MIS 2101 – Final Exam Study Guide: Carey O’Donnell

advertisement
MIS 2101 – Final Exam Study Guide: Carey O’Donnell
Sections 005 & 401 – Chapters 7 thru 10
Chap 7: Enhancing Business Processes Using ERP
Traditional business functions: (primary focus of ERP systems; not silos, but highly interrelated)
 Marketing and sales
 Supply chain management
 Accounting and finance
 Human resources
Order-To-Cash Process: all of the processes associated with selling a product or service (Sales Order Process)
Procure-To-Pay process: the processes associated with procuring goods from external vendors (Supply Chain)
Make-to-Stock / Make-to-Order Process: the processes associated with producing goods (Production)
Supply Chain: Core business processes enable the creation of supply chains; a “river” of material and activity
Value Chain: the set of business activities that add value to the end product. Two types of business activities:
 Core Activities: Inbound Logistics, Manufacturing, Outbound Logistics, Sales/Marketing, Customer Service
 Support Activities: Administration, HR, Tech Development, Purchasing
Legacy Systems: describes a firm’s existing IT systems; usually not integrated..silos of individual systems
ERP: Provides an integrated set of business applications in a master database used by every department &
business process
 Internally focused systems
 Externally focused systems
Primary ERP modules/applications:
 CRM - Customer Relationship Management
 Sales Order Processing
 SCM – Supply Chain Management
Primary value of ERP systems: forcing ‘Best Practices’ on all business processes
Core Components of ERP Systems:
 Financial Management
 Operations Management
 Human Resource Management
The primary organizational problems that drove the rapid implementation of ERP systems:
 Stand-alone Legacy applications (silos)
- Not designed to communicate with other system
- Variety of computing hardware platforms
- Enable departments to conduct daily business activities
- Not helpful for other areas in the firm
 Multiple Proprietary Legacy systems
- From vendors
- Not designed to share with other vendors’ systems
- Problem of knitting together (hodgepodge portfolio of discordant proprietary applications)
- Lack of integration between systems
The Formula for Success with Enterprise Resource Planning Systems:
 Secure executive sponsorship (Most failures are due to lack of top-level management support)
 Get help from outside experts (consultants can make implementations faster)
 Thoroughly train users.
- Training is the most overlooked, underestimated, and poorly budgeted expense
 Take a multidisciplinary approach to implementations (Include end users from all functional areas in the
development & implementation)
Chap 8: Supply Chain Systems
What is a Supply Chain?
 A supply chain is a collection of companies and processes moving a product:
- suppliers of raw materials
- suppliers of intermediate components
- final production
- to the customer
 Upstream—flow from sources of raw materials and components
 Downstream—flow to customers
 Suppliers - have their own supply chain
 A better name for this process: supply network
Benefits & Problems with Supply Chains:
 Potential benefits
- Process innovations
- Just-In-time Production (JIT)
- Vendor-Managed Inventory (VMI)
 Potential problems
- Distorted information
- Excessive inventories
- Inaccurate capacity plans
- Missed product schedules
Just-In-Time Production (JIT)
 Keeping inventory is costly (storage, capital, missed production schedules).
 JIT optimizes ordering quantities.
- Parts and raw materials arrive when needed for production
- As orders arriver in smaller quantities, but at higher frequency) investment in storage space and
inventory is minimized
 It is used extensively by computer manufacturers to avoid component obsolescence (Moore’s law).
- Example: Dell keeps only two hours of inventory in stock
 JIT requires tight cooperation between all partners in the supply network.
Other issues involving complex Supply Chains:
 The Bullwhip Effect – Where small end-product demand fluctuations cause large fluctuations further up
the supply chain, and Small forecasting errors at end of supply chain cause large errors further up the
supply chain. Integrated business processes (ERP) help mitigate the bullwhip effect.
 Corporate Social Responsibility - Transparency and accountability within the supply chain helps save
costs and create a good image. ERP’s can help when facing Product Recalls. Promotes sustainable
business practices.
Supply Chain Planning (SCP) – Four types of plans are used in businesses:
 Demand planning and forecasting
- Examination of historic data
 Distribution planning
- Delivering products to consumers
- Warehousing, delivering, invoicing, and payment collection
 Production scheduling
- Coordination of activities needed to create the product/service
- Optimization of the use of materials, equipment, and labor
 Inventory and safety stock planning
- Development of inventory estimates
Supply chain visibility—The ability to track products as they move through the supply chain, and to foresee
external events.
Supply chain analytics—The use of key performance indicators to monitor performance of the entire supply
chain, including sourcing, planning, production, and distribution.
Primary Objectives of Supply Chain Management (SCM) Strategy:
 Efficiency—cost minimization.
 Effectiveness—customer service maximization.
RFID (Radio Frequency Identification) is revolutionizing Supply Chain Management :
 Walmart the world leader in SCM via RFID
 RFID will soon replace standard bar codes on products


Tags are programmable, a vast array of uses; scanning can be done from greater distances
Many privacy concerns about RFID
Primary drivers of Customer Relationship Management (CRM) Technology:
 Customers have the power
 Economic transformation is taking place; i.e., from transactions to relationships
 Keeping customers satisfied is the key
Primary objectives of CRM: Companies search for ways to widen, lengthen, and deepen customer relationships:
 Widen – attract new customers
 Lengthen – keep customers satisfied and coming back
 Deepen – develop small customers into long-term profitable customers
Primary architecture of CRM systems:
 Operational CRM – e.g. Sales Force Automation (SFA), Customer Service & Support (CSS)
 Analytical CRM - Analysis of customer behavior and perceptions, to support marketing campaigns,
customer segmentation, and pricing strategies
 Collaborative CRM – improve communications internally & externally to better satisfy & retain customers
Powerful CRM Tool – Digital Dashboards:
 Digital dashboards help to visualize key CRM performance metrics; help process & comprehend lots of
information quickly
Chap 9: Developing & Acquiring New Information Technology Systems
Justifying IT Systems requires making a Good Business Case:
 Build a strong, integrated set of arguments based on facts and evidence
 Prove that an information system adds value to the organization
 Get rid of systems that are not adding value
 Proposed system –determine whether the new system is a “go” or a “no-go”
 Existing system—determine whether the company will continue to fund & support the system
The Productivity Paradox:
 Measurement problems – must balance effectiveness vs. efficiency
 Time lags – can be significant delays between initial investments/costs & system benefits
 Redistribution – no value in simply passing problems on to somewhere else in the organization
 Mismanagement – No amount of IT investment can overcome bad management
Three Strategies for Making the Business Case for IT Investment:
 Faith – Arguments that are based on beliefs about organizational strategy, competitive advantage,
industry forces, customer perceptions, market share; not hard facts but good arguments about what you
believe and can project
 Fear - Arguments that are based on the notion that if the system is not implemented, the firm will lose
out to the competition or, worse, go out of business
 Fact - Arguments that are based on data, quantitative analysis, and/or indisputable factors. Where you
provide a detailed cost-benefit analysis as proof
How to prepare a Cost-Benefit Analysis for a FACT-based argument:
 Identifying costs
- Total cost of ownership (TCO)
- Nonrecurring costs vs. recurring costs
- Tangible costs vs. intangible costs
 Identifying benefits
- Tangible benefits vs. intangible benefits
 Performing cost-benefit analysis
- Breakeven analysis
- Net-present value analysis
 Comparing competing investments
- How does this investment compare to other potential investments?
Tips when presenting the Business Case:
 Know the audience.
- People from different areas of the firm typically hold very different perspectives.
 Convert benefits to monetary terms.
- Example: Convert time savings into dollar figures.
 Devise proxy variables.
- Alternative measures of outcomes (Example: Reduction in administrative tasks, more customer
contact)
 Measure what is important to management.
- Concentrate on the issues senior business managers care about. Focus on hot-button issues like Cycle
time, regulatory requirements, etc.
Options for Acquiring New IT Systems & Software:
 Option 1: Build your own IT system
- Pro: get a custom system per your needs, pay for only what you need
- Con: Do you have enough expertise in-house? Often high cost of development
 Option 2: Buy a pre-packaged system
- Pro’s: Less costly, easy to procure, requires no specific tailoring or development
- Con’s: Not tailored for your unique processes, might not offer what you really need


Option 3: Outsource development to a 3rd party developer
- Pro’s: have the skills & expertise, experienced
- Con’s: Cost, security of your confidential data
Option 4: End-User development
- Pro’s: Agile, fast development of prototypes
- Con’s: Hard to do, finding the skills within your own organization
Systems Development Life Cycle: A proven, structured process for tackling big organizational problems & IT
systems, by breaking it down into manageable tasks, and successfully developing new systems by following a
complete life cycle process:





Phase 1: Systems Planning & Selection
Phase 2: Systems Analysis
Phase 3: System Design
Phase 4: System Implementation & Operation
Maintenance & Training
System Implementation & Conversion Strategies (understand the differences):
 Parallel
 Direct Cut-Over
 Phased
 Pilot
External Acquisition: Buying IT Systems from Outside Vendors (e.g. IBM, Accenture, SAP). Working to create
the most competitive process for getting the best system (similar to SDLC process):
1. Systems planning and selection
2. Systems analysis
3. Development of a request for proposal
4. Proposal evaluation
5. Vendor selection
One of most important steps: developing a good RFP (Request For Proposal):
 Documentation detailing system requirements sent to prospective vendors
 Invitation to vendors to present bids for the project
Software licensing is the permissions and rights that are imposed on applications & software.
Growing Trend – Application Service Providers. Solves many of the problems organizations have operating
their own complex IT systems:
- Managing the software infrastructure is a complex task.
- High operating costs
- Scalability issues
- In-house expertise

Solution – Outsource your IT to ASP’s , who provide businesses with SaaS (software as a service)
- Reduced need for companies to maintain or upgrade software
- Variable fee based on actual use of services (only pay for what you actually use)
- Ability to rely on a provider’s expertise; they have the expertise to maintain best of class system
Chap 10: Securing Information Systems
Primary Threats to Information System Security:
 Natural disasters
- Power outages, hurricanes, floods
 Accidents
- Power outages, fire
 Employees and consultants (stealing confidential information)
 Outsiders
- Viruses, Spyware, Hackers, Crackers
Computer crime—The act of using a computer to commit an illegal act
- Targeting a computer while committing an offense
- Using a computer to commit an offense
Using computers to support a criminal activity
Types of computer users pursuing illegal activity:
 Hackers—individuals who are knowledgeable enough to gain access to computer systems without
authorization.
- Term first used in the 1960s at MIT
- Often the motivation is curiosity, not crime
 Crackers—those who break into computer systems with the intention of doing damage or committing a
crime.
 Hacktivists—Those who attempt to break into systems or deface Web sites to promote political or
ideological goals
Profile of people who commit computer crimes:
1. Current or former employees
- 85–95% of theft from businesses comes from the inside
2. People with technical knowledge committing crimes for personal gain
3. Career criminals using computers to assist them in crimes
4. Outside crackers hoping to find information of value
- About 12 percent of cracker attacks cause damage
Malware—short for “malicious software” such as viruses, worms, and Trojan horses
- Virus—a destructive program that disrupts the normal functioning of computer software
- Worm - variation of a virus that is targeted at networks, taking advantage of security holes
-
Trojan Horse - does not replicate, but causes damage. Codes are hidden
Logic bombs or time bombs - Variations of Trojan Horses. Time bombs are set off by specific dates;
logic bombs are set off by certain types of operations.
A common attack on IT Systems: Denial of Service:
 Attackers prevent legitimate users from accessing services
 Zombie computers
- Created by viruses or worms
- Attack Web sites
 Servers crash under increased load
Spyware: Hidden within freeware or shareware, or embedded within Web sites:
 Gathers information about a user
- Credit card information
- Behavior tracking for marketing purposes
 Eats up computer’s memory and network bandwidth
Adware:
 Free software paid by advertisements
 Sometimes contains spyware
 Collects information for banner ad customization
Cookies: Cookies are messages passed to a Web browser from a Web server:
 They are stored in a text file.
 They are used for Web site customization.
 Cookies may contain sensitive information.
 Managing cookies
- Cookie killer software; removes cookies
- Web browser settings; you can delete cookies
- Tradeoff is convenience vs. privacy
Identity Theft: fastest growing ‘information crime’
 Stealing another person’s:
- Credit card number
- Social Security number
- Other personal information
 Results in bad credit for victim
Cybersquatting: The practice of registering a domain name and later reselling it.
Cyber Harassment, Stalking, and Bullying:
 Cyber harassment: Crime that broadly refers to the use of a computer to communicate obscene, vulgar,
Cyber stalking:
- Making false accusations that damage reputation of another

Gaining information on a victim by monitoring online activities
Using the Internet to encourage others to harass a victim
Attacking data and equipment of a victim by sending e-mail viruses or other destructive code
or threatening content
Cyber bullying is the deliberate cause of emotional distress to a victim

-
Intellectual property
Patents: process or machine inventions
Copyrights: creations of the mind
Software Piracy is a huge, global problem:
 Worldwide losses exceeded $53 billion in 2008
 Some factors influencing piracy around the world:
- Concept of intellectual property differs between countries
- Economic reasons for piracy
- Lack of public awareness about the issue
Cyberwar—Military’s attempt to disrupt or destroy another country’s information and communication systems
- Goal is to diminish opponent’s communication capabilities.
- It is used in concert with traditional methods
- Primary targets - Command and control systems
Cyberterrorism: A serious and growing problem
 Governments are not involved.
 Attacks can be launched from anywhere in the world.
 Goal is to cause fear, panic, and destruction.
 Developed nations’ technology, electrical, and other infrastructure is very vulnerable to cyber terrorism
 Cyberterrorism will likely become a weapon of choice in the future
Technology Safeguards for IT Systems:
 Physical access restrictions
 Firewalls
 Encryption
 Virus Monitoring and prevention
 Audit-control software
 Dedicated facilities
Computer Forensics:
 Use of formal investigative techniques to assess digital information
- Evaluation of storage devices for evidence of illegal activity
- Restoration of deleted files
IT Controls:
 Three general categories of controls:
- Preventive controls
- Detective controls
- Corrective controls
Main Types of IT Controls:
 Policies
- Define aim and objectives
 Standards
- Support the requirements of policies
 Organization and management
- Define the lines of reporting
 Physical and environmental controls
- Protect the organization’s IS assets
Sarbanes-Oxley Act – 2002:
 The Sarbanes-Oxley Act was formed as a reaction to large-scale accounting scandals.
- WorldCom, Enron
 It primarily addresses the accounting side of organizations.
 Companies have to demonstrate that:
- controls are in place to prevent misuse and fraud,
- controls are in place to detect potential problems, and
- measures are in place to correct problems
 One of the primary drivers for ERP systems & technology over the past decade
Download