Kwame Nkrumah University of Science & Technology, Kumasi, Ghana AGEC 353: MANAGEMENT INFORMATION SYTEM COURSE INSTRUCTOR DR. FAIZAL ADAMS Dept. of Agricultural Economics, Agribusiness & Extension, KNUST. Kumasi Course objectives The overall objective of this course is to introduce students to the importance and use of information systems in making managerial decisions in agribusiness. At the end of this course, students should be able to: 1. Explain the concept of a system and how it relates to information systems. 2. Explain why knowledge of information systems is important for business professionals 3. List major types of information systems required for agricultural production. 4. Give examples to illustrate how applications of information systems can support the organization’s operational activities towards managerial decision-making, and strategies for competitive advantage. 5. Demonstrate their understanding of system development and implementation towards efficient operation of organizations. www.knust.edu.gh Course outline 1. Overview of information systems 1.1 Information System 1.2 The Characteristics of Valuable Information 1.3 Manual and Computerised Information Systems 1.4 Business Information Systems 1.5 Systems Development 1.6 Global Challenges in IS 2. Information systems in organization 2.1 An introduction to organizations 2.2 The value chain 2.3 Information system in SCM and CRM 2.4 Organizational structures 2.5 Organizational change 2.6 The application portfolio 2.7 Evaluation of Information Systems www.knust.edu.gh Course outline cont’d 3. Operations support systems 3.1 Types of information systems 3.2 Types of Operations Support Systems 3.3 Transaction processing cycle 3.4 Types of TPS applications 4. Systems development 4.1 An overview of systems development 4.2 Participants in systems development 4.3 Information systems planning and aligning corporate and IS goals 4.4 Systems Development Life Cycle 4.5 Outsourcing and on-demand computing 4.6 Factors affecting systems development success 4.7 Systems investigation 5. System design and implementation 5.1 Introduction 5.2 Logical & physical design www.knust.edu.gh 5.3 Interface design and controls 5.4 Acquiring hardware from an IS vendor 5.5 Acquiring software: Make or buy? 5.6 Acquiring database and telecommunications systems 5.7 Systems operation and maintenance 5.8 Systems review 6. Security, privacy and ethical issues 6.1 Principles 6.2 Computer waste and mistakes 6.3 Establishing policies and procedures 6.4 Computer crime 6.5 Using antivirus programs 6.6 Software and Internet software piracy 6.7 Privacy issues 6.8 Health concerns 6.9 Ethical issues in www.knust.edu.gh References • Kenneth C. Laudon and Jane P. Laudon, (2000). Management Information System. Organization and Technology in the Networked Enterprise (Sixth edition). • Coles S and J Rowley (1997). Access 7 Basic Skills : A progressive course for new users • Hector Garcia-Molina Jeffrey D. Ullman and Jennifer Wisdom ( 2008) Database Systems: The Complete Book (2nd Edition) • James A. O’Brien, (2003). Introduction to Information Systems. Essentials for the e-Business Enterprise. (Eleventh Edition). • Stair, Reynolds and Chesney (2015). Principles of Business Information Systems, 2nd Edition. Design Deluxe ltd, UK. • O’Brien, J. and Marakas, G. (2010). Management Information Systems, 10th Edition. Source to find book: WWW.B-OK.ORG : Search for principles of business information systems and management information systems by the authors. Stair, Reynolds and Chesney (2015). Principles of Business Information Systems, 2nd Edition. Design Deluxe ltd, UK. www.knust.edu.gh Overview of information systems www.knust.edu.gh 8 1. Overview of information system 1.1 Information System System? • A system is a set of elements or components that interact to accomplish goals • Systems have inputs, processing mechanisms, outputs, and feedback • A system processes the input to create the output • Examples of systems are everywhere – an automatic car wash, the heating in a building, the human body; you should be able to think of many more www.knust.edu.gh 9 1. Introduction to information system cont’d 1.1 Information System cont’d information? • Information is a collection of facts • It can take many forms – text, numbers, images, audio clips and video clips are all examples • A closely related term is data • These two terms are often used interchangeably www.knust.edu.gh 10 1. Introduction to information system cont’d 1.1 Information System cont’d Therefore… • an information system (IS) is a set of interrelated components that collect (input), manipulate & store (process), and disseminate (output) information, and provide a feedback mechanism to meet an objective • In information systems, input is the activity of gathering and capturing data • Processing means converting or transforming this input into useful outputs • Output involves producing useful information, usually in the form of documents and reports • Feedback is information from the system that is used to make changes to input or processing activities www.knust.edu.gh 11 1. Introduction to information system cont’d 1.2 The Characteristics of Valuable Information To be useful to managers, information should have some or possibly all of the following characteristics: Accessible: accessible to authorized people. Complete: contain all important facts Flexible: used for variety of purpose Reliable: trusted: sources, method use Simple : not complex Verifiable: can be rechecked Accurate Economical: cheap Relevant: to achieve objective Secure: unauthorized persons Timely: delivered when needed www.knust.edu.gh 12 1. Introduction to information system cont’d 1.3 Manual and Computerised Information Systems •An information system can be manual, for example paperbased (using manually drawn charts, etc) or computerised •A computer-based information system (CBIS) is a single set of hardware, software, databases, telecommunications, people, and procedures that are configured to collect, manipulate, store, and process data into information •Components of CBIS: people, hardware, software, telecommunications, databases, procedures www.knust.edu.gh 13 1. Introduction to information system cont’d Hardware • Hardware consists of computer equipment used to perform input, processing, and output activities • Input devices: include keyboards, mice and other pointing devices, automatic scanning devices, and equipment that can read magnetic ink characters • Processing devices: include computer chips that contain the central processing unit and main memory • Output devices: include computer screens and printers www.knust.edu.gh 14 1. Introduction to information system cont’d Software •Software consists of the computer programs that govern the operation of the computer •There are two types of software: system software controls basic computer operations, including start-up, input and output. An example is Microsoft Windows •applications software allows you to accomplish specific tasks, including word processing and drawing charts. An example is Microsoft Excel www.knust.edu.gh 15 1. Introduction to information system cont’d Database •A database is an organized collection of facts and information, typically consisting of two or more related data files •An organization’s database can contain information on customers, employees, inventory, competitors’ sales, online purchases, and much more www.knust.edu.gh 16 1. Introduction to information system cont’d Telecommunications, Networks, and the Internet • Telecommunication is the electronic transmission of signals for communications, which enables organizations to carry out their processes and tasks