Professional Documents
Culture Documents
Unit 6.17
Credits 20
GLH 80
Related Qualifications
The second part of your report should look at the impact that information
systems and technologies can have on a global business. You should:
evaluate the role of information systems and technologies in
transforming businesses
evaluate the role of information systems in global e-business
evaluate the impact of internet technology, e-commerce, and social
media on traditional business models
Remember to use examples from your research to illustrate your work
Task 2
Your second report concentrates more on the implementation of technology
and information systems and how they can be used to improve business
performance.
Section 1: Information systems and technology and business
performance
(3.1, 3.2, 3.3, 4.1, 4.2)
The first section of your report should look at the relationship between
business information and technologies and business performance and
decision making.
You should:
assess the need for and key components of an effective information
technology infrastructure
critically examine the reasons for building effective information systems
evaluate the impact of key emerging information technologies on
business performance
evaluate how key information systems can improve business
performance
analyse the relationship between information systems and decision
making
Section 2: Building and managing effective information systems
(5.1, 5.2, 5.3)
In this section, you are required to explain how the introduction of
effective, secure information systems can be managed and implemented.
This section should:
explain how to manage information systems projects
assess the challenges to developing global information systems
explain how a business can develop structures for global
information support systems
Section 3: Social, ethical and security issues
(5.4, 5.5, 5.6)
In this section of the report you are required to consider ethical and social
issues that may arise and assess security risks.
You should:
analyse the implications of ethical and social issues for managing
information systems
assess the security risks faced by information systems
evaluate tools and technologies for the protection of information
systems security
Remember to use examples from your research to illustrate your work
ACs
Suggested evidence
Task 1,
Section 2
Task 2,
Section 1
Task 2,
Section 2
Task 2,
Section 3