1/99
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
1. Why should you study Information Systems?
-Offers career opportunities
-Manages Info resources
What do we mean by the "informed you?"
1. Understand, what is "behind" IT applications
2. Provide valuable input
3. Recommend/help select applications
4. Aware of new technology
5. Understand how IT improves performance and is beneficial
What careers are available in Information Systems?
1. Programers
2. Chief Info. Officers
3. Based on Location
Difference between IT and Information Systems?
1. IT is the computer-based tool that people use to work with info. and to support the info
2. IS collects, processes, stores, analyzes, and disseminates info.
Why is it difficult to manage information resources?
1. IS is very expensive to acquire, operate , maintain
2. Evolution of the MIS function
What's data, information, knowledge, computer-based information system?
Raw #'s or anything that doesn't have a meaning
What is information?
Data that has been processed and organized
What is knowledge?
Is the info that has been processed and has an understanding
What is a computer-based information system?
Use computer technology to perform some or all of its intended tasks
What are the information technology components?
1. Hardware
2. Software
3. Database
4. Network
5. Procedures
6. People
Hardware
Devices such as keyboard, etc.
Software
Is a program or collection of programs that enable the hardware to process data.
Database
a collection of related files or tables containing data
Network
is a connecting system that permits different computers to share resources
Procedures
are the instructions for combining the above components to process information and generate the desired output.
People
Use the hardware and software
What are the types of computer-based information systems?
1. Transaction Processing System (TPS)
2. Enterprise Resource Planning (ERP)
3. Inter-organizational information systems (IOSe)
4. Business Intelligence Systems (BI)
5. Functional Area Info. Systems
6. Expert Systems
7. Dashboards
Transaction Processing Systems (TPS)
support the "real time" monitoring, collection, storage, and processing of data from the organizations day to day operations
Enterprise Resource Planning (ERP
provide communication among functions
Inter-organizational information systems (IOSe)
1. Supply Chain Management
2. Electronic Commerce
Business Intelligence Systems (BI)
for complex, non routine decisions, primarily for middle managers and knowledge works
Functional Area Info. Systems
summarize data and prepare reports primarily for middle managers, but sometimes for lower-level managers
Expert Systems (ES)
attempt to duplicate the work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain
Dashboards (digital dashboards)
support all managers by providing rapid access to timely info./direct access
What industries get impacted by IT?
1. Book
2. Music
3. Video
How does IT impact organizations?
1. Reduces the # of middle managers
2. Changes managers jobs to be more productive
3. Eliminates Jobs
4. Impacts employees at work
5. Affects our quality of life
6. Impacts healthcare
What's information systems?
1. Operational Systems
2. Transactional Processing Systems
3. Coordinating the Transactions
4. E commerce
5. Database Management Systems
6. Decision Making and Business Intelligence
7. Collaboration and Knowledge Management
What's a business process?
an ongoing collection of related activities that create a product service of value to the organization, its business parts, and or its customers
What are the 3 elements of the business process
1. Inputs
2. Resources
3. Outputs
Describe cross-functional processes
multiple functional areas collaborate to perform the process
-Procurement: acquiring need material externally from vendors
-Fulfillment: processing customer orders
How does IS and business processes work together?
1. By executing the process
2. By capturing and storing process data
3. By monitoring process performance
How does IS play a role in executing the process, capturing and storing process data, monitoring process performance?
1. informs people when it is time to complete a task, provide data, provide the means to complete the task
2. captors and stores data through barcodes
3. checks time and whether its recieved
Business Process Reengineering
a radical redesign of a business process that improves its efficiency and effectiveness, often by beginning with a "clean sheet"
Business Process Improvement
focuses on reducing variation in the process outputs by searching for root causes of the variation in the process itself or among the process inputs
Business process management
a management system that includes methods and tools to support the process throughout the organization
What are business pressures
1. Business Environment
2. Market Pressure
Business Environment
the combination of social, legal, economic, physical, and political factors in which businesses conduct their operations
Market Pressures
generated by the global economy, intense competition, the changing nature of the workforce, and powerful customers
What are the market pressures?
1. Globalizations
2. Changing nature of the workforce
3. Powerful customers
Globalization
the integration and interdependence of economic, social, cultural, and ecological facets of life, enabled by rapid advances in information technology
Changing nature of the workforce
diversity and woman
Powerful Customers
more educated customers, online customer reviews, price comparison
Technology Pressures
1. Technological Innovation and Obsolescence
2. Information Overload
Technological Innovation/Obsolescence
rapid development of both new and substitute products and services
Societal/Political/Legal Pressures
-Social Responsibility
-Compliance with Government Regulations
-Protection against Terrorist Attacks
-Ethical Issues
Strategic Systems,
enable a company to increase market share/profits to better negotiate with suppliers/prevent competitors from entering market
Customer focus
provide superb customer service
Make-to-order
producing customized products
Mass customizations
producing large quantities and customizes them to individuals
What's Competitive Advantage?
using competitive strategy
Competitive Strategy
identities a business approach to complete; its goals, plans, and policies required to attain those goals
Strategic Information Systems
helps an organization either achieve a competitive advantage or reduce a competitive disadvantage
Porter's Competitive Forces Model
1. Threat of entry of new competitors
2. Bargaining Power suppliers
3. Bargaining Power of customers/buyers
4. Threat of substitute products/services
5. Rivalry among existing firms within the industry
Porter's Value Chain Model
1. Primary Actives
-Inbound Logistics (inputs)
-Operations (manufacturing and testing)
-Outbound logistics (storage/distribution)
-Marketing/Sales
-Services
2. Support Activities
-HR
-Legal
What are primary activities?
-Inbound Logistics (inputs)
-Operations (manufacturing and testing)
-Outbound logistics (storage/distribution)
-Marketing/Sales
-Services
What are support activities?
HR/Legal
Strategies for Competitive Advantage
Cost leadership, differentiation, innovation, operational effectiveness, customer orientation
What's business-information Technology Alignment?
tight integration of the IT function with the organization's strategy, mission, and goals
What's Ethics?
The principles of right and wrong that individuals use to make choices that guide their behavior
Utilitarian Approach
State that an ethical action is the one that provides the most good or does the least harm.
Rights Approach
maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties
Fairness Approach
ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard
Common Good Approach
respect and compassion for all others is the basis for ethical actions
Describe Ethics in the corporate environment
1. Code of Ethics
2. Fundamental Tenets of Ethics
Code of Ethics
a collection of principles intended to guide decision making by members of an organization
Fundamental Tenets of Ethics
1. Responsibility
2. Accountability
3. Liability
What is responsibility?
accept consequences of your decisions and actions
What is accountability?
determining who is responsible for actions that were taken
What is liability?
a legal concept that gives individuals the right to recover the damages done to them.
What role does ethics play in information technology?
1. Privacy Issues
2. Accuracy Issues
3. Property Issues
4. Accessibility Issues
Privacy Issues
collection, storing, and disseminating info. about individuals
Accuracy Issues
the authenticity, fidelity, and correctness of collected, processed info.
Property Issues
the ownership and value of information (property rights)
Accessibility Issues
Who should have the info.
Privacy
the right to be left alone and to be free of unreasonable personal intrusion
Information Privacy
the right to determine when, and to what extent, information about you can be gathered and/or communicated to others
Digital dossier
an electronic profile of you and your habits
Profiling
the process of forming a digital dossier
What's Electronic Surveillance?
Using technology to monitor individuals as they go about their daily routines
-Digital sensors
What are the concerns of our personal information in databases, on bulletin boards, social networking sites, etc.?
1. Do you know where the record are?
2. Are the records accurate?
3. Can you change inaccurate data?
4. How long will it take to make a change?
5. under what circumstances will the personal data be released
6. How are the data used?
7. To whom are the data given or sold?
8. How secure are the data against by unauthorized people?
Privacy Codes and Policies
an organization's guidelines for protecting the privacy of its customers, clients, and employees.
Opt-out model
allows company to collect personal information until the customer specifically requests otherwise.
Opt-in model
prohibits an organization from collecting any personal info. unless the customer specifically authorize it
Transborder data flow
flow of data among countries
Safe Harbor
Framework developed by the US to regulate the way the US companies export/handle personal data
Security
the degree of protection against criminal activity, danger, damage, or loss.
Information Security
all the processes and policies designed to protect an organization's info and IS from unauthorized access
Threat
any danger to which a system may be exposed
Exposure
the harm, loss, or damage that can result if a threat compromises an information resource
Vulnerability
the possibility that the system will be harmed by a threat
What are the five factors that contribute to the increasing vulnerability of organizational information resources making it difficult to secure.
1. Today's interconnected, interdependent, wirelessly environment
2. Smaller, faster, cheaper computers and storage devices
3. Decreasing skills necessary to be a computer hacker
4. International organized crime taking over cyber crime
5. Lack of management support
What are some unintentional threats to information systems?
1. Human Errors
2. Human Resources
3. Information Systems
Human Errors....
Higher level employees + greater access privileges = greater threat
Human Resources
Sensitive Data
Info systems
More access than HR
What are some human errors?
Lack of training, poor training, and lack of awareness
Define social engineering
an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company info.
What are some deliberate threats to information systems?
1. Espionage or Trespass
2. Info. Extortion
3. Sabotage or Vandalism
4. Theft of Equipment
5. Identity Theft
Be familiar with compromise to intellectual property
the property created by individuals or corporations that is protected under trade secret, patent, and copyright laws.
-Patent
-Copyright
-Trademarks
Viruses, worms phishing attacks, spear phishing attacks and dos are....
Software Attacks