BEC 4Info Systems & Communication Information Technology

advertisement
BEC 4
Info Systems & Communication
Information Technology Components
1) Hardware: physical computer
2) Software: systems & programs that process data and turn data into info
3) Data: raw facts (production or test data)
4) Network: communication media that allows multiple computers to share data simultaneously
5) People: In IT dept
Three Primary Roles in Business Ops
1) Process Detailed Data: Transaction processing system-process and record transactions
necessary to conduct business.
2) Assist in Making Daily Decisions
3) Assist in Developing Business strategies (ex: business info systems (EIS))
Data Capture Techniques:
1) Manual Entries-physically entered by individuals
2) Source Data Automation-devices capture transaction data (i.e. ATMS, point of sale)
Functions Performed on Data: collect, process, store, transform and distribute
Accounting Information System (AIS): type of mgmt info system that is partly a transaction
processing system. Creates an audit trail for accounting transactions.
Objectives: to record valid transactions, properly classify those transactions, record transactions at
proper value and in proper period and properly present transactions and related info in FS.
Transaction Processing Modes
Transaction Files: electr journals used to update Master Files (sales journal Sales Transaction File)
Master File: electronic ledgers (AR ledger=Accounts Receivable Master File)
Master File Update: process of transaction files updating the master file.
Grandfather-father-son file rotation: newest file(son) is kept for next processing cycle, the next
newest file (father) is retained in case problems in processing and therefore processing has to be
repeated and the oldest file (grandfather) is retained off-sire for disaster recovery.
PROCESSING (Batch vs OLRT)
Batch Processing: input docs are collected and grouped by type of transaction. The groups
(batches) are processed periodically (daily, weekly, and monthly). Slower than OLRT.
Batch Processing Steps:
1) Create a transaction file (batch file) by manually entering data.
Edit process/data validation: process of editing and correcting data
2) Update master file by sorting the transaction files into same order as master file and update
relevant records in master file.
Online, Real Time Processing: transactions are entered and master files updates as transactions
are entered. OLRT require random access storage devices bc it is hard to determine the order the
transactions were entered. No delay, immediate processing.
Centralized Processing: maintain all data at a central location.
-enhanced data security, consistent processing, increased need for processing power and data
storage, bottlenecks can occur.
1
BEC 4
Info Systems & Communication
Decentralized (Distributed) Processing: computing power, appls, and work are spread out over
several locations via LAN or WAN. Each remote computer performs a portion of the processing,
thus reducing the processing burden on the central computer or computers.
Disadvantages of computerized processing
-increased likelihood of unauthorized access
-concentration of info, so is security is breached, potential damage is greater
-computer disruptions may cause errors or delays
Advantages of computer processing
-more opportunities for data analysis
Periodic Scheduled Reports: made available on reg basis to end users of system
Exception Reports: produced when a specific condition or exception occurs
Demand Reports :( pull report) report available on demand.
Ad Hoc Report: report that doesn’t currently exist but can be created on demand without having to
get a software developer or programmer involved.
Query: specific question made up of various criteria that end user can pose to MIS and extract all
transaction or other info that meet that criteria.
Push Report :( ex every time user logged onto comp, a report window displayed latest and most up
to date report the user needs)
Dashboard-style Reports: present summary info necessary for mgmt action (critical data in
summary format such as speed, engine activity & oil pressure on car dashboard)
Categories of Business Information Systems:
1) Decision Support System (DSS): assist mgmt in making daily decisions, provide mgmt w/
interactive computer-aided tools that subjective judgments with objective analytical data.
(Sometimes called Expert Systems (ES))
2) Management Information System (MIS): provides managerial and other end users with
reports
3) Executive Information Systems (EIS): only used by senior execs to gather internal and external
info that assist in strategic (long-term) decision making.
4) Transaction Processing System (TPS): record routine and daily transactions necessary to
conduct business.
System Development Life Cycle (SDLC)
1) System Analysis & Planning: define nature and scope of project and identify strengths and
weaknesses. Determine system feasibility.
