0% found this document useful (0 votes)
22 views7 pages

Breaking Bad -S1 Answers

The document outlines key concepts of information systems (IS) and information technology (IT), emphasizing their components and the impact of organizational structures on decision-making. It discusses IS-induced organizational change, the systems development process, and the importance of data, information, and knowledge in decision-making. Additionally, it covers workflow analysis, ethical issues in IS, strategic information systems, and principles of IS security, highlighting the balance between security and usability.

Uploaded by

Arnold Masmini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views7 pages

Breaking Bad -S1 Answers

The document outlines key concepts of information systems (IS) and information technology (IT), emphasizing their components and the impact of organizational structures on decision-making. It discusses IS-induced organizational change, the systems development process, and the importance of data, information, and knowledge in decision-making. Additionally, it covers workflow analysis, ethical issues in IS, strategic information systems, and principles of IS security, highlighting the balance between security and usability.

Uploaded by

Arnold Masmini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

UNIVERSITY OF DAR ES SALAAM

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY


(COICT)

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING (CSE)

IS 367: BREAKING BAD SEASON 1 Answer s


Q1.
(a)
• An information system is an integrated set of components—people, hardware,
software, data, networks, and procedures—that work together to collect, process, store,
and disseminate information to support decision‐making and control in an
organization.
• In contrast, information technology refers primarily to the technological
infrastructure (computers, software, networks) and does not encompass the human
and procedural elements.

(b)
• A computer‐based IS includes:
– Hardware: the physical devices (computers, peripherals).
– Software: both system software and applications.
– Data: raw facts that are processed into meaningful information.
– Networks: the communication channels (internet, intranets, extranets).
– People: end users and IS specialists.
– Procedures: formal guidelines and policies for using the system.
• These components are interdependent; for example, hardware and software work
together to process data into actionable information.

(c)
• Organizational structures determine roles, authority, and communication channels.
A clear structure—whether centralized or decentralized—ensures that IS initiatives
are well coordinated, that responsibilities are clearly assigned, and that
decision‐making processes support effective implementation of technology.

(d)
• In centralized structures, decision-making is concentrated at the top, which can lead
to consistent policies and strong control; however, it may slow responses at lower
levels.
• In decentralized structures, decision-making is distributed, which can foster
flexibility and innovation but may result in inconsistencies.
• Thus, the choice of structure significantly impacts how quickly and effectively
decisions are made in support of IS deployment.

Q2.
(a)
• IS‐induced organizational change refers to the transformation in processes,
structures, and even culture that occurs when an organization adopts new information
systems.
• This change is driven by technology’s ability to automate tasks and reengineer
business processes.

(b)
• The four types of change are:
– Automation: Replacing manual tasks with computerized processes.
– Rationalization: Streamlining and standardizing procedures to eliminate
redundancy.
– Business Process Redesign: Analyzing and restructuring workflows for optimal
efficiency.
– Paradigm Shifts: Fundamental changes in business models that redefine how an
organization operates.

(c)
• The systems development process (analysis, design, programming, testing,
conversion, and maintenance) provides a structured framework that guides the
creation and integration of new systems.
• Each stage ensures that user requirements are met, risks are minimized, and the final
system aligns with the strategic goals of the organization.

(d)
• Common challenges include insufficient requirements analysis, resistance from
users, integration with legacy systems, budget constraints, and project delays.
• Overcoming these requires robust planning, user involvement, and agile
methodologies that allow for iterative improvement.

Q3.
(a)
• Data are raw, unprocessed facts (e.g., numbers, text).
• Information is data that have been processed and organized in context, making them
meaningful.
• Knowledge is the understanding and insights derived from information through
analysis and experience.

(b)
• Information is valuable when it is accurate, complete, timely, and relevant.
• These characteristics ensure that decision-makers can rely on the information to
drive effective strategies and operational improvements.

(c)
• Effective information structuring organizes data into formats that are easily
accessible and interpretable.
• This enhances decision-making by enabling quick retrieval of relevant information
and by supporting analytical processes that lead to informed strategies.

(d)
• Information systems convert raw data into strategic insights through systematic
processes: capturing input, processing data, storing information, and producing
outputs such as reports and dashboards.
• These outputs help decision-makers identify trends, forecast outcomes, and devise
competitive strategies.

Q4.
(a)
• Workflow analysis is the systematic study of the sequence of tasks and processes
within an organization.
• Its importance lies in identifying inefficiencies, redundancies, and bottlenecks so
that processes can be optimized for better productivity and lower costs.

(b)
• The key steps include:
1. Documenting the current workflow.
2. Analyzing process steps and performance metrics.
3. Identifying bottlenecks or redundant activities.
4. Proposing redesigns or automation to streamline the process.

(c)
• Ethical, legal, and social issues in IS encompass concerns such as data privacy,
intellectual property rights, and accountability.
• For example, protecting personal data is essential for privacy, while clear policies on
intellectual property ensure that creative works are legally safeguarded.

(d)
• Workflow automation can improve consistency, speed, and efficiency.
• However, it may also reduce human oversight, create issues of accountability, and
lead to job displacement.
• Balancing these effects requires measures that safeguard ethical standards while
harnessing the benefits of automation.

Q5.
(a)
• Strategic information systems are designed to support and shape an organization’s
competitive strategy.
• They provide unique capabilities that allow an organization to differentiate itself
from competitors and to respond swiftly to market changes.

(b)
• Michael Porter’s Value Chain outlines the primary and support activities that add
value to a product or service.
• Strategic IS enhances these activities by streamlining operations, reducing costs, and
fostering innovation at every step of the value chain.

(c)
• By integrating technology into core business activities, strategic IS can transform
traditional business models.
• For example, digital platforms may enable real-time customer engagement,
personalized services, or entirely new revenue streams.

(d)
• Aligning IS with organizational strategy can be challenging due to issues such as
miscommunication, resistance to change, and integration with existing systems.
• Overcoming these challenges requires a clear strategic vision, continuous evaluation,
and adaptive change management processes.

Q6.
(a)
• The key principles of IS security include:
– Confidentiality: Ensuring that information is accessible only to authorized users.
– Integrity: Maintaining the accuracy and consistency of data.
– Availability: Guaranteeing that information is accessible when needed.
• These principles are supported by controls such as access management and audit
trails.

(b)
• Common security threats include malware, phishing, unauthorized access, and data
breaches.
• Control measures to counter these threats include firewalls, encryption, multi-factor
authentication, and regular security audits.

(c)
• Support systems provide ongoing maintenance, troubleshooting, and user support.
• They ensure that IS remain reliable, updated, and capable of recovering quickly
from failures, thereby safeguarding system integrity.

(d)
• There is often a trade-off between rigorous security protocols and ease of use.
• While strict measures protect sensitive information, they may also impede system
usability.
• The ideal balance is achieved by designing security solutions that protect data while
remaining as unobtrusive as possible for the end user.

You might also like