MIS Chapter 1 Internet and global communications have greatly reduced economic and cultural advantages of developed countries Drastic reduction of costs of operating and transacting on a global scale Customers no longer rely on local businesses for product and services Developed countries compete with less developed world for jobs, markets, resources, and ideas Business Objectives of Information Systems Operational Excellence o Improved operational efficiency results in higher profitability o Information systems and technologies help to improve higher levels of efficiency and productivity New products, services, and business models o Information systems and technologies enable firms to create new products services and business models o A business model includes how a company produces, delivers, and sells its products and services to create Customer and supplier intimacy o Customers who are served well become repeat customers who purchase more o Close relationships with supplies result in lower costs Improved decision making o A company’s bottom line can be hurt by managers being swamped with data that are neither timely nor helpful, forcing them to use guesswork o Real time data gave improved the ability of managers to make decisions Competitive Advantage o Achieving one or more of the previously mentioned business objectives often leads to competitive advantage o Advantages over competitors include charging less for superior products, better performance Survival o Business may need to invest in information systems out of necessity o Necessity arises from keeping up with competitors o Necessity also arises from federal and state regulations Information Technology vs Information Systems Information technology is the hardware and software a business uses to achieve its objectives Information systems consist of interrelated components working together to collect, process, store and disseminate information to support decision making, coordination, control, analysis and visualization Data vs information Data are streams of raw facts representing events and occurrences Information refers to the data shaped and given meaning Turn Data into Information Three activities in an information system produce the information need to make decisions, control operations, analyze problems and create new products or services o Input – captures raw data o Processing – converts raw input into meaningful form o Output – transfers processed information to those people or activities for which it is needed Information Systems Literacy vs Computer Literacy Information systems literacy o Includes behavior and technical approach Computer literacy o Focuses mostly on knowledge of technology Management information systems o Focuses on broader information systems literacy o Issues surrounding the development, use and impact of information systems used by managers and employees Dimensions of Information Systems Organizations o Technology changes organizations and vice versa o Must know something about the structure, history, and culture of the organization to understand how a specific organization uses its systems People o Information systems are useless without skilled people to build, maintain, and use/understand them o Employee attitudes affect ability to use systems productively Technology Problem Solving Approach Few business problems are simple or straightforward Information systems and technologies can provide solutions to business challenges and problems Most business problems involve several major factors that can be categorized as organization, technology, and people Typical organizational problems: o Outdated business processes o Unsupportive culture and attitudes o Political in fighting o Turbulent business environment, change o Complexity of task o Inadequate resources Typical technology problems: o Insufficient or aging hardware o Outdated software o Inadequate database capacities o Insufficient telecommunications capacity o Incompatibility of old systems with new technology o Rapid technological change Typical people problems: o Lack of employee training o Difficulties of evaluating performance o Legal and regulatory compliance o Work environment, ergonomics o Poor indecisive management o Lack of employee support and participation o Wrong incentive A model of the problem-solving process Problem identification solution design solution evaluation and choice implementation Constant feedback loop Problem Identification Solution design o Try to consider as many different solutions are possible o Most successful solutions usually involve an integrated approach Solution evaluation and choice o Factors to consider are: Cost of the solution Implementation o Building or purchasing solution o Testing solution, employee training o Change management o Measurement of outcomes o Feedback, evaluation of solution The importance of critical thinking in problem solving Without critical thinking, it is easy to jump to conclusions, misjudge a problem and waste resources Critical thinking o The sustained suspension of judgment with an awareness of multiple perspectives and alternatives Four elements of critical thinking o Maintaining doubt and suspending judgment o Being aware Chapter 3 – Achieving Competitive Advantage with Information Systems Competitive Advantage A firm’s ability to do something better, faster, cheaper, or uniquely when compared with rival firms in the market Firms main gain a competitive advantage because they have access to special resources, or they can use resources more efficiently Porter’s Competitive Forces Model Provides a general view of those things that affect a firm’s strategic position The five competitive forces are: o Traditional competitors o New market entrants o Substitute products and services o Customers o Suppliers Organizations may focus on one or more of these generic strategies Low-cost leadership o Using IS to achieve