Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Information Systems in
Organizations and Society
Information Concepts
Information is one of an organizations most
valuable resources
Data = Raw facts; e.g. Employee Number
Information = A collection of (raw) facts
organized and processed for additional value
Where the data comes from or how it is
processed is less important than whether the
data transformed into results that are accurate,
complete, useful or valuable
Ref Table 1.2 on page 8 Characteristics of
Valuable Information
System Concepts
System = A set of elements or components that
interact to accomplish goals
Its 4 components with automatic car wash example
Continuous Improvement
Constantly seeking ways to improve business
processes to add value to products and services
Competitive Advantage
Organizations effectively use IT to improve their
business and achieve competitive advantage
Presidents Choice Financial developed online, nofee24 hour banking and increased customer service
using IT
Competitive Advantage
Strategic planning for Competitive
Advantage
Performance-based Information
Systems
3 stages in the business use of IS
Stage 1 Cost reduction and productivity
Stage 2 Competitive advantage
Stage 3 Performance-based management
Systems Development
Activity of creating or modifying Information
Systems to meet the changing business needs
Investigation understand the problem or
opportunity to be addressed
Analysis understand solutions
Design select and plan best solution
Implementation place designed solution into
effect
Maintenance and Review evaluate results of
solution
Cultural challenges
Language challenges
Time and distance challenges
Infrastructure challenges
Currency challenges
Product and service challenges
Technology transfer challenges
Local, regional and national laws
Trade agreements etc.
Computer Crime
Global issue
Computer can be both the tool used to
commit a crime and the object of that
crime
The top categories of computer crime
Identity theft
Imposter obtains key pieces of information such as SIN or bank
account number to impersonate someone else
Dumpster diving
Going through the garbage for important pieces of information
needed to access IS or its data
Cyber terrorism
Launching computer based attack computers, networks and
information stored on them
Identify theft
Malware attacks
Computer scams
Theft of equipment and data
Privacy Issues
With IS, privacy deals with the collection and use or misuse of data
who owns this information and knowledge?
Platform for Privacy Preferences (P3P)
Potential solution to some consumer privacy concerns
Ergonomics
The science of designing machines, products
and systems to maximize the safety, comfort
and efficiency of the people who use them
Slope of the keyboard
Placement of computer table and chairs etc.