Essay about Student Information Management Systems

Essay about Student Information Management Systems

Length: 1185 words (3.4 double-spaced pages)

Rating: Strong Essays

Open Document

Essay Preview

Extent of SIMS Adoption
The concept of Student Information Management System (SIMS) is one that continues to elicit mixed reactions. Its application appears limited by a number of factors. Whitley, Gal, and Kjaergaard (2014) connotes that SIMS faces challenges in acceptability due to the kind of information being stored, personal identification information being stored in the system and the identity of people accessing this information. Ngoma (2009) explores the level of success student information system, a subset of SIMS. Findings from Ngoma’s expedition indicate that many institutions tend to have a negative attitude towards implementation of such projects. Their evaluation mechanism on application of this technology is tied to the level of improvement of the institution especially student performance (Sun & Benton 2008; Chong 2014).
The Australian and European context of application is appealing. Individual governments have formulated legislations that encourage institutions to implement SIMS while others make it mandatory for these implementations to be effected with monitoring and regulatory bodies established (Whitley, Gal, and Kjaergaard 2014; BCME. 2011). In addition, subsidizing the implementation of these systems makes it possible for such regions to have extensive utilization of SIMS.
The African context and especially East African integration of SIMS is one that is shy of expectation. Recent technological boom in the region created a platform for the adoption of SIMS. However, lack of government incentives to integrate this technology in the learning and management of learning institution makes it hard for school management to make such investments (Magara 2006). The amount incurred in the implementation of this sys...

... middle of paper ...

Nguyen, T, Mondragon, F, O'Brien, W, Jackson, K, Issa, R, & Rojas, E 2012, 'Student Background and Implications for Design of Technology-Enhanced Instruction', Journal Of Computing In Civil Engineering, 26, 5, p. 562, Publisher Provided Full Text Searching File, EBSCOhost, viewed 13 April 2014.
Sun, C.Y. & Benton, D. 2008, The Socioeconomic Disparity in Technology Use and Its Impact on Academic Performance. In K. McFerrin et al. (Eds.), Proceedings of Society for Information Technology & Teacher Education International Conference 2008 pp. 1025-1028. Chesapeake, VA: AACE.
Whitley, E, Gal, U, & Kjaergaard, A 2014, 'Who do you think you are? A review of the complex interplay between information systems, identification and identity', European Journal Of Information Systems, 23, 1, p. 17, Publisher Provided Full Text Searching File, EBSCOhost, viewed 13 April 2014.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Information Systems Program Entry Essay

- I am currently employed as a Software Engineering Senior Analyst at Accenture. The Information system advances so rapidly that at times it is too difficult to keep up with it without proper knowledge and experience. While most of the people do get a relatively easy entry in the field after under graduation, it is very difficult to aim for a constant growth only on that basis. The field demands upgraded knowledge and experience for career growth and (achieve goals). And that is why I aspire, to pursue Masters in Management Information Systems at your esteemed University....   [tags: Engineering, Project]

Strong Essays
683 words (2 pages)

Financial Models & Information Systems Essay

- Introduction Knowledge includes data, information and experience (Chen, 2013). Knowledge management defined by Forcier & Rathi (2013) and Singh (2013) as a process of identifying, creating, capturing, organising, storing, representing and reusing knowledge resulting in the creation of new knowledge. Knowledge management system is a system that uses technology system to support and help workers, stakeholders and customers to have ready access to the organization's documented base of facts, sources of information, and solutions (Princeton University, 2009)....   [tags: knowlege management system]

Strong Essays
1962 words (5.6 pages)

Analysis of Database Management and Information Retrieval Systems Essay

- QUESTION 1 Differentiate between database management system and information retrieval system by focusing on their functionalities. Database Management Systems or in short form called DBMS is the major component in most of the information systems. DBMS is the basic system been used in the information system. Or in the other name, DBMS is the traditional way. The Information Retrieval System or IRS is the extended function from the DBMS thus we can explain it here that IRS is came from the DBMS. There will be some differences between Database Management System and Information Retrieval System in the functionalities and uses....   [tags: relational dbms, storage, data]

Strong Essays
1078 words (3.1 pages)

