Sei sulla pagina 1di 2

Chapter 1: Information Systems Data is raw facts.

Information is a collection of facts organised so that the collection has greater value than the facts themselves. Data quality is determined by accuracy, completeness, economics, flexibility, reliability, relevance, simplicity, timeliness, verifiability, accessibility, and security. These must almost always be traded off against each other. An information system is a set of interrelated components that collect, manipulate, store and disseminate data and information. It consists of inputs, processing mechanisms, outputs and feedback. A model is an approximation used to represent reality so as to gain a greater understanding of the situation. They can be narrative, physical, schematic/graphic, or mathematical. Information systems consist of hardware, software, databases, telecommunications / networks / internet, people, procedures. Types of systems: E and M commerce systems (b2b and b2c, purchasing and logistics, simplifies purchase procedures), transaction processing systems (sales, payroll, purchasing; accelerates, simplifies and records COMPLETED BUSINESS transactions), enterprise resource planning systems (all areas; manages business operations for an entire multi-site global organisation), management information systems (an organised collection of people, procedures, software, databases and devices to provide routine information to managers and decision makers), decision support systems (like MIS, but for solving specific problems). MIS: do things right. DSS: do right thing. Special-purpose systems: knowledge management systems and expert systems. Threats: information systems can be attacked and information stolen from them, facilitating identity theft and fraud. The internet makes it easier for such attacks to occur. Information systems increase the effectiveness and efficiency of pretty much everything, from reporting and forecasting to managing inventory, overseeing production, or conducting design. Cost reduction: outsourcing contracts out certain business roles or services to outside firms. Ondemand computing allows an organisation to only pay for the computer resources it uses. Chapter 2: Electronic Commerce and Supply Chain Systems E-commerce allows businesses and individuals to reduce transaction costs, accelerate the flow of goods and information, improve customer service, improve coordination between business partners, and access world markets. E-commerce encompasses the whole of supply chain management: demand planning (buyer analysis, demand forecasting), supply planning (strategic, inventory, distribution, procurement, transportation plannings, supply allocation) and demand fulfilment (order fulfilment, backlog management, order promising, customer verification and order capture). The multistage model is: search and identification, selection and negotiation, electronic purchasing, order delivery, and after-sales service. Uses of m-commerce: even more efficient, using mobile devices to conduct business (especially purchasing). It requires an internet-enabled device using the wireless application protocol. It is accessible anywhere the mobile device has internet access. E-commerce applications: online retailing and wholesaling; manufacturer and supplier ordering, purchasing and invoicing; payment; online banking / stock trading. E-commerce infrastructure: web server hardware, on which a server operating system runs, which coordinates the activities of the server software, which handles security, web page retrieval and sending, tracking, development, and allows the e-commerce software to show a catalogue, take orders and arrange payment, which connects via a high-speed network connection to the internet. Electronic payment systems must be secure (using secure sockets layer (SSL) or similar, and offer a digital certificate of authenticity), and take payment in several forms, such as credit cards, Paypal, electronic cash or smart cards. E-commerce threats: Identity theft and fraud; theft of intellectual property; spam; invasion of privacy. Components of e- and m- commerce strategy: Define website functions; establish the website; build traffic to the website; maintain and improve the website. Chapter 3: Business Usage of Information Systems All TPSs go through a transaction processing cycle. Data collection involves capturing relevant data at the source. Data editing validates the data. Bad data goes through data correction, where error messages are generated so corrections can be made. Data manipulation classifies, sorts, performs calculations on, summarises and stores the data. Data storage updates relevant databases with new transactions. TPS reports and document production generates output reports. Issues with TPSs: TPSs are a mission-critical system. As such, management must: conduct business continuity planning to identify what processes must be restored in what order in the event of a disruption; plan disaster recovery, the actions to be taken to restore computer operations in the event of a disaster. They should also minimise the risk of accounting irregularities or privacy breaches by conducting TPS audits. TPS Inputs, processing and outputs: Order processing systems (customer to company) involve order entry, sales configuration, shipment planning, shipment execution, inventory control, invoicing, customer relationship management, and routing and scheduling. Purchasing transaction processing systems (company to supplier) include inventory control, purchase order receiving, and accounts payable. Accounting systems (accounting department) include the budget, accounts receivable, payroll, asset management, and general