Running head: MANAGEMENT INFORMATION SYSTEM 1
MANAGEMENT INFORMATION SYSTEM 6
Management Information System
Vijay chilakala
Wilmington university
5/20/18
Introduction
A management information system can be described as a computerized system that accepts data and organizes data in a systematic way so that the data can be used for other purposes like analysis, decision making and also problem solving. Most of the business organizations use these kinds of system to store and organize their data for decision making purposes. Management information systems are applied in various departments like banking institutions, military use, hospitals, meteorological institutions, National Space Aeronautics (NASA) and many more. An example of Management information system (MIS) is Automated Teller Machines (ATM) used for cash transactions (Li, Xie, & Zhang, 2015)Risks associated with Management Information System
Management of information systems in relation to risk is a wide area to g by. There are a few important security concepts that can help in the management of these risks. Therefore security for data and information is important in these sectors. Information security entails a number of factors; integrity refers to when the management of data and information is dealt with by transparent and authorized ways. Confidentiality refers to limiting the data and information so that the authorized parties get to view it while writing off the unauthorized parties (Batini & Scannapieco, 2016). Availability of data and information is also information and therefore data and information should be available for the right people at a given time. There are a number of risks or vulnerabilities in the information systems department.
Impersonation is an example of a risk. You find that one user takes the identity of another person to accomplish certain hidden agendas. Cybercrimes like hacking or cracking to gain access into the system. Theft is also a risk which usually results into loss of computer hardware (Li, Xie, & Zhang, 2015)Management of Information systems related to use
Information system has a number of uses. They play an important role in managing data and information. A management information system can be used in processing transactions like the Automated Teller Machines. This function is mostly used by financing institutions like Banks to store, organize and process data. Management information systems can be used in libraries to organize and keep record of books as they are issued to the parties that need them. They are also used by organizations to compile data used for analysis; the data can later be used for decision making policies.Management of Information systems related to data storage
Data storage provides a platform where information that is used by any information system can be kept and backed up for future usage. It also means that the data stored can be accessed at any given whenever the authorized parties feel like using them. ...
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
1. Running head: MANAGEMENT INFORMATION SYSTEM 1
MANAGEMENT INFORMATION SYSTEM 6
Management Information System
Vijay chilakala
Wilmington university
5/20/18
Introduction
A management information system can be described as a
computerized system that accepts data and organizes data in a
systematic way so that the data can be used for other purposes
like analysis, decision making and also problem solving. Most
of the business organizations use these kinds of system to store
and organize their data for decision making purposes.
Management information systems are applied in various
departments like banking institutions, military use, hospitals,
meteorological institutions, National Space Aeronautics
(NASA) and many more. An example of Management
information system (MIS) is Automated Teller Machines (ATM)
used for cash transactions (Li, Xie, & Zhang, 2015)Risks
associated with Management Information System
Management of information systems in relation to risk is a wide
area to g by. There are a few important security concepts that
2. can help in the management of these risks. Therefore security
for data and information is important in these sectors.
Information security entails a number of factors; integrity refers
to when the management of data and information is dealt with
by transparent and authorized ways. Confidentiality refers to
limiting the data and information so that the authorized parties
get to view it while writing off the unauthorized parties (Batini
& Scannapieco, 2016). Availability of data and information is
also information and therefore data and information should be
available for the right people at a given time. There are a
number of risks or vulnerabilities in the information systems
department.
Impersonation is an example of a risk. You find that one user
takes the identity of another person to accomplish certain
hidden agendas. Cybercrimes like hacking or cracking to gain
access into the system. Theft is also a risk which usually results
into loss of computer hardware (Li, Xie, & Zhang,
2015)Management of Information systems related to use
Information system has a number of uses. They play an
important role in managing data and information. A
management information system can be used in processing
transactions like the Automated Teller Machines. This function
is mostly used by financing institutions like Banks to store,
organize and process data. Management information systems
can be used in libraries to organize and keep record of books as
they are issued to the parties that need them. They are also used
by organizations to compile data used for analysis; the data can
later be used for decision making policies.Management of
Information systems related to data storage
Data storage provides a platform where information that is used
by any information system can be kept and backed up for future
usage. It also means that the data stored can be accessed at any
given whenever the authorized parties feel like using them.