2) Conceptual Design: identify and evaluate appropriate design alternatives
3) Physical Design: write computer programs, create files & DBs, and develop controls
4) Implementation & Conversion: install new hardware/software, hire or relocate employees, test
& modify new procedures,
5) Training
6) Testing: test effectiveness of docs and reports, user input, controls, etc.
7) Operations & Maintenance
Information Systems Steering Committee Functions:
-Set governing policies for AIS
-Ensure top mgmt participation, guidance & control
-facilitate integration of IS activities to increase goal congruence and reduce goal conflict.
2
BEC 4
Info Systems & Communication
Enterprise Risk Mgmt Framework: designed to identify potential events, manage risk to be within
appetite and provide reasonable assurance regarding the achievements of entity objectives.
Types of IC
Preventive: occur prior to an error. Designed to deter problems before they arise.
Detective: occur after an error or irregularity
Corrective: procedures taken to identify cause of problem, correct results of errors and modify
system so that it doesn’t happen again.
Role of Technology Systems in Control Monitoring
General controls: designed to make sure an organization’s control environment is stable and wellmanaged include:
1) IS mgmt controls
2) Security mgmt controls
3) IT infrastructure controls
4) Software acquisition, development and maintenance controls
Application Controls: prevent, detect and correct transaction error and fraud and provide
reasonable assurance as to system
1) Completeness
2) Accuracy
3) Validity
4) Authorization
Input Controls (garbage in, garbage out)
Forms Design-prenumbering forms
Turnaround doc-record of company data sent to an internal party and returned by external
Party to the system as input. Ensures that all input is accounted for.
Edit Checks-validates data before its successfully input
Processing Controls
Data Matching-match two or more items of data prior to taking action (match PO, invoice,
and receiving report)
File Labels-ensure most current files are updated
Header: located at beg of each file. Contains file name and expiration date
Trailer: located at end of file. Contains batch totals calculated during input
SEGREGATION OF DUTIES: dividing responsibilities for different portions of a transaction
(authorization, recording and custody) among several ppl.
System Analysts vs Computer Programmers
System Analysts (system and hardware designers) help users determine their info needs and
design an info system to meet those needs. In charge of hardware.
Computer Programmers (software designers) take design provided by system analysts and create
an info system by writing computer programs. In charge of application software.
Computer Operators vs Computer Programmers
Security Administrators vs Computer Operators & Computer Programmers
Security Administrators: responsible for restricting access to systems, applications or DBs to the
appropriate personnel.
3
BEC 4
Info Systems & Communication
System Analyst: design overall application systems that are developed internally and may decide
what type of computer network is needed. Usually work with end users to determine the
requirements for a system and design specifics of the system to satisfy the requirements.
System Integrators (system analyst for purchased apps) also, integrates the new app with existing
applications by designing interfaces.
Application Programmer: responsible for writing and/or maintaining application programs. Also,
tests apps and prepares computer operator instructions. Should NOT be given write/update access
to data in production systems or unrestricted and uncontrolled access to application program
change mgmt systems. (Use TEST data only!)
System Programmer: responsible for installing, supporting, updating, and maintaining the OS.
Should NOT be given write/update data in production systems.
IT supervisor: manage functions and responsibilities of IT dept
Security Administrator: responsible for the assignment of initial pws and maintenance of pws
System Administrator
1) Database Administrator (DBA) (develops program for scientist): responsible for
Maintaining and supporting DB software.
2) Data Administrator (scientist) responsible for definition, planning and control of data
within a DB
3) Network Administrator: support computer networks.
4) Web Administrator: responsible for info on website.
Data input clerk: prepare, verify and input data
Hardware Technician: sets up and configures hardware
Uninterrupted Power Supply (UPS): used to prevent systems from shutting down during outage.
Program Modification Controls: controls over the modification of programs being used in
production apps. Includes both controls that attempt to prevent changes by unauthorized
personnel and also controls that track program changes so that there is a record of what programs
are running in production.
Certificate Authority: organization that issues public and private keys and records the public key
in a digital certificate.
