Uploaded by WillSmithAcevedo

BUSI 1401 Midterm Notes: Information Systems Overview

advertisement
BUSI 1401 MIDTERM NOTES
Chapter 1: Intro to Info Systems
What is an Information System?
-
-
-
-
An information system that collects, stores, processes, analyzes and disseminates information
for a specific purpose. It is part of the tools, people, and processes used by management to
ensure an organization is reach its goals and realizing its strategy.
Purpose: To provide accurate, timely, and useful information to decision makers
An information system consists of 5 components
o Hardware
o Software
o Data
o People
o Procedures
Each element must be present, and all the elements must work together
A computer based information system is formed by bringing together the components listed
above
Information systems = Technology + People + Procedures
o Technology = Hardware, data, and software
You can buy information technology (IT), but you can’t buy Information Systems (IS)
- Using IS effectively requires an understanding of the
organization, management, and underlying technologies
that shape systems
- IS creates value for the firm by providing data-driven
solutions to challenges posed by the environment
Data: A discrete value describing a quantity, quality, or a
fact
- Today’s weather (Sunny, 19 degrees)
- Test Grade (B+, 93.4%)
- An individual sales transaction
Data is generated and collected by organizations to record events (e.g. a sales transaction) and
analyze them at a later date
Information: Data that has been organized, structured, or
given context
-
Weather on a holiday (event + temperature + rain
conditions)
GPA is Data, add student’s name = Information
Sales for the month
-
We transform data into information so that we can find trends, patterns, or useful highlights
Knowledge: Data and/or information that has been organized and processed to convey understanding,
experience, accumulated learning and expertise as they apply to the current business problem
-
Company recruiting at a school has found that over time, those with 3.0+ GPA’s have
experienced great success, based on this knowledge, they may decide to only interview students
with 3.0+ GPA’s
Systems Theory – A (generic) system that has three primary components
-
Input: Captures raw data from organization or external environment
Processing: Converts raw data into meaningful form
Output: Transfers processed information to people or activities that use it
Good systems also incorporate one other step: Feedback
-
Information returned to decision makers and managers to help influence inputs and processes
All systems exist within an environment that places constraints or requirements on the system
The environment in terms of Information Systems is something that impacts the business such as
societal pressures, legislature, culture, etc.
-
Government Regulations (GDPR)
Competitive pressures (Technological innovations like Uber and Netflix)
Organizational Capabilities (Financial resources, trained HR)
Types of Systems:
Business Analytics or Business Intelligence Systems – Systems that provide computer-based support for
complex, non-routine decisions, primarily for middle managers and knowledge workers
Computer-based Information System – An information system that uses computer technology to
perform some or all of its intended tasks.
Dashboards – Presents structured and summarized information to executives
-
Sales pipelines, revenues Vs. Expenses
Decision Support System – Provides decision makers access to data and analysis tools
-
“What if” analysis of changes in budget
E-Commerce Systems – A type or inter-organizational information system that enables organizations to
conduct transactions, called business-to-business (B2B) electronic commerce, and customers to conduct
transactions with businesses, called Business-to-consumer (B2C) electronic commerce
-
Amazon, Shopify
Enterprise Resource Planning (ERP) Systems – Information systems that correct a lack of
communication among the functional area IS’s by tightly integrating the functional area IS’s via a
common database. Integrates all functional areas of an organization
-
Oracle, SAP, Netsuite, Business Central, Odoo
Expert Systems (ESs) – An attempt to duplicate the work of human experts by applying reasoning
capabilities, knowledge, and expertise within a specific domain
-
Credit Card Approval analysis, Navigation services
Functional Area/Departmental Information Systems (FAISs) – ISs that support a particular functional
area within the organization
-
Payroll Processing, Bookkeeping, integrated development environments (IDE)
Inter-organizational Information Systems (IOSs) – Information systems that connect two or more
organizations
Office Automation System – Supports daily work activities of individuals or groups
-
Microsoft office, MS teams, Zoom, Dropbox, Slack]
Supply Chain Management – manages flows of products, services, and information among organizations
-
Walmart Retail Link
Chapter 2: Business Process and Strategy
Porter’s Five Forces Model
The “Five Forces” are used to assess the profitability of an entire industry:
1. Bargaining Power of Customers (Can customers easily
go elsewhere?)
- Buyer has many options = High Buyer Power (vice versa)
- Loyalty Programs reduce buyer power
2. Threat of Substitutions (Is your product unique?)
- Many alternatives = threat of substitute is high
3. Bargaining Power of Suppliers (Do you have few or
many supplier options?)
4. Threat of new entrants (Can competitors easily enter
your markets?)
5. Rivalry among existing firms (Are there many or large
competitors?)
The intensity of each of the five forces determines the characteristics of the industry and how profitable
the industry is now and in the future. To address these forces, the organizations can develop specialized
competitive strategies.
Porter’s Generic Strategies
Porter’s model of four competitive
strategies are:
1. Cost Leadership across industry
2. Differentiation across industry
3. Cost Leadership focused on particular
industry segment
4. Differentiation focused on particular
industry segment
To be effective, the organization’s goals,
objectives, culture, and activities must be
consistent with the organization’s strategy
Porter’s Value Chain Model
-
-
Organizations use Porter’s competitive forces model to design general strategies. To identify
specific activities in which they can use competitive strategies for greatest impact, they use his
value chain model
Value Chain is a sequence of activities through which the organization’s inputs, whatever they
are, are transformed into more valuable outputs, whatever they are.
The value chain model identifies points for which an organization can use information
technology to achieve a competitive advantage
According to the chain model, the activities conducted in any organization can be divided into
two categories: Primary and Support Activities.
Primary Activities relate to the production and distribution of the firm’s products and services.
These activities create value for which customers are willing to pay
Support Activities do not add value directly to the firm’s products or services. Rather, as their
name suggests, they contribute to the firm’s competitive advantage by supporting the primary
activities.
Primary activities:
Inbound Logistics (Inputs) – Purchased inputs such as raw materials are often taken care of. Because of
this function, it is also in contact with external companies such as suppliers. The activities associated
with inbound logistics are receiving, storing and disseminating inputs to the product. This activity also
deals with quality control and receiving things such as raw materials from suppliers
-
Material handling, warehousing, inventory control, vehicle scheduling, and returns to suppliers
Operations (Manufacturing and testing) – This activity converts the items received in inbound logistics
into the desired product. This phase is typically where the conveyor belt in a factory would be used. The
activities associated with operations are therefore transforming inputs into the final product form
-
Machine, packaging, assembly equipment maintenance, testing, printing and facility operations
Outbound Logistics (Storage and Distribution/Output) – After the final product is finished, it still needs
to go to someone (the customer/consumer). Products can be shipped right away or it may need to be
stored for a while. This activity includes collecting, storing, and physically distributing the product to
buyers
-
Finished goods warehousing, material handling, delivery vehicle operations, order processing
and scheduling
Marketing and Sales – This activity is used to help the product be in the minds of consumers and
potential buyers. Just because the item is produced, it does not mean there are people willing to
purchase them. The activities associated with marketing and sales are therefore to provide a means by
which buyers can purchase a product and how to entice them to do so
-
Advertising, promotion, sales force, quoting, channel selection, relations, and pricing
Service – Customers need an after-sales service where they can voice their complaints if there is
something wrong with their product. This is important as it helps the brand’s reputation if they are able
to do right by the customer while also giving the company feedback on their product and if it’s
something they should take a look at. The activities associated with this part of the value chain is to
provide service to enhance or maintain the value of the product after it has been sold or delivered
-
Installation, repair, training, parts and supply product adjustment, warranty, customer service,
customer relationship management systems
Support Activities:
Procurement – This refers to the function of purchasing inputs used in the firm’s value chain, not the
purchased inputs themselves. These purchased inputs are needed for every value activity, including
support activities. Purchased Inputs include raw materials, supplies and other consumable items as well
as assets such as machinery, laboratory equipment, office equipment and buildings. This support activity
is therefore needed to assist multiple value chain activities, not just inbound logistics.
