Information Systems Study Guide
Information Systems Study Guide
STUDY GUIDE
TABLE OF CONTENTS
MODULE OUTCOMES
At the end of this module learners should be able to know:
Business across the enterprise
E-commerce
Supporting decision making
Business/IT strategies for development
Implementing business/it solutions
Security and ethical challenges
PRESCRIBED TEXTBOOK
Textbook Author Year Publisher ISBN
Introduction to
O Brian, J. 2012 McGraw-Hill 9780071318044
Information system
INTRODUCTION
Getting All the Geese Lined Up: Managing at the Enterprise Business Level
Heres a question you probably never expected to find in your information systems text: Have
you ever noticed how geese fly? They start out as a seemingly chaotic flock of birds, but very
quickly end up flying in a V-shape or echelon pattern like that shown in Figure 8.1. As you might
imagine, this consistency in flying formation is not an accident. By flying in this manner, each
bird receives a slight, but measurable, benefit in reduced drag from the bird in front. This makes
it easier for all of the birds to fly long distances than if they just took up whatever portion of the
sky they happened to find. Of course, the lead bird has the toughest job, but geese have figured
out a way to help there, as well. Systematically, one of the birds from the formation will fly up to
relieve the current lead bird. In this way, the entire flock shares the load as they all head in the
same direction.
Learning outcomes:
After having worked through this study unit you will be able to:
1. Identify and give examples to illustrate the following aspects of customer relationship
management, enterprise resource management systems:
Sales
A CRM system provides sales reps with the tools and data resources they need to
Support and manage their sales activities
Optimize cross- and up-selling
CRM also provides the means to check on a customers account status and history before
scheduling a sales call.
Benefits of CRM
Identify and target the best customers
Real-time customization and personalization
of products and services
Track when and how a customer contacts
the company
Provide a consistent customer experience
Provide superior service and support across
all customer contact points
CRM Failures
Business benefits of CRM are not guaranteed
50 percent of CRM projects did not produce promised results
20 percent damaged customer relationships
Reasons for failure
Lack of understanding and preparation
Trends in CRM
Operational CRM
Supports customer interaction with greater convenience through a variety of channels
Synchronizes customer interactions consistently across all channels
Makes the company easier to do business with
Analytical CRM
Extracts in-depth customer history, preferences, and profitability from databases
Allows prediction of customer value and behavior
Allows forecast of demand
Helps tailor information and offers to customer needs
Collaborative CRM
Easy collaboration with customers, suppliers, and partners
Improves efficiency and integration throughout supply chain
Greater responsiveness to customer needs through outside sourcing of products
and services
Portal-based CRM
Provides users with tools and information that fit their needs
Empowers employees to respond to customer demands more quickly
Helps reps become truly customer-faced
Provides instant access to all internal and external customer information
Goals of SCM
The goal of SCM is to efficiently
Forecast demand
Control inventory
Enhance relationships with customers, suppliers, distributors, and others
Receive feedback on the status of every link in the supply chain
Trends in SCM
Answer the following questions to check whether you have achieved all the set
outcomes:
What does ERP stands for? And then name ix business processes that are associated with ERP.
How can you avoid the problem of overly enthusiastic demand forecasts in supply chain planning?
What challenges do you see for a company that wants to implement collaborative CM systems? How
would you meet such challenges?
Learning outcomes:
After having worked through this study unit you will learn:
- Identify the essential processes of an e-commerce system, and give examples of how they are
implemented in e-commerce applications
- Identify and give examples of several key factors and Web store requirements need to
succeed in e-commerce
- Identify and explain the business value of several types of e-commerce marketplaces
-Discuss the benefits and trade-offs of several e-commerce clicks and bricks alternatives
DEFINITION
Electronic commerce, commonly known as e-commerce or e-comm, is the buying and selling of
products or services over electronic systems such as the Internet and other computer networks
E-Commerce Technologies
Categories of e-Commerce
Business-to-Consumer
Virtual storefronts, multimedia catalogs, interactive order processing, electronic
payment, online customer support
Business-to-Business
Electronic business marketplaces, direct links between businesses, auctions and
exchanges
E-commerce processes must establish mutual trust and secure access between parties
User names and passwords
Encryption key
Digital certificates and signatures
Restricted access areas
Other peoples accounts
Restricted company data
Webmaster administration areas
Profiling gathers data on you and your website behavior and choices
User registration
Cookie files and tracking software
Search Management
Search processes help customers find the specific product or service they want
E-commerce software packages often include
a website search engine
A customized search engine may be acquired from companies like Google or
Requisite Technology
Searches are often on content or by parameters
Workflow Management
Event Notification
Most e-commerce applications are event driven
Responds to such things as customers first website visit and payments
Monitors all e-commerce processes
Records all relevant events, including problem situations
Notifies all involved stakeholders
Works in conjunction with user-profiling software
Differences in Marketing
B2B E-Commerce
E-Commerce Marketplaces
One to Many
Sell-side marketplaces
One supplier dictates product offerings and prices
Many to One
Buy-side marketplaces
Many suppliers bid for the business of a buyer
Some to Many
Distribution marketplaces
Unites suppliers who combine their product catalogs to attract a larger audience
Many to Some
Procurement marketplaces
Unites major buyers who combine purchasing catalogs
Attracts more competition and thus lower prices
Many to Many
Auction marketplaces
Dynamically optimizes prices
Success will go to those who can integrate Internet initiatives with traditional operations
Merging operations has trade-offs
See Figure 9.18
E-Commerce Integration
The business case for merging e-commerce with traditional business operations
Move strategic capabilities in traditional operations to the e-commerce business
Integrate e-commerce into the traditional business
Sharing of established brands
Sharing of key business information
Joint buying power and distribution efficiencies
An e-commerce channel is the marketing or sales channel created by a company for its
e-commerce activities
There is no universal strategy or e-commerce channel choice
Both e-commerce integration and separation
have major business benefits and shortcoming
Most businesses are implementing some
measure of clicks and bricks integration
Answer the following questions to check whether you have achieved all the set
outcomes:
INTRODUCTION
As companies migrate toward responsive e-business models, they are investing in new data-
driven decision support application frameworks that help them respond rapidly to changing
market conditions and customer needs.
One way to look at an organization is to view it as an intertwining nexus of decisions. The length
and breadth of an organization is held together by the relationship between a decision made in
one area and a decision made in another. To succeed in business today, companies need
information systems that can support the diverse information and decision-making needs of their
managers and business professionals.
In this chapter, we will explore how this is accomplished by several types of management
information, decision support, and other information systems. We concentrate our attention on
how the Internet, intranets, and other Web-enabled information technologies have significantly
strengthened the role that information systems play in supporting the decision-making activities
of every manager and knowledge worker in business.
Learning outcomes:
After having worked through this study unit you will learn:
-Identify the changes taking place in the form and use of decision support in business
- Identify the role and reporting alternatives of MIS
- Describe how online analytical processing can meet key information needs of managers
- Explain the decision support system concept and how it differs from traditional MIS
- Explain how the following IS can support the information needs of executives, managers, and
business professionals:
A. Executive information systems, -
B. Enterprise information portals, and
C. knowledge management systems
- Identify how neural networks, fuzzy logic, genetic algorithms, virtual reality, and intelligent
agents can be used in business
- Give examples of several ways expert systems can be used in business decision-making
situations
Web-based dashboards
Displays critical information in graphic form
Assembled from data pulled in real time from corporate software and databases
Managers see changes almost instantaneously
Now available to smaller companies
Potential problems
Pressure on employees
Divisions in the office
Tendency to hoard information
Information Quality
Information products made more valuable by their attributes, characteristics, or qualities
Information that is outdated, inaccurate, or hard to understand has much less
value
Information has three dimensions
Time
Content
Decision Structure
Structured (operational)
The procedures to follow when decision is needed can be specified in advance.
Unstructured (strategic)
It is not possible to specify in advance most of the decision procedures to follow.
Semi-structured (tactical)
Decision procedures can be pre-specified, but not enough to lead to the correct
decision.
1. DSS tends to be aimed at the less well structured, underspecified problem that upper
level managers typically face;
2. DSS attempts to combine the use of models or analytic techniques with traditional data
access and retrieval functions;
3. DSS specifically focuses on features which make them easy to use by non-computer
people in an interactive mode; and
inventories of information assets (including legacy and relational data sources, cubes, data
warehouses, and data marts),
comparative sales figures between one period and the next,
Projected revenue figures based on product sales assumptions.
Decision support systems use the following to support the making of semi-structured business
decisions
Analytical models
Specialized databases
A decision-makers own insights and judgments
An interactive, computer-based modeling process
DSS systems are designed to be ad hoc, quick-response systems that are initiated and
controlled by decision makers.
1. DSS Database: It contains data from various sources, including internal data from the
organization, the data generated by different applications, and the external data mined form the
Internet, etc. The decision support systems database can be a small database or a standalone
system or a huge data warehouse supporting the information needs of an organization. To avoid
2. DSS Software System: It consists of various mathematical and analytical models that are
used to analyze the complex data, thereby producing the required information. A model predicts
the output in the basis of different inputs or different conditions, or finds out the combination of
conditions and input that is required to produce the desired output.
A decision support system may compromise different models where each model performs a
specific function. The selection of models that must be included in a decision support system
family depends on user requirements and the purposes of DSS. Note that the DSS software
contains the predefined models (or routines) using which new models can be built to support
specific type of decisions.
The original type of information system that supported managerial decision making
Produces information products that support many day-to-day decision-making
needs
Produces reports, display, and responses
Satisfies needs of operational and tactical decision makers who face structured
decisions
OLAP
Enables managers and analysts to examine and manipulate large amounts of
detailed and consolidated data from many perspectives
Done interactively, in real time, with rapid response to queries
Consolidation
Aggregation of data
Example: data about sales offices rolled up to the district level
Drill-Down
Display underlying detail data
Example: sales figures by individual product
Slicing and Dicing
Viewing database from different viewpoints
Often performed along a time axis
Data Mining
Types of analysis
Regression
Decision tree
Neural network
Cluster detection
Market basket analysis
An EIP is a Web-based interface and integration of MIS, DSS, EIS, and other
technologies
Available to all intranet users and select extranet users
Provides access to a variety of internal and external business applications and
services
Typically tailored or personalized to the user or groups of users
Often has a digital dashboard
Also called enterprise knowledge portals
Dashboard Example
Cognitive Science
Applications in the cognitive science of AI
Expert systems
Knowledge-based systems
Adaptive learning systems
Fuzzy logic systems
Neural networks
Genetic algorithm software
Intelligent agents
Focuses on how the human brain works and how humans think and learn
Robotics
Virtual Reality
X-ray-like vision enabled by enhanced-reality visualization helps surgeons
Automated animation and haptic interfaces
allow users to interact with virtual objects
Robotics
Machine-vision inspections systems
Cutting-edge robotics systems
From micro robots and hands and legs, to cognitive and trainable modular
vision systems
EXPERT SYSTEMS
An expert system (ES) is a knowledge-based information system that uses its knowledge about
a specific, complex application area to act as an expert consultant to end users. Expert systems
provide answers to questions in a very specific problem area by making humanlike inferences
about knowledge contained in a specialized knowledge base. They must also be able to explain
their reasoning process and conclusions to a user, so expert systems can provide decision
support to end users in the form of advice from an expert consultant in a specific problem area.
Development Tool
Expert System Shell
The easiest way to develop an expert system
A software package consisting of an expert system without its knowledge base
Has an inference engine and user interface programs
Knowledge Engineering
A knowledge engineer
Works with experts to capture the knowledge (facts and rules of thumb) they
possess
Builds the knowledge base, and if necessary, the rest of the expert system
Performs a role similar to that of systems analysts in conventional information
systems development
NEURAL NETWORKS
Fuzzy logic
Resembles human reasoning
Allows for approximate values and inferences and incomplete or ambiguous data
Uses terms such as very high instead of precise measures
Used more often in Japan than in the U.S.
Used in fuzzy process controllers used in subway trains, elevators, and cars
GENETIC ALGORITHMS
The use of genetic algorithms is a growing application of artificial intelligence. Genetic algorithm
software uses Darwinian (survival of the fittest), randomizing, and other mathematical functions
to simulate an evolutionary process that can yield increasingly better solutions to a problem.
Genetic algorithms were first used to simulate millions of years in biological, geological, and
ecosystem evolution in just a few minutes on a computer. Genetic software is being used to
model a variety of scientific, technical, and business processes.
Current applications of virtual reality are wide-ranging and include computer-aided design
(CAD), medical diagnostics and treatment, scientific experimentation in many physical and
biological sciences, flight simulation for training pilots and astronauts, product demonstrations,
employee training, and entertainmentespecially 3-D video arcade games. CAD is the most
widely used industrial VR application. It enables architects and other designers to design and
test electronic 3-D models of products and structures by entering the models themselves and
examining, touching, and manipulating sections and parts from all angles. This scientific
visualization capability is also used by pharmaceutical and biotechnology firms to develop and
observe the behaviour of computerised models of new drugs and materials, as well as by
medical researchers to develop ways for physicians to enter and examine a virtual reality of a
patients body.
Current applications of virtual reality
Computer-aided design
Medical diagnostics and treatment
Scientific experimentation
Flight simulation
Product demonstrations
Employee training
Entertainment
Intelligent Agents
A software surrogate for an end user or a process that fulfills a stated need or activity
Uses built-in and learned knowledge base to make decisions and accomplish tasks in a
way that fulfills the intentions of a user
Also call software robots or bots
Answer the following questions to check whether you have achieved all the set
outcomes:
Despite the potential savings, funding for creating and running a BI center can be
an issue
Case Study Questions
The robotics being used by Ford Motor Co. are contributing to a streamlining of its
supply chain
INTRODUCTION
Planning Fundamentals
Information technology has created a seismic shift in the way companies do business. Just
knowing the importance and structure of e-business is not enough. You must create and
implement an action plan that allows you to make the transition from an old business design to a
new e-business design.
Learning outcomes:
After having worked through this study unit you will learn:
- Discuss the role of planning in the business use of information technology, using the
scenario approach and planning for competitive advantage as examples.
- Discuss the role of planning and business models in the development of business/IT
strategies, architectures, and applications.
- Identify several change management solutions for end user resistance to the
implementation of new IT-based business strategies and applications.
Strategic Planning
The setting of objectives and the development of procedures, rules,
schedules, and budgets
Operational Planning
Gaining in popularity as a less formal, but more realistic, strategic planning methodology
Competitive forces
Competitive strategies
Value chain
SWOT analysis (strengths, weaknesses, opportunities, and threats) is used to evaluate the
impact that each possible strategic opportunity can have on a company and its use of
information technology. A companys strengths are its core competencies and re-sources in
which it is one of the market or industry leaders. Weaknesses are areas of substandard
business performance compared to others in the industry or market segments. Opportunities
are the potential for new business markets or innovative breakthroughs that might greatly
expand present markets. Threats are the potential for business and market losses posed by the
actions of competitors and other competitive forces, changes in government policies, disruptive
new technologies, and so on.
Customer value Are we offering something distinctive or at a lower cost than our
competitors?
Revenue source Where do the dollars come from? Who pays for what value and when?
What are the margins in each market, and what drives them?
What drives value in each source?
A business model forces rigorously and systematic thinking about the value and
viability of business initiatives
Both the CEO and the chief information officer (CIO) of a company must manage the
development of complementary business and IT strategies to meet its customer value and
business value vision. This coadaptation process is necessary because, as we have seen so
often in this text, information technologies are a fast-changing but vital component in many
strategic business initiatives. The business/IT planning process has three major components
Strategic development
Resource management
Technology architecture
Technology platform
Data resources
Application architecture
IT organization
Identifying Business/IT Strategies
Strategic Matrix
Use the Internet as a fast, low-cost way to communicate and interact with
others
Use of e-mail, chat systems, discussion groups, and company websites
Performance Improvement in Effectiveness
Capitalize on a high degree of customer and competitor connectivity and use
of IT
Use e-commerce websites with value-added information services and
extensive online customer support
Product and Service Transformation
Market Creator: be among the first to market and remain ahead of the competition by
continuously innovating
Infomediaries: use the Internet to reduce the search cost; offer a unified process for
collecting the information needed to make a large purchase
Supply Chain Innovator: use the Internet to streamline supply chain interactions
Implementation
Any way of doing things generates some resistance from the people affected
Change Management
People factors have the highest level of difficulty and the longest time to resolve
of any dimension of change management.
