Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Information systems 2 - Coursework Example

Comments (0) Cite this document
Databases where information about me exists include Tesco supermarkets, the national library, Red Cross and national center for population. Information is captured differently in these…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.2% of users find it useful
Information systems 2
Read TextPreview

Extract of sample "Information systems 2"

Download file to see previous pages Red Cross gets information about individuals during membership registration, blood donation exercises or during participation in charity activities. Individual details are regularly updated in these institutions as in Tesco updates are made when one shops online. Individual’s tastes and preferences are updated depending on his or her shopping basket. Too details are updated when one uses his or her Tesco credit card or club card when shopping. There are loads of concerns about personal data privacy. Privacy about personal information is of much concern like on financial status for example Tesco supermarkets can access accounts of its credit card holders. Health data should be held secret. Therefore people are afraid of hackers, email scams or phishing and cookies which may expose them to dangers.
Data can be retrieved from different sources. The sources can be either internal or external. For Tesco, internal sources of data include sales from internal operations such as sales data, in cventory data, human resource data, systems data, product data and marketing data. These may include information from data from internal research, campaigns and promotions. External sources in Tesco include information from competitors’ sales and products, from website, and other third party data such as census data, survey data and demographics data. There are a number of assumptions that are made during warehouse building. For web sources it was assumed that conjunctive queries were enough to retrieve information of interest. Too the information collected was assumed to cover the whole population. The integrity of data was highly reliable.
A decision support system is a computer based system or subsystem that is interactive and intended to assist in decision making. It employs the use of communication technologies, documents, data, and knowledge models to solve problems and make decisions ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Information systems 2 Coursework Example | Topics and Well Written Essays - 1000 words”, n.d.)
Information systems 2 Coursework Example | Topics and Well Written Essays - 1000 words. Retrieved from
(Information Systems 2 Coursework Example | Topics and Well Written Essays - 1000 Words)
Information Systems 2 Coursework Example | Topics and Well Written Essays - 1000 Words.
“Information Systems 2 Coursework Example | Topics and Well Written Essays - 1000 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Information systems 2

Product Management & Information Systems - Module 2

...? Product Management & Information Systems - Module 2 The development of the internet and technology propelled the development of new digital products like mobile apps and software, which have significantly altered the traditional business models because the products lack any physical substance. Digital products include digitised goods or services like financial services, books, software or mobile apps that are traded in the digital marketplace. Digital products lack the physical dimension; hence, the only room they take is the space within the hard drive and they differ from the physical product in that they are easy to obtain because they only need to be downloaded by the customer. Internet shopping has been popular because many...
3 Pages(750 words)Assignment

Information Systems

...Information Systems Article Review Malmsjo (2006) has researched the most appropriate methodology for designing of supportive information systems. In general use, there are two kinds of information systems, supportive and operative. The paper examines the difference in the two systems and their elements. A different phase of the methodology that was used in the design of the support system has been discussed and the conditions for designing both supportive and operative systems have been discussed. Malmsjo (p. 881-882) first speaks of hard and soft information systems view and while a hard view approach takes an objective view of the world with a formalized reasoning process, the soft view gives importance to the individual and subjective...
2 Pages(500 words)Book Report/Review

BHS 455 (Computer & Information Systems) Module 2 CBT

In what ways are the information needs of physicians and nurses at Presbyterian Hospital similar In what ways are they different Nurse and physicians have traditionally operated under the paradigm of physician dominance and the physician's viewpoint prevails on patient care issues. Many researchers have argued (Betts 1994; Evans & Carlson, 1993; Hansen et al., 1999; Watts et al., 1995) that nurses and physicians should collaborate to address patient care issues, because consideration of both the professions concerns is important to the development of high quality patient care. This is also true of the physicians and nurses at Presbyterian Hospital; this collaboration helps the nurses and physicians to obtain some of the similar...
2 Pages(500 words)Essay

Information Systems

... for the DFD. The source/ sink representing the external entity are depicted using a rectangle. The processes which carry out the tasks are represented with an oval shaped symbol with a shaded cap and numbered in a sequence. The data store represented with a rectangle with a shaded portion at the left portion denotes the data values to be stored. 2. The external entity requires interacting with the system with the help of various processes and the data stores are responsible to store data and information for the data shared for future processing. 3. Firstly the patient submits a request for X-ray application which is denoted by the data flow “Submits X-Ray request form” to the process “Make X-Ray appointment” and subsequently makes...
5 Pages(1250 words)Coursework

