Using Management Information Systems

advertisement
Using Management Information Systems
David Kroenke
Information Systems Management
Chapter 10
© 2007 Prentice Hall, Inc.
1
Learning Objectives
Understand the relationship of the CIO and CTO
to other senior executives.
Know the IS department’s responsibilities for
planning the use of IT/IS, managing infrastructure,
developing systems, and protecting information
assets.
Understand the purpose and advantages of
outsourcing.
© 2007 Prentice Hall, Inc.
2
Learning Objectives (Continued)
Understand the risks of outsourcing.
Know users’ rights and responsibilities with
regard to the IS organization.
© 2007 Prentice Hall, Inc.
3
The Information Systems Department
The main functions of the information systems
department are as follows:





Plan the use of IT to accomplish organizational goals
and strategy.
Develop, operate, and maintain the organization’s
computing infrastructure.
Develop, operate, and maintain enterprise
applications.
Protect information assets.
Manage outsourcing relationships.
© 2007 Prentice Hall, Inc.
4
The Information Systems Department (Continued)
The title of the principal manager of the IS
department varies from organization to
organization.
A common title is chief information officer, or
CIO.
Other common titles are vice president of
information services, director of information
services, and, less commonly, director of
computer services.
© 2007 Prentice Hall, Inc.
5
The Information Systems Department (Continued)
The CIO, like other senior executives, reports to
the chief executive officer (CEO), though
sometimes these executives report to the chief
operation officer (COO), who in turn reports to the
CEO.
In some companies, the CIO reports to the chief
financial officer (CFO).
© 2007 Prentice Hall, Inc.
6
The Information Systems Department (Continued)
Most IS departments include a technology office
that investigates new information systems
technologies and determines how the organization
can benefit from them.

Today many organizations are investigating Web
services technology and planning on how they can best
use that technology to accomplish their goals and
objectives.
© 2007 Prentice Hall, Inc.
7
The Information Systems Department (Continued)
The chief technology officer or CTO, often heads
the technology group.
The CTO sorts through new ideas and products to
identify those that are most relevant to the
organization.
The CTO’s job requires deep knowledge of
information technology and the ability to envision
how new IT will affect the organization over time.
© 2007 Prentice Hall, Inc.
8
The Information Systems Department (Continued)
The group operations, manages the computing
infrastructure, including individual computers,
computer centers, networks, and communications
media.


This group includes system and network administrators.
An important function of this group is to monitor the user
experience and respond to user problems.
Another group in the IS department is development

This group manages the process of creating new
information systems as well as maintaining existing
information systems.
© 2007 Prentice Hall, Inc.
9
The Information Systems Department (Continued)
The size and structure of the development group
depends on whether programs are developed inhouse.

If not, this department will be staffed primarily by
systems analysis who work with users, operations, and
vendors to acquire and install licensed software and to
set up the system components around that software.

If the organization develops programs in-house, then this
department will include programmers, test engineers,
technical writers, and other development personnel.
© 2007 Prentice Hall, Inc.
10
The Information Systems Department (Continued)
The last IS department is outsourcing relations.

This group exists in organizations that have negotiated
outsourcing agreements with other companies to provide
equipment, applications, or other services.
There is also a data administration staff function.

The purpose of this group is to protect data and
information assets by establishing data standards and
data management practices and polices.
© 2007 Prentice Hall, Inc.
11
The Information Systems Department (Continued)
Keep the distinction between IS and IT.


Information systems (IS) exist to help the organization
achieve its goals and objectives.
Information technology (IT) is just technology.
 It concerns the products, techniques, procedures, and
designs of computer-based technology.
 IT must be placed into the structure of an IS before an
organization can use it.
© 2007 Prentice Hall, Inc.
12
Figure 10-1 Typical Senior-Level Reporting
Relationships
© 2007 Prentice Hall, Inc.
13
Align Information Systems with Organizational
Strategy

Information systems must be aligned with
organizational strategy.