Change Management
Summary of unit
How do companies benefit from having their chief information officer meet customers and
generally be-come more involved with product development? What the company, to the
extent that the IT function will cease to exist as a separate entity. Do you agree with this
statement? Why or why not? Break into small groups with your classmates to see if you
can reach a consensus on the issue. Can companies do now that was not possible
before?
Provide a few examples.
The Scrum approach to project management has become quite popular in recent years.
Go online and research other companies that are using it to organize their projects. Have
those experiences been positive as well? What can you tell about how the approach
works from your research? Prepare a report to summarize your findings.
Using examples from the case and your own under-standing of how those worked, can
you distil a set of recommendations that companies should follow when managing
technology-based projects? Would these be universal, or would you add any limitations to
their applicability?
Would the issues discussed in the case be solved by making a business executive the
head of any projects involving IT? Why or why not? Break into small groups with your
classmates and develop a justification for both alternatives.
INTRODUCTION
Suppose the chief executive of the company where you work asks you to find a Web-enabled
way to get information to and from the salespeople in your company. How would you start?
What would you do? Would you just plunge ahead and hope you could come up with a
reasonable solution? How would you know whether your solution was a good one for your
company? Do you think there might be a systematic way to help you develop a good solution to
the CEOs request? There is a way, and its a problem-solving process called the systems
approach.
Learning outcomes:
After having worked through this study unit you will learn:
-Use the systems development process outlined in this chapter and the model of IS
components from Chapter 1 as problem-solving frameworks to help you propose IS solutions
to simple business problems
-Describe and give examples to illustrate how you might use each of the steps of the IS
development cycle to develop and implement a business IS
-Explain how prototyping can be used as an effective technique to improve the process of
systems development for end users and IS specialists
- Understand the basics of project management and their importance to a successful system
development effort
- Identify the activities involved in the implementation of new IS
- Compare and contrast the four basic system conversation strategies
- Describe several evaluation factors that should be considered in evaluating the acquisition of
hardware, software, and IS services
IS Development
When the systems approach is applied to the development of an information systems solution to
business problems, it is called information systems development or application development.
A problem solving technique that uses a systems orientation to define problems and
opportunities and develop appropriate and feasible solutions
Seeing interrelationships among systems rather than linear cause-and-effect
chains
Seeing processes of change among systems rather than discrete snapshots
of change
See the system in any situation
Systems Investigation
An assessment of
Cost savings
Increased revenue
Decreased investment requirements
Increased profits
Cost/benefit analysis
Technical Feasibility
Determine the following can meet the needs of a proposed system and can be
acquired or developed in the required time
Hardware
Software
Network
Human Factors Feasibility
Employees
Customers
Suppliers
Management support
Determine the right people for the various new or revised roles
Legal/Political Feasibility
Assess
What is systems analysis? Whether you want to develop a new application quickly or are
involved in a long-term project, you will need to perform several basic activities of systems
analysis. Many of these activities are an extension of those used in conducting a feasibility
study. Systems analysis is not a preliminary study; however, it is an in-depth study of end-user
information needs that produces functional requirements that are used as the basis for the
design of a new information system. Systems analysis traditionally involves a detailed study of:
It produces the functional requirements used as the basis for the design of an
IS
It typically involves a detailed study of the
It displays what the current system does, without regard to how it does it
It allows an analyst to understand the processes, functions, and data
associated with a system without getting bogged down with hardware and
software
Functional Requirements
Storage: fast retrieval and update of data from product, pricing, and customer databases
Control: signals for data entry errors and quick e-mail confirmation for customers
Systems Design
Prototyping
Focuses on supporting the interactions between end users and their computer-based
applications
User interface Use personalized screens that welcome repeat Web customers and
specifications that make product recommendations
A staff of user consultants may be available to help with analysis, design, and
installation
Other support
Input
Processing
Output
Storage
Control
Focus of End User Development
Limit what parts of a web page or site can be changed and who can do it
Give managers responsibility
Once a new information system has been designed, it must be implemented as a working
system and maintained to keep it operating properly. The implementation process that we cover
here follows the investigation, analysis, and design stages of the systems development life cycle
we discussed earlier in this chapter. Implementation is a vital step in the deployment of
information technology to support the employees, customers, and other business stakeholders
of a company. See Figure 12.17.
PROJECT MANAGEMENT
The skills and knowledge necessary to be a good project manager will translate into
virtually any project environment.
The people who have acquired them are sought after by most organizations.
What is a Project?
