SlideShare a Scribd company logo
1 of 10
Running head: MANAGEMENT INFORMATION SYSTEM 1
MANAGEMENT INFORMATION SYSTEM 6
Management Information System
Vijay chilakala
Wilmington university
5/20/18
Introduction
A management information system can be described as a
computerized system that accepts data and organizes data in a
systematic way so that the data can be used for other purposes
like analysis, decision making and also problem solving. Most
of the business organizations use these kinds of system to store
and organize their data for decision making purposes.
Management information systems are applied in various
departments like banking institutions, military use, hospitals,
meteorological institutions, National Space Aeronautics
(NASA) and many more. An example of Management
information system (MIS) is Automated Teller Machines (ATM)
used for cash transactions (Li, Xie, & Zhang, 2015)Risks
associated with Management Information System
Management of information systems in relation to risk is a wide
area to g by. There are a few important security concepts that
can help in the management of these risks. Therefore security
for data and information is important in these sectors.
Information security entails a number of factors; integrity refers
to when the management of data and information is dealt with
by transparent and authorized ways. Confidentiality refers to
limiting the data and information so that the authorized parties
get to view it while writing off the unauthorized parties (Batini
& Scannapieco, 2016). Availability of data and information is
also information and therefore data and information should be
available for the right people at a given time. There are a
number of risks or vulnerabilities in the information systems
department.
Impersonation is an example of a risk. You find that one user
takes the identity of another person to accomplish certain
hidden agendas. Cybercrimes like hacking or cracking to gain
access into the system. Theft is also a risk which usually results
into loss of computer hardware (Li, Xie, & Zhang,
2015)Management of Information systems related to use
Information system has a number of uses. They play an
important role in managing data and information. A
management information system can be used in processing
transactions like the Automated Teller Machines. This function
is mostly used by financing institutions like Banks to store,
organize and process data. Management information systems
can be used in libraries to organize and keep record of books as
they are issued to the parties that need them. They are also used
by organizations to compile data used for analysis; the data can
later be used for decision making policies.Management of
Information systems related to data storage
Data storage provides a platform where information that is used
by any information system can be kept and backed up for future
usage. It also means that the data stored can be accessed at any
given whenever the authorized parties feel like using them.
There are two types of data storage in a computer system;
primary and secondary storage facilities. Primary storage of a
computer can be used to store the small tasks and data that are
used by the computer. They disappear once the computer is
turned off. The main memory in this is the Random Access
Memory (Laudon, 2015).
Secondary storage refers to external storage facilities like the
hard drive media, Compact disks/Digital Versatile Disks. The
good thing with these storage units is that they can store a large
amount of data that can be used later on.
In Management information systems, there is a storage unit
referred to as a data warehouse. The purpose of a data
warehouse is to provide an analysis of past organizational data
like sales and purchases. Most organizations use a MIS that
backs up information on a particular interval. These data stored
is then sent to the data warehouse where it is analyzed. The data
warehouse is an advanced system that can hold data for a long
time as seen in most business organizations (Li, Xie, & Zhang,
2015)Transmission of data/information in Management
information systems
Data transmission in Management information systems requires
certain mediums for it to be considered a success. A
communication medium makes data transmission possible. An
example is the fiber optic cable that can transmit large amounts
of data usually at a speed of gigabytes per seconds. Fiber optic
cables can be very useful for organizations that deal with large
units of data (Li, Xie, & Zhang, 2015). Wireless communication
can also be used facilitate data transmission. Wireless
communication makes use of infrared technology to make
transmission of data possible. The most important data
transmission medium is the network topologies.Comparison of
principles of information assurance
The core principles of information assurance only focus on the
accessibility of information for authorized personnel only. The
principles also take confidentiality of information as a number
one factor as they limit unwanted parties from accessibility. The
aim of the principles is also to ensure that information is
available under integrity to the authorized parties. Integrity
makes sure that the data is authentic and is not altered in any
way whatsoever. Confidentiality is put in place to ensure that
the authentic data is only available to the authorized parties
only (Ogiela, 2015). Authenticity keeps into account and
monitors information so that counterfeiting does not crop in.
Utility makes sure that data available is of the right use and not
irrelevant. Privacy makes sure that data and information are
protected from any third parties that might want to access the
information by illegal means (Laudon, 2015).
In conclusion, management information systems are guided by a
number of principles that ensure the general security of data and
information (Valacich & Schneider, 2015). Since there are a
number of cyber crimes available, MIS should be designed in
such a way that they are able to overcome such malicious acts.
References
Batini, C., & Scannapieco, M. (2016). Data and information
quality: dimensions, principles and techniques. Springer.
Laudon, K. C., & Laudon, J. P. (2015). Management
Information Systems: Managing the Digital Firm Plus
MyMISLab with Pearson eText--Access Card Package. Prentice
Hall Press.
Li, W., Xie, L., & Zhang, J. F. (2015). Containment control of
leader-following multi-agent systems with Markovian switching
network topologies and measurement noises. Automatica, 51,
263-267.
Ogiela, L., & Ogiela, M. R. (2015). Management information
systems. In Ubiquitous Computing Application and Wireless
Sensor (pp. 449-456). Springer, Dordrecht.
Valacich, J., & Schneider, C. (2015). Information Systems
Today: Managing in a Digital World Plus MyMISLab with
Pearson eText--Access Card Package. Prentice Hall Press.