The purpose of an information system is to help
the organization accomplish its goals and
objectives.
© 2007 Prentice Hall, Inc.
14
Figure 10-2 Planning the Use of IS/IT
© 2007 Prentice Hall, Inc.
15
Communicate IS issues to the Executive Group
The CIO is the representative for IS and IT issues
within the executive staff.
Provides the IS perspective during discussions of
problems solutions, proposals, and new initiatives.
© 2007 Prentice Hall, Inc.
16
Develop Priorities and Enforce Within the IS
Department
The CIO must evaluate every proposal, at the
earliest stage possible, as to whether it is consistent
with the goals of the organization and aligned with its
strategy.
No organization can afford to implement every good
idea.
© 2007 Prentice Hall, Inc.
17
Develop Priorities and Enforce Within the IS
Department (Continued)
Projects that are aligned with the organization's
strategy must be prioritized.
The IS department must develop the most
appropriate systems possible, given constraints on
time an money.
© 2007 Prentice Hall, Inc.
18
Sponsor the Steering Committee
A steering committee is a group of senior
managers from the major business functions that
works with the CIO to set the IS priorities and
decide among major IS projects and alternatives.
The steering committee serves an important
communication function between IS and the users.
The steering committee provides a forum for users
to express their needs, frustrations, and other
issues they have with the IS department.
© 2007 Prentice Hall, Inc.
19
Sponsor the Steering Committee (Continued)
The IS department sets up the the steering
committee’s schedule and agenda and conducts
the meetings.
© 2007 Prentice Hall, Inc.
20
Managing the Computing Infrastructure
Managing the computing infrastructure is the most
visible of all of the IS department’s functions.
To many employees, the IS department is the
“computer department”.
This management function must be in alignment
with infrastructure design.
© 2007 Prentice Hall, Inc.
21
Align Infrastructure Design with Organizational
Structure
The structure of the IS infrastructure must mirror
the structure of the organization.
A highly controlled and centralized organization
needs highly controlled and centralized information
systems.
A decentralized organization with autonomous
operating units requires decentralized information
systems that facilitate autonomous activity.
© 2007 Prentice Hall, Inc.
22
Figure 10-3 Distributed Check-Printing Company
© 2007 Prentice Hall, Inc.
23
Figure 10-4 Problematic Centralized IS
© 2007 Prentice Hall, Inc.
24
Figure 10-5 Decentralized Order-Management
System
© 2007 Prentice Hall, Inc.
25
Create, Operate, and Maintain Computing
Infrastructure
Three more tasks in managing the computing
infrastructure are to:



Create and maintain infrastructure for end-user
computing.
Create, operate, and maintain networks.
Create, operate, and maintain data centers, data
warehouses, and data marts.
© 2007 Prentice Hall, Inc.
26
Establish Technology and Product Standards
Failure of the network software upgrade points out
the need for technology and product standards.
If no standards exist it could mean difficulties for
upgrading computers and programs.
Some users’ computers become incompatible with
others.
© 2007 Prentice Hall, Inc.
27
Track Problems and Monitor Resolutions
The IS department provides the computing
infrastructure as a service to users.
The system is used to record user problems and
monitor their resolution.
When a user reports a problem the department
assigns a tracking number, and the problem enters
a queue for service.
© 2007 Prentice Hall, Inc.
28
Track Problems and Monitor Resolutions
(Continued)
Problems are prioritized on the basis of how critical
they are to the user’s work.
Higher-priority items are serviced first.
The user is told its priority and given an
approximate date for resolution.
© 2007 Prentice Hall, Inc.
29
Manage Computing Infrastructure Staff
The IS department must manage the computing
infrastructure staff.
The organization of an operation department has
subdepartments for the network, computer center,
data warehouse and user support.
The operations staff must constantly update its
knowledge to keep up with upgrades in both
hardware and software products.
© 2007 Prentice Hall, Inc.
30
Figure 10-6 Organization of a Typical IS Operation
Group
© 2007 Prentice Hall, Inc.
31
Managing Enterprise Application
In addition to managing the computing
infrastructure, the IS department manages
enterprise applications as well.
Enterprise applications means software programs
that span more than one department, such as
some functional applications as well as ERP, EAI,
and SCM applications.
© 2007 Prentice Hall, Inc.
32
Figure 10-7 Managing Enterprise Applications
© 2007 Prentice Hall, Inc.
33
Develop new Applications
The IS department manages the development of
new applications.
The process of creating a new application begins
when the IS department aligns its priorities with
the organization's strategy.
The IS department develops system plans and
proposals and submits them to the steering
committee for approval.
Once approved, the development process is
initiated.
© 2007 Prentice Hall, Inc.
34
Maintain Systems
The IS department has the responsibility for
system maintenance.
Maintenance means either to fix the system to do
what it is supposed to do in the first place or to
adapt the system to changed requirements.
The IS department must have a means to track
user issues and problems, prioritize them, and
record their resolution.
© 2007 Prentice Hall, Inc.
35
Maintain Systems (Continued)
Companies need special maintenance activities to
support legacy systems.
A legacy information system is one that has
outdated technologies and techniques but is still
used, despite its age.