There are two types of data storage in a computer system;
primary and secondary storage facilities. Primary storage of a
computer can be used to store the small tasks and data that are
3. used by the computer. They disappear once the computer is
turned off. The main memory in this is the Random Access
Memory (Laudon, 2015).
Secondary storage refers to external storage facilities like the
hard drive media, Compact disks/Digital Versatile Disks. The
good thing with these storage units is that they can store a large
amount of data that can be used later on.
In Management information systems, there is a storage unit
referred to as a data warehouse. The purpose of a data
warehouse is to provide an analysis of past organizational data
like sales and purchases. Most organizations use a MIS that
backs up information on a particular interval. These data stored
is then sent to the data warehouse where it is analyzed. The data
warehouse is an advanced system that can hold data for a long
time as seen in most business organizations (Li, Xie, & Zhang,
2015)Transmission of data/information in Management
information systems
Data transmission in Management information systems requires
certain mediums for it to be considered a success. A
communication medium makes data transmission possible. An
example is the fiber optic cable that can transmit large amounts
of data usually at a speed of gigabytes per seconds. Fiber optic
cables can be very useful for organizations that deal with large
units of data (Li, Xie, & Zhang, 2015). Wireless communication
can also be used facilitate data transmission. Wireless
communication makes use of infrared technology to make
transmission of data possible. The most important data
transmission medium is the network topologies.Comparison of
principles of information assurance
The core principles of information assurance only focus on the
accessibility of information for authorized personnel only. The
principles also take confidentiality of information as a number
one factor as they limit unwanted parties from accessibility. The
aim of the principles is also to ensure that information is
available under integrity to the authorized parties. Integrity
makes sure that the data is authentic and is not altered in any
4. way whatsoever. Confidentiality is put in place to ensure that
the authentic data is only available to the authorized parties
only (Ogiela, 2015). Authenticity keeps into account and
monitors information so that counterfeiting does not crop in.
Utility makes sure that data available is of the right use and not
irrelevant. Privacy makes sure that data and information are
protected from any third parties that might want to access the
information by illegal means (Laudon, 2015).
In conclusion, management information systems are guided by a
number of principles that ensure the general security of data and
information (Valacich & Schneider, 2015). Since there are a
number of cyber crimes available, MIS should be designed in
such a way that they are able to overcome such malicious acts.
References
Batini, C., & Scannapieco, M. (2016). Data and information
quality: dimensions, principles and techniques. Springer.
Laudon, K. C., & Laudon, J. P. (2015). Management
Information Systems: Managing the Digital Firm Plus
MyMISLab with Pearson eText--Access Card Package. Prentice
Hall Press.
Li, W., Xie, L., & Zhang, J. F. (2015). Containment control of
leader-following multi-agent systems with Markovian switching
network topologies and measurement noises. Automatica, 51,
263-267.
Ogiela, L., & Ogiela, M. R. (2015). Management information
systems. In Ubiquitous Computing Application and Wireless
Sensor (pp. 449-456). Springer, Dordrecht.
Valacich, J., & Schneider, C. (2015). Information Systems
Today: Managing in a Digital World Plus MyMISLab with
Pearson eText--Access Card Package. Prentice Hall Press.
Running head: DATA BACKUP AND DISASTER RECOVERY
5. 1
DATA BACKUP AND DISASTER RECOVERY
2
Data Backup and Disaster Recovery
Kotteswarrao Makenna
Wilmington University
6/10/18
Data Backup
The process of comprehending the right approaches to
effectively backup and undertake business data recovery is a
challenging factor. However, the aspect of understanding the
basics serves as a solution to different frameworks regarding the
protection of the existing foundation found in a business. This
means endless protection given to invaluable data.
Undertaking a Modern Strategy
Many business partners and companies come up with complaints
about unreliable and ineffective frameworks to back up their
data. They talk about the process of baking up data taking many
hours. This means that data being backed up has an unusable
and partial nature which makes other important business data to
become unreasonable (Adwan & Al-Soufi, 2016). Most business
that suffers from significant data loss has reported bankruptcy
within the shortest time possible. Companies with outdated
backup techniques possess discrepancies in their operations.
Leveraging the cloud
The modern society has eliminated cumbersome software and
6. any operational IT infrastructure. Affordability and scalability
exist as a result of diverse services created by cloud technology.