the lowest operational cots and the lowest prices Product differentiation o Use IS to enable new products and services o Greatly change the customer convenience in using your existing products and services Focus on market niche o Using IS to enable specific market focus, and serve this narrow target market better than competitors Strengthen customer and supplier intimacy o Using IS to tighten linages with suppliers and develop intimacy with customers The internets impact on competitive advantage Enables new products and services Transforms industries Increases bargaining power of customers and reduces bargaining power of suppliers Intensifies competitive rivalry Creates new opportunities for building brand and large customer bases The value chain model A value chain is a business model that describes the full range of activities need to create a product or service The purpose of a value chain analysis is to increase production efficiency so that a company can deliver maximum value for the least possible cost Using the value chain model will encourage you to benchmark your business processes against your competitors and identify industry best practices o Benchmarking – setting strict standards for products, services, or activities and then measuring performance against those standards o Best practices – industry standard business processes that have been identified as the most successful solutions or problem-solving methods for consistently and effectively achieving a business objective Extending the value chain to a value web A firm’s value chain is linked to the value chains of its suppliers, distributors, and customers Internet technology has made it possible to create highly synchronized industry value chains called value webs A value web is a networked system that can synchronize the value chains of business partners within an industry to respond rapidly to changes in supply and demand Competing on quality & design What is quality? o For the producer: conformance to specifications and absence of variation from specs o For the customer: physical quality, quality of service, psychological quality What is total quality management (TQM) o Makes quality the responsibility of all people and functions within an organization What is lean six sigma o Lean focuses on reducing waste or inefficiencies in a process. Six sigma is focused on the quality in a process Using IS to improve quality o Reduce cycle time by simplifying the product and production process o Benchmarking o Use customer demands to improve products and services o Improve design and precision o Improve production precision and tighten production tolerances What is Business Process Management (BPM) o An approach to business which aims to continuously improve business processes o Often, the steps required to accomplish a task are combined and streamlined to eliminate repetitive and redundant work o BPM is never concluded because continuous improvement requires continual change Steps for effective BPM o Identify processes for change o Analyze existing processes o Design the new process o Implement the new process o Continuous measurement Chapter 4 Ethics and information systems Ethics refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors Ethical issues in information systems have been given new urgency by the rise of the Internet and electronic commerce When using IS, it is essential to ask what the ethical and socially responsible course of action is Five moral dimensions of the information age Information rights and obligations o Primarily deals with privacy issues Property rights and obligations o Primary deals with intellectual property issues Accountability and control o Primarily deals with issues of liability for unintentional consequences of system use System quality o Primarily deals with issues of data quality and system errors Quality of life o Primarily deals with negative social consequences Key technology trends that raise ethical concerns Doubling of computer power o Most organizations use information systems for critical operations, increasing our dependence on systems and our vulnerability to system errors and poor data quality Declining data storage costs o Has made it possible for organizations to easily maintain detailed databases on individuals, which has made the routine violation of individual privacy both cheap and effective Data analysis advances o Made it possible to analyze vast quantities of data to develop detailed profiles of individual behavior; these profiles may be sold to other companies or government agencies o Nonobvious relationship awareness combines data from multiple sources to find obscure connections that might help identify criminals or terrorist Networking advances o Has made it possible to copy data from one location to another as well as access personal data from remote locations creating unimaginable privacy issues Growth in mobile devices o Makes it easy to track individuals without their knowledge Basic Ethical Concepts Responsibility and accountability o Individuals, organizations, and societies are responsible for the actions they take and should be held accountable to others for the consequences of their actions Liability o Extends responsibility into the area of law by permitting individuals to recover damages Due process o A process in which laws are known and understood o Ability to appeal to higher authorial to ensure laws applied correctly Ethics in an IS Professional code of conduct o Often professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect o Professional codes of conduct are promulgated by associates of professionals o Code of ethics are promises by professionals to regulate themselves in the general interest of society Information rights: Privacy and freedom in the Internet Age Privacy is the claim of individuals to be left alone, free of surveillance or interference from other