ISYS1000 Introduction to Business Information Systems
Semester 1, 2025
ISYS1000 Assessment 1(30%)
This assessment consists of two parts: Weekly worksheets (10%) & ISDF Assignment (20%).
Part 1: Weekly Worksheets (10%)
To help you stay on track with your learning, we’ve designed weekly worksheets that align with Modules 1–5. These are great opportunities to reinforce key concepts and practice applying what you’ve learned!
Due Dates & Completion Timeline
You can complete the worksheets online at your own pace, as long as you submit them by the deadlines.
Key deadlines to remember:
• Worksheet 1 (Module 1) and Worksheet 2 (Module 2) are due on 16 March.
• Worksheets for Modules 2–5 will each have two weeks for completion.
• Worksheet 5 (Module 5) is due by Sunday, 6 April 2025.
Accessing the Worksheets
• You can find the worksheet links on Blackboard → Assessments → Assessment 1: Business Technology Analysis (ISDF).
Completing & Submitting the Worksheets
• All worksheets must be completed on the Pearson MyLab platform.
• If you have not yet set up your Pearson MyLab account, please follow the instructions provided on Blackboard → MyLab.
Recommendations for Successful Completion
• Start early to allow ample time for completion and review.
• Ensure you are familiar with the Pearson MyLab platform before beginning.
• If you have any questions or encounter difficulties, please reach out for assistance.
Monitored Test – Closed-Book Exam Information
To ensure fairness and maintain academic integrity, these worksheets will be closed-book, monitored tests that must be completed under exam conditions.
Preparing for the Test
To take the test, you will need to install Respondus Monitor & LockDown Browser ahead of time. This tool helps create a secure test environment and ensures a smooth experience for all students.
What to Expect During the Test
• You’ll take the test in a quiet, secure space without external resources.
• The Respondus LockDown Browser will prevent you from opening other applications or browsing the web during the test.
• Respondus Monitor will use your webcam and microphone to verify exam conditions.
Helpful Reminders
• To avoid any last-minute issues, please install and test the Respondus LockDown Browser & Monitor in advance.
• Step-by-step setup instructions are available on Blackboard → Assessments → Assessment 1: Business Technology Analysis (ISDF) → Respondus LockDown Browser Download and Install.
Part 2: Information Systems Description Framework (ISDF) Assignment (20%)
Revised due date: Friday 28-March-2025 6:00 pm
In this individual assignment, you will use the Information Systems Description Framework (ISDF) to analyse an Information System within a selected real-world business. This analysis will involve providing detailed descriptions and diagrams to illustrate the components and operations of the system.
The Information Systems Description Framework (ISDF) is a structured, step-by-step process for describing the components and processes of an Information System. The proposed documentation should clearly describe the User, uses and components of the information system that you are describing.
Assignment Tasks
To begin, you need to select a small or medium-sized enterprise (SME) within your locality that has implemented an Information System to address a specific business need or to optimise its operations. Ideally, this should be a business you are familiar with, such as your own workplace (if employed) or a business you frequently interact with. Choosing a business you have access to will help in gathering relevant information for your analysis.
Once you have selected a business, provide a brief description that includes its name, location, industry, and the products or services it offers. Additionally, describe its typical daily operations, such as sales transactions, order processing, inventory management, appointment scheduling, or customer service interactions. This section should give context to the business environment in which the Information System operates.
Next, identify two key business processes that are crucial for the business's operations. These could include functions such as order processing, inventory management, appointment scheduling, or customer service. For each process, provide a brief explanation of how it functions and why it is important to the business. Consider what role these processes play in improving efficiency, reducing errors, or enhancing customer experience.
After identifying two business processes, select one of these processes for a detailed ISDF analysis in the following sections. Clearly state which process you have chosen. In the following section, your analysis of the chosen process should focus on how the information system supports this process, detailing the system's components, the users who interact with it, and the overall workflow. Ensure that your explanation includes diagrams in the relevant sections to visually represent the information system’s structure and its role within the business.
Your write-up for these sections can serve as the introduction of your submission, providing a clear foundation before diving into the deeper analysis using the ISDF framework.
1.0 General Description
1.1 Identifying Key Functions in the Business Process
For the chosen business process, identify and briefly describe four key functions or sub-processes within the process. These functions should represent the major steps involved but should not include internal technical details of the Information System itself.
For example, in an Order Processing system, the process begins when a customer initiates a purchase. Once the order is placed, the system records the sale through data capture, such as scanning a barcode at the Point-of-Sale (POS) system. After the transaction is logged, the inventory is automatically updated to reflect the reduction in stock levels. Finally, the system generates a receipt for the customer, and the transaction is stored for reporting and future reference.
1.2 Identifying the Supporting Information System
After outlining the key functions, identify the Information System that supports this process and describe its overall purpose within the business. Explain how the system contributes to the efficiency, accuracy, or automation of the process, ensuring a clear connection between the system and the business operations.
1.3 Identifying Users and System Components
Identify and describe all users and their roles within the Information System. Users can include external users, such as customers and suppliers, who interact with the system for transactions, tracking, or service requests. Additionally, other information systems may act as users by exchanging data, automating processes, or supporting business functions. In this assignment, these are considered non-computerised users because they interact with the system but are not human users.
Next, identify internal users, such as employees and managers, who use the system for daily operations, decision-making, and managing business processes. Then, identify the key system components, such as internal software applications and storage databases, that interact within the system. In this assignment, software applications and storage databases are also conceptualised as non-computerized users because they interact with other components of the Information System but are not human users.
Briefly explain how both computerised and non-computerized users interact with each other within the Information System. These interactions may include inputting data, retrieving information, processing transactions, or storing records.
Provide a high-level explanation, focusing on the overall purpose of these interactions rather than technical details. The specific details will be discussed further in the ‘External Description’ and ‘Internal Description’ sections.
2.0 External Description
In this section, you will describe the inputs, outputs, and boundaries of the Information System. The focus should be on understanding how users interact with the system, what data they provide, how that data is processed, and what outputs the system generates for various users.
2.1 Inputs to the Information System
Identify all user roles and specify the inputs they provide to the components of the information system, along with the data entry methods used for submission.
Users interact with the system by submitting various types of input data through different data entry methods. These methods may include manual entry, such as filling out a web form; scanning, such as barcode scanning for inventory updates; or automatic capture, where an online purchase is recorded by the system without manual intervention.
Each user role should be clearly identified along with the data entry method used, the specific input data provided, and the software or application to which the data is submitted. This submission corresponds to the information processor discussed in the Internal Description section.
2.2 Outputs from the Information System
Identify all user roles and list the specific outputs they receive from components in the information system, along with the delivery method usedt
After processing user inputs, the system generates various outputs that provide relevant information to users. These outputs can be delivered in different forms, such as emails, reports, notifications, receipts, or system updates. Each output is tailored to a specific recipient and contains information relevant to their role.
The format for describing outputs should include the name of the user or system receiving the output, the data output method, which defines how the information is delivered (e.g., receipt, report, notification), and a description or example of each output.
2.3 System Boundary
The boundary of the Information System defines what is inside the system (internal components) and what interacts with it externally (external components). External components are elements outside the system that provide inputs or receive outputs, such as customers, suppliers, or external databases. Internal components are elements within the system that process or store information, such as internal databases, software applications, or internal users.
For example, in an Online Retail System, external components include customers, who place orders, and suppliers, who send stock updates. The internal components include an Order Management System, which handles orders and transactions, and an Inventory Database, which stores product stock levels. In this scenario, customers input order details, the system processes the order, the warehouse receives a packing list, inventory levels are updated, and the finance team receives sales reports. The system boundary distinguishes what is part of the system, such as databases and internal processing, from what interacts with it externally, such as customers and suppliers.
When describing system boundaries, focus on information processing itself rather than specific hardware, software, or communication technologies. Ensure that your descriptions of inputs and outputs are detailed, clearly identifying who provides or receives them and how they interact with the system. This section should offer more depth than the general system description, providing a structured understanding of how the Information System operates within its defined boundaries.
3.0 External View of the Information System
Create a diagram summarising the external components and interactions of the Information System, following the format below. Ensure the diagram includes all relevant details from the external description of the information system.
Figure 1 - External View of the Information System
4.0 Internal Description
This section details the information processors, information stores, and internal networks within the Information System. These components are crucial in processing, managing, and storing information to support business operations.
4.1 Information Processors
Information processors are the components responsible for handling and transforming data within the system. These processors can be human-based, where employees manually enter or verify data, or software-based, where automated systems perform calculations and process transactions. Each processor has a specific function in managing information to ensure efficient operations.
Example 1: Software-based information processor is the Automated Order Processing Application (AOPA), which automates order handling and transactions.