Process
Tools
Techniques
Initiating/Defining
Planning
Executing
Controlling
Closing
Initiating/Defining Phase
Example activities
Example activities
Execution Phase
Example activities
Controlling Phase
Example activities
Closing Phase
Example activities
Establish minimum physical and performance characteristics for all hardware and
software
Performance
Cost
Reliability
Compatibility
Technology
Ergonomics
Connectivity
Scalability
Software
Support
Software Evaluation Factors
Quality
Efficiency
Flexibility
Security
Connectivity
Maintenance
Documentation
Hardware
Evaluating IS Services
Examples of IS services
Performance
Systems development
Maintenance
Testing
Data conversion
Documentation
Training
System Testing
Data Conversion
Converting data elements from the old database to the new database
Correcting data errors
Filtering out unwanted data
Consolidating data from several databases
Organizing data into new data subsets
Improperly organized and formatted data is a major cause of implementation failures
Documentation
User Documentation
TRAINING
May involve only activities, such as data entry, or all aspects of system use
Managers and end users must understand how the new technology impacts
business operations
System training should be supplemented with training related to
Hardware devices
Software packages
Direct Conversion
Direct conversion
Parallel Conversion
Old and new systems are run simultaneously until everyone is satisfied that
Pilot Conversion
Can select a location that best represents the conditions across the
organization
Less risky in terms of loss of time or delays in processing
Can be evaluated and changed before further installations
Phased Conversion
Post-Implementation Activities
Systems Maintenance
Post-Implementation Review
Ensures that the newly implemented system meets the established business
objectives
Summary of unit
The Systems Development Life Cycle. Business end users and IS specialists may use
a systems approach to help them develop information system solutions to meet business
opportunities. This frequently involves a systems development life cycle where IS
specialists and end users conceive, design, and implement business systems. The
stages, activities, and products of the information systems development life cycle are
summarized in Figure 12.3 .
Answer the following questions to check whether you have achieved all the set
outcomes:
Playing nice
Free-association sessions
Focus is always on the customer
Should Intuits far-out thinking and acceptance of failure as part of the application
software development process be duplicated at large software development companies
like Microsoft?
Should it be duplicated at the thousands of small independent software
companies that exist?
Which do you prefer?
INTRODUCTION
This chapter discusses the threats against, and defences needed for the performance and
security of business information systems, as well as the ethical implications and societal
impacts of information technology.
Learning outcomes:
After having worked through this study unit you will learn:
-Identify several ethical issues in how the use of information technologies in business affects
employment, individuality, working conditions, privacy, crime, health, and solutions to
societal problems.
-Identify several types of security management strategies and defences, and explain how they
can be used to ensure the security of business applications of information technology.
- Propose several ways that business managers and professionals can help to lessen the
harmful effects and increase the beneficial effects of the use of information technology.
The necessity of controls for information systems should be emphasized. The goal of security
management is the accuracy, integrity, and safety of all e-business processes and resources.
Stress to students that conducting security management is a complex task in all organizations.
News accounts of computer errors and computer related crimes could be used to convince
students of the importance of this topic. Examples of procedural and physical facility controls
should also be discussed with your students, especially the importance of disaster recovery
planning. Figure 13.21 can serve to provide an example of e-business system controls and
audits. Note that they are designed to monitor and maintain the quality and security of the input,
processing, output, and storage activities of an information system. Finally, Figure 13.22 is a
good slide to use to discuss information systems controls as methods and devices that attempt
to ensure the accuracy, validity, and propriety of information system activities. Figure 13.23
outlines important ways to protect yourself from cybercrime and other computer security threats.
The use of information technology in e-business has major impacts on society, and thus
raises serious ethical issues in the areas such as:
Crime
Privacy
Individuality
Employment
Health
Working Conditions
The AITP code provides guidelines for ethical conduct in the development and use of
information technology. End-users and IS professionals would live up to their ethical
responsibilities by voluntarily following such guidelines.
For example, you can be a responsible end user by:
Acting with integrity
Increasing your professional competence
Setting high standards of personal performance
Accepting responsibility for your work
Advancing the health, privacy, and general welfare of the public
Business Ethics:
Ethics questions that managers confront as part of their daily business decision making include:
Equity
Rights
Honesty
Exercise of corporate power
Business ethics also concerned with the numerous ethical questions that managers must
confront as part of their daily business decision-making. Managers use several important
alternatives when confronted with making ethical decisions on business issues. These include:
Stockholder Theory Holds that managers are agents of the stockholders, and their only
ethical responsibility is to increase the profits of the business, without violating the law or
engaging in fraudulent practices.
Social Contract Theory - States that companies have ethical responsibility to all
members of society, which allow corporations to exist based on a social contract.
Stakeholder Theory - Maintains that managers have an ethical responsibility to manage
a firm for the benefit of all of its stakeholders, which are all individuals and groups that
have a stake in or claim on a company.
Informed Consent Those affected by the technology should understand and accept the risks.
Justice The benefits and burdens of the technology should be distributed fairly. Those who
benefit should bear their fair share of the risks, and those who do not benefit should not suffer a
significant increase in risk.
Minimized Risk Even it judged acceptable by the other three guidelines, the technology must
be implemented so as to avoid all unnecessary risk.
Technology Ethics [See Figure 13.4]
Penalties for violation of the U.S. Computer Fraud and Abuse Act include:
1 to 5 years in prison for a first offence
10 years for a second offence
20 years for three or more offences
Fines ranging up to $250,000 or twice the value of stolen data
Hacking is the obsessive use of computers, or the unauthorized access and use of networked
computer systems.
Illegal hackers (also called crackers) frequently assault the Internet and other networks to steal
or damage data and programs.
Hackers can:
Monitor e-mail, Web server access, or file transfers to extract passwords or steal
network files, or to plant data that will cause a system to welcome intruders.
Use remote services that allow one computer on a network to execute programs on
another computer to gain privileged access within a network.
