informatics exam

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/168

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

169 Terms

1
New cards

what is business informatics

Business informatics, as a subfield of applied informatics, is an interdisciplinary field combining informatics and business management

<p>Business informatics, as a subfield of applied informatics, is an interdisciplinary field combining informatics and business management</p>
2
New cards

information and communication systems

Information systems: systems for processing information Communication systems: transferring and analyzing information

3
New cards

Main objective (your role)

Set-up of ICT systems in such a way that they are of optimal use in a business or organization.

4
New cards

Improvement of

the work environment for users (ergonomics),

the efficiency of processes, and

the performance level of the different functional areas in a company.

5
New cards

The Subject of Business Informatics (what it is actually doing)

Business informatics, as an interdisciplinary field between informatics and business management, deals with the design and implementation of computer-supported ICT systems for companies and organizations and with its three key components, people, tasks and technology.

<p>Business informatics, as an interdisciplinary field between informatics and business management, deals with the design and implementation of computer-supported ICT systems for companies and organizations and with its three key components, people, tasks and technology.</p>
6
New cards

Why IT maters for you?

huge changes in education, home, healthcare,AR

The jobs of the future will need both technology know-how and people skills. There are seven main areas where these jobs are growing. Some jobs are about using new tech, like in green energy or data analysis. Others focus on human interaction, like in healthcare or marketing.

These job areas need different skills. Some need tech skills, others need business skills, and some need both. The job market is changing, and it's important to have a mix of skills to keep up.

Some of the fastest-growing jobs are in fields like AI and data analysis. But there are also less common jobs, like working with renewable energy or social media.

To get these jobs, you'll need a mix of skills. Some jobs need technical skills, others need business skills, and some need both. These skills fall into five categories: Business Skills, Specialized Industry Skills, General Skills, Basic Tech Skills, and Advanced Tech Skills. Different jobs need different skills, so it's good to have a variety.

<p>huge changes in education, home, healthcare,AR</p><p>The jobs of the future will need both technology know-how and people skills. There are seven main areas where these jobs are growing. Some jobs are about using new tech, like in green energy or data analysis. Others focus on human interaction, like in healthcare or marketing.</p><p style="text-align: start">These job areas need different skills. Some need tech skills, others need business skills, and some need both. The job market is changing, and it's important to have a mix of skills to keep up.</p><p style="text-align: start">Some of the fastest-growing jobs are in fields like AI and data analysis. But there are also less common jobs, like working with renewable energy or social media.</p><p style="text-align: start">To get these jobs, you'll need a mix of skills. Some jobs need technical skills, others need business skills, and some need both. These skills fall into five categories: Business Skills, Specialized Industry Skills, General Skills, Basic Tech Skills, and Advanced Tech Skills. Different jobs need different skills, so it's good to have a variety.</p>
7
New cards

Why IT matters to you: opening case

- Problems:

Queensland Health implemented a new payroll information system. - "Queensland Health had not determined whether systems, processes and infrastructure were in place for the effective operation of the new system," the report said. - “The lack of a clear organisational structure within the project team” - “Queensland Health employees work under 13 separate award structures set out by five different industrial agreements “

- Results:

- Hundredths of workers were over, under paid or not paid at all: “government still did not know how many staff were being overpaid or underpaid and said Queensland Health was working with the union to determine a figure” …for several months - $220 million has been allocated to fix Queensland Health’s already disastrous payroll systems overhaul

- Implementation:

- Overall, the cost to taxpayers was an estimated AU$1.2 billion

- Consequences:

- “The rollout is subject to a legal dispute between the Queensland and SAP.” (and IBM) - “Deputy director general Michael Kalimnios and corporate services executive director Adrian Shea received notices of contract termination “FIRED” - “Queensland nurses are refusing to work certain shifts out of fear they won't be paid properly” - „The cost to taxpayers has been estimated at $1.2 billion and the debacle has been described as possibly the worst public administration failure in Australia.” - “I see fellow payroll officers working such long hours they miss their little girl growing up. Their relationships deteriorate, and the people you sit next to become more like your family” - “The QLD Health payroll fiasco should be enough to convince everybody NOT to vote Labour at the next election”

<p>- Problems:</p><p>Queensland Health implemented a new payroll information system. - "Queensland Health had not determined whether systems, processes and infrastructure were in place for the effective operation of the new system," the report said. - “The lack of a clear organisational structure within the project team” - “Queensland Health employees work under 13 separate award structures set out by five different industrial agreements “</p><p>- Results:</p><p>- Hundredths of workers were over, under paid or not paid at all: “government still did not know how many staff were being overpaid or underpaid and said Queensland Health was working with the union to determine a figure” …for several months - $220 million has been allocated to fix Queensland Health’s already disastrous payroll systems overhaul</p><p>- Implementation:</p><p>- Overall, the cost to taxpayers was an estimated AU$1.2 billion</p><p>- Consequences:</p><p>- “The rollout is subject to a legal dispute between the Queensland and SAP.” (and IBM) - “Deputy director general Michael Kalimnios and corporate services executive director Adrian Shea received notices of contract termination “FIRED” - “Queensland nurses are refusing to work certain shifts out of fear they won't be paid properly” - „The cost to taxpayers has been estimated at $1.2 billion and the debacle has been described as possibly the<strong> worst public administration failure in Australia</strong>.” - “I see fellow payroll officers working such long hours they miss their little girl growing up. Their relationships deteriorate, and the people you sit next to become more like your family” - “The QLD Health payroll fiasco should be enough to convince everybody NOT to vote Labour at the next election”</p>
8
New cards
<p>why IT matters to you? jobs of tomorrow 2023</p>

why IT matters to you? jobs of tomorrow 2023

adoption of LLMs(large language models) could significantly impact ; broad spectrum of job racs. Adoption of LLMs is likely to create new roles within categories of AI developers, AI content creators, interface…Implementing LLMs could providing valuable insights for policy - makers, educators and business leaders. ] 3 basic social institutions - education, health care and care-that can benefit from key investments to restart the engine of social mobility across economics, filling unmet demand for helathcare and childcare, as well as increasing quality of in education systems, increasing producticity.

<p>adoption of LLMs(large language models) could significantly impact ; broad spectrum of job racs. Adoption of LLMs is likely to create new roles within categories of AI developers, AI content creators, interface…Implementing LLMs could providing valuable insights for policy - makers, educators and business leaders. ] 3 basic social institutions - education, health care and care-that can benefit from key investments to restart the engine of social mobility across economics, filling unmet demand for helathcare and childcare, as well as increasing quality of in education systems, increasing producticity.</p>
9
New cards

Information Systems: Concepts and Definitions

data, information, knowledge

- Winners of the future: connect DATA into useful INFORMATION

- Data: facts (computer)

- Information: something that gives you useful insights to a particular domain (human perspective)

- Knowledge: is a familiarity, awareness, or understanding of someone or something, such as facts, information, descriptions, or skills, which is acquired through experience or education by perceiving, discovering, or learning.

- Information Technology Architecture

<p>- Winners of the future: connect DATA into useful INFORMATION</p><p> - Data: facts (computer) </p><p>- Information: something that gives you useful insights to a particular domain (human perspective) </p><p>- Knowledge: is a familiarity, awareness, or understanding of someone or something, such as facts, information, descriptions, or skills, which is acquired through experience or education by perceiving, discovering, or learning.</p><p> - Information Technology Architecture</p>
10
New cards

information system (IS)

An information system (IS) is any organized system for the collection, organization, storage and communication of information

11
New cards

application program

An application program is a computer program designed to support a specific task, a business process or another application program

12
New cards

data, information, knowledge

Data – elementary description of things, events, activities, and transactions that are recorded, classified and stored but not organized to convey any specific meaning

Information – data that have been organized so they have meaning and value to the recipient

Knowledge – data and/or information that have been organized and processed to convey understanding, experience, accumulated learning, and expertise as they apply to a current business problem

13
New cards

Homo Conexus

Homo Conexus – connected humans (we are the most connected generation in history, we practice continuous computing and are surrounded by a personal, movable information network at all times)

14
New cards

A computer based information system (CBIS)

A computer based information system (CBIS) is an information system that uses computer technology to perform some or all its intended tasks. Most of ISs today are computerized.

15
New cards

Hardware

Hardware consists of devices such as processor, monitor, keyboard, and printer. Together, these devices accept, process and display data and information.

16
New cards

Software

Software is a program or a collection of programs that enable hardware to process data.

17
New cards

A database

A database is a collection of related files and tables containing data.

18
New cards

A network

A network is a connecting system (wireline or wireless) that permits different computers to share resources.

19
New cards

Procedures

Procedures are instructions for combining the above components to process information and generate the desired output.

20
New cards

People

People are those individuals who use the hardware and software, interface with it, or utilize its output

21
New cards

Open-source

Open-source – represents software for which the original source code is made freely available and may be redirected and modified (essential for uploading)

22
New cards

Outsourcing (≠ insourcing, offshoring

Outsourcing (≠ insourcing) – business practice of hiring a party outside a company to perform services and create goods that traditionally were performed by the company’s employees and staff, it is a cost-cutting measure

Adv.: good value, lots of experience, English spoken, decent culture fit

Disadv.: massive attrition (reduction in workforce without firing or layoff), hard to find experienced workers among juniors, communication issues (use different meanings), quality issues, long trips.

Offshoring - the process of relocating the business operations unit (production or services) to a different country (usually in developing nations) where cheap labor or resources are available Industry

One general worry about IT/AI graduates (not-specific to India): People choose that profession because it is „advertised“/well-paid not because they are interested/talented in the field.

23
New cards

Business pressures

The business environment is a combination of social, legal, economic, physical and political factors in which businesses conduct their operations. Changes in any of these factors can create business pressures on organizations. Organizations respond to these pressures with activities supported by IT.

1. Market pressures are generated by global economy (globalization), intense competition, the changing nature of the workforce (increasing number of women, single parents, minorities… are employed, work from home), and powerful customers (consumer sophistication and expectations increase with knowledgeableness).

2. Technological pressures include Technological innovation and obsolescence (improved technologies rapidly create or support substitutes for products, alternative service options, and superb quality; as a result today’s best can become obsolete tomorrow), and Information overload (internet and other telecommunications networks are bringing a flood of information to managers, to make effective and efficient decisions they must be able to access, navigate, and utilize data, information, and knowledge; IT provides support in these efforts.)

3. Societal, political, legal pressures include social responsibility (spending time and money to address various social problems), government regulation, spending for social programs and to protect against terrorism, and ethics (ethical issues).

<p>The business environment is a combination of social, legal, economic, physical and political factors in which businesses conduct their operations. Changes in any of these factors can create business pressures on organizations. Organizations respond to these pressures with activities supported by IT. </p><p>1. Market pressures are generated by global economy (globalization), intense competition, the changing nature of the workforce (increasing number of women, single parents, minorities… are employed, work from home), and powerful customers (consumer sophistication and expectations increase with knowledgeableness). </p><p>2. Technological pressures include Technological innovation and obsolescence (improved technologies rapidly create or support substitutes for products, alternative service options, and superb quality; as a result today’s best can become obsolete tomorrow), and Information overload (internet and other telecommunications networks are bringing a flood of information to managers, to make effective and efficient decisions they must be able to access, navigate, and utilize data, information, and knowledge; IT provides support in these efforts.) </p><p>3. Societal, political, legal pressures include social responsibility (spending time and money to address various social problems), government regulation, spending for social programs and to protect against terrorism, and ethics (<u>ethical issues</u>).</p>
24
New cards

social responsibility, policy recommendations

knowt flashcard image
25
New cards

Software

● Computer programs that are sequences or instructions for the hardware to provide business value.

● Includes documentation: written description of the program’s functions. Crucial for knowledge how the program works.

26
New cards

Types of Software

System software

Application software

● Systems software: instructions that are an intermediary between hardware and application programs. (Self-regulatory functions – loading itself…)

o OS: supervises the overall operation of the computer. Interface between user and hardware. Manage the actual computer resources.

Functions: Multitasking and Multiprogramming, Multithreading, Multiprocessing, Virtual memory, GUI

● Application software: instructions to users and direct computer system to perform specific information-processing activities. Provides info for the users.

o Off-the-shelf: purchased from vendor, customizable (Personal application software)

Pros: Lower initial cost, ok for basic business needs, high quality

Cons: Features behind paywall, no customization, might not fit process o Package/software suite: group of programs purchasable from vendors

o Proprietary software: purchased software with restrictions on use, copying and modification. Closed-source.

Pros: No redundant feature, involvement in developing, modifications

Cons: Long and expensive development, lack of in-house support…

o Cloud computing: online, convenient, on-demand, pay-as-you-go computing

SaaS (Software as a service): ready to use application software made available through a web browser (Google Docs)

PaaS (Platform as a Service): a hosting platform for custom software development (Scratch)

IaaS (Infrastructure as a Service): internet access to raw infrastructure (Servers, VMs, Storage…) (Microsoft Azure)

Pros: On demand self-service, single IT environment, modularity, broad network access, pools network resources.

<p><span data-name="black_medium_square" data-type="emoji">◼</span> System software</p><p><span data-name="black_medium_square" data-type="emoji">◼</span> Application software</p><p>● Systems software: instructions that are an intermediary between hardware and application programs. (Self-regulatory functions – loading itself…) </p><p>        o OS: supervises the overall operation of the computer. Interface between user and hardware. Manage the actual computer resources. </p><p>                <span data-name="black_small_square" data-type="emoji">▪</span> Functions: Multitasking and Multiprogramming, Multithreading, Multiprocessing, Virtual memory, GUI </p><p>● Application software: instructions to users and direct computer system to perform specific information-processing activities. Provides info for the users.         </p><p>        o Off-the-shelf: purchased from vendor, customizable (Personal application software) </p><p>                <span data-name="black_small_square" data-type="emoji">▪</span> Pros: Lower initial cost, ok for basic business needs, high quality </p><p>                <span data-name="black_small_square" data-type="emoji">▪</span> Cons: Features behind paywall, no customization, might not fit process o Package/software suite: group of programs purchasable from vendors </p><p>        o Proprietary software: purchased software with restrictions on use, copying and modification. Closed-source. </p><p>                <span data-name="black_small_square" data-type="emoji">▪</span> Pros: No redundant feature, involvement in developing, modifications </p><p>                <span data-name="black_small_square" data-type="emoji">▪</span> Cons: Long and expensive development, lack of in-house support… </p><p>        o Cloud computing: online, convenient, on-demand, pay-as-you-go computing </p><p>                <span data-name="black_small_square" data-type="emoji">▪</span> SaaS (Software as a service): ready to use application software made available through a web browser (Google Docs) </p><p>                <span data-name="black_small_square" data-type="emoji">▪</span> PaaS (Platform as a Service): a hosting platform for custom software development (Scratch) </p><p>                <span data-name="black_small_square" data-type="emoji">▪</span> IaaS (Infrastructure as a Service): internet access to raw infrastructure (Servers, VMs, Storage…) (Microsoft Azure) </p><p>                <span data-name="black_small_square" data-type="emoji">▪</span> Pros: On demand self-service, single IT environment, modularity, broad network access, pools network resources.</p>
27
New cards

Case of Nokia

- Went bankrupt because it didn’t adapt to changes

- It had the best hardware equipment & transmition of voice (phone calls) - relying on hardware

- Phones are now not just used for phone calls: more like computers - software become more IMPORTANT

28
New cards

Different approaches for software development:

1. Buy & Install: cheaper

2. Develop Software: suits specific needs

- have own programmes

- ex. Student-net is contract software developed for EF (why not buy? specific needs, if not they can buy it)

3. Cloud Software: subscription fee

- rent & use from cloud

- ex. Google: use over internet, you don’t need to install it

- + you don’t have to pay, + no need to install

4. Open Source Software:

- + allowed and able to change the code, + usually free

- - not as good as the one you buy

- ex. Zinux, Open Office

29
New cards

TG2.2 Systems Software

- System control programs (Android, iOS)

- Operating systems: operating equipment (Windows, Linux, OS X) - Functions of the Operating System: Multitasking/multiprogramming, Multithreading, Multiprocessing, Virtual Memory, Graphical user interface (GUI)

<p>- System control programs (Android, iOS) </p><p>- Operating systems: operating equipment (Windows, Linux, OS X) - Functions of the Operating System: Multitasking/multiprogramming, Multithreading, Multiprocessing, Virtual Memory, Graphical user interface (GUI)</p>
30
New cards

Functions of the Operating System

Multitasking/multiprogramming

Multithreading

Multiprocessing

Virtual Memory

Graphical user interface (GUI)

31
New cards
<p>Application software</p>

Application software

Personal application software

<p>Personal application software</p>
32
New cards
<p>TG2.3 Application Software : how to get it</p>

TG2.3 Application Software : how to get it

Proprietary application software
Contract software

Off-the-shelf application software

Package

Cloud „software“ (software-as-a-service)

<p><span data-name="black_medium_square" data-type="emoji">◼</span> Proprietary application software <br><span data-name="black_medium_square" data-type="emoji">◼</span> Contract software </p><p><span data-name="black_medium_square" data-type="emoji">◼</span> Off-the-shelf application software </p><p><span data-name="black_medium_square" data-type="emoji">◼</span> Package </p><p><span data-name="black_medium_square" data-type="emoji">◼</span> Cloud „software“ (software-as-a-service)</p>
33
New cards

Software Issues

- Software defects

- Software evaluation and selection

- Software licensing

- Open systems

- Open source software/free software2

34
New cards
<p>programming languages at a glance</p>

programming languages at a glance

Programming is carried out in a programming language

→ Programming languages tend to be grouped in generations according to their chronological development:

1 st generation: machine languages

2 nd generation: assembler languages

3 rd generation: higher programming languages

4 th generation: 4GL language and alternative programming languages

Machine languages and assembler languages are machine-based languages

 The CPU can only process machine language

→ Machine languages

 All commands and operators are encoded in binary (in ones and zeros)

 Each machine language is specifically designed for the processor

 Hard to read and prone to errors

→ Assembler languages

 Allow the user to write in simple, easy to remember abbreviations …

 … which are translated into machine code by an assembler

 Also designed to work with a specific processor

→ Higher level programming languages allow more abstract commands and are not dependent on a specific processor (referred to as problem-based languages)

→ The translation of higher programming languages into a machine language is done by a translator, e.g., a compiler

4GL languages

→ Allow the programmer to write programs using very few commands and without requiring a deep knowledge of programming

→ One example is the database language SQL (Structured Query Language)

 SQL compresses long program codes by using concise commands Example: SELECT statement (also see “Database Systems”)

Alternative programming languages

→ Designed to work in specific contexts, such as artificial intelligence (AI) languages, visual languages, etc.

IDEs (Integrated Development Environments)

 Comprise a number of functions which aid in using complex programming languages

 Focus on the programming activity

CASE tools

 A set of tools which supports the entire software development process (e.g., tools for modelling processes as part of the status-quo analysis)

 CASE tools are particularly effective in object-oriented software engineering

<p>Programming is carried out in a programming language </p><p>→ Programming languages tend to be grouped in generations according to their chronological development: </p><p>1 st generation: machine languages </p><p>2 nd generation: assembler languages </p><p>3 rd generation: higher programming languages </p><p>4 th generation: 4GL language and alternative programming languages</p><p>→ <strong>Machine languages</strong> and <strong>assembler languages</strong> are <strong>machine-based languages</strong> </p><p> The CPU can only process machine language </p><p>→ Machine languages</p><p>  All commands and operators are encoded in binary (in ones and zeros)</p><p>  Each machine language is specifically designed for the processor </p><p> Hard to read and prone to errors </p><p>→ Assembler languages </p><p> Allow the user to write in simple, easy to remember abbreviations … </p><p> … which are translated into machine code by an assembler</p><p>  Also designed to work with a specific processor</p><p>→ Higher level programming languages allow more abstract commands and are <strong>not dependent</strong> on a specific processor (referred to as <strong>problem-based languages</strong>) </p><p>→ The translation of higher programming languages into a machine language is done by a <strong>translator</strong>, e.g., a <strong>compiler</strong></p><p><strong>4GL languages</strong> </p><p>→ Allow the programmer to write programs using very few commands and without requiring a deep knowledge of programming </p><p>→ One example is the database language SQL (Structured Query Language)</p><p>  SQL compresses long program codes by using concise commands Example: SELECT statement (also see “Database Systems”) </p><p> <strong>Alternative programming languages</strong> </p><p>→ Designed to work in specific contexts, such as artificial intelligence (AI) languages, visual languages, etc.</p><p><strong> IDEs (Integrated Development Enviro</strong>nments) </p><p> Comprise a number of functions which aid in using complex programming languages </p><p> Focus on the programming activity </p><p><strong>CASE tools</strong> </p><p> A set of tools which supports the entire software development process (e.g., tools for modelling processes as part of the status-quo analysis) </p><p> CASE tools are particularly effective in object-oriented software engineering</p>
35
New cards

Programming Languages

knowt flashcard image
36
New cards
<p>Cloud software (and also hardware)</p>

Cloud software (and also hardware)

Note

<p>Note</p>
37
New cards

Programming – old languages

A scary story (read this from April, 5 2020)

„Computer languages don’t “die”, they just go to sleep.“

The coronavirus crisis has sparked all manner of unexpected consequences, including the Tokyo summer Olympics being postponed and auto insurers reaping extra profits as people stay home. In New Jersey, it’s resulted in something that few people outside that state’s tech department would have foreseen: a dire need for COBOL coders.

Standing for Common Business-Oriented Language, COBOL initially made a splash by giving coders a programming language that could work across the proprietary computers of multiple manufacturers. That was in the early 1960s. After becoming a staple of mainframes, it eventually came to represent dusty legacy code, including during the Y2K crisis 20 years ago. Despite this it’s still widely used to support many business systems, including ATMs and credit card networks, and the developers involved do need COBOL skills.