This system processes online orders by calculating total costs, including taxes and discounts, verifies payment transactions, and updates stock levels accordingly. It also generates order confirmation emails for customers.
• Type: A software-based information processor that automates order handling and transactions.
• Function:
o Processes online orders by calculating total costs, including taxes and discounts.
o Verifies payment transactions and updates stock levels.
o Generates order confirmation emails for customers.
• Description: when a customer places an order on an e-commerce website, the AOPA automatically calculates the final price, confirms the payment through an integrated payment gateway, updates the inventory system, and sends an order confirmation email to the customer. This automation reduces manual work, minimises errors, and improves the speed of order processing.
Example 2: Barcode Scanning System, a hardware device with embedded software that processes barcode data and transmits it to an inventory management system or Point-of-Sale (POS) software.
This system reads product barcodes, decodes the data, and updates stock levels accordingly.
• Type: A barcode scanner with embedded software that processes scanned data and transmits it to an inventory system.
• Function:
o Reading product barcodes and extracting information.
o Sending scanned information to the inventory management system or POS.
o Automatically updating stock levels and tracking product movement.
• Description: when a warehouse worker scans a barcode on an incoming shipment, the scanner processes the data, verifies product details, and updates the inventory system.
Note: While the barcode scanner is a physical device, the actual data processing is performed by the software embedded within the scanner or in a connected system. This distinction clarifies that the scanner itself is hardware, but the information is processed by its internal software or an integrated system.
Example 3: Manual Data Entry by Employees [Human-Based Information Processor]
Employees play an essential role in reviewing and correcting system-generated records, as well as manually inputting data where necessary.
• Type: A person manually inputting or verifying data in the system.
• Function:
o Reviewing and correcting system-generated records to ensure accuracy.
o Manually inputting data when automation is unavailable or unreliable.
• Description: Customer support staff may need to correct an incorrect shipping address in the order management system to ensure the order is delivered to the correct recipient.
In situations where automation is limited, human input ensures that errors can be corrected, and data accuracy is maintained.
4.2 Information Stores
Information stores are the components of an information system that store and retrieve data. These stores can be physical (e.g., paper-based records, filing cabinets) or digital (e.g., databases, cloud storage, file management systems). The purpose of these stores is to ensure that critical information is securely recorded and accessible when needed.
Example 1: Customer Database (CDB) [Digital Storage]
A common example of a digital information store is the Customer Database (CDB), which stores customer-related data, including names, contact details, and order history. This database helps businesses track customer purchase behaviour and preferences while enabling quick retrieval of information for order processing and customer support. For instance, when a returning customer logs into an e-commerce website, the CDB retrieves their saved shipping address and previous order history, streamlining the checkout process and enhancing the customer experience.
• Type: A digital database that stores customer-related data.
• Function:
o Stores customer details such as names, contact information, and order history.
o Tracks customer purchase behaviour and preferences.
o Allows quick retrieval of customer information for order processing and support.
Description: A returning customer logs into an e-commerce website. The CDB retrieves their saved shipping address and previous order history, enabling a faster checkout process.
Example 2: Inventory Management Database (IMD) [Digital Storage – Cloud-Based or On-Premise Database]
Another example of a digital storage system is the Inventory Management Database (IMD), which is used to track stock levels, product details, and warehouse locations. This structured database can be cloud-based or on-premise, and it maintains real-time records of product availability and stock movements. It automatically updates inventory levels after a sale or upon receiving new stock. For example, when a warehouse worker scans a barcode on a newly arrived shipment, the IMD updates stock levels instantly, ensuring accurate inventory tracking and supporting supply chain management.
• Type: A structured digital database that tracks stock levels, product details, and warehouse locations.
• Function:
o Maintains real-time records of product availability and stock movements.
o Updates inventory levels automatically after a sale or new stock arrival.
o Supports supply chain and warehouse management.
Description: A warehouse worker scans a barcode on a newly arrived shipment. The IMD updates the stock levels automatically, ensuring accurate inventory tracking.
Example 3: Document Storage System (DSS) [Physical Filing System]
In contrast, a Document Storage System (DSS) represents a physical filing system used for storing important business documents, such as invoices, contracts, and compliance records. This system allows businesses to retrieve physical documents when needed for operations, audits, or legal requirements. For instance, when the finance department needs to verify a past transaction, they locate the relevant filing cabinet, retrieve the customer’s invoice, and review the payment details for reconciliation.
