CHAPTER 1: Information Systems Overview
Information Systems Components
Definition of Information Systems (IS):
A set of interrelated components that collect, manipulate, store, and disseminate data and information, providing a feedback mechanism to meet objectives.
Components include:
Input: Collects data
Processing: Manipulates and stores data
Output: Disseminates information
Feedback: Used to make changes to input or processing activities
Systems
Definition of a System:
A set of elements or components that interact to accomplish goals.
Examples of systems:
Automatic car wash
Heating systems in buildings
The human body.
Organizational Systems:
Organizations are systems with inputs, processing mechanisms, outputs, and feedback.
Inputs include:
Money
People
Materials
Machines and equipment
Data and information.
Outputs typically comprise goods or services of higher relative value than inputs aiming to achieve organizational goals by adding value.
Environment of Organizations
Key Aspects Influencing Organizations:
External Environment:
Customers
Competition
Suppliers
Shareholders
Governments
Industry
Technology
Internal Inputs:
Capital
Equipment
Facilities
Materials
Supplies
Labor
Knowledge
Information Economy
Current economy characterized as an Information Economy where:
Information has value, prioritizing the exchange of information over tangible goods.
CHAPTER 2: Secure Information Systems
Importance of Security in Information Systems
Organizations face increasing cybersecurity threats due to:
Rise in cyberattacks against individuals and organizations.
Increasing complexity in technology systems.
Bring Your Own Device (BYOD) policies.
Use of software with known vulnerabilities.
The sophistication of cybercriminals.
Investment Statistics:
$21.8 billion spent on cybersecurity products and services in 2021.
Types of Attack Vectors
Definition:
Attack vector: Technique used by cybercriminals to gain unauthorized access to a computer or network.
Examples include:
Ransomware
Distributed Denial-of-Service (DDoS)
Data breaches
Cyberespionage
Cyberterrorism.
Types of Cyberattacks
Attack Types:
Smishing: Phishing via text messaging.
Social Engineering: Deception to gain sensitive information.
Spam: Unsolicited emails sent to large audiences.
Trojan Horse: Malicious code hidden in seemingly useful software.
Virus: Code that causes undesired behavior in systems.
Additional Attack Types:
Vishing: Voice phishing through phone messages.
Worm: Self-replicating program spreading across networks.
Cyberattack Perpetrators
Identify typical perpetrators:
Careless insiders.
Malicious employees.
Cybercriminals targeting systems for financial gain.
CHAPTER 10: Business Information Systems (BIS)
Types of Business Information Systems
Executive Support Systems: Support for strategic decisions.
Management Information Systems (MIS): Provide detailed operational data for routine decisions.
Decision Support Systems (DSS): Help with problem-specific decision-making.
Transaction Processing Systems (TPS): Handle daily transaction data.
Customer Relationship Management Systems: Manage company-customer interactions.
Operational Systems
Operational systems manage day-to-day transactions within organizations.
Enterprise Resource Planning (ERP):
Centralized system for managing enterprise-wide information.
Ensures inter-functionality across business levels for effective operation.
Advantages of ERP
Improved access to data.
Elimination of legacy systems.
Enhanced work processes.
Upgraded technology infrastructure.
Disadvantages of ERP
Costs and time for implementation.
Change management challenges.
Integration complexities with existing systems.
Risks associated with vendor reliance and implementation failures.
CHAPTER 12: Innovation and Organizational Change
Innovation Types
Sustaining Innovation: Enhancements to existing offerings and operations.
Disruptive Innovation: Initially inferior products evolving to satisfy market demands.
Organizational Change Strategies
Re-engineering: Radical redesign of processes.
Continuous Improvement: Incremental enhancement of existing processes to add value.
Global Challenges in Information Systems
Factors affecting global operations include:
Cultural differences and customs.
Language barriers leading to miscommunication.
Time zone discrepancies affecting business operations.
Variability in infrastructure and technology across regions.
Regulatory and legal compliance across territories.
Technical Skills and Career Development in Information Systems
Required Skills for Careers in IS
Technical Skills:
Mobile application development.
Project management.
Networking knowledge.
Data analysis and security.
Additional Skills:
Strong verbal and written communication.
Ability to work collaboratively on teams.
Summary Points
Importance of understanding information systems and their components (input, processing, output, feedback).
Recognize the criticality of security within information systems against cyber threats.
Understand organizational information systems’ roles in supporting decision-making and day-to-day operations.
Consider innovation as a central driver of modern organizational change.