StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Survey of Information Systems Personnel Theory - Assignment Example

Cite this document
Summary
"Survey of Information Systems Theory" paper examines technical, business and system competencies, Information Systems, Cloud Computing, Operating Systems, Enterprise Systems, Intelligent systems, Web services, E-mail confidentiality, and Data Security. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful

Extract of sample "Survey of Information Systems Personnel Theory"

Assessment 2 – Survey of IS Theory (Part B) Customer Inserts His/her Name Customer Inserts Grade Course Customer Inserts Tutor’s Name 28, 04, 2013 Table of Contents Table of Contents 2 Introduction 3 Q1. Technical, business and system competencies 3 Q2. Information Systems 4 Q3. Cloud Computing 5 Q4. Current technologies 7 Q5. Operating Systems 8 Q6. Enterprise Systems 9 Q7. Intelligent systems 11 Q8. Web services 12 Q9. E-mail confidentiality 13 Q10. Data Security 15 Bibliography 17 Assessment 2- Survey of IS Theory (Part B) Introduction Information Systems Personnel are responsible for installation, maintenance, and management of computer software and hardware. These tasks cover stand-alone and networked systems. In addition to these duties, development of improvement of technological services also comes along. Q1. Technical, business and system competencies Technical, business, and systems competencies are valuable aspects core to an organization. Technical competency entails knowledge and skills involved in hardware, software, security, and network divisions. Key skills in these divisions enable an organization perform maintain high performance levels. Technological advancements in the world today forces an organization conform to changes in order remain relevant. Many organizations seek outsourcing technical skills services. This attributed to the high cost of employing these personnel. Common tasks include ensuring operating systems run well, installation and updating of software and maintaining computer hardware (Kessler 2006). Business knowledge and skills come in handy in offering administrative organizations and stimulating growth of an organization. Business competencies keep track who and who is not working within an organization. These skills propel organization’s success with organizational processes and achievements checked. With competent leadership skills, an IS personnel easy interacts with others eliminating achievement barriers of an organization. Excellent interaction skills either in spoken, or written bring an IS personnel at a potential level for promotions and higher executive positions. System competency entails good knowledge on problem solving skills, system integration, critical thinking, and development methodologies. System integration links functionally or physically computer systems and other software applications. This enables brings about computer compatibility whereby networking becomes an easier task. Development of methodologies covers system design and analysis and also entails a systems development life cycle. This life cycle determines when a system is old and requires replacement. System competency also requires high skills in creativity and innovation. High levels of creativity and innovation enables an organization stay above others and also competitive. This means IS professionals give the organization an opportunity to remain above others. Q2. Information Systems Management Information System (MIS) entails the study of relationships between people, technologies, and organizations involved. This system also aims at improving an organization’s performance through information technology. MIS entails relationship, human, and technological resource aspects. Aspects of infrastructure flexibility, human capital, and partnership quality of these resources portray a direct positive relationship. With this is in place, organizations now determine the efficiency in which inputs are converted into outputs. Knowledge management systems (KMS) enhance support on organizational knowledge relating to creation, retrieval, application, transfer, and storage of information. The Expert Systems is a type of KMS. In this case, duties normally performed by a domain expert are delegated to the information system in place. Roles are to diagnose related problems. Groupware is another category whereby workers are interconnected so as to share information and resources. With document management systems, storage, sharing, and searching through documents are an easier task. Decision support systems present users with information so as to influence informed decision making. Database management systems assist in data collection for easier storage and retrieval. Lastly, simulation systems are used in testing effects of real world scenarios. KMS brings efficiency along with service delivery. Knowledge on supply chain management enables organizations combine information, finances, and necessary materials. This enables the business produce quality goods and services and also in time. It entails coordination of the flow of supply of goods from vendors to manufacturers, from manufacturers then to distributors then retailers. Supply chain entails product flow from manufacturers to final consumers. Designed supply management software also monitor product flow and also facilitate planning. This brings efficiency and equity in supply of goods from an organization Consumer relation management (CRM) programs offer to give customers satisfactory feedback from relayed complaints, which are also recorded. CRM services come in handy in after sales services and also in customer support. CRM personnel work in taking new orders, resolving problems, and also getting new businesses. CRM platform gives customers an opportunity for feedback related with products and services acquired. Q3. Cloud Computing Cloud computing is a technology that involves delivery and storage of computer resources over the Internet which is provided at a fee. This technology aims at delivery of services at high speeds