IT, Digital Transformation and Careers

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary role of Information Systems (IS) in business processes?

  • To complicate business operations.
  • To execute processes, capture/store data, and monitor performance. (correct)
  • To increase employee workload.
  • To create unnecessary tasks for employees.

Business Process Reengineering (BPR) involves incremental changes to existing processes.

False (B)

What are the three key elements that comprise a business process?

Inputs, Resources, and Outputs

___________ means doing things right, while effectiveness means doing the right things.

<p>Efficiency</p> Signup and view all the answers

Match the following business strategies with their descriptions:

<p>Cost Leadership = Offering products or services at the lowest price. Differentiation = Providing unique products or services that stand out from competitors. Innovation = Introducing new products, services, or processes. Customer Orientation = Focusing on meeting customer needs.</p> Signup and view all the answers

According to Porter's Competitive Forces Model, which condition indicates a high threat of new entrants?

<p>Low barriers to entry. (B)</p> Signup and view all the answers

IT governance is solely the responsibility of the IT department.

<p>False (B)</p> Signup and view all the answers

What is the Utilitarian approach to ethics?

<p>The greatest good for the greatest number</p> Signup and view all the answers

According to GDPR, the right ___________ refers to the right to have personal data deleted.

<p>to be forgotten</p> Signup and view all the answers

Which of the following describes 'sensitive personal data' under GDPR?

<p>Genetic data and racial information. (A)</p> Signup and view all the answers

What is the primary goal of risk management regarding information resources?

<p>To identify, control, and minimize the impact of threats. (C)</p> Signup and view all the answers

Whitelisting allows everything to run unless it is on the blacklist.

<p>False (B)</p> Signup and view all the answers

What is social engineering in the context of information security?

<p>An attack that uses social skills to trick employees into revealing confidential information</p> Signup and view all the answers

___________ relies on a fully configured computer facility, which may be costly to maintain.

<p>Hot site</p> Signup and view all the answers

What is the main objective of Business Continuity Planning (BCP)?

<p>To restore business operations as quickly as possible after a disaster. (B)</p> Signup and view all the answers

Which characteristic is NOT typically associated with high-quality data?

<p>Ambiguous (D)</p> Signup and view all the answers

Transactional data includes core data applied to multiple transactions.

<p>False (B)</p> Signup and view all the answers

In the context of databases, what does SQL stand for?

<p>Structured Query Language</p> Signup and view all the answers

In database terminology, a ___________ is a column or group of columns that uniquely identifies a row in a table.

<p>primary key</p> Signup and view all the answers

Which of the following is NOT a typical characteristic of Big Data?

<p>Veracity (B)</p> Signup and view all the answers

Flashcards

Informed User Benefits

The inner workings of IT applications, providing input and making recommendations.

Digital Transformation

Leveraging IT to enhance relationships with employees, customers, and partners.

Chief Information Officer (CIO)

A top-level IT position responsible for information and technology strategy.

Info Systems

Collecting, processing, storing, analyzing, and disseminating information for specific purposes.

Signup and view all the flashcards

Data

Elementary descriptions of things, events, activities, and transactions.

Signup and view all the flashcards

Information

Organized data that conveys meaning and value to the recipient.

Signup and view all the flashcards

Knowledge

Data and information that are organized and processed to convey understanding, experience, and expertise.

Signup and view all the flashcards

CBIS Components

Hardware, software, database, and network alongside procedures and people.

Signup and view all the flashcards

FAIS

Various departmental information systems supporting different functional areas.

Signup and view all the flashcards

ERP Systems

Facilitating communication among functional area information systems.

Signup and view all the flashcards

TPS

Supporting day-to-day operations and basic business transactions.

Signup and view all the flashcards

IOS

Connecting two or more organizations for interorganizational operations.

Signup and view all the flashcards

Business Processes

Ongoing activities that create value for organizations, business partners, and customers.

Signup and view all the flashcards

Business Process elements

Inputs, Resources, and Outputs

Signup and view all the flashcards

Efficiency vs Effectiveness

Doing things right, while effectiveness means doing the right things.

Signup and view all the flashcards

Cross-Functional Processes

Involves multiple areas of an organization, lacking a single responsible functional area.

Signup and view all the flashcards

Business Process Improvement (BPI)

Enhancing efficiency, effectiveness, or overall performance in business processes.

Signup and view all the flashcards

Business Process Management

System for continuous BPI initiatives for core business processes over time.

Signup and view all the flashcards

Competitive Strategy

Identifies a business’s approach to compete, its goals, and plans and policies.

Signup and view all the flashcards

Strategic Info System (SIS)

Provide a competitive advantage, helping achieve strategic goals.