Legacy system maintenance entails adapting those
systems to new tax laws, accounting procedures, or
other requirements that must be implemented for the
legacy system to be relevant and useful.
© 2007 Prentice Hall, Inc.
36
Integrate Enterprise Applications

A third element concerns enterprise application
integration.

EIA requires developers to create intermediary
layers of software, and possibly intermediary
databases, to enable the integration of disparate
systems.
© 2007 Prentice Hall, Inc.
37
Figure 10-8 Organization of a Typical IS
Development Group
© 2007 Prentice Hall, Inc.
38
Manage Development Staff
The last management function is to manage the
development staff.
A computer programmer or developer is both a
software designer as well as a programmer.
Sustaining-application developers work on existing
applications.
Sustaining developers have fewer years of
experience or less knowledge than new-application
developers.
© 2007 Prentice Hall, Inc.
39
Manage Development Staff (Continued)
Sustaining developers and new developers can
belong to separate development teams.
Product quality assurance (PQA) engineers
specialize in the testing of software.

PDQ engineers in some cases are programmers who
develop automated testing suites.
Technical writers develop product installation
instructions, help text, and other support
documentation.
© 2007 Prentice Hall, Inc.
40
Administer Data
Data administration describes a function that
pertains to all of an organization’s data assets.
Database administration describes a function
that pertains to a particular database.
© 2007 Prentice Hall, Inc.
41
Define Data Standards
Data standards are definitions, or metadata, for
data items shared across the organization.

They describe the name, official definition, usage,
relationship to other data items, processing restrictions,
version, security code, format and other features of data
items that are shared across the organization.
Data standards can also include data owner.
© 2007 Prentice Hall, Inc.
42
Figure 10-9 Data Administration
© 2007 Prentice Hall, Inc.
43
Maintain the Data Dictionary
A data dictionary is a file or database that
contains data definitions.
Without maintenance, the data dictionary, an
essential tool, loses its value.
© 2007 Prentice Hall, Inc.
44
Define Data Policies
Data administration is concerned with the creation
and dissemination of data policies.
The data administrator works with senior
executives, the legal department, functional
department managers, and others to determine
data policy.
Data policies are dynamic and must change as
new corporate policies and new systems are
developed and as new laws are created.
© 2007 Prentice Hall, Inc.
45
Figure 10-10 Example of Data Dictionary Fields
© 2007 Prentice Hall, Inc.
46
Plan for Disaster Recovery
Disaster-recovery planning is the creation of
systems for recovering data and systems in the
event of a catastrophe such as:




Earthquake
Flood
Terrorist event
Other significant processing disruption
© 2007 Prentice Hall, Inc.
47
Outsourcing
Outsourcing is the process of hiring another
organization to perform a service.
Outsourcing is done to save costs, to gain
expertise, and to free up management time.
© 2007 Prentice Hall, Inc.
48
Figure 10-11 Popular Reasons for Outsourcing IS
Services
© 2007 Prentice Hall, Inc.
49
International Outsourcing
Large companies outsource outside of the United
States because of a large, well-educated, Englishspeaking population that will work for 20 to 30
percent of the labor cost here in this country.
International outsourcing is advantageous for
customer support and other functions that must be
operational 24/7.
© 2007 Prentice Hall, Inc.
50
Alternatives to Outsourcing
Some organizations outsource the acquisition and
operation of computer hardware.
Acquiring licensed software
Outsource entire system
Web storefront
Entire business function
© 2007 Prentice Hall, Inc.
51
Figure 10-12 IS/IT Outsourcing Alternatives
© 2007 Prentice Hall, Inc.
52
Figure 10-13 Outsourcing Risks
© 2007 Prentice Hall, Inc.
53
Figure 10-14 User Information Systems Rights
and Responsibilities
© 2007 Prentice Hall, Inc.
54
Summary
The major functions of the IS department are to
plan the use of IT so as to accomplish the
organization’s goals and objectives:




Manage the organization’s computing infrastructure.
Develop, operate, and maintain enterprise applications.
Protect the organization’s information assets.
Manage outsourcing relationships.
The principal manager of the IS department is the
chief information officer (CIO).
© 2007 Prentice Hall, Inc.
55
Summary (Continued)
In most companies, the CIO reports to the CEO
and is a member of the senior management team.
The CIO communicates IS/IT issues to executive
staff, communicates and enforces priorities within
the IS department, assesses emerging technology
in light of those priorities, and sponsors the
steering committee.
© 2007 Prentice Hall, Inc.
56
Summary (Continued)
The chief technology officer (CTO) identifies new
IT products and ideas that will be relevant to the
organization.
Information systems consist of the five
components and exist to help the organization
achieve its goals and objectives.
The IS department has various planning functions.
© 2007 Prentice Hall, Inc.
57
Summary (Continued)
The IS department manages the computing
infrastructure by:



Aligning it with organization’s structure and dynamics.
Creating and maintaining facilities for end-user
computing.
Creating, operating, and maintaining the computer
network, computing centers, data warehouses, and data
marts.
Data administration and database administration
are functions in the IS department that protect the
organization’s information assets.
© 2007 Prentice Hall, Inc.
58
Summary (Continued)
Outsourcing is the process of hiring another
organization to perform a function or service.
Companies outsource hardware, programs,
applications, and even entire business functions.
As a future user of information systems, facilities,
and services, you have rights and responsibilities.
© 2007 Prentice Hall, Inc.
59
Key Terms and Concepts
Chief information officer (CIO)
Chief technology officer (CTO)
Data administration
Data dictionary
Data standards
Database administration
Legacy information system
Steering committee
© 2007 Prentice Hall, Inc.
60
Ethics Guide–Using the Corporate Computer
Suppose you work at a company that has the
following computer use policy:

