ITM 100 All Notes
ITM 100 All Notes
ITM 100 All Notes
Chapter One
Information Systems in Business Today
Business Processes
- Business processes: the manner in which work is organized, coordinated, and focused to
produce a valuable product or service; the collection of activities required to produce a
product or service
- Business processes include flows of material, information, and knowledge
- Business processes also refer to the unique ways in which organizations coordinate work,
information, and knowledge, and the ways in which management chooses to coordinate
work
- May be tied to functional area or be cross-functional
- Sales and marketing
- Businesses can be seen as
collection of business processes
- Business processes may be
assets or liabilities
- Examples of functional business
processes
- Manufacturing and production
- Assembling the product
- Sales and marketing
- Identifying customers
- Finance and accounting
- Creating financial
statements
- Human resources
- Hiring employees
How Information Technology Improves Business Processes
- Increases efficiency of existing processes
- Automates steps that were manual
- Examples include checking a client’s credit, generating an invoice
- Enabling new processes
- Changing flow of information
- Replacing sequential steps with parallel steps
- Eliminating delays in decision making
- Supporting new business models
Types of Information Systems
- Transaction processing systems (TPS):
- Serve operational managers and staff
- Perform and record daily routine
transactions necessary to conduct
business
- Examples include sales order entry,
payroll, shipping
- Allow managers to monitor status of
operations and relations with external
environment
- Serve predefined, structured goals
and decision making
Systems for Business Intelligence
- Business Intelligence (BI)
- A technology-driven process for analyzing data and presenting actionable information to
help executives to make informed decisions
- Examples include management information systems, decision support systems, and
executive support systems
Enterprise Applications
- Systems for linking the enterprise
- Span functional areas
- Execute business processes across the firm
- Include all levels of management
- Four major enterprise applications
- Enterprise Resource Planning (ERP)
- Supply Chain Management
- Customer Relationship Management (CRM)
- Knowledge Management Systems (KMS)
Enterprise Systems
- Also known as enterprise resource planning (ERP) systems
- Collect data from different firm functions and store data in single central data repository
- Resolve problems of fragmented data
- Enable:
- Coordination of daily activities
- Efficient response to customer orders (production, inventory)
- Decision making by managers about daily operations and longer-term planning
Supply Chain Management (SCM) Systems
- Manager firm’s relationships with suppliers
- Inter-organizational systems
- Automate the flows of information across organizational boundaries
- Share information about:
- Orders, production, inventory levels, delivery of products and services
- Goal
- Right amount of products to destination with least amount of time and lowest cost
What is Collaboration?
- Collaboration consists of working with others to achieve shared and explicit goals
- There is a focus on a task or mission accomplishment within or across organizations
- Teams have a specific mission that someone in the business assigned to them
- Employees may collaborate in informal groups that are not a formal part of the business
firm’s organizational structure, or they may be organized into formal teams
- Collaboration and teamwork are more important today than ever for a variety of reasons:
- Changing the nature of work
- Growth of professional work
- Changing organization of the firm
- Changing scope of the firm
- Emphasis on innovation
- Changing culture of work and business
What is Social Business?
