Iis PDF
Iis PDF
Iis PDF
Information Systems
What is IS?
maximize profit by
producing goods and/or
services
Functional Areas of Business
outbound logistics
Functional Areas of Business
Business functions
Business processes
A series of interrelated activities through which work is
organized and focused to produce a product or service
Business levels
Strategic (long range planning)
Tactical (co-ordinate & supervise)
Operational (produce product & service)
The order generation and fulfillment process
Role of IS in Business
Competitive advantage
Low-cost (value chain)
Market niche
Product differentiation
Customer loyalty
Globalization
People (language)
Organization (culture)
Technology (telecommunication)
The value chain views the firm as a series of basic
activities that add value to a firm's products or services
(Fig. 3-2)
Primary activities
•inbound logistics,
•operations,
•outbound logistics,
•sales and marketing
•service
Support activities
•administration and management
•human resources
•technology and procurement.
Quality
Process simplification
Benchmarking
Customer focus
Cycle time reduction
Improve design & production
Error reduction
Reengineering
Business processes redesign
Ethical & social responsibility
Information rights & privacy
Intellectual property
Accountability & liability
Quality of life
IS Approach to Problem Solving
Systems Analysis
Systems Design
Systems Analysis & Design
Systems Analysis
Problem analysis (what)
Information gathering (where & why)
Decision making (how)
Establish objectives
Determine feasibility
Choose best solution
INFORMATION
SYSTEMS IN THE
ENTERPRISE
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Figure 2-1
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Figure 2-2
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Payroll TPS
Figure 2-3
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Figure 2-4
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Knowledge level
Inputs: Design specs
Processing: Modeling
Outputs: Designs, graphics
Users: Technical staff
Management level
Inputs: High volume data
Processing: Simple models
Outputs: Summary reports
Users: Middle managers
Figure 2-5
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Internal orientation
Management level
Inputs: Low volume data
Processing: Interactive
Outputs: Decision analysis
Users: Professionals, staff
Figure 2-6
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Figure 2-7
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Strategic level
Inputs: Aggregate data
Processing: Interactive
Outputs: Projections
Users: Senior managers
Figure 2-8
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Figure 2-9
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Figure 2-10
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Figure 2-11
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Business processes
Assembling product,
Manufacturing and production:
checking quality, producing bills of
materials
Identifying customers,
Sales and marketing:
creating customer awareness, selling
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Paying creditors,
Finance and accounting:
creating financial statements, managing
cash accounts
Figure 2-12
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Figure 2-13
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Supply Chain
Figure 2-14
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Collaborative Commerce
Figure 2-15
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Industrial Networks
Web-enabled networks
Figure 2-16
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Enterprise Systems
Figure 2-17
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Firm-wide knowledge-based
Management:
management processes
Heavy centralization of
Domestic Exporter:
corporate activities in the home country of
origin
Centralized Systems
Duplicated Systems
Decentralized Systems
Networked Systems
Essentials of Management Information Systems
Chapter 2 Information Systems in the Enterprise
Figure 2-18
COMPUTERS: THE
MACHINES BEHIND
COMPUTING
Hossein BIDGOLI
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
1
Chapter 2 Computers: The Machines Behind Computing
learning outcomes
LO1 Define a computer system and describe its
components.
LO2 Discuss the history of computer hardware and
software.
LO3 Explain the factors distinguishing computing power
of computers.
LO4 Describe the major operations of computers
LO5 Summarize the binary system and data
representation.
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
2
Chapter 2 Computers: The Machines Behind Computing
l e a r n i n g o u t c o m e s (cont’d.)
LO6 Discuss the types of input, output, and memory
devices.
LO7 Explain how computers are classified.
LO8 Describe the two major types of software.
LO9 List the generations of computer languages.
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
3
Defining a Computer
Computer
Machine that accepts data as input
Processes data without human intervention using stored
instructions
Outputs information
“Program”
Step-by-step directions for performing a specific task
Written in a language the computer can understand
GIGO
Garbage in, garbage out
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
4
Components of a Computer
System
Hardware components
Physical devices, such as keyboards, monitors, and
processing units
Software
Programs written in computer languages
Central processing unit (CPU)
Arithmetic logic unit (ALU)
Control unit
Single or multiprocessor
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
5
Exhibit 2.1 The Building Blocks of a Computer
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
6
Components of a Computer
System (cont'd.)
Bus
Link between devices connected to the computer
Computer performance factors
Processor
Bus
Operating system
Disk drive
CPU case
Motherboard
Main circuit board
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
7
Exhibit 2.2 Components of a Computer System
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
8
Table 2.1 Hardware Generators
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
9
Table 2.2 Computer Language Trends
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
10
The Power of Computers
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
11
Speed
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
12
Accuracy
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
13
Storage and Retrieval
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
14
Computer Operations
Logical operations
Comparison
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
15
Spotlight on Computer
Storage
Millipede
Developed by IBM
Allows storing one trillion bits of data per square inch
Could buy a storage device of 1 TB for less than $400
Uses thousands of very fine silicon tips to punch holes
into a thin film of plastic
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
16
Input Devices
Input devices
Send data and information to computer
Types
– Optical character reader
Keyboard
– Magnetic ink character recognition
Mouse
system
– Optical mark recognition system
Touch screen
Light pen
Trackball
Data tablet
Barcode reader
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
17
Output Devices
Output devices
For mainframes and personal computers
Soft copy
Monitor
Cathode ray tube (CPT), plasma, liquid crystal display (LCD)
Hard copy
Printer
Inkjet, laser
Voice
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
18
Memory Devices
Main memory
Stores data and information
Volatile
Secondary memory
Nonvolatile
Holds data when the computer is off or during course of
a program's operation
Serves as archival storage
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
19
Main Memory Devices
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
20
Secondary Memory Devices
Magnetic disks
Made of mylar or metal
Used for random-access processing
Magnetic tape
Made of a plastic material
Stores data sequentially
Optical discs
Use laser beams to access and store data
CD-ROM, WORM, DVD
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
21
Exhibit 2.3 Magnetic Memory Devices
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
22
Secondary Memory Devices
(cont'd.)
Other secondary memory
Hard disk
USB flash drive
Memory card
Redundant array of independent disks (RAID) system
Collection of disk drives used for fault tolerance and
improved performance
If one disk in the array fails, data isn’t lost
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
23
Exhibit 2.4 Examples of Memory Devices
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
24
Table 2.4 Capacity of Secondary Memory Devices
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
25
Storage Area Networks and
Network-Attached Storage
Storage area network (SAN)
Dedicated high-speed network consisting of both hardware and software
Connect and manage shared storage devices
Makes storage devices available to all servers on a network
Network-attached storage (NAS)
Network-connected computer dedicated to providing file-based data
storage services to other network devices
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
26
Classes of Computers
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
27
Popular iPad Business
Applications
Healthcare workers
Sales agents and service workers
Insurance agents
Real estate agents
Legal professionals
Teachers and students
Financial professionals
Corporate campus workers
Remote and mobile workers
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
28
Ubiquitous Computing
Also called:
Pervasive computing
Third wave computing
Wearable computers
Cell phones
Medical devices
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
29
Server Platforms: An
Overview
Server
Computer and all the software for managing network
resources and offering services to a network
Types of servers
Application – Print
Database – Remote access (RAS)
Disk – Web
Fax
File
Mail
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
30
What is Software?
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
31
Operating System Software
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
32
Operating System Software
(cont'd.)
Operating system control programs
Job management
Resource allocation
Data management
Communication
Kernel
Supervisor program
Responsible for controlling all other programs in the OS
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
33
Google Docs: Applications
and Challenges
Free Web-based application for creating:
Word processor documents, spreadsheets, presentations,
and forms
Create and edit document
Collaboration in real time
Save in various formats
Cloud computing
Security risks
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
34
Application Software
Application software
Commercial software or software developed in-house
Software types
Word processing
Spreadsheet
Database
Presentation
Graphics
Desktop publishing
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
35
Application Software
(cont'd.)
Financial planning and accounting
Project management
Computer-aided design (CAD)
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
36
Computer Languages
Machine language
0s and 1s
Code written for one type of computer does not work on
another
Assembly language
Higher level than machine but still machine dependent
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
37
Computer Languages
(cont'd.)
High-level languages
C++, Java, VB.Net
Used for Web development and the Internet
Fourth-generation languages
Easiest to use
SQL
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
38
Computer Languages
(cont'd.)
Fifth-generation languages (5GLs)
Knowledge-based systems
Natural language processing (NLP)
Visual programming
Graphical approach to using programming
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
39
Summary
MIS, Chapter 2
©2011 Course Technology, a part of Cengage Learning
40
DATABASES AND
DATA WAREHOUSES
LEARNING OUTCOMES
Cookies
Small text files with a unique ID tag
Embedded in a Web browser
Saved on the user’s hard drive
Can be useful or intrusive
Many users disable cookies
By installing a cookie manager
Or using Web browser options
Spyware and Adware
Spyware
Software that secretly gathers information about users while they browse the
Web
Can be used maliciously
Install antivirus or antispyware software
Adware
Form of spyware
Collects information about the user to display advertisements in the Web browser
Phishing
Phishing
Sending fraudulent e-mails that seem to come from legitimate sources
Direct e-mail recipients to false Web sites
To capture private information
Keyloggers
Keyloggers
Monitor and record keystrokes
Can be software or hardware devices
Sometimes used by companies to track employees’ use of e-mail and the
Internet
Can be used for malicious purposes
Some antivirus and antispyware programs protect against software
keyloggers
Sniffing and Spoofing
Sniffing
Capturing and recording network traffic
Often used by hackers to intercept information
Spoofing
Attempt to gain access to a network by posing as an authorized user to find
sensitive information
Computer Crime and Fraud
Computer fraud
Unauthorized use of computer data for personal gain
Social networking sites
Used for committing computer crime
Examples
Denial-of-service attacks
Identity theft
Software piracy
Distributing child pornography
E-mail spamming
Computer Crime and Fraud (cont’d.)
Writing or spreading viruses, worms, Trojan programs, and other malicious code
Stealing file
Changing computer records
Virus hoaxes
Sabotage
Company insiders commit most computer crimes
Internet Fraud Cost $559 Million in 2009
Most of the complaints were about e-mail scams and the non-delivery of
merchandise or payments
Privacy Issues
Federal laws now regulate collecting and using information on people and
corporations
1970 Fair Credit Reporting Act
Acceptable use policies
Accountability
Nonrepudiation
Hardware or software controls
Determine what personal information is provided on the Web
E-mail
Intellectual property
Protections that involve copyrights, trademarks, trade secrets, and patents for
“creations of the mind” developed by people or businesses
Industrial property
Inventions, trademarks, logos, industrial designs
Copyrighted material
Literary and artistic works
May apply to online materials
Exceptions under Fair Use Doctrine
Intellectual Property (cont’d.)
Trademark
Protects product names and identifying marks
Patent
Protects new processes
Advantages of patents
Software piracy
Laws
Telecommunications Act of 1996
Communications Decency Act (CDA)
Laws against spamming
Intellectual Property (cont’d.)
Digital divide
Computers still aren’t affordable for many people
Haves and have-nots
Companies installing cables for Internet connections might subject their
communities to a type of economic “red-lining”
Children are often victims of this divide
Funding for computers at schools and libraries
Loaner programs
The Impact of Information Technology
in the Workplace
New jobs for:
Programmers
Systems analysts
Database and network administrators
Network engineers
Webmasters
Web page developers
e-commerce specialists
Chief information officers (CIOs)
Technicians
The Impact of Information Technology
in the Workplace (cont’d.)
Web designers
Java programmers
Web troubleshooters
Telecommuting and virtual work
Job deskilling
Skilled labor eliminated by introducing high technology
Job downgraded from a skilled to a semiskilled or unskilled position
Advantages and Disadvantages
of Telecommuting
The Impact of Information Technology
in the Workplace (cont’d.)
Job upgrading
Clerical workers who now use computers
One skilled worker might be capable of doing the job of several
workers
Virtual organizations
Networks of independent companies, suppliers, customers, and
manufacturers
Connected via information technologies
Share skills and costs
Have access to each other’s market
Information Technology and Health
Issues
Reports of health-related issues caused by video display terminals (VDTs)
No conclusive study
Health problems associated with the environment in which computers are used
Information Technology and Health
Issues (cont’d.)
Other reports of health problems
Vision
Musculoskeletal
Skin
Reproductive
Stress-related
Amount of time some people spend on the Web
Green Computing
Designing products that last longer and are modular in design so that
certain parts can be upgraded without replacing the entire system
Designing search engines and other computing routines that are faster and
consume less energy
Replacing several underutilized smaller servers with one large server using a
virtualization technique
Ways to Pursue a Green Computing
Strategy (cont’d.)
Information technologies
Affect privacy
Can be used for computer crimes
Privacy issues
E-mail
Censorship
Organizational issues
Digital divide
Workplace impacts
Health impact
Green computing
Introduction to
Information Security
Learning Objectives:
Business-to-Consumer
Virtual storefronts, multimedia catalogs, interactive order
processing, electronic payment, online customer support
Business-to-Business
Electronic business marketplaces, direct links between
businesses, auctions and exchanges
Consumer-to-Consumer
Online auctions, posting to newspaper sites, personal
websites, e-commerce portals
Complex processes
Near-anonymous and electronic nature
of transactions
Many security issues
Wide variety of debit and credit alternatives
Financial institutions may be part of the process
Build a website
Choose or set up web hosting
Use simple design tools and templates
Include a shopping cart and payment support
Market the website
Include Web page and e-mail advertising
and promotions
Exchange advertising with other Web stores
Register with search engines and directories
Sign up for affiliate programs
Many to Some
Procurement marketplaces
Unites major buyers who combine purchasing catalogs
Attracts more competition and thus lower prices
Many to Many
Auction marketplaces
Dynamically optimizes prices