similar to super computers. Cloud computing performs several task that include financial portfolios, provision of data storage, and also large capacity games. Networks from large groups of servers offer cloud computing services. In this case, data related applications run by low cost PC are executed on large servers. This not only enhances speed but also saves storage for large capacity data. The technology entails pooling of resources and later sharing them to low end users. Cloud computing applies virtualization techniques in order to maximize the power of this technology (Jamsa 2012). This technology entails the front end and the back end sections. The front end is the computer interface on the user’s side, whereas the back end is the ‘cloud’ section. User’s front end runs computer applications so as to gain access to the cloud interface. Web based applications such as Firefox portray examples of what cloud computing really is. Firefox provides web-based mail programs which the user gains access over the Internet without initially loading the programs on his/her PC. Before an organization resorts to cloud computing, a number of issues need clarification and analysis. An organization needs understanding about data security and ownership. With cases of data theft, it becomes a necessity that an organization establishes clear boundaries in terms of data ownership with the provider. Clear guidelines on this issue also prevent possible breach of trust between the organization and the provider. Customization of applications comes in as another factor in the decision of implementing cloud computing in an organization. Customization ensures an organization’s specific needs are taken into consideration. This service is likely more expensive, and, therefore, an organization needs to weigh service delivery and also the cost of this service. Legal frameworks relating to cloud computing also affect this service. Issues with compliance in some countries limit proper risk assessment of the services. It is also a challenge in that data stored in cloud computing is accessible by the government. Examples of these services include social networking sites such as Facebook and Twitter. Emails such as Gmail and Yahoo is also an example of this service. Q4. Current technologies Technological advancements in TV have come with the unveiling of 85”, S9, UHDTV, 4K resolution a smart Samsung TV. The smart TV comes with improved user interface with the use of the Linux operating system. It also monitors what a user is fond of in its applications and serve more on what a user prefers. The unveiling took place in the Sydney Star casino. In recent days, Australia seeks to increase broadband connection so as to serve homes and businesses effectively. Broadband leaders include South Korea and the United States which have speeds of up to 1 gigabyte for homes and businesses. It is expected that the healthy business in fibre optic technology delivers on increasing speeds. It is expected that Foxtel releases Foxtel Go app available on the Google Android platform. The application enables user access to 50 live TV channels with Foxtel Play and Foxtel on Internet TV, which is available for Samsung Smart TV. The applications rolling out expects to commence on Samsung SIII and Samsung SIV. Information provided above enables business managers identify countries with better speeds in terms of Internet connections. The speeds are an important factor in considering using cloud computing platform. For businesses on the TV market, Samsung unveiling of the smart TV comes as a boost for technology enthusiasts. Q5. Operating Systems The purchase of operating systems must be considered with the compatibility of the computer. Operating systems are responsible for running of applications such as the Internet and word processors. UNIX is a popular operating system in organizations. It serves many computers as the OS can be used with different computers ranging from mainframes to microcomputers. The OS also features multitasking and multiuser capabilities. Networking comes as a strong feature in Unix operating systems. With this, file sharing is easier. Latest version of Unix has virtualization enhancements so as to support flexibility in changing workloads. It is also available in three editions that are more flexible and compatible. The OS exploits IBM POWER technology to utilize virtualization in promoting superior performance. It is also scalable and to initiate capacity growth. Windows is another popular operating system in organizations. The latest version of Windows coined Windows offers a magnificent array of new features which improve performance. It is a sleek OS which runs faster on the right hardware. It offers enhanced security improvements. The OS portrays increased battery life, faster in booting, and also offers an improved user interface. Mac OS has gained popularity in the OS market in the recent times. The OS formerly known as Macintosh offers better graphical and user interfaces as compared to Windows. Mac OS-X is one of the most recent versions of the Operating System which can run on Intel processors. The OS has improved user interface with the use of water-like elements. The OS has offered several keyboard shortcuts that offer a consistent graphical user interface. The OS comes in two separate versions of the desktop version and the Mac OS server. Open GL is a new feature that accelerates the hardware for window compositing. The latest version simplifies network services and also brings along software administration and workgroup management tools. Mac OS comes as most preferred OS in terms of performance, interface, and security. The OS boosts key security features with formidable virus protection techniques. User interface together with other features make the OS easier to use and operate, and hence its massive popularity with users all over the world. Q6. Enterprise Systems Enterprise systems (ES) are important in organizations for mission-critical applications derived from complex Information System platforms (Myerson 2001). These