ITM 301 Mod 2 SLP - Principles of Information Systems in Business and Organizations

... and other links related to database management systems. At the end if we review the value of the website it is very useful, informative, extensive and in depth. Sources 1. Webster, F. Bruce, August, 2008, Buy vs. Build Software Applications: The Eternal Dilemma, from 2. Carr, F. David, August, 2006, After Katrina: Is I.T. Ready for Another Killer Storm?, from
2 Pages(500 words)Essay

Information Systems

stakeholders, implementing a better mitigation plan for potential risk and ensure that they clearly understand and support what the project should achieve. This report presents the detailed risk analysis, mitigation and recommendations for the new information technology based system implementation for the submission of personal tax returns at a large European country. In addition, this report will outline some of main and inflectional risks those can make this project a failure. In this scenario I will also recommend some of effective mitigation steps to effectively manage and handle this project.
According to (Whitten, Bentley and Dittman), the current era is known as the age of information technology since the information te...
12 Pages(3000 words)Essay

ITM 501 MGT INFORMATIO SYSTEMS: SESSION LONG PROJECT MODULE 2 The Technical System: Information, Information Technology, and Information HP OR MICROSOFT

... XXXXXXX Number: XXXXXXXX XXXXXXX XXXXXXX XXXXXXXX of XXXXXXX The Technical System: Information, Information Technology, and Information Microsoft Corporation: a multinational company that was started in over thirty years ago. The company mainly deals with manufacturing, developing, licensing, and support of a number of different software products for computing. The company’s headquarters is located in Washington, U.S.A. Microsoft is one of the most trusted companies for computing products. The biggest and best selling product of the company is the operating system – Microsoft Windows and the Microsoft Office, which is almost used by most of the computer users. The company rose to become the dominating system used within the operating...
2 Pages(500 words)Essay

Information Systems

...Information Systems What is a Network? A network is defined in general as a “interconnected system of things or people”, but in electronics is defined as “a system of interconnected electronic components or circuits” (Princeton WordNet). What are the different types of Networks and how many? There are numerous types of networks. The above definition indicates that an individual desktop computer is a “network” of circuits and components like a hard drive, motherboard, etc. There are also information networks, where information itself is being networked. There are ad hoc networks, made and dropped quickly. There are computer networks, both wired and wireless. There are virtual private networks, which are emulations of LANs usually done over...
2 Pages(500 words)Essay

Information and Information Systems

... and Information Systems, 27). Hammer also observed that the business to earn success must store huge amounts of information ready at hand in large computers for meeting specific business purposes. Questions 1. Can Fayol’s principle of work allocation be used in understanding the degree of work specialization using Information Technology? 2. How can the use of Information Technology in changing business processes make it more competitive? 3. Does change in business processes affect the values and cultures of a concern? References 1. Hammer, Michael. “Reengineering Work: Don’t Automate, Obliterate”, Harvard Business Review, July-August, 1999. 2. “Business Processes, Information and Information Systems”, n.d....
1 Pages(250 words)Assignment

Information Systems

... November 10, Information Systems Part High-level Systems Diagram Detailed Information Flow Diagram Part 2 Information Systems at Recruit 4 U According to Laudon and Laudon (2007, p. 529) a data flow diagram is the primary tool that is used in representing the component processes of a system. Information systems could be used in a variety of ways to improve the efficiency and effectiveness of the head office of Recruit 4 U. The finance, human resources management and customer service departments located at the head office in Leeds could benefit tremendously from its implementation. An integrated information system could be set up for the finance department consisting of various modules to allow for the preparation of the financial...
4 Pages(1000 words)Essay

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

Accounting systems and Assurance

The allocation of resources is dependent on the information regarding the financial condition of the firm. Here comes the role of accounting, which provides all the required financial information to the investors through several financial reports. There There are two classifications of accounting 1) financial accounting and 2) management accounting. Financial accounting is the one which furnishes all the financial information to the investors and management accounting is used at the micro-level where the internal allocation of the funds takes place. Accounting is one of the most crucial components of any organization as it provides all those financial information that is used to make the economic and financing decision making.&nbs...
9 Pages(2250 words)Coursework

