W1 Lesson 1 - Introduction To Information Systems - Module (14 Files Merged)
W1 Lesson 1 - Introduction To Information Systems - Module (14 Files Merged)
W1 Lesson 1 - Introduction To Information Systems - Module (14 Files Merged)
Learning Outcomes:
en.wikipedia.org/wiki/Information_system
1. Hardware
2. Software
3. Data
4. Processes
5. People
Computing jobs are among the highest paid and have the highest job
satisfaction. Computing is very often associated with innovation, and
developments in computing tend to drive it. This, in turn, is the key to
national competitiveness. The possibilities for future developments are
expected to be even greater than they have been in the past.
There actually are more computing jobs than qualified people to fill
them in the United States. The Bureau of Labor Statistics projects
growth rates between 12% and 37% in computing and information
technology occupations from 2012 through 2022. If you consider the
expected growth in computing, it’s easy to see that companies simply
need more talent. Don’t miss out on pursuing the large number of open
positions available right now.
http://computingcareers.acm.org/?page_id=4
http://csbapp.uncw.edu/mis213/01/1-2.html
http://csbapp.uncw.edu/mis213/01/1-2-2.html
http://csbapp.uncw.edu/mis213/01/1-3.html
Assignment
Visit some web sites in your region that offer employment opportunities in IT. Salaries offered to
accountants, marketing personnel, financial personnel, operations personnel, and human
resources personnel.
Glossary
Computer Based Information System is an information system that
uses computer technology to perform some or all of its intended tasks.
References
Rainer, Prince (2015), Introduction to Information Systems, fifth
Edition
en.wikipedia.org/wiki/Information_system
http://computingcareers.acm.org/?page_id=4
http://csbapp.uncw.edu/mis213/01/1-2.html
2
ORGANIZATIONAL STRATEGY, COMPETITVE ADVANTAGE, AND INFORMATION
SYSTEMS
Learning Outcomes:
• Customer Satisfaction
• Cost Reduction
• Cycle and Fulfillment Time (think manufacturing)
• Quality
• Differentiation
• Productivity
http://csbapp.uncw.edu/mis213/02/2-1.html
BUSINESS PRESSURES
1. Market pressures
2. Technology pressures
3. Societal pressures (also includes political and legal)
1. Strategic systems
2. Customer focus
3. Make-to-order and mass customization
4. E-business
http://csbapp.uncw.edu/mis213/02/2-3.html
http://csbapp.uncw.edu/mis213/02/2-3-2.html
COMPETITIVE ADVANTAGE
http://csbapp.uncw.edu/mis213/02/2-4.html
BUSINESS - IT ALIGNMENT
http://whatis.techtarget.com/definition/business-IT-alignment
GLOSSARY
Cross-functional business process is one in which no single
functional area is responsible for its execution.
REFERENCES
http://csbapp.uncw.edu/mis213/02/2-1.html
http://csbapp.uncw.edu/mis213/02/2-3.html
http://csbapp.uncw.edu/mis213/02/2-3-2.html
http://csbapp.uncw.edu/mis213/02/2-4.html
http://whatis.techtarget.com/definition/business-IT-alignment
3
DATA AND KNOWLEDGE MANAGEMENT
Learning Outcomes:
MANAGING DATA
DATA GOVERNANCE
en.wikipedia.org/wiki/Data_governance
Nothing in these basic definitions limits the size of a data mart or the
complexity of the decision-support data that it contains. Nevertheless,
data marts are typically smaller and less complex than data
warehouses; hence, they are typically easier to build and
maintain. Table A-1 summarizes the basic differences between a data
warehouse and a data mart.
http://docs.oracle.com/html/E10312_01/dm_concepts.htm
KNOWLEDGE MANAGEMENT
en.wikipedia.org/wiki/Knowledge_management
Data: Facts and figures which relay something specific, but which are
not organized in any way and which provide no further information
regarding patterns, context, etc. I will use the definition for data
presented by Thierauf (1999): "unstructured facts and figures that have
the least impact on the typical manager."
