SUMMARY ASSIGNMENT ON MANAGEMENT INFORMATION SYSTEMS CHAPTERS 4 AND 6 INTRODUCTION This summary paper covers chapters 4 and 6 of the book Managing Information Systems (Managing the Digital Firm), 12th Edition, authored by Kenneth and Jane Laudon. Between the two chapters there are 76 pages, chapter 4 contains 40 pages and chapter 6 has 36 pages. Chapter 4 looks broadly on Ethical and Social Issues in Information Systems, with sub headings such as; Ethical Issues Facing the Use of Technologies for the Aged Community Understanding Ethical and Social Issues Related to Systems Ethics in an Information Society The Moral Dimensions of Information Systems Hands – on MIS Projects Chapter 6 focuses on Foundation of Business Intelligence: Databases and Information Management also with sub headings as: Organizing Data in a Traditional File Environment The Database Approach to Data Management Using Databases to Improve Business Performance and Decision Making Managing Data Resource Hands – on MIS Projects Generally, the authors began each of the chapters with a case study whereas examples they cited centered on practices pertaining to the US, Australia, Canada and European countries. CHAPTER 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS In the case study preceding the presentation of chapter 4, the authors described the usefulness of information technology in the health delivery system and improvement of the quality of life of the aged in Australia. However, ethical issues such as invasion of privacy, leakage of personal information, socio-cultural issues and computer phobia among the aged pose a challenge to the system. The authors pointed out that failed ethical judgment by senior and middle managers leading to violation of the law could lead to imprisonment. They stressed that ethics is necessary in information systems since crime is rife and threatens social values. The rise of internet and electronic commerce calls for ethical measures to ensure privacy and intellectual property. And this can be achieved through ethic issues management by establishing accountability and to set standards to safeguard system quality and preserve values. According to the authors, ethical, social and political issues are quite related. Thus, social institutions develop rules of behavior supported by laws developed in political sector with prescribed behaviors and promise sanction for violation. The introduction of new technology has ripple effects which raise new concerns. In managing these concerns, the authors, mentioned five moral dimensions that must guide practitioners. They include information rights and obligation, property rights and obligations, system quality, quality of life and accountability and control. Moreover, the authors mentioned some four key technology trends that have raised ethical issues; computer power doubles every 18 months, data storage, advances in data analysis techniques for large pools of data and advances in networking. Ethics, according to the authors, is about individual choices. They emphasized on the basic concepts that underpin ethical analysis of information systems and those who manage it. Among the baic are responsibility, accountability and liability. Furthermore, the authors touched on the process of ethical analysis. Firstly is to identify and describe clearly the facts about who did what, to whom and where, when and how. Secondly, to define the conflict and identify the higher-order values involved. Thirdly, to identify the stakeholders, i.e. interest parties or groups and what they want. Fourthly, to identify options that can be taken and finally to identify the potential consequence of the options. After the analysis, the ethical principles to use to take decision according to the authors should include the following; 1. The golden rule – do unto others what you will like them to do unto you. 2. If an action is not for right for everyone to take, it is not right for anyone. 3. If an action cannot be taken repeatedly, it is not right to take at all. 4. Take the action that achieves the value 5. Take action that produces the least harm or potential cost. 6. Assure that all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise Professional code was also addressed by the authors. According to them, professional codes are promulgated by association of experts. Professional associations take responsibility of their members, thereby ensuring that entrants are qualified and competent. They also, establish codes of ethics which are promises to regulate members’ activities. On the issue of moral dimensions of information system, the authors, talked about privacy and freedom in the internet age. Privacy here, refers to individual right to be free from surveillance and interferences from any quarters. In this case, the authors mentioned a number of laws put in place in the US and Europe to protect individuals and even children in connection with the collection and use of information, for instance, the Fair Information Practice (FIP) and Children Online Privacy Protection Act (COPPA) among others. They also defined key terms such as informed consent i.e. consent given with knowledge of all the facts needed to make to make rational decision, and safe harbor i.e. a private self regulating policy and enforcement mechanism that meets the objective of government regulations and legislation and not its regulation and enforcement. Authors viewed the internet as a real threat to privacy issues. This is because information on the internet passes through different