Edit in APA format and References

Anonymous

Question Description

edit as APA format. Managing information system includes wide scope in information technology. It consists of managing hardware, software, database, data resources, risk, telecommunications and its business application in organizations (O’brien & Marakas, 2005).

Unformatted Attachment Preview

Running head: MANAGEMENT OF INFORMATION SYSTEM Management of Information System: Risks, Use, Processing, Storage & Transmission of Data Sunil Gurung Wilmington University 1 MANAGEMENT OF INFORMATION SYSTEM 2 Information system management Managing information system includes wide scope in information technology. It consists of managing hardware, software, database, data resources, risk, telecommunications and its business application in organizations (O’brien & Marakas, 2005). This information management research is focused on the risk, uses, processing, storage and transmission of information or data. Risk management Managing risk in information system functions under some risk management standards. Joint Task Force Initiatives (2014) introduced Risk Management Framework (RMF), which is the common information system security framework for federal government and related agencies coordinating with NIST, Department of Defense, Office of Director of National Intelligence and the Committee on National Security System. The RMF has developed three tired approach for organization wide risk management which are; tier1-the organizational level management, tier2the mission and business process level management and tier3-the information system level management. The Joint Task Force Initiatives (2014) also explained that tier1 addresses the risk related to organizations assumption for developing comprehensive legal infrastructure and risk managing strategies in different organization such as, different ideas and methodologies of organization to overcome risks, significance in risk assessment, risk mitigation measures, risk mitigation plans and so on. Similarly, tier2 guides the conclusion of tier1 and address the assumption of mission and business process which consists of; introducing mission and business process, finding criticality of business process and prioritizing, defining business assets and resources, finding security requirement and so on. Finally, tier3 guides the conclusion from tier1 and tier2 and address the risk of information system. Furthermore, it addresses the relation with external outsource, legal/licensing agreement, supply chain arrangement and so on. MANAGEMENT OF INFORMATION SYSTEM 3 Data storage management Managing data storage in a secure and effective way is one of the most important characteristics of information system management. According to Hoffer, Ramesh and Topi (2011), database management system is the critical tool to store the data or information which basically designed into logical and physical way. Logical design refers to transforming conceptual data model into the consistent and compatible data to specific database technology such as SQL and physical database design refers to managing database system in efficient way such as normalized the relations in table, choosing the storage format, choosing data type and so on (Hoffer et al. 2011). Furthermore, data warehouse, big data and virtualization are modern technology topics in managing data in information system. Data warehouse is the concept of processing and maintain the data that helps organizations for decision which consists of warehouses practices, sound protection management, organizational commitment, selection of correct technology and includes all the operational database and focused on business intelligence, time variant data and external data as well (Hoffer et al. 2011). Managing Data Transmission Information or data can be transformed from source to destination through wired or wireless medium. Depending on the size of geographical network area, basically there are three network area which are Local Area Network(LAN) which comprises the interconnection of data communication devices within small geographical location such as home network, Metropolitan Area Network(MAN) which comprises intercommunication in metropolitan area and Wide Area Network(WAN) which is interconnection of LANs in worldwide area (White, 2016). White (2016) explained that wired communication can be twisted pair wire, coaxial cable or optical fiber cable depending on the size of network area and efficiency of communication required. MANAGEMENT OF INFORMATION SYSTEM 4 Twisted pair is basically used in the communication within small geographical location and can communicate bandwidth of 250 MHz within 100 meters distance, coaxial cable can transmit data to 500 meters and bandwidth up to 600 MHz and optical fiber can transmit data upto 10 Gbps in thousands of kilometers (White, 2016). On the other hand, wireless data communication is more effective in local area, completes with wired interconnection of components including access point and workstation (White, 2016). Data processing management Data processing involves various techniques such as System Development Life Cycle (SDLC) or traditional, logical, physical and agile data processing to put data in database management system efficiently and effectively (Hoffer et al. 2011). Hoffer et al. (2011) explained that SDLC completes with sets to define, maintain and place information system of business organization with responsible persons such as database designers, programmers and completes with planning of enterprise modeling, planning of conceptual data processing, analysis of conceptual data modeling, designing of logical database and physical database, implementation and maintenance. Beside SDLC system, Rapid Application Development (RAD) and agile database development is widely used. RAD method involves rapid iterating of analysis, design and implementation till the system fill users requirement such as prototyping, on the other hand agile methodology includes separation and intercommunication of used tools and process, functioning software, collaboration of customer and reacting to change on the plan (Hoffer et al. 2011). User management of information system It is important to define the role and responsibility of various users in information system. Hoffer et al. (2011) listed the users and their roles in information system; business analysts who MANAGEMENT OF INFORMATION SYSTEM 5 has role to work with users as well as management team, assigned to understand business condition, develop the system. Similarly, system analyst deals with information system requirement in the project and also work as business analyst, database analyst deals with need of data mining and design parts of database, users provide assist of required information, programmers design, edit and develop the computer program as per needed, database architects define standards, location, currency and efficiency, project manager guide overall project, and there are other technical experts need in specific area such as operating system, testing, networking and so on (Hoffer et al. 2011). Conclusion Risk management is one of the important and critical components of information system management where risk assessment of business organizations completes with different standards. Database management is an important tool to process and store the data information in effective and efficient way. SDLC, RAD and agile methodologies are most used and well-known methods of database processing on the other hand SQL, data warehouse and big data are well known tools for data storage. Data can be communicated through twisted pair, coaxial cable, optical fiber of wireless medium depending on the network requirement. MANAGEMENT OF INFORMATION SYSTEM 6 References Hoffer, J. A., Ramesh, V., & Topi, H. (2011). Modern database management. Pearson. ISBN 10: 0-13354461-3 ISBN 13: 978-0-13-354461-9 Upper Saddle River, NJ: Prentice Hall. Joint Task Force Transformation Initiative. (2014). Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach (No. NIST Special Publication (SP) 800-37 Rev. 1). National Institute of Standards and Technology. Tilley, S., & Rosenblatt, H. J. (2016). Systems analysis and design. Nelson Education. ISBN: 978-1305-49460-2 Boston, MA. White, C. M. (2016). Data communications & computer networks: A business user's approach. ISBN: 978-1-305-11663-4. Boston, MA: Cengage learning. ...
Purchase answer to see full attachment

