Because data can be accessed by non-authorized people, mostly known as hackers.
One of the biggest reasons it can be accessed is improper security, both hardware and software.
These are the advantages of using information system:Cost saveTime saveSecurityTimely access informationConvenience
The McDonalds have been using the information system from as early as 1940s(over 70 years), making use of decision support systems, transaction processing systems, and management information systems.
Information systems using a mainframe are referred to as distributed because computing results must be distributed to users at various locations.
There are many major challenges to information systems in organization. One of these major challenges is that information can get crossed.
Cost
Information Systems is a large umbrella referring to systems designed to create, store, manipulate, or disseminate information. An example of an information system is a pencil and a piece of paper. The two objects themselves are just tools, but together they create a system for writing (information).Information technology falls under the information systems umbrella but has nothing to do with systems per say. IT deals with the technology involved in the systems themselves, e.g. an information system like wiki.answers.com contains many information technologies. Servers, server operating systems, web server software (IIS, Apache, et al.), and code written for the web server software (PHP, C#, VB, PERL, Ruby, et al.).
Do not be afraid. There is nothing to be afraid of.
McDonalds does not use Info systems. This would require your name upon ordering.
Information systems help Dollar General research possible locations for stores. The data is collected and analyzed using information systems in order to make good decisions about store locations.
Hughes Network Systems is a company that will provide people with network systems for computers. These network systems are ideal for businesses that will require many people using computers.
So people weren't using hundreds of different systems made by themselves
The goal of "whale phishing" using personal information to create emails or websites targeting senior leaders or executives is to gain access to systems and people within systems.