Question

Answer All Questions.
Anwer with proper definations and clearly statated explainations with references and bibliography.
17.(a) Using appropriate examples, explain the various types of information and computer security

17.(b) Discuss how an organization can employ a competitive advantage as a driver for management in the context of management information system.
18. (a) What actions or events might lead to a system breakdown and what would be the remedies. List and discuss at least six (6).
18. (b) Explain the concept of collaboration systems and how it supports decision making, team communication, problem solving, planning and so on.
19. (a) With the aid of a diagram, explain the components of an Expert Systems.

19. (b) Intellectual Property refers to the products of human mind. There are various laws that relate to this: Copyright, Patents and trade secrets. Discuss intellectual property and ethics as they apply to software products; ownership, and license.
20. (a) Discuss the various types of information systems used at
strategic level management, Tactical level management and
operational level management.

20. (b) (i) Distinguish between and define knowledge and information (2 marks)
(ii) List any SIX features of good quality information giving an illustration of each (6 marks)
(iii) Give a well labelled diagram showing the data processing model (4 marks)
21. (a) With the aid of a diagram, explain the components of an information system

21. (b) With reference to the General Systems Theory, explain the following terms giving examples where appropriate.
(a) Open system and Closed system
(b) Input and Output
(c) Boundary and Interface
(d) Environment and control
(e) Feedbacks (Negative and Positive) and System

Answers

Answered by GPT-4o mini
### 17. Information and Computer Security

#### 17(a) Types of Information and Computer Security

1. **Physical Security**: Protects the physical assets of an organization, such as servers and data centers, from unauthorized access, theft, or natural disasters. Example: Using biometric scanners to restrict access to server rooms.

2. **Network Security**: Focuses on protecting the integrity, confidentiality, and availability of computer networks and their services. Example: Implementing firewalls and intrusion detection systems to monitor unauthorized access.

3. **Application Security**: Concerns the security measures taken within applications to prevent threats like SQL injection or cross-site scripting. Example: Using secure coding practices and regular audits for web applications.

4. **Information Security**: A broader term that involves protecting data, both in transit and at rest, from unauthorized access or modification. Example: Encrypting sensitive data such as credit card numbers.

5. **Operational Security (OpSec)**: Involves processes that protect sensitive information from being disclosed inadvertently. Example: Employees being trained to handle sensitive data responsibly and recognizing phishing attempts.

6. **Cloud Security**: Focuses on protecting data stored online. Example: Implementing identity and access management solutions for users accessing cloud storage.

#### References:

- Stallings, W. (2017). *Computer Security: Principles and Practice*. Pearson.
- Anderson, R. (2020). *Security Engineering: A Guide to Building Dependable Distributed Systems*. Wiley.

---

#### 17(b) Competitive Advantage and Management Information Systems (MIS)

Organizations utilize Management Information Systems (MIS) to gain a competitive advantage through better decision-making, resource management, and customer engagement.

1. **Data-Driven Decision Making**: By employing MIS, organizations can analyze vast datasets to identify market trends and customer preferences, allowing for timely and informed decisions that enhance competitiveness.

2. **Improved Efficiency**: MIS streamlines operations by automating processes, reducing time and cost associated with manual procedures, thus giving organizations an edge over competitors.

3. **Enhanced Customer Relationship Management (CRM)**: MIS can track customer interactions and feedback, enabling personalized marketing strategies and better customer service, which can result in higher customer loyalty and retention.

4. **Supply Chain Optimization**: Properly implemented MIS can improve logistics and supply chain efficiency, ensuring that resources are utilized optimally and inventory costs are minimized.

#### References:

- O’Brien, J. A., & Marakas, G. M. (2011). *Management Information Systems*. McGraw-Hill.
- Laudon, K. C., & Laudon, J. P. (2018). *Management Information Systems: Managing the Digital Firm*. Pearson.

---

### 18. System Breakdowns and Remedies

#### 18(a) Actions Leading to a System Breakdown and Remedies

1. **Software Bugs**: Code errors can lead to crashes or incorrect data processing.
- *Remedy*: Regular testing and updates, including beta testing new releases.