Digital Signatures: asymmetric encryption to create legally binding electronic docs.
Electronic Commerce: uses private network or internet to execute buy/sell transactions
Electronic Business: any use of IT to perform business processes (can look up info)
Electronic Data Interchange (EDI): computer-to-computer exchange of business transaction docs
Inventory mgmt and product distribution as well as buy/sell transactions
A) Requires a standard data format.
Mapping (fields): process of linking organizations terminology to data elements in standard
EDI terminology.
-VAN is more secure than internet but uses batches so it is slower than internet and internet is
cheaper.
-EDI allows transmissions of electronic docs between computer systems in diff organizations.
-requires a standard data format
-reduces handling costs and speeds transaction processing
4
BEC 4
Info Systems & Communication
Costs of EDI
Legal Costs: costs of modifying and negotiating trading contracts with partners
Hardware Costs
Costs of translation software
Costs of data transmission
Process reengineering and employee training costs
Costs for security, monitoring and control
Audit trails in EDI systems should include logs of failed transactions, network sender/recipient
acknowledgements.
Enterprise Resource Planning System (ERP):multi-departmental enterprise system that integrates
all departments and is comprised of a number of modules that allows info to be shared across
depts...
Supply Chain Mgmt System: integration of business processes from customer to supplier
Concerned with
What goods were ordered?
When should the goods be delivered?
Where the goods should be delivered?
How much are the goods?
Customer Relationship Mgmt System (CRM): provides sales force automation and customer
services in attempt to manage customer relationships. Objective is to increase customer
satisfaction and therefore increase revenue and profitability.
Strategic Risk: risk of choosing inappropriate technology.
Operating Risk: doing the right things in the wrong way.
Financial Risk: risk of having financial resources lost, wasted or stolen
Information Risk: risk of loss of data integrity, incomplete transactions or hackers.
Risk: possibility of harm or loss
Vulnerability: possibility of harm or loss due to a weakness in design
Network Firewall: physical device that protect network as a whole
Application Firewall: protect specific software
Packet Filtering: examines packets of data as they pass through firewall to determine if they meet
all rules
Malware
a) Virus: piece of computer program that inserts itself into some other program to propagate. It
requires a host, so it can’t run independently.
b) Worm: special type of virus that can run independently and normally propagates over a
network. Can’t attach itself to other programs
c) Trojan horse: program that appears to be harmless but contains a hidden and unintended
function. Normally does not replicate itself.
Other threats
Denial of Service: one computer bombards another computer with a flood of info
Phishing: sending of phony emails to get private information
5
BEC 4
Info Systems & Communication
Hardware
1) Central Processing Unit-control center of the computer system.
a) Processor: brain/chip that interprets program instructions, coordinates input, output
b) Primary storage: main memory
c) Secondary storage: hard drives, magnetic disks
RAID allows for hard drive mirroring
Database Mgmt System-not a database, but a tool to create new DBs (ORACLE)
Relational Technology-data collected in tables (files) that are related to each other via keys.
Normalization-process of separating data into logical tables.
Network
Local Area Network (LAN): permit shared resources among computers within a limited area
Node-any device connected to a network
Workstation-client machine
Server-provides services or resources to rest of network
Transmission Media-physical path between nodes
Network Operating System (NOS)-manages communication over network
Communication Devices/Modems- allows communication between networks
Value Added Network (VAN):
1) Private
2) Secure
3) Delay data transfer b/c batch processing
4) Expensive
Internet
1) Public
2) Fast
3) less-expensive
4) Less secure
Disaster Recovery: plans for continuing operations in the event of destruction
STEPS:
1) Assess risks
2) identify mission-critical apps and data
3) Develop plan
4) Determine personnel responsibilities
5) Test the plan
Full backup-exact copy of entire DB. Time consuming
Partial backups:
1) Incremental backup-copies only data items that have changed since last backup
2) Differential backup-copies all changes made since the last FULL backup
Cold site-few days
Hot Site-Few hours
Warm- .5-1 day
6
Download