through computer networks • Networks connect computers and equipment in a building, around the country, or around the world to enable electronic communication • The Internet is the world’s largest computer network, actually consisting of thousands of interconnected networks, all freely exchanging information www.knust.edu.gh 17 1. Introduction to information system cont’d People •People are the most important element in most computer-based information systems •The people involved include users of the system and information systems personnel, including all the people who manage, run, program, and maintain the system www.knust.edu.gh 18 1. Introduction to information system cont’d Procedure • Procedures include the strategies, policies, methods, and rules for using the CBIS, including the operation, maintenance, and security of the computer • Good procedures can help companies take advantage of new opportunities and avoid potential disasters • Poorly developed and inadequately implemented procedures can cause people to waste their time or result in inadequate responses to disasters www.knust.edu.gh 19 1. Introduction to information system cont’d 1.4 Business Information Systems • Various types of information systems used in business organizations. The most common ones are used for; 1. electronic and mobile commerce, 2. transaction processing, 3. management information, and 4. decision support systems. They are used to accomplish tasks such as recording sales, payrolls, etc • These systems help employees in organizations accomplish routine and special tasks • They are often integrated in one product and delivered by the same software package • For example, Enterprise Resource Planning packages process transactions, deliver information, and support decisions www.knust.edu.gh 20 1. Introduction to information system cont’d 1. Electronic and Mobile Commerce • E-commerce involves any business transaction executed electronically • Some types of e-commerce are: B2B (business-to-business): commerce between companies B2C (business-to-consumer, B2C): commerce between companies and consumers C2C (consumer-to-consumer): commerce between consumers and other consumers • B2B represents the major volume of e-commerce, and its fastest-growing segment • Mobile commerce (m-commerce) refers to transactions conducted anywhere, anytime • M-commerce relies on wireless communications that managers and corporations use to place orders and conduct business with handheld computers, portable phones, laptop computers connected to a network, and other mobile devices www.knust.edu.gh 21 1. Introduction to information system cont’d 2. Enterprise Resource Planning • An enterprise resource planning (ERP) system is a set of integrated programs that manage the vital business operations for an entire multisite, global organization. That is an integrated software that supports more than one units eg sales, finance, HR , etc • The scope of an ERP system might vary from company to company • An ERP might do the job of some or all of the other types of Business Information Systems, particularly the Transaction Processing System, Management Information System and Decision Support System • They are used to schedule inventory purchases and the manufacturing process, so that the right number of products are built at the right time, to meet customer demand www.knust.edu.gh 22 1. Introduction to information system cont’d 3. Transaction Processing Systems • A Transaction Processing System is an ‘Operational System’ • Operational systems help organizations perform and integrate important tasks, such as paying employees and suppliers, controlling inventory, sending out invoices, and ordering supplies • A transaction processing system (TPS) is an organized collection of people, procedures, software, databases, and devices used to record completed business transactions • A transaction is any business-related exchange such as payments to employees, sales to customers, or payments to suppliers www.knust.edu.gh 23 1. Introduction to information system cont’d 4. Management Information Systems •A management information system (MIS) is an organized collection of people, procedures, software, databases, and devices that provides routine information to managers and decision makers •An MIS focuses on operational efficiency, marketing, production, finance linked through common databased. •MIS typically provide standard reports generated with data and information from the TPS: That is, the output of a TPS is the input to a MIS. Eg producing report that suggests that inventory should be ordered is MIS www.knust.edu.gh 24 1. Introduction to information system cont’d 5. Decision Support System • A decision support system (DSS) is an organized collection of people, procedures, software, databases, and devices that support problem-specific decision-making. DSS supports in arriving at the decision of the organization. In other words, DSS support in solving problems (MIS). • A human being is still in charge of making the decision, unlike in a system with Artificial Intelligence • Decision support systems are used when the problem is complex and the information needed to make the best decision is difficult to obtain and use. It is there to help managers make www.knust.edu.gh decisions 25 1. Introduction to information system cont’d Specialized Business Information Systems • Knowledge management systems (KMS): an organized collection of people, procedures, software, databases, and devices to create, store, share, and use the organization’s knowledge and experience • Artificial Intelligence: attempts to have the computer system take on the characteristics of human intelligence. Applications include robotics and natural language processing • Virtual reality: simulation of a real or imagined environment that can be experienced visually in three dimensions (3D); user becomes fully immerse in an artificial, computer-generated 3D www.knust.edu.gh world. 26 1. Introduction to information system cont’d 1.5 Systems Development Systems development is the activity of creating or modifying business systems. The main stages are as follows: Systems investigation, where a clear understanding of the problem to be solved is developed Systems analysis, where the problems and opportunities of the existing system are defined Systems design, which determines how the new system will work to meet the business needs defined during systems analysis Systems implementation, which involves creating or acquiring the various system components (hardware, software, databases, etc.) defined in the design step, assembling them, and putting the new system into operation Systems maintenance and review checks and modifies the system so that it continues to meet changing business needs www.knust.edu.gh 27 1. Introduction to information system cont’d Security, Privacy, and Ethical Issues • Security and privacy fears persist with computer users • Many people experience ‘cyberbullying’ at home, school or work • Many criminal gangs are trying to steal financial information online • Some IS professionals believe that computers may create new opportunities for unethical behaviour – unethical investors have placed false rumours or incorrect information about a company on the Internet and tried to influence its stock price to make money • To protect against these and other threats, security and control measures can be installed www.knust.edu.gh 28 1. Introduction to information system cont’d Security and control measures •Anti virus software •Firewalls •Password protection •Physical protection – a security guard outside the room where the servers are located for instance •Security procedures – users must change passwords every month, for instance www.knust.edu.gh 29 1. Introduction to information system cont’d 1.6 Global Challenges in IS Changes in society as a result of increased international trade and cultural exchange, often called globalisation, has always had a big impact on organizations and their information systems: • Cultural challenges: countries and regional areas have their own cultures • Language challenges • Time and distance challenges • Infrastructure challenges: high-quality electricity and water might not be available in certain parts of the world. Telephone services, Internet connections, and skilled employees might be expensive or not readily available • Currency challenges: the value of different currencies can vary significantly over time, making international trade more www.knust.edu.gh difficult and complex 30 1. Introduction to information system cont’d 1.6 Global Challenges in IS cont’d • Product and service challenges: traditional products that are physical or tangible, such as a car or bicycle, can be difficult to deliver to the global market • Technology transfer issues: most governments don’t allow certain military-related equipment and systems to be sold to some countries. • National laws: all countries have a set of laws that must be obeyed by citizens and organizations operating in the country. Laws restricting how data enters or exits a country are often called trans-border data-flow laws. Keeping track of these laws and incorporating them into the procedures and computer systems of multinational and trans-national organizations can be very difficult and time consuming, requiring expert legal advice • Trade agreements: countries often enter into trade www.knust.edu.gh agreements with each other 31 2. Information systems in organization www.knust.edu.gh 32 2. Information systems in organization 2.1 An introduction to organizations • An organization is a formal collection of people and other resources established to accomplish a set of goals • An organization is a system, which means that it has inputs, processing mechanisms, outputs, and feedback • Resources such as materials, people, and money are the inputs • These go through a transformation mechanism, the processing • The outputs from the transformation mechanism are usually goods or services, which are of higher relative value than the inputs alone • Through adding value or worth, organizations attempt to achieve their goals www.knust.edu.gh 33 2. Information systems in organization cont’d 2.2 The value chain • The value chain is a useful tool for analysing where and how this value gets added • The value chain is a series (chain) of activities that includes inbound logistics, warehouse and storage, production, finished product storage, outbound logistics, marketing and sales, and customer service • The value chain is used to examine what happens to raw material to add value to them before the finished product gets sold to customers • Information systems can be developed to focus on those activities that add the most value www.knust.edu.gh 34 Supply chain management and customer relationship management • Supply chain management (SCM) and customer relationship management (CRM) are two key parts of managing the value chain • SCM helps determine what supplies are required for the value chain, what quantities are needed, how they should be turned into finished products and shipped to customers • Increasingly, SCM is accomplished using the Internet and B2B ecommerce • CRM programs help a company manage all aspects of customer encounters, including marketing and advertising, sales, customer service after the sale, and help retain loyal customers www.knust.edu.gh 35 2.3 Information system in SCM and CRM • What role does an information system play in SCM & CRM? • A traditional view of information systems holds that organizations use them to control and monitor processes and ensure effectiveness and efficiency • A more contemporary view, however, holds that information systems are often so intimately involved that they are part of the process itself • This gives a new perspective on how and why businesses can use information systems • Managers should consider the potential role of information systems within business processes, which often leads to the discovery of new and betterwww.knust.edu.gh ways to accomplish the process 36 2.4 Organisational structure cont’d • Organizational structure refers to organizational subunits and the way they relate to each other. An organization’s structure depends on its approach to management, and can affect how it views and uses information systems • The types of organizational structures typically include: – Traditional – project & team – virtual www.knust.edu.gh 37 Traditional organizational structure • This is a managerial pyramid where the hierarchy of decision making and authority flows from the strategic management at the top, down to operational management and nonmanagement employees • Those at the top have a higher degree of decision authority, more impact on business goals, and more unique problems to solve • Today, the trend is to reduce the number of management levels, or layers, in the traditional organizational structure • This type of structure is often called a flat organizational structure www.knust.edu.gh 38 Project and team structure • A project organizational structure is centred on major products or services • Each major product has its own marketing, finance and production departments • The team organizational structure is centred on work teams or groups • Teams can be small or large, permanent, or temporary • A healthcare company, for example, could form small teams to organize its administrators, doctors, and others to work with individual patients www.knust.edu.gh 39 Virtual organizational structure • A virtual organizational structure is made up of individuals, teams, or complete business units that work with other individuals, teams, or complete business units in different geographic locations • This almost always requires the use of the Internet (or other telecommunications) to facilitate communication • The people might never meet physically, which is why they are called virtual • A company can use a virtual organizational structure with its own dispersed workers who have distinct skills and abilities to reduce costs www.knust.edu.gh 40 2.5 Organizational change • Most organizations are constantly undergoing change, both minor and major • The need for organizational change can come from new managers, staff leaving, activities brought by competitors or stockholders, new laws, natural occurrences (such as a hurricane), and changes in general economic conditions • An new IS will cause change • When a company introduces a new information system, a few members of the organization must become agents of change – champions of the new system and its benefits • Understanding the dynamics of change can help them confront and overcome resistance so that the new system can be used to maximum efficiency and effectiveness • Two types of change www.knust.edu.gh 41 Reengineering and continuous improvement • To stay competitive, organizations must occasionally change the activities, tasks, or processes they use to achieve their goals • Reengineering, also called process redesign and business process reengineering (BPR), involves the radical redesign of business processes, organizational structures, information systems, and values of the organization to achieve a breakthrough in business results • Continuous improvement involves constantly seeking ways to improve business processes and add value to products and services www.knust.edu.gh 42 Comparing BPR and continuous