systems integrate business, and IT platforms so as to support and meet organizational needs. These systems are commonly used by world’s largest businesses. Medium sized companies are also implementing enterprise systems, as well. The four major divisions of enterprise systems software include Teradata Database Server, Microsoft SQL Server 2012, Customer Relationship Management, SAP Enterprise Resource Planning Software, and IBM z10 Mainframe Server. ES support information flows, business processes, and support data analytics in organizations (Myerson, 2001). Benefits ES synchronizes functions of different departments in an organization. This integrated system saves time in terms of processing organization’s documents such as payrolls. The system also brings along transparency and accountability within different departments. Information accessible on the central server aides in management of the organization. This facilitates decision making and consequently improves an organization’s performance. ES systems saves time in terms of data retrieval and also information transmission between different departments in an organization. The systems have improved efficiency in large companies with small and medium sized organizations emulating the same. Challenges Purchasing enterprise system software such as Customer Relation Management and Enterprise Resource Planning means the organizations incurs hefty fees. In addition to expensiveness, an organization also incurs extra costs of training staff ahead of its implementation. Implementation of these systems is not always a guarantee for an organization’s success. In some cases, the systems fail bringing about double losses in terms of money and time. Enterprise systems last for about 10 to 20 years after which upgrading of systems is required. In most cases, organizations accumulate large amounts of data which leads to data overflow even before the time frame elapses. Data overflow in one department ripples effects to other departments. This poses a challenge in weighing options before implementation of the system. Q7. Intelligent systems Intelligent systems (IS) perform activities normally thought as intelligent. The systems are a branch of computer science (Schalkorff 2009). These systems are of exceptional importance in various sectors improving efficiency in day-to-day activities. Most organizations have implemented IS especially security systems so as to protect an organization’s property either data or equipment. Biometric systems are a good example of security systems. They include face detection, eye detection, and fingerprint access control just to mention. In this case, an intelligent device takes sets of fingerprints which later scans, records, and takes unique fingerprint matches which is later implemented. IS also include video servers which record, store, and later play streamed video. Streaming takes place without degradation of video’s signals. These servers also store large amounts of compressed audio and video for later use. The systems also offer quality user interface. Serial data transmission also applies the use of IS. The technology covers network applications, access control, and automated manufacturing just to mention a few. This type of transmission entails sending of one bit of data after another on a single transmission line. The technology brings advantages of direct data flow and also point to point connection between the receiver and transmission lines. Robotics, expert systems, language translation, and gaming systems also depend on IS. Manufacturers have adopted robotics in automation of services. A case example is robots used in car manufacture. These systems have boosted production of manufactured units which consequently increases sales. Implementation of IS in gaming systems have boosted interactive human-computer interface whereby games have become more fun. Translation services have broken language barriers between countries. IS are of excellent benefit to organizations. With the incorporation of computer intelligence with network connectivity, users experience real-time services. The systems store, update, and also keep real-time running of applications. With this, monitoring of the organization becomes an easier task. Q8. Web services Web services are applications that communicate using open protocols such as the Internet. These services allow communication between organizations without prior knowledge of the organizations over a firewall. Instead of providing Graphical User Interfaces (GUI), they share data, processes, and business logics over networks. Web pages can also be added by developers so as to meet specific user functionality needs. These services save time in custom coding whereby different applications form different sources communicate with one another. It is significant noting that web services are not tied towards any operating system or any programming language. For example, Windows applications can communicate with UNIX applications. Web servers, also known as application services do not require the use of HTML and browsers. Web services offer several benefits to end users. It allows interoperability between systems. With interoperability option, programmers can easily choose preferred programs to work on. These services are also virtual platform-independent basing on standard based communications. With this technology, reusability of codes is also an option. Web service components are reused so as to deploy legacy code of these services. Deployment of standard Internet technologies are also made possible. On the other side, web services bear short comings. Web services use a fairly verbose manner in identifying data with plain text protocols. These services come larger than requests encoded using the binary protocol. Low speed connections and busy connections are also some of hindrances affecting web services. In some cases, access to HTTP and HTTPS is limited with occurrences of power outages. This results in crashing of the server inhibiting client interface of an organization’s services. There are