Reflective Learning Journal: Information Systems Module

Verified

Added on  2023/03/21

|9
|2979
|99
Journal and Reflective Writing
AI Summary
This reflective journal details a student's learning journey through an Information Systems (IS) module, covering a wide array of topics. The journal begins with an introduction to IS, exploring fundamental concepts and real-world applications, distinguishing between IT and IS, and examining the scope of IS within businesses. Subsequent entries delve into data, information, and knowledge management, emphasizing their roles in organizations and daily life. The journal then progresses to business IS, analyzing their functions and the interactions between businesses. Further modules explore e-commerce, e-business, and business intelligence, highlighting their impact on business models and performance. Information security is also examined, focusing on its importance in protecting organizational assets. The journal concludes with reflections on the IS profession, summarizing the key learnings from each module and their implications for future career development. The student incorporates personal beliefs and ethical considerations throughout, demonstrating a comprehensive understanding of the subject matter.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: INFORMATION SYSTEM
0
Information System
Reflective Journal
(Student details :)
5/12/2019
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Information System
1
Contents
Reflective Learning Journal.......................................................................................................2
Introduction................................................................................................................................2
Learning Journal based on Information System.........................................................................2
Learning Journal 1: Introduction to IS...................................................................................2
Learning Journal 2: Data, Info and Knowledge.....................................................................3
Learning Journal 3: Business IS.............................................................................................4
Learning Journal 4: business intelligence, e-Commerce and e-Business..............................5
Learning Journal 5: Information security...............................................................................6
Learning Journal 6: the information systems profession.......................................................6
Conclusion..................................................................................................................................7
References..................................................................................................................................7
Document Page
Information System
2
Reflective Learning Journal
Introduction
The reflective journal is focused on creating a learning journal which will be added to
my learning related to foundations of information systems (referred as IS). This journal will
get utilised to keep a detailed impact of the learning based on information system. To do so, I
will practice a reflective analysis. I will write this reflection through studying the material I
have received during the module and then will integrate those materials of the information
systems with what I already know. In addition, I will challenge my own knowledge while
creating new knowledge, thoughts, opinions and ways so that I can integrate them with my
future professional practice. According to me, reflection is an authentic assessment which
involves me being vulnerable while allowing my personal beliefs evolved by what I have
learnt. My tutor made me believe that important element of the reflection is my incorporation
of my belief system, morals and ethics along with the effect of information systems on people
(Vacca, 2012).
Moreover, I will integrate all of the learning acquired during the modules 1 to 6. In
this context, I will include the learning related to an introduction to IS, data, knowledge,
information, business IS, e-Commerce, e-Business, business intelligence, info security and
most importantly the IS profession module. In this way, with the help of this reflective
learning journal I will comprise all of the IS modules’ learning for the betterment and growth
of my future career.
Learning Journal based on Information System
In order to demonstrate my learning based on IS module, I will utilise separate
learning journals for all of the six modules; modules 1-6. In this way, the reflective learning
blogs of all six modules are as follows:
Learning Journal 1: Introduction to IS
I learnt this module in two major parts include module 1.1 and 1.2. In this context,
within the first part, I have been introduced to all of the basic concepts of IS, while laying the
foundation for whatever the module 1 cover in the remaining part of IS subject. The first part
Document Page
Information System
3
of the module 1 that is 1.1 also included definitions as well as useful references to evolve
business strategies. Later then in the second part of the first module 1.2, I learnt about the
foundation of IS, while considering particular real-life incidents and events where IS is
utilised. I observed that learning about the type of info which a business manager need when
running the business most efficiently has been occurred within this module (Yeh & Chang,
2007).
While I was studying the module 1, I got to know that IS are all around us even in our
daily life. For an example, the devices through which we retrieve internet pages, the printers
we use to print documents, and most importantly our phone, each and everything help us to
achieve a specific objective and they all are the examples of IS. In this context, after learning
the module 1, I could be able to distinguish the complex and simple IS. As some IS are
comparatively simple, whereas others are critically complex. I learnt that few IS are for our
personal use, some facilitate interactions amid people, some IS are publicly available, while
others are accessible only to their authorized users (Peffers, Tuunanen, Rothenberger, &
Chatterjee, 2009). In this way, learning from module 1 made me realise that IS come in multi
shapes as well as sizes.
Apart from this, module-I has helped me to define as well as explain the scope of IS;
while considering and critically evaluating businesses within system’s terms. With the help of
learning this module I could research and contrast different types of advanced technologies.
Besides, I learnt to collaborate with my colleagues within a scenario of the contemporary
business environ. In this way, I learnt critical analysis through my critical thinking.
Additionally, I learnt to anticipate as well as map the info requirements of a huge Australian
enterprise. Thus, the module 1 has helped me to expand my info searching techniques along
with the synthesising tactics from it.
Learning Journal 2: Data, Info and Knowledge
This learning journal is all about comprising my learning acquired from the module 2.
In this context, there were majorly 2 parts in the module 2; module 2.1 and 2.2. Within the
former part of the module 2, I have been introduced to the notion of data and hence explored
its path towards data enrichment. In addition, I learnt that where data becomes of most use to
the organizations which accumulate and use it effectively. Later then, during learning the
second part of this module, I got moved beyond data and info and hence focused on how
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Information System
4
organizations collect, organize, disinfect, as well as utilise organisational knowledge (Vacca,
2012).
In addition to that, while learning the use of data, info and knowledge within a general
context I realized that millions of people use data and information in various forms by
sending e-mails, as well as doing businesses record transactions. I also learnt that when stock
brokers buy and sell shares it is the data, info and knowledge management only. Moreover,
examples like government monitor activities on public roads as well as crypto currencies are
mined taught me the importance of correct data, info and knowledge in real-life. After getting
the basic knowledge about information system and its management in daily life I can interpret
it as in our daily life people take many photographs as well as videos from their phones, to
me it is the data production at huge level which is getting stored on personalized devices. By
above practice it can be said that with time, our info and data consumption grew and hence its
proper management becomes essential. In this way, after learning module 2, I am capable to
effectively differentiate amid data, info and knowledge with the help of useful examples
studied during the module. Additionally, I also analysed the role of correct data within a
contemporary enterprise by using examples which I invented through the learning acquired
during this module.
Learning Journal 3: Business IS
Likewise the above two modules, module 3 was also having two main parts, 3.1 and
3.2. During the first part I have got introduced to business IS which exist as well as operate
within an organization from the perspective of helping it operate at their most efficient mode.
Later then, within the later part of the module 2 I studied the scope of a sole enterprise. Apart
from this, I focused on what happens while two businesses wish to interact or cooperate with
each other in the context of IS.
In addition, reading and studying this module as well as wholly attempting all of the
learning oriented activities helped me to get a clear image of business information systems.
With the help of learning acquired from this particular module, I learnt using the functional
view of business to map as well as critically evaluate the IS utilised within an organization of
my own choice. I also learnt the synthesising the pros and cons of the core business IS while
incorporating great quality sources into my arguments. On the other hand, I learnt how to
justify the utilisation of the business IS while defending the drive of modern organizations for
pursuing constant improvements as well as efficiency (Infosec, 2012). Now, I can easily
Document Page
Information System
5
suggest recommendations for the international firms through considering implementations of
modern accounting systems in a way that those firms can appropriately resource their
organizational requirements. Business info systems module also made me critically evaluate
academic resources by utilising thematic analysis as well as further using those as the base of
forming a risk analysis and a risk mitigation plan (Peffers, Tuunanen, Rothenberger, &
Chatterjee, 2009). In this way, I successfully can conceptualise the inter-links amid various
abstract concepts like enterprise IS and multiple business IS within a diagrammatic form.
Learning Journal 4: business intelligence, e-Commerce and e-Business
In this module of IS, I have learnt within 2 main modules 4.1 and 4.2. In this context,
I learnt the concepts of e-Business and e-Commerce being the platforms which enable novel
business models. Besides, I learnt the application of IS into business intelligence being a
method of driving and monitoring business performance. As a new platform which can
facilitate business transactions, I have considered agility being a major business capability
within this imagination based digital age (Vacca, 2012). This module was beneficial for my
future learning because studying as well as reading this module made me understand the
origin of the internet concept and utilise it for critically analysing how new businesses
capitalise over recent technologies in order to drive their business. In my opinion, e-
Commerce is a kind of transaction done on a computer-mediated network which involves the
exchange of rights or ownership for utilising goods and services. Moreover, I learnt the
differences among e-Business and e-Commerce as e-Business is wider than e-Commerce. As
per the learning occurred in this module, e-Business is a business that run a part of their
internal processes online, containing risk management, inventory management, finance, and
human resources. I learnt that for a modern business to be e-business and e-commerce
simultaneously, it should sell their products both online as well as manage sales offline
(Watson, Boudreau, & Chen, 2010).