Signup and view all the flashcards

Study Notes

Benefits of Being an Informed User

  • Understanding the inner workings of IT applications is essential for success
  • Providing valuable input can improve IT applications
  • Awareness of new technology will help drive efficiency
  • Recognizing how IT enhances performance is a key duty
  • Being beneficial for entrepreneurs is a great quality

Digital Transformation

  • Organizations are continuously pursuing digital transformation for efficiency
  • Leverage IT to enhance relationships with employees, customers, and business partners
  • New technologies for digital transformation include: big data, social computing, cloud computing and artificial intelligence

IT Career Opportunities

  • IT is essential for modern businesses and offers lucrative career opportunities
  • Careers include programmers, business analysts, systems analysts, and designers
  • The IS field encompasses designers, users, and managers of information systems
  • The Chief Information Officer (CIO) has a top-level position in IT
  • Career opportunities are expected to remain strong in the future

Managing Information Resources

  • Managing information systems in modern organizations is complex due to their strategic importance and high costs
  • The responsibility for managing information resources is divided between MIS personnel and end users, depending on various factors
  • The MIS department is generally responsible for corporate-level and shared resources, while end users manage departmental resources

Overview of Computer-Based Information Systems

  • Involves planning, development, management, and use of IT tools
  • Information systems collect, process, store, analyze, and disseminate information for specific purposes
  • Delivering the right information to the right people at the right time in the right format is the key purpose

Data, Information, and Knowledge

  • Data includes description of things, events, activities, and transactions
  • Data items are unorganized, such as numbers and characters: "3.11" is data
  • Information refers to organized data that conveys meaning and value to the recipient i.e., A student's name combined with their GPA is information
  • Knowledge includes data and/or information that are organized and processed to convey understanding, experience, learning, and expertise i.e., "Students with grade point averages over 3.0 have experienced the greatest success in its management program"

Computer-Based Information System (CBIS)

  • Comprises six basic components:
    • hardware, software, database, network
    • procedures and people

Information Technology Inside Your Organization

  • IT components form the IT platform
  • IT personnel utilize the IT platform to provide information technology services
  • Organizational information systems sit at the top of the pyramid

Types of Computer-Based Information Systems

  • Various departmental information systems for different functional areas within an organization are Functional Area Information Systems (FAIS)
  • HR IS, Accounting IS, Finance IS, Marketing IS, POM IS

Breadth of Support of Information Systems

  • Enterprise Resource Planning (ERP) systems facilitate communication among functional area ISs
  • Transaction Processing Systems (TPS) support day-to-day operations and basic business transactions
  • Interorganizational Information Systems (IOS) connect two or more organizations supporting various interorganizational operations.
  • Supply Chain Management (SCM) and Electronic Commerce (e-commerce) systems
  • Information systems are essential for all types of workers, including clerical workers, managers (lower level and middle), knowledge workers, and executives

IT Impacts Entire Industries

  • Disrupting market-leading companies while helping new companies gain a competitive advantage i.e., book, music, video, software, video game, photography, marketing, recruiting, financial services, automobile, agriculture, fashion, and legal industries
  • Results: increasing managers' productivity allowing one manager to oversee more employees, reducing the need for as many middle managers
  • Decision-making is a crucial managerial task that is changed by providing real-time information, managers have less time to make decisions by providing analysis to assist in handling large volumes of information

IT Impacts Employees' Health and Safety

  • Causing job stress, work-life balance issues, eye strain, repetitive strain injuries (RSI), while enabling remote work, flexibility, opportunities for people with disabilities, ergonomic office designs

Importance of Information Systems to Society

  • Impacts and enhances many of our abilities
  • Enhances our quality of life by transforming how we live and work providing easier access to services like mobile banking, mobile shopping, and GPS
  • Smartphones enable constant access to communication, blurring the lines between work and leisure
  • Autonomous drones and autonomous vehicles are increasingly common in factories, hospitals, and farm fields.
  • Improves accuracy of diagnoses, streamline the research & development of new drugs and enable surgeons to plan complex surgeries using virtual reality and to perform remote surgery using robots

Introduction - CHAPTER 2

  • The modern world is complex and high-tech
  • Organizations face numerous business pressures
  • Information Systems (IS) can offer a competitive advantage when used properly

Business Processes

  • Ongoing activities that create value for organizations, business partners, and customers including:
  • Inputs, Resources, Outputs

Measuring Business Processes

  • Successful Organizations measure processes for efficiency and effectiveness where:
  • Effectiveness Means doing the Right Things
  • Efficiency Means Doing Things Right

Information Systems and Business Processes

  • Information Systems (IS) play a vital role in three areas of business processes:
    • Executing the Process by informing employees, providing necessary data, and supporting the completion of tasks
    • Processes generate data, dates, times, product numbers, quantities, prices, addresses, names, and employee actions, and they capturing and storing process Data using transaction data automatically/manually generating benefits: Includes Data Being Entered, Only Once, Easy Access, And Real-Time Feedback
    • Information Systems (IS) Evaluate The Execution Of Processes and the evaluations occur at two levels: the process as a whole, and specific tasks or activities which identifies issues for process improvement

Business Process Improvement, Business Reengineering, and Business Process Management