- Social business is the use of social
networking platforms to engage
customers, employees, and suppliers
- Social business aims to deepen
interactions and expedite information
sharing
- Supporters of social business argue
that if firms could tune in to these
conversations, they would
strengthen their bonds with
consumers, suppliers, and
employees, increasing their
emotional involvement in the firm
- All of this requires a great deal of
information transparency in order
to drive the exchange of
information without intervention
from executives or others
Checklist for Managers: Evaluating & Selecting Collaboration & Social Software Tools
- There are six steps in evaluating software tools:
- Identifying your firm’s collaboration challenges
- Identify what kinds of solutions are available
- Analyze available products’ cost and benefits
- Evaluate security risks
- Consult users for implementation and training issues
- Evaluate product vendors
IT Infrastructure
- An IT Infrastructure consists of a set
of physical devices and software
applications that are required to
operate the entire enterprise
- IT Infrastructure also includes a set of
firm-wide services budgeted by
management and composed of both
human and technical capabilities ,
these services include the following:
- Computing platforms used to
provide computing services that
connect employees, customers ,
and suppliers into a coherent digital
environment
- Telecommunications services that provide
data , voice , and video connectivity to
employees , customers , and suppliers
- Data management services that store and
manage corporate data and provide
capabilities for analyzing the data
- Application software services , including
online software services , that provide
enterprise-wide capabilities
- Physical facilities management services that
develop and manage the physical
installations required for computing ,
telecommunications , and data
communication services
- IT management services that plan and
develop the infrastructure , coordinate with
the business units for IT services , manage
accounting for the IT expenditure , and provide
project management services
- IT standards services that provide the firm and
its business units with policies that determine
which Information technology will be used,
when, and how
- IT education services that provide training in
system use to employees and offer managers
training in how to plan for and manage IT
investments
- IT research and developmental services that
provide the firm with research on potential
future IT projects and investments that could
melts the firm differentiate itself in the marketplace
- The "service platform” perspective makes it easier to understand the business value
provided by infrastructure investments
Technology Drivers of infrastructure Evolution
- Moore’s Law & Microprocessing Power
- There are three variations to Moore’s Law:
- 1. The power of microprocessors doubles every 2 years
- 2.Computing power doubles every 2 years
- 3. The price of computing falls by half every 2 years
- Law of Mass Digital Storage
- The amount of data being stored each year doubles
- Metcalfe’s Law & Network Economics
- The value or power of a network grows exponentially as a function of the number of
network members
- As the number of members in a network grows linearly, the value of entire system grows
exponentially and continues to grow as members increase
- Demand for information technology has been driven by the social and business value of
digital networks, which rapidly multiply the number of actual and potential links among
network members
- A fourth technology driver transforming IT infrastructure is the rapid decline in the costs of
communication and the exponential growth in the size of the internet
- As communication costs fall toward a very small number and approach zero, utilization of
communication and computing facilities explode
- To take advantage of the business value associated with the internet, firms must greatly
expand their internet connections, including
wireless connectivity, and greatly expand the
power of their client/server networks, desktop
clients, and mobile computing devices
Components of IT Infrastructure
1. Computer hardware platforms
- Computer hardware includes mainframes, servers, PCs, tablets, and smartphones
- Most business computing has taken place using microprocessor chips manufactures or
designedly intel corporation and, to a lesser extent, AMD corporation
- Mainframes act as the digital workhorse for banking and telecommunications networks
2. Operating system platforms
- System software: software that manages a computer system at a fundamental level
- Application software: software written to address specific needs-to solve problems in the
real world
- Corporate servers:
- Windows
- Unix
- Linux
- Client level:
- Microsoft Windows
- Android, iOS, Windows 10
- Google’s Chrome OS
- An operating system is a system software that:
- Manages computer resources, such as memory and input/output devices
- Provides an interface through which a human can interact with the computer
- Allows an application program to interact with these other system resources
- The various roles of an operating system generally revolve around the idea of “sharing
nicely”
- An operating system manages resources, and these resources are often shared in one
way or another among programs that want to use them
Enterprise Software
- Enterprise software is built around business
processes that reflect best practices, this
