Ict 113 Assignment
Ict 113 Assignment
ASSIGNMENT BRIEF:
2. The assignment must be handed in without fail by the submission date (see assessment schedule for your course).
3. Ensure that submission date is date stamped by the reception stuff when you hand it in.
4. Late submission will not be entertained unless with prior agreement with the tutor.
This assignment is intended to assess the student’s knowledge in all of the following areas.
However, greater emphasis should be given to those items marked with a tick.
7 Knowledge of theories
(Administrative only)
LECTURER’S FEEDBACK
Business Information Systems (BIS) are sets of interrelated procedures using Information
Technology (IT) infrastructure in a business enterprise to generate and disseminate desired
information. Such systems are designed to support decision-making by the people associated
with the enterprise in the process of attainment of its objectives.
The Business Information System gets data and other resources of IT infrastructure as input from
the environment and process them to satisfy the information needs of different entities associated
with business innovativeness. There are systems of control over the use of IT resources and the
feedback system offers useful clues for increasing the benefits of Information Systems of
business. The BIS are sub-systems business systems and by themselves serve the function of
feedback and control in the business system.
These are basic business systems that serve the operational level of the organization by
recording the daily routine transactions required to conduct business, such as payroll and
sales receipts.
Cyber Guard Security Co. can use TPS to the following advantage:
The TPS keep a stable database and reduces risk of loss of user information in the
occurrence of terminal or network failure.
The TPS is able to effectively recover from operating system failure and also
handle system failures depending on what stage the transaction was in when the
system failure occurred.
It is versatile as it encourages the use of online payment systems in real time and
increases more payment methods.
The use of TPS in Cyber Guard Security Co. can minimize the occurrence of error
during data transactions
A TPS allows for the user/customer to have a level of reliability and confidence
during transactions.
Cyber Guard Security Co. can also use MIS to improve the companies well-being.
Management Information Systems serve middle manager’s interests by providing current
and historical performance information to aid in planning, controlling, and decision-
making at a management level in the security company. MIS typically compress
Transaction Processing Systems data to present regular reports on the security company’s
basic operations e.g. sales and cancellations.
Cyber Guard Security Co. can also employ the use of DSS, or business intelligence
systems, help managers with non-routine decisions that are unique, rapidly changing, and
not easily specified in advance. DSS are more analytical than MIS, using a variety of
models to analyse internal and external data or condense large amounts of data for
analysis.
Knowledge Management (KM) is process of creating, sharing, using and managing the
knowledge information of an organization. It refers to a multidisciplinary approach to
achieving organizational objectives by making the best use of knowledge. For firm like
Cyber Guard Security Co., KMS is very important because it can help the company focus
on organizational objectives such as improved performance, competitive advantage,
innovation, the sharing of lessons learned, integration and continuous improvement of the
company.
A KMS is an extremely valuable asset for Cyber Guard Security Co. because it:
In Artificial Intelligence (AI), an Expert System is a computer system that emulates the
decision-making ability of a human expert. Expert Systems are designed to solve
complex problems by reasoning through bodies of knowledge, represented mainly as if –
then rules rather than through conventional procedural code. Expert Systems can be
utilized by Cyber Guard Security Co. to:
Monitor all security personnel in the field and all tripped anti-theft alarms owned
by client’s firms or customers for quick security measures;
Develop marketing plans for a new product (protection detail) or new investment
strategy.
The unique value of ES is that it can allow Cyber Guard Security Co. to capture band use
the wisdom of expert and specialists. (Reynolds & Stair, 2010)
Office Automation Systems can improve Cyber Guard Security Co. with the following
when implemented:
Manipulation and storage of data: storage of data means saving all confidential
and important documents and records related to the company. The Office
Automation System also consists of handling data applications that are used for
handling and creating documents, images, spreadsheets, and files.
Management of data: data management happens to be one of the best and biggest
advantages that come with Office Automation Systems. OAS can offer Cyber
Guard Security Co. with several facilities such as managing data and information
that is sorted.
Cyber Guard Security Co. can monitor and even handle projects and activities that
are big inside the office by using an Electronic Management System. Also known
as an Electronic Document Management System (EDMS), is a software system for
organizing and storing different types of documents.
Saves more time and even more resources: the OAS will empower all businesses
to all time and money. It will simplify all Cyber Guard Security Co.’s complex
tasks, help in getting a more dedicated and proper resource, and will also lead to a
much bigger amount with time.
Reduces all costs: since most business processes are now automated, Cyber Guard
Security Co. does not have to invest that much on hiring any new resources or
even taking care of any of these tasks which can be executed easily by using the
system of Office Automation.
ESS can profit Cyber Guard Security Co. because of the following benefits:
CONCLUSION:
In conclusion, any business can be successful only when there is consistent management
of organizational and financial data with efficient Information Systems.
At the end of the day, Business information Systems (BIS) can give the security
company a competitive advantage and provide the data the company needs to make
faster, smarter business decisions.