-
E-commerce web portal for suppliers
Technology Development (R&D) - Every value activity uses and needs technology. Technology
development activities can be grouped into efforts to improve the product and the process. Research
and development can also be classified here
-
Telecommunication technology, accounting automation software, product design research and
customer servicing procedures
Human Resource Management – HRM consists of activities involved in recruiting, hiring (and firing),
training, development and compensation of all types of personnel. HRM affects the competitive
advantage in any firm through its role in determining the skills and motivation of employees and the
cost of hiring and training them. Some companies (especially in the tech and advisory service industry)
rely so much on talented employees, that they devout an entire talent management department within
HRM to recruit and train the best of the best university graduates
-
Workforce planning systems; employee benefits intranet
Firm Infrastructure – This consists of activities including general (strategic) management, planning,
finance, accounting, legal, government affairs and quality management. This usually supports the entire
value chain, and not individual activities
-
Electronic scheduling and message systems, collaborative workflow intranet
Business Processes – An ongoing collection of related activities that create a product or service of value
to the organization and customers
-
Course registration
Taking a customer order at a restaurant
Hiring a new employee
At a basic level, all systems have four parts and exist within an environment
Input  Process  Output  Feedback  Input; And the cycle continues
Inputs – Materials, services, and information that flow through and are transformed as a result of
process activities
Resources/Process – people and equipment that perform process activities
Outputs – The product or a service created by the process
The process is the business and the functions within a business, such as:
-
Accounting
HR
Sales
Logistics
Marketing
Manufacturing
Etc.
These business functions can be broken down further. For example, for accounting, it would look like:
-
Bookkeeping
Financial reporting
Financial planning
Payroll
Accounts Payable
Etc.
Functional Processes – Within these functions, there are processes unique only to that function
Financial statement process:
1.
2.
3.
4.
5.
6.
7.
Record transactions
Prepare trial balance
Prepare income statement
Prepare balance sheet
Prepare statement of equity
Prepare notes to statements
Review with management
Cross-Functional Process – Business functions work together to meet the overall objectives of the
organization. No single functional area is responsible for their execution. Rather, multiple functional
areas collaborate to perform the process.
1.
2.
3.
4.
The sales process
Sales contacts customer
Customer places order
Operations provides good or service
Finance requests and receives payment
Process Monitoring
-
Organizations only do as well as their individual processes
If there is a process that is not performing well, it can stall other processes, confuse
management, and upset customers
We can build-in measures into our process to help identify issues and quickly address them
o How many customers respond to a sales rep phone calls?
o How many customers contacted request good or service? How many say no
o How long does it take to fulfill a customer’s order?
o How long does it take Finance to 1) be notified of sale 2) prepare invoice 3) send it to
customer?
o How long does it take the customer to pay? Are they paying the full amount?
Improving Processes – Business Process Improvement (BPI) focuses on reducing variation in the process
outputs (ex. Finished product) by searching for root causes of the variation in the process itself (ex. A
broken machine on an assembly line) or among the process inputs (ex. A decline in the quality of raw
materials purchased from a supplier)
A successful BPI project generally follows five basic phases:
Define – BPI team documents the existing “as is” process activities, process resources, and process
inputs and outputs, usually as a graphical process map or diagram. The team also documents the
customer and the customer’s requirements for the process output, together with a description of the
problem that needs to be addressed
Measure – The BPI team identifies relevant process metrics, such as time and cost to generate one
output (product or service), and collects data to understand how the metrics evolve over time.
Analysis – the BPI team examines the “as is” process map and collected data to identify problems with
the process (ex. Decreasing efficiency or effectiveness) and their root causes. If possible, also benchmark
the process; that is, compare its performance with that of similar processes in other companies, or other
areas of the organization. The team can employ IT applications such as statistical analysis software or
simulation packages in this phase.
Improve – the BPI team identifies possible solutions for addressing the root causes, maps the resulting
“to be” process alternatives, and selects and implements the most appropriate solution. Common ways
to improve processes are eliminating process activities that do not add value to the output and
rearranging activities in a way that reduces delays or improves resource use. The organization must be
careful, however, not to eliminate internal process controls—those activities that safeguard company
resources, guarantee the accuracy of its financial reporting, and ensure adherence to rules and
regulations.
Control phase, the team establishes process metrics and monitors the improved process
after the solution has been implemented to ensure the process performance remains
stable. An IS system can be very useful for this purpose.
Business Process Reengineering
-
Radical change to business processes (Clean slate)
Top-down changes dictated by management
Costly, risky, and general overwhelming
Business Process Improvement
-
Incremental change to business processes (gap analysis)
Bottom-up changes suggested by employees
Change fatigue and change management issues
Business Pressures – The business environment is the combination of social, legal, economic, physical
and political factors in which businesses conduct their operations. Significant changes in any of these
factors are likely to create business pressures on the organization. Organizations typically respond to
these pressures with activities supported by IT
The three major types of market pressures are: Market, Technological and Societal
Market – Generated by the global economy, intense competition, the changing nature of the workforce,
and powerful customers.
-
-
-
Globalization: Integration and independence of economic, social, cultural, and ecological facets
of life made possible by rapid advances in IT. People all over the world can connect with each
other and do business, this increases competition for firms
Changing of the workforce: Workforces, mostly in developed countries are more diversified.
Many types of people are working and IT is easing the integration of these employees into the
traditional workforce, as well as allowing people to work from home.
Powerful customers: Customers have a higher buyer power now due to the globalization of the
market. Buying things have never been easier due to the internet. They have become more
knowledgeable about products and services. Organizations recognize the importance of
customers and have increased their efforts to acquire and retain them. This is used through
Customer Relationship Management (CRM)
Technological Pressures – Pressures consists of those pressures related to technology
-
-
Technological innovation and obsolescence: New and improved technology rapidly create or
support substitutes for products, alternative service options, and superb quality. As a result,
today’s state-of-the-art products may become obsolete tomorrow. BYOD has been a huge
challenge for IT as it is hard for them to control devices that are not theirs. Although, it has
increased productivity and worker satisfaction.
o Ex. Apple products always coming out and planned obsolesces
Informational Overload: The amount of information on the internet that is available to us
double approximately every year, with much of it being free. Brings a flood of information to
managers. They must make decisions effectively and efficiently as they must access, navigate,
and use these vast stores of data, information, and knowledge.
Social/Political/Legal pressures – Social responsibility, government regulation/deregulation, spending
for social programs, spending to protect against terrorism, ethics, and health issues
-
-
Social Responsibility: Social issues that affect businesses and individuals range from state of the
physical environment, to company and individual philosophy, to education. Corporations are
willing to spend time to address these social problems by using organizational/individual social
responsibility
o Ex. Environmental laws, carbon management
Compliance with government regulations: Businesses must comply with government
regulations and this could be a big hit for them depending on what the government decides to
do
o Ex. Car companies will need to slow down/stop the sale of gas transmission cars
-
-
Protection against terrorism: Computer systems can be used to create fraudulent transactions
to steal funds from a bank account, steal people’s identities
o Nigerian Prince scam
Ethical Issues: relates to the general standing of right or wrong. Information ethics specifically
relates to standards of right and wrong in information processing practices. This is important
because if handled poorly, it can ruin an organization’s image and destroy its employees’ morale
Organization Responses – Company’s respond to these various pressures by implementing IT in
different ways such as strategic systems, customer focus, made to order & mass customization, and ebusiness
-
-
-
-
Strategic systems: Provides organizations with advantages that enable them to increase their
market share and profits to better negotiate with suppliers and to prevent competitors from
entering the market.
o Some things are very important to some brands. If amazon’s website shut down, it
would impact them severely
Customer focus: Organizations attempt to provide superb customer service to retain/attract
customers as competition rises. This is again used with CRM.
o Amazon greets you by name every time you go on it.
Make to order and mass customization: Strategy that produces customized products and
services. Feels personal for the consumer while also allowing for customized goods to be
manufactured efficiently and at a reasonably low cost
o Part of the solution is to change from mass production to mass customization
o NikeID allows total customization of shoes
E-commerce: allows ease for customers to order stuff from the comfort of their homes and also
provides services, not just products.
Chapter 3: Data and Knowledge Management
Data to Wisdom framework
-
Data  Information  Knowledge  Wisdom
Data – Discrete value describing a quantity, quality, or fact
-
Weather, GPA, singular sales transaction
Generated and collected by organizations to record events to analyze them later
Information – Data that has been organized, structured, or given context
-
GPA + Student name, Weather on a holiday (temp + event + rain conditions), sales for the month
Transform data to information so we can find trends, patterns, or useful highlights
Knowledge – Information that has been analyzed to determine actionable insights
-
Sales go up before a holiday so the inventory should be ordered early, class averages are higher
for morning classes, so all classes should be scheduled in the morning
We analyze information to find trends, patterns, or useful highlights that can be acted on
Wisdom – Ability to act on knowledge in a way that combines judgement, experience, and morality
-
Gift cards at Christmas, early classes and student preferences
Wisdom is (currently) a human trait that looks to determine whether something that can be
done should be
Data Management – development, execution, and supervision of plans, policies, programs, and
practices that deliver, control, protect, and enhance the value of data and information assets
throughout their lifecycles
-
Enterprises are effective when high quality data is available when needed, data that is
incomplete or out of context cannot be trusted. This is why data management is important
The goal of data management is to provide the infrastructure and tools to transform raw data
into usable information of the highest quality
Data management is a structured approach for managing data effectively throughout its life cycle
The path of data:
Data Sources and Databases – In this part of the path of data, this is where we create or find the data
Data integration – The data that is created or found is integrated into the data warehouse. This is the
data warehouse. This is where all of the data is stored basically until it’s moved into Data Marts.
Data Storage – Data marts are used to efficiently store data in over time. These data marts each contain
information specific to an organization’s business unit (Marketing, Management, Finance, etc.).
Companies use a data mart to analyze department-specific information more efficiently
Data Analysis – To extract useful information from data and taking the decision based upon the data
analysis. Software’s such as OLAP is a helps you to analyze business data from different points of view.
Data mining is also used, a process that finds anomalies, patterns, and correlations within large sets of
data sets to predict outcomes. This information can help a business increase revenue, cut costs, improve
customer relationships, reduce risks, and more
Results – Based off of the data analysis, we have data visualization. From there, a company can use
decision support and knowledge and its management to help gain insight on the business analytics.
Solutions – From the results and knowledge from management, a firm can think up of a solution from
the data. This could be customer-relationship management, supply chains management, ecommerce,
strategy, etc.
Extra:
Metadata – This is where the data about the data is stored. This is within the data warehouse.
Master Data – a set of core data, such as customer, product, employee, vendor, geographic location,
and so on, that span the enterprise’s information systems. It’s a type of data without which any
transaction cannot be implemented and therefore it is mandatory for every organization.
It gives detailed information about the things that interact when a transaction occurs
Remains unchanged over a period of time, contains information that is always needed in the same way
Transaction Data – generated and captured by operational systems, describes the business’s activities
(transactions)
Master data are applied to multiple transactions, they are used to categorize, aggregate, and evaluate
transactional data
Master Data Example – When looking at a transaction, the master data would be product sold, vendor,
salesperson, store, part number, purchase price, and date.
Transaction Data – Respectively, the transaction data would be 42-inch television, Samsung, best buy,
bill Roberts, 1234, $2000, and April 20, 2020
Data Lifecycle – The idea that data goes through a lifecycle with distinct phases
Data Capture – Creating data values that do not yet
exist and have never existed within the enterprise.
Data can be acquired (government census, merge with
another business, buying a customer list), entered
(medical records, sales transactions) or captured (IoT).