computer systems. The computer monitor, capture and store information, these processes occur at blindside of the user. According to the authors, cookies web beacons and spyware among others are responsible for privacy violations on the internet. According to the authors as part of efforts to overcome internet privacy challenges, website providers such as google, facebook and others have introduced softwares and programmes that seek to protect the privacy of users. These include, opt-out and opt-in models. There are also privacy policies such as On-line Privacy Alliance (OPA), Network Advertising Initiative (NAI) and AOL, Yahoo among others. There is also technical solution to the privacy challenges. This is made possible by new technologies such as encrypting email, email and surfing activities anonymously. This prevents clients’ computers to accept cookies and they detect and eliminate spyware. Again, platform for privacy preference, i.e. PʒP enables automatic communication of privacy policies between e-commerce site and visitors. It also allows websites to publish privacy policies. The authors expatiated on property rights which include intellectual property which covers both tangible and intangible properties created by individuals or organizations. Intellectual property rights can be protected through three legal traditions; trade secrets, copy rights and patent. Challenges to protecting intellectual property have heightened due to the proliferation of electronic net network. To add salt to injury, file sharing services are made easy by Napster, Grokster, Kazaar among others help locate and swap music files. Authors added that there is development of mechanisms to sell and distribute materials and intellectual property legally on the net, i.e. Digital Millennium Copyrights Act (DMCA) and others. The authors observed that there are accountability, liability and control on computer related issues. This is achieved through privacy and property laws. They stated that producers of software and the operators can be held liable for damages because computer software is part of a machine and if it injure someone physically or economically it is appropriate to hold them responsible. Another issue of concern is about system quality and data system errors. The authors noted the principal sources of poor system performances. These include software bugs and errors, hardware failure caused by natural or other causes and poor input data quality. The introduction of information technology and systems has negative consequences which according to the authors are not violation of individual rights or property. But rather a social costs which are extremely harmful to individuals, society and political institutions in terms of culture influence. Among some of the effects include failure of information system, loss of jobs, working beyond the prescribed 8 hours per day, interferences during family vacation, leisure time and racial and social class cleavages etc. A section of the chapter was dedicated to interactive sessions where the authors engaged the learner to monitoring in the workplace and the issue of too much technology. The authors ended the chapter with a case study on the subject “When Radiation Therapy Kills” CHAPTER 6 FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT A case study on RR Donnelley a book production company based in Chicago, ushered in this chapter. The crux of the company’s challenge was about its rapid growth through acquisitions vis-à-vis the poor management of its vast array of data which negatively affected the decision making process of the company. The authors talked about accurate, timely and relevant data as essential provisions for decision making. They also explained that computer system organizes data according to bits, bytes, fields, records, files and data bases. Problems with traditional file data system include redundancy and inconsistency, programme data dependence, lack of flexibility, poor security and lack of data sharing and availability. Database technology according to the authors neutralizes most problems of traditional file organization. Database is a collection of data organized to serve many applications efficiently by centralizing the data and controlling redundant data. According to the authors, a database management systems (DBMS) enables organizations to centralize data, manage them efficiently and provide access to the stored data by application programmes. The authors revealed that DBMS solves the problems of traditional file environment by reducing the data redundancy and inconsistency by minimizing isolated files in which the same data are repeated. The type of DBMS commonly used is relational DBMS which represent data as two-dimensional tables known as relations. The authors further illustrated in detail how a relational database organizes data about suppliers and parts. The relational database tables if combined can conveniently deliver data needed by users. According to the authors three operations are used to develop sets of data; they include, select, join and project. Object-oriented DBMS another application in processing data, has the capacity to store more complex types of information. Database in the cloud, enables cloud computing providers such as Amazon Web services, Microsoft SQL Azure Database among others offer database management services but have less functionality compared to their on-premises counterparts. The authors stressed on the capabilities of DBMS tools for organizing, managing and accessing