Essays on Business Information System Assignment

Download full paperFile format: .doc, available for editing

The paper "Business Information System" is a great example of a business assignment.   All the organizations currently are subjected to different security threats in an organization. The most serious threat that the organizations face today is the data breach (Crossler et al. 2013). The data breach is a security incident which exposes protected or confidential data to unauthorized individuals or organizations and kills the privacy of the breached organization or individual. The breach may occur to things and products of organizations like personal health, identification, trade, and intellectual property information.

Organizations have identified the following control measures to take care of the data breach threat. First, the breach is controlled through the organization performing regular vulnerability assessments of the data and computer application systems (Huth et al. 2013). The assessment should be done on a daily basis to reduce the risk of a data breach on constant alteration of the information. The frequent check helps the organization to stop any threat that might occur due to abrupt fail in the system. Secondly is by stopping drive-by downloads which reduces the breaches that come with drive downloads.

This process ensures that the organization does not risk sharing the information through the internet download sources without any security questions. Lastly is through instituting end-user security awareness among the workers (Crossler et al. 2013). This involves training the employees on the importance of security within the organization on the risks of the data breach and ways of reducing the risks. It helps the organization's members to be mindful of security issues in an organization. PART B Explanation of the Classification My classification meets Toulmin’ s argument since it has provided different elements of the model.

The classification has provided the claims and has supported the claim with the use of different pieces of evidence which acts as the data. The data and the claim have also been bridged through the use of warrants that are represented on the diagram. Also, the counter-argument has been represented in the diagram as well as the backing for the argument against the driverless cars. Opinion The claim that has been presented is the future of personal transportation. The claim has been supported by different points though these points are too weak to convince an individual to embrace the method.

Most of the evidence that is based for the concern towards using the system is based on the safety which is caused by human errors. The future should be based on correcting the causes of human errors than on the machine. The author has presented the ideas with an implicit warrant which makes the claim to be subjected to several questions which may result in adopting the current situation of driving. The backing that the case study present gives room for the adoption of the warrant since there are no convincing arguments which may compel the reader towards the idea presented.

The rebuttal that is presented gives a lot of strength towards disputing the claim. The reluctance towards adoption has been realized showing that it will be hard to accept the claim. The qualifier that has been presented is an indication of negligence hence weakening the claim since it has no qualities to prove strong towards adoption.

Reference

list

Case Study: A claim: Driverless Car is the Future of Personal Transportation

Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M. and Baskerville, R., 2013. Future directions for behavioral information security research. computers & security, 32, pp.90-101. http://www.sciencedirect.com/science/article/pii/S0167404812001460

DaSilva, C.M. and Trkman, P., 2014. Business model: What it is and what it is not. Long Range Planning, 47(6), pp.379-389. http://www.sciencedirect.com/science/article/pii/S0024630113000502

Huth, C.L., Chadwick, D.W., Claycomb, W.R. and You, I., 2013. Guest editorial: A brief overview of data leakage and insider threats. Information Systems Frontiers, 15(1), p.1. http://search.proquest.com/openview/5590224360be11c4c70e167118f305e5/1?pq-origsite=gscholar

Johnson, M.W., Christensen, C.M. and Kagermann, H., 2008. Reinventing your business model. Harvard business review, 86(12), pp.57-68. http://s3.amazonaws.com/academia.edu.documents/38668596/HBR_on_Strategy.pdf?AWSAccessKeyId=AKIAJ56TQJRTWSMTNPEA&Expires=1479651805&Signature=JRfa%2FrYJPCMuoItgewoMMl%2FjEzc%3D&response-content-disposition=inline%3B%20filename%3DForces_That_Shape_Competition.pdf#page=57

Lambert, S.C. and Davidson, R.A., 2013. Applications of the business model in studies of enterprise success, innovation and classification: An analysis of empirical research from 1996 to 2010. European Management Journal, 31(6), pp.668-681. http://www.sciencedirect.com/science/article/pii/S0263237312000758

Mousavi, S. and Demirkan, H., 2013, January. The Key to Social Media Implementation: Bridging Customer Relationship Management to Social Media. In System Sciences (HICSS), 2013 46th Hawaii International Conference on (pp. 718-727). IEEE. http://ieeexplore.ieee.org/document/6479920/

Rodriguez, M., Peterson, R.M. and Ajjan, H., 2015. CRM/social media technology: impact on customer orientation process and organizational sales performance. In Ideas in Marketing: Finding the New and Polishing the Old (pp. 636-638). Springer International Publishing. http://link.springer.com/chapter/10.1007/978-3-319-10951-0_233#page-1

Slack, C., 2013. Impact of radio-frequency identification (RFID) technologies on the hospital supply chain: a literature review. Perspectives in Health Information Management, p.1.http://search.proquest.com/openview/c0e9bc392c83a0da235e061266f099c7/1?pq-origsite=gscholar

Stein, A.D., Smith, M.F. and Lancioni, R.A., 2013. The development and diffusion of customer relationship management (CRM) intelligence in business-to-business environments. Industrial Marketing Management, 42(6), pp.855-861. http://www.sciencedirect.com/science/article/pii/S0019850113001223

Zhong, R.Y., Dai, Q.Y., Qu, T., Hu, G.J. and Huang, G.Q., 2013. RFID-enabled real-time manufacturing execution system for mass-customization production. Robotics and Computer-Integrated Manufacturing, 29(2), pp.283-292. http://www.sciencedirect.com/science/article/pii/S0736584512000956

Download full paperFile format: .doc, available for editing
Contact Us