Introduction to Information Systems Assignment

Assignment Help Other Subject
Reference no: EM132426340

MIS500 Foundations of Information Systems - Reflective Portfolio Assignment

Learning Outcomes - This assessment addresses the following subject learning outcomes: Develop own professional practice and ethical standards around business problems and implementation of solutions.

Context: The assessment suite in this subject is built on top of skills you are building in your learning activities. Although the learning activities do not carry any assessable weight by themselves, completing them and seeking input from your peers and the learning facilitator is essential for you to achieving a positive result in the subject. Before beginning this assessment, be sure that you have completed the learning activities in all of the modules.

Instructions: As you begin this subject, start and keep a learning journal that you add to during the process of learning about the foundations of information systems. A suggested format for the learning journal is as follows:

Date

Learning Activity

Impact

Evidence

 

 

 

 

 

 

 

 

(You are free to have another format of your choosing, and if you do, the following comments will need to be adjusted.)

For each day in your learning journey, write the date and then the learning activity you engaged in. Detail what impact the learning had on you and then include any evidence you might like to keep later. This journal should be appended to this assessment when you submit it.

To do this assessment well, you will need to engage in reflective analysis. Reflection is what happens when you are quiet and calm and have appropriate time to study and is how you integrate the materials in this subject with what you already know. Sometimes the materials may challenge what you already know, and at other times it may create new knowledge, opinions or ways you will integrate into your professional practice. Reflection is not a cursory comment about a learning activity but instead is an authentic assessment as it involves you being vulnerable, allowing your personal beliefs and the way you perceive the world around you to be challenged and, if necessary, changed by what you learn. An important element of reflection is your incorporation of your belief system, your morals and ethics as well as how you view the impact of information systems on people.

Toward the end of the trimester, take your learning journal and then build a narrative that summarises the journey and learnings you undertook while studying this subject. You should refer to specific journal entries and/or extracts from learning activities to demonstrate your learning. You should refer to how you can apply the learnings in your future career or the organisation you currently work for. Should you wish to you can focus your self reflection on one aspect of the subject from the following topics:

- Business Intelligence and Big data

- Cybersecurity

- Agile Methods and system development

- CRM technologies

- SCM Technologies

There is no required format for the assessment. Students should use initiative and be sure to conform to the APA referencing style, making use of external sources as appropriate.

Be sure to bookend your assignment with an introduction and conclusion. You may also like to append your learning activities or other artefacts that demonstrate the attainment of your learning or the ways in which the learning materials have affected you personally.

Choose cyber security topic.

MODULE 1 - Introduction to Information Systems

This Module will help you:

Define and explain the scope of information systems;

Consider and critically evaluate businesses in systems terms;

Research and contrast different types of technologies;

Collaborate with colleagues a picture of the contemporary business environment;

Critically analyse-practicing your critical thinking-the notion of technology and its place in the enterprise;

Anticipate and map the information needs of a large Australian enterprise; and,

Expand your information searching technique and synthesise information from it.

MODULE 2 - DATA, INFORMATION & KNOWLEDGE

Learning Outcomes - Reading and studying this module and fully attempting all of the learning activities will help you to:

Explain the difference between data, information and knowledge using examples, including new ones you have not seen or used before;

Critically analyse the role of data in a contemporary enterprise, using examples you invent;

Use Ackoff's hierarchy of data to theorise and explain the differences between data, information and knowledge in a contemporary enterprise;

Demonstrate, with original examples, the efficient manner of storing and managing organisational data;

Critically argue the value of organisational knowledge; and

Make defensible recommendations for how an enterprise can harness its knowledge and incentivise its staff to share knowledge.

MODULE 3 - BUSINESS INFORMATION SYSTEMS

Learning Outcomes - Reading and studying this module and fully attempting all of the learning activities will help you to:

Use the functional view of business to map and critically evaluate the IS used in a firm of your choice;

Synthesise the advantages and disadvantages of core business IS, incorporating high-quality sources into your argument;

Justify the use of business IS, defending the drive of contemporary firms to pursue continuous improvements and efficiency;

Create recommendations for firms considering implementing modern accounting systems so that they can appropriate resource their requirements;

Critically evaluate academic sources using thematic analysis and using those as the basis for creating a risk analysis and risk mitigation plan;

Conceptualise the links between abstract concepts-such as multiple business and enterprise IS-in diagrammatic form; and

Argue the high-level case for enterprise systems to management.

MODULE 4 - e-Business, e-Commerce & Business Intelligence

Learning Outcomes - Reading and studying this module and fully attempting all of the learning activities will help you to:

Understand the beginnings of the Internet and use it to critically analyse how businesses can capitalise on technology to drive their businesses;

Make recommendations regarding the use of technology for business that are cognisant of the risks to business models and that feature business at the heart of technology;

Distinguish between different types of electronic business, centred on the type of customer being serviced;

Critically analyse the reasons why businesses would adopt e-Commerce and e-Business initiatives and technologies;

Define business intelligence, contextualising it in its history and future projections;

Illustrate why business managers need accurate and timely information;

Describe decision-making models; and

Discuss current business intelligence technologies.

