Assignment Content This week you will consider supporting Great Day Fitness Tracking in the age of big data and the capabilities and potential benefits of using business intelligence. Consider the ov
Running head: HARDWARE, SOFTWARE AND NETWORK REQUIREMENTS 0
Hardware, Software and Network Requirements
Michael Murdock
CIS/568: Information Systems Concepts
Ezam Mohammed
07/20/20
Hardware, Software, and Network Requirements
In technology, some tools are used known as hardware; these are technological tools used to make raw data to be processed data; for instance, mouse, keyboard, monitor, and much more. On the other hand, the software is like programs that are inserted in some of the hardware to turn raw data into processed data. Examples of software are like management information systems and much more (Henneke et al, 2016). Lastly, on the network requirements, these are technological tools that make hardware and software communicate. It is essential for a business or an organization to incorporate the technological tools in all of its daily routines to fasten and ease work. As in this paper, we will focus on the proposal for an excellent day fitness tracking business found by Karen Adams. Karen needs to expand her business in the college’s business incubator through an online platform. Because she believes in technology, she has hired an IT consultant company to help her come up with a good website for her business.
An overview of the top information systems used in business today and how they relate to Karen’s business needs
In the current world of activity that we are in, many organizations or just companies have one primary goal to achieve: reaching through as many customers as possible and becoming the leading business in the market. However, this can only be possible when the firms apply technological tools to aid in the daily business. The use of technological tools in these businesses also lead to the delivery of quality services which are free from errors and even coming up with the best good s that the customers need. These services also make the business very current and are sure of what the customer needs. For instance, there is a need for introduction of the information system in market to help in the communication between the sellers and suppliers, suppliers, and owners and much more in the chain. The information systems can also be used to track the records of product sales, inventory keeping, and much more. Examples of these information systems include the management information system (MIS), transaction processing system (TPS), and executive support systems (ESS), and more.
Description of the relationship between business processes and information systems
In business, business processes are like the activities that take place in a market that are executed by the employees of the company to ensure customer satisfaction. On the other hand, information systems in a company are like the components used in the industry to aid in the communication process among the business process units. Research shows that in an organization, different business processes are found in almost all the departments (Pesé et al, 2017). Due to these numerous business processes, there is a need for the information system to aid in the information passing among the business processes and different departments in the business. As per Karen’s business in concern, the information system's introduction in the market will bring so much change and increase customer satisfaction. On the other hand, it will really give the employees easy time of communication. This is because the IS will help in providing the relationship between the information of the product and that of the customer’s personal information, type of order placed, when the order is needed, the destination of the law, and much more.
Flowchart for Handling an Online registration
Customer Website
Order acknowledged
Go to Webpage
No
Yes
Yes
No
No
Yes
Done Shopping?
Yes
No
No
Notify client
Part of payment contributed to charity
New Customer?
Select Tracking Device Style needed
Modify and Add to Cart
Originate receipt
Obtain receipt
Payment charged to customer
Is payment OK?
Confirm billing Info
Payment info
Place an Order
Continue to counter
Login
Create Account
Continue to Checkout
Is style Existing?
Areas for information systems (IS) use and security concerns In Karen’s business the proposed information system will ensure that all he customers’ information are gained and store in the database just right from registration. This will help in the remembering of the customer the next time they visit the website. All the sensitive information about the contacting details and much more will really be kept safe in the database. This will be because it will only be accesses by the authorized persons in the system. On the other hand, to enhance more security, customers will be required to provide their login details like the user name and password to ensure that the accounts details are theirs.
A list of areas of concern for ethical handling of customers’ private information
However, much people consider the use of technological devices a s the best in doing business, it also has its own side effects. These side effects might include inadequate security issues which are considered unethical. As far as Karen’s business is concerned, the main area of ethical concern is the giving out of the customers’ information without their knowledge for personal gain (Gao et al, 2016). This one is considered unethical in all the business and the organizations. However, there are some of the ethical practices that can be employed in a business to guard them against this act. Example of such practices is; coming up with the organization’s ethical standards and making them to be part of the business culture. There can also be other helping practices like always practicing the positive behaviors and making it a culture. All the leaders can also lead in making things happen in the right way without any unethical issue or any misconduct.
References
Gao, P. X., Narayan, A., Karandikar, S., Carreira, J., Han, S., Agarwal, R., ... & Shenker, S. (2016). Network requirements for resource disaggregation. In 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16) (pp. 249-264).
Henneke, D., Wisniewski, L., & Jasperneite, J. (2016, May). Analysis of realizing a future industrial network by means of Software-Defined Networking (SDN). In 2016 IEEE World Conference on Factory Communication Systems (WFCS) (pp. 1-4). IEEE.
Pesé, M. D., Schmidt, K., & Zweck, H. (2017). Hardware/software co-design of an automotive embedded firewall (No. 2017-01-1659). SAE Technical Paper.