In the world of information technology, dumpster diving is a technique which is used to retrieve information that could be used to carry out a fraudulent activity. Many people throw away their sensitive documents that contain their personal information without destroying them properly that a fraudster can find in trash cans and as a result use this information to commit a fraud. Dumpster diving is not too meant to probing through the trash for noticeable resources like identity numbers or passwords written down on papers. Apparently useless information like a phone list, calendar, or organizational chart can be used to obtain valuable information. Shopping, can easily memorize your details including name, address and the last three numbers of your credit card during the short time it takes you to write a check. Dumpster Diving in Process There is another type of computer-related “trash” that we might not consider. In the Continue reading
Information Systems Management
Case Study: Credit Card Attitudes and Behaviors of College Students
Credit cards have been very big business for several decades. The cards have made the life easier for many people because they do not need to carry large amount of cash for most purchases. However, the credit card industry is intensely competitive, highly fragmented, and growing at the rate of 3 to 4 percent. Many college students are living on the verge of a financial crisis. For this purpose many banks are interested to consider this assertion by examining college students’ credit card use behavior and attitudes. A concurrent purpose was to test the factors associated with students’ attitude toward credit cards. College students’ use of credit cards has recently received increased visibility throughout the media concluded that in addition to credit problems many students do not have a written budget, and of those who do have a budget few young people actually use it. They determined that university students Continue reading
Network Topology and Types of Network Topologies
A network topology refers to the layout of the computers and devices in a communications network. Network topologies also may be physical or logical. Physical topology means the physical design of a network including design of a network including the devices, location and cable installation. Logical topology refers to how data is actually transferred in a network as opposed to its physical design. Now lets see in detail diffrent types network topologies. Types of Network Topologies The term Topology refers to a connected layout of devices shared in a network. Now we shall go ahead in the discussion of the standard Topologies from the computer networking. An imagination of the shape of the network or the structure of virtual architecture is considered to be the topology. The structure or the shape is not mandatory to implement the exact physical layout of the present devices in the network. For instance the Continue reading
Transaction Process System – Activities, Objectives and Characteristics
Transaction processing system (TPS), an information system (IS) mostly used by managers in operational management to record internal transactions, economic events that occur within an organization and external transactions where the business event took place outside the organization to make operational decision. TPS supports different tasks by setting a set of rules and guidelines that specify the ways to capture or collect, process and store any transaction in a form of data or information. Transaction Process System Activities Processing business transactions was the first application of computer of most firms. Since the 1950s, Transaction processing system (TPS) have evolved from slow, manual systems to advanced computerized system. TPS, a cross-functional information system were among the earliest computerized systems developed to record, process, validate, and store business for future use or retrieval. Transactions are the economic events or exchange between two or more business entities. Basically, TPS is an organized collection Continue reading
Disaster Recovery Plan (DRP) in Business
Fire, flood, earthquake and accidental deletion of data are all acts that can cause disastrous consequences on data. Such disasters can prevent the network from operating normally, which in turn can hamper the organization’s business. These disasters can be classified into man-made disasters and environmental disasters. Man-made disasters are intentionally or unintentionally caused by humans. For example, a user accidentally deletes the data, virus and malicious programs can damage data and various other events can cause data loss and downtime. Environmental disasters are non-preventive but can be reduced if appropriate precautions are taken. Environmental disasters include fire, flood, earthquake, tornado and hurricane. Disaster recovery deals with recovery of data that is damaged due to destructive activities. The time required to recover from a disaster depends on the disaster recovery plan implemented by the organization. A good disaster recovery plan can prevent an organization from any type of disruption. Disaster Recovery Continue reading
Information Systems in Various Levels of Modern Organizations
The INFORMATION SYSTEM plays a major role in the organization by satisfying the diverse needs through a variety of systems such as Query systems, Analysis systems, Modeling systems and Decision support systems. It helps the Clerical personnel in transaction processing and answers their queries on data pertaining to transaction. It helps junior management by providing operational data for planning and control, and helps them in Decision-making. It helps the Middle management in short-term planning, target setting and controlling business functions. It helps Top management in goal setting, planning and evolving business plans and their implementation. OPERATIONAL-LEVEL SYSTEMS At the operational level are transactions processing systems through which products are designed, marketed, produced, and delivered. These systems accumulate information in databases that form the foundation for higher-level systems. In today’s leading organizations, the information systems that support various functional units-marketing, finance, production, and human resources-are integrated into what is known as Continue reading