country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

BUS105 Business Information Systems Disruptive Technology

tag 0 Download5 Pages / 1,247 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT
  • Course Code: BUS105
  • University: Kaplan University
  • Country: United States

Question:

In order to complete a final report you will have to find and read relevant articles on your chosen topic and write a report supported by this information in your own words. A minimum of five (5) references should be listed, and Harvard referencing should be used.

PART A: Chose a disruptive technology from an industry of your choice.

PART B: Describe some history in relation to the technology and the industry you chose.

For example, ATM machines. Before ATM machines were introduced customers went into the back and interacted with the bank tellers. There was a lot more manual handling of money. Customers can now access their money when the bank is closed and do not need any human contact.

PART C: Discuss some of the advantages and disadvantages of the disruptive technology that you chose.

PART D: Discuss the ethical, legal and security implications/concerns of the technology that you chose.

 

Answer:

Introduction:

This report will enlighten on cloud computing as one of the disruptive technology. Technology that displaces the residing technology from industry and changes present scenario is referred to as disruptive technology (Boccardi et al. 2014, pp.74-80). Cloud computing is disruptive because it has changed the existing condition of the IT industry. It has changed the need to manage all infrastructures locally. They are now being managed with the help of data centers using cloud computing. The following paragraphs will deal with a brief history, advantages and disadvantages as well as the ethical, legal and security issues related to the disruptive technology that is cloud computing.

Discussion:

The technology first evolved in 1963. The Defense Advanced Research Projects Agency invested $2 million on MIT for the MAC project (Botta et al. 2014, pp. 23-30). The investment requires MIT to make a computer that would be used by more than two persons. Therefore, they made a gigantic computer with large number of magnetic tapes that would store large amount of data. This technology came to be known as cloud computing. A number of people accessed the computer that was developed. This technology was also referred to as virtualization. The technology became popular once the effectiveness and usefulness of it was properly understood. Salesforce was the first company to use cloud computing successfully in 1999 (Satyanarayanan 2015, pp.19-23). They made use of cloud computing that deliver end users with software programs. Second was Amazon that made the complete use of this new technology in 2000. Amazon used the cloud model to make their computers capacity more efficient. They went on developing and researching on cloud computing and in 2006 Amazon Web services was launched that offers online services to other websites. Google also launched Google Docs services in the same year. Netflix was also benefited by cloud for streaming its video services in 2007. In the next year, NASA launched an open-source software known as OpenNebula for deploying private and hybrid clouds. In 2012, Oracle launched Oracle cloud that offered the three cloud services IaaS (Infrastructure as a service), SaaS (Software as a service) and PaaS (Platform as a service).

 

Advantages and disadvantages:

There are numerous advantages that are derived from cloud computing. They are discussed as under:

  • Continuous services are provided by cloud that can be relied on. The services can be accessed from anywhere whether on line or off line.
  • The services that are provided by cloud needs no expenditure of money. The hardware that is used to set up cloud computing is not costly (Apostu et al. 2013, pp.118-123). Money is required only for the subscription plan and for availing the services offered by cloud.
  • The software used by organisation is automatically updated by the use of cloud. Therefore, the crucial time that would be wasted on maintaining the system would be saved.
  • The facility provided by cloud is flexible and can be changed according to the prevailing circumstances of the users. For instance, promotion of sales will require more capacity (Moharana Ramesh and Powar 2013, pp.101-108). Cloud will provide the flexibility to its users to increase the capacity immediately so that the loss of sales and crash of servers are eliminated.
  • It provides great security to data that is lost. The data is stored in the system and therefore can be accessed even if the computer goes to wrong hands. Data can be also be erased from the lost computers.
  • With the use of cloud computing, organisations are able to manage and maintain the IT infrastructures properly.

Along with the advantages there lies some disadvantages of using cloud computing. They are as follows:

  • Cost of implementing cloud computing in a large business organisationmight not be expensive. However, it might be expensive for small-scale businesses.  
  • Cloud computing faces another disadvantage of vendor lock-in. The platforms that are used by various vendors might create problem to shift from one cloud platform to another (Modi 2013, pp.561-592). Additional costs might also be required to do the same.
  • The cloud vendors might find it difficult to access the cloud services. They have limited control over the services.
  • The components in cloud are online and therefore they are more vulnerable to unauthorized access. They experience attacks and breaches when data are hacked from the system.