includes: Finance & accounting, HR,
manufacturing & production, and sales &
marketing
- Firms implement enterprise software by
selecting the functions of the system they wish to use and map business processes to
software processes
- They also use the software’s configuration tables for customizing
Business Value of Enterprise Systems
- Enterprise systems:
- Increase operational efficiency
- Provide firm-wide information to support decision making
- Enable rapid response to customer requests for information or products
- Include analytical tools to evaluate overall organizational performance and improve
decision-making
Key Terms
Bit: the smallest unit of data a computer can handle
Byte: a group of bits representing a single character
Field: a grouping of characters into a word, a group of words, or
a complete number
Record: a group of related fields
File: a group of records
Database: an organized collection of data stored centrally to
serve various
Entity: a person, place, thing, event about which information is
maintained
Attribute: description of a particular entity
Key Field: identifier field used to retrieve, update, and sort a
record
Designing Databases
- Conceptual design: abstract model of database from a business perspective
- Entity-relationship diagram: methodology for documenting databases illustrating
relationships between database entities
- Normalization: process of creating small stable data structures from complex groups of data
- Physical design: detailed description of how the data will actually be arranged and stores on
physical devices
Types of Decisions
- Unstructured decisions are those in which
the decision maker must provide judgement,
evaluation, and insight to solve the problem
- Structured decisions are repetitive and
routine, and they involve a definite procedure
for handling them so that they do not have
to be treated each time as if they were new
- Semistructured decisions are decisions
where only part of the problem has a clear-
cut answer provided by an accepted
procedure
Managerial Roles
- The classical model of management describes formal
managerial functions but does not address exactly
what managers do when they plan,
decide things, and control the work of
others
- Behavioural models argue that the
actual behaviour of managers appears
to be less systematic, more informal,
less reflective, more reactive, and less
organized
- Managerial roles are expectations of
the activities that managers should
perform in an organization
- These managerial roles fell into
three categories: interpersonal,
informational, and decisional
- Interpersonal roles are when managers
act as leaders, attempting to motivate,
counsel, and support subordinates
- Informational roles are when managers act as the nerve centres of their organizations,
receiving the most concrete, up-to-date information and redistributing it to those who need
to be aware of it
- Decisional roles are when managers act as entrepreneurs by initiating new kinds of activities,
they handle disturbances arising in the organization, they allocate resources to staff
members who need them, and they negotiate conflicts and mediate between conflicting
groups
Predictive Analytics
- Predictive analytics uses a variety of data and techniques to predict future trends and
behaviour patterns; including: statistical analysis, data mining, historical data, and
assumptions
- Predictive analytics are incorporated into numerous BI applications for sales, marketing,
finance, fraud detection, and health care
- Examples include credit scoring and predicting responses to direct marketing campaigns
Client/Server Computing
- Client/server computing: a distributed computing model in which some of the processing
power is located within small, inexpensive client computers and resides literally on desktops
or laptops or in handheld devices
- The server sets rules of communication for network and provides every client with an
address so others can find it on the network
- These clients are linked to one another through a network that is controlled by a network
that is controlled by a network server computer
- Client/server computing has largely replaced centralized mainframe computing
- The internet is the largest implementation of client/server computing
Packet Switching
- Packet switching: a method of slicing digital messages into parcels called packets, sending
the packets along different communication paths as they become available, and then
reassembling the packets once they arrive at their destinations
- Packets include data for checking transmission errors
- Prior to the development of packet switching, computer networks used leased, dedicated
telephone circuits to communicate with other computers in remote locations
- In circuit-switched networks (older), such as the telephone system, a complete point-to-
point circuit is assembled, and then communication can proceed
Communications Networks
- There are two ways to communicate a message in a network: an analog signal or a digital
signal
- An analog signal is represented by a continuous waveform that passes through a
communications medium and has been used for audio communication
- Common devices are the telephone handset, a computer speaker, or an iPhone speaker
- A digital signal is a discrete, binary waveform rather than a continuous waveform
- Digital signals communicate information as strings of two discrete states: 1 bits and 0 bits,
which are represented as on-off electrical pulses