In New Jersey, experts are now needed to fix COBOL-based unemployment insurance systems that are overwhelmed due to pandemic-related job losses. At a press conference yesterday, governor Phil Murphy asked for the help of volunteer coders who know how to work in COBOL.

Of course, as cyber-security expert Joseph Steinberg noted on his blog, many such volunteers would likely be elderly, making them especially vulnerable to Covid-19. Whether they would risk venturing out (or work on a volunteer basis, for that matter) to fix creaky systems is an open question.

Meanwhile, New Jersey residents are clamoring about delays on their unemployment claims. The state recently experienced a 1,600% increase in claims volume in a single week, said labor commissioner Robert Asaro-Angelo during yesterday’s briefing (video below, at 46:35), noting that “over the prior two weeks we saw more than 362,000 people apply for unemployment as a result of this public health emergency.”

He added, “We’ve made no secrets about the inflexibility of our legacy technology.”

This piece has been updated to clarify that COBOL remains in wide use in many systems today, despite being considered a legacy language. 

38
New cards

Software – summary of the main principles

Systems and application software are critical in helping individuals and organizations achieve their goals.

Organizations use off-the-shelf application software for common business needs and proprietary application software to meet unique business needs and provide a competitive advantage.

Organizations should choose programming languages with functional characteristics that are appropriate for the task at hand and well suited to the skills and experience of the programming staff.

The software industry continues to undergo constant change; users need to be aware of recent trends and issues to be effective in their business and personal life

39
New cards

SOFTWARE

Computer hardware is only as effective as the instructions you give it. Those instructions are contained in software. Software consists of computer programs, which are sequences of instructions for the computer. The process of writing or coding programs is called programming. Individuals who perform this task are called programmers. Computer programs include documentation, which is a written description of the program’s functions. Documentation helps the user operate the computer system, and it helps other programmers understand what the program does and how it accomplishes its purpose. Documentation is vital to the business organization. Without it, the departure of a key programmer or user could deprive the organization of the knowledge of how the program is designed and functions. The computer can do nothing until it is instructed by software. Software enables the user to instruct the hardware to perform specific functions that provide business value. There are two major types of software: systems software and application software.

40
New cards

Systems software

System software is a set of instructions that serves primarily as an intermediary between computer hardware and application programs. Systems software enables computer systems to perform self-regulatory functions by loading itself when the computer is first turned on and providing commonly used sets of instructions for all applications. The programs contained in systems software control and support the computer system and its information-processing activities. Systems programming refers to both the creation and the maintenance of systems software. The operating system (OS) is the “director” of your computer system’s operations. It super-vises the overall operation of the computer by monitoring the computer’s status, scheduling operations, and managing input and output processes. Well-known desktop operating systems include Microsoft Windows, Apple Mac OS X, Linux, and Google Chrome. The operating system also provides an interface between the user and the hardware. This user interface hides the complexity of the hardware from the user. That is, you do not have to know how the hardware actually operates; you simply have to know what the hardware will do and what you need to do to obtain the desired results. Operating systems manage the actual computer resources (the hardware). They schedule and process applications (jobs); manage and protect memory; manage the input and output functions and hardware; manage data and files; and provide security, fault tolerance, graphical user interfaces, and windowing. Functions of the Operating System: - Multitasking and multiprogramming - Multithreading - Multiprocessing - Virtual memory - Graphical user interface (GUI) – allows users to directly control the hardware by manipulating visible objects (such as icons) and actions that replace complex commands

41
New cards

Application software

Application software is a set of computer instructions that provide more specific functionality to a user and direct a computer system to perform specific information-processing activities and also to provide functionality for users. This functionality may be broad, such as general word processing, or narrow, such as an organization’s payroll program. Essentially, an application program applies a computer to a certain need. Application programming refers to the creation, modification, and improvement of application software. Application software may be proprietary or off-the-shelf. How to get application software? - Proprietary application software - Contract software - Off-the-shelf application software - Package - Cloud “software” (software-as-a-service) Application software may be developed in-house by the organization’s information systems personnel, or it may be commissioned from a software vendor. Alternatively, the software can be purchased, leased, or rented from a vendor that develops applications and sells them to many organizations. This “off-the-shelf” software may be a standard package, or it may be customizable. A package, or software suite, is a group of programs with integrated functions that has been developed by a vendor and is available for purchase in a prepackaged form. Microsoft Office is a well-known example of a package, or software suite. Off-the-shelf application programs designed to help individual users increase their productivity are referred to as personal application software. (Word processing, spreadsheet, database, graphics, project management, financial management, desktop publishing) Proprietary software is purchased software that has restrictions on its use, copying, and modification. They are usually closed-source, meaning the developer does not provide the source code to anyone outside the company. Software consists of computer programs (coded instructions) that control the functions of computer hardware. There are two main categories of software: systems software and application software. Systems software manages the hardware resources of the computer system; it functions between the hardware and the application software. The major type of systems software is the operating system. Application software enables users to perform specific tasks and informationprocessing activities. Application software may be proprietary or off-the-shelf.

42
New cards

Cloud Computing

Cloud computing is a type of computing that delivers convenient, on-demand, pay-as-you-go access for multiple customers to a shared pool of configurable computing resources (e.g., servers, networks, storage, applications, and services) that can be rapidly and easily accessed over the Internet. Cloud computing allows customers to acquire resources at any time and then delete them the instant they are no longer needed. Today, organizations and individuals can use the power of cloud computing. Cloud computing provides access to a shared pool of computing resources, including computers, storage, applications, and services, over a network, typically the Internet. Advantages of Cloud Computing: - Provides on-demand self-service - Pools various hardware and software components to create a single IT environment with shared resources - Makes computing resources and infrastructure management available to a customer as needed - Utilizes broad network access - Pools computing resources

43
New cards

Programming languages

A programming language is a formal language comprising a set of instructions that produce various kinds of output. Programming languages are used in computer programming to implement algorithms. Most programming languages consist of instructions for computers. Most commonly used languages are Java and C language. Organizations should choose programming languages with functional characteristics that are appropriate for the task at hand and well suited to the skills and experience of the programming staff.

44
New cards

Software Issues

The importance of software in computer systems has brought new issues to the forefront for organizational managers. These issues include software defects (bugs), licensing, open systems, and opensource software. Software defects: All too often, computer program code is inefficient, poorly designed, and riddled with errors. As our dependence on computers and networks increases, the risks associated with software defects are becoming more serious. The problem is enormous, and the industry is taking only initial steps to resolve it. Software licensing: Many people routinely copy proprietary software. However, making copies without the manufacturer’s explicit permission—a practice known as piracy—is illegal. To protect their investment, software vendors must prevent their products from being copied and distributed by individuals and other software companies. A company can copyright its software, which means that the Copyright Office grants the company the exclusive legal right to reproduce, publish, and sell that software. Open systems: The open systems concept refers to a group of computing products that work together. In an open system, the same operating system with compatible software is installed on all computers that interact within an organization. A complementary approach is to employ application software that will run across all computer platforms. Where hardware, operating systems, and application software are all designed as open systems, users can purchase the best software, called best of breed, for a job without worrying whether it will run on particular hardware. Open-source software: In contrast, the source code for open-source software is available at no cost to both developers and users. This software is distributed with license terms that ensure that its source code will always be available. Open-source development produces high-quality, reliable, low-cost software. This software is also flexible, meaning that the code can be changed to meet users’ needs. Because the code is available to many developers, more bugs are discovered early and quickly, and they are fixed immediately. However, companies that use open-source software depend on the continued good will of an army of volunteers for enhancements, bug fixes, and so on, even if they have signed a contract that includes sup-port. Further, organizations that do not have in-house technical experts will have to purchase maintenance-support contracts from a third party. In addition, open-source software poses questions concerning ease of use, the time and expense needed to train users, and compatibility with existing systems either within or outside the organization. Software evaluation and selection: A software evaluation is a type of assessment that seeks to determine if software or a combination of software programs is the best possible fit for the needs of the company. Program evaluation is a valuable tool for program managers who are seeking to strengthen the quality of their programs and improve outcomes for the children and youth they serve. Program evaluation answers basic questions about a program's effectiveness, and evaluation data can be used to improve program services.