Ethical, legal and security issues:

Cloud computing is an emerging technology, that has several legal and ethical issues. Data protection laws in various countries are more or less similar (Kshetri 2013, pp.372-386). However, the laws that are followed for data protection in cloud computing are different in different countries. For example, data privacy is an important aspect in Europe, however, there is no data protection law in US. This legal issue exists as the users feel that their personal information are not secured. The ethical issue that exists for the use of cloud computing is that the data that are being transferred via cloud might go under the control of other countries where data is not protected. Some other legal and ethical issues faced by cloud computing are the type of data loaded in the cloud and the ownership of this data.

The security issues of cloud computing are the various types of attack that the system faces like the distributed denial of service attack (Hashem et al. 2015, pp.98-115). The users also face security issues due to employee negligence, shared services of cloud computing and inadequate backups. The systems become vulnerable to attacks when huge amount of data are transferred through internet.

Summary:

From, the above discussions it can be concluded that cloud computing act as an emerging technology that existed in the past and has been derived from past technologies. There are various advantages and disadvantages of this technology. Despite of the disadvantages cloud computing has become popular among business organisation. There exists a large number of solutions for cloud data protection. The cloud vendors should make use of these solutions to protect the data that are being transferred with the help of cloud computing.

 

References:

Apostu, A., Puican, F., Ularu, G., Suciu, G. & Todoran, G., 2013. Study on advantages and disadvantages of Cloud Computing–the advantages of Telemetry Applications in the Cloud. Recent Advances in Applied Computer Science and Digital Services, pp.118-123.

Boccardi, F., Heath, R.W., Lozano, A., Marzetta, T.L. & Popovski, P., 2014. Five disruptive technology directions for 5G. IEEE Communications Magazine, 52(2), pp.74-80.

Botta, A., De Donato, W., Persico, V. & Pescapé, A., 2014, August. On the integration of cloud computing and internet of things. In Future internet of things and cloud (FiCloud), 2014 international conference on (pp. 23-30). IEEE.

Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. & Khan, S.U., 2015. The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, pp.98-115.

Kshetri, N., 2013. Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37(4-5), pp.372-386.

Modi, C., Patel, D., Borisaniya, B., Patel, A. & Rajarajan, M., 2013. A survey on security issues and solutions at different layers of Cloud computing. The journal of supercomputing, 63(2), pp.561-592.

Moharana, S.S., Ramesh, R.D. & Powar, D., 2013. Analysis of load balancers in cloud computing. International Journal of Computer Science and Engineering, 2(2), pp.101-108.

Satyanarayanan, M., 2015. A brief history of cloud offload: A personal journey from odyssey through cyber foraging to cloudlets. GetMobile: Mobile Computing and Communications, 18(4), pp.19-23.

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Business Information Systems Disruptive Technology. Retrieved from https://myassignmenthelp.com/free-samples/bus105-business-information-systems-disruptive-technology.

"Business Information Systems Disruptive Technology." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/bus105-business-information-systems-disruptive-technology.

My Assignment Help (2019) Business Information Systems Disruptive Technology [Online]. Available from: https://myassignmenthelp.com/free-samples/bus105-business-information-systems-disruptive-technology
[Accessed 05 July 2020].

My Assignment Help. 'Business Information Systems Disruptive Technology' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/bus105-business-information-systems-disruptive-technology> accessed 05 July 2020.

My Assignment Help. Business Information Systems Disruptive Technology [Internet]. My Assignment Help. 2019 [cited 05 July 2020]. Available from: https://myassignmenthelp.com/free-samples/bus105-business-information-systems-disruptive-technology.


Are you worried about being penalized for plagiarism? Do not fret over it as our experts are here to provide you with the ultimate key to get past plagiarism. Paraphrasing is the best way to include authentic validations without falling into the trap of copy-pasting. Our writers use genuine paraphrasing tools to get the job done in seconds. Where online paraphrasing tools fail, our experts provide valuable insight via manual inspection. Proofreading services is at its best when you avail services from MyAssignmenthelp.com, as our experts have years of experience on their side.

