Beruflich Dokumente
Kultur Dokumente
What is a System?
A system is a set of elements or components that interact to accomplish goals, it processes the input
to create the output. System performance can be measured in various ways:
- Efficiency is a measure of what is produced divided by what is consumed.
- Effectiveness is a measure of the extent to which a system achieves its goals: it can be computed by
dividing the goals actually achieved by the total of the stated goals.
Evaluating system performance also calls for using performance standards, a system performance
standard is a specific objective of the system. After standards are established, system performance is
measured and compared with the standard. Variances from the standard are determinants of the
system performance.
What is information?
Information can be defined as a collection of facts. Another term that is close related to information
is Data. Both reduces uncertainty.
Hardware
Hardware consist of computer equipment used to perform input, processing and output activities.
Input devices include keyboards, mice and other pointing devices, automatic scanning devices, and
equipment that can read magnetic ink characters. Processing devices include computer chips that
contain the central processing unit and main memory. Output devices include printers and computer
screens.
Software
Software consists of the computer programs that govern the operation of this computer. With
software people can work at any place. There are two types of software:
- System software, such as Microsoft Windows
- Sophisticated application software, such as Adobe Creative Suite
Databases
A database is an organized collection of facts and information, typically consisting of two or more
related data files. An organizations database can contain information on customers, employees,
inventory, competitor’s sales and purchases.
People
People are the most important element in most computer-based information systems. The people
involved include users of the system and information system personnel, including all the people who
manage, run program and maintain the system
Procedures
Procedures include strategies, policies, methods and rules for using the CBIS, including the operation,
maintenance and security of the computer. Good procedures can help companies to take advantage
of new opportunities and avoid potential disasters.
Organizational Structures
Organizational structure refers to organizational subunits and the way they relate to each other. An
organization structure depends on its approach to management and can affect how it views and uses
information systems. The types of organizational structurers:
- Traditional Organizational Structure, also called a hierarchical structure, an organizational structure
similar to a managerial pyramid, where the hierarchy of decision making and authority flows from
strategic management at the top down to operational management and non-management
employees.
- Flat organizational structure, an organizational structure with a reduced number of management
layers. Empowerment gives employees and their managers more responsibility and authority to
make decisions, take action and have more control over their jobs.
- Project organizational structure, a structure centred on major products or services.
- Team organizational structure, a structure centred on work teams or groups.
- Virtual organizational structure, a structure that employs individuals, groups or complete business
units in geographically dispersed areas that can last for a few weeks or years, often requiring
telecommunications or the Internet.
Organizational change
Most organizations are constantly undergoing change, both minor and major. The need for
organizational change can be caused by internal factors. So, the definition of it is the responses that
are necessary so that for-profit and non-profit organizations can plan for implement and handle
change. Strategies to contain the costs are outsourcing, on-demand computing and downsizing.
Outsourcing involves contracting with outside professional services to meet specific business needs.
On-demand computing is an extension of the outsourcing approach. Also called on-demand business,
contracting for computer resources to rapidly respond to an organization’s varying workflow.
Downsizing involves reducing the number of employees to cut costs, the term rightsizing is also used.
Organizational learning is closely related to organizational change. It adopts to new conditions of
alterations of organizational practices over time.
2.3 Evaluating IS
Once an information system has been implemented, management will want to assess how successful
it has been in achieving its goals. Business can use measurements of productivity, return on
investment, net present value and other measures of performance to evaluate the contributions
their information systems make to their business. Productivity is a measure of the output achieved
divided by the input required. (Output + Input) x 100%. Another measure of IS value is return on
investment, this measures investigates the additional profits and benefits that are generated as a
percentage of the investment in IS technology.
Database Administration
Database systems require a skilled database administrator (DBA). A DBA is expected to have a clear
understanding of the fundamental business of the organization, be proficient in the use of selected
DBMSs and stay abreast of emerging technologies and new design approaches. It works with
programmers as they build applications to ensure that their programs comply with DBMS standards
and conventions. When there is a problem, the data administrator (a non-technical but important
role that ensures data is managed as an important organizational source) has to solve it.
Data Mining
Data mining is the process of analysing data to try to discover patterns and relationships within the
data. Typically, a data warehouse is mined.
Business Intelligence
Business Intelligence involves gathering enough of the right information in a timely manner and
usable form, and analysing it to have a positive impact on business strategy, tactics or operations.
Channel Bandwidth
Telecommunications channel bandwidth refers to the rate at which data is exchanged, the broader
bandwidth, the more information can be exchanged at one time. Broadband communications can
exchange data very quickly, as opposed to narrowband communications which supports a much
lower rate of data exchange.
Wi-Fi is a wireless telecommunications technology brand owned by the Wi-Fi Alliance. Wi-Fi is a
medium-range wireless option typically operating up to about 30 metres around a single building.
Near field communication (NFC) is a very short-range wireless connectivity technology designed for
consumer electronics, smartphones and credit cards.
Telecommunications Hardware
Telecommunications hardware devices include modems, multiplexers and front-end processors. If
you use an analogue telephone line to transfer data, it can only accommodate an analogue signal (a
variable signal continuous in both amplitude so that any small fluctuations in the signal are
meaningful). Because a computer generates a digital signal representing bits, you need a special
device to convert the digital signal to an analogue signal and vice versa. Translating data from digital
analogue is called modulation, and translating data from analogue to digital is called demodulation.
Thus, these devices are modulation/demodulations devices or modems. A multiplexer is a device that
encodes data from two or more data sources onto a single communications channel, thus reducing
the number of communications channels needed and therefore lowering telecommunications costs.
Front-end processors are special purpose computers that manage communications to and from a
computer system serving hundreds or even thousands of users.
A private branch exchange (PBX) is a telephone switching exchange that serves a single organization.
It enables users to share a certain number of outside lines to make telephone calls to people outside
the organization. In addition to communications protocols, certain hardware devices switch
messages from one network to another at high speeds. A switch uses the physical device address in
each incoming message on the network to determine to which output port it should forward the
message to reach another device on the same network. A bridge connects one local area (LAN) to
another LAN that uses the same telecommunications protocol. A router forwards data packets across
two or more distinct networks towards their destinations through a process known as routing. A
getaway is a network device that serves as an entrance to another network.
Network types.
A personal are network (PAN) is a wireless network that connects information technology devices
within a range of ten metres or so. Local Are network connects computer systems and devices within
a small area, such as an office, home or several floors in a building. It is called LAN. A metropolitan
area network (MAN) is a telecommunications network that connects users and their computers in a
geographical area that spans a campus or city (100KM). A wide area network (WAN) is a
telecommunications network that connects large geographic regions. Networks that links systems
between countries are called international networks. Mesh networking is a way to route
communications among network nodes (computers or other devices) by allowing for continuous
connection and reconfiguration around blocked paths by hoping from node to node until a
connection is established.
Distributed Processing
When a organization needs to use two or more computer systems, it can use one of three basic
processing alternatives: centralized, decentralized or distributed. With centralized processing all
processing occurs in a single location or facility. With decentralized processing, processing devices
are placed at various remote locations. Each computer system is isolated and does not communicate
with another system. With distributed processing, computers are placed at remote location
connected to each other via telecommunications devices.
Client/Server Systems
Users can share data through file server computing, which allows authorized users to download
entire files from certain computers designated as file servers. After downloading data to local
computer, a user can analyse, manipulate, format and display data from the file. In client/server
architecture, multiple computer platforms are dedicated to special functions such as database
management, printing, communications and program execution.
Communication Software
A network operating system (NOS) is systems software that controls the computer system and
devices on a network and allows them to communicate with each other. The NOS performs the same
types of functions for the network as operating system software does for a computer. With
network0management software, a manager on a networked personal computer can monitor the use
of individual computers and shared hardware, scan for viruses and ensure compliance with software
licences. It is most of the important tasks of the IS managers and it protects software from being
copied. Two types of network-management products are: fault detection and performance
management. Fault management software alerts IS staff in real time when a device is failing.
Performance management software sends messages to the various devices to sample their
performance and to determine whether they are operating within acceptable levels.
A web browser translates HTML so you can read it, it provides graphical interface to the web.
Hypermedia is an extension of hypertext where the data, including text, images, video, and other
media, on web pages is connected allowing users to access information in whatever order they wish.
Web search tools are called search engines, example of this is Google. It uses keyword indexes
produce an index of all the text on the site they examine. Web services consist of standards and tools
that streamline and simplify communication among websites, promising to revolutionize the way we
develop and use the web for business and personal purposes.
Cloud Computing
Cloud Computing refers to computing environment where software and storage are provided as an
Internet service and accessed with a web browser. It offers many advantages to companies.
Capturing and gathering all data necessary to complete the processing of transaction is called data
collection. The second step is data editing, the process of checking data for validity and
completeness. When data is not correct, data correction must be used, which is the process of re-
entering data that was not typed or scanned properly. Next, data manipulation which is the process
of performing calculations and other data transformations related to business transactions. Data
storage involves updating one or more databases with new transactions. Lastly, document
production involves generating output records, documents and reports.
Mobile Commerce
Mobile commerce relies on the use of wireless devices, to let it work effectively, the interface
between the wireless device and the user needs to improve the point that it is nearly as easy to
purchase an item on wireless device as it is on the computer.