2. **Hardware Failures**: Physical components may fail due to wear or manufacturing defects.
- *Remedy*: Implementing redundancy and regular hardware checks.

3. **Cyber Attacks**: Viruses or DDoS attacks can cripple operations.
- *Remedy*: Installing robust anti-virus software and conducting regular security audits.

4. **User Error**: Accidental deletion of files or incorrect usage can cause breakdown.
- *Remedy*: Regular training and user access controls.

5. **Data Corruption**: Errors in storage can prevent system functions.
- *Remedy*: Regular data backup and integrity checks.

6. **Inadequate Resources**: Insufficient hardware or software resources can cause slowdowns.
- *Remedy*: Upgrading and scaling resources according to demand.

#### References:

- Pressman, R. S. (2014). *Software Engineering: A Practitioner's Approach*. McGraw-Hill.
- Whitman, M. E., & Mattord, H. J. (2018). *Principles of Information Security*. Cengage.

---

#### 18(b) Collaboration Systems and Decision-Making Support

Collaboration systems are integrated tools that facilitate teamwork and improve communication within and outside organizations. They support activities such as:

1. **Decision Making**: Tools like shared dashboards provide real-time data analysis supporting team decision-making processes.

2. **Team Communication**: Platforms like Slack or Microsoft Teams enable seamless communication, reducing email overload and improving response times.

3. **Problem Solving**: Collaborative document editing and forums (e.g., Google Docs, Trello) allow teams to brainstorm and resolve issues in real time.

4. **Planning**: Scheduling tools and project management software help teams coordinate their efforts towards achieving goals efficiently.

#### References:

- McKinsey Global Institute. (2012). *The Social Economy: Unlocking Value and Productivity through Social Technologies*.
- Garrison, D. R., Anderson, T., & Archer, W. (2000). *Critical Inquiry in a Text-Based Environment: Computer Conferencing in Higher Education*. The Internet and Higher Education.

---

### 19. Components of Expert Systems

#### 19(a) Components of Expert Systems

An expert system primarily consists of the following components:

1. **Knowledge Base**: Contains domain-specific knowledge in the form of facts and rules.

2. **Inference Engine**: Applies logical rules to the knowledge base to deduce new information or make decisions.

3. **User Interface**: Allows users to interact with the system and receive advice or insights.

4. **Explanation Facility**: Provides users with insights into how conclusions are reached by the system.

5. **Knowledge Acquisition Module**: A tool for refining and updating the knowledge base.

![Components of an Expert System](https://example.com/expert_system_diagram.jpg) *(Note: This link is illustrative)*

#### References:

- Giarratano, J. C., & Riley, G. (2005). *Expert Systems: Principles and Programming*. Cengage Learning.
- Turban, E., & Aronson, J. E. (2001). *Decision Support Systems and Intelligent Systems*. Prentice Hall.

---

#### 19(b) Intellectual Property and Software Ethics

Intellectual Property (IP) encompasses creations of the mind, such as inventions, designs, and brands. Relevant laws include:

1. **Copyright**: Protects artistic and literary works, including software code.
2. **Patents**: Protects inventions and processes for a specific period.
3. **Trade Secrets**: Protects confidential business information.

**Ethics in Software** relates to these IP laws, involving ownership rights, licensing agreements, and fair use policies. Ethical issues arise when software is pirated, leading to legal consequences and loss of revenue for inventors.

Organizations must establish clear licensing agreements and respect users’ rights while protecting their creations.

#### References:

- WIPO. (2020). *The Role of Intellectual Property in Innovation and Technology Transfer*.
- Lessig, L. (2008). *Remix: Making Art and Commerce Thrive in the Hybrid Economy*. Penguin Press.

---

### 20. Types of Information Systems

#### 20(a) Information Systems at Different Management Levels

1. **Strategic Level**: Executive Information Systems (EIS) offer top-level management a comprehensive view of the organization's performance and external conditions.

