Question : Pick one business tool you have discovered in this course from Weeks 1 to 7 and
a) state the tool here
b) discuss why you chose that tool in particular
c) discuss the pros and cons of the tool in IT businesses today
Do some research on research. Discuss your findings. What can you do to become a better researcher? Be specific and cite your research.
The business tool that fascinated me most is Enterprise Resource Planning (ERP). I chose this as it is such a multifaceted tool that can and should (if feasible) be utilized for all businesses with the intention to handle every item under a single metaphorical umbrella. 
Enterprise Resource Planning (ERP) is a software solution that integrates various business processes and functions into a unified system. It allows organizations to manage and automate critical areas such as finance, human resources, supply chain, manufacturing, sales, and customer relationship management (CRM). Here are the pros and cons of implementing an ERP system:
Pros of Enterprise Resource Planning (ERP):
1. Centralized Data: ERP systems provide a centralized database, ensuring that all departments and stakeholders have access to accurate and up-to-date information. This promotes data consistency, eliminates redundant data entry, and improves collaboration across the organization.
2. Streamlined Processes: ERP systems streamline business processes by automating routine tasks, reducing manual efforts, and improving overall efficiency. Organizations can optimize operations, eliminate bottlenecks, and enhance productivity with integrated workflows and standardized procedures.
3. Enhanced Decision-Making: ERP systems offer real-time reporting and analytics capabilities, enabling organizations to gain valuable insights into various aspects of their business. With access to accurate data, managers can make informed decisions, identify trends, and address issues promptly.
4. Improved Customer Service: ERP systems often include CRM modules, allowing organizations to manage customer interactions, track sales leads, and provide better customer service. Businesses can enhance customer satisfaction, sales forecasting, and marketing campaigns by integrating customer data and interactions.
5. Scalability and Flexibility: ERP systems are designed to accommodate organizations’ growth and changing needs. They can scale to support increasing transaction volumes, additional users, and new functionalities. ERP systems also offer customization options to align the software with specific business requirements.
Cons of Enterprise Resource Planning (ERP):
1. Cost: Implementing an ERP system can be a significant investment for organizations, especially for small and mid-sized businesses. The upfront costs include licensing fees, implementation costs, hardware upgrades, and training expenses. Ongoing maintenance and support costs should also be considered.
2. Implementation Complexity: ERP implementations can be complex and time-consuming. They require careful planning, data migration, configuration, and customization to meet the organization’s needs. Organizations must allocate resources and expertise to manage the implementation process effectively.
3. User Adoption Challenges: ERP systems often introduce changes to established processes and workflows. Employees may need to be more responsive to these changes, leading to challenges in user adoption. Comprehensive training programs and change management strategies are crucial to ensure successful user adoption and maximize the benefits of the ERP system.
4. Integration Issues: Integrating an ERP system with existing legacy systems or third-party applications can be challenging. Organizations may face compatibility issues, data migration complexities, and the need for custom integration solutions. Smooth integration requires careful planning and coordination.
5. Vendor Dependence: Organizations depend on the ERP vendor for ongoing support, updates, and maintenance. Vendor viability, product support, and the ability to address future needs should be considered when selecting an ERP system. Vendor lock-in can be a concern if switching to another ERP system becomes necessary.
Organizations must conduct thorough research, evaluate their specific needs, and consider the pros and cons before implementing an ERP system. Careful planning, change management, and user involvement are critical factors in ensuring a successful ERP implementation and maximizing its benefits for the organization.
Laudon, K. C., & Laudon, J. P. (2019). Management information systems: managing the digital firm (16th ed.). Upper Saddle River, NJ: Pearson Education.
Schwarz, L., & Biel, J. (2020, September 8). The Pros and cons of ERP. Oracle NetSuite. 