Use Telnet, an Internet tool for interactive use of remote computers, to discover
information to plan other attacks.
Cyber-Theft
Many computer crimes involve the theft of money. In the majority of cases, they are inside jobs
that involve unauthorized network entry and fraudulent alternation of computer databases to
cover the tracks of the employees involved.
The unauthorized use of a computer system is called time and resource theft. A common
example is unauthorized use of company-owned computer networks by employees. This may
Software Piracy:
Computer programs are valuable property and thus are the subject of theft from computer
systems. Unauthorized copying of software or software piracy is a major form of software theft
because software is intellectual property, which is protected by copyright law and user licensing
agreements.
Software is not the only intellectual property subject to computer-based piracy. Other forms of
copyrighted material, such as music, videos, images, articles, books, and other written works
are especially vulnerable to copyright infringement, which most courts have deemed illegal.
Digitised versions can easily be captured by computer systems and made available for people
to access or download at Internet websites, or can be readily disseminated by e-mail as file
attachments. The development of peer-to-peer (P2P) networking has made digital versions of
copyrighted material even more vulnerable to unauthorized use.
One of the most destructive examples of computer crime involves the creation of computer
viruses or worms. They typically enter a computer system through illegal or borrowed copies of
software, or through network links to other computer systems. A virus usually copies itself into
the operating systems programs, and from there to the hard disk and any inserted floppy disks.
Vaccine programs and virus prevention and detection programs are available, but may not work
for new types of viruses.
Virus - is a program code that cannot work without being inserted into another program.
Worm - is a distinct program that can run unaided.
Privacy Issues
The power of information technology to store and retrieve information can have a negative effect
on the right to privacy of every individual.
For example:
Confidential e-mail messages by employees are monitored by many companies
Personal information is being collected about individuals every time they visit a
site on the World Wide Web
Confidential information on individuals contained in centralized computer
databases by credit bureaus, government agencies, and private business firms
Some important privacy issues being debated in business and government include the
following:
Accessing individuals private e-mail conversations and computer records, and
collecting and sharing information about individuals gained from their visits to
Internet websites and newsgroups (violation of privacy).
Always knowing where a person is, especially as mobile and paging services
become more closely associated with people rather than places (computer
monitoring)
Using customer information to market additional business services (computer
matching).
Collecting telephone numbers and other personal information to build individual
customer profiles (unauthorized personal files).
The Internet is notorious for giving its users a feeling of anonymity, when in actuality; they are
highly visible and open to violations of their privacy. Most of the Internet and its World Wide
Web and newsgroups are still a wide open, unsecured, electronic frontier, with no tough rules
on what information is personal and private. You can protect your privacy in several ways:
Use encryption to send e-mail (both sender and receiver must have encryption
software).
Anonymous remailers to protect your identify when you add comments in
newsgroup postings.
Ask Internet service provider not to sell your name and personal information to
mailing list providers, and other marketers.
Decline to reveal personal data and interest on online service and websites user
profiles.
Computer Matching:
Computer matching is the use of computers to screen and match data about individual
characteristics provided by a variety of computer-based information systems and databases in
order to identify individuals for business, government, or other purposes. Unauthorized use or
mistakes in the computer matching of personal data can be a threat to privacy. For example, an
individuals personal profile may be incorrectly matched with someone else.
In the US, the Federal Privacy Act strictly regulates the collection and use of personal data by
governmental agencies. The law specifies that individuals have the right to inspect their
personal records, make copies, and correct or remove erroneous or misleading information.
Federal Privacy Act specifies that federal agencies:
Must annually disclose the types of personal data files they maintain.
Cannot disclose personal information on an individual to any other individual or
agency except under certain strict conditions.
Must inform individuals of the reasons for requesting personal information from
them.
Must retain personal data records only if it is relevant and necessary to
accomplish an agencys legal purpose.
Must establish appropriate administrative, technical, and physical safeguards to
ensure the security and confidentiality of records.
The U.S. Congress enacted the Electronic Communications Privacy Act and the Computer
Fraud and Abuse Act in 1986. These federal privacy laws are a major attempt to enforce the
privacy of computer-based files and communications. These laws prohibit intercepting data
communications messages, stealing or destroying data, or trespassing in federal-related
computer systems.
Some of the biggest battlegrounds in the debate are the bulletin boards, e-mail boxes, and
online files of the Internet and public information networks, such as America Online and the
Microsoft Network. The weapons being used in this battle include spamming, flame mail, libel
laws, and censorship.
Spamming - is the indiscriminate sending of unsolicited e-mail messages (spam) to many
Internet users. Spamming is the favourite tactic of mass-mailers of unsolicited advertisements,
or junk e-mail. Cyber criminals to spread computer viruses or infiltrate many computer systems
have also used Spamming.
Flaming - is the practice of sending extremely critical, derogatory, and often vulgar e-mail
messages (flame mail), or newsgroup postings to other users on the Internet or online services.
Flaming is especially prevalent on some of the Internets special interest newsgroups. The
Internet is very vulnerable to abuse, as it currently lacks formal policing, and lack of security.
Employment Challenges:
The impact of IT on employment is a major ethical concern and is directly related to the use of
computers to achieve automation of work activities. The use of e-business technologies has
created new jobs and increased productivity. However, it has also caused a significant reduction
in some types of job opportunities.
Computer Monitoring:
One of the most explosive ethical issues concerning the quality of working conditions in e-
business is computer monitoring. Computers are being used to monitor the productivity and
behaviour of employees while they work. Supposedly, computer monitoring is done so
employers can collect productivity data about their employees to increase the efficiency and
quality of service.