Running head: DATA BACKUP AND DISASTER RECOVERY
1
DATA BACKUP AND DISASTER RECOVERY
2
Data Backup and Disaster Recovery
Kotteswarrao Makenna
Wilmington University
6/10/18
Data Backup
The process of comprehending the right approaches to
effectively backup and undertake business data recovery is a
challenging factor. However, the aspect of understanding the
basics serves as a solution to different frameworks regarding the
protection of the existing foundation found in a business. This
means endless protection given to invaluable data.
Undertaking a Modern Strategy
Many business partners and companies come up with complaints
about unreliable and ineffective frameworks to back up their
data. They talk about the process of baking up data taking many
hours. This means that data being backed up has an unusable
and partial nature which makes other important business data to
become unreasonable (Adwan & Al-Soufi, 2016). Most business
that suffers from significant data loss has reported bankruptcy
within the shortest time possible. Companies with outdated
backup techniques possess discrepancies in their operations.
Leveraging the cloud
The modern society has eliminated cumbersome software and
any operational IT infrastructure. Affordability and scalability
exist as a result of diverse services created by cloud technology.
Flexibility exists in the aspect of leveraging technology that
uses the cloud. It reduces costs regarding hardware use. Cloud
only makes one pay for the data they use daily.
Utilizing Multiple Locations
LAN network speeds ensure recoverable data. The proper
management and storage of data make it possible to acquire it in
its original form. One has to establish a multiple and dynamic
environment of backing up data to protect it from any existing
disaster.
Good Disaster Recovery Planning
A number of elements also exist when it comes to good disaster
recovery planning. The discussion touches on the following
elements:
Assessing the existing Risks
It is difficult for one to prepare for different risks in the
society. One may have to be specific when it comes to
identifying the risks that have an impact on the business
(Laudon & Laudon, 2016). One must identify its influence on
geography, technology, and general operations of the industry.
The process involves designing planning to include plans in the
areas that may cause disruptions.
Evacuating Routes and Identifying Egress
It means determining the process of influencing customers and
employees to evacuate from the working environment safer.
Creation of evacuation routes means creating an environment
that ensures the elimination of any critical emergencies through
effective plans (Reddy & Kannamani, 2015). The management
marks the desired evacuation routes.
Appointing a Recovery Team to deal with Employees
The workplace environment should establish an effective team
of employees that possess specific knowledge and skills. The
skills focus on human resources, information technology, and
operations that may influence employees to continue with their
work. They may also run their work remotely using other
alternate locations. The employees in the professional
environment should have adequate contact information for main
personnel and they should also acquire external assistance
where possible.
Business Operations and Incentives
If the work environment lacks an office, the management should
focus on establishing an alternate location for employees
(Lievens & Burke, 2011). This is to enable them to have access
towards the company network. The management should also
think of a way forward in fulfilling the expectations of
customers in the market.
Good Business Continuity Planning
Disaster may strike and destroy the operations of a business at
any given point. However, companies with the best management
make early preparations for any unexpected activity. Such
companies possess continuity plans. It influences the company
to acquire a competitive status over the existing competitors in
terms of recovery and responsiveness.
Testing of Backup Strategies Regularly
Most companies in the modern era use diverse technology tools
in assisting the management of business operations. The on-site
servers belonging to the companies are used to store huge
amounts of data. In the case whereby any disaster occurs, the
companies may lose valuable information (Koren, 2010).
Backup plans are useless when they lack testing and regular
check-ups. Individuals will want to verify the backups in the
strategic data of their companies to ensure they are functioning
fully.
Involvement of all Employees
Employees are an important part of any business operation.
They assist in the process of enhancing business development.
Therefore, each employee should have the capacity and
opportunity to comprehend the important parts of a business.
The management of companies should schedule consistent
meetings defining and identifying roles found in the plan. They
should revise the plans from time to time in the whole
environment of the company. All the employees should play an
important role in improving the workplace environment (Alter,
2008). Be sure to let the employees know about the valuable
assets and motivate them to know that they will receive
assistance at any given point.
Prioritization of Key Functions
One must focus on the strength of the company. An effective
business continuity plan exposes the business to significant
functions. Many resources and inventories with a relation to the
business functions should have an accurate status and should be
created in advance. The process of dealing with critical
functions may serve as a challenge and may cripple major
business operations. The company should identify its weakness
and come up with a contingency plan to enhance development.
References
Adwan, E., & Al-Soufi, A. (2016). A Review of ICT
Technology in Construction. International Journal of Managing
Information Technology, 8(3/4),, 1-21.
Alter, S. (2008). Defining information systems as work systems:
implications for the IS field. European Journal of Information
Systems, 17(5),, 448-469.
Koren, D. (2010). MPLS and Network Convergence. Rad
University. Retrieved from
http://www2.rad.com/networks/infrastructure/ipmpls/main.htm
Laudon, K., & Laudon, J. (2016). Management information
system. Pearson Education India.
Lievens, F., & Burke, E. (2011). Dealing with the threats
inherent in unproctored Internet testing of cognitive ability:
Results from a large‐scale operational test program. Journal of
Occupational and Organizational Psychology, 84(4), 817-824.
Reddy, L., & Kannamani, R. (2015). The Possible Remedies for
the Challenges of Matrix Organization System in IT
Outsourcing Industry. The International Journal of Business &
Management, 3(7), 1.
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx

More Related Content

Similar to Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx

INFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILUREINFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILURELibcorpio
 
LD7009 Information Assurance And Risk Management.docx
LD7009 Information Assurance And Risk Management.docxLD7009 Information Assurance And Risk Management.docx
LD7009 Information Assurance And Risk Management.docxstirlingvwriters
 
Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Angie Jorgensen
 
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docxMITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docxroushhsiu
 
Week 1 Answer It is important to understand human beings and t.docx
Week 1 Answer  It is important to understand human beings and t.docxWeek 1 Answer  It is important to understand human beings and t.docx
Week 1 Answer It is important to understand human beings and t.docxjessiehampson
 
Research Method EMBA chapter 12
Research Method EMBA chapter 12Research Method EMBA chapter 12
Research Method EMBA chapter 12Mazhar Poohlah
 
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica GrafCompany Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica GrafJessica Graf
 
2Cloud Privacy and SecurityAssessment Item 3Privacy and .docx
2Cloud Privacy and SecurityAssessment Item 3Privacy and .docx2Cloud Privacy and SecurityAssessment Item 3Privacy and .docx
2Cloud Privacy and SecurityAssessment Item 3Privacy and .docxrhetttrevannion
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage DetectionIJERA Editor
 
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docxRunning head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docxjeanettehully
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020Jessica Graf
 
Big data analytics and large-scale computers
Big data analytics and large-scale computersBig data analytics and large-scale computers
Big data analytics and large-scale computersShubhamKhurana20
 
data collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptxdata collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptxSourabhkumar729579
 
Big data is a broad term for data sets so large or complex that tr.docx
Big data is a broad term for data sets so large or complex that tr.docxBig data is a broad term for data sets so large or complex that tr.docx
Big data is a broad term for data sets so large or complex that tr.docxhartrobert670
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practiceswacasr
 
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...Heru Ramadhon
 
Big data security
Big data securityBig data security
Big data securityAnne ndolo
 

Similar to Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx (20)

[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
 
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILUREINFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
 
LD7009 Information Assurance And Risk Management.docx
LD7009 Information Assurance And Risk Management.docxLD7009 Information Assurance And Risk Management.docx
LD7009 Information Assurance And Risk Management.docx
 
Business Operation
Business OperationBusiness Operation
Business Operation
 
Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...
 