Tutor Answer

TeacherAli
School: Carnegie Mellon University

Attached.

Running head: MANAGEMENT OF INFORMATION SYSTEM

Management of Information System: Risks, Use, Processing, Storage & Transmission of Data
Sunil Gurung
Wilmington University

1

MANAGEMENT OF INFORMATION SYSTEM

2

Information system management
Managing information system includes wide scope in information technology. It consists
of managing hardware, software, database, data resources, risk, telecommunications and its
business application in organizations (O’Brien & Marakas, 2005). This information management
research is focused on the risk, uses, processing, storage and transmission of information or data.
Risk management
Managing risk in information system functions under some risk management standards.
Joint Task Force Initiatives (2014) introduced Risk Management Framework (RMF), which is
the common information system security framework for federal government and related agencies
coordinating with NIST, Department of Defense, Office of Director of National Intelligence and
the Committee on National Security System. The RMF has developed three tired approach for
organization wide risk management which are; tier1-the organizational level management, tier2the mission and business process level management and tier3-the information system level
management. The Joint Task Force Initiatives (2014) also explained that tier1 addresses the risk
related to organizations assumption for developing comprehensive legal infrastructure and risk
managing strategies in different organization such as, different ideas and methodologies of
organization to overcome risks, significance in risk assessmen...

flag Report DMCA
Review

Anonymous
I was on a very tight deadline but thanks to Studypool I was able to deliver my assignment on time.

Anonymous
The tutor was pretty knowledgeable, efficient and polite. Great service!

Anonymous
Heard about Studypool for a while and finally tried it. Glad I did caus this was really helpful.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors