MIS Short Notes-35-Pages
MIS Short Notes-35-Pages
● Types of CBIS:
○ Breadth of support for IS - FAIS, ERP, TPS, E-Commerce
○ Support for Organisational employees - Workers, Office automation, BI, ES, Dashboard
Business Environment
Combination of social, legal, economic, physical or political factors in which business operates.
Any significant changes in them are likely to create Business pressures.
Business Pressures:
1. Market Pressures
a. Global economy/Globalization
b. Intense competition
c. Changing nature of workforce
d. Powerful customers
2. Technology Pressures
a. Tech Innovations and Obsolescence
b. Information Overload
3. Societal/Political/Legal Pressures
a. Social Responsibility
b. Compliance with Government regulations
c. Protection against terrorist attacks
d. Ethical issues
Organization Responses
Organizations respond to pressures by implementing IT:
1. Strategic Systems
2. Customer Focus
3. Make to Order
4. Mass Customization
5. E-Business
6. E-Commerce
Competitive Advantage
Any asset that provides an organization with an edge against its competitors in some measure
like cost, quality or speed.
It helps organizations control the market and get more profits.
Competitive Advantage and Strategic IS:
Managing Data
IT apps require data.
Data should be of high quality - accurate, complete, timely, consistent, accessible, relevant, and
concise.
Data Governance
Approach to managing information across the entire organization involves a formal set of rules
for creating, collecting, handling and protecting info.
One strategy for implementing data governance is Master data management.
It is a process that spans all orgn processes and apps. Provides companies with ability to store,
maintain, exchange, and sync a consistent, accurate and timely single truth for companies' master
data (set of core data)
Database Approach
DBMS minimizes:
● Redundancy
● Inconsistency
● Isolation
● Lack of flexibility
● Poor security
● Lack of sharing/availability
DBMS maximizes:
● Security
● Integrity
● Independence
Data Hierarchy:
Bit -> Byte -> Field -> Record -> DataFile/Table -> Database
RDBMS:
Data Model (ER diagram), Table, Entity, Record, Attribute, Primary key, Secondary Key,
Foreign key, Operations (SELECT, JOIN, PROJECT), Designing databases, Normalization,
Cardinality
Big Data
● Massive sets of unstructured or semi-structured data from web traffic, social media, sensors,
etc.
● Can reveal more patterns and anomalies.
● Vast datasets that exhibit variety, including structured and unstructured data, generated at
high velocity with no pattern, cannot fit in traditional dbs, and can be captured processed and
analysed in small time by IS.
Characteristics:
Volume, Velocity, Variety
Characteristics:
1. Organised by subject/business dimension
2. Integrated
3. Time variant
4. Non-volatile
5. Uses OLAP
6. Multidimensional
Knowledge Management
Knowledge:
Very distinct from data and info
Provide a higher level of meaning about that data and info
Benefits:
1. Improves overall orgn performance
2. Eg. acc managers can share tacit knowledge of how to best handle large accounts, use this
to train new acc managers
3. Improves customer service
4. More efficient production development
5. Improved employee morale and retention
6. Reward employees who add their expertise to the knowledge base
Knowledge Management Cycle
Decision
a choice among two or more alternatives that individuals and groups make
1. OLAP
Involves ETL, cube operations like slice, dice, rollup, drill down
2. Data Mining
Process of searching for valuable business info in large DB, data warehouse or data mart. It can -
predict trends, -identify previously unknown patterns.
1. Dashboard
easy access to timely information and direct access to management reports.
Capabilities of Dashboards - Drill down, Critical Success Factors, Key Performance Indicators,
Status Access, Trend Analysis, Exception Reporting
Ethics
Principles of right and wrong that individuals use to make choices that guide their behaviour
Ethical Frameworks
● Utilitarian Approach - provides most good and does the least harm to affected parties
● Rights Approach - best respects and protects moral rights of all affected parties
● Fairness Approach - actions treat all humans equally, or if unequally then with a
defensible reason
● Common Good Approach - respect and compassion for all, welfare of all
Ethical Issues
● Privacy - collecting, storing, and disseminating info about individuals
● Accuracy - authenticity, correctness of info that is collected and processed
● Property - ownership and value of info
● Accessibility - who should have access to info, should they pay for access
Privacy
Right to determine when and how much information about you can be gathered or communicated
to others
Apply to individuals, groups and institutions
Two rules:
right to privacy is not absolute,
publics right to know supersedes individuals privacy
Electronic Surveillance - monitoring our activities, cctv cameras, motion sensors, id cards,
google street view pics, facial recognition, employer reads employee emails, monitor employee
net usage
Personal Information in Databases - credit agencies, banks, cable tv, telephone, hospitals,
schools, retailers, govt. Where your records are, are they accurate, can we change them, will they
be released, how is it used, who has access to it
Information on Internet - e-bulletin, newsgroups, chat rooms, social media, blogs, free speech vs
privacy
Privacy Codes and Policies - orgn guidelines to protect privacy of customers, clients and
employees. Opt-out model, opt-in model. Platform for privacy preferences (P3P) protocol for
websites to enable visitors to determine what data can be collected.