 R2Class,     One business tool from this course that interested me was unified threat management systems. Unified threat management is defined as a “Comprehensive security management tool that combines multiple security tools, including firewalls, virtual private networks, intrusion detection systems, and web content filtering and anti-spam software” (Laudon & Laudon, 2019, p. G-11). These systems help businesses to reduce costs and improve overall manageability. Without protection measures against malware and intruders, organizational assets would be at great risk for unauthorized use and access. I chose this tool in particular because it is essential for all organizations to protect their valuable sources and information and because unified threat management systems are available for all sizes of networks and applicable to all businesses.     As with any tool in IT businesses today, there are both pros and cons of unified threat management systems. One key advantage of these systems is that it is a simplified approach to installation, configuration, and maintenance by combining multiple security systems into one platform (Trabelsi et al., 2017). This helps to lessen the workload for security administrators and allows for quick and efficient identification of threats and vulnerabilities. Other pros include savings due to lower adoption costs and minimal overhead, enhanced security of networks, agile security for changing networks, faster response times, and reduced maintenance (Rathod, 2022). Weaknesses of unified threat management systems in IT businesses today include lack of specialization, single point of failure leaving networks vulnerable if system fails, performance issues with used with a large number of applications, and network’s security dependance on one vendor (Rathod, 2022).     All in all, unified threat management systems are cost effective business tools that provide network security in an efficient manner. Although there are some drawbacks, the ease of adoption, manageability, and simplicity are benefits of these systems for IT businesses today. Before implementation, it is critical for firms to assess organizational needs and choose tools that best support goals.Best,AmandaReference:Laudon, K. C., & Laudon, J. P. (2019). Management information systems: managing the digital firm (16th ed.). Upper Saddle River, NJ: Pearson Education.Rathod, A. (2022, February 28). Unified threat management solutions pros and cons.…Trabelsi, Z., Zeidan, S., & Masud, M. M. (2017). Hybrid mechanism towards network packet early acceptance and rejection for unified threat management. IET Information Security, 11(2), 104–113.
R3DResearch skills are essential in enabling writers to find information whether for creative writing or academic papers.  Online resources are great for finding information, sites like Google and Wikipedia are not always accurate, however.  Verifying reliable sources is something you need to do as a researcher.  As you build your research, you must recognize that not all sources are good.  You want to ask yourself a couple of questions, is there other credible information that supports the research claims, and is the author an expert in the field?  Verifying information from several sources is a good way to verify that you are gathering credible information (MasterClass, 2023).Starting broad and narrowing your research is a good way to gather information.  When starting your research on a specific topic it’s ok to have a broad initial search, you will want to narrow your topic as you amass data.  Staying organized and taking advantage of library resources are other ways to improve your research.  College online libraries offer credible information on most topics, and you can find peer-cited articles. Other ways I found online to improve research skills were.1. Define your research according to the assignment2. Break down the assignment3. Avoid Plagiarism4. Consult with a librarian5. Practice Effective reading (Nair, 2023)References:How to improve your research skills: 6 research tips – 2023 (no date) MasterClass. Available at:… (Accessed: 19 June 2023). Nair, M. (2023) Killer Research Skills for the ambitious student, University of the People. Available at:… (Accessed: 19 June 2023).R4To acquire information and develop an outline for any writing project, whether it be for academic or artistic purposes, writers need to have strong research abilities. You can become informed in any subject area you need to write about by learning how to conduct structured and efficient research, which is key. Setting goals, gathering data, and interpreting information from many sources are some of the most important research abilities you may possess.Six tips for improving research skills are: 1. Start broad, then dive into the specifics2. Learn how to recognize a quality source3. verify information from several sources4. Be open to surprising answers5. Stay organized6. Take advantage of library resourcesSome things you can do to become better at research are to set goals. You must know what you’re looking for and visualize the outcome you’re trying to achieve. Data collection is important, though it can be flexible. Some research requires direct and crowd-sourced research, while others can simply be done with a quick Google search. Having experience with various methods can help you understand this process. Putting all your eggs in one basket typically results in errors, though. A good tip is to have an abundance of