Advantages: Assignment No 1
Advantages: Assignment No 1
BBA919047
BIS ASSIGNMENT
ASSIGNMENT NO 1
Creation of new types of jobs – one of the best advantages of information systems
is the creation of new and interesting jobs. Computer programmers, Systems
analyzers, Hardware and Software developers and Web designers are just some of
the many new employment opportunities created with the help of IT.
Disadvantages
Unemployment and lack of job security – implementing the information systems
can save a great deal of time during the completion of tasks and some labor
mechanic works. Most paperwork’s can be processed immediately, financial
transactions are automatically calculated, etc. As technology improves, tasks that
were formerly performed by human employees are now carried out by computer
systems. For example, automated telephone answering systems have replaced live
receptionists in many organizations or online and personal assistants can be good
example also. Industry experts believe that the internet has made job security a big
issue as since technology keeps on changing with each day. This means that one
has to be in a constant learning mode, if he or she wishes for their job to be secure.
Dominant culture – while information technology may have made the world a global
village, it has also contributed to one culture dominating another weaker one. For
example it is now argued that US influences how most young teenagers all over the
world now act, dress and behave. Languages too have become overshadowed, with
English becoming the primary mode of communication for business and everything
else.
Security issues – thieves and hackers get access to identities and corporate
saboteurs target sensitive company data. Such data can include vendor information,
bank records, intellectual property and personal data on company management. The
hackers distribute the information over the Internet, sell it to rival companies or use it
to damage the company’s image. For example, several retail chains were targeted
recently by hackers who stole customer information from their information systems
and distributed Social Security numbers and credit card data over the Internet.
o Design components
o GUI design