MIS
Tools/Software for protection in ISS
- Authentication - Firewalls - Intrusion Detection System - Antivirus & Anti-spyware software - Threat mgmt system - Encryption
Points to note on SDLC
- Divides process into steps - steps need to be completed before next - requires review at each step - necessary to go back to correct problems - users heavily involved in SDLC process - in custom development each stage in SDLC is carried out with possible over laps/ retracking - in alternative methods of software acquisition not all steps in SDLC need to be followed
Limitations of SDLC
- Expensive - Prolongs time - Rigid approach - Difficult to go back steps - Doesn't actively involve users - Not intended for systems that need changes - lack of good analysis results in system that may not match needs
Crime and threat to Information Systems
- Hacker/Cracker - Ransomeware/spyware/trojan horse - identity theft/phishing - botnet - pharming - click fraud - cyber warfare - internal threats/employees - software vulnerability
Information Systems Analysis Tools
- Porters 5 Forces - Nolans stages of growth -. Porters value Chain Analysis - Strategic Grid
Benefits of ERD
- makes data travel easy - Visual Representation - Effective communication - Easy To Understand - Easy To Understand
Techniques to System anaylsis
1. Brainstorming 2. Questionnaires 3. Interviewing 3. documentation Review 4. Observation 5. Research
Porter's Generic Strategies
1. Cost Leadership 2. Product differentiation 3. Focus on market niche
First steps in ISS
1. Determine value of assets, hardware, software, networks & data 2. Establish weaknesses in existing system 3. Risk assessment 4. Choosing controls most suited -> cost-benefit analysis
key database activities
1. Entering & querying data using SQL or Query by Example (QBE) 2. Producing reports
Name Diagraming tools and what they do
1. Information flow diagrams (IFD) 2. Data Flow Diagrams (DFD) 3. Flow Process Charts 4. Entity Relationship Diagrams (ERD) Diagramming tools document current and new systems and tools that enable processionals to communicate and check analyzes with user community
Evolution of ISS
1. Technical - Responsibility of tech experts 2. Management - Responsibility shared by tech, users & mgmt 3. Institutional - Institutionalizing info security within organization
Features of ecommerce
1. Ubiquity 2. Global Reach 3. Universal Standards 4. Richness 5. Interactivity
Benefits of the internet in relation to Porters 5 Forces
1. enables new subs to emerge 2. shifts power to customer due to availability 3. reduces supplier power because of availability 4. Reduces barriers to entry 5. Widens geographic market
Steps in SSADM (Structured Systems Analysis and design methodology)
1. feasibility 2. requirement analysis 3. requirements specification 4. Logical systems specification 5. physical design
Types of Information Systems
1. transaction processing systems 2. management information systems 3. decision support systems 4. executive information systems 5. Business Intelligence 6. Human Resource Systems 7. Material Requirement Planning 8. Customer Relationship Systems 9. Supply Chain Management System 10. Enterprise System
Rapid Application Development (RAD)
A form of rapid prototyping that requires strict time limits on each phase and relies on tools that enable quick development. And lots and lots of testing
Which of the following is an example of a business using information systems to create new products and services?
A) Apple`s creation of the iPod
risks and advantages to database approach
Advantages: - program-data independence - minimal data redundancy - improved data consistency - improved data sharing - improved data accessibility Risks & Costs: - requires new, specialized personnel - conversion costs - installation & management - need for explicit backup & recovery - organizational conflict
Rapid Application Development (RAD) and Prototyping advantages and disadvantages
Advantages: RAD: - human acceptance - increased speed of development - increased quality Prototyping: - involves users in analysis & design - Reduced time and costs Disadvantages: RAD: -Reduced Scalability - Reduced features Prototyping: - Excessive Development Time - User confusion
What are Porter's 5 forces?
Allows businesses to gauge level of competition within industry and potential lines of business. The 5 Forces are: 1.) Bargaining power of suppliers 2.) Bargaining power of customers 3.)Threat of new entrants 4.) Threat of substitutes 5.) Competitive rivalry within the industry
An example of a business using information systems for customer and supplier intimacy is:
B) JC Penney`s information system that allows its contract manufacturers to see what garments have been sold and need to be replaced.
Why are businesses interested in big data?
Big data reveals patterns and anomalies; can provide insights into customer behavior, weather patterns, financial market activity, etc.
Approaches to Database Design
Bottom up: normalization Top-down: Entity-relationship modeling technique
______ refers to technologies, applications and practices for the collection, integration, analysis, and presentation of business information. The purpose is to support better business decision making.
Business Intelligence
A DSDM project's lifecycle phase are:
Business Study → Feasibility Study → Functional Model Iteration → Design and Build Iteration → Implementation
The field that deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm is called:
C) management information systems.
______ system allows businesses to manage business relationships and the data and information associated with them. Helps company stay connected to customers; contact info, transactions, client preferences, etc.
Customer Relationship Systems
Define Information Systems Stragegy
Defined by Ward and Peppard as a strategy that sets direction in which organization is going. Provides frame work for IS needs in terms of requirements and IT
______ is a systems that link together different functions into one system, such as HR, production & operation, accounting & finance.
Enterprise System
______ are systems at the strategic level, designed to provide the executive with information on the over all performance of the firm.
Executive information systems
Define system analysis
Finding out what system needs to be able to do. Identifying requirements by 1. Fact finding. 3 Attributes under consideration 1. Business processes 2. Data 3. Information Flows
Data Flow Diagram (DFD)
Flow of data within an information system.indicates sequence of tasks within a process, how it moves from one process to the next. Hoffer et al. "Data in motion, moving from one place to another"
______ store information on employees, recruit new ones, training and development of existing staff, automated pay roll, appraisals
Human Resource Management Systems
Connection between Information Systems strategies and Business strategy.
Information Systems strategy identifies applications (IT) that can support business strategy objectives
Information Security System
Information Technology (IT) Department is mainly responsible of the implementation and the maintenance of the ______________
14) What is the difference between information technology and information systems? Describe some of the functions of information systems.
Information technology (IT) consists of all the hardware and software that a firm needs to use in order to achieve its business objectives. Information systems are more complex. An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support decision making and control in an organization. The functions of an information system are to support decision making, coordination, and control; help employees analyze problems; help employees visualize complex subjects; and help create new products.
What does data provide? and what is performance based on?
It provides competitive advantage. It forces competition to match e.g., Fedex data tracking on website. Performance depends on accuracy and reliability of data
Define Database management system (DBMS) and give examples of types
Its a software for creating, storing, organizing, and accessing data. Systems helps manage volumes of data and large number of people. Types: 1. Hierarchical databases 2. Network databases 3. Oracle database 4. MySQL 5. Microsoft SQL
______ a system underneath production and operation information systems. Helps in scheduling resources used in production process.
Material Requirement Planning
Security Control Mechanisms in ISS and define
Methods, policies, procedures that aim in protecting organizations assets Controls: 1. Physical Hardware & Software controls -Equipment needs security against fire, dust, humidity, theft, etc. 2. Computer Operations Controls - Ensure programmed software controls correctly applied to processing & storage of data (data backup, recovering procedures) 3. Data security Controls -Ensures accuracy and completeness of any data thats stored, safeguards against illegal access, manipulation, or change. 4. Systems Implementation Controls - Done through audits at end of implementation stage. Done to secure system 5. Documentation Controls -Good documentation makes system more secure and less applicable to damage 6. Administrative Controls -Standards, rules & procedures to ensure all security controls are enforced fully 7. Application Controls Input controls, processing controls & output controls
Define normalization
Normalization is the process of organizing data into tables in a way to minimize data elements and many-to-many relationships (Laudon & Laudon, 2015)
Describe bargaining power customers and provide example
Powerful customers are able to exert pressure to drive down prices, or increase the required quality for the same price and therefore reduce profits in the industry Power also if various subs available such as various platforms to buy similar products E.g., Airline tickets
Describe threat of substitute products and provide example
Refers to the multiple substitute products that can replace ones own and what a consumer might buy instead. Example: Instead of flying, people can use trains, bullet trains, cars, motorcycles, or the biggest airplane threat to emerge: Elon Musks Hyperloop concept of capsule travel, 1200 km/h
Describe bargaining power of suppliers
Refers to the pressure suppliers can exert on businesses by raising prices, lowering quality, or reducing availability of their products. Business example: Coca-cola - largest supplier customer, meaning company has power over supplier
Stages of SDLC
Series of logical phases project has to go through: 1. Planning 2. Analysis 3. Design 4. Development 5. Implementation 6. Maintenance
define the database approach
Shared collection of data designed to meet info needs of an organization. Large repository of data used simultaneously within the company. Its a shared corporate resource.
Process Flow Diagram
Shows different functions required from a process and the logic of that process. Does not indicate sequence of tasks.
______ Helps manage relationships w/ suppliers...such as sharing info
Supply Chain Management System
What does a database administrator do?
The database administrator is responsible for maintaining the database and restricting access to the database to authorized personnel.
Systems Development Life Cycle (SDLC)
The overall process for developing business information systems from planning and analysis through implementation and maintenance
An IT infrastructure provides the platform on which the firm can build its information systems. A) True B) Fale
True
UPS's use of Web-based tools that allow customers to embed UPS functions such as tracking and cost calculations into their own Web sites was an information systems solution used to achieve customer intimacy. A) True B) Fale
True
Cash, McFarlan & McKenney Strategic Grid
Used to determine strategic importance of Information Systems. Modes: 1. Factor 2. Strategic 3. Support 4. Turnaround
Why is Information Security System important?
Used to prevent unauthorized access, alteration, theft, damage to the information systems.
Porter's Value Chain Analysis
Views a firm as a series of business processes that each add value to the product or service as it moves through each stage, categorized as primary value or support
Big Data 3 V's
Volume: amount of data available is greater than the firms ability to process it Variety: Big data is often "messy" it does't fit neatly into a database Velocity: data "arrives" rapidly and continuously
Datawarehouse
a large collection of data that contains and organizes in one place all the data from an organization's multiple databases. Father of data warehouses is William Inmon
Entity Relationship Diagram (ERD)
a technique for documenting the entities and relationships in a database environment One-to-on one-to-many many-to- many one and one only one many one or many zero or many zero or one Business example: Amazon order numbers and customer IDs
Define feasibility study
an assessment of the practicality and potential for success of a proposed business idea. Considers economic, technical, operational, and organizational feasibility
Define big data
billions to trillions of records from different sources. Data from web traffic, emails, social media, machine generated data, or electronic trading systems. Unstructured or semi-structured
Prototyping
building an experimental system rapidly and inexpensively for end users to evaluate
______ are computer-based information systems at the management level that combine data and analytical models to support semi-structured and unstructured decision-making.
decision support systems
Structured systems analysis and design methodology (SSADM)
developed by Learmont & Burchett and CCTA Provides project development staff with detailed rules and guidelines to work to and is highly structured. Covers feasibility to design
Information Flow Diagrams
diagram that shows how information is communicated from a source to a receiver or target, through some medium
Why is there a need for a security policy in ISS?
ensures appropriate backup & procedures are in place for any security problems
Describe competitive rivalry among competitors and provide example
extent to which firms within an industry put pressure on one another and limit each other's profit potential Example: Pepsi and Coca-cola
Define data modeling
focuses on the data that must be stored by the system.
Define database reports
generates reports that organizes data from database and prints it into useful format. e.g., quarterly sales report -> summing sale total
Define Process modeling
graphically represents the processes that capture, distribute, and store data between a system and its environment
define database administrator (DBA)
helps in development and effective management of an organizations database.
define DBMS facilities and what it allows
it is a software that interacts w/ the users application programs and the database. It allows: - users to define database - users to insert, update, delete, & retrieve data - provides controlled access
______ are computer- based systems that make information available to users with similar needs. Provide reports about current performance
management information systems
relational database model
proposed by E.F Codd (1970) stores information in the form of logically related two-dimensional tables
Dynamic Systems Development Methodology (DSDM)
proposes an interactive approach with frequent delivery of prototypes to end users through phases of project
Describe threat of new entrants and provide example
refers to the threat new competitors pose to existing competitors in an industry. E.g., Airline industry, hard to enter, various established companies such as KLM. Southwest and various others entered using cost-cutting strategies.
database design
the process of converting a data model into tables, relationships, and data constraints
______ are systems designed to ensure routine tasks are carried out effectively and efficiently.
transaction processing systems