sources to research from and to also verify where the information is coming from to ensure it is a good source to digest from. Reporting what you find is imperative to research, so effective reporting is detrimental. A reader should be able to walk away with an easy understanding of what they have found. This relies heavily on effective communication (Ariella, 2023). Another good tip is to take notes. While shifting through a lot of information, taking exhaustive notes will help what you find not slip through the cracks and help summarize research. But the biggest thing when it comes to being a better researcher is to ensure you have proper time management. It means you can organize and break down larger tasks to complete within a given timeline (Ariella, 2023).How to improve your research skills: 6 research tips – 2023. MasterClass. (n.d.). most important research skills (with examples). Zippia. (2023b, June 12). research is crucial when one is in school, the same skill set can be carried with an individual throughout their career and life. Research allows us to become knowledgeable in almost any area, which can be applied to everyday life and in careers in certain areas. When researching it is important to keep some key tips in mind. MasterClass, 2021 defines the following six tips to help you improve your researching skills: Start broad, then dive into the specifics.Learn how to recognize a quality source.Verify information from several sources.Be open to surprising answers.Stay organized.Take advantage of library resources.Personally, I think that recognizing a quality source and verifying information from several sources are both crucial to the researching process. Search engines like Google and Bing, although helpful to connect you with information, also help to spread misinformation that should be verified from academic sources and multiple different sources. Researching is an important skill that many of us carry throughout our lives. It is important to have a solid foundation/skill set in order to be successful in your research throughout life. References: MasterClass. (2021, August 18). How to improve your research skills: 6 research tips.…INFO531
Course Summary
Course : INFO531
Title : Management Information Systems
Length of Course : 8
Faculty : See the Classroom
Prerequisites : N/A
Credit Hours : 3
Course Description:
This course addresses information systems, to include their nature and role as key
management resources. This course covers the information systems infrastructure, to
include databases, knowledge management systems, enterprise information portals,
telecommunications, the Internet, and wireless technology. It examines the topics of ecommerce, information systems in the global economy, managing global systems, securing
information systems, and ethical and social issues in information systems.
Course Scope:
Today, in business, we see the emergence of a new digital firm. Global business
opportunities afforded by electronic business and electronic commerce combined with the
exponential change in technology power and capacity has fueled the creation of this digital
firm. Every aspect of the firm is not only touched by the digital process, but has been
transformed by it. Managing information systems has become a task for all levels of
managers and all function areas of the business. In today’s digital firm there is no escaping
the opportunities (as well as the challenges) that technology brings. This course focuses on
appraising the nature of the digital organization and the key issues in managing it.
A successful student will fulfill the following learning objectives:
• CO1: Assess the need for information systems in businesses based on the IT
management principles for business models.
• CO2: Differentiate the roles played by systems serving the various levels of
management in a business and their relationship to each other.
• CO3: Assess the impact of information systems on organizations based on industry
best practices and IT management principles.
Page: 1 of 9
Date: 6/18/2020 2:13:11 AM
• CO4: Analyze the relationships among ethical, social, and political issues that are
raised by information systems.
• CO5: Appraise the challenges of managing IT infrastructure and management
solutions, including the tools and technologies for providing information from
databases to improve business performance and decision making based on IT
management principles for business models.
• CO6: Differentiate how Internet technology supports communication and e-business,
and how Internet technology has changed value propositions and business models.
• CO7: Distinguish the necessary factors, technologies, and specific tools which protect
and safeguard information systems and resources from destruction, error, and abuse.
• CO8: Assess the challenges posed by enterprise applications used in platforms for
new crossfunctional services using best practices for enterprise-wide application
• CO9: Appraise the business benefits of using intelligent techniques for knowledge
management, and the role of information systems in supporting the activities of
managers and management decision making based on the foundational principles
of IT management for business models.
• CO10: Justify the factors in building new systems which produce organizational
change using IT management principles.
• CO11: Analyze the principle risk factors in information systems projects and the
strategies for managing project risk and system implementation.