Business Information Systems

...Club IT - Part Three of Phoenix BIS 219 Introduction to Business Information Systems Club IT – Part Three _________ _________ DATE ________ Table of Contents Table of Contents 2 Abstract 3 Overview 3 Business background 4 Current Technology Structure of Club IT 5 Problem Assessment 5 Club IT Business Goal and Strategy 6 Assessment of Needs 7 IT Solutions for Club IT 8 Decision Support Systems/ DSS 8 Customer Information System 8 Data Mining for Business Performance 9 Enterprise Resource Planning 10 Supply Chain Management 11 Customer Relationship Management 11 Conclusion 11 Bibliography 12 Abstract Club IT is a nightclub that is currently operating with the traditional technology structure. Club IT nightclub is most popular club in its...
8 Pages(2000 words)Case Study

Global Employee Information and Consultation: Replicating the European Model

A significant step to enhancing the employees’ right to information and consultation is the establishment of the European Works Council (EWC). The EWC Directive (94/45/EC) aims to improve cooperation in transnational companies and to allow trade unions to influence, at least indirectly, the decision-making of corporations (Lockwood and Williams). It requires community-scale undertakings and community-scale groups of undertaking to create this mechanism for regular consultation of the workforce. A ‘community-scale undertaking’ is one with at least 1,000 employees within the Member States and at least 150 employees in each of at least two Member States (Lewis and Sargeant).

An EWC is a forum that would a...
9 Pages(2250 words)Coursework

Strategic Management Systems in the Decision Making of an Organization

He will change his brand as soon as he realizes that his needs might be catered in a better way by some other brand. This creates the need for efficient planning tools and updated information.
An important aspect here is that the management system should work in accordance with the vision of the organization. It is only one of the reasons for the failure of a system. There are several more causes that shall be investigated.
It shall be investigated as to how strategic management systems assist in identifying the strengths and weaknesses of a company (Hitt 2009). It gives the company an opportunity to make their products and services better for their customers.
Strategic management systems can be defined as the proce...
10 Pages(2500 words)Assignment

Enterprise Information Security and Privacy

The PCI DSS was created primarily created by Master card and Visa but later on, we're joined by three other premium credit card companies to form an independent council to counter online credit card fraud. The American Express, discover financial services and JCB were the three other companies that decided to take an active part in the stand taken by Visa and MasterCard. To understand the effectiveness of PCI DSS it becomes crucial to understand its core functionality and the reasons it was devised. The objective of PCI DSS is to build a secure network, protect cardholder data, maintain a vulnerability management program and implement strong access control measures (Wright .2008.Page11). In today’s time when security has bec...
6 Pages(1500 words)Assignment

Information and Communications Technology in the Primary School

ICT has evolved to become an inseparable and accepted part of everyday life activities and it continues to extend its control over people’s work, social and personal lives.
Even when the significance and importance of ICT at school have been amply emphasized, there is still a high proportion of obsolete hardware being used in the classrooms with the results that children often meet industry-standard hardware and software at home rather than at schools. The use of ICT in school is also very variable with its frequent use in some schools and its nonexistent in others. During the last thirty years, there has been a lack of clarity over the educational objectives for ICT, this problem is clear from the shortages of equipmen...
11 Pages(2750 words)Assignment

Using Information Technology

Even though several individuals criticize these sites, but there are millions who think that these sites have a positive influence on society (Are social networking sites good for our society? 2010). Among those who approve of these sites are the pregnant teen girls of the community who suggested a blog or a social networking tool that would be useful in communicating pregnancy-related information and providing support for group members.

This suggestion of becoming a part of a social networking site or blogging can prove extremely useful as it might not only be helpful for the group of pregnant teens being dealt at the moment but might also be a great help for girls worldwide undergoing similar dilemmas. This is because...
6 Pages(1500 words)Article

Management Information System of Linux

As emphasized by GB direct (n.d.) “one of the principal reasons for the growth of open-source software is its affinity with this business model” (par. 8). The support applications specifically come in the form of “helpdesk advice and diagnostic research and direct intervention to diagnose and resolve problems” (GB direct, n.d., par. 24).

The helpdesk application of open source software “backs-up and extends in-house resources when they are approaching their limits” (GB direct, n.d., par. 26). Even unskilled staff or personnel without any technical knowledge of software applications are assisted by the program to back-up relevant files. This support mechanism of open-source software ca...
6 Pages(1500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Information systems 2 for FREE!

Contact Us