The influence of having attended an information system course has been demonstrated experimentally through the implementation of Kolb’s Experiential Learning Cycle. The reflective essay is represented in four components: Concrete Experience, Abstract Knowledge, Practical Experience, and Abstract Knowledge, Observation with Reflection, Abstract Conceptualization, and Experiential Learning. The growth or decrease in the level of comprehension, the advantage derived from either the course or personal growth is discussed. The report also details the difficulties encountered. The future prospect has been fashioned by the in-depth knowledge of the subject and its implications. Information systems importance has increased as a result of technological advancements in a variety of fields; hence, its understanding will be critical.
Throughout my graduate program, the MIS500 Foundations of Information Systems course provided a precise and accurate cycle of information exchange and self-development, and thus a guideline for my forthcoming job. Such a curriculum of the study provided me with both the information needed to bridge a gap between market and business requirements. It is critical to understand how and where to drive a wedge between these two, as they are intrinsically linked. This curriculum module has taught me far more than IT (Information Technology and Information System) instructed me on how and where to apply my personal experiences and abilities to help enhance the company’s future performance. This report analyzes reflection in-depth using weekly handwritten notes.
In 1984, David Kolb constructed Kolb’s Experiential Learning model. This model sheds light on something we already knows and what we learn as a byproduct of our growth, develop, and learn. This process of learning is divided into four phases: direct experience, observational learning, conceptual understanding, and active exploration (Devi Akella, 2010). Given that such a report is a reflection, this paradigm will aid in articulating the different aspects that have been learned via practice and investigation of various parameters.
2. Reflective Observation
Module1 particularly focused on information systems in business environment. I obtained an understanding of the important nature of information as a basis for study, analysis, and references. Each of these data, research, and analysis are critical components of creativity and aid in bringing about significant developments in the field of systems and technologies. Data is required in a variety of situations, including making decisions, management, development, and discovery (Mashli Aina et al., 2016). I also learnt that how different computer networks have evolved over the years and how they have aided businesses in achieving the competence necessary to succeed or required business outcomes. Agile is a project management and software development method that allows businesses to deliver value to its customers rapidly and with less stress. Rather than a “big bang” an agile methodology delivers work in various smaller consumable chunks. Module 2 was related to building an understanding on Scrum, what it is, how does it function and why is it used. Scrum is an agile application development methodology that is built on incremental and iterative processes. Scrum is an iterative framework which is flexible, rapid, adaptable, and competent at implementing the change throughout project development process. Scrum’s primary goal is to satisfy the customer’s need by fostering a culture of open communication, shared action, and continual learning. Apart from this I participated in a Digital Quiz and participated in various discussion forums to get to know other students and share my own with the rest in the group. Scrum is implemented in short; periodic blocks called Sprints that typically last between two and four weeks and are used to track feedback and reflections. Each Scrum is self-contained; give the accurate, a variation of the finished product which must be supplied to the customer with the least amount of effort conceivable when requested. In the next module, I learned how an agile team is built and the different stages involved in establishing an agile team. In addition to this, I learnt about the various contractual conditions to set up an agile team and explored ERP, SCM, CRM and business intelligence, among several other topics. Module 4, which is concerned with the application of business information systems, demonstrates how Enterprise Architecture may be utilized for realizing missions that have a coherent approach for the project’s objective and operational implementation (Freitas et al., 2018). The key points of exposure and the actions that an organization can take to manage and mitigate risks were discussed. And finally, the last Module 5 aided in the learning of techniques such as Google Team, Google Drive, Scrum, and ASANA that could be used to complete tasks. As far as what I learned, ethical, legislative, and safety concerns can be addressed through critical reflection.
3. Abstract Conceptualization
The most fruitful component of the study for me has been the privacy – related considerations. While it comes to privacy threats, systems are susceptible to external webpages and applications; as a result, one must ensure an adequate safety system and also implement innovative thinking and precautions when accessing data from any source, including reputable ones. Another highly useful component was the knowledge and application of numerous methods and applications such as ERP, Porter’s value chain, and CRM, that are used by businesses to manage various project activities. One aspect that baffled my thoughts was the variety of possible applications for data systems. As has always been the case throughout this pandemic time, the majority of operations have been undertaken from home, which individuals wouldn’t even have imagined had the epidemic not transpired. This was made possible by the information system. The idea that I acquired from this topic can be summarized by stating that the information system is not restricted to a specific field. It has a wide range of applications. That can be used by any firm, organization, or individual to manage the hardware, software, technologies, databases, and human resources necessary to achieve the best outcomes.
4. Active Experimentation
Without a mistake, by discussing all or most of the items above, I gained a thorough grasp as to what an information system is, its extent, the techniques which could be used to manage it, and the potential barriers and risks that may arise while managing an information system. My earlier concept of information systems, which was constrained to the storage and movement of information, has completely evolved. Now I comprehend that information systems have a wider perspective and can be used by a variety of different sorts of organizations as a means of meticulously handling, saving, and sending data in order for it to be translated into valuable information in different scenarios.
I am confident that I will be able to utilize the information system in my future endeavors, regardless of what career or subject I choose. And, as an information technology student, this subject will serve as a guide for the rest of my life. I intend to put into practice numerous modules in order to provide the groundwork for my future job in the information system, which will be extremely important in the coming years. Because of this, I want to improve my understanding of the fundamental components of the information system, and I intend to enroll in a helpful course in the coming weeks. This class taught me that dealing with information systems is not something to be taken lightly. It is necessary to have a thorough understanding of what it is, what technologies may be used, and how it can be utilized. According to (Nazareth & Choi, 2015), the threat of hacking and other malicious software is always present, and the system must be protected with suitable software and tactics to safeguard the system. This is the fresh knowledge that I have gained.
The technological market is increasingly evolving, leading to the establishment of social media platforms for marketing and business, which now has resulted in an unprecedented increase in usage of information systems. As a consequence, it has also been essential to understand and utilize information systems. Possessing a thorough understanding about the subject will provide me with several benefits in a couple of days, explicitly or implicitly.
As a result of my enrollment in the information systems course, my understanding of the subject has increased. I gained knowledge of a variety of words, techniques, and technologies, as well as security issues, information application, and development. I was inaccurate on several points and had poor comprehension. My knowledge of this subject has expanded significantly over the years, and I’ve developed a good grasp on essential concepts such as data, information, and information systems. I could benefit from this subject because it improved my skills and possibilities for the future through gaining a comprehension of contemporary concepts and technical applications. With certainty, I can state that I am capable of managing my firm and the information network related with it in the coming days in the aftermath of this study.
Devi Akella. (2010). Learning together: Kolb’s experiential theory and its application. Journal of Management & Organization 1, 16(1), 100–112. https://doi.org/10.5172/jmo.16.1.100
Freitas, A. L. P., Monteiro, G. A. P., & Costa, H. G. (2018). Assessing the quality of information technology infrastructure services. Industrial Management & Data Systems, 118(9), 1821–1836. https://doi.org/10.1108/IMDS-09-2017-0415
Mashli Aina, A., Hu, W., & Noofal Ahmed Mohsen Mohammed, A. (2016). Use of Management Information Systems Impact on Decision Support Capabilities: A Conceptual Model. Journal Of International Business Research And Marketing, 1(4), 27-31. https://doi.org/10.18775/jibrm.1849-8558.2015.14.3004
Nazareth, D., & Choi, J. (2015). A system dynamics model for information security management. Information & Management, 52(1), 123-134. https://doi.org/10.1016/j.im.2014.10.009
Zamora, E. A. (2016). Value Chain Analysis: A Brief Review. Asian Journal of Innovation and Policy, 5(2), 116–128. https://doi.org/10.7545/ajip.2016.5.2.116