- Computers use digital signals and require a modem to convert these digital signals into
analog signals that can be sent over cable lines or wireless media
- Modem: stands for modulator-demodulator
- Cable modems connect your computer to the Internet by using a cable network
- DSL modems connect your computer to the Internet using a telephone company’s
landline network
- Wireless modems perform the same function as traditional modems, connecting your
computer to a wireless network
Types of Networks
- Local area network (LAN): designed to connect personal computers and other digital devices
within a half-mile or 500-meter radius
- LANs typically connect a few computers in a small office or all the computers in one building
- LANs are also used to link to long-distance wide area networks (WANS)
- Ethernet is the dominant LAN standard at the physical network level, specify- ing the
physical medium to carry signals between computers, access control rules, and a
standardized set of bits that carry data over the system
- Alternatively, LANs may use a peer-to-peer architecture
- A peer to peer network treats all processors equally and is used primarily in small
networks with ten or fewer users
- Wide area networks (WANs): span broad geographical distances-regions, states, continents,
or an entire globe
- The most universal and powerful WAN is the Internet
- Metropolitan area network (MAN): a network that spans a metropolitan area, usually a city
and its major suburbs
- Its geographic scope falls between a WAN and a LAN
E-commerce Today
- E-commerce: refers to the use of the
internet and the web to transact business
- E-commerce is about digitally enabled
commercial transactions between and
among organizations and individuals
- E-commerce began in 1995 and grew
exponentially
- E-commerce stays stable even in a
recession
- New e-commerce includes social, mobile,
and local changes
- E-commerce has transferred from
desktop to smartphone
Types of E-Commerce
- Business to consumer (B2C): retailing of products and services directly to individual
customers
- Business to business (B2B): sales of goods and services to other businesses
- Consumer to consumer (C2C): consumers selling directly to consumers
- Mobile commerce: the use of handheld wireless devices for purchasing goods and services
from any location
System Security
- Security: refers to the policies, procedures, and technical measures used to prevent
unauthorized access, alteration, theft, or physical damage to information systems
- Controls: methods, policies, and organizational procedures that ensure the safety of the
organization’s assets, the accuracy and reliability of its records, and operational adherence
to management standards
- Information systems are mission critical for many organizations
- Failed computer systems can led to significant or total loss of business function
- Information systems are very vulnerable, they contain confidential personal and financial
data, trade secrets, new products, and strategies
- Without proper security measures, these systems would be next to impossible to use and
benefit from
- A security breach may cut into a firm’s market value almost immediately
- Inadequate security also brings forth issues of liability
Software Vulnerability
- Software can contain flaws that
create security vulnerabilities,
these can include:
- Bugs (program code defects)
- Zero defects cannot be
achieved because complete
testing is not possible with
large programs
- Flaws can open networks to
intruders, e.g. buffer overflow
defect that could cause a
system to crash and leave the
user with heightened privileges
- Zero-day vulnerabilities: holes in the software unknown to the creator
Computer Crime
- Computer crime: violation of criminal law that involves a knowledge of technology for
perpetration, investigation, or prosecution
- Computer as a target of crime:
- Breaching confidentiality of protected computerized data
- Accessing a computer sustem without authority
- Computer as an instrument of crime:
- Theft of trade secrets
- Using e-mail for threats or harassment
Internet Vulnerabilities
- Large public networks, such as the internet, are more vulnerable than internal networks
because they are virtually open to anyone
- Local area networks can be easily penetrated by outsiders armed with laptops, wireless
cards, external antennae, and hacking software
- Network communication is intercepted in an attempt to obtain key data
- Size of internet means abuses can have wide impact
- Use of fixed internet addresses creates a fixed target for hackers
- Unencrypted VOIP
Malicious Software
- Malicious software is commonly known as malware, which is a software that brings harm to
a computer
- Computer viruses:
- Rogue software programs that attempt to bypass appropriate authorization and/or
perform unauthorized functions
- Attach to other programs in order to be executed ,usually without user knowledge or
permission
- Copy themselves from one computer to another sometimes through email attachments,
stealing data or files, permitting eavesdropping access, or destroying data
- Worms:
- Worms: programs that copy themselves from one computer to another over networks
- Trojan horse:
- Trojan horse: a software program that appears to be benign, but then does something
unexpected
- Often transports a virus into a computer system
- SQL injection attacks
- Hackers submit data to web forms that sends rogue SQL query to database to perform
malicious acts
- Spyware
- Key loggers
