Professional Documents
Culture Documents
Chapter 7
____________________________________________________________________________
Enterprise Systems
Each department has their own IS (ex: sales & marketing: lead generation/tracking)
Problems and Solution of Silos
____________________________________________________________________________
a.
b.
a.
3.
a.
b.
appointments
Departmental ISWorkgroup IS support a department
Accounts payable system
Functional ISProspect tracking application
Enterprise IS100-1Ks users
Span an organization and support activities of people in multiple
c.
d.
4.
a.
b.
c.
departments
Procedures formalized, problem solutions affect enterprise
Hospitals: Doctors, pharmacy, the kitchen
Inter-enterprise IS1,000+ users
Shared by two or more independent organizations
Problem solutions affect multiple organizations
1.
2.
3.
4.
5.
1.
2.
3.
4.
a.
Collaborate Management
Requirement Gaps
Transition
Employee Resistance:
Self-efficacies- Employee can be successful at the job
____________________________________________________________
Chapter 8 Notes:
____________________________________________________________________________
Social Media IS
Principles, conceptual frameworks, models
If you are not paying, then you are the product (rent your eyeballs to ads)
____________________________________________________________________________
i.
B2B
c. Operational efficiencies
6. HR:
a. SharePoint
Capital: Investment of resources for future profits
- Human capital- Investment in Human Knowledge and skills
- Social Capital- Investment in social relations with expectation of returns in
the marketplace AKA
SC = # of relationship X Relationship Strength X Entity Resources
1.
2.
3.
4.
-
1. Disclose
2. Protect
3. Common Sense
UGC- Content on SM site that is contributed by users
Problems of UGC:
1.
2.
3.
4.
1. Leave it
2. Respond
3. Delete
____________________________________________________________
Chapter 9
____________________________________________________________________________
Bottom line:
-
performance(make predictions)
Project Management
Problem Solving
Deciding
Informing
Amazon: Customer who bought...also bought= Identifying changes in
Purchasing Patterns
- Predictive policing: Analyze data on past crimes
BI Process(3 activities):
1.
a.
b.
c.
BI analysis: Create BI
Reporting
Data mining
BigData
Data Warehouses:
1.
2.
3.
4.
Obtain Data
Change
Organise and relate data
Catalog
Data Mart- Data collection that address the needs of a particular
department or functional area of the business
Processing BI Data:
Static
Manual
Web Server
Static/
Alert/RSS
Dynamic Reports:
BI Documents that are
updated at the time
they are requested
SharePoint
Static/Dyn
BI Server
Dynamic
Web Server application
that is purpose-built for
publishing of BI
Alert
Subscription
User requests for
particular BI results on
a particular schedule or
in response to events
____________________________________________________________
Bottom line:
Be aware of threats to computer security
Use Strong Passwords
____________________________________________________________________________
Security Threat
Sources of Threats
1. Human Error: Accidental probs
2. Computer Crime: Intentionally destroy data or syst. Components (Hackers)
a.
b.
c.
i.
d.
WarDrivers- Take Computers with wireless connections thru an area and search for
3. Natural Disasters
APT(Advanced Persistent Threat)- cyber warfare and cyber-espionage used by
governments
Respond to Security Threats:
-
IDS- Computer program that senses when another computer is attempting to scan or
access a computer
Brute force attack- Password cracker tries every possible combination of characters
Cookies- Small files that your browser receives, enable access Web sties w/o having to
sign in every time you visit
Safeguards:
a.
b.
c.
d.
a.
b.
c.
d.
a.
____________________________________________________________
Chapter 12
____________________________________________________________________________