• CO12: Appraise the issues and technical alternatives to be considered when
developing international information systems using IT global management principles.
Week 1: IS in Global Business and Ethical Issues
Learning Objective(s): 1, 4
Laudon Ch 1-2
Week 1 Discussion
Week 2: Information Systems, Organizations and Strategy
Learning Objective(s): 2, 3
Laudon Ch 3-4
Week 2 Discussion
Page: 2 of 9
Date: 6/18/2020 2:13:11 AM
Term Paper Outline
Week 3: IT Infrastructure and Databases
Learning Objective(s): 5
Laudon Ch 5-6
Week 3 Discussion
Week 4: Telecommunications, The Internet, Wireless Issues, and Security Issues
Learning Objective(s): 6, 7
Laudon Ch 7-8
Week 4 Discussion
Midterm – Case Study#1
Week 5: Enterprise Applications and E-Commerce
Learning Objective(s): 8
Laudon Ch 9-10
Week 5 Discussion
Week 6: Knowledge Management and Decision Making
Learning Objective(s): 9
Laudon Ch 11-12
Week 6 Discussion
Week 7: Building Systems and Project Management
Learning Objective(s): 10, 11
Page: 3 of 9
Date: 6/18/2020 2:13:11 AM
Laudon Ch 13-14
Week 7 Discussion
Term Paper Due
Week 8: Managing Global Systems
Learning Objective(s): 12
Laudon Ch 15
Week 8 Discussion
Final – Case Study 2
Assignment Requirements
This course has a strong writing component. The goal is to organize, synthesize, and
demonstrate your comprehension of core concepts investigated during this course by
applying a combination of the terms, concepts, and details you have learned in a systematic
way. As important as “the details” that you analyze and arrange in your writing, however, are
the conclusions you draw from those details, and your predictions, responses to, and
ultimate interpretation of those details.
Weekly Discussion Activities
Most weeks of this course you will participate in a discussion activity. Each discussion activity
will consist of one or more threads/topics. The assignments may involve discussion or
debate. The questions are designed to allow you to apply what you have learned in the
chapter to real-world scenarios or hypothetical, but realistic, situations. Post your answers to
the questions in each thread preferably prior to 11:59 p.m. ET on Thursday. The only
exception to the Thursday deadline is week one of the course when your initial post will not
be due until Sunday. Please do not be late with this post because your classmates will be
relying on you to post on time to give them a post to respond to later in the week. A
discussion period will then ensue from Thursday through Sunday. Read your classmates’
posts and post at least two follow-up messages to your classmates’ posts in each thread
prior to 11:59 p.m. ET on Sunday. Some threads may require you to post more than two
replies, so make sure you read the directions carefully. Of course, you may always post
more than the required number of replies and you are encouraged to continue participating
in the discussion even after you have met the minimum number of posts required. Your
discussion participation will be considered at the end of the semester if your grade is on the
Page: 4 of 9
Date: 6/18/2020 2:13:11 AM
borderline. Borderline grades will only be rounded up if you have exceeded the minimum
requirements on the discussion and shown insight and critical thinking in all of your posts and
replies. Your follow-up posts must contain substance and should add additional insight to
your classmates’ opinions or challenge their opinions. It is never sufficient to simply say, “I
agree with what you wrote” or “I really liked your post.” You must use your follow-up posts as
a way to continue the discussion at a high level of discourse. Be sure to read the follow-up
posts to your own posts and reply to any questions or requests for clarification, including
questions posted by your professor. You will be expected to log into the classroom several
times each week to participate in the class discussion. Discussion postings are a large part of
your grade and I will be looking for quality and depth in your postings.
Midterm – Case Study#1
Please read and review the Chapter 6 Case Study:
Trouble with the Terrorist Watch List Database (see your assignment area for the
Case Study)
After your review, please answer the following questions and formulate them into an APA
formatted paper:
1. What concepts in this chapter are illustrated in this case?
2. Why was the consolidated terror watch list created? What are the benefits of the list?
3. Describe some of the weaknesses of the watch list. What management, organization, and
technologyfactors are responsible for these weaknesses?
4. How effective is the system of watch lists described in this case study? Explain your
5. If you were responsible for the management of the FBI’s Terrorist Screening Center
(TSC), what stepswould you take to correct some of these weaknesses?
6. Do you believe that the terror watch list represents a significant threat to individuals’
privacy orConstitutional rights? Why or why not?
7. Describe your understanding of the Traveler Redress Inquiry Program (TRIP), and
provide at least twopros and cons to this initiative.
8. Describe the current status of “Secure Flight.” Has TSA been able to overcome the privacy
a. Write in APA format
b. Each item will have a proper APA heading
c. Response to each of the 1-8 items above must be at least 30 words
d. The paper must have at least five (5) reputable sources with proper citations from these
sourcese. Please submit by the due date
Final – Case Study #2
Please read and review the Case Study:
JetBlue and WestJet: A Tale of Two IS Projects (see the assignment area for the Case
After your review, please answer the following questions and formulate them into an APA
formatted paper:
Page: 5 of 9
Date: 6/18/2020 2:13:11 AM
1. How important is the reservation system at airlines such as West Jet and JetBlue? How
does it impact
operational activities and decision-making?
2. Evaluate the key risk factors of the projects to upgrade the reservation systems of West
Jet andJetBlue.
3. Classify and describe the problems each airline faced in implementing its new reservation
What management, organization, and technology factors caused those problems?
4. Describe the steps you would have taken to control the risk in these projects.
5. Perform research to learn more about the Sabre system. What is it? How did come about?
6. JetBlue had the opportunity to learn from the problems encountered by West Jet during
its migration.What options did West Jet have to learn from another company who faced a
similar situation? What would you recommend to the leadership team?
7. Do you believe the West Jet problem is mostly IT-related, or do you think that poor
leadership andplanning caused the catastrophe? Explain.
8. Why do you think that West Jet has slowed down its growth plans, such as the RBC West
JetMasterCard? What does a credit card have to do with the IT issues? Explain.
a. Write in APA format
b. Each item will have a proper APA heading
c. Response to each of the 1-8 items above must be at least 30 words
d. The paper must have at least five (5) reputable sources with proper citations from these
sourcese. Please submit by the due date
Term Paper
a. You must write a 12-15 page term paper according to the assignment description provided
by your professor.
b. Your term paper outline is due at the end of week 2.
c. Your term paper is due at the end of week 7.
d. In addition to the 12-15 pages of the body of the paper itself, you must include a title page,
abstract page, and a references page.
e. Your title page must include the title of your paper, the date, the name of this course, your
name, and your instructor’s name.
f. You’re in-text citations and your references page must be written in APA citation style.
Week 1 Discussion
Week 2 Discussion
Week 3 Discussion
Week 4 Discussion
Week 5 Discussion
Week 6 Discussion
Week 7 Discussion
Week 8 Discussion
Grade %
25.00 %
3.13 %
3.13 %
3.13 %
3.13 %
3.13 %
3.13 %
3.13 %
3.13 %
Page: 6 of 9
Date: 6/18/2020 2:13:11 AM
Term Paper Outline
Term Paper
25.00 %
5.00 %
20.00 %
Case Studies
Midterm – Case Study#1
Final – Case Study #2
50.00 %
25.00 %
25.00 %
Book Title: Management Information Systems: Managing the Digital Firm, (see the most
recent edition in the classroom)
Author: Laudon and Laudon
Publication Info: Pearson
ISBN: 9780133898163
The required book(s) will be available for purchase from the APUS Bookstore.
Selected Bibliography
Association for Computing Machinery (ACM):
IEEE Computer Society:
Project Management Institute (PMI):
Course Guidelines
Citation and Reference Style
Attention Please: Students will follow the APA Format as the sole citation and reference
style used in written work submitted as part of coursework to the University.