Latest Management Samples

HI6026 Audit, Assurance And Compliance For Sustainable Sales In Food

Download : 0 | Pages : 12

Answer: Introduction “Woolworths Group” is recognized as one of the leading Australian data manufacturer with its operations in both New Zealand and Australia. The company is known for being the second largest in terms of its revenue ranking next to “Perth-based retail-focused conglomerate Wesfarmers”. The group is further identified for being the largest retail player in terms of “liquor retailer, hotel and gaming...

Read More arrow

7808ICT Information Security Management For Human Readable Security Features

Download : 0 | Pages : 8
  • Course Code: 7808ICT
  • University: Griffith University
  • Country: Australia

Answer: Introduction Smart card are termed as smart as they are integrated with a computer chip. Smart cards are devices that helps in identification of user and provide cost efficiency features [1]. Smart cards are used in various fields including health services, banking, telephone, employee ID, transport and physical access control. The security of users affect the trust of the user with the company or any other business organization.  ...

Read More arrow

PACC6008 Business Decision Making For Statistics And Graphical Representation

Download : 0 | Pages : 5
  • Course Code: PACC6008
  • University: Newcastle University
  • Country: United Kingdom

Answer: Question 1 The institute is interested in wages of US workers in 2018. Descriptive statistics and graphical representation of the variable Wages and Education is highlighted below (Foster, 2013). Numerical summary  Graphical representation  Comment Wage Level It is evident from the above computation that the mean hourly wage level is $25.62. Also, the shape of the graph would be asymmetric considering that high positive ...

Read More arrow Tags: Australia Sydney Management Master of Health Administration  University of Sydney 

MGT2HRM Human Resource Management For The Poor Safety Environment

Download : 0 | Pages : 10
  • Course Code: MGT2HRM
  • University: La Trobe University
  • Country: Australia

Answer: Introduction Antonsen (2017) stated that employees are the most valuable asset of an organization as they works for accomplishing the organizational goals. The staffs work hard for developing the products, representing the brand and fuel the success. Thomas and Galla (2013) furthermore highlighted that poor safety environment at the workplace resulted in high absenteeism, serious injuries and employee turnover rates. This report thus ...

Read More arrow Tags: Australia Melbourne Management Business Law University of Melbourne 

HRM 702 Employment Law System

Download : 0 | Pages : 10

Answer: Introduction Affirmative action is referred to the procedures undertaken with the aim of protecting the minority communities—especially the people of color, women, transgender, aboriginals and many more. The dawn of Affirmative Action in US was seen in the 1960s with the main motive to fight discrimination based on race and skin color, as well as discrimination based on sex and gender (Ma & Schapira, 2017). History of intole...

Read More arrow
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,355,831

Orders

4.9/5

Overall Rating

5,080

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

610 Order Completed

100% Response Time

Cheryl Zhao

PhD in Statistics

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

234 Order Completed

100% Response Time

Samantha Ji

PhD in Chemistry with Specialization in Organic

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

453 Order Completed

98% Response Time

Howard Asuncion

LLM in Criminal Law

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2115 Order Completed

97% Response Time

Kimberley Chen

MPA in Accounting

Singapore, Singapore

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

Quick turn-around. Easy to understand. All requirements covered. I will be using MAH again!

flag

User Id: 383727 - 04 Jul 2020

Australia

student rating student rating student rating student rating student rating

Fast rectification and minor grammar editing needed. Thank you for the help again I knew I could count on you guys. The report was delivered wayyyy before deadline and I\'m so pleased with the work. I only have to submit it on the 29 so I have more t...

flag

User Id: 310628 - 04 Jul 2020

Australia

student rating student rating student rating student rating student rating

I received a high quality summary of a long document containing many interviews I conducted. The expert has succeeded in capturing the ideas in the interviews in a concise summary.

flag

User Id: 400556 - 04 Jul 2020

Australia

student rating student rating student rating student rating student rating

The essay is well-written and it answered the question fully. Not much editing has to be done after receiving the solution.

flag

User Id: 228634 - 04 Jul 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?