information on the database. The key issues revolve on definition language, data dictionary and manipulation language. Again, DBMS has the capacity for accessing and manipulating information in the database. The authors explained that data manipulating language allows the occurrence of these processes. Structured Query Language (SQL) stands out as the most prominent language of all times. Creation of a database according to the authors requires both conceptual and physical designs. The conceptual design is an abstract model of database whilst the physical design shows how data is arranged. Furthermore, the conceptual process describes how the data elements in the database are to be grouped. It also identifies redundant data element and groupings of data elements application programmes among other detailed processes. For the benefit of high performance and decision making by businesses, the authors stressed the need for efficient databases which will make available the much needed information on products and customers. It was noted that data warehouses needed to be established to synchronize scattered information within an organization. The data warehouse stores current and historic data to aid decision making processes. Data mart on the other hand, is a subset of data warehouse were summarized information is kept in separate database for specific users. Data in the date warehouse and marts are further processed using business intelligence tools to analyze data to see new patterns, relationships, and insights in connection with decision making. The tools for business intelligence include software for database querying and reporting, tools for multidimensional data analysis and tools for data mining etc. Online analytical processing (OLAP) enable users to view the same data in different ways using multiple dimensions. Data mining on the hand is discovery driven. It provides insight into corporate data that cannot be obtained with OLAP. The type of information gathered from data mining are associations, sequences, classifications, clusters and forecast, as opined by the authors. The authors also stated text mining as a tool available for businesses to analyze email, memos, call centre transcripts, survey responses and service reports among many others. The tool is essentially beneficial in extracting key elements from large unstructured data sets. Web mining on the other hand is useful to businesses to source valuable information for patterns, trends, and insights in customer behaviors. The authors also in the interactive session of the chapter touched on what businesses can learn from text mining. The authors threw more light on the processes underpinning databases and the web. They emphasized that due to the fact that many back-end databases cannot interpret commands written in HTML, the web server passes the request for data software that translates HTML commands into SQL so that they can processed by the DBMS working with the database. In a client/server environment, the DBMS resides on a dedicated computer called database server. The issue of establishing business information policy was tackled by the authors. They stressed on the need for business information to be preserved through policy guidelines designed by a given business entity. This information policy entails an organization’s rules for sharing, dissemination, acquiring, standardizing, classifying and inventory information. Data Administration forms part of the process in data management, it is in reference to specific policies and procedures through which data can be managed as an organizational resource. This can be achieved by developing information policy, planning for data, overseeing database design and dictionary development among others. IBM promoted the term data governance which seeks to deal with policies and processes for managing the availability, usability, integrity, and security of the data employed in an organization, with overall objective of complying to government regulations. In ensuring data quality, the authors opined that organizations must identify and correct their faulty data and establish better routines for editing data once their data is in operation. One mean by achieving this is through data quality audit. A process which involves surveying entire data files and surveying samples from data files among others. Another activity mentioned is data cleaning (data scrubbing), include detecting and correcting data in a database that are incorrect, incomplete, improperly formatted among other processes. The authors disclosed that specialized data-cleaning software is available to automatically survey data files, correct errors in data and integrate the data. The interactive session on organizations, topic “Credit Bureau Errors – Big People Problems” The authors’ hands-on MIS projects touched on: 1. Management decision problems 2. Achieving operational excellence: building a relational database for inventory management 3. Improving decision making: searching online databases for overseas business resources. The authors closed this chapter with a case study titled Lego: Embracing Change by Combining BI with a Flexible Information System. CONCLUSION The two chapters 4 and 6 of the book both end with case studies. Chapter 4’s case study touches on Radiation Therapy whiles chapter 6 touches Change by combining BI with Information System. The chapters seek to equip the reader with information systems and data management skills which are the bedrock of social, economic and political development.