MIS originates from both internal and external sources, including the company’s supply chain. The
most significant internal data sources for an MIS are organization’s various TPS and ERP systems.
Sources of Managerial Information:
The output of most management information systems is a collection of reports that are distributed
to managers. Management reports can come from various company databases, ware houses and
other sources. A report produced periodically, or on a schedule, such as daily, weekly or monthly is
called a scheduled report. A summary of the previous day’s critical activities: typically available at the
beginning of each workday is a key-indicator report. Demand reports are developed to give certain
information upon request, in other words, these reports are produced on demand. Exception reports
are reports that are automatically produced when a situation is unusual or requires management
action. A report providing increasingly detailed data about a situation is called a drill-down report.
These reports can help management information system to develop better plans, make better
decisions and obtain greater control over the operations of the firm.
Characteristics of a MIS:
- Provide reports with fixed and standard formats
- Produce hard-copy and soft-copy reports
- Use internal data stored in computer system
- Allows users to develop their own custom reports
- Require users to submit formal requests for reports to system personnel
Creative analysis involves investigating new approaches to existing problems. Critical analysis
requires unbiased and careful questioning of whether a system elements are related in the most
effective ways. It involves:
- Questioning statements and assumptions
- Identifying and resolving objectives and orientations that conflict
- Cost objectives:
1. Development Costs
2. Cost related to uniqueness of the system application
3. Fixed investments in hardware and related equipment
4. Ongoing operating cost in the system
The traditional development system efforts can range from a small project, the steps of it might vary
from one company to the next, but most approaches have five common phrases: investigation,
analysis, design, implementation, and maintenance and review. It is also known s the waterfall
approach. The advantages and disadvantages of the traditional SDLC:
Prototyping
Prototyping, also known as the evolutionary lifecycle, takes an iterative approach to the systems
development process. During each iteration, requirements and alternative solutions to the problem
are identified and analysed. Prototypes can be classified as operational or non-operational. An
operational-prototype is a prototype that has functionally. A non-operational prototype is a mock-up
or a model.
The advantages and disadvantages of Prototyping:
Rapid Application Development, Agile Development, Joint Application Development and Other
Systems Development approaches
Rapid application development (RAD) employs tools, techniques and methodologies designed to
speed up application development. RAD reduces paper-based documentation, automatically
generates program source code and facilitates user participation in design and development
activities. It makes adapting to changing system requirements easier.
The term end-user system development describes any system development project in which business
managers and users assume the primary effort. It can be structured as complementary to rather than
conflict with, existing and emerging information systems.
- Use of project Management Tools, when the tools are not used well. The activities will be delayed.
An formalized approach called the program evaluation and review technique (PERT) creates three
time for an activity: shortest possible time. A Gantt chart is a graphical tool used for planning,
monitoring and coordinating projects.
Use of Computer aided software engineering (CASE) tools, are tools that automate many of the tasks
required in a systems development effort and encourage adherence to the SDLC. It can make the
program(s) error free.
11.4 Systems Investigation
Systems development requests require considerable time and effort to implement, many
organizations have adopted a formal procedure for initiating system development, beginning with
system investigation. The system request form is a document that is filled out by someone who want
the IS department to initiate systems investigations. It includes:
- Problems with or opportunities for the system
- Objectives of system investigation
- Overview of the proposed system
- Expected costs and benefits of the proposed system
After the decision has been made to initiate system investigation, the first step is to determine what
members of the development team should participate in the investigation phase of the project. The
members of the development team participate in investigation are then responsible for gathering
and analysing data, preparing a report justifying systems development and presenting the results to
top-level managers.
A key step of the systems phase is feasibility analysis, which accesses technical, economic, legal,
operational, and schedule feasibility. Technical feasibility is concerned with whether the hardware,
software and other system components can be acquired or developed to solve the problem.
Economic feasibility determines whether the project makes financial sense and whether predicted
benefits offset the cost and time needed to obtain them. Net present value is an often-used
approach for ranking competing projects and determining economic feasibility. Legal feasibility
determines whether laws or regulations can prevent or limit a systems development project.
Operational feasibility is a measure of whether the project can be put into action or operation.
Schedule feasibility determines the project can be completed in a reasonable amount.
The primary outcome of systems investigations is a systems investigation report, also called
feasibility report. This summarizes the results of system investigation and the process of feasibility
analysis and the recommends a course of action. The system investigation report is reviewed by
senior management often organized as an advisory committee, or steering committee, consisting of
senior management and users from the IS department and other functional areas.
Chapter 12 (Pages 422-430)
12.2 System Implementation
After the information system has been designed, system implementation involves a number of tasks
which lead to the system being installed and ready to operate. These include hardware acquisition,
software acquisition or development, user preparation, documentation preparation, hiring and
training of personnel, site and data preparation, installation, testing, start-up and user acceptance.
-
To obtain the components for an information system, organization can purchases lease or rent
computer hardware. As with hardware, application software can be acquired in several ways. It can
be purchased from external developers or developed in-house. This decision is often called the
make-or buy decision. Another option to develop software internally or hire a software house to
develop it. When a software is developed there should be a chief programmer team. Which is a
group of skilled IS professionals who design and implement a set of programs. Tools and techniques
that can be used:
- CASE and object oriented approaches
- Cross platform development, allows programmers to develop programs that can run on computer
systems that have different hardware and operating systems or platforms.
- Integrated development environment (IDEs) combine the tools needed for programming with a
programming language in one integrated package.
- Structured walkthrough, a planned and pre-announced review of the progress of a program module
- Documentation, written details used by computer operaters to execute program and by
analysts and programmers to solve problems or modify the program.
Depending on the size of the new system, an organization might have to hire act, and in some cases
train new IS personnel. The location of the new needs to be prepared, a process called site
preparation. For a small system, site preparation can be as simple rearranging the furniture in an
office. Data preparation is the process of physically placing the computer equipment on the site and
making it operational. Although normally the hardware manufacturer is responsible for installing the
computer. After that, good testing procedures are essential. Better testing can prevent types of
problems (unit testing). Testing the entire system of programs (system testing), testing the
application with a large amount of data (volume testing) and testing all related systems together
(integration testing), as well as conducting any test required by the user (acceptance testing). Alpha
testing involves testing an incomplete or early version of the system, while beta testing involves
testing a complete and stable system by end-users.
Start-up, also called cutover, begins with the final tested information system. Direct conversion
involves stopping the old system and starting the new system on a given date. The phrase-in
approach is a popular technique preferred by many organizations. In this approach, components of
the new system are slowly phased in while components of the old one are slowly phased out. Pilot
running involves introducing the new system with direct conversion for one group of users rather
than all users. Parallel running involves running both the old and new systems for a period of time.
Most mainframe computer manufacturers use a formal user acceptance document, a formal
agreement the user sign stating that a phase of installation or the complete system is approved.
Chapter 13 (pages 450-473)
13.1 Computer Waste and Mistakes
Computer-related waste and mistakes are major causes of computer problems, contributing as they
do unnecessarily high costs and lost profits. Computer waste involves the inappropriate use of
computer technology and resources. It includes employees wasting computer resources and time by
playing games and surfing the web. Computer-related mistakes refer to errors, failures and other
computer problems that make computer output incorrect or not useful, mostly caused by human
error.
A growing concern among authorities is that such intrusions are part of an organized effort
cyberterrorists to map potential security holes in critical systems. A cyberterrorist is someone who
intimidates or coerces a government or organization to advance their political or social objectives by
launching computer-based attacks against computers, networks and the information stored on them.
Crimes involving illegal system access and use of computer services are a concern to both
government an business. A cracker, often called a hacker, although this term has a range of
meanings, is a computer-savvy person who attempts to gain unauthorized or illegal access to
computer systems. In many cases, crackers are people who are looking for fun and excitement. Script
kiddies admire crackers, but have little technical savvy. Insiders are employees, disgruntled or
otherwise, working solo or in concert with outsiders to compromise corporate systems. A virus is a
computer program file capable of attaching to discs or other files and replicating itself repeatedly,
typically without the user’s knowledge or permission. Worms are computer programs that replicate
but, unlike viruses, do not infect other computer program files. A Trojan horse program is malicious
program that disguises itself as a useful application and purposefully does something the user does
not expect. As result of the increasing threat of viruses and worms, most computer users and
organizations have installed antivirus programs on their computers.
13.3 Preventing Computer-Related Crime
Because of increased computer use, greater emphasis is placed on the prevention and detection of
computer crime. Many countries have passed data laws governing how data can be stored,
processed and transferred, and laws on computer crime.
Public-key infrastructure (PKI) enables users of an unsecured public network such as the Internet to
securely and privately exchange data through the use of a public and a private cryptographic key pair
that is obtained and shared through a trusted authority. Using biometrics is another way to protect
important data and information systems. An intrusion detection system (IDS) monitors system and
network resources and notifies network security personnel when it senses a possible intrusion.
13.4 Privacy
Privacy is a big use for many people, when information is computerized and can be processed and
transferred easily, augmented and collated, summarized and reported, privacy concerns grow. The
European Union has data-protection directive that requires firms transporting data across national
boundaries to have certain privacy procedures in place.
A potential solution to come some consumer privacy concerns in the screening technology called the
Platform for Privacy preferences (P3P) being proposed to shield users from sites that don’t provide
the level of privacy protection that they desire.