- Can redirect search request and slow computer performance by taking up memory
Computer Crime
- Hackers: individuals who attempt to gain unauthorized access to a computer system
- Cracker: a hacker with criminal intent
- Click fraud: occurs when an individual or computer program fraudulently clicks an online ad
without any intention of learning more about the advertiser or making a purchase
- Identity theft: a crime in which the imposter obtains key pieces of personal information
- Phishing: setting up fake web sites or sending email messages that look legitimate, and
using them to ask for confidential data
- Pharming: redirecting users to a bogus web site
- Back door: unauthorized access to anyone who knows it exists
- Cyberterrorism and cyberwarfare: exploitation of systems by terrorists
- Spoofing: masquerading as someone else, or redirecting a web link to an unintended
address
- Sniffing: an eavesdropping program that monitors information travelling over a network
- Enables hackers to steal proprietary information such as e-mail, company files, etc
- DoS: hackers flood a server with false communications in order to crash the system
- Distributed DoS: uses numerous computers to launch a DoS
- Botnets: deliver 90% of work spam and 80% of world malware
Internal Threats: Employees
- Security threats often originate inside an organization
- Social engineering: tricking employees into revealing their passwords by pretending to be
legitimate members of the company in need of information
- Both end users and information systems specialists are sources of risk
Security & Controls
- Security: policies, procedures, and technical measures used to prevent unauthorized access,
alteration, theft, or physical damage to information systems
- Security measures: methods, policies, and organizational procedures that ensure safety of
organization’s assets; accuracy and reliability of its
accounting records; and operational adherence to
management standards
Security Policy
- Ranks information risks, identifies acceptable security goals, and identifies mechanisms for
achieving these goals
- Drives other policies, including the AUP (acceptable use policy)
- AUP: defines acceptable uses of firm’s information resources and computing equipment
- Identify management, including valid users and controlling the access they have
Disaster Recovery Planning & Business Continuity Planning
- Disaster recovery planning: devises plans for restoration of disrupted services
- Business continuity planning: focuses on restoring business operations after disaster
- Both types of plans are needed to identify the firm’s most critical systems
- Business impact analysis to determine impact of an outage
- Management must determine which
systems should be restored first
Virtualization
- Virtualization presents computing resources so that
they can be accessed in ways that are not restricted
by configuration
- Allows single physical resource to act as multiple
resources
- Reduces hardware and power expenditures
- Facilitates hardware centralization
- Software-defined storage (SDS)
Cloud Computing
- Off-load peak demand for computing power to
remote, large-scale data processing centres
- Pay only for the computing power they use, as with an electrical utility
- Excellent for firms with spiked demand curves caused by seasonal variations in consumer
demand
- Saves firms from purchasing excessive levels of infrastructure
- Data permanently stored in remote servers, accessed and updated over the Internet by
users
- A cloud can be public or private
- A public cloud is owned and maintained by a service provider
- A private cloud is operated only for an organization
- Concerns with cloud computing include:
- Security
- Availability
- Users become dependant on the cloud provider
Cloud Computing Services
- Infrastructure as a service (IaaS)
- Customers use processing, storage, and networking
resources to run their information systems
- They pay for only the computing capacity they use
- Platform as a service (PaaS)
- Customers use infrastructure and programming tools
to develop their own applications
- Software as a service (SaaS)
- Customers use software hosted on a vendor’s cloud
Green Computing
- Practices and technologies for manufacturing, using, and disposing of computing and
networking hardware
- Reducing power consumption is a high priority
- Data centres use as much energy as the output of 30 nuclear power plants
Quantum Computing
- Uses quantum physics to represent and operate on data
- This results in dramatic increases in computing speed
- While conventional computers handle bits of data either a 0 or 1 but not both, quantum
computing can process bits as 0,1, or both simultaneously
- This allows for business and scientific problems to be solved millions of times faster
Software Platform Trends
- Open source software
- Software for the web: Java, HTML, HTML5
- Web services and service-oriented architecture
- Software outsourcing and cloud services
Open-Source Software
- Open source software: software that is free and can be modified by users
- Developed and maintained by a worldwide network of programmers and designers under the
management of user communities
- Examples include Linux, OpenOffice, Firefox, and Apache web server
Software for the Web
- Java: one of the most prominent OO languages, both for PC and mobile environments
- Java Virtual Machine: used to convert Java code to the native language of a computer
- Python: used for building cloud computing applications