Assignments completed in a narrative essay or composition format must follow the
citation style cited in the APA Format.
Tutoring offers online homework help and learning resources by connecting students to
certified tutors for one-on-one help. AMU and APU students are eligible for 10 free
hours* of tutoring provided by APUS. Tutors are available 24/7 unless otherwise noted. also has a SkillCenter Resource Library offering educational resources,
worksheets, videos, websites and career help. Accessing these resources does not
count against tutoring hours and is also available 24/7. Please visit the APUS Library
and search for ‘Tutor’ to create an account.
Page: 7 of 9
Date: 6/18/2020 2:13:11 AM
Late Assignments
Students are expected to submit classroom assignments by the posted due date and to
complete the course according to the published class schedule. The due date for each
assignment is listed under each Assignment.
Generally speaking, late work may result in a deduction up to 15% of the grade for each
day late, not to exceed 5 days.
As a working adult I know your time is limited and often out of your control. Faculty may
be more flexible if they know ahead of time of any potential late assignments.
Turn It In
Faculty may require assignments be submitted to will analyze a
paper and report instances of potential plagiarism for the student to edit before submitting
it for a grade. In some cases professors may require students to use This is
automatically processed through the Assignments area of the course.
Academic Dishonesty
Academic Dishonesty incorporates more than plagiarism, which is using the work of
others without citation. Academic dishonesty includes any use of content purchased or
retrieved from web services such as Additionally, allowing your work
to be placed on such web services is academic dishonesty, as it is enabling the
dishonesty of others. The copy and pasting of content from any web page, without
citation as a direct quote, is academic dishonesty. When in doubt, do not copy/paste,
and always cite.
Submission Guidelines
Some assignments may have very specific requirements for formatting (such as font,
margins, etc) and submission file type (such as .docx, .pdf, etc) See the assignment
instructions for details. In general, standard file types such as those associated with
Microsoft Office are preferred, unless otherwise specified.
Disclaimer Statement
Course content may vary from the outline to meet the needs of this particular group.
Communicating on the Discussion
Discussions are the heart of the interaction in this course. The more engaged and lively the
exchanges, the more interesting and fun the course will be. Only substantive comments will
receive credit. Although there is a final posting time after which the instructor will grade
comments, it is not sufficient to wait until the last day to contribute your
comments/questions on the discussion. The purpose of the discussions is to actively
participate in an on-going discussion about the assigned content.
“Substantive” means comments that contribute something new and hopefully important to the
discussion. Thus a message that simply says “I agree” is not substantive. A substantive
comment contributes a new idea or perspective, a good follow-up question to a point made,
offers a response to a question, provides an example or illustration of a key point, points out
an inconsistency in an argument, etc.
As a class, if we run into conflicting view points, we must respect each individual’s own
opinion. Hateful and hurtful comments towards other individuals, students, groups, peoples,
and/or societies will not be tolerated.
Page: 8 of 9
Date: 6/18/2020 2:13:11 AM
Identity Verification & Live Proctoring
Faculty may require students to provide proof of identity when submitting assignments
or completing assessments in this course. Verification may be in the form of a
photograph and/or video of the student’s face together with a valid photo ID, depending
on the assignment format.
Faculty may require live proctoring when completing assessments in this course.
Proctoring may include identity verification and continuous monitoring of the student by
webcam and microphone during testing.
University Policies
Student Handbook
• Drop/Withdrawal policy
• The University encourages all work to be completed according to the
course schedule. The University Late Work Policy can be found in
the Student Handbook here.
• Extension Requests
• Academic Probation
• Appeals
• Disability Accommodations
• Plagiarism
The mission of American Public University System is to provide high quality higher education
with emphasis on educating the nation’s military and public service communities by offering
respected, relevant, accessible, affordable, and student-focused online programs that prepare
students for service and leadership in a diverse, global society.
Page: 9 of 9
Date: 6/18/2020 2:13:11 AM

Purchase answer to see full

error: Content is protected !!