Case Study On Business Processes Questions

Published: 2021-06-18 05:50:07
essay essay

Category: Business, Business, Company, Information, Internet

Type of paper: Essay

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Hey! We can write a custom essay for you.

All possible types of assignments. Written by academics

Question 1

Business processes are the set of interrelated tasks that comprise the development of an organization’s behavior in the attainment of business objectives. It is also related to the organization and coordination of business activities that are aimed at achieving set objectives. Business processes may comprise the creation and development of a new product in the market. Business processes may also involve processes that involve the development of a precise market plan. The manner of implementation of an organization’s business processes can be instrumental in the success of a business.

Business processes may require a means for the specific goals to be actualized. This is the relationship between business processes and management information systems. In today’s technological world, it becomes necessary for firms to incorporate management information systems in the daily running of the organization’s business operations. The firm’s ability to use information systems to their benefit is crucial in their ability of the firm to implement the corporate’s set objectives.

Question 2

Discuss the pros and cons of allowing companies to amass personal data for behavioral targeting

Behavioral tracking is based on a client’s search engine. This means that ads can be displayed to the client or web user based on previous website visits. Consequently, the advertisements are tailored to the client’s area of interest. These are used by web trackers such as Google. However, it may be at the user’s discretion to have such information availed to them.

There are several advantages of having personal data being used to run advertisements. These advertisements are likely to attract more clients from online users or visitors of websites. This means they are an efficient means of advertising. Online tracking facilitates the efficient of online advertisements for various websites. However, one of the disadvantages that may arise is irritation of clients or a feeling that their space is being crumpled. These advertisements are also linked to insecurities that may arise from hacking and phishing. Internet profiles ought to be private, and these advertisements are based on the publicizing of users’ online identities. This has especially been hindered by recently set legislation, which has taken into consideration the various security concerns related to exposure of personal data as regards to information advertising.

Question 3

Cloud computing is a new technological advancement that involves virtual saving of data as opposed to saving data on hard drives. This is accompanied by maximum data security from unexpected losses. This is especially crucial for firms whose operations are highly dependent on the existence and availability of customer data. There is also increased security use to the independence from hardware and infrastructure. This means that there are reduced redundancies that normally accrue or arise from the existence and dependence on such previous hardware. Cloud computing ensures perpetuity in business operations, especially during peak periods. This means that problems associated with unavailability during peak periods are seldom.

Cloud computing has similar disadvantages as any internet services. It may be prone to threats of viruses and other dangerous malware that may damage important information. Users of cloud computing are also nervous about sharing their information with third parties. This is especially risky due to the competitive nature of the free markets that exist today. This is why some firms do not prefer to share sensitive information on the cloud. Information on a server can be hacked by unauthorized persons, even with all the passwords and data encryption techniques.

Question 4

Selection of computer software is a crucial element in management since this is one of the pillars to efficient management information systems. Hardware must be selected to be compatible to the selected hardware. This is especially crucial since it is a core element if the hardware and software are to achieve uninterrupted running of the firm’s operations. Furthermore, selection of poor alternatives could result in frequent redundancies in the operations of the firm. This could result in losses in terms of time and other business resources.

When selecting hardware and software, the management should consider the available technologies that could be most suited to the needs of the organization. This would help the organization from efficient technologies that have surfaced. Consequently, the firm will operate more effectively and even at cheaply. The cost of the hardware and software, vis-à-vis the funds available, should be another factor that should be taken into consideration. This would ensure the firm operates within its resource limits hence avoiding cases of bankruptcy. Compatibility with existing systems is another factor that should be taken into consideration to ensure smooth running of operations and reduced redundancies.

Question 5

The internet is a web of networks that facilitate access to numerous information that is availed by various users and web developers. This is especially important when it comes to research and communication between various people. The internet has facilitated the creation of virtual databases that are online as opposed to physical database server systems. The advent of social websites and email services allows individuals and business to exchange and share information. This has facilitated online marketing, and hence increased sales for numerous businesses.


Escalante, A. (2010). Handbook of cloud computing. New York: Springer.
Furht, B., & Escalante, A. (2010). Handbook of cloud computing. New York: Springer.
Graves, M. (2008). Computer technology encyclopedia: Quick reference for students and professionals. Clifton Park, N.Y: Cengage Delmar Learning.
Jamsa, K. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning.
Laudon, K. C., & Laudon, J. P. (2012). Management information systems: managing the digital firm (12th Ed.). Boston: Pearson

Warning! This essay is not original. Get 100% unique essay within 45 seconds!


We can write your paper just for 11.99$

i want to copy...

This essay has been submitted by a student and contain not unique content

People also read