improvement www.knust.edu.gh 43 User satisfaction and technology acceptance • To be effective, reengineering and continuous improvement efforts must result in satisfied users and be accepted and used throughout the organization • Technology diffusion is a measure of how widely technology is spread throughout an organization. An organization in which computers and information systems are located in most departments and areas has a high level of technology diffusion • Technology infusion is the extent to which technology permeates an area or department. In other words, it is a measure of how deeply embedded technology is in an area of the organization • An organization might have a high level of diffusion and infusion, but this does not necessarily mean that information systems are being used to their full potential www.knust.edu.gh 44 2.6 The application portfolio • The applications portfolio classifies information systems according the contribution they make to the business: Support applications are nice to have, but not essential Key operational applications are essential and without them, the organization would not be able to do business Strategic applications are information systems that give a business an advantage over some or all of its competitors Potential strategic application (also known as a future strategic or high potential application) is an idea for, or a prototype of, an information system which, if developed, might one day become a strategic system • The portfolio is used to visualise what systems are currently in use, and plan out new development projects www.knust.edu.gh 45 Success factors • It is of vital importance that a company’s information systems are aligned with the company’s goals • The main way of achieving alignment is for senior managers to consider the business processes they have in place to achieve company goals, and ask, what information systems are needed to support these business processes • Less frequently a business, typically a small business or even a single entrepreneur, will consider what technology is available to them and ask, what business goals can be achieved with it • Other success factors include: – Senior management must be committed – End-users of the system should be involved in the development – Time must be taken to carefully determine requirements – Strong project management www.knust.edu.gh 46 Competitive advantage • A competitive advantage the ability of a firm to outperform its industry, that is, to earn a high rate of profit than the industry norm • It can result from higher-quality products, better customer service, and lower costs • Often, a competitive advantage will depend on a carefully designed information system Micheal Porters Five-Forces of model -rivalry among existing competitors -threat of new entrants -Threat of substitute products -Bargaining power of buyers -Bargaining power of suppliers www.knust.edu.gh 47 How to achieve competitive advantage Strategies to achieve competitive advantage include: Cost leadership Differentiation Niche strategy Creating new product and services Improving existing product lines and services www.knust.edu.gh 48 2.7 Evaluation of Information Systems • Once an information system has been implemented, management will want to assess how successful it has been in achieving its goals. Often this is a difficult thing to do, and many businesses do not attempt to take anything more than an informal approach to evaluation • Some approaches to evaluating IS include: Productivity: examine how output has changed since implementation Return on Investment: examine how profits have increased Earnings Growth: another measure of profit increase Market Share: examine the change in market share since implementation Customer Awareness and Satisfaction: possibly qualitative measure of satisfaction Total Cost of Ownership: estimate the total cost of the IS breaking cost into areas such as the cost to acquire the technology, technical support, administrative costs, and end-user operations www.knust.edu.gh 49 Assignment 1 Collection date: 29th April, 2022 Refer Chapter 2: Stair, Reynolds and Chesney (2020). Principles of Business Information Systems, 4nd Edition. Design Deluxe ltd, UK Answer the following questions on page 105: 1. Self assessment test 2. Review questions www.knust.edu.gh 50 Operations support systems www.knust.edu.gh 51 3.1 Types of information systems Broadly information systems are recognized into two based on functions: • Operation support systems: support business operations • Management support systems: Support managerial decision-making www.knust.edu.gh 52 Types of Information Systems www.knust.edu.gh 53 3.2 Operations support systems • What are they? – Efficiently process business transactions – Control industrial processes – Support communications and collaboration – Update corporate databases www.knust.edu.gh 54 3.2 Types of Operations Support Systems • Transaction Processing Systems – Record and process data from transactions – Examples: sales processing, inventory systems, accounting systems • Process Control Systems – Monitor and control physical processes – Example: in a maize drying and fumigation use sensors to monitor chemical processes • Enterprise Resource Planning Systems – Set of Integrated programs that manages company’s vital business operations www.knust.edu.gh 55 1. Enterprise Resource Planning Systems Is a set of integrated programs that manage a company’s vital business operations for an entire multisite, global organization. ERP is a single platform that houses all IFS to aid in planning out how much raw material is needed at a certain time, plan production, control inventory and manage their purchasing process Basically ERP helps to coordinate activities of the company www.knust.edu.gh 56 ADVANTAGES OF ERP • Improved access to data for operational decision making • Elimination of costly, inflexible legacy systems or outdated systems • Improvement of work processes based on best practices • Upgrade of technology infrastructure www.knust.edu.gh 57 DISADVANTAGES OF ERP • Expense and time in implementation • Difficulty implementing change • Difficulty integrating with other systems • Risks in using one vendor • Risk of implementation failure www.knust.edu.gh 58 2. Transaction processing systems • Transaction processing systems (TPSs) – Process detailed data necessary to update records about fundamental business operations – Include order entry, inventory control, payroll, accounts payable, accounts receivable, general ledger, etc. – Provide data for other business processes • Management information system/decision support system (MIS/DSS) • Special-purpose information systems www.knust.edu.gh 59 Two ways to process transactions • Batch Processing: – Accumulate transactions over time and process periodically – Example: a bank processes all checks received in a batch at night • Online Processing: – Process transactions immediately – Example: a bank processes an ATM withdrawal immediately www.knust.edu.gh 60 Importance of transaction processing systems Organizations expect their TPS to: • Process data generated by and about transactions • Maintain a high degree of accuracy and integrity • Avoid processing fraudulent transactions • Produce timely user responses and reports • Increase labor efficiency • Help improve customer service • Help build and maintain customer loyalty • Achieve competitive advantage www.knust.edu.gh 61 Transaction processing activities TPS – Capture and process data that describes fundamental business transactions – Update databases – Produce a variety of reports www.knust.edu.gh 62 3.3 Transaction processing cycle • Data collection • Data editing • Data