You are on page 1of 11

Computer Information Systems in Business

Chapter 7
____________________________________________________________________________

This sections summary:


-

Enterprise Systems
Each department has their own IS (ex: sales & marketing: lead generation/tracking)
Problems and Solution of Silos
____________________________________________________________________________

Information Systems By Scope (4 levels)


1.
a.
b.
c.
d.
2.
a.
b.
c.
d.

Personal Information Systems Single User


Procedures Simple
Easy to manage change
Drug Salesperson
Workgroup IS10-100 users
Procedures/ problem solutions understood and worked within group
Facilitate activities of a group of ppl.
Physicians partnership: Doctors, nurses, and staff manage patient

a.
b.
a.
3.
a.
b.

appointments
Departmental ISWorkgroup IS support a department
Accounts payable system
Functional ISProspect tracking application
Enterprise IS100-1Ks users
Span an organization and support activities of people in multiple

c.
d.
4.
a.
b.
c.

departments
Procedures formalized, problem solutions affect enterprise
Hospitals: Doctors, pharmacy, the kitchen
Inter-enterprise IS1,000+ users
Shared by two or more independent organizations
Problem solutions affect multiple organizations

Computer Information Systems in Business

d. Patients, healthcare providers, health clubs, insurance companies have an


interest in individual performance data
Information silo- data are isolated in separated IS
- Comes into existence as entities at one organization level create IS that
-

meet only their particular needs


One department has several applications that support each
Sales: Lead generation, tracking, customer management
Operations: Order entry, management, inventory
Manufacturing: Planning, Scheduling, Ops.
Customer Service: Order and account tracking
HR: Assessment, Recruiting, Compensation
Accounting: General ledger, Cost accounting, AR, AP, Cash management
What are the problems in Silos? (Five)

1.
2.
3.
4.
5.

One department develop IS solely for its own needs


Applications isolated, business processes disjointed
Data inconsistency-data integrity problem
Disjointed processes
Limited info and lack of integrated info
Isolated decisions Organizational inefficiencies
Increased Expenses $$$
Solution: Allow the isolation, but manage it to avoid problems

+ Enterprise-wide (CRM, ERP, EAI) applications integrate isolated data


+ Distributed systems using Web services tech in the cloud
Business process reengineering: activities of altering existing and
designing new business processes to take advantage of new information
systems
Problems:
- Expensive, took lots of time
- Develop applications in-house
- Personnel did not know if they were using the new, old, or hacked up
version of the system
Solution:

Computer Information Systems in Business

- Inherent processes: Predesigned procedures(license) for using software


products
1. CRM: Lead Management, Sales Applications, Relationship Management
Applications, Customer Support
a. Customer life cycle:
i. Marketing Customer acquisition relationship management
2.
a.
b.
3.
a.
b.
c.
d.

Loss/churn(win back high valued customers)


ERP: Consolidating business operations into a single platform
HR Applications, Inventory, Manufacturing, Accounting
SAP-worldwide leader of ERP vendors
EAI:
Connects system islands via a new layer of software
Enables existing applications to communicate and share data
Leverages existing systems
Gradual move to ERP
Challenges Enterprise Systems(4)

1.
2.
3.
4.
a.

Collaborate Management
Requirement Gaps
Transition
Employee Resistance:
Self-efficacies- Employee can be successful at the job
____________________________________________________________

Chapter 8 Notes:
____________________________________________________________________________

This sections moral of the story:


-

Social Media IS
Principles, conceptual frameworks, models
If you are not paying, then you are the product (rent your eyeballs to ads)
____________________________________________________________________________

Chapter 08: SMIS


- SMIS- IS that supports the sharing of content among network of users
Roles:

Computer Information Systems in Business

1. Social Media Providers:


a. Facebook, Google, LinkedIn
b. Psych, Sociology, CS, MIS, Marketing, Organizational Theory
Social Media
2. Users: Individuals and orgs use SM sites to build social relationships
3. Communities(groups of ppl w/common interests):
a. Viral Hook: Some inducement for passing communications
SMIS Components:
Hardware:
a. Elastic, cloud-based servers,
b. User computing devices
Software:
a. Application, NoSQL,
b. User: Browser, iOS, Android
Data: Content and connection data for rapid retrieval
Procedures:
a. Run and maintain application
b. User: Create and manage content
People
Social Media and
1.
a.
b.
2.
a.
3.
a.
4.
a.
5.
a.
b.

Sales and Marketing:


Social CRM: Organization and customers create and process content
P2P sales
Customer Service:
P2P support
Inbound Logistics:
Problem solving
Outbound Logistics:
Problem solving
Manufacturing and operations:
Crowdsourcing: User-guided design
B2C: Industry relationships

Computer Information Systems in Business

i.

