Introduction
A weak information system has multiple implications for organizations as they continue investing in information technology and application development. The ability to predict information failure before it is implemented could facilitate many different changes in the information system that can potentially lead to the success of the implementation (Ngowi & Mwakalobo, 2017). The expectation suggestion for user realism has been anticipated to be the best affordable means of assessing the strengths or the weaknesses of the information system. Thus, future research is necessary for developing a better instrument to measure the expectations of the users and a better understanding of what leads to a weaker information system (Sahay & Walsham, 2017). The paper, therefore, discusses the implications of weak information systems and how businesses should respond or have shown response to weak information systems.
Unemployment and lack of job security are some of the implications of a weaker information system. The implementation of an information system is critical in saving time when completing different tasks and, more specifically, labor mechanics works (Majchrzak, Markus & Wareham, 2016). There can be immediate processing of many papers, and financial transactions, which can be calculated instantly. Technological improvement leads to performing more tasks that were previously done by human employees, and now the same is carried out by the computer system (Kyalo & Odhiambo-Otieno, 2017). For instance, automated telephone systems are the replacement of live receptionists in different organizations-also, the substitution of personal or online assistants. Experts within the industries have shown that job security management is a significant concern as technology maintains on changing (Bohari, Hin & Fuad, 2017). It implies that there is a need for constant learning mode someone needs to secure a job.
Security issues that develop due to the rise in numbers of hackers who access the identities and try to corporate saboteurs mainly do aim at sensitive organization information. The data comprise of bank records, vendor information, personal data, and intellectual data based on company management (Ibrahim, Hassan & Gusau, 2018). These hackers, in most cases, distribute the information across the internet, reveal the same information to other companies, or they may use it to damage the organization's image. For instance, different chains are aimed by hackers to access customers with information that is distributed due to a weak information system.
Besides, there are implementation expenses; integration of the information need too much cost based on software, people, and hardware. The hardware and software services need to be rented, and the employees should be trained with different software and information technology. Digital data can be destroyed, misused, fond of errors, and failures of software and hardware. The designing of the internet is in a way that it can open the system and enable an internal corporate policy. Hackers can release denial of service attacks (Hadi, Handajani & Putra, 2018). Also, they can go through corporate networks leading to severe disruption to the system.
Moreover, they can access by applying for a sniffer program so gain access to network resources. Computer viruses also lead to poor functioning of the websites and system, making it difficult in the tracking of suspicious activity to use control from afar (Mushtaq & Bruneau, 2019). Problems associated with the software are not easy to eliminate due to software difficulties being exploited by hackers.
When an organization lacks better security and control, it can significantly lead to depending on other computer systems on main businesses hence losing on sales and productivity. Crucial details such as records of the employees, trade details, and business plans are so much valuable and should not reveal or exposed to other firms. They need to implement new laws to enable companies to practice legal electronics records management. Also, they should follow the under laid rules based on computer forensic that demand companies to concentrate on security and electronic record management.
References
Bohari, A. M., Hin, C. W., & Fuad, N. (2017). The competitiveness of the halal food industry in Malaysia: A SWOT-ICT analysis. Geografia-Malaysian Journal of Society and Space, 9(1). https://www.researchgate.net/publication/288008662_The_competitiveness_of_halal_food_industry_in_Malaysia_A_SWOT-ICT_analysis
Hadi, A., Handajani, L., & Putra, I. N. N. A. (2018). Financial Disclosure based on Web-ICT Determinants: Its Implications for Local Government Financial Performance in Indonesia. International research journal of management, IT and social sciences, 5(1), 72-85. https://sloap.org/journals/index.php/irjmis/article/view/32
Ibrahim, A. M., Hassan, M. S., & Gusau, A. L. (2018). Factors Influencing Acceptance and Use of ICT Innovations by Agribusinesses. Journal of Global Information Management (JGIM), 26(4), 113-134. DOI: 10.4018/JGIM.2018100107
Kyalo, C. K., & Odhiambo-Otieno, G. W. (2017). Towards a well-functional computerized health management information system: A case of Mbagathi County Hospital, Kenya. International Journal of Computer Applications, 161(3), 975-8887. https://pdfs.semanticscholar.org/81d5/d7363ef6382fd3b9ca48b8d89265bc0205c8.pdf?_ga=2.169328801.1020794091.1588315063-1545013862.1588315063
Majchrzak, A., Markus, M. L., & Wareham, J. (2016). Designing for digital transformation: Lessons for information systems research from the study of ICT and societal challenges. MIS Quarterly, 40(2), 267-277. https://doi.org/10.25300/MISQ/2016/40:2.03
Mushtaq, R., & Bruneau, C. (2019). Microfinance, financial inclusion, and ICT: Implications for poverty and inequality. Technology in Society, 59, 101154. DOI: 10.1016/j.techsoc.2019.101154
Ngowi, E. E., & Mwakalobo, A. S. (2017). Rural-ICT service providers and agro-pastoralists interface: implications of the processes for sustainable agro-pastoral livelihoods in rural Tanzania. Livestock Research for Rural Development. Retrieved from http://www.lrrd.org/lrrd29/9/ngwo29172.html
Sahay, S., & Walsham, G. (2017). Information technology, innovation, and human development: hospital information systems in an Indian state. Journal of Human Development and Capabilities, 18(2), 275-292. https://ideas.repec.org/a/taf/jhudca/v18y2017i2p275-292.html
Cite this page
Weak Info System Implications: User Realism for Success - Essay Sample. (2023, Jun 10). Retrieved from https://proessays.net/essays/weak-info-system-implications-user-realism-for-success-essay-sample
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Paper Example on Managing Operations And Supply Chain
- Customer Satisfaction Essay Example
- Essay Example on Affluenza: A Social Virus That Destroys Lives
- Service Area Competitor Analysis - Essay Sample
- Humanitarian Crisis Relief: How NGOs Save Lives - Essay Sample
- Market Segmentation: Identifying & Serving Consumer Needs Effectively - Essay Sample
- Unlock the Benefits of SAFe: Reasons & Steps to Implement - Essay Sample