ledger. Challenges for multinationals developing TPSs: Different languages and cultures; disparities in information systems infrastructure; varying laws and customs rules; multiple currencies. ERP advantages: eliminates many separate systems and replaces them with a single integrated set of applications, reducing maintenance and conversion costs; improves work processes; improves access to data for decision making; simplifies technology infrastructure. ERP disadvantages: expensive and time-consuming to implement; difficult to integrate with other systems; risks the vendor going out of business and requiring a new system; risks implementation failure. Decision making is part of problem solving. It has three parts. Intelligence: identifying and defining problems and opportunities; gathering information. Design: developing alternative solutions to the problem; evaluating feasibility of these solutions. Choice: selecting a course of action. Problem-solving: Implementation follows on from choice; it is where the decision is put into effect. Monitoring is the last step, where decision makers evaluate the implementation to determine whether the anticipated results were achieved and to modify the process in light of new information. MIS uses, inputs and outputs: An MIS helps an organisation achieve its goals by providing managers with insight into the regular operations of the firm so they can control, organise, and plan better. It must provide the right information to the right person at the right time. Inputs include data from TPSs, ERPs and related databases, business intelligence databases, and external sources such as customers, suppliers, competitors and the internet. Outputs are reports, such as scheduled report, key-indicator (summary) reports, demand reports (produced on demand), exception reports (errors) and drill-down reports (specific). DSS capabilities: Decision support systems are flexible; they support various phases of the decision making process, different decision frequencies, different problem structures, and different decisionmaking levels.

DSS components: database; model base (allowing quantitative analysis to be done on the data); dialogue manager (guides the user to the right data and model). GSS goals: A group support system is designed to provide effective support in group decision-making settings. This includes workgroup software, brainstorming and collaboration support, etc. ESS uses: An executive support system is a specialised DSS that includes all hardware, software, data, procedures and people that help senior-level management make decisions. They are used to highlight important corporate issues, indicate new possible directions the firm may take, and help executives monitor the companys progress. Chapter 5: Information system project management The key participants in systems development are stakeholders, users, managers, systems development specialists and support personnel. They are collectively termed the development team. Information systems planning is the translation of strategic and organisational goals into systems development initiatives. Information systems support business activities. Systems development projects are undertaken to develop a competitive advantage and to bring systems in line with the organisations strategy. The systems development life cycle is the continuous process of developing and implementing systems. The traditional cycle is as follows: (systems) investigation; analysis; design; implementation; maintenance and review. It allows maximum management control, good documentation, and opportunity for review. It is expensive and may not meet real user needs. Prototyping is an iterative approach: investigate and analyse, prototype, implement, review and modify, complete. There are operational and nonoperational prototypes. It allows for many cycles of feedback and can begin being implemented quickly. However, it produces limited documentation and there is often no fixed finish point. Rapid application development (RAD) uses tools and techniques designed to accelerate development. It is useful for DSS and MIS but not TPS. It is fast and produces good documentation, but can burn out participants and consumes stakeholder resources. End-user systems development is any project primarily undertaken by managers or users. It is generally more suited to user needs, but produces poor documentation and carries a higher risk of major failure due to poor testing. Objects in programming consist of both data and the operations that can be performed on that data. Object-oriented programming is much faster and more efficient than standard programming. Factors of success in systems development: Degree of change: higher is worse. Planning quality and standards: higher is better. Organisational experience with systems development: higher is better. Use of project management tools: higher is better. Use of computer-aided software engineering (CASE) tools: higher is better. Computer-aided software engineering (CASE) tools automate many systems development tasks. They produce better systems with better documentation, but are more expensive and require more training of users. Project management is the control of a project. The Project Management Body of Knowledge (PMBOK) is a standard of project management. Project management typically involves five stages: initiating, planning, executing, controlling/monitoring, and closing. PROCESS: Systems investigation is the first phase of the traditional SDLC. It aims to identify problems with the current systems, opportunities presented by a potential new system, and consider them in light of company goals. Feasibility analysis assesses