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docxMITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
 
Week 1 Answer It is important to understand human beings and t.docx
Week 1 Answer  It is important to understand human beings and t.docxWeek 1 Answer  It is important to understand human beings and t.docx
Week 1 Answer It is important to understand human beings and t.docx
 
Research Method EMBA chapter 12
Research Method EMBA chapter 12Research Method EMBA chapter 12
Research Method EMBA chapter 12
 
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica GrafCompany Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf
 
2Cloud Privacy and SecurityAssessment Item 3Privacy and .docx
2Cloud Privacy and SecurityAssessment Item 3Privacy and .docx2Cloud Privacy and SecurityAssessment Item 3Privacy and .docx
2Cloud Privacy and SecurityAssessment Item 3Privacy and .docx
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docxRunning head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
 
Big data analytics and large-scale computers
Big data analytics and large-scale computersBig data analytics and large-scale computers
Big data analytics and large-scale computers
 
data collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptxdata collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptx
 
Data Security
Data SecurityData Security
Data Security
 
Big data is a broad term for data sets so large or complex that tr.docx
Big data is a broad term for data sets so large or complex that tr.docxBig data is a broad term for data sets so large or complex that tr.docx
Big data is a broad term for data sets so large or complex that tr.docx
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
 
Big data security
Big data securityBig data security
Big data security
 

More from cowinhelen

Case Study 1 Applying Theory to PracticeSocial scientists hav.docx
Case Study 1 Applying Theory to PracticeSocial scientists hav.docxCase Study 1 Applying Theory to PracticeSocial scientists hav.docx
Case Study 1 Applying Theory to PracticeSocial scientists hav.docxcowinhelen
 
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docxCase Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docxcowinhelen
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxcowinhelen
 
Case Study - APA paper with min 4 page content Review the Blai.docx
Case Study - APA paper with min 4 page content Review the Blai.docxCase Study - APA paper with min 4 page content Review the Blai.docx
Case Study - APA paper with min 4 page content Review the Blai.docxcowinhelen
 
Case Study - Global Mobile Corporation Damn it, .docx
Case Study - Global Mobile Corporation      Damn it, .docxCase Study - Global Mobile Corporation      Damn it, .docx
Case Study - Global Mobile Corporation Damn it, .docxcowinhelen
 
Case Study #3Apple Suppliers & Labor PracticesWith its h.docx
Case Study #3Apple Suppliers & Labor PracticesWith its h.docxCase Study #3Apple Suppliers & Labor PracticesWith its h.docx
Case Study #3Apple Suppliers & Labor PracticesWith its h.docxcowinhelen
 
CASE STUDY (Individual) Scotland  In terms of its physical l.docx
CASE STUDY (Individual) Scotland  In terms of its physical l.docxCASE STUDY (Individual) Scotland  In terms of its physical l.docx
CASE STUDY (Individual) Scotland  In terms of its physical l.docxcowinhelen
 
Case Study #2 T.D. enjoys caring for the children and young peop.docx
Case Study #2 T.D. enjoys caring for the children and young peop.docxCase Study #2 T.D. enjoys caring for the children and young peop.docx
Case Study #2 T.D. enjoys caring for the children and young peop.docxcowinhelen
 
CASE STUDY #2 Chief Complaint I have pain in my belly”.docx
CASE STUDY #2 Chief Complaint I have pain in my belly”.docxCASE STUDY #2 Chief Complaint I have pain in my belly”.docx
CASE STUDY #2 Chief Complaint I have pain in my belly”.docxcowinhelen
 
Case Study #1Jennifer is a 29-year-old administrative assistan.docx
Case Study #1Jennifer is a 29-year-old administrative assistan.docxCase Study #1Jennifer is a 29-year-old administrative assistan.docx
Case Study #1Jennifer is a 29-year-old administrative assistan.docxcowinhelen
 
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docxCase Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docxcowinhelen
 
Case Study – Multicultural ParadeRead the Case below, and answe.docx
Case Study  – Multicultural ParadeRead the Case below, and answe.docxCase Study  – Multicultural ParadeRead the Case below, and answe.docx
Case Study – Multicultural ParadeRead the Case below, and answe.docxcowinhelen
 
Case Study   THE INVISIBLE SPONSOR1BackgroundSome execut.docx
Case Study    THE INVISIBLE SPONSOR1BackgroundSome execut.docxCase Study    THE INVISIBLE SPONSOR1BackgroundSome execut.docx
Case Study   THE INVISIBLE SPONSOR1BackgroundSome execut.docxcowinhelen
 
CASE STUDY Experiential training encourages changes in work beha.docx
CASE STUDY  Experiential training encourages changes in work beha.docxCASE STUDY  Experiential training encourages changes in work beha.docx
CASE STUDY Experiential training encourages changes in work beha.docxcowinhelen
 
Case Study Hereditary AngioedemaAll responses must be in your .docx
Case Study  Hereditary AngioedemaAll responses must be in your .docxCase Study  Hereditary AngioedemaAll responses must be in your .docx
Case Study Hereditary AngioedemaAll responses must be in your .docxcowinhelen
 
case studieson Gentrification and Displacement in the Sa.docx
case studieson Gentrification and Displacement in the Sa.docxcase studieson Gentrification and Displacement in the Sa.docx
case studieson Gentrification and Displacement in the Sa.docxcowinhelen
 
Case Studt on KFC Introduction1) Identify the type of .docx
Case Studt on KFC Introduction1) Identify the type of .docxCase Studt on KFC Introduction1) Identify the type of .docx
Case Studt on KFC Introduction1) Identify the type of .docxcowinhelen
 
Case Study Crocs Revolutionizing an Industry’s Supply Chain .docx
Case Study  Crocs Revolutionizing an Industry’s Supply Chain .docxCase Study  Crocs Revolutionizing an Industry’s Supply Chain .docx
Case Study Crocs Revolutionizing an Industry’s Supply Chain .docxcowinhelen
 
Case Studies Student must complete 5 case studies as instructed.docx
Case Studies Student must complete 5 case studies as instructed.docxCase Studies Student must complete 5 case studies as instructed.docx
Case Studies Student must complete 5 case studies as instructed.docxcowinhelen
 
Case Studies in Telehealth AdoptionThe mission of The Comm.docx
Case Studies in Telehealth AdoptionThe mission of The Comm.docxCase Studies in Telehealth AdoptionThe mission of The Comm.docx
Case Studies in Telehealth AdoptionThe mission of The Comm.docxcowinhelen
 

More from cowinhelen (20)

Case Study 1 Applying Theory to PracticeSocial scientists hav.docx
Case Study 1 Applying Theory to PracticeSocial scientists hav.docxCase Study 1 Applying Theory to PracticeSocial scientists hav.docx
Case Study 1 Applying Theory to PracticeSocial scientists hav.docx
 
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docxCase Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
 
Case Study - APA paper with min 4 page content Review the Blai.docx
Case Study - APA paper with min 4 page content Review the Blai.docxCase Study - APA paper with min 4 page content Review the Blai.docx
Case Study - APA paper with min 4 page content Review the Blai.docx
 
Case Study - Global Mobile Corporation Damn it, .docx
Case Study - Global Mobile Corporation      Damn it, .docxCase Study - Global Mobile Corporation      Damn it, .docx
Case Study - Global Mobile Corporation Damn it, .docx
 
Case Study #3Apple Suppliers & Labor PracticesWith its h.docx
Case Study #3Apple Suppliers & Labor PracticesWith its h.docxCase Study #3Apple Suppliers & Labor PracticesWith its h.docx
Case Study #3Apple Suppliers & Labor PracticesWith its h.docx
 
CASE STUDY (Individual) Scotland  In terms of its physical l.docx
CASE STUDY (Individual) Scotland  In terms of its physical l.docxCASE STUDY (Individual) Scotland  In terms of its physical l.docx
CASE STUDY (Individual) Scotland  In terms of its physical l.docx
 
Case Study #2 T.D. enjoys caring for the children and young peop.docx
Case Study #2 T.D. enjoys caring for the children and young peop.docxCase Study #2 T.D. enjoys caring for the children and young peop.docx
Case Study #2 T.D. enjoys caring for the children and young peop.docx
 
CASE STUDY #2 Chief Complaint I have pain in my belly”.docx
CASE STUDY #2 Chief Complaint I have pain in my belly”.docxCASE STUDY #2 Chief Complaint I have pain in my belly”.docx
CASE STUDY #2 Chief Complaint I have pain in my belly”.docx
 
Case Study #1Jennifer is a 29-year-old administrative assistan.docx
Case Study #1Jennifer is a 29-year-old administrative assistan.docxCase Study #1Jennifer is a 29-year-old administrative assistan.docx
Case Study #1Jennifer is a 29-year-old administrative assistan.docx
 
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docxCase Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
 
Case Study – Multicultural ParadeRead the Case below, and answe.docx
Case Study  – Multicultural ParadeRead the Case below, and answe.docxCase Study  – Multicultural ParadeRead the Case below, and answe.docx
Case Study – Multicultural ParadeRead the Case below, and answe.docx
 
Case Study   THE INVISIBLE SPONSOR1BackgroundSome execut.docx
Case Study    THE INVISIBLE SPONSOR1BackgroundSome execut.docxCase Study    THE INVISIBLE SPONSOR1BackgroundSome execut.docx
Case Study   THE INVISIBLE SPONSOR1BackgroundSome execut.docx
 
CASE STUDY Experiential training encourages changes in work beha.docx
CASE STUDY  Experiential training encourages changes in work beha.docxCASE STUDY  Experiential training encourages changes in work beha.docx
CASE STUDY Experiential training encourages changes in work beha.docx
 
Case Study Hereditary AngioedemaAll responses must be in your .docx
Case Study  Hereditary AngioedemaAll responses must be in your .docxCase Study  Hereditary AngioedemaAll responses must be in your .docx
Case Study Hereditary AngioedemaAll responses must be in your .docx
 
case studieson Gentrification and Displacement in the Sa.docx
case studieson Gentrification and Displacement in the Sa.docxcase studieson Gentrification and Displacement in the Sa.docx
case studieson Gentrification and Displacement in the Sa.docx
 
Case Studt on KFC Introduction1) Identify the type of .docx
Case Studt on KFC Introduction1) Identify the type of .docxCase Studt on KFC Introduction1) Identify the type of .docx
Case Studt on KFC Introduction1) Identify the type of .docx
 
Case Study Crocs Revolutionizing an Industry’s Supply Chain .docx
Case Study  Crocs Revolutionizing an Industry’s Supply Chain .docxCase Study  Crocs Revolutionizing an Industry’s Supply Chain .docx
Case Study Crocs Revolutionizing an Industry’s Supply Chain .docx
 
Case Studies Student must complete 5 case studies as instructed.docx
Case Studies Student must complete 5 case studies as instructed.docxCase Studies Student must complete 5 case studies as instructed.docx
Case Studies Student must complete 5 case studies as instructed.docx
 
Case Studies in Telehealth AdoptionThe mission of The Comm.docx
Case Studies in Telehealth AdoptionThe mission of The Comm.docxCase Studies in Telehealth AdoptionThe mission of The Comm.docx
Case Studies in Telehealth AdoptionThe mission of The Comm.docx
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx

  • 1. Running head: MANAGEMENT INFORMATION SYSTEM 1 MANAGEMENT INFORMATION SYSTEM 6 Management Information System Vijay chilakala Wilmington university 5/20/18 Introduction A management information system can be described as a computerized system that accepts data and organizes data in a systematic way so that the data can be used for other purposes like analysis, decision making and also problem solving. Most of the business organizations use these kinds of system to store and organize their data for decision making purposes. Management information systems are applied in various departments like banking institutions, military use, hospitals, meteorological institutions, National Space Aeronautics (NASA) and many more. An example of Management information system (MIS) is Automated Teller Machines (ATM) used for cash transactions (Li, Xie, & Zhang, 2015)Risks associated with Management Information System Management of information systems in relation to risk is a wide area to g by. There are a few important security concepts that
  • 2. can help in the management of these risks. Therefore security for data and information is important in these sectors. Information security entails a number of factors; integrity refers to when the management of data and information is dealt with by transparent and authorized ways. Confidentiality refers to limiting the data and information so that the authorized parties get to view it while writing off the unauthorized parties (Batini & Scannapieco, 2016). Availability of data and information is also information and therefore data and information should be available for the right people at a given time. There are a number of risks or vulnerabilities in the information systems department. Impersonation is an example of a risk. You find that one user takes the identity of another person to accomplish certain hidden agendas. Cybercrimes like hacking or cracking to gain access into the system. Theft is also a risk which usually results into loss of computer hardware (Li, Xie, & Zhang, 2015)Management of Information systems related to use Information system has a number of uses. They play an important role in managing data and information. A management information system can be used in processing transactions like the Automated Teller Machines. This function is mostly used by financing institutions like Banks to store, organize and process data. Management information systems can be used in libraries to organize and keep record of books as they are issued to the parties that need them. They are also used by organizations to compile data used for analysis; the data can later be used for decision making policies.Management of Information systems related to data storage Data storage provides a platform where information that is used by any information system can be kept and backed up for future usage. It also means that the data stored can be accessed at any given whenever the authorized parties feel like using them. There are two types of data storage in a computer system; primary and secondary storage facilities. Primary storage of a computer can be used to store the small tasks and data that are
  • 3. used by the computer. They disappear once the computer is turned off. The main memory in this is the Random Access Memory (Laudon, 2015). Secondary storage refers to external storage facilities like the hard drive media, Compact disks/Digital Versatile Disks. The good thing with these storage units is that they can store a large amount of data that can be used later on. In Management information systems, there is a storage unit referred to as a data warehouse. The purpose of a data warehouse is to provide an analysis of past organizational data like sales and purchases. Most organizations use a MIS that backs up information on a particular interval. These data stored is then sent to the data warehouse where it is analyzed. The data warehouse is an advanced system that can hold data for a long time as seen in most business organizations (Li, Xie, & Zhang, 2015)Transmission of data/information in Management information systems Data transmission in Management information systems requires certain mediums for it to be considered a success. A communication medium makes data transmission possible. An example is the fiber optic cable that can transmit large amounts of data usually at a speed of gigabytes per seconds. Fiber optic cables can be very useful for organizations that deal with large units of data (Li, Xie, & Zhang, 2015). Wireless communication can also be used facilitate data transmission. Wireless communication makes use of infrared technology to make transmission of data possible. The most important data transmission medium is the network topologies.Comparison of principles of information assurance The core principles of information assurance only focus on the accessibility of information for authorized personnel only. The principles also take confidentiality of information as a number one factor as they limit unwanted parties from accessibility. The aim of the principles is also to ensure that information is available under integrity to the authorized parties. Integrity makes sure that the data is authentic and is not altered in any
  • 4. way whatsoever. Confidentiality is put in place to ensure that the authentic data is only available to the authorized parties only (Ogiela, 2015). Authenticity keeps into account and monitors information so that counterfeiting does not crop in. Utility makes sure that data available is of the right use and not irrelevant. Privacy makes sure that data and information are protected from any third parties that might want to access the information by illegal means (Laudon, 2015). In conclusion, management information systems are guided by a number of principles that ensure the general security of data and information (Valacich & Schneider, 2015). Since there are a number of cyber crimes available, MIS should be designed in such a way that they are able to overcome such malicious acts. References Batini, C., & Scannapieco, M. (2016). Data and information quality: dimensions, principles and techniques. Springer. Laudon, K. C., & Laudon, J. P. (2015). Management Information Systems: Managing the Digital Firm Plus MyMISLab with Pearson eText--Access Card Package. Prentice Hall Press. Li, W., Xie, L., & Zhang, J. F. (2015). Containment control of leader-following multi-agent systems with Markovian switching network topologies and measurement noises. Automatica, 51, 263-267. Ogiela, L., & Ogiela, M. R. (2015). Management information systems. In Ubiquitous Computing Application and Wireless Sensor (pp. 449-456). Springer, Dordrecht. Valacich, J., & Schneider, C. (2015). Information Systems Today: Managing in a Digital World Plus MyMISLab with Pearson eText--Access Card Package. Prentice Hall Press. Running head: DATA BACKUP AND DISASTER RECOVERY
  • 5. 1 DATA BACKUP AND DISASTER RECOVERY 2 Data Backup and Disaster Recovery Kotteswarrao Makenna Wilmington University 6/10/18 Data Backup The process of comprehending the right approaches to effectively backup and undertake business data recovery is a challenging factor. However, the aspect of understanding the basics serves as a solution to different frameworks regarding the protection of the existing foundation found in a business. This means endless protection given to invaluable data. Undertaking a Modern Strategy Many business partners and companies come up with complaints about unreliable and ineffective frameworks to back up their data. They talk about the process of baking up data taking many hours. This means that data being backed up has an unusable and partial nature which makes other important business data to become unreasonable (Adwan & Al-Soufi, 2016). Most business that suffers from significant data loss has reported bankruptcy within the shortest time possible. Companies with outdated backup techniques possess discrepancies in their operations. Leveraging the cloud The modern society has eliminated cumbersome software and
  • 6. any operational IT infrastructure. Affordability and scalability exist as a result of diverse services created by cloud technology. Flexibility exists in the aspect of leveraging technology that uses the cloud. It reduces costs regarding hardware use. Cloud only makes one pay for the data they use daily. Utilizing Multiple Locations LAN network speeds ensure recoverable data. The proper management and storage of data make it possible to acquire it in its original form. One has to establish a multiple and dynamic environment of backing up data to protect it from any existing disaster. Good Disaster Recovery Planning A number of elements also exist when it comes to good disaster recovery planning. The discussion touches on the following elements: Assessing the existing Risks It is difficult for one to prepare for different risks in the society. One may have to be specific when it comes to identifying the risks that have an impact on the business (Laudon & Laudon, 2016). One must identify its influence on geography, technology, and general operations of the industry. The process involves designing planning to include plans in the areas that may cause disruptions. Evacuating Routes and Identifying Egress
  • 7. It means determining the process of influencing customers and employees to evacuate from the working environment safer. Creation of evacuation routes means creating an environment that ensures the elimination of any critical emergencies through effective plans (Reddy & Kannamani, 2015). The management marks the desired evacuation routes. Appointing a Recovery Team to deal with Employees The workplace environment should establish an effective team of employees that possess specific knowledge and skills. The skills focus on human resources, information technology, and operations that may influence employees to continue with their work. They may also run their work remotely using other alternate locations. The employees in the professional environment should have adequate contact information for main personnel and they should also acquire external assistance where possible. Business Operations and Incentives If the work environment lacks an office, the management should focus on establishing an alternate location for employees (Lievens & Burke, 2011). This is to enable them to have access towards the company network. The management should also think of a way forward in fulfilling the expectations of customers in the market. Good Business Continuity Planning Disaster may strike and destroy the operations of a business at any given point. However, companies with the best management make early preparations for any unexpected activity. Such companies possess continuity plans. It influences the company
  • 8. to acquire a competitive status over the existing competitors in terms of recovery and responsiveness. Testing of Backup Strategies Regularly Most companies in the modern era use diverse technology tools in assisting the management of business operations. The on-site servers belonging to the companies are used to store huge amounts of data. In the case whereby any disaster occurs, the companies may lose valuable information (Koren, 2010). Backup plans are useless when they lack testing and regular check-ups. Individuals will want to verify the backups in the strategic data of their companies to ensure they are functioning fully. Involvement of all Employees Employees are an important part of any business operation. They assist in the process of enhancing business development. Therefore, each employee should have the capacity and opportunity to comprehend the important parts of a business. The management of companies should schedule consistent meetings defining and identifying roles found in the plan. They should revise the plans from time to time in the whole environment of the company. All the employees should play an important role in improving the workplace environment (Alter, 2008). Be sure to let the employees know about the valuable assets and motivate them to know that they will receive assistance at any given point. Prioritization of Key Functions One must focus on the strength of the company. An effective
  • 9. business continuity plan exposes the business to significant functions. Many resources and inventories with a relation to the business functions should have an accurate status and should be created in advance. The process of dealing with critical functions may serve as a challenge and may cripple major business operations. The company should identify its weakness and come up with a contingency plan to enhance development. References Adwan, E., & Al-Soufi, A. (2016). A Review of ICT Technology in Construction. International Journal of Managing Information Technology, 8(3/4),, 1-21. Alter, S. (2008). Defining information systems as work systems: implications for the IS field. European Journal of Information Systems, 17(5),, 448-469. Koren, D. (2010). MPLS and Network Convergence. Rad University. Retrieved from http://www2.rad.com/networks/infrastructure/ipmpls/main.htm Laudon, K., & Laudon, J. (2016). Management information system. Pearson Education India. Lievens, F., & Burke, E. (2011). Dealing with the threats inherent in unproctored Internet testing of cognitive ability: Results from a large‐scale operational test program. Journal of Occupational and Organizational Psychology, 84(4), 817-824. Reddy, L., & Kannamani, R. (2015). The Possible Remedies for the Challenges of Matrix Organization System in IT Outsourcing Industry. The International Journal of Business & Management, 3(7), 1.