individuals, organizations, or the state Most privacy law is based on a 1973 set of rules called Fair Information Practices. In 1998, FIP was extended to provide guidelines for protecting online privacy and in 2012 was extended again to address the issue of regulating behavioral targeting Internet challenges to privacy o Cookies Tiny files deposited on a computer hard drive that tracks a user’s visit to a website May be used to customize content for each visitor based on their interests and/or to create a detailed profile of a visitor o Web bugs Tiny graphics files embedded in e – mail messages and web pages that are designed to monitor online internet user behavior o Spyware Technology that aids in gathering information about a person or organization without their knowledge o Opt out vs. opt in Opt out model permits collection of personal info until consumer requests the data not to be collected, whereas opt in model prohibits business from collecting personal info unless consumer specifically takes action to approve information and collect use Property rights: Protecting intellectual property Copyright o A statutory grant that protects creators of intellectual property against copying by others for any purpose during the life of the author plus an additional 70 years after the authors death o Protection for book, music, maps, artwork, software, etc. o The drawback to copyright protection is that the underlying ideas behind a work are not protected Patent o Grants the owner an exclusive monopoly on the ideas behind an invention for 20 years o Protection for machines, devices, or methods o The key concepts in patent law are originality, novelty, and invention Chapter 5 Computer Networks and client/server computing Client/Server computing - A model for computing that splits processing between and servers on a network Multitiered client/server architecture (n – tier) – Balances load of network over several levels of servers Storage Technology Primary storage - Part of the computer that temporarily stores program instructions and data being used by the instructions o RAM Provides temporary storage for computer operation Stores data programs and data currently in use Instructions are considered volatile Secondary Storage – Relatively long term, nonvolatile storage of data outside the CPU and primary storage o Flash memory USB flash drive SSD o Magnetic disk Magnetic disk hard rive o Optica disk o Magnetic Tape Contemporary hardware trends The mobile digital platform o Emerged as alternatives to PCs and larger computer o Quickly becoming the primary means of accessing the internet o Mobile devices, smartphones, netbooks, and tablet computers Virtualization o Allows multiple virtual machines, with heterogeneous operating systems to run in isolation, side by side on the same physical machines Cloud Computing o Refers to a model of computing in which firms and individuals obtain computing resources and software applications over the internet Green Computing o Refers to practices and technologies for the designing, manufacturing, using, and disposing of computer hardware to minimize the impact on the environment o Key priority is power reduction System software vs application software System software – generalized programs that manage the computers resources such as the central processor, communication links and peripheral devices o Includes operating systems, language translations, and utility programs Application software – programs written for a specific application to preform functions specified by end users o Includes programing languages, 4th generation languages, and desktop productivity tools Software Trends Open-Source Software Cloud based software services/tools Principal issues in managing hardware and software technology Capacity planning o The process of predicting when a computer hardware system becomes saturated o Ensures that the firm has enough computing power for its current and future needs Scalability o The ability of a computer, product, or system to expand to serve a large number of users without breaking down Total cost of ownership o Designates the total cost of owning technology resources, including initial purchase costs, the cost of hardware and software upgrades, maintenance, technical support, and training Using technology service providers o Outsourcing – the practice of contracting computer center operations, telecommunications networks, or applications development to external vendors o Using cloud services Chapter 7 Network Interface Device - Each computer on the network contains a network interface device to link the computer to the network; serves as a unique identifier Connection Medium - Used to link network components Network Operating System – Routes and manages communications on the network and coordinates network resources. May reside on every computer or on a dedicated server – Device used to connect network components, sending packets of data to all other connected devices. Least intelligent and expensive Switch – Used to filter and forward data to a specified destination on the network. More efficient than hub Router – a special communications processor used to route packets of data through different networks, ensuring that the data sent gets to the correct address. Smartest and most complicated Key Digital Networking Technologies o Packet switching Allows millions of users to send chunks of data across the Internet concurrently Messages are broken down into small, fixed bundles of data called packets Based on the concept of turn taking, packets from each user are alternated in the shared network Does not require a dedicated circuit o Protocols A set of rules and procedures governing transmission of information between two points in a network Transmission control protocol/internet protocol Provides a universally agreed on method for breaking up digital messages into packets, routing them to the proper address, and then reassembling them into coherent messages o TCP Preforms packetizing Breaks the data into smaller packets Numbers them Ensures each packet is reliably delivered Puts them in the proper order at the destination IP Address Types of networks o Local Area Network (LAN) Designed to connect personal computers and other digital devices within a half mile o Wide Area Network Spean large geographical distances Typically used to connect wo or more LANs o Metropolitan Area Network Connection Medium – Physical Transmission Media o Twisted wire – Two or more pairs of insulated copper wires twisted together o Coaxial cable – contains a solid inner copper conductor surrounded by insulation and outer braided copper or foil shield o Fiber optics – Made of light conducting glass or plastic core, surrounded by more glass, called cladding and a tough outer sheath o Three kinds of wireless networks used by computers: Microwave – uses a high frequency radio signal that is sent through the air using either terrestrial or satellite systems to transmit data over long distances Cellular – uses radio waves to communicate with radio antennas WiFi – may use LAN or mobile access port o Advantages/Disadvantages Most wireless media is susceptible to EMI and eavesdropping Costs start out moderate with high frequency radio and terrestrial microwave, and rise sharply with satellite microwave The internet – a large worldwide collection of networks that use a common protocol to communicate with each other o Created in the early 1970s by DARPA to link scientists and university professors around the world o Connect to the internet is provided by an ISP or through your organization, university, etc. which has a designated Internet domain Internet Addressing and Architecture o IP Address Each domain is associated with one or more IP addresses, which serves as a destination address Any device on a network must have its own unique address o Domain Name System Provides a service analogous to an address book lookup Special DNS servers on the internet are dedicated to performing the translation from a domain name to an IP address and vice versa o IPv6 The world ran out of IP addresses using the existing addressing convention in 2012 o Internet2 Advanced networking consortium of over 500 universities, business government agencies and other institutions Internet services and communication tools o E – mail o Chat/instant messaging o File transfer protocol The World Wide Web o Voice over IP – uses the IP to deliver voice information in digital form of suing packet switching o VPN – a secure connection between two points across the internet to transmit corporate data. Provides a low-cost alternative to a private network o video and save it all in a text file that any computer can read Chapter 8 System Vulnerability/Malfunctions o Hardware problems (breakdowns, configuration errors, damage from improper use or crime) o Software problems (programming errors, installation errors, unauthorized changes) o Disasters (power failures, flood, fires, etc) o Internet The internet is more vulnerable than internal networks because it is virtually open to anyone, making the organizations information systems more vulnerable to actions from outsiders o Wireless Networks Vulnerable to penetration because radio frequency bands are easy to scan Malicious Software o Malware – malicious software programs Virus – a software program that attaches itself to other software programs or data files to be executed, often causing hardware and software malfunctions Worm – Independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs Trojan Horse – a software program that appears legitimate but contains a second hidden function that may cause damage Malware SQL Injection Attack – take advantage of vulnerability in poorly coded web application software to introduce code into a company systems and networks Ransomware – Tries to extort money from users by taking control of their computers or displaying annoying pop up messages Spyware – Monitors web activity and serves up advertising Hackers and Computer Crimes o The US Department of Justice defines a computer crime as any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution o Hacker – An individual who intends to gain unauthorized access to a computer system o Cybervandals – Intentional disruption, defacement destruction of website or corporate information system o DoS – Flooding server with thousands of false requests to crash the network o DDoS – Use of numerous computers to launch a DoS o Spoofing – Misrepresenting oneself by using fake e mail addresses or masquerading as someone else o Sniffing – Eavesdropping program that monitors information traveling over network Identity Theft o A crime in which an imposter obtains key pieces of personal information that is used to obtain merchandise and/or services in the name of the victim or to obtain false credentials o Phishing – a form of spoofing involving setting up fake websites or sending e – mail messages that look like those of legitimate businesses to ask users for personal information o Evil Twins – Wireless networks that pretend to be legitimate WiFi networks to entice participants to log on and reveal passwords and credit card numbers o Pharming – Redirects users to bogus web pages, even when the individual types of the correct web pages address into his or her browser Other Computer Crimes o Click Fraud – Occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase o Cyberterrorism – The use of computer and networking technologies against persons or property to intimidate or coerce civilians, government, or any part of society to attain political, religious, or ideological goals o Cyberwar – An organized attempt by a country’s military to disrupt or destroy the information and communications systems of another country Internal Threats – Employees o Security threats often originate