Beruflich Dokumente
Kultur Dokumente
Information Systems
MBA Programme
MANCOSA
The Role of Information Systems in Business Today
– Operational excellence
– New products, services, and business models
– Customer and supplier intimacy
– Improved decision making
– Competitive advantage
– Survival
The Role of Information Systems in Business Today
Levels in a Firm
Perspectives on Information Systems
• Management dimension of
information system
– Managers set organizational strategy for
responding to business challenges
– In addition, managers must act creatively:
• Creation of new products and services
• Occasionally re-creating the organization
Business Processes and Information Systems
• Types of decisions:
• Unstructured: Decision maker must provide judgment,
evaluation, and insight to solve problem
• Structured: Repetitive and routine; involve definite procedure
for handling so they do not have to be treated each time as new
• Semistructured: Only part of problem has clear-cut answer
provided by accepted procedure
Decision Making and Information Systems
• Components of DSS
• Database used for query and analysis
• Current or historical data from number of
applications or groups
• May be small database or large data warehouse
• User interface
• Often has Web interface
• Model:
• Abstract representation that illustrates components or
relationships of phenomenon; may be physical,
mathematical, or verbal model
• Statistical models
• Optimization models
• Forecasting models
• Sensitivity analysis models
Systems for Decision Support
• What Is a GDSS?
• Interactive, computer-based system used to facilitate
solution of unstructured problems by set of decision
makers working together as group
• Designed to improve quality and effectiveness of
decision-making meetings
• Make meetings more productive by providing tools to
facilitate:
• Planning, generating, organizing, and evaluating ideas
• Establishing priorities
• Documenting meeting proceedings for others in firm
Group Decision-Support Systems (GDSS)
• Components of GDSS
• Hardware
• Facility: Appropriate facility, furniture, layout
• Electronic hardware: Audiovisual, computer, networking equipment
• Software
• Electronic questionnaires, electronic brainstorming tools, idea
organizers
• Tools for voting or setting priorities, stakeholder identification and
analysis tools, policy formation tools,
• Group dictionaries
• People
• Participants and trained facilitator, support staff
Group Decision-Support Systems (GDSS)
• Traditional competitors
• All firms share market space with competitors who
are continuously devising new products, services,
efficiencies, switching costs
• New market entrants
• Some industries have high barriers to entry, e.g.
computer chip business
• New companies have new equipment, younger
workers, but little brand recognition
Using Information Systems to Achieve Competitive Advantage
• Low-cost leadership
• produce products and services at a lower price than
competitors while enhancing quality and level of
service.
• Product differentiation
• Enable new products or services, greatly change
customer convenience and experience
Using Information Systems to Achieve Competitive Advantage
• Health risks:
• Repetitive stress injury (RSI)
• Largest source is computer keyboards
• Carpal Tunnel Syndrome (CTS)
• Computer vision syndrome (CVS)
• Technostress
• Role of radiation, screen emissions, low-level
electromagnetic fields
Organizing Data in a Traditional File Environment
• Database:
• Collection of data organized to serve many applications by
centralizing data and controlling redundant data
• Database management system:
• Interfaces between application programs and physical data files
• Separates logical and physical views of data
• Solves problems of traditional file environment
• Controls redundancy
• Eliminated inconsistency
• Uncouples programs and data
• Enables central management and security
The Database Approach to Data Management
• Relational DBMS
• Represent data as two-dimensional tables called relations or files
• Each table contains data on entity and attributes
• Table: Grid of columns and rows
• Rows (tuples): Records for different entities
• Fields (columns): Represents attribute for entity
• Key field: Field used to uniquely identify each record
• Primary key: Field in table used for key fields
• Foreign key: Primary key used in second table as look-up field to
identify records from original table
The Database Approach to Data Management
• Business Intelligence:
• Tools for consolidating, analyzing, and providing access
to vast amounts of data to help users make better
business decisions
Managing Data Resources
Network Topologies
Communications Networks
• Transmission speed
• Bits per second (bps): Used to measure total amount
of data that can be transmitted
• Hertz (cycles per second): Frequency of medium,
affects transmission capacity
• Bandwidth: Difference between highest and lowest
frequencies that can be accommodated on channel
The Internet
• Internet addressing
• IP address
• Assigned to each computer on Internet
• 32-bit number: four strings of numbers ranging from 0 to 255
separated by periods
• E.g. 207.46.250.119
• Messages decomposed into packets, each carrying
destination IP address
The Internet
• Internet telephony:
• Telephone voice transmission over Internet or private networks
• Voice over IP (VoIP): Uses Internet Protocol (IP) to deliver voice
information using packet switching, avoiding tolls charged by local
and long-distance telephone networks
• Can reduce communication and network management costs by 20
to 30 percent
• Flexible technology: Phones can be added or moved to different
offices without rewiring or reconfiguring network
Systems Vulnerability and Abuse
• Security
• Policies, procedures, and technical measures used to prevent
unauthorized access, alteration, theft, or physical damage to
information systems
• Controls
• Methods, policies, and organizational procedures that ensure:
• Safety of organization’s assets
• Accuracy and reliability of accounting records
• Operational adherence to management standards
Systems Vulnerability and Abuse
• Trojan horse
• Software program that appears to be benign but then does
something other than expected
• Does not replicate but often is way for viruses or malicious code
to enter computer system
• Spyware
• Small programs installed surreptitiously on computers to monitor
user Web surfing activity and serve advertising
• Key loggers
• Record and transmit every keystroke on computer
• Steal serial numbers, passwords
Systems Vulnerability and Abuse
• Hacker
• Individual who intends to gain unauthorized access to
computer system
• Cybervandalism
• Intentional disruption, defacement, or destruction of Web
site or corporate information system
• Sniffer:
• Eavesdropping program that monitors information
traveling over network
Systems Vulnerability and Abuse
• Computer crime
• Computer as target of crime
• Accessing computer without authority
• Breaching confidentiality of protected computerized data
• Computer as instrument of crime
• Theft of trade secrets and unauthorized copying of software or
copyrighted intellectual property
• Using e-mail for threats or harassment
• Most economically damaging computer crimes
• DoS attacks and viruses
• Theft of service and disruption of computer systems
Systems Vulnerability and Abuse
• Identity theft
• Using key pieces of personal information (social security
numbers, driver’s license numbers, or credit card numbers) to
impersonate someone else
• Phishing
• Setting up fake Web sites or sending e-mail messages that look
like those of legitimate businesses to ask users for confidential
personal data
Systems Vulnerability and Abuse
• Security policy
• Statements ranking information risks, identifying acceptable
security goals, and identifying mechanisms for achieving
these goals
• Chief Security Officer (CSO)
• Heads security group in larger firms
• Responsible for enforcing security policy
• Security group
• Educates and trains users
• Keeps management aware of security threats and
breakdowns
• Maintains tools chosen to implement security
Technologies and Tools for Security
• Access control
• Policies and procedures used to prevent improper access to
systems by unauthorized insiders and outsiders
• Users must be authorized and authenticated
• Authentication:
• Typically established by password systems
• New authentication technologies:
• Tokens
• Smart cards
• Biometric authentication
Technologies and Tools for Security
• Firewalls:
• Hardware and software controlling flow of incoming
and outgoing network traffic
• Prevents unauthorized access
• Screening technologies
Technologies and Tools for Security
• M-commerce
• Use of handheld wireless devices for purchasing goods
and services from any location
The Growth of International Information Systems
• Specific challenges
• Standards
• Different EDI, e-mail, telecommunication standards
• Reliability
• Phone networks not uniformly reliable
• Speed
• Different data transfer speeds, many slower than U.S.
• Personnel
• Shortages of skilled consultants
Managing Global Systems
• Connectivity
• Internet does not guarantee any level of service
• Many firms use private networks and VPNs
• Low penetration of PCs, outdated infrastructures
Technology Issues and Opportunities for Global Value Chains