also challenges facing web developers involving addressing client needs on real-time bases. Web services aid e-businesses in networking communications between different organizations. The availability of developed web pages also offer interactive user interfaces for business transactions. Q9. E-mail confidentiality No. E-mails are a personal and a sensitive subject. Having access to personal information betrays cyber privacy and confidentiality. Educational institutions therefore should not have any influence in monitoring emails that contain information meant for specific people. Accessing personal information can lead to mistrust between the institutions and students whose mails are accessed. In some cases, messages sent and received may face misinterpretation. In this case, some mails are misunderstood as either serious or just sheer talk. Information touching on sensitive issues such as security and sometimes abuses can be treated with outmost seriousness. In this case, one is apprehended and bears responsibility for a mistaken action. This results to victimization of innocent persons. It is a clear fact that in the digital era, most people feel free in communication via e-mails just to name a common avenue. In some cases, emotions and feelings are attached in the mails. Allowing access to these mails means possible ridicule and mock from persons with vested interests. Mistrust consequently generates hatred hampering peaceful co-existence between persons. On the other hand, sometimes mails received may contain abusive and sometimes sensitive information without the user’s knowledge. In such cases. The recipient bears the responsibility of reporting such issues to the administration. On this account, the institution also bears a responsibility to act appropriately. In some cases, the mails may contain security threats which require addressing with much priority allocation. Informing students and related stakeholders about the possible threats fosters accountability. Staying informed places persons in a better position to respond and report any anomalies experienced eliminating doubts and threats. It therefore lies upon the administration to set up formidable reporting and problem-resolution centers. It is necessary that guiding and counseling sessions are available for persons especially students. This arises from receiving abusive, emotional messages that hamper self-esteem. Q10. Data Security Technological advancements have on the other hand initiated data insecurity and possible threats to information. Organizations have invested time and money so as to counter these threats. Data security breaches can tear a company apart. Information is nowadays on a digital platform meaning the organization greatly depends on the digital information (Damgard 1999). Password protection is a basic and necessary step in countering data theft. Protecting accounts and resources with passwords prevents possible access into these areas. Strong passwords are recommended in such cases with the use of more than 8 characters. It is also advisable to implement the use of special characters in eliminating easier identification of the passwords. Installing firewalls also enhance security measures. This step means that only business related connections are allowed into the organization preventing illegal and strange connections. On this regard, network services provided by organizations also require firewall installation. Monitoring incoming connections to the smallest level fosters data security. Software updates are also necessary in countering data threats. Configuration of automatic updates of operating systems and server applications limit data security breaches. New updates also include antivirus and malware. Malware protection entail anti-spyware and antivirus software. Constant updates of these programs limit the possibility of security threats either data theft or virus attack. Data encryption entails converting information to a form which is only understood when reconverted back using a specific algorithm key. This program gives an organization ultimate control over data even if stolen with the possession of a decryption key. A popular encryption software is JavaScript encryption program. Implementation of these measures limit data security threats. Trust between players in an organization is also necessary. In recent times, data theft have emanated from working staff or staff previously working in an organization. Establishing trust between these players hampers greatly possibilities of security threats. Bibliography Kessler R., 2006. Competency-Based Interviews: Master the Tough New Interview Style and Give Them the Answers That Will Win You the Job. New Jersey: Career Press. Alter S., 1999. Information Systems: A Management Perspective. 3rd edition. New York: Addison-Wesley. Jamsa K., 2012. Cloud Computing. 1st edition. Burlington: Jones & Bartlett Learning. Myerson M., 2001.Enterprise System Integration. 2nd edition. Mexico City: Auerbach Publishers Inc. Schalkorff J., 2009.Intelligent Systems: Principles, Paradigms and Pragmatics. 1st edition. Burlington: Jones & Bartlett Learning. Damgard I., 1999. Lectures on Data Security: Modern Cryptology in Theory and Practice (Lecture Notes in Computer Science). Manhattan: Springer. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Survey of IS Theory Assignment Example | Topics and Well Written Essays - 3000 words, n.d.)
Survey of IS Theory Assignment Example | Topics and Well Written Essays - 3000 words. https://studentshare.org/information-technology/2050060-assessment-2-survey-of-is-theory-part-b
(Survey of IS Theory Assignment Example | Topics and Well Written Essays - 3000 Words)
Survey of IS Theory Assignment Example | Topics and Well Written Essays - 3000 Words. https://studentshare.org/information-technology/2050060-assessment-2-survey-of-is-theory-part-b.
“Survey of IS Theory Assignment Example | Topics and Well Written Essays - 3000 Words”. https://studentshare.org/information-technology/2050060-assessment-2-survey-of-is-theory-part-b.
  • Cited: 0 times

CHECK THESE SAMPLES OF Survey of Information Systems Personnel Theory

How to do research project on management

In designing surveys, it is important to establish the purpose of the survey and consider the key variables, which are being identified and how the data gathered will be analyzed.... Researching simply put, refers to the inquiry into various aspects of life has been a practice, which dates back to many centuries and resulted in due to the inherent curiosity of the human mind seeking new knowledge....
7 Pages (1750 words) Essay

Theory of Piecewise Circular Curves of T.F. Banchoff

The paper "theory of Piecewise Circular Curves of T.... .... Banchoff " states that a PC (Piecewise Circular) curve is given by a finite sequence of circular arcs or line segments with the endpoint of one arc coinciding with the beginning point of the next.... hellip; Solid models as the digital representations of existing or imagined physical objects are called are used in almost every sphere of life today from a great variety of design and manufacturing activities like computer-aided design and engineering analysis to animation, medical testing, visualization of scientific research and so on....
6 Pages (1500 words) Case Study

The Use of Steroids by High School Athletes

While the social functionalism focuses on social structures, social functions, interconnectedness of social structures, and social stability, the symbolic interaction theory views society as the product of everyday interactions of individuals (Paradigm notes).... I stand for the social conflict theory as it purports that individuals are primarily good and that the cause of social problems are the social inequality, dominance of groups of people over other groups, competition, oppression and exploitation (Understanding Social Problem, 2002, p....
2 Pages (500 words) Essay

Reviewing Mixed Methods

In simple terms, a hypothesis is a prediction based on theory (which itself is an educated guess based on assumptions) but which can be tested using a range of methods (Chambers, 1992).... Whilst a hypothesis deals with specific sets of phenomena, a theory constructs a framework of plausible rational explanations for the whole phenomena....
5 Pages (1250 words) Essay

APPLY THE LEARNING CURVE THEORY

Lastly, it focuses on learning curve that acts as a powerful tool ensuring the profitability and Applying the learning curve theory: Applying the learning curve theory This particular paper tries to describe the six sigma techniques and tools.... The empirical studies of this occurrence give rise to three conclusions based on current practice and theory....
2 Pages (500 words) Research Paper

Probability Sampling Method

Through drawing conclusions on probability theory, it is possible to estimate success or failure of the method accurately (Maxfield and Earl, 226).... In probability sampling, each student will have an equal opportunity in chance, of Probability sampling To carry out a proper survey that involves a body, the method in use should be onethat involves the whole student body.... In probability sampling, each student will have an equal opportunity in chance, of participating in the survey (Maxfield and Earl, 222)....
1 Pages (250 words) Coursework

Survey Development

In effect, self-efficacy makes it possible to make a… etermination of people's feeling, thought, motivation and behavior, as manifested through processes including cognitive, motivational, affective and selection processes (Bandura, 1988). The items that have been included in the survey look at three major variables which are The rationale for including the individual in all questions is that self-efficacy focuses on things that a person is able to do (Luszczynska & Schwarzer, 2005)....
3 Pages (750 words) Term Paper

A Survey of the Financing Decisions of UK: the Trade-Off Theory or the Pecking Order Theory

The most influential theory of long-term finance and capital structure in recent times was formulated in 1958 by Franco Modigliani and Merton Miller, both financial economists.... For the purpose of this paper, all funds that are held for such length of time the purpose of acquiring assets for the business and which appear as either long-term debt....
10 Pages (2500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us