Strengths and Benefits of the UiTM Information Systems Management Program

- 1.0 INTRODUCTION 1.1 Background University Technology Mara (UiTM) has offered a Bachelor program of Information System Management (ISM) and it is function to educate and train students with knowledge and skills in managing information. It involves analyzing, developing, designing, and managing various types of information systems for organizing, identifying, acquiring, storing, and retrieving as well as disseminating information for users' strategic and competitive purposes. Meanwhile, Al-Madinah International University (MEDIU) offered a program of Bachelor of Information Technology in Management Information System and vision to achieve excellent in academic that equip the students with th...   [tags: higher education academics]

Strong Essays
2149 words (6.1 pages)

Threats to Information Security Essay

- Many organizations are now facing huge threats to their stored information. This is putting organizations and individuals at risk of losing their privacy. There are factors that contribute to information vulnerability of an organization and to a personal level. In addition, there are measures that are put in place to help secure information. The factors that pose a threat to information may include inter-connectivity and the wireless applications used in business (Rainer & Turban, 2009, p. 1). There is massive communication of computers following the inter-connectivity and this introduces a lot of challenges in the manning of information security (Rainer & Turban, 2009, p....   [tags: Information Technology]

Strong Essays
868 words (2.5 pages)

Comparative Analysis of Legacy Database Systems Essay

- COMPARATIVE ANALYSIS OF LEGACY DATABASE SYSTEMS Methods and techniques which are used in [RDBMS] Relational Data Base Management System, it was previously followed by the Database System in simple words before the introduction of RDBMS it was previously followed by the Database System. Database Management System is combination of Database Applications and Database Programs, database management system is still running in Universities and Hospitals of world in present days. Hierarchical System: In Hierarchical System a parent is the only parent of the child means child has only one parent which is called child parent relationship or it represent the...   [tags: relational, hierarchical, network systems]

Strong Essays
611 words (1.7 pages)

Information Seeking Behavior of Users Essay

- Introduction People need information for various purposes. To accomplish this, information is organized in way that it can be easily recalled and retrieving the information fulfills a user’s information need. An information need evolves from awareness something is missing. In order to create better systems to facilitate the user interaction, the reasons and methods users employ to seek out their information needs must be understood. This briefing enables the reader to understand the definition and importance of information seeking behavior, assumptions and factors affecting information seeking behavior, and current models of information seeking behavior....   [tags: Information Science and Technology]

Strong Essays
1133 words (3.2 pages)

Information Privacy Plan Essay

- 1. Privacy and security of HRIS is important to prevent modification by other people, loss of the information and unauthorized disclosure of personal information to other people (Quinstreet, Inc, 2011). Personal information should not be used for unlawful actions such as unauthorized investigations. Those entitled to use this information should make sure it is true, updated and above all complete. Access to this information should be limited to only the authorized people. Unauthorized people might end up using the personal information for ill purposes that might be harmful to the victim’s integrity....   [tags: Information Technology]

Strong Essays
1238 words (3.5 pages)

Comparison in Information System Management Programs Essay

- ... So, the academic institutions must provide the syllabus about the Ethic in Information System/ Technology. 1.3.2 Professional issues in Information system/technology In this term of issues, it is well-known about the professional issues. The professional issue is about the job prospect. It will enable students to explore a range of social, legal ethics and business issues that ICT professionals face in their careers. For those students who do not explore what capabilities they have, upcoming job requirements are low because their own results that students who are unable to meet these needs 1.4 PURPOSE This purpose is to provide graduates with the knowledge, skills and attitudes to be IC...   [tags: issues, problems, purpose, scope]

Strong Essays
1157 words (3.3 pages)

Investigation of Information Systems Essay

- Investigation of Information Systems 1. Definition of an Information System: An Information System is a combination of hardware, software, people, procedures and data that provides data processing capabilities for a business or organization. More sophisticated information systems provide the decision makers in a business (eg. the executives or managers) with on-demand reports and inquiry capabilities as well as routine periodic reports. 2. Capabilities of Information Systems: All information systems have four essential capabilities: Input Processing Storage Output i....   [tags: Papers]

Strong Essays
1448 words (4.1 pages)