Data validation is an important control in this phase to
ensure correct and complete data is captured
Data Maintenance – Involves the movement,
integration, cleansing, and enrichment of data among
various systems. Basically, this step is the preparation
of data for use in various parts of a business
Data Synthesis – Creating new data based on existing
data using inductive logic (Ex. If a customer has a good
credit score, they’ll most likely repay their loans). We apply algorithms and heuristics (simple,
predefined rules) to feed into decision support systems
Data Usage – In this stage, we apply data to decision-making problems and business problems (Ex.
Reviewing financial reports to identify cost overruns, segmenting customers to create new advertising
campaigns) Majority of our efforts should be to get data to this stage as this is where the information
systems create the most value
Data Publication – This (optional) stage involves sending data outside of the organization (ex. Sending
customers invoices, reporting to government (tax returns), data breaches). It is important to note that
data sent outside of the organization cannot easily be recalled or corrected
Data Archival – Storing data just in case it is ever needed again and removing active production systems.
Older data is relevant, thus less valuable; however, it may still serve a future purpose and should/must
be preserved (Ex. Multi-year sales trends, tax audits (CRA – 6-year rule), fraud investigations)
Data Purging: This final stage that data moves through before disappearing forever. Purging involves
deleting data from every system and destroying any backups or archives. When organization’s no longer
need or are required to keep data, it is safer and cheaper to destroy data than to try keeping it forever.
Quality of Data – Characteristics associated with high quality data and to the processes used to measure
or improve the quality of data
Dimensions of Data Quality:
1.
2.
3.
4.
Accuracy (does the data closely reflect reality?)
Completeness (does the data enough aspects of reality?)
Consistency (is the data the same in different systems and across different time periods?)
Uniqueness (are there duplicate records in the dataset?)
5. Timeliness (is data available in a timely fashion for use by decision makers?)
6. Validity (does the data conform to existing business rules and data formats?)
Most poor data quality stems from faulty data input (negligence, confusion, misunderstandings), to
prevent poor data quality, systems should be reviewed and changed to stop bad data before it is used to
make decisions.
1. Data quality audits – Structured review of data to determine accuracy and completeness:
a. Randomly review samples data files (do customer addresses match their invoice?)
b. Survey end users for perceptions of quality (do you have to make frequent corrections?)
2. Data cleansing – use software to automatically detect and correct data that is incorrect,
incomplete, improperly formatted, or redundant
Knowledge: Information that has been analyzed to determine actionable insights
Tacit (Tribal) Knowledge: Subjective or experiential learning
-
An organization’s experiences, insights, expertise, know-how, trade secrets, skill sets,
understanding, and learning
Imprecise and costly to transfer, highly personal, and difficult to formalize or codify
If you’re new to the company and are learning from someone who is teaching you by showing
you how to do everything, this is tribal knowledge. If they were to leave and none of the
information is codified, then you’d be done
Explicit Information: Knowledge that has been codified
-
Documented in a form that 1. Can be distributed to others, 2. Persist into the future, and 3.
Used in business process or turned into an organizational strategy
Chapter 4: Business Analytics
Business Analytics is the process of developing actionable decisions or recommendations for actions
based on insights generated from historical data. BA examines data with a variety of tools; formulates
descriptive, predictive, and prescriptive analytics models; and communicates these results to
organizational decision makers.
-
It’s the systematic use of data and related business insights developed through applied
analytical disciplines to drive fact-based decision making for planning, management,
measurement, and learning
Business analytics vs intelligence
-
BA: Collecting sales data, aggregating (grouping) sales by product and date (month) and showing
the top 5 products
-
BI: Using a point-of-sales system to capture sales, data warehouse to load and pre-process data,
and excel to aggregate/sort/filter products
Types of Business Problems
-
Managers oversee processes to ensure they operate efficiently and effectively
Managers have three broad roles:
1. Influence and guide employees (interpersonal)
2. Obtain and transfer information (Informational)
3. Analyze situations and take action (decisional)
IS assist with all three roles, business analytics is concerned with taking action
Problem Solving Framework
A problem is a carefully defined statement
that tells us where we are and where we
want to be
For a retail company, a problem could
be that sales are declining at a location and
they would like to increase their sales by 10%
instead
We design and consider several
alternative courses of action to bring us from
our current state (problem) to our future
-
(goal/solution) state
Once we brainstorm multiple options, we try to test/validate them to determine which one is
most likely to make a desired change
That is done by looking through historical/test data, judgement, and analytical/statistical models
Once you do trial and error, you perform the sensitivity analysis; a process that allows you to
understand the effect of fluctuations in selected variables on your business’ profitability
Once this is complete, you present the results and implement the solution to your problem
Types of Analytics:
-
-
Descriptive
o Reporting past events
o “What has happened?”
 OLAP/data mining is a big tool for descriptive analytics
 Fandango analysts investigated total sales for different genres of movies, they
calculated the average ticket sales for a week, most popular movies, busiest
hours of the day using a sample of moviegoers
Diagnostic
o Exploring past events
-
-
o “Why did this happen?”
Predictive
o Forecasting future trends
o “What will likely happen?”
 Data mining is a big tool for predictive analytics
 Using Fandango again, predictive analytic tools analyze terabytes of data to
determine if someone has not seen the latest movie of their favourite genre
that’s now out in theatres.
Prescriptive
o Improving decision-making
o “What should we do?”
 Fandango uses prescriptive analytics so it can change ticket price offerings every
hour. It changes it based off of the supply and demand of which time is more
popular (more popular time = more expensive)
Chapter 5: Telecommunications & Mobile Computing
Computer Network – A system that connects computers and other devices (ex. printers) through
communications media so that data and information can be transmitted among them.
Bandwidth – Transmission capacity of a network; it is stated in bits per second
Transmission Mediums - Wired
-
Phone Lines (RJ-11): Dial up/DSL internet, DSL is roughly 1-100 mbps, most common type of
residential network infrastructure
Coaxial Cable: Cable internet, roughly 10-1000 mbps, used for both television and internet
Fibre Optic: Fibre “Fibe” Internet, 1000 – 10000 mbps (referred to as gbps), backbone of public
and international communication networks
Transmission Mediums – Wireless
Satellite/Microwave: Cover long distances and have relatively high bandwidth (roughly 100 mbps),
require uninterrupted line-of-site between transmitter and receiver, satellite provides more coverage
than microwave due to distance from earth
Radio: (Wi-Fi, 5G) has much higher bandwidth (roughly 1-10 gbps), not as restricted by line-of-site
obstructions, but range is limited (ex. 5g = 1.6-5 KM)
Characteristics of Mobile Computing
1. Mobility
2. Broad reach (accessibility to others)
3. Ubiquity
4.
5.
6.
7.
Connectivity
Convenience
Customization
Localization
Mobile computing use cases
-
Mobile Finance (banking apps, digital wallets)
Location-based services (google maps, Uber)
Telemetry (IoT & Digital Twins, Healthcare)
Autonomous Vehicles (Tesla)
Chapter 6: Ethics and Privacy
Ethics – The principles of right and wrong that are used by individuals to guide behaviours
There are many frameworks to help us decide if a decision is ethical or not 
Ethical Frameworks – There are 4 common frameworks that are used for analyzing alternatives and
their outcomes
-
-
Consequentialist (Utilitarianism, Common Good): Aim to produce the most good
o Utilitarian approach states that an ethical action is the one that provides the most good
or does the least harm. The ethical corporation would be the one that produces the
greatest good and does the least harm for all affected parties – customers, employees,
shareholders, community and the physical environment.