correction • Data manipulation • Data storage • Document production www.knust.edu.gh 63 Data collection • Capturing and gathering all data necessary to complete the processing of transactions • Data collection can be: – Manual – Automated via special input devices (such as scanners, point-of-sale devices, and terminals) • Data should be: – Collected at source – Recorded accurately, in a timely fashion www.knust.edu.gh 64 Data Editing • Checking data for validity and completeness to detect any problems • Examples – Quantity and cost data must be numeric – Names must be alphabetic – Verification that codes associated with an individual transaction are present in a database containing valid codes www.knust.edu.gh 65 Data correction • Re-entering data that was not typed or scanned properly • If invalid data is detected, system should provide error messages – Error messages must specify the problem so proper corrections can be made • Software tools can be used to identify bad data www.knust.edu.gh 66 Data manipulation • Performing calculations and other data transformations related to business transactions • Can include the following: – Classifying data – Sorting data into categories – Performing calculations – Summarizing results – Storing data in the organization’s database for further processing www.knust.edu.gh 67 Data storage • Updating one or more databases with new transactions • After being updated, this data can be further processed and manipulated by other systems www.knust.edu.gh 68 Document production and report • Generating output records, documents, and reports – Hard-copy paper reports – Displays on computer screens • Results from one TPS can be inputs to another system • Typical uses – Checks and invoices, management information, decision support, and compliance with local, state, and federal regulations www.knust.edu.gh 69 3.4 Types of TPS applications • Order Processing Systems include order entry, sales configuration, shipment planning, shipment execution, inventory control, and accounts receivable • Purchasing Systems include inventory control, purchase order processing, receiving, and accounts payable • Accounting Systems include the budget, accounts receivable, payroll, asset management, and general ledger www.knust.edu.gh 70 3. Electronic commerce • Electronic commerce is conducting a business transaction (e.g., distribution, buying, selling, and servicing) electronically over computer networks, primarily the Internet but also extranets, and corporate networks • B2C – business to consumer, allows customers to place orders, with their order processing system • B2B – business to business, where the customer is another business • C2C – allowing consumers to sell to other consumers. eBay is an example www.knust.edu.gh 71 Mobile commerce • Mobile commerce (m-commerce) relies on the use of wireless devices, such as personal digital assistants, mobile phones, and smartphones, to transact www.knust.edu.gh 72 4. Production and Supply Chain Management system • Production and supply chain management systems follow a systematic process for developing a production plan that draws on the information available in the system database. – Sales forecasting: estimates future customer demand – Sales and operations plan: takes demand and current inventory levels to determine production for future demands – Demand management: develops master production schedule www.knust.edu.gh 73 4. Production and Supply Chain Management system – Detailed scheduling: schedules production run for each product and from one product to the next – Materials requirement planning: determines amount and timing of raw material orders with suppliers – Purchasing: purchases raw materials and transmits to qualified suppliers – Production: plans details of running and staffing production operation www.knust.edu.gh 74 5. Customer Relationship Management • Customer relationship management (CRM) system: helps a company manage all aspects of customer encounters, including: – Marketing and advertising – Sales – Customer service after the sale – Programs to retain loyal customers www.knust.edu.gh 75 6. Sales ordering systems • Sales ordering: set of activities that must be performed to capture a customer sales order, including the following: – Recording items to be purchased – Setting sales price – Recording order quantity – Determining total cost of the order including delivery costs – Confirming customer’s available credit www.knust.edu.gh 76 System Development www.knust.edu.gh 77 4.1 An overview of systems development • Systems development involves analysing problems and designing and building information systems to solve those problems • In today’s businesses, managers and employees in all functional areas work together and use business information systems • Users of information systems are involved in their development • Calculating the cost of an IT project is difficult and a number of high profile mistakes have been made. Most of these are from the public sector (as any mistakes from the private sector are quickly covered up!) www.knust.edu.gh 78 4.2 Participants in systems development Development team – Determines objectives of the information system – Delivers system that meets objectives i. Stakeholders – People who ultimately benefit from project ii. Users iii. Managers iv. Systems development specialists – Systems analysts – Programmers v. Support personnel - Technical specialists - Database and telecommunications specialist - Hard ward engineers, etc www.knust.edu.gh 79 4.3 Information systems planning and aligning corporate and IS goals • Information systems planning: translating strategic and organizational goals into systems development initiatives • Aligning organisational goals and IS goals is critical for any successful systems development effort • One of the primary benefits of IS planning and alignment of business goals is a long-range view of information systems use in the organisation • The IS plan should guide the development of the IS infrastructure over time • IS planning should ensure better use of IS resources—including funds, personnel, and time for scheduling specific projects www.knust.edu.gh 80 Establishing objectives for systems development 1 • Overall objective of systems development: achieve business goals, not technical goals • Key operational systems: play pivotal role in organization’s continued operations and goal attainment • Goals defined for an organization also define objectives that are set for the system • Critical success factors (CSFs): factors essential to success of a functional area of an organization www.knust.edu.gh 81 Performance objectives • Output quality or usefulness : generating the right information for a valueadded business process Output accuracy: Is the output accurate and does it reflect the true situation? Output format quality or usefulness: Is the output generated in a form that is usable and easily understood? • Speed at which output is produced: Is the system generating output in time to meet organizational goals and operational objectives? Scalability of resulting system: Scalability allows an information system to handle business growth and increased business volume – Scale to which business risk is reduce: whether the system helps to reduce risk of transactions, eg reducing loan default risk in bank www.knust.edu.gh 82 Establishing objectives for systems development 3 Cost objectives • Development costs: All costs required to get the system up and running should be included. • Costs of uniqueness of system application: A system’s uniqueness has a profound effect on its cost . • Fixed investments in hardware and related equipment: Developers should consider