You are on page 1of 6

WEEKEND SCHOOL: HARARE COHORT

PROGRAMME : MASTER OF COMMERCE DEGREE IN

STRATEGIC MANAGEMENT (1.1)

MODULE : MSM611 STRATEGIC INFORMATION MANAGEMENT


: AND E-BUSINESS

LECTURER : DR JILSON ZIMUTO

NAME : BRENDA CHATENDEUKA M188318

MARK : ………………………………………………………………….

COMMENT……………………………………………………………………………………

1
1. VRIO and information systems software
According to (Barney & Clark, 2007) The VRIO analytical framework for describing a
company's fundamental resources is a model that examines a company's inner workings from
a resource-based standpoint. Furthermore, in order to create economic value, it is considered
that the organization has a competitive advantage over other businesses. Value, Rareness,
Inimitability, and Organization (VRIO) are the attributes of the four resources that have the
most significant influence on connecting in a competitive advantage. In the context of
information systems, (Barney, 1991) claims that the type of information system determines
whether or not it has the capacity to provide a persistent competitive advantage. He comes to
the conclusion that an information system deeply implanted in an organization's decision-
making processes is likely to be rare, socially complicated, and thus imperfectly imitable.
Among the resources and characteristics of information systems, such as capital
requirements, proprietary technology, technical IT skills, and managerial IT skills, it is the
management capability that determines whether an information system enables the
organization to gain a sustained competitive advantage. (Muhic & Wintzler, 2011)
2. ills associated with using a computer as an object of a crime.
They are crimes committed against a computer system (computer crime), Cybercrime
includes both computer-related crimes and crimes involving the unauthorized use of the
Internet (net crime) (Nikoloska & Gjosheva, n.d.). There are also property computer crimes
such as damage and unlawful access to a computer system, computer fraud, computer viruses,
and so on. Wiretapping, cyber terrorism, cyber sabotage, cyber espionage, cyber vandalism,
unauthorized intrusion, or hacking) are all examples of violent computer crimes. (Nikoloska
& Gjosheva, n.d.)
3. Needs for a new information system
Information needs arise from a lack of self-sufficiency in day-to-day employment. These
information requirements describe gaps in the user's current knowledge. Aside from the
acknowledged or articulated wants, the user may have unexpressed needs that he or she
is aware of but prefers not to express. The delitescent or latent need, which the user is
ignorant of, is the third type of need. However, the provider of information services may
be able to bring these requirements to light A requirement is explicit and, in most cases,
time-bound, either immediate or delayed. Information supplied in response to a need will
be used. The information given may or may not be used in the event of a conflict of

2
interest. Crawford claims that information requirements are influenced by a variety of
factors.
4. Data warehouse
William Inmon created the phrase "data warehouse" in 1990 to describe a central data
repository where data from operational databases and other sources is combined, cleansed,
and stored to aid decision-making. A data warehouse allows managers to easily access
enormous amounts of internal and external data. Most medium to large businesses uses data
warehouses because of the potential benefits. Therefore, having a data warehouse is essential
regardless of the business domain or company size. Later on, it can be used to analyze,
condense, and detail data, with the outcomes being presented in the form of reports, charts,
and other visual aids. Additionally, they might be applied to direct the strategic course of the
company. (Nizzad & Irshad, 2021)

5. Propinquity theory.
According to the propinquity theory, people associate with one another because of their
close physical or geographic closeness. As a result, in an organizational setting, people who
work together tend to establish groups more easily than people who operate relatively far
apart. This idea seems to explain how groups form depending on proximity. It does not,
however, take into account more significant and intricate group formation concerns. Being
close by does not cause groups to develop; it merely facilitates it. Employees who work in
the same part of the factory or office, or supervisors with offices near each other, are more
likely to establish groups in an organization than those who are not physically placed
together. (Anon., n.d.)

6. Information as a tool to commit a crime.


Most countries' banking systems currently give sufficient options for online financial
resources. The most widely used online banking services are 'Customer – Internet – Bank'
and 'Telephone Banking.' Inadequate protection of banking information is a major contributor
to the financial system's vulnerability to cybercrime. Cybercriminals are targeting mobile
device flaws as well, and the threats are expanding quicker than they are on desktop
computers (Aravazhi, 2020)Financial institutions are becoming increasingly vulnerable to
phishing, identity theft, card skimming, visiting, SMS sending, viruses, and Trojans, malware

3
and adware, social engineering website cloning, and cyber stalking as a result of the new
technology they have implemented (Aravazhi, 2020).
7. information Systems security
Information and information systems must be safeguarded against unauthorized access to or
modification of data while it is being stored, processed, or transmitted, as well as denial of
service to authorized users. In terms of security, most financial services are at significant risk
of attacks they, however, need a strong information security system. Information security
refers to the strategies used to detect, document, and mitigate such threats. Safeguarding and
monitoring wireless access points, network access points, and network-attached. Trojan Scan
Apps should only be used to install genuine programs.  To protect yourself from exploitation:
Antispyware solutions that detect spyware, adware, and bots (software robots) should be used
to scan for these dangerous programs regularly. Annual security awareness training for
employees, which includes a warning about downloading software packages from the Internet
without first getting permission from the proper agency. (Aravazhi, 2020)
8. Model-driven decisions
Model-Driven Decision Support Systems focus on the access and manipulation of a
statistical, financial, optimization, or simulation model, which is required by the majority of
banking industries to make decisions. Model-Driven DSS relies on data and parameters
supplied by decision-makers to aid in scenario evaluation; however, they are not always data-
intensive, and many Model-Driven DSS does not require vast databases. ( Power, 2000)
9. Relationship Management software
(customer relationship management software) is a tool that helps your company provide a
unique and seamless experience for its customers while also building stronger relationships
by providing a complete picture of all customer interactions, tracking sales, organizing and
prioritizing opportunities, and facilitating collaboration among various teams.

10. Agility
Agility is a business-wide capability that embraces organizational structures, information
systems, and in particular, the minds sets (Christopher, 2000). Agility means using market
knowledge and virtual corporation to exploit profitable opportunities in a volatile
marketplace (Mason & Towill, 1999)

4
References
Power, D. . J., 2000. Web-based and model-driven decision support systems: concepts and
issues. Web-based and model-driven decision support systems.

Anon., n.d. 4-important-theories-of-group-formation-with-diagram. [Online]


Available at: www.yourarticlelibrary.com
[Accessed 20 6 2022].

Anon., n.d. management propinquity_theory. [Online]


Available at: https://ebrary.net/2818/management/propinquity_theory
[Accessed 22 06 2022].

Aravazhi, D., 2020. EPRA International Journal of Research and Development.


UNDERSTANDING CYBER CRIME AND CYBER LAUNDERING THREAT AND SOLUTION, 5(1).

aurav Verma, K. S. b., 2017. journal of Humanities Insights. The Role of Quantitative
Techniques in Business and Management, pp. 24-26.

Barney, J., 1991. Firm Resources and Sustained Competitive Advantage. Journal of
Management, Vol. 17(No. 1), pp. pp. 99-120..

Christopher, M., 2000. The Agile Supply Chain. Industrial Marketing Management, pp. 37-
44.

Mason, J. & Towill, 1999. Improving electronics manufacturing supply chain agility through
outsourcing. International Journal of Physical Distribution and Logistics Management, p.
610−620.

Muhic, M. & Wintzler, C. S., 2011. Examining Sourcing Motives in the Financial Sector from
the Resource Based View. Sourcing Strategies in Information Systems Development.

Nikoloska, s. & Gjosheva, m., n.d. CRIMINAL INVESTIGATION OF CYBER CRIME. Ministry of
Interior of the Republic of N.Macedonia Sector for Cybercrime and Digital Forensics, Skopje.

5
Nizzad , M. A. R. & Irshad, . M. M. B., 2021. Data Warehouse Implementation: Cost Effective
Approach for Small Businesses. Journal of Information Systems & Information Technology,
Vol. 6(No.2,), pp. 62-67.

You might also like