerging Research
and Opportunities: Emerging Research and Opportunities, 72.
Miller, S., Tait, P., & Saunders, C. (2015). Estimating indigenous cultural values of freshwater:
A choice experiment approach to Māori values in New Zealand. Ecological economics,
118, 207-214.
O’Brolcháin, F., Jacquemard, T., Monaghan, D., O’Connor, N., Novitzky, P., & Gordijn, B.
(2016). The convergence of virtual reality and social networks: threats to privacy and
autonomy. Science and engineering ethics, 22(1), 1-29.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10MANAGEMENT OF INFORMATION SYSTEM
Plachkinova, M., Andrés, S., & Chatterjee, S. (2015, January). A Taxonomy of mHealth Apps--
Security and Privacy Concerns. In 2015 48th Hawaii International Conference on System
Sciences (pp. 3187-3196). IEEE.
Rawson, E. (2016). Te Waioratanga: Health promotion practice-the importance of Māori cultural
values to wellbeing in a disaster context and beyond. Australasian Journal of Disaster
and Trauma Studies, 20(2), 81-87.
Reiman, J. H. (2017). Driving to the panopticon: A philosophical exploration of the risks to
privacy posed by the highway technology of the future. In Privacy (pp. 159-176).
Routledge.
Santamaría, A. P., Webber, M., Santamaría, L. J., Dam, L. I., & Jayavant, S. (2016). Te Ara
Hou: A new pathway for leading Māori success as Māori. Evaluation Matters–He Take
Tō Te Aromatawai, 2, 99-129.
Weizenbaum, J. (2017). On the Impact of the Computer on Society: How does one insult a
machine?. In Computer Ethics (pp. 25-30). Routledge.
Hart, C. (2018). Doing a literature review: Releasing the research imagination. Sage.
George, M. W. (2008). The elements of library research: What every student needs to know.
Princeton University Press.
Quaratiello, A. R. (2000). The College student's research companion. Neal-Schuman Publishers,
Inc., 100 Varick St., New York, NY 10013.
De Luca, R., & Annals, A. (2006). Writing that works: A guide for tertiary students. Pearson
Longman.
Document Page
11MANAGEMENT OF INFORMATION SYSTEM
Wallace, M., & Wray, A. (2016). Critical reading and writing for postgraduates. Sage.
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]