Computers, email, and the Internet are to be used
primarily for official company business. Small amounts
of personal email can be exchanged with friends and
family, and occasional usage of the Internet is permitted,
but such usage should be limited and never interfere
with your work.
© 2007 Prentice Hall, Inc.
61
Ethics Guide–Using the Corporate Computer
(Continued)
Suppose you are a manager and you learn that one of your
employees has been engaged in the following activities:
Playing computer
games during work
hours
Playing computer
games on the company
computer before and
after working hour
Responding to emails
from an ill parent
Watching DVDs during
lunch and other breaks
Sending emails to plan
a party that involves
mostly people from
work
© 2007 Prentice Hall, Inc.
62
Ethics Guide–Using the Corporate Computer
(Continued)
Sending emails to plan
a party that involves no
one from work
Searching the Web for a
new car
Reading the news on
CNN.com
Checking the stock
market over the
Internet.
Bidding on items for
personal use on eBay
Selling personal items
on eBay
Paying personal bills
online
Paying personal bills
online when traveling
on company business
© 2007 Prentice Hall, Inc.
63
Ethics Guide–Using the Corporate Computer
(Continued)
Buying an airplane
ticket for an ill parent
over the Internet
Changing the content of
a personal Web site
Changing the content of
a personal business
Web site
Buying an airplane
ticket for a personal
vacation over the
Internet
© 2007 Prentice Hall, Inc.
64
Security Guide–Secure Development
A self-validating number has one or more digits
that verify the accuracy of the other digits.
Vendors frequently use self-validating numbers to
limit usage of products or electronic services.
When you install Microsoft Windows, you supply a
serial number, which is a self-validating number.
© 2007 Prentice Hall, Inc.
65
Security Guide–Secure Development (Continued)
The install program knows the algorithm for
checking the number, and if you enter any invalid
sequence, it will be able to determine that.
Such numbers are also used to limit access to
Web sites.
© 2007 Prentice Hall, Inc.
66
Opposing Forces Guide–Is Outsourcing Fool’s
Gold?
“People are kidding themselves. It sounds so
good-just pay a fixed, known amount to some
vendor, and all your problems go away”.
“Except it doesn’t work that way. Your trade one set
of problems for another. Consider the outsourcing
of computer infrastructure. What’s the first thing the
outsource vendor does? It hires all of the
employees who were doing the work for you.”
© 2007 Prentice Hall, Inc.
67
Opposing Forces Guide–Is Outsourcing Fool’s
Gold? (Continued)
What you’re really outsourcing is middle-level
management of the same IT personnel you had.
So now you’re paying a premium for the services
of your former employees, who are now managed
by strangers who are paid by the outsource
vendor, who evaluates those managers on how
well they follow the outsource vendor’s profitgenerating procedures.
© 2007 Prentice Hall, Inc.
68
Opposing Forces Guide–Is Outsourcing Fool’s
Gold? (Continued)
How quickly can they turn your operation into a
clone of all their other clients?
Do you really want to do that?
How do you undo an outsource agreement?
© 2007 Prentice Hall, Inc.
69
Problem Solving Guide–What If You Just Don’t
Know?
What if you have to make a decision and you just
don’t know which way to go?
For complex issues like outsourcing, it can be
difficult to know what the right decision is.
In many cases, more analysis won’t necessarily
reduce the uncertainty.
Consider outsourcing as a typical, complex, reallife decision problem.
© 2007 Prentice Hall, Inc.
70
Problem Solving Guide–What If You Just Don’t
Know? (Continued)
The question is, will outsourcing save your
organization money?
Will the cap on financial exposure be worth the
loss of control?
Or, is your organization avoiding managing the IS
function because you would just like to have the
whole IS mess out of your hair?
Suppose the CIO is adamantly opposed to the
outsourcing of computer infrastructure?
© 2007 Prentice Hall, Inc.
71
Problem Solving Guide–What If You Just Don’t
Know? (Continued)
Why is that? Are the projected savings real?
Or are they the result of a paper analysis that
misses many of the intangibles?
You could do another study; you could commission
an independent consultant to examine this
situation and make a recommendation.
© 2007 Prentice Hall, Inc.
72
Reflections Guide–Jumping Aboard the
Bulldozer
Brainard and Litan cite research that indicates
that organizations will move about 250,000 jobs
per year overseas between now and 2015.
Although that may sound like a lot, in the context
of the 137 million U.S. workers, and in the context
of the 15 million U.S. Americans who lose their
jobs due to other factors, 250,000 jobs overseas
is not much.
© 2007 Prentice Hall, Inc.
73
Reflections Guide–Jumping Aboard the
Bulldozer (Continued)
The culprit is not overseas outsourcing; it is
productivity.
Because of information technology, Moore’s Law,
and all the information systems that you have
learned about in this book, workers productivity
continues to increase, and it is possible to have an
economic recovery without a binge of new hiring.
© 2007 Prentice Hall, Inc.
74
Reflections Guide–Jumping Aboard the
Bulldozer (Continued)
This idea of creative destruction is all well and good
for an economic theory, but what do you, as a student
in the first decade of the twenty-first century, do?
How do you respond to the dynamics of shifting work
and job movement?
When you work with information systems, you are not
a professional of a particular system or technology;
rather, you are a developer or user of a system that
helps your organization achieve its goals and
objectives.
© 2007 Prentice Hall, Inc.
75
Reflections Guide–Jumping Aboard the
Bulldozer (Continued)
Define yourself more generally as someone who
specializes in the use of EDI, XML or Gizmo 3.0 to
help your business achieve its goals and
objectives.
Your long-term success depends not on your
knowledge of XML, but rather on your ability to
think, to solve problems, and to use technology
and information systems to help your organization
achieve its goals and objectives.
© 2007 Prentice Hall, Inc.
76
Download