Reflect On Your Experiences Using This Information System, Positive And/Or Negative, In Terms Of Each Of These Factors
Analyse This Information System Using The Five-Component Framework.
The information system states to the collection of the several parts of the components, which are involved in the information dissemination. Users of information system, hardware and software, information and system connections are all the parts of the information system. Information system refers to the fundamental computer system. Information system contains the properties for the managed or common information and the people who handle the system (Stair & Reynolds, 2015). While information systems made more complex human behaviors, they had a profound impact on society. Such programs increased the speed of everyday tasks, allowed individuals to establish and sustain new and much more fulfilling interactions, affected corporate composition and balance, modified the type of goods they bought and impacted the quality of the job (Laudon & Laudon, 2015). This report will discuss on a particular information system and how the system works in the business. This report also discusses about the five component framework of the information system, which will provide a wide knowledge about the IS.
For this study, the chosen information system is E-business system used by Amazon. E-business systems are the collection of internet software, facilities and tools which an organization uses for performing business over the Internet. The systems allow the organization for communicating with customers, processing orders and managing the details (Yeh, Lee & Pai, 2015). For example, one e-business network is the web-based retail stock where consumers can order goods online. There is more of the e-business system than simply an internet website and intangible web accounts. Tangible equipment is often required to access and use the network. Many critical e-business tools that include laptops, broadband modems, broadband routers, dedicated servers including Ethernet wiring if the organizations want to set up an electronic intranet network through which employees connect privately with each other (Frank et al., 2014). Besides physical hardware, for the establishment of a qualified e-business program, the organizations can do require servers, internet security as well as shopping cart applications.
Online company such as Amazon operates in almost the same way that an offline or retail shop does (Adaji & Vassileva, 2017). The entire e-commerce cycle of Amazon can be divided into three major components or the work processes on a larger scale:
Receiving orders:This is the first phase where buyers put the order through the Amazon website, and the retailer takes note of this. The web server of Amazon sends the order to the order manager on the web server (Nof et al., 2015). It is also the central system, which sees instructions from submission to dispatch at any stage of the process. In this stage, the customers get two options for paying the amount online or cash on delivery. They can choose any one option as their preference. If any customer pays online for their products, then the order manager ensures the successful execution of the transaction operation, and notifies the online database.
Processing the order information:After receiving the orders from the customers, in this stage, the staffs processes and completes all the order data. The stock database specifies whether the item is available or not then indicates an approximate arrival date to the customer which will be provided from the distributor if it receives (Davis & Comeau, 2020). After completing all the procedures of the order, the product will be set for distribution.
Shipping:The final step in which the distribution process takes place. In this phase, all the logistics elements play an important role in ensuring the timely delivery to the client (Cassidy, 2016). When the products are shipped, the customer receives email from the warehouse system to check that her order is on its way.
The Unified Theory of Acceptance and Use of Technology is one of the most popular theories that attempts to understand why some technologies are embraced more widely than others (Venkatesh et al., 2003). This describes four key reasons that affect the degree to which a given technology is being used by people:
Performance Expectation: It focuses on the task achievement, are likely for being mainly prominent to the men. From the performance expectation, I effectively increased my efficiency on the job. In this, I have spent less time on the routine task of the job. This helped me increasing the quality of outcomes of the job. I became able in increasing the quantity of the outcomes for the same quantity of the effort that I have put to my job. My coworkers have perceived me as the competent in the performance. I became able in increasing my chances of achieving the promotion. This helped me in increasing my chances of getting the effective raise.
Effort Expectancy: This is described as the point of the ease connected with using the program. Three structures from the current models capture the idea of planned commitment. It was easy for me to know how to run the system. I have found it easy for getting the machine to do what I want them to do. It was transparent and intuitive how I communicated with the device. I have found that the device would communicate flexibly. Using the system requires too much time running practical operations, which takes much time to understand how to use the device and make the effort worthwhile. My connection with the system was comprehensible and simple. Overall I think the system was easy to use.
Social Influence: In this aspect, any person should use the new program is known as the social influence. Because of the percentage of colleagues use the system, I have chosen this system. This senior management of the business has been very supportive in making use of the program. My supervisor was very helpful of my work using the system. The agency has traditionally endorsed the effective use of the system. Those who utilize the system in my company have more credibility than people who do not use the system. There are a high number of individuals in my organization who use the system. In my perception, using the system in my company is the status symbol.
Facilitation conditions: Facilitation conditions are characterized as the point to which any person feels there is an operational and technological framework to facilitate program use. I have the control over the use of the system or the program. I have the requisite tools to make use of the program. I have the requisite know-how to use the program. It was convenient for me for using the system despite the tools, incentives and skills it takes for using the system. The system cannot be consistent with other systems which I have used. Guidance on device design was open to me. I was given detailed guidance on the program.
Information systems are composed of numerous elements which work together for providing the value to any organization. The three components software, hardware including data which fall within the group of the technology, are usually what most of the people talk about when asked for defining the information systems. However, the two components, process and people are actually what distinguishes the concept of information management from more scientific areas like informatics. The people or the users must consider how all of these elements function together to add meaning to an enterprise in order to better appreciate the information systems. Followings are the five component framework of the Information system, which makes the system work effectively.