costs of such items as computers, network-related equipment and environmentally controlled data centres in which to operate the equipment. • Ongoing operating costs: Operating costs include costs for personnel, software, supplies and resources such as the electricity required to run the system . www.knust.edu.gh 83 4.4 Systems Development Life Cycle • Common systems development life cycles: – Traditional – Prototyping – Rapid application development (RAD) – End-user development www.knust.edu.gh 84 The Traditional Systems Development Life Cycle 1 • The steps of traditional systems development might vary from one company to the next, but most approaches have five common phases: investigation, analysis, design, implementation, and maintenance and review • Traditional systems development is also known as the waterfall approach. www.knust.edu.gh 85 www.knust.edu.gh 86 The Traditional Systems Development Life Cycle 2 • Systems investigation: identifies problems and opportunities and considers them in light of business goals • Systems analysis: studies existing systems and work processes to identify strengths, weaknesses, and opportunities for improvement • Systems design: defines how the information system will do what it must do to obtain the problem’s solution www.knust.edu.gh 87 The Traditional Systems Development Life Cycle 3 • Systems implementation: creates or acquires various system components detailed in systems design, assembles them, and places new or modified system into operation • Systems maintenance and review: ensures the system operates as intended and modifies the system so that it continues to meet changing business needs www.knust.edu.gh 88 Prototyping Prototyping, also known as the evolutionary lifecycle, Takes an iterative approach to the systems development process. During each iteration, requirements and alternative solutions to the problem are identified and analyzed, new solutions are designed and a portion of the system is implemented. Two types: Operational and non-operational Operational prototype: is a prototype that has functionality – it does something towards solving the problem. It may accept input, partially process it and output the results. Then, perhaps in the second iteration, the processing is refined and expanded. Non-operational: mock-up or model. It typically includes output and input specifications and formats. Advantage is, it is developed much faster compared to operational prototype www.knust.edu.gh 89 RAD & JAD • Rapid application development (RAD): employs tools, techniques, and methodologies designed to speed application development – Makes extensive use of joint application development (JAD) for data collection and requirements analysis • JAD often uses GSS software – Best suited for DSSs and MISs; less well suited for TPSs www.knust.edu.gh 90 The End-User Systems Development Life Cycle • End-user systems development: primary effort is undertaken by a combination of business managers and users • Can be structured as complementary to, rather than in conflict with, existing and emerging information systems www.knust.edu.gh 91 4.5 Outsourcing and on-demand computing • Reduces costs • Obtains state-of-the-art technology • Eliminates staffing and personnel problems • Increases technological flexibility www.knust.edu.gh 92 4.6 Factors affecting systems development success • Successful systems development: delivers a system that meets user and organizational needs – on time and within budget • Factors – Involvement of users and stakeholders – Top management support – Degree of change – Quality of project planning – Use of project management and CASE tools www.knust.edu.gh 93 4.7 Systems investigation • What primary problems might a new or enhanced system solve? • What opportunities might a new or enhanced system provide? • What new hardware, software, databases, telecommunications, personnel, or procedures will improve an existing system or are required in a new system? • What are the potential costs (variable and fixed)? • What are the associated risks? www.knust.edu.gh 94 Initiating systems investigation • Systems request form: submitted by someone who wants IS department to initiate systems investigation – Problems in or opportunities for system – Objectives of systems investigation – Overview of proposed system – Expected costs and benefits of proposed system www.knust.edu.gh 95 Participants in systems investigation • Members of development team change from phase to phase • Systems investigation team – Upper and middle-level managers, a project manager, IS personnel, users, and stakeholders www.knust.edu.gh 96 The systems investigation report • Summarizes results of systems investigation • Summarizes the process of feasibility analysis • Recommends a course of action – Continue on into systems analysis – Modify the project in some manner – Drop the project • Reviewed by steering committee www.knust.edu.gh 97 Systems analysis • Overall emphasis of analysis – Gathering data on existing system – Determining requirements for new system – Considering alternatives – Investigating feasibility of solutions • Primary outcome of systems analysis – Prioritized list of systems requirements www.knust.edu.gh 98 Data collection • Identifying sources of data – Internal sources – External sources • Collecting data – Interviews – Direct observation – Questionnaires www.knust.edu.gh 99 Data analysis • Data modeling – Entity-relationship (ER) diagrams • Activity modeling – Data-flow diagram (DFD) • Symbols: data-flow line, process, entity, data store • Application flowcharts • Grid charts • CASE tools www.knust.edu.gh 100 Requirements analysis • Determination of user, stakeholder, and organizational needs • Techniques – Asking directly – Critical success factors (CSFs) – IS plan: generates strategic planning documents – Screen and report layout – Requirements analysis tools www.knust.edu.gh 101 The systems analysis report • Strengths and weaknesses of existing system from a stakeholder’s perspective • User/stakeholder requirements for new system (also called functional requirements) • Organizational requirements for new system • Description of what new information system should do to solve the problem www.knust.edu.gh 102 Systems design and implementation www.knust.edu.gh 103 5.1 Introduction • Answers the question: how will the information system solve a problem? • Results in a technical design – Details system outputs, inputs, and user interfaces – Specifies hardware, software, databases, telecommunications, personnel, and procedures – Shows how these components are related www.knust.edu.gh 104 5.2 Logical & physical design • Logical design: description of functional requirements of a system – Output, input, process, file, and database – Telecommunications, procedures, controls, and security – Personnel and job requirements • Physical design: specification of characteristics of system components necessary to put logical design into action – Characteristics of hardware, software, database, telecommunications, and personnel – Procedure and control specifications www.knust.edu.gh 105 5.3 Interface design and controls • Characteristics of how user accesses and interacts with system – Sign-on procedure – Interactive processing • Menu-driven system – Help facility – Lookup tables – Restart procedure – Good interactive design www.knust.edu.gh 106 Design of system security and controls 1 • Preventing, detecting, and correcting errors – Enterprise-rights management software • Disaster planning and recovery – Disaster planning: process of anticipating and providing for disasters – Disaster recovery: implementation of disaster plan – Approaches • Hot site • Cold site • Incremental