45
New cards

Computers Want to be Helpful...

• Computers are built for one purpose - to do things for us

• But we need to speak their language to describe what we want done

• Users have it easy - someone already put many different programs (instructions) into the computer and users just pick the ones they want to use

46
New cards

Introduction

Hardware refers to the physical equipment used for the input, processing, output and storage activities of a computer system.

<p><strong>Hardware</strong> refers to the physical equipment used for the input, processing, output and storage activities of a computer system.</p>
47
New cards

Hardware consists of:

Central processing unit (CPU): Runs the Program - The CPU is always wondering “what to do next”. Not the brains exactly - very dumb but very very fast. Manipulates the data and controls the tasks performed by the other components.

Primary storage: Fast small temporary storage - lost on reboot - aka RAM. Temporarily stores data and program instructions during processing.

• Secondary storage: Slower large permanent storage - lasts until deleted - disk drive / memory stick. Stores data and programs for future use.

• Input technologies: Keyboard, Mouse, Touch Screen. Accept data and instructions and convert them to a form that the computer can understand.

Output technologies: Screen, Speakers, Printer, DVD Burner

Communication technologies - Provide for the flow of data from external computer networks (e.g., the Internet and intranets) to the CPU, and from the CPU to computer networks.

48
New cards

Generic computer – Von Neumann architecture

knowt flashcard image
49
New cards

The Central Processing Unit

Central processing unit (CPU) performs the actual computation or “number crunching” inside any computer.

50
New cards

• Microprocessor

• Control unit (Fetching and decoding data from the RAM)

• Arithmetic-logic unit (ALU) (Performing arithmetic/ logic operations)

• Registers

<p>• Control unit (Fetching and decoding data from the RAM) </p><p>• Arithmetic-logic unit (ALU) (Performing arithmetic/ logic operations) </p><p>• Registers</p>
51
New cards

How the CPU Works

• Binary form

• Machine instruction cycle

• Clock speed

• Word length

• Bus width

• Line width

<p>• Binary form </p><p>• Machine instruction cycle </p><p>• Clock speed </p><p>• Word length </p><p>• Bus width </p><p>• Line width</p>
52
New cards
<p>Moore‘s Law</p>

Moore‘s Law

"The number of transistors on a computer chip will double every 18 months"

<p>"The number of transistors on a computer chip will double every 18 months"</p>
53
New cards

Evolution of Computer Power/Cost

knowt flashcard image
54
New cards

Sidenote: singularity (jedinstvenost)

Technological singularity, a hypothetical moment in time when artificial intelligence will have progressed to the point of a greater-than-human intelligence

55
New cards

Memory Capacity

• Bit

• Byte

56
New cards

Hierarchy of Memory Capacity

• Kilobyte

• Megabyte

• Gigabyte

• Terabyte

• Petabyte

• Exabyte

• Zettabyte

57
New cards

Computer Memory

Two basic categories of computer memory:

• Primary Storage

• Secondary Storage

58
New cards

Primary Storage

Primary storage or main memory stores three types of information for very brief periods of time:

• Data to be processed by the CPU;

• Instructions for the CPU as to how to process the data;

• Operating system programs that manage various aspects of the computer’s operation.

- Primary storage takes place in chips mounted on the computer’s main circuit board, called the motherboard.

59
New cards

Main Types of Primary Storage

• Registers

• Random access memory (RAM)

• Cache memory

• Read-only memory (ROM)

<p>• Registers</p><p>• Random access memory (RAM)</p><p>• Cache memory</p><p>• Read-only memory (ROM)</p>
60
New cards

Secondary storage

Secondary storage (also known as external memory or auxiliary storage), differs from primary storage in that it is not directly accessible by the CPU. The computer usually uses its input/output channels to access secondary storage and transfer the desired data to primary storage. Secondary storage is non-volatile (retaining data when power is shut off). Modern computer systems typically have two orders of magnitude more secondary storage than primary storage because secondary storage is less expensive.

In modern computers, hard disk drives (HDDs) or solid-state drives (SSDs) are usually used as secondary storage. The access time per byte for HDDs or SSDs is typically measured in milliseconds (one thousandth seconds), while the access time per byte for primary storage is measured in nanoseconds (one billionth seconds). Thus, secondary storage is significantly slower than primary storage. Rotating optical storage devices, such as CD and DVD drives, have even longer access times. Other examples of secondary storage technologies include USB flash drives, floppy disks, magnetic tape, paper tape, punched cards, and RAM disks.

- Memory capacity that can store very large amounts of data for extended periods of time.

- Magnetic tape (sequential access)

- Magnetic disks (direct access)

<p>Secondary storage (also known as external memory or auxiliary storage), differs from primary storage in that it is not directly accessible by the CPU. The computer usually uses its input/output channels to access secondary storage and transfer the desired data to primary storage. Secondary storage is non-volatile (retaining data when power is shut off). Modern computer systems typically have two orders of magnitude more secondary storage than primary storage because secondary storage is less expensive.</p><p>In modern computers, hard disk drives (HDDs) or solid-state drives (SSDs) are usually used as secondary storage. The access time per byte for HDDs or SSDs is typically measured in milliseconds (one thousandth seconds), while the access time per byte for primary storage is measured in nanoseconds (one billionth seconds). Thus, secondary storage is significantly slower than primary storage. Rotating optical storage devices, such as CD and DVD drives, have even longer access times. Other examples of secondary storage technologies include USB flash drives, floppy disks, magnetic tape, paper tape, punched cards, and RAM disks.</p><p>- Memory capacity that can store very large amounts of data for extended periods of time. </p><p>- Magnetic tape (sequential access) </p><p>- Magnetic disks (direct access)</p>
61
New cards

Why understanding history is important?

Electronic archiving!

Legacy systems! - in operations - »out-of-date« hardware

62
New cards

Hardware – legacy issues

for example: Agencies reported using several systems that have components that are, in some cases, at least 50 years old. For example, Department of Defense uses 8- inch floppy disks in a legacy system that coordinates the operational functions of the nation's nuclear forces. In addition, Department of the Treasury uses assembly language code—a computer language initially used in the 1950s and typically tied to the hardware for which it was developed.

<p>for example: Agencies reported using several systems that have components that are, in some cases, at least 50 years old. For example, Department of Defense uses 8- inch floppy disks in a legacy system that coordinates the operational functions of the nation's nuclear forces. In addition, Department of the Treasury uses assembly language code—a computer language initially used in the 1950s and typically tied to the hardware for which it was developed.</p>
63
New cards

Optical storage devices:

A form of secondary storage in which a laser reads the surface of a reflective plastic platter.

- Compact Disk, Read-Only Memory (CD-ROM)

- Digital Video Disk (DVD)

64
New cards

Flash Memory Devices

- Flash memory

- Flash memory devices

- Thumb drive

65
New cards

Enterprise Storage Systems

• Enterprise storage system: An independent, external system with intelligence that includes two or more storage devices.

Three types of enterprise storage:

• Redundant Arrays of Independent Disks (RAID: http://en.wikipedia.org/wiki/RAID)

• Storage Area Network (SAN)

• Network Attached Storage (NAS)

66
New cards

A business challenge connected to hardware!

Allow Bring-Your-Own-Device (BYOD) or not?

According to Gartner’s numbers, 47 percent of today’s businesses use containerization, 30 percent embrace BYOD, 15 percent block it, and 8 percent ignore it. But what’s more interesting are Gartner’s projections for how the next three years will shape up: The embrace model will double to 60 percent, containerization* will drop to around 38 percent, block will plummet to below 3 percent, and ignore will completely cease being an option.

* containerization: using tools to create an encrypted space or folder on the device to house more sensitive data and applications OR the use of hypervisors to effectively create a virtual phone within a phone…to split an employee device into two isolated segments for personal pursuits and work tasks.

BYOD: On the frontlines of BYOD and enterprise mobility we can see an obvious trend. We've all seen the headlines - the PC industry continues its steady decline, Intel's ditching the motherboard business and Gartner shows a 4Q12 4.9% decrease in PC shipments.

BYOD - disadvantages: Further reading: „Security boundaries must extend to personal devices to mitigate data exfiltration, thereby infringing on employees’ privacy by monitoring their personal devices. These monitoring mechanisms play a critical role in employee participation in a BYOD program.“ (Lee et al., 2017)

SIDENOTE: „A key issue of BYOD which is often overlooked is BYOD's phone number problem, which raises the question of the ownership of the phone number. The issue becomes apparent when employees in sales or other customer-facing roles leave the company and take their phone number with them. Customers calling the number will then potentially be calling competitors which can lead to loss of business for BYOD enterprises.[35]“

The most famous/notorious case of BYOD: The Democratic frontrunner in the race for the White House put the lives of numerous Americans at risk. And she did so by sending highly sensitive information from her private, unsecured email account U.S. spy agencies have told Congress that Hillary Clinton's home computer server contained some emails that should have been treated as "top secret„ Under the law and government rules, U.S. officials and contractors may not transmit any classified information - not only documents - outside secure, government-controlled channels.

67
New cards

Mobile Device Management - MDM

Mobile device management (MDM) is the mangement/administration of mobile devices, such as smartphones, tablet computers and laptops.

68
New cards

Input and Output Technologies

Input technologies allow people and other technologies to put data into a computer. The two main types of input devices are:

• human data-entry devices include keyboards, mouse, trackball, joystick, touchscreen, stylus and voice recognition;

source-data automation devices input data with minimal human intervention (e.g. barcode reader or RFID tag).

• Speed up data collection;

• Reduce errors;

• Gather data at the source of a transaction or other event.

• Output generated by a computer can be transmitted to the user over several output devices and media, which include:

• Monitors

• Printers

• Voice

69
New cards

Innovations in Hardware Utilization

- Server Farms

- Virtualization

- Utility computing

- Nanotechnology

- Cloud computing (https://www.youtube.com/watch?v=QJncFirhjPg, https://www.youtube.com/watch?v=SgujaIzkwrE, https://www.youtube.com/watch?v=uYGQcmZUTaw)

70
New cards

Do you need your own hardware after all? “You don't generate your own electricity, why generate your own computing?”

Cloud computing „You don't generate your own electricity, why generate your own computing?“ (attributed to Jeff Bezos, CEO of Amazon)

my: Simply put, cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.

<p>Cloud computing „You don't generate your own electricity, why generate your own computing?“ (attributed to Jeff Bezos, CEO of Amazon)</p><p>my: <span>Simply put, cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.</span></p>
71
New cards

3 ways to cloud computing:

- Software as a Service- SaaS

- Platform as a Service - PaaS

- Infrastructure as a Service- IaaS

72
New cards

Strategic Hardware Issues

• How do organizations keep up with the rapid price and performance advancements in hardware?

• How often should an organization upgrade its computers and storage systems?

• Will upgrades increase personal and organizational productivity?

• How can organizations measure such increase?

• How do organizations manage telecommuting?

73
New cards

Central Processing Unit (CPU)

The central processing unit (CPU) performs the actual computation or “number crunching” inside any computer. The CPU is a microprocessor made up of millions of microscopic transistors embedded in a circuit on a silicon wafer or chip. For this reason, microprocessors are commonly referred to as chips. Microprocessor has different parts, which perform different functions. The control unit sequentially accesses program instructions, decodes them, and controls the flow of data to and from the arithmeticlogic unit, the registers, the caches, primary storage, secondary storage, and various output devices. The arithmetic-logic unit (ALU) performs the mathematic calculations and makes logical comparisons. The registers are high-speed storage areas that store very small amounts of data and instructions for short periods. In the CPU, inputs enter and are stored until they are needed. At that point, they are retrieved and processed, and the output is stored and then delivered somewhere. The inputs consist of data and brief instructions about what to do with the data. These instructions come into the CPU from random access memory (RAM). Data might be entered by the user through the keyboard, for example, or read from a data file in another part of the computer. The inputs are stored in registers until they are sent to the next step in the processing. Data and instructions travel in the chip via electrical pathways called buses. The size of the bus—analogous to the width of a highway—determines how much information can flow at any time. The control unit directs the flow of data and instructions within the chip. The ALU receives the data and instructions from the registers and makes the desired computation. These data and instructions have been translated into binary form—that is, only 0s and 1s. The CPU can process only binary data. All types of data, such as letters, decimal numbers, photographs, music, and so on, can be converted to a binary representation, which can then be processed by the CPU. The data in their original form and the instructions are sent to storage registers and then are sent back to a storage place outside the chip, such as the computer’s hard drive. Meanwhile, the transformed data go to another register and then on to other parts of the computer (to the monitor for display or to storage, for example).

74
New cards

Computer Memory

There are two basic categories of computer memory. The first is primary storage. It is called “primary” because it stores small amounts of data and information that the CPU will use immediately. The second category is secondary storage, which stores much larger amounts of data and information (an entire software program, for example) for extended periods. Memory Capacity: CPUs process only binary units—0s and 1s—which are translated through computer languages into bits. A particular combination of bits represents a certain alphanumeric character or a simple mathematical operation. Eight bits are needed to represent any one of these characters. This 8-bit string is known as a byte. The storage capacity of a computer is measured in bytes. Bits typically are used as units of measure only for telecommunications capacity, as in how many million bits per second can be sent through a particular medium. - Kilobyte is approximately 1,000 bytes. Actually, a kilobyte is 1,024 bytes. - Megabyte is approximately 1 million bytes. - Gigabyte is approximately 1 billion bytes. - Terabyte is approximately 1 trillion bytes. - Petabyte is approximately 1,000 terabytes. - Exabyte is approximately 1,000 petabytes. - Zettabyte is approximately 1,000 exabytes.

75
New cards

Primary Storage

Primary storage or main memory stores three types of information for very brief periods of time: - Data to be processed by the CPU - Instructions for the CPU as to how to process the data - Operating system programs that manage various aspects of the computer’s operation Primary storage takes place in chips mounted on the computer’s main circuit board, called the motherboard. The four main types of primary storage are register, cache memory, random access memory (RAM), and read-only memory (ROM). Registers are part of the CPU. They have the least capacity, storing extremely limited amounts of instructions and data only immediately before and after processing. Cache memory is a type of high-speed memory that enables the computer to temporarily store blocks of data that are used more often and that a processor can access more rapidly than main memory (RAM). Cache memory is physically located closer to the CPU than RAM. Blocks that are used less often remain in RAM until they are transferred to cache; blocks used infrequently remain in secondary storage. Cache memory is faster than RAM because the instructions travel a shorter distance to the CPU. Random access memory (RAM) is the part of primary storage that holds a software program and small amounts of data for processing. When you start most software programs (such as Microsoft Word) on your computer, the entire program is brought from secondary storage into RAM. As you use the program, small parts of the program’s instructions and data are sent into the registers and then to the CPU. Compared with the registers, RAM stores more information and is located farther away from the CPU. However, compared with secondary storage, RAM stores less information and is much closer to the CPU. RAM is temporary and, in most cases, volatile—that is, RAM chips lose their contents if the current is lost or turned off, as from a power surge, brownout, or electrical noise generated by lightning or nearby machines. Read-only memory (ROM) is the place—actually, a type of chip—where certain critical instructions are safeguarded. ROM is nonvolatile, so it retains these instructions when the power to the computer is turned off. The read-only designation means that these instructions can only be read by the computer and cannot be changed by the user. An example of ROM is the instructions needed to start or “boot” the computer after it has been shut off.

76
New cards

Secondary Storage

Secondary storage (also known as external memory or auxiliary storage), differs from primary storage in that it is not directly accessible by the CPU. The computer usually uses its input/output channels to access secondary storage and transfer the desired data to primary storage. Secondary storage is non-volatile (retaining data when power is shut off). Modern computer systems typically have two orders of magnitude more secondary storage than primary storage because secondary storage is less expensive. Secondary storage is designed to store very large amounts of data for extended periods. It takes more time to retrieve data from it than from RAM, is cheaper than primary storage, and can utilize a variety of media, each with its own technology. In modern computers, hard disk drives (HDDs) or solid-state drives (SSDs) are usually used as secondary storage. Secondary storage is significantly slower than primary storage. Examples of secondary storage technologies include USB flash drives, floppy disks, magnetic tape, paper tape, punched cards, and RAM disks. Enterprise Storage Systems Enterprise Storage System is an independent, external system with intelligence that includes two or more storage devices. Three types of enterprise storage are Redundant Arrays of Independent Disks (RAID), Storage Area Network (SAN) and Network Attached Storage (NAS). BYOD (Bring-Your-Own-Device) BYOD is a term referring to a trend where employees are bringing or connecting their own computing devices to the workplace for use and connectivity on the secure corporate network. Advantages: lower costs, increases trust, better customer service, increases employee engagement Disadvantages: security issues, more vulnerable to damage, loss and theft The inherent risks of a bring your own device policy has given rise to mobile device management (MDM) software used by an IT department to monitor, manage, and secure employees' laptops, smartphones, tablets, and other devices that are being used in the workplace. Mobile device management (MDM) is the management/administration of mobile devices, such as smartphones, tablet computers and laptops.

77
New cards

Input and Output Technologies

Input technologies allow people and other technologies to enter data into a computer. The two main types of input devices are human data-entry devices and source-data automation devices. Human data-entry devices require a certain amount of human effort to input data and include keyboards, mouse, trackball, joystick, touchscreen, stylus and voice recognition. Source-data automation devices input data with minimal human intervention (e.g. barcode reader or RFID tag). These technologies speed up data collection, reduce errors, and gather data at the source of a transaction or other event. The output generated by a computer can be transmitted to the user via several output devices and media. These devices include monitors, printers, plotters, and voice.

78
New cards

Opening stories

knowt flashcard image
79
New cards

What is a business process

”a collection of activities that take one or more kinds of input and create an output that is of value to the customer” [Hammer & Champy 1993]

”a set of logically related tasks performed to achieve a defined business outcome for a particular customer or market” [Davenport 1992]

A business process is as a collection of inter-related events, activities, and decision points that involve a number of actors and objects, which collectively lead to an outcome that is of value to at least one customer (Dumas et al. 2018).

A business process is a collection of related, structured activities or tasks that produce a specific service or product (serve a particular goal) for a particular customer or customers

<p>”a collection of activities that take one or more kinds of input and create an output that is of value to the customer” [Hammer &amp; Champy 1993] </p><p>”a set of logically related tasks performed to achieve a defined business outcome for a particular customer or market” [Davenport 1992]</p><p> A business process is as a collection of inter-related events, activities, and decision points that involve a number of actors and objects, which collectively lead to an outcome that is of value to at least one customer (Dumas et al. 2018).</p><p>A <strong>business process</strong> is a collection of related, structured activities or tasks that produce a specific service or product (serve a particular goal) for a particular customer or customers</p>
80
New cards

Business process

Each company is composed of several business processes; their understanding and improvement is crucial for survival and success of the company

81
New cards

Process

a particular course of action intended to achieve a result

<p>a particular course of action intended to achieve a result</p>
82
New cards

Business processes

• Business processes are a complex interplay of activities, therefore business process modeling is usually needed:

• A process model is developed and analyzed

<p>• Business processes are a complex interplay of activities, therefore business process modeling is usually needed:</p><p>• A process model is developed and analyzed</p>
83
New cards

Business processes are everywhere:

- Products and services are provided by activities

- Execution of activities requires coordination

- Success of this coordination influences costs, time, and quality of products and services

- Includes several departments

- Hammer & Champy: a collection of activities that take one or more kinds of input and create an output that is of value to the customer.

- Davenport: a set of logically related tasks performed to achieve a defined business outcome for a particular customer or market.

84
New cards
<p>What is business process <strong>management </strong>- definition</p>

What is business process management - definition

BPM can be defined as all efforts in an organization to analyze and continually improve fundamental activities such as manufacturing, marketing, communications and other major elements of company’s operations (adapted from Zairi, 1997)

- Continually improving he process within the organization

- See the bigger picture:

1. Modelling

2. Execution: either electronically or with IT support or manually

3. Monitoring (Measuring): Measure how a process is being executed (how many mistakes are there in the process average stock level, how many activities does one employee do…)

4. Optimization (Improvement): when 1,2,3, you can optimize/improve the process

5. Design

BPM is a body of methods, techniques, and tools to identify, discover, analyze, redesign, execute, and monitor business processes in order to optimize their performance (Dumas et al. 2018).

<p>BPM can be defined as all efforts in an organization to analyze and continually improve fundamental activities such as manufacturing, marketing, communications and other major elements of company’s operations (adapted from Zairi, 1997)</p><p>- Continually improving he process within the organization</p><p>- See the bigger picture:</p><p>1. Modelling </p><p>2. Execution: either electronically or with IT support or manually </p><p>3. Monitoring (Measuring): Measure how a process is being executed (how many mistakes are there in the process average stock level, how many activities does one employee do…) </p><p>4. Optimization (Improvement): when 1,2,3, you can optimize/improve the process </p><p>5. Design</p><p>BPM is a body of methods, techniques, and tools to identify, discover, analyze, redesign, execute, and monitor business processes in order to optimize their performance (Dumas et al. 2018).</p>
85
New cards

The importance of business process management

You should improve the process first and then develop a proper IS

86
New cards

Business process modeling

Business process modeling is the graphical representation of a company's business processes or workflows, as a means of identifying potential improvements. This is usually done through different graphing methods, such as the flowchart, data-flow diagram, etc.