Flexibility exists in the aspect of leveraging technology that
uses the cloud. It reduces costs regarding hardware use. Cloud
only makes one pay for the data they use daily.
Utilizing Multiple Locations
LAN network speeds ensure recoverable data. The proper
management and storage of data make it possible to acquire it in
its original form. One has to establish a multiple and dynamic
environment of backing up data to protect it from any existing
disaster.
Good Disaster Recovery Planning
A number of elements also exist when it comes to good disaster
recovery planning. The discussion touches on the following
elements:
Assessing the existing Risks
It is difficult for one to prepare for different risks in the
society. One may have to be specific when it comes to
identifying the risks that have an impact on the business
(Laudon & Laudon, 2016). One must identify its influence on
geography, technology, and general operations of the industry.
The process involves designing planning to include plans in the
areas that may cause disruptions.
Evacuating Routes and Identifying Egress
7. It means determining the process of influencing customers and
employees to evacuate from the working environment safer.
Creation of evacuation routes means creating an environment
that ensures the elimination of any critical emergencies through
effective plans (Reddy & Kannamani, 2015). The management
marks the desired evacuation routes.
Appointing a Recovery Team to deal with Employees
The workplace environment should establish an effective team
of employees that possess specific knowledge and skills. The
skills focus on human resources, information technology, and
operations that may influence employees to continue with their
work. They may also run their work remotely using other
alternate locations. The employees in the professional
environment should have adequate contact information for main
personnel and they should also acquire external assistance
where possible.
Business Operations and Incentives
If the work environment lacks an office, the management should
focus on establishing an alternate location for employees
(Lievens & Burke, 2011). This is to enable them to have access
towards the company network. The management should also
think of a way forward in fulfilling the expectations of
customers in the market.
Good Business Continuity Planning
Disaster may strike and destroy the operations of a business at
any given point. However, companies with the best management
make early preparations for any unexpected activity. Such
companies possess continuity plans. It influences the company
8. to acquire a competitive status over the existing competitors in
terms of recovery and responsiveness.
Testing of Backup Strategies Regularly
Most companies in the modern era use diverse technology tools
in assisting the management of business operations. The on-site
servers belonging to the companies are used to store huge
amounts of data. In the case whereby any disaster occurs, the
companies may lose valuable information (Koren, 2010).
Backup plans are useless when they lack testing and regular
check-ups. Individuals will want to verify the backups in the
strategic data of their companies to ensure they are functioning
fully.
Involvement of all Employees
Employees are an important part of any business operation.
They assist in the process of enhancing business development.
Therefore, each employee should have the capacity and
opportunity to comprehend the important parts of a business.
The management of companies should schedule consistent
meetings defining and identifying roles found in the plan. They
should revise the plans from time to time in the whole
environment of the company. All the employees should play an
important role in improving the workplace environment (Alter,
2008). Be sure to let the employees know about the valuable
assets and motivate them to know that they will receive
assistance at any given point.
Prioritization of Key Functions
One must focus on the strength of the company. An effective
9. business continuity plan exposes the business to significant
functions. Many resources and inventories with a relation to the
business functions should have an accurate status and should be
created in advance. The process of dealing with critical
functions may serve as a challenge and may cripple major
business operations. The company should identify its weakness
and come up with a contingency plan to enhance development.
References
Adwan, E., & Al-Soufi, A. (2016). A Review of ICT
Technology in Construction. International Journal of Managing
Information Technology, 8(3/4),, 1-21.
Alter, S. (2008). Defining information systems as work systems:
implications for the IS field. European Journal of Information
Systems, 17(5),, 448-469.
Koren, D. (2010). MPLS and Network Convergence. Rad
University. Retrieved from
http://www2.rad.com/networks/infrastructure/ipmpls/main.htm
Laudon, K., & Laudon, J. (2016). Management information
system. Pearson Education India.
Lievens, F., & Burke, E. (2011). Dealing with the threats
inherent in unproctored Internet testing of cognitive ability:
Results from a large‐scale operational test program. Journal of
Occupational and Organizational Psychology, 84(4), 817-824.
Reddy, L., & Kannamani, R. (2015). The Possible Remedies for
the Challenges of Matrix Organization System in IT
Outsourcing Industry. The International Journal of Business &
Management, 3(7), 1.