Information Systems Management

297 views 4 pages ~ 970 words Print

Information Systems in Businesses

Information systems are a type of technology that is now more often used in businesses. The focus of the presentation is on two businesses in order to show the benefits and drawbacks of adopting management information systems. The management and decision-making processes used by businesses, as well as an analysis of technology use at the individual and organizational levels that led to the discovery of several likely security flaws and computer crimes, are all significant topics covered in the article. Finally, a conclusion is drawn regarding the optimum way to use information technologies.

The Use of Management Information Systems

A management information system as inferred from Galliers and Leidner (2014) is the use of computerized database through a tailor-made software to manage the daily operations of an organization. Technology is the current driver of globalization, thus, its use has been embraced in almost every organization that intends to sustain, develop, and grow itself in the industry of interest. The advanced level of management information system has fostered the implementation of the enterprise resource planning software that is created according to the organizations’ demands and specifications (Galliers and Leidner, 2014). This paper, therefore, delves into comparing and contrasting the use of management information systems in two organizations.

Managing Internal Operations and Making Decisions

In regards to the use of information systems in managing internal operations and making decisions, both the identified organizations have successfully succeeded in integrating certain aspects of management including planning, organization, and controlling the operations of the business that can be automated to be driven by technology. From a comparative perspective, it was established that the information systems are generally used to ensure efficient and effective keeping of the organizations’ records, conducting purchases, managing sales and forecasts, developing inventories, and products marketing. In contrast, the management personnel relied on the information obtained from the systems to make decisions but had different approaches. On one hand, one of the organizations relied wholly on information obtained from the integrated information system to make decisions. On the other hand, the other company not only relied on the information collected from the information systems but also took into account the employees’ concerns before arriving at the final decisions to be implemented.

Using Information Technology for Competitive Advantage

Correspondingly, it is the desire of both the organizations to have a competitive advantage over each other. According to Galliers and Leidner (2014), the use of information technology is one of the many strategies employed by companies to address competition concerns. In this view, it was noted that the company’s use of information technology for competitive advantage is dependent on what the company perceives to be a challenge and whether or not there is the need to address it. Comparison of the two companies revealed that operate in the same industry, share the same market and target the same clients to buy and consume their goods. As such, the company that uses the data obtained from the management information system infusion with the worker’s concerns has a competitive advantage over the other. For instance, the data are used for analysis of purchase patterns, the quantity of sale and projections while the employees due to their direct relations with the clients share in-depth thoughts, feelings, and know the client’s expectations. The information is then used in deciding on the most appropriate marketing approaches that have eventually led to the observable increase in sales.

Consequences of Using Information Technology

Consequently, appraisal of the individual and organizational consequences of using information technology highlights certain negative impacts regarding the application of information systems for management. Just like humans are to era, the computers are subject to certain challenges that can lead to malfunctions (Galliers, & Leidner, 2014). For example, an attack by a virus can blight the operations of the information systems both at an individual and at the organizational level. Moreover, the computers depend on external and internal hard disks as well as other storage devices to store individual or the company’s data. In the event that the storage devices crash and recovery attempts fail, important information can be lost leading to derailments of projects or tasks.

Potential Security Breaches and Computer Crimes

In addition, there are potential security breaches and computer crimes that are fundamental consequences that both an individual and the organization must be prepared for. First, hacking is one of the most common computer crimes that affect information management systems (Wang, 2017). Hackers are able to get computer passwords by using complex and sophisticated software, thus are able to gain access to the personal or company’s vital information. The information gained could then be used against the individual or the company. Subsequent damages that might occur due to improper use of the obtained data would be a consequence that the hacked information system user would be liable. Secondly, access codes to crucial information on the information systems can be accessed through luring emails that might be requesting for purchase quotations. While filling in such details, Wang (2017) informs that it has always happened that the dealer is unconsciously redirected to another page or site where they end up giving confidential information such as passwords.

Conclusion

In summary, information technology has become an imperative aspect of management. In particular, the management information systems have been embraced by organizations to cut costs, acquire competitive advantages, and promote efficiency in various categories of operations that can be automated. Unfortunately, there are potential security breaches as well as computer crimes that affect the functionality of the information systems. Thus, being aware of the consequences promote the use of the technology with greater care and proper security measures.

Reference

Galliers, R. D., & Leidner, D. E. (Eds.). (2014). Strategic information management: challenges and strategies in managing information systems. Routledge.

Wang, S. (2017). Integrated Framework for Information Security Investment and Cyber Insurance.

February 22, 2023
Subcategory:

Goals Experience

Number of pages

4

Number of words

970

Downloads:

52

Writer #

Rate:

4.7

Expertise Decision
Verified writer

Richard is the best writer for Data Science tasks, even if you have something really complex. I needed to do tasks on security matters and already had a draft. Sharing my ideas with Richard ended up in a perfect paper!

Hire Writer

Use this essay example as a template for assignments, a source of information, and to borrow arguments and ideas for your paper. Remember, it is publicly available to other students and search engines, so direct copying may result in plagiarism.

Eliminate the stress of research and writing!

Hire one of our experts to create a completely original paper even in 3 hours!

Hire a Pro