Analysis in the World of Information Systems

2022 ◽  
pp. 125-154

There are many ways in which information systems (IS) impact the business. There are several different types of information systems applications that can be a resource for competitive advantage. To respond appropriately to changing market circumstances, it is necessary to constantly monitor and research the overall situation and then adjust the business approach accordingly. This chapter will review the systematic and methodological approach of the information systems analyst and evaluate what techniques and procedures might be useful to assist in the search, collection, and presentation of the research results and analysis for the broader business context. The chapter will also review the need for an information management policy and a management system that is necessary to develop a large-scale system to manage the amount of information that will result from the research and analysis of the business characteristics of the company and its surrounding environment and competition.

2021 ◽  
Vol 331 ◽  
pp. 02015
Author(s):  
Delfiyanti ◽  
Magdariza

Southeast Asia was in a natural disaster thus the management was supposed to be a priority to the existing states in this territory. It is the most vulnerable to disaster in the world. By then, the member states of ASEAN agree to issue the regulation for disaster management, ASEAN Agreement on Disaster Management and Emergency Response (AADMER) that in forwarding established ASEAN Coordinating Centre for Humanitarian Assistance on Disaster Management (AHA Centre). It is facilitating cooperation and coordination for disaster management in the ASEAN territory. The organization was established in Indonesia as a member state with potential disaster. To reinforce the regulation and disaster management system, the government issues Act No.24 of 2007 on disaster management as the base and manual. The policy refers to the activities implemented immediately for an accident in control arising worst impact, involving rescue and evacuation of the victim, properties, compliance of demand, shelter, refugees handling, and facilities-infrastructure restoration. Moreover, the Act regulating disaster mitigation-based layout system set in an attempt to improve safety and living comfort.


2019 ◽  
Vol 5 (15) ◽  
pp. 1448-1455
Author(s):  
Venelin Terziev ◽  
Teodora Petrova

The non-motorized air systems for intelligence, monitoring and control of the earth surface have gained currency and are used for various tactic flight’s tasks and missions. The non-motorized aircrafts (NMA) and the air-monitoring systems that include board and land part are key elements of these systems. The world experience in using NMA for these uses shows that they are most suitable where the exploitation conditions are very extreme and there is an unacceptable risk for operations of piloted aviation. Such are intelligence and observation of strictly guarded sites, zones, where military operations are conducted as well as regions with large scale fires and floods. The use of people in these conditions is connected with actual threat for their lives and practically, NMA as a tool for collecting and processing of information is irreplaceable. Keywords: registration of images, methods, information systems, non-motorized aircrafts.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xiaofeng Wu ◽  
Fangyuan Ren ◽  
Yiming Li ◽  
Zhenwei Chen ◽  
Xiaoling Tao

With the rapid development of the Internet of Things (IoT) technology, it has been widely used in various fields. IoT device as an information collection unit can be built into an information management system with an information processing and storage unit composed of multiple servers. However, a large amount of sensitive data contained in IoT devices is transmitted in the system under the actual wireless network environment will cause a series of security issues and will become inefficient in the scenario where a large number of devices are concurrently accessed. If each device is individually authenticated, the authentication overhead is huge, and the network burden is excessive. Aiming at these problems, we propose a protocol that is efficient authentication for Internet of Things devices in information management systems. In the proposed scheme, aggregated certificateless signcryption is used to complete mutual authentication and encrypted transmission of data, and a cloud server is introduced to ensure service continuity and stability. This scheme is suitable for scenarios where large-scale IoT terminal devices are simultaneously connected to the information management system. It not only reduces the authentication overhead but also ensures the user privacy and data integrity. Through the experimental results and security analysis, it is indicated that the proposed scheme is suitable for information management systems.


Tourism, a multi-dimensional and multi-faceted activity with diverse social, cultural, economic and ecological impacts, got evolved as one of the largest and most significant economic sectors in the world. The lure of tourism as an engine of economic growth and diversification has been urging each and every country in the world to develop and promote it in the most possible manner (Dileep, 2018). As per the current projections, tourism is tend to grow further and it will remain as one of the most vibrant, growing and economically useful activities in the world having wide social and cultural ramifications in the years to come as well. Being an amalgam of industries, this sector includes a diverse range of industries like, intermediaries; transportation; accommodation; entertainment and recreation; shopping; hospitality; and infrastructure. Complex linkages and interrelationships exist among the various individual sectors of the tourism industry. The post second world war era has witnessed tremendous growth of tourism and in the same era has recorded the evolution and growth of information and communication technology as well. Information Technology has become one of the most fundamental and vital components of the successful businesses and organizations and is a major facilitator. In the growth of tourism as a major social phenomenon in the 21st century, Information and communication technology (ICT) too had played significant roles. Indeed, the relationship between tourism and ICT was symbiotic as well, since the latter sector got many opportunities for the application of it in the tourism sector, like in the air transportation which was a pioneer in developing transaction systems for handling the cumbersome booking data in the 1950s and 60s. Information systems for the core of ICT applications in businesses and organisations. Tourism Sector too has been using different types of information systems intensively in the international scenario. Kerala, one of the late entrants in the international tourism, has turned to be successful international tourist destinations within a few decades of time. The number of tourism arrivals has been registering consistent growth and the industry got expanded exponentially in Kerala. To compete globally, tourism of anywhere requires a variety of information systems. Kerala tourism industry is also not an exception to this. In this context, a study on the current usage of information systems in the tourism sector in Kerala seems inevitable. The study has to focus upon the types of information systems used by the tourism industry in Kerala, efficiency as well as the impacts of the usage of such information systems by the industry, comparing the scenario with the international standards and also to discuss about the future to suggest suitable solutions to look ahead to have more competence by the Kerala tourism