- Objective-C: predecessor to Swift
- Swift: one of the most popular mobile app languages for iOS
- HTML: the language used to create or build a web page
- Markup Language: a language that uses tags to annotate the information in a document
- Tag: the syntactic element in a markup language that annotate the information in a document
Apps & Mashups
- Apps: small pieces of software that run on the internet, your computer, or on your smart
phone
- Generally delivered over the internet
- Mashups: combinations of two or more online applications, such as combining mapping
software with local content
Machine Learning
- Machine learning: how computer programs improve performance without explicit
programming, it is accomplished by neural networks, deep learning networks, and genetic
algorithms, with the main focus on finding patterns in data, and classifying data inputs into
known and unknown outputs
- Recognizing patterns
- Experience
- Prior learnings (database)
- Supervised vs unsupervised learning
- Supervised learning: in which the system is trained by providing specific examples of
desired inputs and outputs identified by humans in advance
- Unsupervised learning: the same procedures are followed as in supervised learning but
humans do not feed the system samples
- The system is asked to process the development database and report whatever
patterns it finds
- Contemporary examples of machine learning include google searches, and recommender
systems on Netflix and Amazon
Neural Networks
- Neural networks: find patterns and
relationships in massive amounts of
data too complicated for humans to
analyze
- Neural networks learn patterns by
searching for relationships, building
models, and correcting over and
over again
- Humans train the network by
feeding it data inputs for which outputs
are known, to help the neural network
learn solutions by example from human
experts
- Neural networks are used in medicine,
science, and businesses for problems
in pattern classification, prediction,
financial analysis, and control and
optimization
Artificial Neural Networks
- The effective weight of the element is the sum of the weights multiplied by their respective
input values
v1 * w1 + v2 * w2 + v3 * w3
- Each element has a numeric threshold value
- If the effective weight exceeds the threshold, the unit produces an output value of 1, if it
does not exceed the threshold, it produces an output value of 0
Robotics
- Robotics: deals with the design, construction, operation, and use of movable machines that
can substitute for humans along with computer systems for their control, sensory feedback,
and information processing
- Robots cannot substitute entirely for people but are programmed to perform a specific series
of actions automatically
- They are often used in dangerous environments, manufacturing processes, military
operations, and medical procedures
Intelligent Agents
- Intelligent agents are software programs that work in the background without direct human
intervention to carry out specific tasks for an individual user, business process, or software
application
- The agent uses limited built-in or learned knowledge base to accomplish tasks or make
decisions on the user’s behalf such as deleting junk mail, scheduling appointments, etc
- Chatbots: software agents designed to simulate a conversation with one or more human
users via textual or auditory methods
- Agent based modelling applications include:
- Model behaviour of consumers, stock markets, supply chains
ITM100
Chapter Three
Information Systems, Organizations, & Strategy
Synergies
- The idea of synergies is that when the output of some units can be used as inputs to other
units or two organizations pool markets and expertise, these relationships lower costs and
generate profits
- Examples include the merge of Bank of NY and JP Morgan Chase
Enhancing Core Competencies
- Core competency: an activity for which a firm is a world-class leader
- Any information system that encourages the sharing of knowledge across business units
enhances competency
- Such systems might encourage or enhance existing competencies and help employees
become aware of new external knowledge; such systems might also help a business
leverage existing competencies to existing markets
Network-Based Strategies
- Take advantage of the firm’s abilities to network with one another
- Include the use of:
- Network economics
- Virtual company model
- Business ecosystems
Network Economics
- Marginal cost of adding new participant almost zero, with much greater marginal gain
- Value of community grows with size
- Value of software grows as installed customer use grows
- Compare to traditional economics and law of diminishing returns
Virtual Company Model
- A virtual company uses networks to ally with other companies
- Creates and distributes products without being limited by traditional organizational
boundaries or physical locations
Technical Solutions
- Solutions include:
- E-mail encryption
- Anonymity tools
- Anti-spyware tools
- Overall, technical solutions have failed to protect users from being tracked from one site to
another
- Browser features, including private browsing and do not track options
Ethical Analysis
- Five-step process for ethical analysis:
- 1. Identify and clearly describe the facts
- 2. Define the conflict or dilemma and identify the higher-order values involved
- 3. Identify the stakeholders
- 4. Identify the options that you can reasonably take
- 5. Identify the potential consequences of your options