inside an organization from: o Inside knowledge Employees have access to a lot of privileged information o Sloppy security procedures o Social engineering Tricking employees into revealing their passwords by pretending to be legitimate members of a company Software Vulnerability o Commercial software contains hidden bugs or program code defects o Patches – Vendors release small pieces of software to repair flaws Legal and Regulatory Requirements o HIPPA o Gramm – Leach – Bliley Act of 1999 o Sarbanes – Oxley Act of 2002 Electronic Evidence and Computer Forensics o The scientific collection, examination authentication, preservation and analysis of data held on or retrieved from computer storage media in such a way that information can be used as evidence in a court of law A framework for security and control o Risk assessment Determines the level of risk to a firm if a specific activity or process is not properly controlled o Security Policy Outlines how the company is going to protect itself o Acceptable Use Policy Defines acceptable use of the firm’s information resources and computing equipment as well as the consequences for noncompliance o Disaster recovery planning Devises plans for restoration of computing and communications services after they have been disrupted Security Technologies/Tools o Authentication The ability of each party in a transaction to ascertain the identity of the other party o Token A physical device usually small enough to fit on a key ring Smart cards o Firewall A combination of hardware and software that acts as a gatekeeper and prevents unauthorized users from accessing private networks by monitoring and controlling the flow of incoming and outgoing network traffic o Intrusion Detection Systems Feature full time monitoring tools placed at the most vulnerable points or hot sports of corporate networks to protect against suspicious network traffic and attempts to access fields and databases o Encryption The process of encoding messages before they enter the network or airwaves, and then decoding at the receiving end Security Technologies/Tools o Two methods: SSL and the successor TSL S – HTTP Chapter 9 Business value of enterprise systems o Increases operational efficiency Standardize and coordinate business processes o Provide firm wide information to support decision making o Enable rapid responses to customer requests for information or products o Include analytical tools to evaluate overall organizational performance The Supply Chain o Network of organizations and processes for procuring raw materials, transforming them into products and distributing the products o Upstream supply chain Firm’s suppliers, suppliers suppliers, processes for managing relationships with them Information systems and supply chain management o Inefficiencies cut into a company’s operating costs o Just in time strategy Components arrive as they are needed Finished goods shipped after leaving the assembly line o Safety stock Buffer for lack of flexibility in supply chain o Bullwhip effect Information about product demand gets distorted as it passes from one entity to next across supply chain Supply chain management software o Supply chain planning systems Model existing supply chain Demand planning Optimize sourcing, manufacturing plans Establish inventory levels Identify transportation modes o Supply chain execution systems Manage flow of products through distribution centers and warehouses Global supply chains and the internet o Global supply chain issues Greater geographical distances Greater time differences Participants from different countries Different performance standards Different legal requirements o Internet helps companies manage global Warehouse management Transportation management Logistics o Outsourcing Demand driven supply chains o Supply chain management systems Push based model Pull based model Help businesses move from sequential supply chains to concurrent supply chains Business Value of Supply Chain Management Systems o Match supply to demand o Reduce inventory levels o Improve delivery service o Speed product time to market o Use assets more effectively o Reduced supply chain costs lead to increased profitability o Increase sales Customer relationship management o Knowing the customers In large businesses, too many customers and too many ways customers interact with firm o Customer relationship management (CRM) Capture and integrate customer data from all over the organization Consolidate and analyze customer data Distribute customer information to various systems and customer touch points across enterprise Provide single enterprise view of customers CRM software o CRM packages range from niche tools to large scale enterprise applications o More comprehensive have modules for: Partner relationship management (PRM) Employee relationship management (ERM) o Packages typically include tools for Sales prospect and contact information, sales quote generation capabilities Customer service Assigning and managing customer service requests, web based self service capabilities Marketing Capturing prospect and customer data, scheduling and tracking direct marketing mailing or e – mail, cross selling Operational and Analytical CRM o Operational CRM Customer facing applications such as sales force automation, call center and customer service support and marketing automation o Analytical CRM Based on data warehouse populated by operational CRM systems and customer touch points Business value of customer relationship management o Business benefits Increased customer satisfaction Reduced direct marketing costs More effective marketing o Churn rate – number of customers who stop using or purchasing products or services from a company Next gen enterprise applications o Social CRM Incorporating social networking technologies Company social networks o Business intelligence Inclusion of BI with enterprise applications