MIS Report: Exploring Wearable Tech, Big Data, Mobile Strategy

Verified

Added on  2022/08/14

|15
|1346
|13
Report
AI Summary
This Management Information Systems (MIS) report analyzes several key technology trends. It begins by exploring the potential of wearable technologies, including their impact on productivity, payment processing, and employee satisfaction, while also acknowledging their limitations such as distractions and cost. The report then delves into Business Intelligence (BI) systems, highlighting their role in data visualization, analytics, and streamlining business processes. The discussion continues with Big Data, examining its applications by Spotify and the New York Police Department for marketing and crime reduction, while also addressing ethical and security concerns. The report also covers mobile technology, outlining its importance in modern communication and the strategies employed by tech giants like Google, Apple, and Facebook. Challenges related to internet and networking, along with security threats to cloud data and responsibilities for cloud security, are also discussed. The report concludes with a focus on security control and data management, emphasizing the importance of data protection and its impact on organizational efficiency and risk mitigation. The report is well-referenced with sources.
Document Page
Management
Information
Systems
Name of the Student
Name of the University
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Wearable Technologies and the Future
Examples of smart wearable technologies include smart
jewelry, fitness trackers and smart clothing with in-built
technology
Leads to better bottom line and higher productivity
Ease of processing payments such as PayPal app in
Samsung Gear 2 Smart watch (Pothukuchi, Duffy & Sacks,
2020)
Improve productivity in workplace by 8.5% and employee
satisfaction rate by 3.5%
Document Page
Advantages and Disadvantages of
Wearable Technologies
Advantages of wearable tech includes –
Helps in increasing productivity
Creating fit employees in the workplace
Makes the most benefits from other tech investments
Disadvantages of wearable tech includes –
Creates distraction among users (Wang, Yang & Dong,
2017)
The tech products are not cheap and not affordable
Battery and size limitations prevailing
Document Page
BI for Reporting and Data Analytics
BI systems aims towards performing data visualization,
thus enhancing decision-making and data quality
Offers ease of performing data analytics
Streamlines the business processes (Gandomi & Haider,
2015)
Helps in spotting business problems and identification of
market trends
Identification and setting benchmarks for vast processes
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Big Data and Impact by Spotify on
Customers
Big Data discusses on the large and complex data sets
Helps towards addressing wide number of business activities,
from analytics to customer experience (Matz & Netzer, 2017)
Spotify has employed Seed Scientific, a data analytics
provider in 2015 (What Is Big Data? | Oracle, 2020)
Use of Big Data help them towards creating hilariously specific
ads
Data-driven marketing provides for unique messaging for
retaining clients
Document Page
Big Data for reducing Crime Rates
The New York Police Department (NYPD) has
implemented data-driven approach for predicting and
fighting against crime
Predictive policing works by NYPD aims for regularly
recording of crime data using sophisticated algorithms
and models (Brayne, 2017)
CompStat supports a dynamic approach for crime
reduction and improving personnel management
Document Page
Ethical or Security Issues posed by Big
Data
Data masking and anonymity can be made possible
Informed consent while using Big Data in research
Vulnerability towards fake generation of data
Troubles raised from cryptographic protection (Salleh &
Janczewski, 2016)
Mining of sensitive information
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Mobile Technology and their
Importance
Mobile technology refers to cellular communication
The future of computer technology majorly rests on
wireless networking along with mobile computing
Telecommunication applications includes video
conferencing, e-mail, instant messaging and others thus
proliferating the organizational growth (Ooi & Tan, 2016)
They encompass multiple service providers, cable system
operators while also including software-based
applications for end-to-end communication services
Document Page
Mobile Strategy used by Tech Giants
Google - They primarily focus over winning customer
heart’s based on providing cheap mobile products. It
thus acts as a two-tiered sleeper cell (Hwang, Lai &
Wang, 2015)
Apple – The company focuses on their UVP , from which
it focuses on their marketing strategy . They also focus
on social media, which further provides growth to their
market share
Facebook – They focus on providing an unique
experience to customers, which cannot be experienced
on desktop (Farley et al., 2015)
Document Page
Challenges from Internet and
Networking
The challenges that are posed with the impact of Internet
and Networking are discussed as:
Poor network performance leads to degrading
performance users
Security poses another challenges for users (Sood, Yu &
Xiang, 2015)
Configuration management offers certain challenges to
network
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Security Threats to Cloud Data
The threats to cloud data includes: Data Breaches, Data
loss due to low backup facilities, Insider threats, DDoS
attacks, Account hijacking and Insecure APIs.
The best advices for companies to protect cloud data are:
Cloud provider should be chosen carefully
Consideration of regulatory demands
Identification of security gaps (Khan & Al-Yasiri, 2016)
Utilization of file-level encryption
Document Page
Who should hold responsibility for
Cloud Security
Cloud security is considered as a team effort
Cloud vendors should offer identity and access
management during providing service (Hendre & Joshi,
2015)
Companies should also implement appropriate
certifications such as COBIT, SOC-2 and many others
Cloud vendors should also offer exclusive features such
as vulnerability detection, application security
management and others
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]