2. **Tactical Level**: Management Information Systems (MIS) provide middle management with regular reports on organizational metrics that assist with tactical decision-making.

3. **Operational Level**: Transaction Processing Systems (TPS) handle day-to-day transactions efficiently and accurately, supporting the operational workforce.

#### References:

- Stair, R., & Reynolds, G. (2019). *Principles of Information Systems*. Cengage.
- Laudon, K. C., & Laudon, J. P. (2018). *Management Information Systems: Managing the Digital Firm*. Pearson.

---

#### 20(b) (i) Knowledge vs. Information

**Knowledge** is a synthesized understanding of information based on experience or education. In contrast, **Information** refers to processed data that is organized in a meaningful way.

#### (ii) Features of Good Quality Information

1. **Accuracy**: Information must be free from errors. Example: Financial reports should be precise.

2. **Relevance**: Information should pertain to the decision-making process. Example: Market trends influencing product launches.

3. **Timeliness**: Information should be available when needed. Example: Real-time sales data for decision-making.

4. **Completeness**: Information should provide a full picture. Example: Complete sales records for accurate forecasting.

5. **Consistency**: Information should be consistent across different systems. Example: Uniform metrics for measuring performance.

6. **Clarity**: Information should be presented in an understandable format. Example: Visual presentations for complex data.

#### (iii) Data Processing Model Diagram

![Data Processing Model](https://example.com/data_processing_model.jpg) *(Note: This link is illustrative)*

#### References:

- Ackoff, R. L. (1989). *From Data to Wisdom*. Journal of Applied Systems Analysis.
- Turban, E., Sharda, R., & Delen, D. (2011). *Decision Support and Business Intelligence Systems*. Pearson.

---

### 21. Components of an Information System

#### 21(a) Components of Information Systems

An information system consists of the following components:

1. **Hardware**: Physical devices such as computers and servers.
2. **Software**: Programs that process data, including operating systems and applications.
3. **Data**: Information processed by the system.
4. **People**: Users who operate or are affected by the system.
5. **Processes**: Procedures and rules for using the system effectively.

![Components of Information System](https://example.com/information_system_diagram.jpg) *(Note: This link is illustrative)*

#### References:

- O'Brien, J. A., & Marakas, G. M. (2011). *Management Information Systems*. McGraw-Hill.

---

### 21(b) General Systems Theory

#### (a) Open System vs. Closed System

- **Open System**: Interacts with the environment, exchanging resources and information. Example: A business that communicates with customers and suppliers.

- **Closed System**: Does not interact with its environment, operating independently. Example: A laboratory experiment isolated from external factors.

#### (b) Input and Output

- **Input**: Resources or information fed into a system for processing. Example: Data entered into a database.

- **Output**: Results produced by the system. Example: Reports generated from processed data.

#### (c) Boundary and Interface

- **Boundary**: Defines the limits of the system, separating it from the environment. Example: The firewall that separates a network from external threats.

- **Interface**: The point of interaction between the system and its environment. Example: User interfaces for software applications.

#### (d) Environment and Control

- **Environment**: External conditions that influence the system. Example: Economic conditions impacting a business.

- **Control**: Mechanisms that regulate a system’s operations. Example: Management processes monitoring performance.

#### (e) Feedback (Negative and Positive)

- **Negative Feedback**: A process that counteracts changes, maintaining stability. Example: A thermostat regulating a heating system.

- **Positive Feedback**: Enhances changes, pushing the system away from equilibrium. Example: A company’s marketing success leading to increased demand and sales.

#### References:

- von Bertalanffy, L. (1968). *General System Theory: Foundations, Development, Applications*. George Braziller.
- Checkland, P. (1981). *Systems Thinking, Systems Practice*. Wiley.

---

Please ensure to access the URLs provided in the diagrams as they are illustrative representations. Documentation of further inquiries can be tailored based on specific instructions.
There are no human answers yet. A form for humans to post answers is coming very soon!

Related Questions