Breaking Bad -S1 Answers
Breaking Bad -S1 Answers
(b)
• A computer‐based IS includes:
– Hardware: the physical devices (computers, peripherals).
– Software: both system software and applications.
– Data: raw facts that are processed into meaningful information.
– Networks: the communication channels (internet, intranets, extranets).
– People: end users and IS specialists.
– Procedures: formal guidelines and policies for using the system.
• These components are interdependent; for example, hardware and software work
together to process data into actionable information.
(c)
• Organizational structures determine roles, authority, and communication channels.
A clear structure—whether centralized or decentralized—ensures that IS initiatives
are well coordinated, that responsibilities are clearly assigned, and that
decision‐making processes support effective implementation of technology.
(d)
• In centralized structures, decision-making is concentrated at the top, which can lead
to consistent policies and strong control; however, it may slow responses at lower
levels.
• In decentralized structures, decision-making is distributed, which can foster
flexibility and innovation but may result in inconsistencies.
• Thus, the choice of structure significantly impacts how quickly and effectively
decisions are made in support of IS deployment.
Q2.
(a)
• IS‐induced organizational change refers to the transformation in processes,
structures, and even culture that occurs when an organization adopts new information
systems.
• This change is driven by technology’s ability to automate tasks and reengineer
business processes.
(b)
• The four types of change are:
– Automation: Replacing manual tasks with computerized processes.
– Rationalization: Streamlining and standardizing procedures to eliminate
redundancy.
– Business Process Redesign: Analyzing and restructuring workflows for optimal
efficiency.
– Paradigm Shifts: Fundamental changes in business models that redefine how an
organization operates.
(c)
• The systems development process (analysis, design, programming, testing,
conversion, and maintenance) provides a structured framework that guides the
creation and integration of new systems.
• Each stage ensures that user requirements are met, risks are minimized, and the final
system aligns with the strategic goals of the organization.
(d)
• Common challenges include insufficient requirements analysis, resistance from
users, integration with legacy systems, budget constraints, and project delays.
• Overcoming these requires robust planning, user involvement, and agile
methodologies that allow for iterative improvement.
Q3.
(a)
• Data are raw, unprocessed facts (e.g., numbers, text).
• Information is data that have been processed and organized in context, making them
meaningful.
• Knowledge is the understanding and insights derived from information through
analysis and experience.
(b)
• Information is valuable when it is accurate, complete, timely, and relevant.
• These characteristics ensure that decision-makers can rely on the information to
drive effective strategies and operational improvements.
(c)
• Effective information structuring organizes data into formats that are easily
accessible and interpretable.
• This enhances decision-making by enabling quick retrieval of relevant information
and by supporting analytical processes that lead to informed strategies.
(d)
• Information systems convert raw data into strategic insights through systematic
processes: capturing input, processing data, storing information, and producing
outputs such as reports and dashboards.
• These outputs help decision-makers identify trends, forecast outcomes, and devise
competitive strategies.
Q4.
(a)
• Workflow analysis is the systematic study of the sequence of tasks and processes
within an organization.
• Its importance lies in identifying inefficiencies, redundancies, and bottlenecks so
that processes can be optimized for better productivity and lower costs.
(b)
• The key steps include:
1. Documenting the current workflow.
2. Analyzing process steps and performance metrics.
3. Identifying bottlenecks or redundant activities.
4. Proposing redesigns or automation to streamline the process.
(c)
• Ethical, legal, and social issues in IS encompass concerns such as data privacy,
intellectual property rights, and accountability.
• For example, protecting personal data is essential for privacy, while clear policies on
intellectual property ensure that creative works are legally safeguarded.
(d)
• Workflow automation can improve consistency, speed, and efficiency.
• However, it may also reduce human oversight, create issues of accountability, and
lead to job displacement.
• Balancing these effects requires measures that safeguard ethical standards while
harnessing the benefits of automation.
Q5.
(a)
• Strategic information systems are designed to support and shape an organization’s
competitive strategy.
• They provide unique capabilities that allow an organization to differentiate itself
from competitors and to respond swiftly to market changes.
(b)
• Michael Porter’s Value Chain outlines the primary and support activities that add
value to a product or service.
• Strategic IS enhances these activities by streamlining operations, reducing costs, and
fostering innovation at every step of the value chain.
(c)
• By integrating technology into core business activities, strategic IS can transform
traditional business models.
• For example, digital platforms may enable real-time customer engagement,
personalized services, or entirely new revenue streams.
(d)
• Aligning IS with organizational strategy can be challenging due to issues such as
miscommunication, resistance to change, and integration with existing systems.
• Overcoming these challenges requires a clear strategic vision, continuous evaluation,
and adaptive change management processes.
Q6.
(a)
• The key principles of IS security include:
– Confidentiality: Ensuring that information is accessible only to authorized users.
– Integrity: Maintaining the accuracy and consistency of data.
– Availability: Guaranteeing that information is accessible when needed.
• These principles are supported by controls such as access management and audit
trails.
(b)
• Common security threats include malware, phishing, unauthorized access, and data
breaches.
• Control measures to counter these threats include firewalls, encryption, multi-factor
authentication, and regular security audits.
(c)
• Support systems provide ongoing maintenance, troubleshooting, and user support.
• They ensure that IS remain reliable, updated, and capable of recovering quickly
from failures, thereby safeguarding system integrity.
(d)
• There is often a trade-off between rigorous security protocols and ease of use.
• While strict measures protect sensitive information, they may also impede system
usability.
• The ideal balance is achieved by designing security solutions that protect data while
remaining as unobtrusive as possible for the end user.