Tuesday, November 25, 2008

Reflection on Chapters 1 and 2 (MIS 2)

On November 24, 2008, we had two groups who reported about the first two chapters in the subject Management Information System 2. The reports were really very short, they only ran less than an hour and, honestly, RSG's sermon was longer than the two reports put together... Hehehe. However, it is considerable since the first two chapters are like the introductory part.

For the first chapter, there's really not much to say. It talked about the evolution of information systems and some introduction about strategic planning. I think the report was understandable enough but still quite lacking in information... There was one point I had hoped that would be clarified, though. In the evolution of IS, there was a mention about distributed processing and networking. I had wanted to know what the difference is between them but I really got confused because in the explanation for distributed processing, according to the report, it was like networking... But then, on the next evolution, it said that systems are now networked. So...??? :-) Anyway, this is a minor thought, so I won't dwell on it.

For the second chapter, I think it was delivered very well, and the reporters minimized reading from their references. Chapter 2 discussed about the simple 3-part model of IS implementation, which was, from memory, PLAN>>>DESIGN and IMPLEMENTATION>>>MAINTENANCE. I agree that the model is very simple, but I think there are still underlying sub-processes in each stage. There was also one interesting question that was raised- if the strategic plan must coincide with the organizational plan, what would happen if the organizational plan was wrong in the first place? This, in my opinion, is the very function of strategic planning. While it[strategic plan] should not deviate from the organizational plan (VMGO and others), it should be the one to correct and improve the organizational plan. The report also mentioned about the security threats in an information system and how to overcome them. Most of the methods are very practical and thus are easy to implement. However, I agree that it is part of planning an IS to identify and foresee possible security threats and risks so that the organization will be ready for them.

1 comment:

  1. If you need your ex-girlfriend or ex-boyfriend to come crawling back to you on their knees (no matter why you broke up) you gotta watch this video
    right away...

    (VIDEO) Text Your Ex Back?