Information Security
Processes and policies designed to protect an orgn from unauthorized access, use, disclosure,
disruption, or destruction
Unintentional Threats to IS
Acts performed without malicious intent that represents a serious threat to IS
1. Human Errors
High-level employee = higher risk
Dangerous employees - HR (add data of employees) and IS (create, modify all data),
contract labourers, consultants, janitors, guards
Laziness, carelessness, lack of awareness
Laptops, computing devices, opening emails, careless net surfing, poor password, office,
unmanaged devices, discarded equipment
2. Social Engineering
Attack in which perpetrator uses social skills to trick or manipulate legitimate employees
into providing confidential info or passwords.
Most common type is telephone impersonation, exterminator, tailgating, shoulder surfing
Deliberate Threats to IS
1. Espionage or Trespass - unauthorized person accesses orgn data
2. Information Extortion - threatens to steal and/or demands payment
3. Sabotage or Vandalism - defacing orgn website, damaging image of orgn with customers
4. Theft of Equipment/Info - small devices, carelessness, dumpster diving
5. Identity Theft - stealing mail, personal info, infiltrating orgn, impersonating an orgn
6. Compromise to intellectual property - IP, trade secret, patent, copyright
7. Software attacks -
● Remote attacks requiring user action - virus, worm, phishing, spear phishing
● Remote attacks needing no user action - DoS, DDoS
● Attacks by the programmer - trojan horse, back door, logic bomb
8. Alien Software - clandestine s/w, use up system resources, report on web surfing habits and
personal info, adware, spyware - keyloggers and screen scrapers, spam ware, cookies
9. Data acquisition attacks
10. Cyberterrorism/Cyberwarfare
Risk Management
Risk is probability that a threat will impact an info resource.
Goal is to identify, control and minimize impact of threat.
Processes of Risk Management: Analysis, Mitigation
Risk Analysis
To ensure that their IS security programs are cost-effective.
Steps of risk analysis:
a. Assess the value of each asset being protected
b. Estimate probability that each asset will be compromised
c. Comparing probable costs of an asset being compromised with that of protecting it
Risk Mitigation
Concrete actions against risks
Has two functions: implement controls to prevent threats, and develop means to recover if a
threat occurs
Risk mitigation strategies include:
a. Risk acceptance - accept the risk and absorb damages
b. Risk limitation - limit risk by implementing controls to minimize impact
c. Risk transference - transfer risk to compensate for the loss, like insurance
Physical Controls
prevent unauthorised individuals from gaining access to the company's facilities, walls, doors,
fencing, gates, locks, guards, and alarm, check if employee has logged off before leaving office
Access Controls
Restrict unauthorised individuals from using information resources
Involves two major functions:
● Authentication - confirms identity of person requiring access, ID, password, biometrics
● Authorisation - which actions, rights or privileges the person has
Communication Controls
● Firewall
● Anti-malware systems
● Whitelisting and Blacklisting
● Encryption
● VPN
● SSL
● Employee monitoring systems
Social Computing
Type of IT that combines social behaviour and IS. focussed on improving collabn and interacn
among people. make socially produced info available to everyone. Users produce use control and
manage content
Benefits to Customers:
● Better and faster vendor responses to complaints (Twitter, facebook)
● Customer assist each other (forums)
● Customer expectations can be fulfilled quickly
● Can easily search, link, chat and buy while still on the website
● Make better decisions while buying products, reviews, ratings
Benefits to Businesses
● Test new products and ideas quickly and inexpensively
● Learn about customer base
● Identify problems quickly and alleviate customer anger
● Learn customers' rapid feedback
● Increase sales when ppl share positively online
● More effective marketing campaigns
● Free advertising by viral marketing
● Identify and reward influential brand ppl
Social Computing: HR
● Recruiting
● Onboarding
● Training & Employee Development
● Finding a Job
Customer Relationship Management
It is customer focused and customer driven orgn strategy. It's a customer-centric way of thinking.
Helps companies acquire new and retain existing customers. Elements of CRM -
● Customer Touch Points
● Data Consolidation
● 360 data view of customer
● Collaborative CRM systems
E-Business
broader concept. In addition to the buying and selling of goods and services, e-business refers to
servicing customers, collaborating with business partners, and performing electronic transactions
within an organisation.
The degree of digitization is the extent to which commerce has been transformed from physical
to digital. Purely physical organizations are referred to as brick-and-mortar organizations.
Organizations engaged only in EC are called virtual (or pure-play) organizations.
Clicks-and-mortar organizations conduct some e-commerce activities, yet their primary business
is carried out in the physical world
Types of E-Commerce
B2C, B2B, C2C, B2E, G2C, G2B, m-Commerce
Benefits of E-Commerce
1. Organization Benefits
a. expand their market with minimum capital investment.
b. reduces the paperwork
c. reduces the cost to create processes and distribute paper-based info by digitizing
d. improves the brand image
e. provide better customer services
f. simplify, faster and efficient the business processes
g. increases productivity
2. Customer Benefits
a. 24x7 support, place orders or get service anytime, anywhere
b. more options and quicker delivery of products
c. more options to compare and select the cheaper
d. review comments of other customers about a product
e. options of virtual auction
f. provide readily available information
g. increases the competition among organizations, customers get discounts
3. Benefits to Society
a. need not travel, less traffic on road and low air pollution
b. reducing the cost of products, less affluent people can afford
c. enabling rural areas to access services and products
d. helping the government to deliver public services
Limitations of E-Commerce
1. Technological Limitations
a. lack of system security, reliability
b. software development industry changing rapidly
c. network bandwidth might cause issues
d. Special types of web servers or software is required by vendors
e. difficult to integrate an e-commerce existing apps or dbs
f. software/hardware compatibility issues
2. Non-Technological Limitations
a. Initial Cost
b. User resistance
c. Security/ Privacy
d. Lack of touch or feel of products
e. Internet access is still not cheaper and is inconvenient to use
B2C E-Commerce
1. Electronic Storefront and Malls
a. Electronic retailing (e-tailing)
b. Electronic storefront
c. Electronic Mall
2. Online Service Industries
a. Disintermediation
b. Cyberbanking
c. Online Securities Trading
d. Online job market
e. Travel Services
f. Online Advertising
i. Advantages: updated any time at minimal cost, reach large no of buyers
online, cheaper than radio TV, interactive and targeted to groups
ii. Advertising Methods: Banner ads, pop-up ads, pop-under ads, spam,
permission marketing, viral marketing
3. Issues in E-Tailing
a. Channel Conflict
b. Multichanneling
c. Order fulfilment
B2B E-Commerce
1. Sell-side marketplaces - forward auctions, customized electronic for large buyers, 3rd
party auctions
2. Buy-side marketplaces - procurement/purchasing, reverse auctions, e-procurement, group
purchasing
3. Electronic exchanges - private exchange, public exchange (vertical, horizontal,
functional)
Mobile Commerce
Type of e-commerce conducted purely using a mobile phone over the internet.
Motivation: wide of mobile, availability of proper net, mobile and net are very affordable now
Applications: Location-based, financial, intr business, access info, telemetry services.
Computer Networks and Cloud Computing
Computer Network
system that connects computers and other devices via communications media. types of computer
networks range from small to worldwide: PAN, LAN, MAN, WAN, and the Internet.
Types of Networks
1. PAN - shortest range, devices should be very close.
2. LAN - connects 2 more devices in a limited geographical area building, every LAN
device has NIC, and medium usually is unshielded twisted pair wire
3. WAN - large geo area country, connect lans, internet, telephone companies provide
4. Enterprise - the large enterprise can combine multiple lans, use for comm b/w dept or
outside
Network Protocols
1. Ethernet - common lan protocol, 10gbps
2. TCP/IP - protocol for internet
3. HTTP
Network Topologies
1. Bus
2. Ring
3. Star
4. Tree
5. Mesh
Network Components
Hardware: Hub, Switch, Router, Modem, Cable/connector
Software: NOS, Protocol suite
Communications Media/Channels
Dematerialization
Phenomenon when functions of many phy devices are included in another physical device. Eg
Smartphone.
1. Microwave
Transmit via EM wave. High volume, long distance, LOS commn.
Advantages: high bandwidth, inexpensive
Disadvantages: must have unobstructed LOS, susceptible to env interferences
2. Satellite
Use communication satellites.
Types of Satellites:
A. Geostationary GEO
22300 miles, stationary wrt to pt on earth, orbital speed matches rotation of earth, no need
for tracking them, for TV programs, cable operators broadcasting
Limitations: propagation delay diff for telephone calls, large, expensive, power to launch
B. Medium earth orbit MEO
6434miles, move relative to point on earth, negligible transmission delay, moderate no
needed for global coverage, for GPS, less expensive to build and launch.
Advantage: less expensive, nm prop delay
Limitation: move wrt earth, receivers must track
C. Low earth orbit LEO
400-700miles, closer to earth, least prop delay, move wrt earth
Advantages: pick signals from weak transmitters, satellite telephones can operate with
less power and small battery, consume less power, cost is less
Limitations: move wrt earth, receivers must track, large no, move fast
Propagation Delay: their transmissions take 1/4th of second to send and return from earth surface
Applications:
● GPS: wireless system, uses satellite, to help determine users their location on earth. 24
MEO.
● Satellite/Digital Radio: uninterrupted cd qlty radio beamed to your radio from both GEO
and MEO, Sirius XM
● IoS: some places only have satellite internet maybe cables are impossible or expensive,
GEO, dish mounted on homes, prop delay, disrupted by env
3. Radio
Use radio freq to send b/w transmitter and receiver.
Advantages: travel through walls, easy to install, inexpensive, high speeds
Drawbacks: electrical interference, susceptible to snooping, too far signal breaks and fades to
static, 30-40 miles only
4. Infrared
Red light not visible. Short dist commn b/w computer and peripherals. Transceiver.
Apps: remotes, VCRs, DVD CD players
Advantages: low to medium bandwidth
Disadvantages: Must have unobstructed LOS, only for short distances
Wireless Networks
Short Range
100 feet or less
1. Bluetooth - create small pans, low power conn
1.0 upto 8 devices in 10m area bandwidth 700kbps
4.0 transmit upto 25 Mbps 100 m area
2. PAN - computer network, common among computer devices close to one person
3. Ultra Wideband - high bandwidth, 100Mbps speed, for streaming multimedia from PC to
TV
4. NFC - smallest range, embedded in mobiles and credit cards
Medium Range
1. WiFi
Wifi Access Point - wlan, config, transmitter with antenna
Hotspot: wap provides service to no of users in small perimeter 300 feet
WiFi Direct - enables p2p commn, device can send data without relying on antenna,
250mbps, 800 feet
MiFi - small portable device provides permanent hotspot wherever they go, 10m
Super Wifi - long dist, using lower freq, better wall penetration than normal wifi
2. Wireless Mesh
Networks with multiple wifi access points, wide network, basically series of
interconnected lans
Wide Range
Connect users to internet over geographically big region, over licensed spectrum, regulated
Cellular Radio - 2 way radio commn over network of base stations using seamless handoffs.
1G, 2G, 3G, 4G, 5G
Wireless Broadband/WiMAX
● 802.16
● Provide point to multipoint wireless network
● High data rates over 10-40km
● Data transfer rate upto 75mbps
● Secure system, voice and video
Pervasive/Ubiquitous Computing
Every object that has processing power and connected to internet belong to pervasive computing.
It is invisible everywhere computing, embedded in objects around us.
Technologies that provide infrastructure for pervasive computing:
RFID
Attach tags with antenna and chips on goods then track movement using radio signals.
Barcodes
UPC, 12 digits
Limitations - LOS required, barcodes are printed hence ripped soiled, it can identify manu an
prod but not the actual item. Systems to replace barcodes:
QR
2d code
Advantages: much more info, nos text urls and japanese chars, resistant to damage, read from
any angle
RFID:
Use tags with embedded chips which contain data and antenna to transmit radio signal over short
dist to RFID readers.
Pass data over network to computer for processing.
Chip in RFID programmed with info to uniquely identify item
Contains info like its location when where its made
1. Active RFID tags: internal batteries, broadcast to reader, expensive, read over greater
dist, used in tolls
2. Passive RFID tags: rely on readers for power, less expensive, only 20ft, used in inventory
tracking
WSN
Network of interconnected battery powered wireless sensors called motes placed in env.
Mote
Motes collect data in an extended space. Each mote contains processing, storage, RF sensors, and
antennas. Mote activates for a sec when it has to transmit data. Relays to neighbour. Data moves
mote by mote to a central computer. If 1 mote fails another can pick up. Efficient. Reliable. Easy
to scale for more bandwidth.
Capabilities:
● If 1 mote fails another can pick up.
● Provide data from diff angles.
● Determine the direction of movement.
● Weight of vehicle.
● Amt of rain over field of crops.
Applications:
Thermostats (energy efficiency), Bridges and oil rigs (alerts for repairs), Jet engines (real time
data on performance), fruit vege crates (warning of spoilage), water meters (water use and leaks),
electrical meters (grid monitoring)
IoT
Objects are given unique identifiers and they transfer data over internet without human
interaction.
Examples: coke machine, heart monitor, farm animal with biochip, tire pressure.
Capabilities:
● reduce waste, loss and cost
● Identify need for repair replacement or recall
● Tracking expiration data on perishable items
Wireless Security
Cloud Computing
Computing that delivers convenient, on-demand, pay-on-go access for multiple customers to a
shared pool of computing resources rapidly and easily accessed over the internet.
Allows customers to acquire resources at any time and delete them when no longer needed.
Characteristics:
1. Provides on-demand self-service
2. Encompasses characteristics of grid computing - pool for single IT env, fault tolerance,
scale
3. Encompasses characteristics of utility computing
4. Utilizes broad network access - resources over the internet, used on any device
5. Pools computing resources - dynamically assign resources to multiple customers
6. Occurs on Virtualised Servers - Server farms
Types of Cloud
1. Public - shared, easily accessible, multiple customers, apps storage over the internet
2. Private - access to only a group of entities like business, provide IT on enterprise, secure,
firewall
3. Hybrid - public and private clouds, based on security env, and policies of company
4. Vertical - built for diff businesses specifically construction, finance, and businesses
Batch processing: firm collects data from transactions, placing them in groups/batches and
processes batches periodically
OLTP: transactions processed online as they occur, real-time by using internet
3. IS for Marketing
a. Customer relations
b. Customer profiles
c. Sales force automation
Reports
1. Routine reports
2. Ad-hoc/On-demand Reports
a. Drill down
b. Key indicator
c. Comparative
3. Exception reports
ERP
Designed to correct lack of commn among FAIS, view of whole orgn, integrates all resources on
common software platform and database.
ERP II systems - web-enabled inter-organisational ERP, integrate internal facing apps with
external focus apps of supply chain and CRM.
Benefits:
● Organizational flexibility and agility
● Decision support
● Quality and efficiency
Limitations:
● Business process predefined by best practices
● Difficult to implement
● Potential for failure
Causes of failure - not involve employees in planning, too fast, insufficient training, no
proper testing
2. Order fulfilment
● ERP with SCM - place auto requests for fresh products from supplier, connected to
barcode scanning system to track inventory, predict when supply will become low
● ERP with CRM - forecast analysis of product consumption based on location, season,
day, type of customer, suggest specific product campaigns, create demand-to-order
IT Strategic Plan
The IT strategic plan is a set of long-range goals that describe the IT infrastructure and
identify the major IT initiatives needed to achieve the organization’s goals
Objective:
1. It must be aligned with the organization’s strategic plan
2. It must provide an IT architecture that seamlessly networks users, applications, and
databases
3. It must efficiently allocate IS development resources among competing projects
Other models:
1. Joint Application Design - group meeting and all analysts, agree on requirements
2. Rapid Application Development - combines JAD, prototyping and integrated computer
soft engg for quick dev
3. Agile Development - delivers functionality in rapid iterations, frequent user
communication, development, testing, and delivery. One type -SCRUM acknowledges
that dev problems cannot be fully known from the start; works in quick sprints.
4. End-User Development - end users develop their own applications with little or no formal
assistance from the IT dept