Assignment Content This week you will consider supporting Great Day Fitness Tracking in the age of big data and the capabilities and potential benefits of using business intelligence. Consider the ov

Running head: HARDWARE, SOFTWARE AND NETWORK REQUIREMENTS 0




Hardware, Software and Network Requirements

Michael Murdock

CIS/568: Information Systems Concepts

Ezam Mohammed

07/20/20

Hardware, Software, and Network Requirements 

In technology, some tools are used known as hardware; these are technological tools used to make raw data to be processed data; for instance, mouse, keyboard, monitor, and much more. On the other hand, the software is like programs that are inserted in some of the hardware to turn raw data into processed data. Examples of software are like management information systems and much more (Henneke et al, 2016). Lastly, on the network requirements, these are technological tools that make hardware and software communicate. It is essential for a business or an organization to incorporate the technological tools in all of its daily routines to fasten and ease work. As in this paper, we will focus on the proposal for an excellent day fitness tracking business found by Karen Adams. Karen needs to expand her business in the college’s business incubator through an online platform. Because she believes in technology, she has hired an IT consultant company to help her come up with a good website for her business.

An overview of the top information systems used in business today and how they relate to Karen’s business needs

           In the current world of activity that we are in, many organizations or just companies have one primary goal to achieve: reaching through as many customers as possible and becoming the leading business in the market. However, this can only be possible when the firms apply technological tools to aid in the daily business. The use of technological tools in these businesses also lead to the delivery of quality services which are free from errors and even coming up with the best good s that the customers need. These services also make the business very current and are sure of what the customer needs. For instance, there is a need for introduction of the information system in market to help in the communication between the sellers and suppliers, suppliers, and owners and much more in the chain. The information systems can also be used to track the records of product sales, inventory keeping, and much more. Examples of these information systems include the management information system (MIS), transaction processing system (TPS), and executive support systems (ESS), and more. 

Description of the relationship between business processes and information systems

In business, business processes are like the activities that take place in a market that are executed by the employees of the company to ensure customer satisfaction. On the other hand, information systems in a company are like the components used in the industry to aid in the communication process among the business process units. Research shows that in an organization, different business processes are found in almost all the departments (Pesé et al, 2017). Due to these numerous business processes, there is a need for the information system to aid in the information passing among the business processes and different departments in the business. As per Karen’s business in concern, the information system's introduction in the market will bring so much change and increase customer satisfaction. On the other hand, it will really give the employees easy time of communication. This is because the IS will help in providing the relationship between the information of the product and that of the customer’s personal information, type of order placed, when the order is needed, the destination of the law, and much more.

Flowchart for Handling an Online registration

Customer Website

Order acknowledged

Go to Webpage

No

Yes

Yes

No

No

Yes

Done Shopping?

Yes

No

No

Notify client

Part of payment contributed to charity

New Customer?

Select Tracking Device Style needed

Modify and Add to Cart

Originate receipt

Obtain receipt

Payment charged to customer

Is payment OK?

Confirm billing Info

Payment info

Place an Order

Continue to counter

Login

Create Account

Continue to Checkout

Is style Existing?


Areas for information systems (IS) use and security concerns In Karen’s business the proposed information system will ensure that all he customers’ information are gained and store in the database just right from registration. This will help in the remembering of the customer the next time they visit the website. All the sensitive information about the contacting details and much more will really be kept safe in the database. This will be because it will only be accesses by the authorized persons in the system. On the other hand, to enhance more security, customers will be required to provide their login details like the user name and password to ensure that the accounts details are theirs.

A list of areas of concern for ethical handling of customers’ private information

However, much people consider the use of technological devices a s the best in doing business, it also has its own side effects. These side effects might include inadequate security issues which are considered unethical. As far as Karen’s business is concerned, the main area of ethical concern is the giving out of the customers’ information without their knowledge for personal gain (Gao et al, 2016). This one is considered unethical in all the business and the organizations. However, there are some of the ethical practices that can be employed in a business to guard them against this act. Example of such practices is; coming up with the organization’s ethical standards and making them to be part of the business culture. There can also be other helping practices like always practicing the positive behaviors and making it a culture. All the leaders can also lead in making things happen in the right way without any unethical issue or any misconduct.

References

Gao, P. X., Narayan, A., Karandikar, S., Carreira, J., Han, S., Agarwal, R., ... & Shenker, S. (2016). Network requirements for resource disaggregation. In 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16) (pp. 249-264).

Henneke, D., Wisniewski, L., & Jasperneite, J. (2016, May). Analysis of realizing a future industrial network by means of Software-Defined Networking (SDN). In 2016 IEEE World Conference on Factory Communication Systems (WFCS) (pp. 1-4). IEEE.

Pesé, M. D., Schmidt, K., & Zweck, H. (2017). Hardware/software co-design of an automotive embedded firewall (No. 2017-01-1659). SAE Technical Paper.