technical, economic, legal, operational and schedule feasibility. Systems analysis answers the question what must the system do to solve the problem? This involves considering organisation goals, collecting data, analysing data, requirements analysis, and producing a systems analysis report. Systems design answers the question, how will this system solve the problem? Logical design describes the process by which the system solves the problem. This will involve considering what input, processing, output, data, telecommunications, procedure, security and personnel is required. Physical design specifies the hardware, software, database, telecommunications, personnel and control that will actually be used to make the system. Considerations for interface design and control: access control, interactive processing (menus, help facility, lookup tables), clear dialogue to user. Considerations for system security and control: error prevention, detection and correction; disaster planning and recovery; systems controls (anti-fraud). RFP: A Request for Proposal is a document specifying the resources required for a systems project. Vendors can read the document and use it to tender for the contract to deliver these resources. Options for acquisition include renting, leasing and purchasing. Systems selection evaluations: A preliminary evaluation is used to filter out shitty proposals. The final evaluation is used to choose the best of the good proposals. Techniques include group consensus, cost/benefit analysis, benchmarking and point evaluation. Systems implementation is the process of: acquiring hardware; then software; user preparation; hiring and training personnel; site preparation; data preparation; installation; testing; start-up; and user acceptance. Hardware can be acquired from an IS vendor, an application service provider (ASP), an internet service provider (ISP). It can be bought new, leased, rented or bought used. Software can be bought or developed. Buying is cheaper, has consistent quality, but may not meet organisational requirements. Development can meet organisational requirements more closely, but quality can vary and the cost is high. Note that an in-between step is buying software and having it customised by the vendor. User preparation is the process of readying managers, decision-makers, employees, other users and stakeholders for the new systems. This usually involves training internal users and developing selftraining and help facilities for external users. This training can be delivered internally or by external training firms. IS personnel hiring and training is pretty obvious. Site preparation is too (note that bigger systems may need renovations, security, or extra power supply). Data preparation / conversion involves making sure all files and databases are ready to be used with the new system. This may involve data entry or scanning of non-computerised documents. The format must be correct! Installation is the process of physically placing the computer equipment on site and making it operational. Testing ensures the system operates as intended. There are several steps. Alpha testing is testing of an early or incomplete version of the system. Beta testing is testing of a complete system. Unit testing involves inputting data that will force the computer to execute every statement in its programming, including abnormal data to search for errors. System testing is the testing of the system as a whole. Volume testing ensures the system can handle high data volume. Integration testing ensures each program can interact with the programs to which it is linked. Finally, acceptance testing makes sure the system as a whole is operating as intended.

Start-up is how the company chooses to begin using the system. Direct conversion involves stopping the old system and starting the new system on a given date. The phase-in approach slowly introduces new components and removes old ones until the new system is fully operational. Pilot start-up involves running the system for a small test group of users and rolling it out to more users over time. Parallel testing involves running both systems simultaneously for a period of time. When users are comfortable with the new system, the old one is turned off. User acceptance is the formal conclusion, when the user acceptance document is signed, legally approving the system in whole and minimising the IS vendors liability for faults that might occur after the document has been signed. PROCESS ENDS Systems maintenance involves ensuring the system continues to work as intended, and enhancing the system to make it more useful in achieving organisation goals. Upgrades can be classified as slipstream, patch, release or version (in order of increasing degree of change). Maintenance costs will generally exceed development costs over their lifetime, so initially expensive well-developed systems that require less maintenance will save money in the long run over cheaper, poorer systems. Systems reviews compare the performance and benefits of the system design with the actual performance and benefits of the system in operation. They can be time-driven or event driven. Chapter 6: Software Software types: Systems software coordinates the activities and functions of hardware and various programs throughout a computer system. Application software consists of programs that help users solve particular computing problems. Operating systems are sets of computer programs that control the computer hardware and acts as an interface with applications. They can be divided into personal (Windows 7, Mac OS X, Linux), workgroup (Windows Server 2008, Mac OS X Server, Linux) and enterprise level (Windows Server 2008, Linux). Application software uses: they apply the power of the computer to solve problems and perform specific tasks, from tracking sales to monitoring video feeds to detecting fraud. Common software includes word processing, spreadsheets, databases, etc. Software suites bundle software together, see Office. Collaborative software allows a team to work together on a problem. Approaches to application development: develop proprietary software (expensive and inconsistent, but aligns better with company aims), buy off-the-shelf (cheap and reliable, but less well aligned), or buy and modify off-the-shelf (in between). Cloud computing: the practice of accessing computer power in a datacentre through the internet. It is more efficient, more reliable and cheaper than deploying local computers, but is less secure, requires stable internet access, and is not suitable for some applications. Examples of cloud services include software as a service, utility computing (storage and server hire), web services (Google Maps), and managed service providers (anti-spam, security management). Programming languages: sets of keywords, symbols, and rules for constructing statements by which people can communicate instructions to be executed by a computer. There are five generations: machine / binary (1940s; unintelligible; machine-dependent), assembly (1950s; slightly intelligible; machine-dependent), high-level (1960s; intelligible; sometimes not machine-dependent), query and database (1970s; intelligible; not machine-dependent), and natural / intelligent (1980s to present; highly intelligible; not machine-dependent). Software issues and trends: Software bugs are defects in programs that prevent them from operating correctly. Copyrights and licences are legal restrictions on the usage of computer programs. Open source software is freely available and easily customised hobby software which can be an alternative to proprietary software. Shareware, freeware, and public domain software are non-customisable software which are free or free to trial. Multi-organisational development is the trend towards collaborative software development across organisations. Global support is the trend towards worldwide support of software packages by their vendors. Chapter 7: Hardware, Telecommunications and Networks The CPU organises and manipulates data. It is comprised of an arithmetic/logic unit, a control unit, and registers (momentary storage). Moores law states that the number of transistors on a chip doubles every two years. It means that computer hardware will continue to become exponentially more powerful. Multiprocessing is the execution of two or more instructions simultaneously, using co-processors or multiple cores. Parallel computing is the execution of one set of instructions on multiple chips. The first allows a system to handle multiple tasks or users; the other allows for intensive tasks to be completed faster. Main memory provides the CPU with a working storage area for program instructions and data. Its chief feature is speed. The most common is random access memory (RAM), which is volatile (loses data if power is lost). Read-only memory (ROM) is used to store the boot-up sequence and is not volatile. Secondary storage, also called permanent storage, is non-volatile, high-capacity, economic memory storage for large quantities of data. Access can be sequential (only in the order it is stored) or direct. Magnetic disks (hard drives) are least portable but most dense and most economical. Optical media (CD, DVD) is highly portable but has limited capacity, and can generally only be written to once. Solidstate memory (Flash USB sticks) is highly portable, has limited capacity and is more expensive than optical media, but is more readily re-written to. Input and output devices: Inputs: keyboard and mouse, touchpad, touchscreen, camera, microphone, barcode scanner, RFID scanner, magnetic strip reader. Outputs: screen, printer, speaker. Types of computer systems: Handheld, mini-laptop, laptop, thin-client, desktop; workstation, server, mainframe, supercomputer. Factors when purchasing, leasing, or upgrading: Factors: software; processor; memory; storage; monitor. Leasing: better cashflow, better tax, included upgrades, no ownership, no disposal. Buying: inverse. Telecommunications system: sending unit sends a signal to a telecommunications device, which sends it through a medium to a receiving telecommunications device, which redirects it to the appropriate receiving system. Categories of media: guided (wired: copper wire, coaxial cable, fibre-optic cable) and wireless (short range: near-field communications, Bluetooth; medium range: Wireless-Fidelity/Wi-Fi, long range: microwave transmission, wireless mesh). Why network? Share data, information and processing jobs. It allows people to collaborate on projects, to share hardware, programs and databases, to allow geographically separated workgroups to work together, and to improve organisational effectiveness and efficiency. Types of networks include personal area networks (PAN), local-area networks (LAN), and wide-area networks (WAN). The internet is a WAN. Processing alternatives: centralised processing: all processing occurs in one facility; fastest. Decentralised processing: processing devices are located in various locations and are isolated from

other devices; most independent. Distributed processing: processing devices in various locations but connected in a network; most effective, but requires network connection. Telecommunications devices: Modems convert data to and from analogue signals to be sent through a transmission medium. Multiplexers combine data from multiple data sources into a single output signal. Switches direct incoming and outgoing messages to the right computer. Bridges connect two LANs together. Routers forward data packets across networks. Gateways serve as entrances to networks. Applications of telecommunications: VoIP allows users to communicate over great distances without incurring telephone charges. Electronic document distribution allows users to send and receive documents without printing them, increasing efficiency and decreasing waste. Electronic funds transfers reduce administrative costs and increases security. Chapter 9: The Internet, The World Wide Web, Web 2.0, and Social Networking The internet: a collection of interconnected networks. It consists of data transfer from a host computer to a client computer in chunks called packets. These are usually transferred in a specific format known as the Transmission Control Protocol over Internet Protocol (TCP/IP). The host computer sends the packets through its ISP to a backbone link, and the TCP header tells the backbone computer where the packet is destined. Host computers can be located using the Uniform Resource Locator, a natural-language address that Domain Name Servers then convert to Internet Protocol address numbers to figure out where the host is. Connections can be made via a LAN server, dial-up, DSL or wirelessly. The WWW: uses hyperlinks, highlighted graphics or text that when selected opens a new address in a web browser, to provide a seamless browsing experience. Web browsers access and display linked files, called pages, on a computer. Search engines are websites which use automated indexing programs to index pages on the internet and algorithms to process search queries to provide users with links to relevant content. Creating content: Web content is produced using a web document processor much like a word processor, but which generates HTML code either manually or automatically in response to developer input. It also keeps track of all files in a website and the hyperlinks that connect them. This content is then published, placed on a web server for public access. Web hosting services provide space on their servers for people or companies that do not have the resources to host their own web server. ISPs also offer this service. Large enterprises use a content management system to manage their websites. Web 2.0 is a term for the general trend towards user contribution of information to web sources. It requires developers to allow for interaction with the company to occur on their website or on other sites. Social networking websites provide web-based tools for users to share information about themselves with others and to meet and converse with others. Media sharing websites allow users to upload digital media files to the web for others to access. Social bookmarking websites allow users to recommend sites or files to others. Internet applications: search engines allow users to find information by specifying key words. They generate revenue by supplying relevant advertising links along with search results. Email, instant messaging and video conferencing allow users to communicate over the internet. Online shopping, media access, collaboration tools and services. An intranet is an internal corporate network built using Internet and WWW standards and technologies. It allows employees to access corporate information. An extranet links selected intranet resources with customers, suppliers or other business partners. Networks issues: Management issues: nobody manages the internet. Networks must be managed locally. Networks require a stable connection, and are limited by speed. Networks are also inherently less secure than using a standalone computer, raising security, privacy and fraud issues. Chapter 11: Ergonomics, e-Waste, and Green Computing Ergonomics is the science of designing machines, products and systems to maximise the safety, comfort and efficiency of the people who use them. Poor ergonomics is linked to physical degeneration, diabetes, heart disease, eye damage, cancer, and strain injuries (RSI, carpel tunnel). It is also linked to mental health issues such as anxiety, information overload and occupational stress. Good ergonomics: Good posture: hips back, chair slightly reclined, work close to body, hands neutrally positioned, wrists in line with knuckles, eyes level with centre of screen, take regular breaks. Computer waste consists of discarded software and hardware, plus company time wasted by improper use of computers. Computer-related mistakes are: data-entry errors; bugs; file handling error; mishandling of computer output; failing to keep websites updated; inadequate planning for malfunctions / environmental issues / capacity. Preventing comp-based waste and mistakes: Establishing, implementing, monitoring and reviewing policies and procedures as to computer use. Green computing is the adoption of environmentally sound practices with relation to information technology. It is the practice of designing, manufacturing, using and disposing of IT stuff efficiently and effectively to minimise the impact on the environment. Two areas businesses should focus on: minimising energy consumption by: turning off unused computers; using power-management features; using screensavers; using thin-client computers; choosing green datacentres. Also, disposing safely of IT equipment, either disposing in accordance with the Basel protocol, or by wiping and selling / donating. How to answer question 4: Involve users from the start; train them how the system works; start the system slowly so people can become familiar; offer ongoing support as required.

Potrebbero piacerti anche