o Common good approach highlights the interlocking relationships that underlie all
societies. This approach argues that respect and compassion for all others is the basis
for ethical actions. It emphasizes the common conditions that are important to the
welfare of everyone. This condition includes a system of laws, effective police and fire
departments, health care, public recreation centre, public education system
Non-consequential (Rights & duties, Fairness/justice, Deontology): Aim to perform the right of
action
o The rights approach maintains that an ethical action is the one that best protects and
respects the moral rights of the affected parties. Moral rights can include the rights to
make one’s own choices about what kind of life to lead, to be told the truth, to not to be
injured, and to enjoy a degree of privacy. An ethical organization action would be one
that protects and respects the moral rights of customers, employees, shareholders,
business partners, and even competitors
o The fairness approach posits that ethical actions treat all human beings equally, or, if
unequally, then fairly, based on some defensible standard. For example, most people
might believe it is fair to pay people higher salaries if they work harder or contribute a
greater amount to the firm. However, there is less certainty regarding CEO salaries that
are hundreds or thousands of times larger than those of other employees. Many people
question whether this huge disparity is based on a defensible standard or unfair due to a
result of an imbalance of power 
o
-
-
The deontology approach states that the morality of an action is based on whether that
action itself is right or wrong under a series of rules, rather than based on consequences
of that action. An example of deontology is the belief that killing someone is wrong,
even if it was in self-defence.
Agent-centered (virtues): Aim to develop one’s character
o Ethical actions ought to be consistent with certain ideal virtues that provide for the full
development of humanity. These virtues are dispositions and habits that enable us to
act according to the highest potential of our character and on behalf of the values like
truth and beauty. Honesty, courage, compassion, generosity, tolerance, love, fidelity,
integrity, fairness, self-control and prudence are all examples of virtues. Virtue ethics
asks of any action “What kind of person will I become if I do this?” or “Is this action
consistent with my acting at my best?” 
Legal:
o Legal standards are based on written law
CIA Triad:
Confidentiality – Only those who are authorized have access to specific
assets and that those who are unauthorized are actively prevented from
obtaining access :O
Integrity – Ensuring that data has not been tampered with and,
therefore, can be trusted. It is correct, authentic, and reliable
Accessibility – Networks, systems, and applications are up and running to
ensure that authorized users have timely, reliable access to resources
when they are needed
Threats to I.T. Security and C.I.A
Employees & Consultants
-
Programmers add backdoors or errors into applications
Administrators disable or by-pass security measures
Employees copy sensitive data or use weak passwords
Systems & Hardware
-
Security measures not working as expected
Located in unsure environments
Unauthorized access
Natural & Man-Made Disasters
-
Fires, floods, or storms destroy data and equipment
Equipment destroyed or stolen
External Actors.
-
Malware, denial of service attacks, unauthorized access
Social Engineering
Phishing
Ransomware
Risk Management Strategies:
-
-
-
Status Quo (Do nothing)
o Waiting to see what happens
Limit and Mitigate Risk
o Implement controls
o Maintain redundant (backup) systems
Transfer or Share Risk
o Pay for insurance to cover any financial losses
o Partner with other companies to provide security expertise or redundancy
 If something goes wrong, they will be at fault for not providing adequate
security
Risk avoidance
o Avoid using technology that creates risk in the first place
 Hardest to do in today’s society
Controls – Controls that we can implement in our systems and processes fall under four broad
categories
-
-
-
-
Physical Control: Anything that can protect assets from physical damage or unauthorized inperson access
o Guards, cameras, locks
o Environmental controls (fire suppression, air conditioning)
o Secure storage
Access Controls: Anything that can protect access from unauthorized access to digital assets
o Authentication – Something that prevents access to an entire system (biometrics,
cards/tokens/MFA/2FA, passwords/passphrases)
o Authorization – Something that prevents access to specific data to specific parts of a
system (user permissions, principle of least privilege)
Data Communication Controls: Software that protects or restricts the flow of data across
networks
o Firewalls
o Antivirus Applications
o Whitelisting and blacklisting (people, software, websites, web traffic)
o Encryption (TLS, Cryptocurrency, WhatsApp messages) and Virtual Private Networks
(VPN)
o Monitoring Systems (Screen capturing, web history reviews, mouse movements,
webcams, remote proctoring software)
Administrative Controls: Practices that influence the behaviour of employees or design of
systems
o
o
o
o
o
Governance frameworks (COSO, COBIT)
Policies & Procedures (Password length, complexity, and protect assets
 Code of ethics
User education (training, fake fake emails (phishing test), inspections)
Business continuity planning (Hot, warm, cold sites)
Information systems auditing
Download