Professional Documents
Culture Documents
Table of Contents
Introduction......................................................................................................................................3
1. Background..................................................................................................................................3
2. The Information Technology Infrastructure................................................................................5
3. Business Model Framework........................................................................................................7
4. Information Security....................................................................................................................9
Conclusion.......................................................................................................................................9
References......................................................................................................................................11
MANAGEMENT INFORMATION SYSTEMS
Introduction
Management information system is the study that helps to understand the technology
people and organisations as well as relationships among them. Management information
professionals help to get maximum benefit from investment in technology and business
processes where emphasis is provided on service through Technology (Abu Amuna, Al Shobaki,
& Abu-Naser, 2017). Management information system professionals disseminate the idea of
information and apply it to the operations of business in order to concentrate on the alignment of
information systems with business goals. The aim of this assignment is to establish Information
Technology infrastructure, the business model framework and information security for the
company Andryan IT Solutions, in order to develop the system of management information
technology used by the organisation and summarising the security techniques that is used by the
company to enhance its database and network.
1. Background
Andryan IT Solutions is a company that offers a platform for providing human capital
and resource planning solutions to organizations that need IT services. The company was
founded in 2007 as an integration champion that ERP and HCM in front of the world. It helps
companies transform the way they manage their operations and connect with the people. The
company develops ERP platforms backed by software development and on-demand IT support
services (Oracle Cloud Services | Andryan - Cloud Computing Service Provider in Dubai. 2021).
The company has an expertise and excellence of 60000 plus employees with 3 year average
customer relationship ranging from project size of $25000-3 million dollars. The company is
quite responsive to its requirements and it is made for the industries to develop management
information systems and enhancements required for off the shelf solutions. Andryan is now a
leading IT provider in various sectors such as airlines, actors as well as insurance and banking
sectors.
The Management Information systems used in Andryan IT solutions are as follows:
Human capital Management
MANAGEMENT INFORMATION SYSTEMS
operational user support and patching assistance to the companies that have faced issues in their
information systems.
uninterruptible power supply, wire to connect with external network, additional generator,
cooling system. Through containing all these physical components the hardware infrastructure
helps to maintain the data centre process (Muhammad, 2020). The company has implemented the
server infrastructure which helps to maintain the hold of all the systems together. Through the set
of hardware, software and networking resources it conducts the storage capacity, data flow,
processing and analysis by both the centralised and decentralised manner. Andryan adapts the
decentralized server in order to maintain the scattered design of the data centre by controlling it
with a cloud IT solution.
Software
For evolving the business orientation in the competitive edge Andryan has developed the
enterprise processes with integrating the custom software solution for helping the process to stay
ahead in line with this contemporary period. There are four different custom edge solutions
which have been added in the IT infrastructure of the organization like BeSpoke SaaS, Mobile
HR, and Workflow Management and Cloud integration.
● Through the help of integrating the Bespoke SaaS the company is able to build the brand
into the business experience by designing the functional requirements of additional fuss.
With the implementation of the bypass subscription model it intended the ownership
application (Oracle Cloud Services | Andryan - Cloud Computing Service Provider in
Dubai. 2021). Through the help of end-to-end encryption which enables to secure the
downloaded software, tracking facility, login integration and monitoring the data usage. It
also intended the customised or personalised secure customer touch points to maintain the
high end data security.
● With third party involvement of cloud based software the company can deliver the total
connectivity which prevents the issues regarding cutting the connection between cloud
and on-site application which is flexible, secure and always accessible (Kopanaki,
Karvela & Georgopoulos, 2018).
● It also generates the unique Mobile HR facility to evolve the integration by handling
personal admin. It helps to provide ongoing access to the employee for maintaining the
self-service application directly from the mobile handset.
MANAGEMENT INFORMATION SYSTEMS
● The workstream management incorporates the contemporary collaborative tool with the
integration of a tailored workflow management system by influencing the performance,
process and getting to know the real-time feedback (Koulouzis et al., 2020).