backup www.knust.edu.gh 107 Design of system security and controls 2 • Systems controls: rules and procedures to maintain data security • Deterrence controls: rules and procedures to prevent problems before they occur • Closed shops: only authorized operators can run computers • Open shops: other personnel, such as programmers and analysts, may also run computers www.knust.edu.gh 108 Generating systems design alternatives 1 • Consider many factors when selecting a vendor – Reliability, stability, services, reviews, etc. • Request for proposal (RFP): document that specifies required resources such as hardware and software in detail • Financial options: consider scalability – Purchase – Lease – Rent www.knust.edu.gh 109 Generating systems design alternatives 2 • Evaluating and selecting a systems design – Preliminary evaluation • To dismiss unwanted proposals • Begins after all proposals have been submitted – Final evaluation • Detailed investigation of proposals remaining after preliminary evaluation www.knust.edu.gh 110 5.4 Acquiring hardware from an IS vendor • Buying • Leasing • Renting • “Pay-as-you-go,” “on-demand,” or “utility” computing” • Purchasing used computer equipment • Application service provider (ASP) www.knust.edu.gh 111 5.5 Acquiring software: Make or buy? • Bespoke versus off-the-shelf software • Bespoke: – High cost – Software should exactly match needs – Quality can vary depending on the programming team – Can take years to develop – Can develop a competitive advantage with good software • Off the shelf: – Lower cost – Might not exactly match needs – Usually high quality – Can acquire it now – Other organizations will have the same software and therefore it won’t give anyone an advantage www.knust.edu.gh 112 5.6 Acquiring database and telecommunications systems • Databases are a blend of hardware and software • Telecommunications systems require a blend of hardware and software • Earlier discussion on acquiring hardware and software also applies to acquisition of: – Database systems – Telecommunications hardware and software www.knust.edu.gh 113 User preparation • Readying managers, decision makers, employees, other users, and stakeholders for new systems • Training users www.knust.edu.gh 114 IS personnel: Hiring and training • Personnel that might be needed for new system – IS manager – Systems analysts – Computer programmers – Data-entry operators • Training programs should be conducted for IS personnel who will be using the system www.knust.edu.gh 115 Site preparation • Preparation of the location of a new system • May involve: – Making room for a computer in an office – Special wiring and air conditioning – Renovation of entire room – Special floor – Additional power circuits www.knust.edu.gh 116 Data preparation • Also called data conversion • Ensuring all files and databases are ready to be used with new computer software and systems www.knust.edu.gh 117 Installation • Process of physically placing computer equipment on the site and making it operational • Normally, manufacturer is responsible for installing computer equipment • Someone from the organization (usually IS manager) should oversee the process www.knust.edu.gh 118 Testing • Unit testing: testing of individual programs • System testing: testing entire system of programs • Volume testing: testing the application with a large amount of data • Integration testing: testing all related systems together • Acceptance testing: conducting any tests required by user • Alpha testing: testing an incomplete or early version of system • Beta testing: testing a complete and stable system by end users www.knust.edu.gh 119 Start-Up • Process of making the final tested information system fully operational • Approaches – Direct conversion (big bang, plunge, direct cutover) – Phase-in approach (piecemeal) – Pilot start-up – Parallel start-up www.knust.edu.gh 120 5.7 Systems operation and maintenance • Systems operation: use of a new or modified system – Help desk provides support • Systems maintenance: checking, changing, and enhancing the system to make it more useful in achieving user and organizational goals – Difficult and costly for legacy systems – Autonomic computing allows computers to manage themselves www.knust.edu.gh 121 Reasons for maintenance • Changes in business processes • New requests from stakeholders, users, and managers • Bugs or errors in program • Technical and hardware problems • Corporate mergers and acquisitions • Government regulations • Change in operating system or hardware on which the application runs • Unexpected events www.knust.edu.gh 122 Types of maintenance • Slipstream upgrade: minor upgrade • Patch: fix a problem or make small enhancement • Release: significant program change requiring new documentation • Version: major program change with new features www.knust.edu.gh 123 The request for maintenance form • Request for maintenance form: form authorizing modification of programs – Usually signed by a business manager • IS group – Reviews form – Identifies programs to be changed – Determines programmer to be assigned to task – Estimates expected completion date – Develops a technical description of change www.knust.edu.gh 124 The financial implications of maintenance • Total maintenance expenditures increase in time and money as programs age – For older programs, total cost of maintenance can be up to five times greater than total cost of development • Determining factor in decision to replace a system – Costs more to fix than replace system www.knust.edu.gh 125 5.8 Systems review • Analysis of systems to make sure that they are operating as intended • Often compares performance and benefits of designed system with actual performance and benefits of operational system www.knust.edu.gh 126 Factors to consider during systems review • • • • • • Mission Organizational goals Hardware and software Database Telecommunications Information systems personnel • Control • • • • • • • Training Costs Complexity Reliability Efficiency Response time Documentation www.knust.edu.gh 127 Security, privacy and ethical issues in information systems www.knust.edu.gh 128 6.1Principles • Policies and procedures must be established to avoid computer waste and mistakes • Computer crime is a serious and rapidly growing area of concern requiring management attention • Jobs, equipment, and working conditions must be designed to avoid negative health effects. www.knust.edu.gh 129 6.2 Computer waste and mistakes • Computer waste – Inappropriate use of computer technology and resources • Computer-related mistakes – Errors, failures, and other computer problems that make computer output incorrect or not useful – Caused mostly by human error www.knust.edu.gh 130 Computer waste • Cause: improper management of information systems and resources – Discarding old software and computer systems when they still have value – Building and maintaining complex systems that are never used to their fullest extent – Using corporate time and technology for personal use – Spam www.knust.edu.gh 131 Computer-related mistakes • Common causes – Failure by users to follow proper procedures – Unclear expectations and a lack of feedback – Program development that contains errors – Incorrect data entry by data-entry administrators www.knust.edu.gh 132 Preventing computer-related waste and mistakes • Effective policies and procedures must be: – Established – Implemented – Monitored – Reviewed www.knust.edu.gh 133 6.3 Establishing policies and procedures • Establish policies and procedures regarding efficient acquisition, use, and disposal of systems and devices • Identify most common types of computer-related mistakes • Training programs for