• Type: A physical repository for business documents, such as filing cabinets or paper-based record storage.
• Function:
o Stores important documents, including invoices, contracts, and compliance records.
o Enables retrieval of physical documents when needed for business operations.
o Provides a structured filing system to support audits and legal requirements.
Description: The finance department needs to verify a past transaction. They locate the DSS filing cabinet, retrieve the customer's invoice, and review the payment details for reconciliation.
4.3 Communication Networks
Communication networks are essential for transferring information within and outside an Information System. These networks facilitate seamless interaction between internal system components and external users, ensuring secure and efficient data exchange.
Communication networks are categorised into:
• Internal communication networks are used within the organisation to facilitate data exchange between employees, systems, and databases.
• External Communication Networks connect the system to external users, third-party services, and other external entities.
4.3.1 Internal Communication Networks
Internal communication networks enable data transfer within the organisation, allowing employees, systems, and databases to communicate efficiently. These networks provide secure access to internal applications, facilitate collaboration, and ensure smooth business operations.
4.3.2 External Communication Networks
External communication networks connect the system with customers, suppliers, payment gateways, and third-party services. These networks allow external users to interact with the system for transactions, support, and information exchange.
Examples of communication networks
1. Intranet [Internal Network] - Type: A private network accessible only to employees within the organisation.
An Intranet is a private network accessible only to employees within the organisation. It provides secure access to internal applications, shared files, and company resources while connecting internal systems such as the Automated Order Processing System (AOPS) and Inventory Management Database (IMD). It also enables employees to collaborate using internal web portals and dashboards.
• Function:
o Provides secure access to internal applications, shared files, and company resources.
o Connects internal systems, such as the Automated Order Processing System (AOPS) and Inventory Management Database (IMD).
o Enables employees to collaborate using internal web portals and dashboards.
• Description:
o Sales manager may access the Intranet to check order reports and inventory status from the Inventory Management Database (IMD).
2. VPN (Virtual Private Network) [Secure Remote Access] - Type: A secure encrypted network that allows employees to access internal systems remotely.
A VPN is a secure, encrypted network that allows employees to access internal systems remotely. It creates a secure tunnel for remote employees to connect to company resources while encrypting data to protect sensitive information from external threats. Employees can access internal databases, applications, and file servers securely from outside the office.
• Function:
o Provides a secure tunnel for remote employees to connect to company resources.
o Encrypts data to protect sensitive information from external threats.
o Allows access to internal databases, applications, and file servers from outside the office.
• Description: Remote employee uses a VPN to securely access the Customer Database (CDB) from their home computer to update customer records.
3. Internet [Public Network] - Type: A global public network that enables customers and external users to access system resources.
The Internet is a global public network that enables customers and external users to access system resources. It supports online transactions, customer interactions, and third-party integrations. Customers can place orders, track shipments, and receive automated notifications via a web-based portal.
• Function:
o Supports online transactions and customer interactions.
o Enables customers to place orders and track shipments through a web-based portal.
o Allows third-party integration with services such as payment gateways and logistics providers.
• Description: Customer visits the company’s e-commerce website via the Internet, places an order, and receives an automated order confirmation email.
4. Direct Email Communication [External Email Network] - Type: An external communication network for exchanging emails with customers, vendors, and partners.
Direct email communication is an external communication network used for exchanging emails with customers, vendors, and business partners. This network facilitates automated order confirmations, invoices, and shipping notifications while enabling direct customer service interactions. It also supports business-to-business communication with suppliers and partners.
• Function:
o Sends automated order confirmations, invoices, and shipping notifications to customers.
o Enables direct customer service interactions.
o Facilitates business-to-business communication with suppliers and partners.
• Description: After a successful payment, the Automated Order Processing System (AOPS) sends an email confirmation to the customer with their order details and estimated delivery date.
5.0 Internal View Diagram
Create a diagram that visually represents the internal workings of the Information System. Use the provided drawing as a base and modify it to include all relevant internal components.
Ensure that your diagram:
• Accurately reflects the internal description from Part 4, including information processors, information stores, and communication networks.
• Clearly labels each component, showing how data flows within the system.
• Maintains consistency with your written explanation, ensuring that all essential elements are visually represented.
Once you have edited the diagram, review it carefully to confirm that it aligns with your written description of the internal system and effectively illustrates its key components and interactions.
Figure 2 - Internal View of the Information System