Hardware is the vital aspect of the information system that can handle the physical parts of the technology. Personal computers, smart phones, keyboards, disk drives and flash drives are also types of hardware for the information systems (Davis & Yen, 2019). With the rise of the IoT.
It is a series of commands, which guide the hardware how to function or work. It is not tangible. When the programmers build the software programs, all they do is actually type out the instruction lists commanding the hardware how to work with the system. There are many software types, with operating-system software, which are being the two key types that makes the hardware accessible, and computer software that makes the software useful (Kaur & Singh, 2014). The hardware components were managed and organized by the programs or the application system. This is used for data collection and retrieval. Those systems contain a series of guidelines for the information processing. Examples of the operating systems can be included on the personal computer Microsoft Windows as well as on the smart phone Google's Android. Adobe Photoshop and Microsoft Excel are two examples of computer software.
While talking about the information systems, this is easy to rely on the elements of the technology and forget that the users need to look past these devices in order to better appreciate how they fit within an organization (Díaz et al., 2015). The next move is to concentrate on the stakeholders concerned in the information infrastructure. From the help desk staff, to network administrators, to engineers, all the way to the CIO, the employees working with the information technology are an important factor that cannot be ignored.
This is the final aspect of the information systems. A method is a sequence of actions taken toward reaching a desired result or outcomes. The information systems are being increasingly interconnected with corporate processes, adding greater flexibility to those processes and improved control (Greiner, 2015). However, this is not enough merely to simplify operations using technologies, companies trying to use information systems successfully do more. The main aim is to use automation to control and enhance operations, both within an organization and with vendors as well as customers externally. People who are expected for operating the process and the programs they follow so that information in the vast data centers may be converted into consideration, which can translate what happens in the future or past actions.
The third element of the information system relates to data. The users should think about details as the information collection. Th address, the city the users live in and the phone number of the users are all sets of information. A database server holds all the data for the entity (Xu et al., 2014). With the emergence of the big data, the term for the genuinely vast amounts of the data, which can be processed and analyzed, data bases as well as data centers have taken even greater significance in the information systems. As with tech, data becomes intangible as well. The sets of data are not even that useful by themselves. But grouped, categorized, and put together into the database, data will transform into a valuable business resource. Organizations accumulate and use evidence of all sorts for making decisions. Such actions will then be evaluated as to their efficacy, so they can strengthen the organization.
Conclusion
This is necessary to remember that the tools of completing the cycle are information systems and information management. These are the important instruments in management's hand that can create major improvement in the way any organization works and achieves its targets when applied properly. Effective usage of the information systems help both the organization, its personnel and its stakeholders. Moreover, they will lose enormous amount of energy, effort and resources when misapplied. For accomplishing the effective information management as well as minimize potential risks of failure, the information system should be prearranged and run with due respect for the corporate culture and the technical considerations. Both the company management and the technology experts will make the equal commitment when planning and introducing the advance information system.
References
Adaji, I., & Vassileva, J. (2017, April). Perceived effectiveness, credibility and continuance intention in e-commerce: a study of Amazon. In International Conference on Persuasive Technology (pp. 293-306). Springer, Cham.
Cassidy, A. (2016). A practical guide to planning for E-business success: how to E-enable your enterprise. CRC Press.
Davis, C. H., & Comeau, J. (2020). Enterprise integration in business education: Design and outcomes of a capstone ERP-based undergraduate e-business management course. Journal of Information Systems Education, 15(3), 8.
Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant's handbook: Systems analysis and design. CRC press.
Díaz, S., Demissew, S., Carabias, J., Joly, C., Lonsdale, M., Ash, N., ... & Bartuska, A. (2015). The IPBES Conceptual Framework—connecting nature and people. Current Opinion in Environmental Sustainability, 14, 1-16.
Frank, U., Strecker, S., Fettke, P., Vom Brocke, J., Becker, J., & Sinz, E. (2014). The research field “modeling business information systems”. Business & Information Systems Engineering, 6(1), 39-43.
Greiner, B. (2015). Subject pool recruitment procedures: organizing experiments with ORSEE. Journal of the Economic Science Association, 1(1), 114-125.
Kaur, L., & Singh, D. H. (2014). Software Component Selection techniques-A review. International Journal of Computer Science and Information Technologies, 5(3), 2.
Laudon, K. C., & Laudon, J. P. (2015). Management information systems (p. 143). Upper Saddle River: Pearson.
Lytvyn, V., Vysotska, V., Chyrun, L., Hrendus, M., & Naum, O. (2018). Content analysis of Text-based information in E-commerce systems. Computational linguistics and intelligent systems (2), 2018, 81-94.
Nof, S. Y., Ceroni, J., Jeong, W., & Moghaddam, M. (2015). Revolutionizing Collaboration through e-Work, e-Business, and e-Service (Vol. 2). Springer.
Stair, R., & Reynolds, G. (2015). Principles of information systems. Cengage Learning.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS quarterly, 425-478.
Xu, B., Da Xu, L., Cai, H., Xie, C., Hu, J., & Bu, F. (2014). Ubiquitous data accessing method in IoT-based information system for emergency medical services. IEEE Transactions on Industrial informatics, 10(2), 1578-1586.
Yeh, C. H., Lee, G. G., & Pai, J. C. (2015). Using a technology-organization-environment framework to investigate the factors influencing e-business information technology capabilities. Information Development, 31(5), 435-450.