MODULE 5 - INFORMATION SECURITY

Learning Outcomes - Reading and studying this module and fully attempting all of the learning activities will help you to:

Explain why firms should care about information security;

Describe and justify the tenets of information security;

Analyse the concepts underlying authorisation;

Explore and characterise the personal preferences of hackers;

Describe examples of threats to information security;

Produce policies, standards, guidelines and procedures for information security;

Discuss and promote disaster recovery planning;and

Explain why social engineering is the most insidious type of threat.

MODULE 6 - THE INFORMATION SYSTEMS PROFESSION

Learning Outcomes - Reading and studying this module and fully attempting all of the learning activities will help you to:

Consider and define what is meant by 'profession' and synthesise the key elements;

Explain the need for continuing professional development;

Argue the case for professional ethics;

Discuss contemporary ethical issues concerning information systems; and

Consider and discuss contemporary and emergent issues.

Attachment:- Assignment Files.rar

Reference no: EM132426340

Questions Cloud

Cardinal rules of risk communication : In a minimum of 250 - 300 words post your discussion for the topic below. Did the government utilize the Seven Cardinal Rules of Risk Communication
Explain why these areas are most in need of improvement : Explain why these areas are most in need of improvement. Support your thoughts and ideas with appropriate resources.
For what purposes the approach is most commonly used : For what purposes this approach is most commonly used. An example of planning requirements for which this approach would not be ideal.
Role of security compliance at the local and federal level : Justify the need for effective compliance. Suggest an example of where it is pertinent to an organization
Introduction to Information Systems Assignment : Develop own professional practice and ethical standards around business problems and implementation of solutions. Choose cyber security topic
Degree of congruence between organizational goals : Organizational effectiveness refers to the degree of congruence between organizational goals and some observed outcome.
Write a research paper based on a forensic discipline : This assignment is to write a scholarly research paper that is to be based on a forensic discipline or new forensic field that is using fairly new technology.
What is the managers role : What does "hospitality" mean to this industry? What is the manager's role? What are "knowledge workers" and why are their contributions important?
Evaluating satisfaction levels of tourists : If you were the President of the San Diego Convention and Visitors Bureau, how would you go about evaluating satisfaction levels of tourists visiting the region

Reviews

len2426340

12/30/2019 11:53:43 PM

Choose cyber security topic. Please read the instructions to select the topic of cyber security with good english proper intext references and please make sure what assignment demand should be there. Its request bro just make it according to instructions. Just make it perfect the whole result depends on these assignments.

Write a Review

Other Subject Questions & Answers

  The love canal incident influence

What does the Blake family's story indicate about the effectiveness of our hazardous waste regulations? What more should be done to prevent situations like Hickory Woods?

  Assumptions of social control theory

Do you think people are predisposed to deviance? How would this theory differ from 'Differential Association' theory? Discuss.

  What did the character say or do

Describe exactly what happened in the film (and in the scene you're focusing on). What did the character(s) say or do? What were others doing or saying in the environment

  Define how gender and culture play a role in the transition

Consider how gender and culture play a role in the transition into retirement. Post an explanation of at least 3 factors that predict an individual's physical.

  How you assert yourself in the learning process

"How Does Metacognition Contribute to the Regulation of Learning? An Integrative Approach," "Reflective Journal Writing as a Metacognitive Tool,".

  Describe your identity as a cultural being

Explain how your own definition as a cultural being is or is not consistent with the norms, categories, and constructs prescribed to your culture by social institutions. Finally, explain how an understanding of the social construction of culture i..

  Write essay-two american national figures

Write a five-paragraph, 800-word academic comparison and contrast essay on "Two American national figures from an important time in American history " that incorporates at least two peer-reviewed academic sources.

  A single-member district system

A single-member district system. When the two major U.S. parties establish new bases of support, new policies and new philosophies, which type of election has taken place?

  Develop a microsoft excel application

Develop a Microsoft Excel application that provides support for decision making. The application must be useful to someone, which means it needs to help someone analyze data and make appropriate decisions based on the data. Don't waste your time c..

  What assumptions are necessary for part 1 to be true

-Does your argument give good reasons to believe these assumptions are true, or is it just an example of those assumptions?

  Which utilizing smartpay or a similar program in electronic

which utilizing SmartPay or a similar program in electronic contracting

  Explain how you currently use social media

Explain How you currently use social media and what you think about the benefits and risk mentioned in the readings. Why do you think you have that perspective?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd