Warid Telecom can adopt the management information system [MIS] to handle companys data storage and assessment. Since it is a telecommunication operator in the United Arab Emirates [UAE], the integration of MIS would play a significant role because it will give the company a competitive edge over other network operators in UAE. For instance, through the application of MIS, Warid Telecom can utilize complex and comprehensive databases that can hold all necessary telephony data (Laudon & Traver, 2011). The firm would also be able to store records of its existential information systems and mobile data periodic updates, and even assess data network information to address the solution regarding ongoing or future telephony issues.
Decision support system [DSS] is another information system type that the company can utilize. Such a system is intended for usage by specific managers at a business level in executing decisions to address the existing semi-structured settlements. With the implementation of DSS, Warid Telecom managing staff will be able to determine practical solutions to particular questions regarding wireless voice and data conveyance and, thus, attain a competitive advantage. Such a strategy will allow the managers to analyze the potential influence of decisions prior to application in the business environment (Laudon & Traver, 2011).
Warid Telecom operator can integrate the transaction processing system [TPS] so that its subscribers can perform routine transactions while being on the same network. In addition to being a carrier service provider, the application of TPS will allow the company to challenge its principal business competitors including Etisalat, namely mobile service providers because users will conduct e-business activities through this system (Laudon & Traver, 2011). For example, the cell phone users will generate online paychecks and purchase orders using TPS through the Warid Telecom network.
Different Network Topologies
Bus topology network relies on a shared trunk to link all devices in the existing network. Moreover, it uses a single cable that acts as a shared communication channel that computers on the network attach into with an interface adapter (Rendell, 2013). Therefore, a device distributes a broadcast message through the medium that links all other computers.
Another network topology is ring one. In such a network, every computer incorporates precisely two devices for communication functions. The data in such a topology is transmitted through a ring or a token following a specific route such as clockwise or anti-clockwise (Rendell, 2013).
A star topology features computers that are linked to a central device known as a hub. Such a middle connection point can also be a switch or a router. The linkage of the devices to the central hub is implemented by unshielded twisted pair Ethernet, a single cable. Thus, the link between the computers and the hub or the router is a point-to-point connection (Rendell, 2013).
In a mesh topology, the devices are linked to every other in the network. The messages conveyed on this network can travel through several potential routes from the source to the intended destination (Rendell, 2013).
Advantages of Implementing Bus Topology in an Organization
Since the computers are linked to a single cable via the interface connector, the implementation of this network is easy and economical in most organizations. Another benefit is that the company will use less cable because the distance between the devices and the central cable is relatively small, and therefore, least interfaces are required (Rendell, 2013).
Disadvantages of Implementing Bus Topology in an Organization
With a bus topology, the enterprise can experience a network disruption when the central cable malfunctions. The network host can also encounter queue delay when many computers connect to a single central hub. The organization may also find it hard to determine and troubleshoot network errors at a particular station since it relies on a single hub (Rendell, 2013).
Advantages of Implementing Ring Topology in an Organization
The implementation of ring topology in an organization is easy because the devices are configured in a form a closed loop (Rendell, 2013). Other benefits to the enterprise are improved performance, easy network management, and equal access to system resources because the token facilitates the transfer and secures packets.
Disadvantages of Implementing Ring Topology in an Organization
Expansion of the organizational network may cause network congestion and, therefore, reduced service quality. Furthermore, the data transmission across the devices is much slower than in other topologies because the individual data packets must travel to the entire devices between the source and predetermined destination. The overall companys network can also be disrupted with the collapse of a particular workstation (Rendell, 2013).
Advantages of Implementing Star Topology in an Organization
The functioning of organizations devices can be advanced without interrupting the network because signals are not necessarily sent to the entire workstations. The enterprise also experiences improved performance since the data travels via a central hub prior to reaching the intended destination. The network provides centralized management because disruption of an individual computer will not breach the network (Rendell, 2013).
Disadvantages of Implementing Star Topology
Central hub dependency allows for a single point of network disruption. In case the central device fails, the entire organizations network will collapse. Since the overall workstations connect to the central hub, the devices require more cables, and thus, it is costly to implement (Rendell, 2013).
Advantages of Implementing Mesh Topology Network
The enterprise network can tolerate high data traffic because data travels from various computers simultaneously. Besides, the collapse of the single device will not affect the network performance since another device is always present to take its place (Rendell, 2013).
Disadvantages of Implementing Mesh Topology in an Organization
Since computers are linked to every other device on the same network, the organizations network will have a risk of redundant paths between such devices (Rendell, 2013). Moreover, the installation and maintenance of this network are also complex since each node is configured separately.
Ethics specifies the widely accepted set of moral standards (Reynolds, 2014). Such ethical guidelines determine the right and the wrong that impose what one requires to do, usually regarding rights, responsibilities, impartiality, and benefits to the community.
Business ethics defines the moral guidelines that regulate the organizations operations and the decision making (Reynolds, 2014). Simply, it considers every action or decision as right or wrong in the company and practices what is right in relation to the staff.
Role of Ethics in Information Systems
The ethics principles guarantee that all information systems are utilized for authorized functions only. Such guidelines will prevent the users from sharing access privileges. For instance, DSS users will not share access rights to use the information system including passwords and usernames because it violates data confidentiality (Laudon & Traver, 2011). Consequently, the information systems will be safeguarded from malicious intrusions. Additionally, ethics ensures integrity in the utilization of information system because it protects data from modifications by unauthorized parties. Ethical codes also prevent individuals from installing harmful software because it provides accountability and data enforcement (Reynolds, 2014).
Ethical Concerns that Might Arise from Using Information Systems
Since the information systems are connected to the wide area network, they are vulnerable to computer crime issues. The online intruders can hack an insecure system and, using a computer, conduct illegal activities such as data theft, sabotage, financial extortion, etc. A good example is the cyber-attack on Uber Technologies Inc. where its database was accessed by the unauthorized party that compromised massive information of its drivers across the US (Saitto, 2015, para. 1). In addressing this dilemma, secure access control should be applied to avoid unauthorized system entry.
Intellectual property issues can also arise from using weak information systems. Because of recent technological advancement, companies can adopt ideas from other firms and apply it on their own without authorization causing huge losses, which may cause the business closure. In solving this problem, the organization should patent their software (Reynolds, 2014).
Software piracy is another significant ethical issue. For example, an industry may illegally duplicate the information system software intentionally to enjoy its benefits. Such a practice is unethical because the software proprietor that has legally purchased the software may incur massive losses and experience unfair market competition (Reynolds, 2014).
How MIS Should Deals with Ethics
The MIS should ensure data confidentiality to safeguard crucial information from reaching by unauthorized users, and, concurrently, the system must guarantee that only right parties can access the data. For instance, in the case of Uber Technologies Inc. cyber-attack, the employees were always encouraged to utilize strong passwords and never reveal them to unknown persons to prevent data intrusion (Saitto, 2015, para. 7).
The MIS must guarantee data integrity and accountability by integrating the security mechanism for determining responsible users. In complying with integrity, the information system should maintain the coherency, accuracy, and credibility of data over the entire system phase. Particularly, data must not be modified in conveyance and access controls steps must be configured in the system to avoid unauthorized alteration of such data (Reynolds, 2014).
The MIS should promote data authenticity and availability by ensuring that the data is transmitted to the intended user across the network without malicious intrusion. For instance, the system should maintain the genuineness of data by verifying that the involved parties are credible via integrating authentications protocols including digital signatures (Reynolds, 2014). It must also make its data available to the authorized parties when required to facilitate genuine data access and, therefore, non-repudiation.