Operating systems
Through the help of operating the HCM and ERP software the operating system can be generated
in a centralised manner for consolidating the internal workflow as well as the communication in
a fast and flexible manner. Through the execution of the real-time analysis it can help to build
the assumptions regarding team performance as well as the different project cycle management
(Radkov, 2018). Their operating system, the improvisation of productivity and personalised tools
enhance the retention of role-specific knowledge and skills.
Effect of Database Models in the Business and the Impact of Using Different Database
Models
Database models are used in the business as an intuitive diagram in order to conduct data
processes and visibility to Data architecture. Data models help to reduce complexities in the
business activities as well as provide low risk of taming the data (Ruas & Lagrange, 2020). Data
modelling helps to articulate the business and its process as well as define the data to get insights
on the use of transformations for the business. Data modelling helps to improve collaborations
with the IT team as well as with the non-technical staff such that they can communicate in a
technology neutral manner and integrate high level business activities to data structures and rules
for the technical implementation and use of data. Data modelling is an effective part of data
strategy and achieving benefits of data implementation in order to understand the terminologies
of the organisation and identify the data requirements of the business (Clover Dx, 2021).
The different database models such as the Network models and Relational models are
used by the businesses in order to form a flexible way of representing objects and their
relationships. It helps to distinguish the features of the different types of relationships between
the data and approach to manage the data in a structured way such that the data can be grouped
and constructed to reflect the organisation's management system (Host, Jaksic & Poščić, 2018).
The physical data models can be implemented as a logical model which will help the data
software to establish control in the physical implementation of different softwares and monitor
MANAGEMENT INFORMATION SYSTEMS
their performance and progress. A flat database model can also be used by the business which
consists of a single two dimensional array of data elements in order to present similar values for
all members in a row and are related to one another (Ruas & Lagrange, 2020). These models
help to provide the timings and types of integration required in the different areas of
management as well as relate them to the hierarchy of the enterprise.
Devices used in the Company for networking and Communications
The computer networks that are used for managing the information systems at Andryan IT
systems are using data links in wireless media that helps to provide data access for its complex
data operations. These are identified as follows:
LANS
Local area network (LAN) the network that connects the devices and computers within a
geographical area such as school officer's buildings and are positioned within a group of
buildings for interconnected use of data. Each device or computer works on a node. wired LANs
are most likely based on Ethernet Technology (Host, Jaksic & Poščić, 2018). It is good for
transferring data files within a limited geographic range and provides connectivity at a faster rate
of 100Gbit/s. It is another component known as the WAN is essential for a larger space and LAN
can be connected to WAN using a router.
Intranets
Internet is a computer network that is helpful for sharing information tools of
collaboration and developing operational systems by using computer services in the organisation.
Intranets are not used by the external environment and are important focal points of internal
control (Siyavula, 2021). The Intranet is restricted for use only within the management and the
employees and who uses modern technology such as LAN. Intranets are used to delivered
projects as well as enhanced customer relationship management and can be used by the
employees to discuss key issues within the organisation's own platform
WiFi Access Points
Wi-Fi access points are used as compatible devices that can help to gain wireless data
connection to the organisation in a specific environment. An access point can be connected to a
wired router via a switch or a cable where the Wi-Fi provides a signal to a designated area
(Siyavula, 2021). Organisations use Wi-Fi access points in order to attain data and is a most
MANAGEMENT INFORMATION SYSTEMS
common form of wireless network technology to gain internet access and can be connected to
non-wired devices effectively.
4. Information Security
Network security is an important function in an IT company as it protects data from theft in
breaches as well as intrusions from third parties. Network security is important as it helps to
know the software solutions as well as the configurations required to conduct threat protection of
the devices and data (McLaughlin & Gogan, 2018). Network security involves access control
virus and antivirus software’s that are used by the business in order to create restrictions on data
security and ensure that reliable access and network performance is achieved. The types of
network security that are used by Andryan IT solutions are:
Firewall: Firewalls help to control the outgoing and incoming traffic on the network by
setting predetermined rules of security (Namasudra, 2019). It helps to keep the unfriendly
traffic out of the devices as an essential part of daily computing. Most companies rely
heavily on fireballs in order to block Malware and attacks on the application.