http://www.knowledge-management-tools.net/knowledge-information-
data.html
http://staff.neu.edu.tr/~msagsan/files/PUBL/A-NEW-LIFE-CYCLE-
MODEL-FOR-PROCESSING-OF-KNOWLEDGE-
MANAGEMENT.pdf
GLOSSARY Data Governance is a control that ensures that the data entry by an
operations team member or by an automated process meets precise
standards, such as a business rule, a data definition and data integrity
constraints in the data model.
REFERENCES
en.wikipedia.org/wiki/Data_governance
http://docs.oracle.com/html/E10312_01/dm_concepts.htm
en.wikipedia.org/wiki/Knowledge_management
http://www.knowledge-management-tools.net/knowledge-information-
data.html
http://staff.neu.edu.tr/~msagsan/files/PUBL/A-NEW-LIFE-CYCLE-
MODEL-FOR-PROCESSING-OF-KNOWLEDGE-
MANAGEMENT.pdf
Learning Outcomes:
http://csbapp.uncw.edu/mis213/06/6-1.html
Network Fundamentals
Types of Communications Media (Wired)
Twisted Pair
Coaxial Cable
• High Capacity
• Fast!
http://csbapp.uncw.edu/mis213/06/6-2.html
Identify A URL
The most widely used service on the Internet is the World Wide Web.
The World Wide Web (WWW or Web) consists of a worldwide
collection of electronic documents called Web pages. A browser is a
software program used to access and view Web pages. Each Web page
has a unique address, called a URL (Uniform Resource Locator),
that tells a browser where to locate the Web page. A URL consists of a
protocol, domain name, and sometimes the path to a specific Web
page or location on a Web page. Most URLs begin with http://, which
stands for hypertext transfer protocol, the communications standard
that enables pages to transfer on the Web.
A search engine is a software program you can use to find Web sites,
Web pages, and Internet files. To find a Web page or pages, you enter
a relevant word or phrase, called search text or keywords, in the
search engine’s text box. Many search engines then use a program
called a spider to read pages on Web sites and create a list of pages
that contain the keywords. Any Web page that is listed as the result of
the search is called a hit. Each hit is a link that can be clicked to
display the associated Web site or Web page.
http://uwf.edu/clemley/cgs1570w/notes/concepts-2.htm
NETWORK APPLICATIONS
We use networks in business for a few large categories of
application:
1. Discovery
a. Search Engines (and "meta search engines" that search
OTHER search engines)
b. Translation Services, fact-checking, etc.
c. Portals (personalized gateways - like mySeaport or
iGoogle)
2. Communication
3. Collaboration
1. Employee Benefits
- Employee opportunities for persons with
disabilities
- Reduced travel time
2. Employee Disadvantages
- Feelings of isolation
- Slower promotions
- Workplace visibility
3. Employer Benefits
- Ability to retain skilled workers who may not
be able to work at a physical location
- Could reduce cost of office space, equipment,
etc.
4. Employer Disadvantages
- Difficulties in supervising
- Additional training costs
- Potential security issues (data must now be
transferred to many more locations)
http://csbapp.uncw.edu/mis213/06/6-4.html.
Glossary
Bandwidth is the transmission capacity (speed) of a network -
measured in bits per second (bps).
Search engine is a software program you can use to find Web sites,
Web pages, and Internet files.
References
Rainer & Prince. Introduction to Information Systems, 5th Edition.
Wiley 2015
http://csbapp.uncw.edu/mis213/06/6-1.html
http://csbapp.uncw.edu/mis213/06/6-2.html
http://uwf.edu/clemley/cgs1570w/notes/concepts-2.htm
http://csbapp.uncw.edu/mis213/06/6-4.html.
BUSINESS INTELLIGENCE
Learning Outcomes:
Productivity
A measurement of resources used as compared to the goals met.
http://csbapp.uncw.edu/mis213/12/12-1.html
http://csbapp.uncw.edu/mis213/12/12-3.html
Assignment:
Provide at least 3 industries using Business Intelligence software and how it benefits them.
Glossary
Business Intelligence is the applications and technologies for
consolidating, analyzing, and providing access to vast amounts
of data to help users make better business and strategic
decisions
Productivity
A measurement of resources used as compared to the goals met.
References
Rainer & Prince. Introduction to Information Systems, 5th
Edition. Wiley 2015
http://csbapp.uncw.edu/mis213/12/12-1.html
http://csbapp.uncw.edu/mis213/12/12-3.html
Learning Outcomes:
WHAT IS ETHICS?
Ethics (also moral philosophy) is the branch
of philosophy that involves systematizing, defending, and
recommending concepts of right and wrong conduct
http://en.wikipedia.org/wiki/Ethics
Code of Ethics
https://www.sans.org/security-resources/ethics.php
http://csbapp.uncw.edu/mis213/03/3-1.html
3. Property: Who owns information? What are the just and fair
prices for its exchange? Who owns the channels, especially the
airways, through which information is transmitted? How
should access to this scarce resource be allocated?
- One must have the intellectual skills to deal with information. These
are skill such as reading, writing, reasoning, and calculating. This is a
task for education.
These are powerful factors working both for and against contemporary
literacy in our organizations and in our society.
http://www.gdrc.org/info-design/4-ethics.html
Privacy
Privacy can be defined as an individual condition of life characterized
by exclusion from publicity (Neetling et al., 1996, p. 36). The concept
follows from the right to be left alone (Stair, 1992, p. 635; Shank,
1986, p. 12)1.
http://web.simmons.edu/~chen/nit/NIT%2796/96-025-Britz.html
Glossary
Code of Ethics is a collection of principles that are intended to guide
decision making by members of an organization
References
Rainer & Prince. Introduction to Information Systems, 5th Edition.
Wiley 2015
http://en.wikipedia.org/wiki/Ethics
http://csbapp.uncw.edu/mis213/03/3-1.html
http://www.gdrc.org/info-design/4-ethics.html
http://web.simmons.edu/~chen/nit/NIT%2796/96-025-Britz.html
https://www.sans.org/security-resources/ethics.php
Learning Outcomes:
WHAT IS SECURITY?
It is “the quality or state of being secure—to be free from danger.”In
other words, protection against adversaries—from those who would do
harm, intentionally or otherwise—is the objective.
http://www.cengage.com/resource_uploads/downloads/1111138214_2
59146.pdf
http://csbapp.uncw.edu/mis213/04/4-1.html
Unintentional Threats
Unintentional threats are performed WITHOUT malicious intent.
(Often unknowingly!)
http://csbapp.uncw.edu/mis213/04/4-2.html
Deliberate Threat
A man-made incident that is either enabled or deliberately caused by
human beings with malicious intent, e.g.,
disgruntled employees, hackers, nation-states, organized
crime, terrorists, and industrial spies.
http://itlaw.wikia.com/wiki/Man-made_deliberate_threat
http://csbapp.uncw.edu/mis213/04/4-4.html
Access Controls
• Authentication verifying you are who you say you are by any
of the following ways:
o Something you ARE (biometrics, fingerprints, eye
scanner, etc.)
Communications Controls
• Recovery
• Information Security Auditing
http://csbapp.uncw.edu/mis213/04/4-5.html
Glossary
Deliberate Threats are man-made deliberate threat incident that is
either enabled or deliberately caused by human beings with malicious
intent, e.g., disgruntled employees, hackers, nation-states, organized
crime, terrorists, and industrial spies.
References
Rainer & Prince. Introduction to Information Systems, 5th Edition.
Wiley 2015
http://www.cengage.com/resource_uploads/downloads/1111138214_2
59146.pdf
http://csbapp.uncw.edu/mis213/04/4-1.html
http://csbapp.uncw.edu/mis213/04/4-2.html
http://itlaw.wikia.com/wiki/Man-made_deliberate_threat
http://csbapp.uncw.edu/mis213/04/4-4.html
http://csbapp.uncw.edu/mis213/04/4-5.html
1. Describe the differences between Web 1.0 and Web 2.0, and
explain the benefits of three information technologies used by
Web 2.0;
2. Identify five prominent Web 2.0 applications, and provide at
least one example of how each can be utilized in a business
setting;
3. Discuss the three categories of Web 2.0 sites, and provide at
least one example of how each can improve business efficiency
and profitability.
http://csbapp.uncw.edu/mis213/09/9-1.html
Web 1.0
It is the “readable” phrase of the World Wide Web with flat data. In
Web 1.0, there is only limited interaction between sites and web users.
Web 1.0 is simply an information portal where users passively receive
information without being given the opportunity to post reviews,
comments, and feedback.
Web 2.0
It is the “writable” phrase of the World Wide Web with interactive
data. Unlike Web 1.0, Web 2.0 facilitates interaction between web
users and sites, so it allows users to interact more freely with each
https://wittycookie.wordpress.com/2012/06/04/what-are-the-major-
differences-among-web-1-0-2-0-and-3-0/
Wiki:a Web site on which anyone can post content and make changes
to already posted content.
http://csbapp.uncw.edu/mis213/09/9-2.html
Mashups: A web site that takes content from a number of other web
sites and mixes them together to create a new kind of content (e.g.,
SkiBonk, Healthmap, ChicagoCrime)
http://csbapp.uncw.edu/mis213/09/9-3.html
Glossary Web 1.0 is the “readable” phrase of the World Wide Web with flat
data.
Web 2.0 is the “writable” phrase of the World Wide Web with
interactive data.
References
Rainer & Prince. Introduction to Information Systems, 5th Edition.
Wiley 2015
http://csbapp.uncw.edu/mis213/09/9-1.html
https://wittycookie.wordpress.com/2012/06/04/what-are-the-major-
differences-among-web-1-0-2-0-and-3-0/
http://csbapp.uncw.edu/mis213/09/9-2.html
http://csbapp.uncw.edu/mis213/09/9-3.html
Learning Outcomes:
WHAT IS E-COMMERCE?
WHAT IS E-BUSINESS?
the application of information and communication technologies (ICT)
in support of all the activities of business.
http://en.wikipedia.org/wiki/Electronic_business
http://www.grin.com/en/e-book/280494/introduction-to-e-commerce-
technology-in-business
Types of E-commerce
• B2C - Business to Consumer - customers (individuals) deal
directly with a firm, avoiding intermediaries such as retail
stores.
• B2B - Business to Business customers (business organizations)
deal directly with a firm, avoiding intermediaries such as retail
stores.
• C2C - Consumer to consumer - individuals sells products or
services directly to other individuals.
• B2E - Business-to-Employee - An organization uses e-
commerce internally to provide information and services to its
employees. Companies allow employees to manage their
benefits, take training classes electronically as well as buy
discounted insurance, travel packages, and event tickets.
http://csbapp.uncw.edu/mis213/07/7-1.html
Benefits of e-Commerce
1. To Organizations
a. national and international markets are more accessible
b. lowers costs of processing, distribution and retrieving
information
2. To Customers
a. 24/7 accessibility
b. more powerful with ability to research before buying
3. To Society
Limitations of E-commerce
1. Technological Limitations
2. Non-technological Limitations
• Cyber banking
• Online securities trading
• Online job market
• Travel services
• E-tailing
o E-storefronts (one business selling their products)
o E-malls (multiple businesses selling their products)
• Electronic Auctions
ELECTRONIC PAYMENTS
www1.american.edu/initeb/sm4801a/epayment1.htm
wonder that more and more people are turning to electronic payment --
or e-payment -- as an alternative to sending checks through the mail.
http://money.howstuffworks.com/personal-finance/online-
banking/electronic-payment1.htm
http://money.howstuffworks.com/personal-finance/online-
banking/electronic-payment2.htm
• Privacy
http://ocw.metu.edu.tr/pluginfile.php/355/mod_resource/conten
t/0/Lecture_5.pdf
• Channel Conflict
Glossary
e- business is the application of information and communication
technologies (ICT) in support of all the activities of business.
REFERENCES
http://en.wikipedia.org/wiki/Electronic_business
http://www.grin.com/en/e-book/280494/introduction-to-e-commerce-
technology-in-business
http://csbapp.uncw.edu/mis213/07/7-1.html
http://money.howstuffworks.com/personal-finance/online-
banking/electronic-payment1.htm
http://money.howstuffworks.com/personal-finance/online-
banking/electronic-payment2.htm
www1.american.edu/initeb/sm4801a/epayment1.htm
http://ocw.metu.edu.tr/pluginfile.php/355/mod_resource/content/0/Lec
ture_5.pdf
10
Learning Outcomes:
Wireless Technologies
Wireless technologies include both wireless devices, such as smart
phones, and wireless transmission media, such as microwave, satellite,
and radio. These technologies are fundamentally changing the way
organizations operate.
5. Mobile Commerce
Refers to electronic commerce transactions that are conducted
in a wireless environment, especially via the Internet and is
driven by:
Pervasive Computing
Pervasive Computing or Ubiquitous Computing
The concept of invisible "everywhere computing" that is embedded in
t he objects around us – the floors, the lights, our cars, washing
machine, microwave oven, cell phones, clothes, and so on. (e.g., smart
home, smart appliances)
Wireless Security
Clearly, wireless networks provide numerous benefits for businesses.
However, they also present a huge challenge to management – namely,
their inherent lack of security. Wireless is a broadcast medium, and
transmissions can be intercepted by anyone who is close enough and
has access to the appropriate equipment. There are four major threats
to wireless network:
Glossary
Mobile Computing refers to real-time, wireless connection between a
mobile device and other computing environments, such as the Internet
and an intranet.
REFERENCES
http://csbapp.uncw.edu/mis213/08/8-1.html
11
The main focus of this lesson is on how students will understand the
application of information systems in organizations. This course builds
on that knowledge and focuses on the organizational environments in
which information systems are used and the business problems they
can help solve.
Learning Outcomes:
1. products manufactured
2. sales made
3. persons hired
4. payroll check generated
5. etc.
Examples are:
That is, ERP systems are designed to break down the information
silos of an organization.
These silos did not communicate well with one another , and this lack
of communication and integration made organizations less efficient.
This inefficiency was particularly evident in business process that
involve more than one functional area, such as procurement and
fulfillment.
• Organizational flexibility
• Decision Support
• Quality and Efficiency
o Error reduction
o Reduced redundancy
• Decreased costs (over time)
Reports
Many Information Systems generate reports that collect and organize
data into presentable & readable information.
Glossary
Batch Processing is when the firm collects data from transactions as
they occur placing them in groups, or batches, then prepares and
processes the batches periodically.
REFERENCES
http://en.wikipedia.org/wiki/Enterprise_resource_planning
http://csbapp.uncw.edu/mis213/10/10-1.html
12
Learning Outcomes:
Goals of CRM:
1. Customer Satisfaction
If you can work out who to target and what communications they
respond to best, then you will be able to produce more efficient
marketing campaigns. CRM data can show you this and enable you to
profile target groups which may be underperforming in order to try
and boost this area of your business, with the goal of boosting profits.