Author(s):  
Shoji Konno

Recently, the globalization of information system business has expanded all over the world. In order to enhance the service quality of the business, the authors examine adopting the “value in use” concept to a traditional organizational management system based on GDL. Now, they face the improvement problems, which are defined as transformation from GDL-oriented organizational management systems into service-dominant logic-oriented organizational management systems. In this chapter, the authors describe how to transform from the GDL-oriented system into the SDL-oriented management system by using the “value in use” concept, which is deeply related to service value creation.


Author(s):  
A. F. Marques ◽  
J. G. Borges ◽  
P. M. Sousa ◽  
M. Fonseca ◽  
J. Gonçalves ◽  
...  

The wood supply chains encompass a multitude of agents with independent business processes and information systems. The network of interrelationships and information flows among the agents is often neglected when designing information systems. Common processes and automatic data exchanges can enhance collaboration as well as improve IT alignment with business needs across multiple organizations in the supply chain. This article proposes an Enterprise Architecture methodological approach for designing an integrated modular Wood Supply Management System. Both Process Architecture Framework and Information Architecture were developed and used to define individual systems and integration requirements, discussed on the Applications Architecture. The Technological Architecture was further addressed. Results of its application to the Portuguese pulpwood, biomass and lumber-based supply chains are presented. Results show that this approach can effectively specify individual systems requirements driven from the processes descriptions built in collaboration with the agents. It further shows that a Service-Oriented Architecture can be derived, ensuring systems integration and interoperability.


2017 ◽  
Vol 8 (1) ◽  
Author(s):  
Mehluli Masuku ◽  
Sindiso Bhebhe ◽  
Njabulo Bruce Khumalo

It has come as a fact that the use of Information and Communication Technologies has come to stay in this world. It aids the implementation of the emerging and irresistible e-government concept that seems to be the in-thing the world over. Zimbabwe has also joined the world by ascertaining its commitment to e-government as witnessed by its promulgation of various e-government services. However, despite the government of Zimbabwe having committed itself to e-government, it is of concern to note that up to this day, the country is operating without a clear information management policy or strategy that will guide and direct all the information management practitioners in the country. This comes as a great weakness in this day and age when the government of Zimbabwe has declared its intentions to subscribe to the e-government concept both in principle and in practice. Although the country has managed to survive without a clearly defined information policy in the pre e-government era, chances of it rolling out an effective and sustainable e-government policy on the same foundation are very slim, given the importance of well managed information as a pillar of sound e-government. The paper employed document analysis as its methodology in which Zimbabwe National Information and Communication Policy (ICT) Policy Framework of 2005 and the Ministry of Information Communication Technology’s (MICT) Strategic Plan (2010-2014) were reviewed and assessed the extent to which they sufficed to serve as information management frameworks that can support e-governance in Zimbabwe. The study revealed that there are ICT policies that are meant to serve as ICT strategies for the country but none of them has been put to test and such policies are very piecemeal at best as far as their coverage of information management is concerned. The first policy of such nature was the Zimbabwe National Information and Communication Policy (ICT) Policy Framework of 2005 that was developed by the government of Zimbabwe. This was followed by the Ministry of Information Communication Technology’s (MICT) Strategic Plan (2010-2014) which was being led by the then Minister Nelson Chamisa in the Government of National Unity (GNU). Following the dismantling of the GNU, the MICT was also dismantled and a new Ministry known as the Ministry of Information and Communication Technology, Postal and Courier Services that was headed by then Minister Webster Shamu came up with a new draft policy to guide ICT in Zimbabwe. Ironically, that new policy did not see the light as the then Minister was relieved of his duties and the new and incumbent Minister; Mr Supa Mandiwanzira came up with a new draft to guide the ICT operations in Zimbabwe. Despite all these developments, it remains of concern to notice that none of these policies ever prioritised information management as a strategic pillar of e-government. It is the argument of these authors that without the country’s e-government strategy being governed by a sound information management policy that will ensure the creation, management, and preservation of information, the concept will suffer the consequences in retrospect, to the detriment of the concept and the citizens. The study further revealed that the present policies are only addressing technical issues such as network and infrastructural issues of information management, yet other important aspects such as preservation, disposal and legal issues of information management are neglected. The study recommends a new framework that is comprehensive in terms of all the facets of information management. The framework covers all the relevant information management players such as archivists, librarians, records managers and the ICT personnel who should work together so as to collectively manage national information that support e-governance which Zimbabwe has just embarked on. The study further recommends that every government department has an information manager and the Ministry of Information and Broadcasting Services should be the one in charge of the information management framework and oversee its implementation. 


Sign in / Sign up

Export Citation Format

Share Document