Network segmentation: network segmentation helps to define the boundaries between
the different segments of the network and grouping within the functions in order to
reduce the risks in the date of functioning (Ruas, & Lagrange, 2020). It helps the
company to know the potential threats from different external networks and prevents it by
ensuring the sensitive data remains within the restrictions of the organisation
Remote access VPN: a remote access VPN provides security of access to the company to
a number of clients or hosts such as mobile users, telecommuters or external consumers.
Each host can typically get a VPN client software loaded where the privacy and integrity
of sensitive information can be ensured through authentication and encryption of the
transmitted data (Walko, Olney & Hunt, 2020).
Intrusion prevention systems: intrusion prevention systems can help detect or prevent
the network attacks such as denial of service attacks or brute force attacks also known as
vulnerabilities. Security patch is applied in order to prevent such vulnerability and block
The attacks through intrusion prevention system (Namasudra, 2019)
MANAGEMENT INFORMATION SYSTEMS
Conclusion
Management information systems require security integrity and authority to the data that
is used by the businesses in order to enhance their operations and create the best model for use
that can differentiate them from the services provided by other IT companies. Hence, Andryan IT
solutions aims to develop infrastructure for a diverse range of activities and options that are
available to the clients in order to enhance the business processes with the use of different
database models and systems used by Andryan IT solutions.
MANAGEMENT INFORMATION SYSTEMS
References
Abu Amuna, Y. M., Al Shobaki, M. J., & Abu-Naser, S. S. (2017). The Role of Knowledge-
Based Computerized Management Information Systems in the Administrative Decision-
Making Process. http://dstore.alazhar.edu.ps/xmlui/handle/123456789/443
Bhasin, H. (2019). 12 Different Types Of Management Information Systems. Retrieved 9 July
2021, from https://www.marketing91.com/types-of-management-information-system/
Cloud Oracle in Dubai - Andryan . (2021). Oracle Fusion Cloud Packages | . Retrieved 9 July
2021, from https://andryan.com/always_on_it
Clover Dx, (2021). What Is Data Modeling (And Why Is It Essential)?. (2021). Retrieved 9 July
2021, from https://www.cloverdx.com/blog/what-is-data-modelling-and-why-is-it-
essential
Host, K., Jaksic, D., & Poščić, P. (2018, May). Overview and comparison of the selected
relational data modelling tools. In 2018 41st International Convention on Information
and Communication Technology, Electronics and Microelectronics (MIPRO) (pp. 1592-
1597). IEEE. https://ieeexplore.ieee.org/abstract/document/8400286/
Kopanaki, E., Karvela, P., & Georgopoulos, N. (2018). From traditional interorganisational
systems to cloud-based solutions: The impact on supply chain flexibility. Journal of
Organizational Computing and Electronic Commerce, 28(4), 334-353.
Koulouzis, S., Martin, P., Zhou, H., Hu, Y., Wang, J., Carval, T., ... & Zhao, Z. (2020). Time‐
critical data management in clouds: Challenges and a Dynamic Real‐Time Infrastructure
Planner (DRIP) solution. Concurrency and Computation: Practice and Experience,
32(16), e5269.
McLaughlin, M. D., & Gogan, J. (2018). Challenges and best practices in information security
management. MIS Quarterly Executive, 17(3), 12.
https://aisel.aisnet.org/cgi/viewcontent.cgi?
filename=0&article=1415&context=misqe&type=additional
Muhammad, A. L. S. (2020). Cloud Computing Enabled Data Center Infrastructure Development
and Deployment by IT Firms. International Journal of Computing and Digital Systems,
9(1).
MANAGEMENT INFORMATION SYSTEMS