B2B
c. Operational efficiencies
6. HR:
a. SharePoint
Capital: Investment of resources for future profits
- Human capital- Investment in Human Knowledge and skills
- Social Capital- Investment in social relations with expectation of returns in
the marketplace AKA
SC = # of relationship X Relationship Strength X Entity Resources
1.
2.
3.
4.
-

Information about opportunities


Influence
Social Cred
Personal reinforcement
Value of Social Capital: # of social network relationships
Strength of a relationship: Likelihood that the other entity will benefit the org
SM Revenues:
Pay-per-click
Freemium: Basic service for free, but charges for upgrades
SMIS Security Concerns:
SM Policy- Employees rights and responsibilities

1. Disclose
2. Protect
3. Common Sense
UGC- Content on SM site that is contributed by users
Problems of UGC:
1.
2.
3.
4.

Junk and crackpot


Inappropriate content
Unfavorable reviews
Mutinous Movements
Responses to SM Probs:

1. Leave it

Computer Information Systems in Business

2. Respond
3. Delete
____________________________________________________________

Chapter 9
____________________________________________________________________________

Bottom line:
-

BI is a critical skill, understand analytics(raw data better business


decisions)
3 phrases of BI Analysis
____________________________________________________________________________

- BI systems: IS that process operational data to analyze past


+
+
+
+
-

performance(make predictions)
Project Management
Problem Solving
Deciding
Informing
Amazon: Customer who bought...also bought= Identifying changes in

Purchasing Patterns
- Predictive policing: Analyze data on past crimes
BI Process(3 activities):
1.
a.
b.
c.

BI analysis: Create BI
Reporting
Data mining
BigData

Computer Information Systems in Business

2. PuBlish results: BI to knowledge workers


a. Push Publishing- Deliver BI results to User
b. Pull Publishing- User Requests BI results

Data Warehouses:
1.
2.
3.
4.

Obtain Data
Change
Organise and relate data
Catalog
Data Mart- Data collection that address the needs of a particular
department or functional area of the business
Processing BI Data:

1. Reporting: Sorting, formatting structured data(data in rows and columns)


2. Data Mining: Classify and Predict
a. Unsupervised: do not create a model before analysis
i. Cluster analysis: Identify entity groups that have similar characteristics
b. Supervised: Apply stat techniques to data to estimate parameters of the
model
i. Regression: Measure impact of a set of variables on another variable
3. BigData: Huge volume, rapid velocity, great variety data collections
a. MapReduce: Harnessing power of thousands of computers working in
parallel
b. Hadoop: Manages 1K computers, drive the process of finding and counting
Google search terms, Query language: Pig

BI Publishing server alternatives


Email

Static

Manual

Web Server

Static/

Alert/RSS

Computer Information Systems in Business

Dynamic Reports:
BI Documents that are
updated at the time
they are requested
SharePoint

Static/Dyn

BI Server
Dynamic
Web Server application
that is purpose-built for
publishing of BI

Alert
Subscription
User requests for
particular BI results on
a particular schedule or
in response to events

____________________________________________________________

Chapter 10: Security


____________________________________________________________________________

Bottom line:
Be aware of threats to computer security
Use Strong Passwords
____________________________________________________________________________

Security Threat

Threat- person/org that seeks to obtain data illegally


Vulnerability- Opportunity for threats to gain access to assets
Safeguard- measure taken to block threat from obtaining asset
Target- Asset desired by threat

Sources of Threats
1. Human Error: Accidental probs
2. Computer Crime: Intentionally destroy data or syst. Components (Hackers)
a.
b.
c.
i.
d.

Pretexting- Phone Caller pretends to be from a credit card company


Phishing- Pretends to be a legit co. and sends an email requesting confidential data
Spoofing-Pretend to be someone else
IP spoofing- when an intruder uses another sites IP address to masquerade
Sniffing- intercept computer communications

Computer Information Systems in Business


i.

WarDrivers- Take Computers with wireless connections thru an area and search for

unprotected wireless networks


ii. Adware
iii. Spyware
e. Hacking- breaking into computers, servers, or netowrks to steal data such as customer
lists
f. Usurpation- computer crimes invade a computer system and replace legit programs with
their own unauthorized ones that shut down legit applications
g. DoS- shut down a Web server by starting a computationally intensive application

3. Natural Disasters
APT(Advanced Persistent Threat)- cyber warfare and cyber-espionage used by
governments
Respond to Security Threats:
-

IDS- Computer program that senses when another computer is attempting to scan or

access a computer
Brute force attack- Password cracker tries every possible combination of characters
Cookies- Small files that your browser receives, enable access Web sties w/o having to
sign in every time you visit
Safeguards:

a.
b.
c.
d.
a.
b.
c.
d.
a.

Technical: Hardware & Software


Identification(username) & authorization(who you claim to be)
Firewalls
Malware Protection
Application Design
Data: Data rights and responsibilities
Passwords
Encryptions
Backup and recovery
Physical security
Human: Procedures & People
Education, Training, Administration, Assessment

____________________________________________________________

Chapter 12
____________________________________________________________________________

Computer Information Systems in Business

This sections summary:


-

Protect yourself, have less victims


Companies distinguish themselves from their competitors either by cost or quality
____________________________________________________________________________

Chapter 12: Security


Dont use the same passwords for different websites,
combination of something
Example: first two letters of someone important,
Main reason: Convenience
- Using cookies: browsers use file saved to spy on you, what products you
are interested in
- Cookie is a program that saves your stuff
- Update antivirus software, virus change regularly
How should organizations respond to security threats?
Encrypt data- make readable data by scrambling it. Simple data
algorithm.
How can technical safeguards protect against security threats?
Symmetric:
Asymmetric: One Key to Encrypt, One Key to Decrypt
FireWalls: First layer that you hit, break the package
Viruses:
Payload-- Source code that replicates
Symptoms:
Lots of pop-ups
Slowdown computer

Computer Information Systems in Business

Cursor moving without you moving it


Music playing without knowing the source
Shutdown of computer

You might also like