Computer monitoring has been criticized as unethical because:
It is used to monitor individuals, not just work, and is done continually, thus
violating workers privacy and personal freedom.
Is considered an invasion of the privacy of employees, because in many cases,
they do not know that they are being monitored, or dont know how the
information is being used.
Employees right of due process may be harmed by the improper use of collected
data to make personnel decisions.
It increases the stress on employees who must work under constant electronic
surveillance.
It has been blamed for causing health problems among monitored workers.
Blamed for robbing workers of the dignity of their work.
Information technology has eliminated some monotonous or obnoxious tasks in the office and
the factory that formerly had to be performed by people. Thus, IT can be said to upgrade the
quality of work. Though, many automated operations are also criticized for relegating people to
a do-nothing standby role.
Challenges to Individuality:
A frequent criticism of e-business systems concerns their negative effect on the individuality of
people. Computer-based systems are criticized as:
Health Issues:
The use of IT in the workplace raises a variety of health issues. Heavy use of computers is
reportedly causing health problems such as:
Job stress
Damaged arm and neck muscles
Eye strain
Radiation exposure
Death by computer-caused accidents
Ergonomics:
Solutions to some health problems are based on the science of ergonomics, sometimes called
human factors engineering. The goal of ergonomics is to design healthy work environments that
are safe, comfortable, and pleasant for people to work in, thus increasing employee morale and
productivity.
Ergonomics stresses the healthy design of the workplace, workstations, computers and other
machines, and even software packages. Other health issues may require ergonomic solutions
emphasizing job design, rather than workplace design.
[See Figure 13.12]
There are many significant threats to the security of information systems in business. Business
managers and professionals alike are responsible for the security, quality, and performance of
the e-business systems in their business units.
Security Management
The goal of security management is the accuracy, integrity, and safety of all
information system processes and resources.
The goal of security management is the accuracy, integrity, and safety of all e-business
processes and resources. Effective security management can minimize errors, fraud, and
losses in the internetworked computer-based systems that interconnect todays e-business
enterprises.
Encryption
Encryption of data has become an important way to protect data and other computer network
resources especially on the Internet, intranets, and extranets.
Another important method for control and security on the Internet and other networks is the use
of firewall computers and software. A network fire wall can be a communications processor,
typically a router, or a dedicated server, along with fire wall software. Fire wall computers and
software characteristics include:
A fire wall serves as a gatekeeper computer system that protects a companys
intranets and other computer networks from intrusion by serving as a filter and
safe transfer point for access to and from the Internet and other networks.
A fire wall computer screens all network traffic for proper passwords and other
security codes, and only allows authorized transmissions in and out of the
network.
Fire walls have become an essential component of organizations connecting to
the Internet, because of its vulnerability and lack of security.
Fire walls can deter, but not completely prevent, unauthorized access (hacking)
into computer networks. In some cases, a fire wall may allow access only from
trusted locations on the Internet to particular computers inside the fire wall. Or it
may allow only safe information to pass.
In some cases, it is impossible to distinguish safe use of a particular network
service from unsafe use and so all requests must be blocked. The fire wall may
then provide substitutes for some network services that perform most of the
same functions but are not as vulnerable to penetration.
E-Mail Monitoring
Internet and other online e-mail systems are one of the favourite avenues of attack by hackers
for spreading computer viruses or breaking into networked computers. E-mail is also the
battleground for attempts by companies to enforce policies against illegal, personal, or
damaging messages by employees, and the demands of some employees and others, who see
such policies as violations of privacy rights.
Virus Defences
Many companies are building defences against the spread of viruses by centralizing the
distribution and updating of antivirus software, as a responsibility of there IS departments. Other
companies are outsourcing the virus protection responsibility to their Internet service providers
or to telecommunications or security management companies.
A variety of security measures are commonly used to protect e-business systems and networks.
These include both hardware and software tools like fault-tolerant computers and security
monitors, and security policies and procedures like passwords and backup files.
Security Codes:
Security Monitors
System security monitors are programs that monitor the use of computer systems and networks
and protect them from unauthorized use, fraud, and destruction.
Security monitor programs provide the security measures needed to allow only
authorized users to access the networks.
Security monitors also control the use of the hardware, software, and data
resources of a computer system.
Security monitors can be used to monitor the use of computer networks and
collect statistics on any attempts at improper use.
BIOMETRIC SECURITY
These are security measures provided by computer devices, which measure physical traits that
make each individual unique. This includes:
Voice verification
Fingerprints
Hand geometry
Signature dynamics
Keystroke analysis
Retina scanning
Face recognition
Genetic pattern analysis
A variety of controls are needed to prevent computer failure or to minimize its effects. Computer
systems may fail due to:
Power failure
Electronic circuitry malfunctions
Telecommunications network problems
Hidden programming errors
Computer operator errors
Electronic vandalism
The information services department typically takes steps to prevent equipment failure and to
minimize its detrimental effects.
Many firms use fault tolerant computer systems that have redundant processors, peripherals,
and software that provide a fail-over capability to back up components in the event of system
failure.
Fail-Safe - Fail-Safe refers to computer systems that continue to operate at the
same level of performance after a major failure.
Fail-Soft - Fail-soft refers to computer systems that continue to operate at a
reduced but acceptable level after a system failure.