Post learning from the module 4, I can now make useful recommendations over the
use of technology for business which is cognisant of the new risks to modern businesses. I
accessed many examples of the e-Commerce and e-Business systems and due to which I can
now distinguish amid all different types of electronic business which are centred on the kind
of consumer being served. In addition to that, I have also critically analysed the key reasons
why new era businesses should adopt e-Business as well as e-Commerce initiatives and
technologies. In this way, fourth module of IS enables me to define business intelligence
Document Page
Information System
6
which contextualising it in its future projections and history as well. I understood that why
modern business managers require timely and accurate information for a successful business
operation. Furthermore, I learnt the important decision-making models while discussing
contemporary business intelligence technologies in the context of IS.
Learning Journal 5: Information security
In the two modules of module 5, I have learnt and explored the basic concepts as well
as context of the information security. In this way, during the opening half of the module I
have experienced a scene-setting exercise for getting the bright and dark sides of information
security. Later then, in the second portion of the module I explored many practical techniques
utilised for protecting an organization’s informational assets. I also learnt that all of the
people in an organization must be aware of information security issues and hence they must
be committed for protecting all of the organizational information (Yeh & Chang, 2007).
When I was studying the information security module, I could learn and get the
reasons why international organizations need to care about their information security.
Moreover, learning about information security was easier for me as I just had learnt
everything related to IS during the modules 1to 4. I realized that information is the asset of
people, organization and their competitors. Therefore, I learnt that taking care of such info by
several means like risk management, secured configuration, network security, managing user
privileges, incident management, malware prevention, monitoring, user education and
awareness is the information security. This module was successfully able to describe as well
as justify the tenets of information security within an organization context. While learning the
concepts of underlying authorisation I explored and characterised the personal preference of
the modern hackers (Vacca, 2012). Besides, with the help of retrieving many examples of
threats to info security, I learnt disaster recovery planning, policies, guidelines, standards and
procedures from the perspective of info security. Apart from this, this specific module has
successfully explained the reasons why social engineering is the main insidious kind of
information security threat (Picanso, 2008).
Learning Journal 6: the information systems profession
This learning journal was subdivided into two parts include, 6.1 and 6.2. In general, I
learnt many important things about my future being an IS professional along with the need of
on-going development as well as ethical compliance. My learning from this module
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Information System
7
contained emerging technologies and themes which can keep me interested, entertained as
well as employed in an IS profession (Gollmann, 2010).
In this context, this module’s activities made me consider as well as define the
meaning of ‘profession’ and hence synthesise its key elements. Besides, I have identified the
main need of continuing professional development from the perspective of future career
growth. To be an IS professional, I decided to develop and evolve my skill-set as per the
contemporary IT expert job requirements (Gupta & Shakya, 2015). I also accessed
professional ethics for an information systems expert. In addition, I also read, studied and
evaluate the contemporary ethical issues related to IS so that I can find the solutions of most
of them during my future job.
Conclusion
In whole, after studying this module of IS, I learnt that there are so many forms of IS
all around us; we all generally use above than ten information systems every day. In this
context, this module has allowed me to learn each and everything about an information
system with the help of 6 major modules, while each divided into two further parts including
basic and advanced learning modules. I learnt the importance and significance of data,
knowledge and information while managing them through an IS.
In this way, creating this learning journal has successfully demonstrated my effective
reflective writing practice. As per my evolved thinking and opinion, reflection is the way to
learn by doing things or practicing knowledge in various scenarios. Finally, keeping this
learning info in the form of a learning journal will be beneficial for my future career and
professional development.
References
Gollmann, D. (2010). Computer Security. Wiley Interdisciplinary Reviews: Computational
Statistics, 2(5), 544-554.
Gupta, A., & Shakya, S. (2015). Information system audit an overview study in e-
Government of Nepal. International Conference on Green Computing on Green
Computing and Internet of Things, 827-831.
Document Page
Information System
8
Infosec. (2012). the Role of Cryptography in Information Security. Retrieved from Infosec:
https://resources.infosecinstitute.com/role-of-cryptography/#gref
Peffers, K., Tuunanen, T., Rothenberger, M., & Chatterjee, S. (2009). A design science
research methodology for information systems research. Journal of managemene
information systems, 24(3), 45-77.
Picanso, K. (2008). Protecting information security under a uniform data breach notification
law. Fordham L.(Rev.), 355.
Vacca, J. (2012). Computer and information security handbook. London: Newnes.
Watson, R., Boudreau, M., & Chen, A. (2010). Information systems and environmentally
sustainable development: energy informatics and new directions for the IS
community. MIS Quarterly, 23-38.
Yeh, Q., & Chang, A. (2007). Threats and countermeasures for information system security:
A cross-industry study. Information & Management, 44(5), 480-491.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]