87
New cards

Benefits of BPM:

- BPM positively influences financial and non-financial performance of companies; early-adopters of BPM will get competitive advantage.

- Reduction of lead times and transaction costs: the redesign and IT support for procurement processes can reduce them by cca. 40-60%.

- Higher productivity of employees: it can increase between 15-150 %.

- Better realization of benefits from IT: According to Gartner companies lose up to 600 billion $ per year due to unsuccessful IT projects, 40% of IT expenses does not bring ANY business value to the organization! IT has positive influence only when it supports business processes.

- Possibility/importance of measurement at the process level: All core processes should be monitored with key performance indicators in various steps of the process.

88
New cards
<p>Business process modelling notation; notation of the BPMN</p><p>picture: process model, example</p>

Business process modelling notation; notation of the BPMN

picture: process model, example

The BPMN consists of 5 main elements:

  1. flow objects

  2. connecting objects

  3. data

  4. artifacts

  5. participants

<p>The BPMN consists of 5 main elements:</p><ol><li><p>flow objects</p></li><li><p>connecting objects</p></li><li><p>data</p></li><li><p>artifacts</p></li><li><p>participants</p></li></ol>
89
New cards
<p>Why do we need modelling? last year exam</p>

Why do we need modelling? last year exam

We need models when the reality is too complex to be mastered by a person or a group of persons. We used set of models to understand the subject of interest in order to take decision. So, a model is a formal construction to abstract a part of reality that could be understood by a human or a machine (software).

Computer modeling allows scientists to conduct thousands of simulated experiments by computer. The thousands of computer experiments identify the handful of laboratory experiments that are most likely to solve the problem being studied. Today's computational models can study a biological system at multiple levels.

<p><span>We need models </span><strong>when the reality is too complex to be mastered by a person or a group of persons</strong><span>. We used set of models to understand the subject of interest in order to take decision. So, a model is a formal construction to abstract a part of reality that could be understood by a human or a machine (software).</span></p><p><span>Computer modeling </span><strong>allows scientists to conduct thousands of simulated experiments by computer</strong><span>. The thousands of computer experiments identify the handful of laboratory experiments that are most likely to solve the problem being studied. Today's computational models can study a biological system at multiple levels.</span></p>
90
New cards

BPM in shocks – the core message

knowt flashcard image
91
New cards
<p>BPM orientation</p>

BPM orientation

knowt flashcard image
92
New cards

The problems of functional organization

Companies are divided into several business functions/departments (marketing, accounting, production etc.):

• employees (from lower hierarchical levels) do not cooperate

• business process spans over several departments

• who is in charge of satisfying the customer?

• how to track orders and solve everydays problems?

When you optimize one part of the organisation, you improve part of the whole.

93
New cards
<p>The silo culture</p>

The silo culture

You don’t care about the whole culture/process, but only about your assignments → you only concentrate on your part and don’t look at the whole picture.

Elon Musk: “One final point is that managers should work hard to ensure that they are not creating silos within the company that create an us vs. them mentality or impede communication in any way. This is unfortunately a natural tendency and needs to be actively fought. How can it possibly help Tesla for depts. to erect barriers between themselves or see their success as relative within the company instead of collective? We are all in the same boat. Always view yourself as working for the good of the company and never your dept.”Business processes

94
New cards
<p>Business processes</p>

Business processes

• Business process has to be managed holistically (as a whole not just each individual part)

Types of business proceses:

• core processes: create value for the final customer

• support processes: enable the “execution” of other processes

• management processes: used to manage other processes

my notes: core process, support process:hiring a new employee; business process: provides values the final customers

Business process redesign is a thorough analysis of the processes:

-requires a strategic analysis of current processes and other strategic questions

-if needed processes need to be changed and supported by IS

<p>• Business process has to be managed holistically (as a whole not just each individual part) </p><p>Types of business proceses: </p><p>• core processes: create value for the final customer </p><p>• support processes: enable the “execution” of other processes</p><p> • management processes: used to manage other processes</p><p>my notes: core process, support process:hiring a new employee; business process: provides values the final customers</p><p>Business process redesign is a thorough analysis of the processes: </p><p>-requires a strategic analysis of current processes and other strategic questions </p><p>-if needed processes need to be changed and supported by IS</p>
95
New cards

The goals of BPM

- Research shows that between 60-80% of business process management programs is unsuccessful

<p>- Research shows that between 60-80% of business process management programs is unsuccessful</p>
96
New cards
<p>Benefits of BPM</p>

Benefits of BPM

BPM positively influences financial and non-financial performance of companies (Skrinjar et al., 2008); early-adopters of BPM will get competitive advantage (Gartner, 2006)

Reduction of lead times and transaction costs: the redesign and IT support for procurement processes can reduce them by cca. 40-60% (Davila et al., 2003; Presutti, 2003).

Higher productivity of employees: it can increase between 15-150 % (Gartner, 2006).

Better realization of benefits from IT: According to Gartner companies lose up to 600 billion $ per year due to unsuccessful IT projects (Gartner, 2002), 40% of IT expenses does not bring ANY business value to the organization (Watters, 2004)! IT has positive influence only when it supports business processes (Karim et al., 2007).

Possibility/importance of measurement at the process level: All core processes should be monitored with key performance indicators in various steps of the process (Lee & Dale, 1998).

Research shows that between 60-80% of business process management programs is unsuccessful

<p>BPM positively influences financial and non-financial performance of companies (Skrinjar et al., 2008); early-adopters of BPM will get competitive advantage (Gartner, 2006)</p><p><strong>Reduction of lead times and transaction costs</strong>: the redesign and IT support for procurement processes can reduce them by cca. 40-60% (Davila et al., 2003; Presutti, 2003). </p><p><strong>Higher productivity of employees</strong>: it can increase between 15-150 % (Gartner, 2006).</p><p><strong>Better realization of benefits from IT</strong>: According to Gartner companies lose up to 600 billion $ per year due to unsuccessful IT projects (Gartner, 2002), 40% of IT expenses does not bring ANY business value to the organization (Watters, 2004)! IT has positive influence only when it supports business processes (Karim et al., 2007). </p><p><strong>Possibility/importance of measurement at the process level</strong>: All core processes should be monitored with key performance indicators in various steps of the process (Lee &amp; Dale, 1998).</p><p>Research shows that between 60-80% of business process management programs is unsuccessful</p>
97
New cards

Critical success factors of BPM

•Strategic alignment

•Level of IT investment

•Performance measurement

•Level of employee’s specialization

•Organizational changes

•Appointment of process owners

•Implementation of proposed changes (quick-win strategy),

•Use of a continuous improvement system

• Fit between IT and business processes

• Standardization of processes

• IS support

• Training and empowerment of employees

98
New cards

1. Strategic alignment:

1. Strategic alignment: the obvious one: BPM must be linked to the organizational strategy. Typical examples in our case: for the new services development process whether Skybank should actively encourage employee’s innovativeness or should it rather focus on cost reductions. The main question of account management process is whether all activities of this process should be provided at each branch or whether smaller branches should become specialized based on local market specifics.

99
New cards

2. Level of IT investment

2. Level of IT investment: The more is better approach does not work. In the words of the project leader from Skybank:”it may often be cheaper to perform certain activities in Excel than to provide IS support for everything”.

100
New cards

3. Performance measurement

3. Performance measurement: you get what you measure. It is important that it is measured at the activity/process level where the prime effects are expected. Here is one comic I use in every course I teach.