See [Figure 13.21] Methods and devices that attempt to ensure the accuracy, validity, and
propriety of information system activities.
Hurricanes, earthquakes, fires, floods, criminal and terrorist acts, and human error can all
severely damage an organization's computing resources, and thus the health of the
organization itself. Many companies, especially online e-commerce retailers and wholesalers,
airlines, banks, and Internet service providers, for example, are crippled by losing even a few
hours of computing power. That is why it is important for organizations to develop disaster
recovery procedures and formalize them in a disaster recovery plan. It specifies which
employees will participate in disaster recovery, and what their duties will be; what hardware,
software, and facilities will be used; and the priority of applications that will be processed.
Arrangements with other companies for use of alternative facilities as a disaster recovery site
and off-site storage of an organization's databases are also part of an effective recovery effort.
Information systems controls are methods and devices that attempt to ensure the accuracy,
validity, and propriety of information system activities. Information System (IS) controls must be
developed to ensure proper data entry, processing techniques, storage methods, and
information output. IS controls are designed to monitor and maintain the quality and security of
the input, processing, output, and storage activities of any information system.
[See Figure 13.22]:
Auditing IT Systems
An important objective of e-business system audits is testing the integrity of an application audit
trail. An audit trail can be defined as the presence of documentation that allows a transaction to
be traced through all stages of its information processing. The audit trail of manual information
systems was quite visible and easy to trace; however, computer-based information systems
have changed the form of the audit trail.
Ethical and Societal Dimensions. The vital role of information technologies and
systems in society raises serious ethical and societal issues in terms of their impact on
employment, individuality, working conditions, privacy, health, and computer crime as
illustrated in Figure 13.2. Employment issues include the loss of jobs due to
computerization and automation of work versus the jobs created to supply and support
new information technologies and the business applications they make possible. The
impact on working condition involves the issues of computer monitoring of employees
and the quality of the working conditions of jobs that make heavy use of information
technologies. The effect of IT of individuality addresses the issues of the
depersonalization, regimentation, and inflexibility of some computerized business
systems. Health issues are raised by heavy use of computer workstations for long
periods of time by employees which may cause work-related health disorders. Serious
privacy issues are raised by the use of IT to access or collect private information without
authorization, as well as for computer profiling, computer matching, computer
monitoring, and computer libel and censorship. Computer crime issues surround
activities such as hacking, computer viruses and worms, cyber theft, unauthorized use at
work, software piracy, and piracy of intellectual property. Manager, business
professionals, and IS specialists can help solve the problems of improper use of IT by
assuring their ethical responsibilities for the ergonomic design, beneficial use, and
enlightened management of information technologies in our society.
Answer the following questions to check whether you have achieved all the set
outcomes:
1. What can be done to improve the security of business uses of the Internet? Give several
examples of security measures, and technologies you would use.
Examples would include:
2. What potential security problems do you see in the increasing use of intranets and extranets
in business? What might be done to solve such problems? Give several examples.
Students answers will vary. However, with the increased business use of intranets and
extranets there is no doubt that the number of potential security problems will also increase.
Issues such as hacking, data alteration, unauthorized data access, etc. will become prime
security problems. As companies forge ahead in e-commerce and e-business activities, the
stakes get progressively higher, and the potential threat will also increase.
In order to solve such problems, businesses must continue to exercise caution in areas such as
encryption, fire walls, secure Internet sites, security monitoring, disaster recovery plans, security
awareness programs and policies must be implemented and monitored.
3. What are your major concerns about computer crime and privacy on the Internet? What can
you do about it? Explain.
Students answers will vary. However, a disaster recovery plan should be developed that
specifies which employees will participate in disaster recovery, what their duties will be, what
hardware, software, and facilities will be used, and the priority of applications that will be
processed. Arrangements with other companies for use of alternative facilities as a disaster
recovery site and off site storage of an organization's databases are also part of an effective
recovery effort.
5. Is there an ethical crisis in e-business today? What role does information technology play in
unethical business practices?
6. What are several business decisions that you will have to make as a manager that have both
an ethical and IT dimension? Give several examples to illustrate your answer.
Managers will be required to face making decisions that will have both ethical and an IT
dimension. For example, they will make decisions to implement technology to modernize a
manufacturing process will knowing at the same time that they will put hundreds of workers out
of work. They may also implement systems to monitor their employees while at the same time
causing high levels of employee stress, or invade their privacy.
7. What would be examples of one positive and one negative effect of the use of e-business
technologies in each of the ethical and societal dimensions in Figure 11.2? Explain several of
your choices.
Working Conditions: IT has eliminated some monotonous and obnoxious tasks in the office and
the factory that formerly had to be performed by people. Many automated operations relegate
people to a do-nothing standby role.
Privacy: Caller identification may allow users to identify sales people or prank callers. IT allows
supervisors to monitor employees private conversations and records.
Computer Crime: IT may be used in law enforcement. IT can be used as a tool in committing
crimes.
Health Issues: IT can be used in medical diagnosis. Heavy use of computers may cause health
problems like job stress, damaged arm and neck muscles, and eye strain and radiation
exposure.
Societal Solutions: IT can be used to solve human and social problems through societal
applications such as medical diagnosis, computer-assisted instruction, governmental program
planning, environmental quality control, and law enforcement. Computer-based information
systems can violate antitrust or international laws and regulations.
Students must submit all assignments and meet assessment requirements in order to pass
this subject. Class attendance is mandatory; at least 80% of all lectures per programme
have to be attended.
Bibliography