individuals and workgroups • Manuals and documents on how computer systems are to be maintained and used • Approval of certain systems and applications before they are implemented and used www.knust.edu.gh 134 Implementing policies and procedures • Policies often focus on: – Implementation of source data automation – Use of data editing to ensure data accuracy and completeness – Assignment of clear responsibility for data accuracy within each information system • Training is very important for acceptance and implementation of policies and procedures www.knust.edu.gh 135 Monitoring policies and procedures • Monitor routine practices and take corrective action if necessary • Implement internal audits to measure actual results against established goals www.knust.edu.gh 136 Reviewing policies and procedures • Do current policies cover existing practices adequately? – Were any problems or opportunities uncovered during monitoring? • Does the organization plan any new activities in the future? – If so, does it need new policies or procedures on who will handle them and what must be done? • Are contingencies and disasters covered? www.knust.edu.gh 137 6.4 Computer crime • Often defies detection • Amount stolen or diverted can be substantial • Crime is “clean” and nonviolent • Number of IT-related security incidents is increasing dramatically • Computer crime is now global www.knust.edu.gh 138 Identity theft • Imposter obtains personal identification information such as Social Security or driver’s license numbers in order to impersonate someone else – To obtain credit, merchandise, and services in the name of the victim – To have false credentials www.knust.edu.gh 139 Cyberterrorism • Cyberterrorist: intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and information stored on them • Homeland Security Department’s Information Analysis and Infrastructure Protection Directorate – Serves as governmental focal point for fighting cyberterrorism www.knust.edu.gh 140 Illegal access and use 1 • A criminal hacker (also called a cracker) gains unauthorized use or illegal access to computer systems • A script kiddie is a cracker who lacks programming knowledge • An insider is an employee who comprises corporate systems • Malware: software programs that destroy or damage processing • Virus: program file capable of attaching to disks or other files and replicating itself repeatedly www.knust.edu.gh 141 Illegal access and use 2 • Worm: parasitic computer program that can create copies of itself on infected computer or send copies to other computers via a network • Trojan horse: program that appears to be useful but purposefully does something user does not expect • Logic bomb: type of Trojan horse that executes when specific conditions occur • Variant: modified version of a virus that is produced by virus’s author or another person www.knust.edu.gh 142 6.5 Using antivirus programs • Antivirus program: program or utility that prevents viruses and recovers from them if they infect a computer • Tips on using antivirus software – Run and update antivirus software often – Scan all diskettes and CDs before using them – Install software only from a sealed package or secure, well-known website – Follow careful downloading practices – If you detect a virus, take immediate action www.knust.edu.gh 143 6.6 Software and Internet software piracy • Software is protected by copyright laws • Copyright law violations – Making additional copies – Loading the software onto more than one machine • Software piracy: act of illegally duplicating software • Internet-based software piracy – Most rapidly expanding type of software piracy and most difficult form to combat – Examples: pirate websites, auction sites with counterfeit software, peerto-peer networks www.knust.edu.gh 144 Computer-related scams • Examples of Internet scams – Get-rich-quick schemes – “Free” holidays with huge hidden costs – Bank fraud – Fake telephone lotteries – Selling worthless penny stocks • Phishing – Gaining access to personal information by redirecting user to fake site www.knust.edu.gh 145 Preventing computer-related crime • Crime prevention by the state Many “computer laws” have been passed by governments. For example the Data Protection Act and Computer Misuse Act • Crime prevention by organisations Encrypt sensitive data Insist on strong passwords Conduct audits Restrict physical access • Crime prevention by individuals www.knust.edu.gh 146 6.7 Privacy issues • With information systems, privacy deals with the collection and use or misuse of data • More and more information on all of us is being collected, stored, used, and shared among organizations • Who owns this information and knowledge? www.knust.edu.gh 147 Privacy at work • Rights of workers who want their privacy versus interests of companies that demand to know more about their employees • Workers can be closely monitored via computer technology – Track every keystroke made by a user – Determine what workers are doing while at the keyboard – Estimate how many breaks workers are taking • Many workers consider monitoring to be dehumanizing www.knust.edu.gh 148 E-mail privacy • Most countries have a law that permits employers to monitor e-mail sent and received by employees • E-mail messages that have been erased from hard disks can be retrieved and used in lawsuits www.knust.edu.gh 149 E-mail privacy • Huge potential for privacy invasion on the Internet – E-mail messages – Visiting a Web site – Buying products over the Internet • Platform for Privacy Preferences (P3P): screening technology • Potential dangers on social networking Web sites www.knust.edu.gh 150 Individual efforts to protect privacy • Find out what is stored about you in existing databases • Be careful when you share information about yourself • Be proactive to protect your privacy • When purchasing anything from a Web site, make sure that you safeguard your credit card numbers, passwords, and personal information www.knust.edu.gh 151 The work environment • Use of computer-based information systems has changed the workforce – Jobs that require IS literacy have increased – Less-skilled positions have decreased • Computer technology and information systems have opened up numerous avenues to professionals and nonprofessionals • Despite increasing productivity and efficiency, computers and information systems can raise other concerns www.knust.edu.gh 152 6.8 Health concerns • Occupational stress • Repetitive stress injury (RSI) • Carpal tunnel syndrome (CTS) • Emissions from improperly maintained and used equipment • Increase in traffic accidents due to drivers using mobile phones, laptops, or other devices while driving www.knust.edu.gh 153 Avoiding health and environment problems • Work stressors: hazardous activities associated with unfavourable conditions of a poorly designed work environment • Ergonomics: science of designing machines, products, and systems to maximize safety, comfort, and efficiency of people who use them • Employers, individuals, and hardware manufacturing companies can take steps to reduce RSI and develop a better work environment www.knust.edu.gh 154 6.9 Ethical issues in Information Systems 1 • Laws do not provide a complete guide to ethical behaviour • Many IS-related organizations have codes of ethics for their members • For example, the British Computer Society www.knust.edu.gh 155 Ethical issues in Information Systems 2 • ACM’s code of ethics and professional conduct (continued) – Be fair and take action not to discriminate – Honour property rights including copyrights and patents – Give proper credit for intellectual property – Respect the privacy of others – Honour confidentiality www.knust.edu.gh 156