Introduction to Information Systems Assignment

Assignment Help Other Subject
Reference no: EM132426340

MIS500 Foundations of Information Systems - Reflective Portfolio Assignment

Learning Outcomes - This assessment addresses the following subject learning outcomes: Develop own professional practice and ethical standards around business problems and implementation of solutions.

Context: The assessment suite in this subject is built on top of skills you are building in your learning activities. Although the learning activities do not carry any assessable weight by themselves, completing them and seeking input from your peers and the learning facilitator is essential for you to achieving a positive result in the subject. Before beginning this assessment, be sure that you have completed the learning activities in all of the modules.

Instructions: As you begin this subject, start and keep a learning journal that you add to during the process of learning about the foundations of information systems. A suggested format for the learning journal is as follows:

Date

Learning Activity

Impact

Evidence

 

 

 

 

 

 

 

 

(You are free to have another format of your choosing, and if you do, the following comments will need to be adjusted.)

For each day in your learning journey, write the date and then the learning activity you engaged in. Detail what impact the learning had on you and then include any evidence you might like to keep later. This journal should be appended to this assessment when you submit it.

To do this assessment well, you will need to engage in reflective analysis. Reflection is what happens when you are quiet and calm and have appropriate time to study and is how you integrate the materials in this subject with what you already know. Sometimes the materials may challenge what you already know, and at other times it may create new knowledge, opinions or ways you will integrate into your professional practice. Reflection is not a cursory comment about a learning activity but instead is an authentic assessment as it involves you being vulnerable, allowing your personal beliefs and the way you perceive the world around you to be challenged and, if necessary, changed by what you learn. An important element of reflection is your incorporation of your belief system, your morals and ethics as well as how you view the impact of information systems on people.

Toward the end of the trimester, take your learning journal and then build a narrative that summarises the journey and learnings you undertook while studying this subject. You should refer to specific journal entries and/or extracts from learning activities to demonstrate your learning. You should refer to how you can apply the learnings in your future career or the organisation you currently work for. Should you wish to you can focus your self reflection on one aspect of the subject from the following topics:

- Business Intelligence and Big data

- Cybersecurity

- Agile Methods and system development

- CRM technologies

- SCM Technologies

There is no required format for the assessment. Students should use initiative and be sure to conform to the APA referencing style, making use of external sources as appropriate.

Be sure to bookend your assignment with an introduction and conclusion. You may also like to append your learning activities or other artefacts that demonstrate the attainment of your learning or the ways in which the learning materials have affected you personally.

Choose cyber security topic.

MODULE 1 - Introduction to Information Systems

This Module will help you:

Define and explain the scope of information systems;

Consider and critically evaluate businesses in systems terms;

Research and contrast different types of technologies;

Collaborate with colleagues a picture of the contemporary business environment;

Critically analyse-practicing your critical thinking-the notion of technology and its place in the enterprise;

Anticipate and map the information needs of a large Australian enterprise; and,

Expand your information searching technique and synthesise information from it.

MODULE 2 - DATA, INFORMATION & KNOWLEDGE

Learning Outcomes - Reading and studying this module and fully attempting all of the learning activities will help you to:

Explain the difference between data, information and knowledge using examples, including new ones you have not seen or used before;

Critically analyse the role of data in a contemporary enterprise, using examples you invent;

Use Ackoff's hierarchy of data to theorise and explain the differences between data, information and knowledge in a contemporary enterprise;

Demonstrate, with original examples, the efficient manner of storing and managing organisational data;

Critically argue the value of organisational knowledge; and

Make defensible recommendations for how an enterprise can harness its knowledge and incentivise its staff to share knowledge.

MODULE 3 - BUSINESS INFORMATION SYSTEMS

Learning Outcomes - Reading and studying this module and fully attempting all of the learning activities will help you to:

Use the functional view of business to map and critically evaluate the IS used in a firm of your choice;

Synthesise the advantages and disadvantages of core business IS, incorporating high-quality sources into your argument;

Justify the use of business IS, defending the drive of contemporary firms to pursue continuous improvements and efficiency;

Create recommendations for firms considering implementing modern accounting systems so that they can appropriate resource their requirements;

Critically evaluate academic sources using thematic analysis and using those as the basis for creating a risk analysis and risk mitigation plan;

Conceptualise the links between abstract concepts-such as multiple business and enterprise IS-in diagrammatic form; and

Argue the high-level case for enterprise systems to management.

MODULE 4 - e-Business, e-Commerce & Business Intelligence

Learning Outcomes - Reading and studying this module and fully attempting all of the learning activities will help you to:

Understand the beginnings of the Internet and use it to critically analyse how businesses can capitalise on technology to drive their businesses;

Make recommendations regarding the use of technology for business that are cognisant of the risks to business models and that feature business at the heart of technology;

Distinguish between different types of electronic business, centred on the type of customer being serviced;

Critically analyse the reasons why businesses would adopt e-Commerce and e-Business initiatives and technologies;

Define business intelligence, contextualising it in its history and future projections;

Illustrate why business managers need accurate and timely information;

Describe decision-making models; and

Discuss current business intelligence technologies.

MODULE 5 - INFORMATION SECURITY

Learning Outcomes - Reading and studying this module and fully attempting all of the learning activities will help you to:

Explain why firms should care about information security;

Describe and justify the tenets of information security;

Analyse the concepts underlying authorisation;

Explore and characterise the personal preferences of hackers;

Describe examples of threats to information security;

Produce policies, standards, guidelines and procedures for information security;

Discuss and promote disaster recovery planning;and

Explain why social engineering is the most insidious type of threat.

MODULE 6 - THE INFORMATION SYSTEMS PROFESSION

Learning Outcomes - Reading and studying this module and fully attempting all of the learning activities will help you to:

Consider and define what is meant by 'profession' and synthesise the key elements;

Explain the need for continuing professional development;

Argue the case for professional ethics;

Discuss contemporary ethical issues concerning information systems; and

Consider and discuss contemporary and emergent issues.

Attachment:- Assignment Files.rar

Reference no: EM132426340

Questions Cloud

Cardinal rules of risk communication : In a minimum of 250 - 300 words post your discussion for the topic below. Did the government utilize the Seven Cardinal Rules of Risk Communication
Explain why these areas are most in need of improvement : Explain why these areas are most in need of improvement. Support your thoughts and ideas with appropriate resources.
For what purposes the approach is most commonly used : For what purposes this approach is most commonly used. An example of planning requirements for which this approach would not be ideal.
Role of security compliance at the local and federal level : Justify the need for effective compliance. Suggest an example of where it is pertinent to an organization
Introduction to Information Systems Assignment : Develop own professional practice and ethical standards around business problems and implementation of solutions. Choose cyber security topic
Degree of congruence between organizational goals : Organizational effectiveness refers to the degree of congruence between organizational goals and some observed outcome.
Write a research paper based on a forensic discipline : This assignment is to write a scholarly research paper that is to be based on a forensic discipline or new forensic field that is using fairly new technology.
What is the managers role : What does "hospitality" mean to this industry? What is the manager's role? What are "knowledge workers" and why are their contributions important?
Evaluating satisfaction levels of tourists : If you were the President of the San Diego Convention and Visitors Bureau, how would you go about evaluating satisfaction levels of tourists visiting the region

Reviews

len2426340

12/30/2019 11:53:43 PM

Choose cyber security topic. Please read the instructions to select the topic of cyber security with good english proper intext references and please make sure what assignment demand should be there. Its request bro just make it according to instructions. Just make it perfect the whole result depends on these assignments.

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd