OtherPapers.com - Other Term Papers and Free Essays
Search

Introduction to Information Systems Module Review

Essay by   •  June 6, 2013  •  Study Guide  •  636 Words (3 Pages)  •  2,114 Views

Essay Preview: Introduction to Information Systems Module Review

Report this essay
Page 1 of 3

1. How can information technology support a company's business processes and decision making and give it a competitive advantage? Give examples to illustrate your answer.

a. Information systems provide support for the three fundamental roles in a business enterprise through use of computer-based information systems at point-of-sale locations, inventory management, payroll/human resources management, and data gathering/storage. Analysis of sales data and trends can assist managers about what items are profitable, what should be discontinued, and what new items they should add to their lineup. An innovative IT department could use touch-screen kiosks, mobile apps and other technologies to attract and retain customers, giving them a competitive advantage over similar retailers.

2. How does the use of the Internet, intranets, and extranets by companies today support their business processes and activities?

a. Companies that use the Internet, intranets, and extranets to create e-business applications have a robust communications infrastructure that allows communication, collaboration, and coordination among networked teams, workgroups, and trading partners. These applications can also help with reengineering business processes to maximize productivity, or increase sales through the implementation of an e-business presence online that allows it to reach customers outside of their normal sales area.

3. How can a manager demonstrate that he or she is a responsible end user of information systems? Give several examples.

a. A manager might be an end user of different IT applications, such as Customer Relationship Management (CRM), Human Resources Management (HRM), or Business Intelligence Systems (BIS). All of these have the potential for theft of personally identifiable information (PII) that could lead to identity theft. Additionally, the systems need to be protected from the input of inaccurate information that could lead to undeserved promotions, or decisions based on falsified data. Collusion might also lead to Government intervention. Manager's that are not responsible end users (such as in the Hannaford Bros example on page 20) could portray their company in a negative light, resulting in consumer boycotts, or work stoppages by disgruntled workers. A responsible manager should generate a company code of ethics, incentives, and use of only appropriately certified personnel, particularly for those positions with access to data resources.

I. Read the Analysis Exercise at the end of the chapter and complete the questions after the summary.

1. #5 Career in IS: Disaster Recovery (p. 41) - For each of the common end-user mistakes listed below, answer the following questions: (1) How might this mistake result in data loss? (2) What procedures could you follow

...

...

Download as:   txt (4.2 Kb)   pdf (72.8 Kb)   docx (10.3 Kb)  
Continue for 2 more pages »
Only available on OtherPapers.com