CRM will help you find out a lot of useful information about your
customer base, and will allow you to work out where there are gaps
that need to be filled. Exploring the reasons why customers fail to
make purchases or why they may not rate your company’s services can
help you adapt new policies and techniques which may help you
attract new customers. The same principals apply to working out why
previous customers have stopped using your services or why they
might have turned to your competitors.
5. Boost Sales
Finally, this last objective is what drives all of the other objectives
above. With so much competition in the market today, it is important
more than ever that businesses stay relevant and keep offering new
things to their clients. By improving the way your business operates,
how the customer interacts with your business and producing effective
marketing strategies, you can hope to improve the way your business
is viewed and encourage new customers, as well as ensuring that
existing ones keep coming back. This will boost your profits and help
keep your company ahead of its competitors.
http://crmsystems.expertmarket.co.uk/top-5-crm-goals
Data can be gathered and analyzed from customers using what are
known as customer touch points. These are points at which
interactions may allow an organization to practice the above Tenets of
CRM
• Data warehouses
• Data mining
• Decision support
Glossary
Analytical CRM System uses customer behavior and perceptions in
order to provide actionable business intelligence (back-end).
REFERENCE
http://csbapp.uncw.edu/mis213/11/11-1.html
13
Learning Outcomes:
SUPPLY CHAIN
The function of SCM is to improve the way a company finds the raw
materials it needs to produce a product or service and deliver it to its
customers. That is, supply chain management is the process of
planning, organizing the various activities performed along the supply
chain.
1. Plan
2. Source
3. Make
4. Deliver
5. Return
Push Model
Pull Model
• Vertical Integration
• Inventories
o Just-in-time inventory
• Information Sharing
o Vendor-managed inventory
• Inter-organizational Information System (IOS): involves
information flows among two or more organizations.
o Extranets link business partners to one another over
the Internet by providing access to certain areas of each
other's corporate intranets.
Benefits of EDI:
Drawbacks of EDI:
6.
Glossary
Electronic data interchange (EDI) is another very common solution.
EDI is a communication standard that enables business partners to
exchange routine documents, such as purchase orders, electronically.
REFERENCE
http://csbapp.uncw.edu/mis213/11/11-5.html
14
Learning Outcomes:
Organizations must analyze the need for application and then justify
each purchase in terms of costs and benefits. The need for information
systems is usually related to organizational planning and to the
analysis of its performance vis-a- vis its competitors. The cost –
benefit justification must consider the wisdom of investing in a
specific IT application versus spending the funds on alternative
projects.
Application Portfolio
A prioritized list of both existing and potential IT applications of a
company.
States the firm's overall mission, the goals that follow from that
mission, and the broad steps necessary to reach these goals.
IT Architecture
Delineates the way an organization's information resources should be
used to accomplish its mission.
IT Strategic Plan
A set of long-range goals that describe the IT infrastructure and major
IT initiatives needed to achieve the goals of the organization.
IT Steering Committee
Comprised of managers and staff representing various organizational
units. This committee establishes IT priorities and ensures that the IS
functions meets the needs of the enterprise.
1. Systems investigation
2. Systems analysis
3. Systems design
4. Programming and testing
5. Implementation
6. Operation and maintenance
Major Advantages
• Control
• Accountability
• Error detection
Major Drawbacks
• Relatively inflexible
• Time-consuming and expensive
• Discourages changes once user requirements are done
Prototyping
Approach that defines an initial list of user requirements builds a
prototype system and then improves the system in several iterations
based on users' feedback.
End-User Development
A development method that has the actually user develop their own
application(s) for use.
Component-Based Development
Uses standard components to build applications.
Object-Oriented Development
Does not begin with the task to be performed, but with aspects of the
real world that must be modeled to perform that task.
5. Negotiate a contract.
Glossary
Application Portfolio is a prioritized list of both existing and potential
IT applications of a company.
REFERENCE
http://csbapp.uncw.edu/mis213/13/13-1.html