Business Information Systmes - Discussion Questions

By Published on October 7, 2025
[et_pb_section fb_built="1" specialty="on" _builder_version="4.9.3" _module_preset="default" custom_padding="0px|0px|0px|||"][et_pb_column type="3_4" specialty_columns="3" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="28px|||||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" hover_enabled="0" sticky_enabled="0"]
  1. QUESTION 

    Title:

    Business Information Systmes - Discussion Questions

     

    Paper Details

    1) How can a company participating in ebusiness keep its information secure?

     

    2) What technologies can a company use to safeguard information?

     

[/et_pb_text][et_pb_text _builder_version="4.9.3" _module_preset="default" width_tablet="" width_phone="100%" width_last_edited="on|phone" max_width="100%"]

 

Subject Business Pages 3 Style APA
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner module_class="the_answer" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" width="100%" custom_margin="||||false|false" custom_margin_tablet="|0px|||false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop"]

Answer

Business Information Systems

Business Information Systems (BIS) is a programme that focuses on electronic trading otherwise known as e-commerce. Due to the advancement in the levels of technology as well as growth in market demands and dynamism, traders have been forced to major on e-commerce (Bocij,  Greasley& Hickie, 2015:p.92) However there are various things that must be done so as to ensure that the process of electronic trading is smooth. While electronic trading across the globe using the computer network is very profitable, it can also be porous to certain challenges that may jeopardize the smooth process. In order to ensure that information is secure while trading online, companies that engage in this kind of trade can do the following;

Using Of Stronger Passwords

While passwords are good ways through information can be protected, information thieves have mastered the various ways through which it can be tampered with so as to access information without authority. It is therefore not enough to have passwords, but they should be serialized in an effort to sophisticate them and bar malicious individuals from accessing them (Bocij, Greasley& Hickie, 2015:p.97).

Have regular Screening

 This can be achieved by designing the system such that all those who log in are required to answer certain questions before they are allowed to transact. Beside this, the system should be able to sense face. This can help in restricting the people who are allowed to access information in the system.

Having Multiple Backups for the Information in the System

Being that the information stored in the system can be tampered with by unauthorized individuals, it is prudent that a proper back-up be put in place to cater for a loss. Besides this, stored information can allow the administrator of the system to refresh it any time they sense malice that threatens the safety of information in the system.

Regular Updating of the System

            This will help in meeting the current requirements in terms of accessing the information in the system as well as securing the information in the system.  For this to take place, the users of the system must be thoroughly trained on how to join hands in protecting the information in the system (Bocij, Greasley& Hickie, 2015:p.92. It is worth to note that security threat of the information in the system can even be caused by the legitimate users of the system. It is therefore important that they also be trained on how to protect their information and the importance of securing information.

Guarding Information through Technology

As has been stated earlier, information in the system is susceptible to various threats which therefore calls for using of the various ways available to protect the information. Technology has provided various ways through which information in the system can be protected (Bocij, Greasley& Hickie, 2015:p.101). Some of the specific ways through which information can be protected include;

 

 

Usage of Cloud Computing

This is the process through which information is stored using secluded or else remote servers which are within the internet to store information. Other than data storage, this kind of technology can manage and process data remotely. This is one of the brand innovation in the field of technology in an effort to secure information in the system.

Endpoint Detection and Response (EDR)

According to Bocij,  Greasley& Hickie (2015:p.112),this one of the ways that has been introduced by the information specialists, where information is protected through detection by (Chief Information Security Officers) CISCO on any security threats and initiate an appropriate response immediately. This helps in reduction of the magnitude of malice that can be caused by the information thieves. These among other ways are some technological applications in information protection.

 

References

Bocij, P., Greasley, A., & Hickie, S. (2015). Business Information Systems, 5th Edn: Technology, Development and Management for the E-Business. Harlow, England: Pearson.

 

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop" custom_padding="60px||6px|||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" min_height="34px" custom_margin="||4px|1px||"]

Related Samples

[/et_pb_text][et_pb_divider color="#E02B20" divider_weight="2px" _builder_version="4.9.3" _module_preset="default" width="10%" module_alignment="center" custom_margin="|||349px||"][/et_pb_divider][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner use_custom_gutter="on" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px||" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="13px||16px|0px|false|false"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_blog fullwidth="off" post_type="project" posts_number="5" excerpt_length="26" show_more="on" show_pagination="off" _builder_version="4.9.3" _module_preset="default" header_font="|600|||||||" read_more_font="|600|||||||" read_more_text_color="#e02b20" width="100%" custom_padding="|||0px|false|false" border_radii="on|5px|5px|5px|5px" border_width_all="2px" box_shadow_style="preset1"][/et_pb_blog][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type="1_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_sidebar orientation="right" area="sidebar-1" _builder_version="4.9.3" _module_preset="default" custom_margin="|-3px||||"][/et_pb_sidebar][/et_pb_column][/et_pb_section]