  • Excellence in executing business processes is crucial for competitive Performance
  • Measures of performance include: customer satisfaction, cost reduction, cycle and fulfillment time reduction, quality, differentiation, and productivity
  • Business Process Reengineering (BPR) involves a radical redesign of processes for profits
  • Business Process Improvement (BPI) is a the systematic approach aimed at enhancing the efficiency, effectiveness, and overall performance while reducing variation in process outputs by identifying the underlying causes of variation: Known as DMAIC Define, Measure, Analyze, Improve and Control Business Process Management (BPM)
  • Management system that supports continuous BPI initiatives for core business processes over time that involves:
  • Process modeling, business activity monitoring (BAM), business process management suites (BPMS), and an integrated set of applications used for BPM

Business Pressures, Organizational Responses, and Information Technology Support

  • Business environment comprises social, legal, economic, physical, and political factors in response to pressures

Market Pressures

  • Globalization, IT-Driven: Intensified competition on a global scale
  • Increasing workforce diversity facilitates telecommuting through IT
  • Growing consumer sophistication and expectations requires acknowledgment of customer importance, focusing on customer relationship management

Technology Pressures

  • Technological innovation with BYOD (Bring Your Own Device) requires rapid development of new & substitute products/services by solving information overload, and data management challenges
  • Various social affecting including the physical environment, philanthropy, education encompass Green IT, which requires facilities design/management, carbon management, and compliance with environmental laws

Societal/Political/Legal Pressures

  • Protection against terrorist attacks/compliance with government regulations is needed from cyberterrorist attacks by providing security systems with analytics tools for protection
  • Ethical Issues focuses on standards of right and wrong in information processing: Monitor Employee Email and Ensure Customer Privacy

Competitive Advantage and Strategic Information Systems

  • Strategic Information Systems (SISS): provide a competitive advantage by helping organizations implement goals, improve performance, and enhance productivity

Porter's Competitive Forces Model

  • Framework identifying The bargaining power of suppliers (high when buyers have few choices), The bargaining power of customers (high when buyers have many choices, loyalty Programs), The threat of substitute products or services (high when many alternatives are available, reduces switching costs), The rivalry among existing firms in the industry (high when there is intense competition)
  • Aids Design general strategies (competitive forces model) and identify specific activities for competitive strategies

Strategies for Competitive Advantage

  • Assessments of the five forces determine responses and selection aligns with the industry structure
  • Five Common Competitive Strategies include: cost leadership, differentiation, Innovation, Operational Effectiveness and customer orientation
  • Maximizing the strategic value of IT involves achieving business-IT alignment, the Integration with Mission, and Goals

Challenges in Business-IT Alignment

  • Different Objectives leading to a lack of mutual understanding between the business and IT departments with communication gaps: only 27% of organizations had adequate alignment.
  • Overcoming this requires IT governance, aiding organizations in effectively managing IT operations and providing a framework and structure

CHAPTER 3 - Ethical Issues

  • Ethics are The Principles Of Right and Wrong that Guide Individual's Behaviour using various ethical frameworks

Ethical Frameworks (aka "standards")

  • Utilitarian Approach: produces greatest good/least harm
  • Rights approach: action best protects & respects moral rights of affected parties
  • Fairness approach: Treat all equally (or fairly upon defensible standard)
  • Common Good Approach: Respect and compassion for all
  • Deontology approach: Based only on if the action itself is right or wrong, regardless of the consequences

Ethics in the Corporate Environment

  • Code of ethics serves as a collection of guiding organizational principles ie the computing (ACM)
  • Key principles in ethics focus on: responsibility, accountability and liability
  • "Is Unethical" "Is Not Necessarily Illegal"

Ethical Issues in Information Technology

  • Privacy: Collecting, storing, and disseminating information about individuals
  • Accuracy: Authenticity, fidelity, and correctness of information collected/processed
  • Property: Ownership and value of information
  • Accessibility: Includes Who Should Access Info and the payment Terms

Privacy

  • Right to be left alone with 2 key rules: Right to privacy is not absolute (balanced with the needs), and public has information rights
  • Sources include daily generated data, databases, Internet bulletin boards, social networking sites and blogs To overcome data breaches employ Privacy Codes/Policies of protection, and client/employee guidelines Inform clients using methods of Informed Consent where to choose if data is being collected or not

International Aspects of Privacy

  • Requires consideration of inconsistent standards with transborder data flows between countries
  • Solve this by leveraging general data protection regulation (GDPR), the world's strongest enacting law

GDPR - General Data Protection Regulation

  • Covers personal (name/address) and also sensitive (racial, political) and includes the data:
  • Controllers: Organizations that have such relationships
  • Processors: Organizations that work processing personal data for the controllers
  • Individuals hold rights such as the right to: know what organizations are doing, ask for copies/justification, and correct/delete data (forgotten)

Introduction to Information Security - CHAPTER 4

  • Security provides protection against criminal activity, danger, damage, or loss
  • Information security includes processes/policies designed to protect an organization's information

Vulnerability of Organizational Information Resources

  • Facilitates exploitation of Smaller, Faster and cheaper computers today with Less Skills required when hacking using both deliberate and unintentional threads: Requires Management Support to take charge
  • Unintentional Threads: are Acts Performed with no intention to Malice but Poses a Risk
  • Deliberate Threats: theft, identity theft, software attacks, and Alien software like Ransomeware block a computer until Money is Given

Protecting Information Resources

  • Requires proper risk management to Identify, control, and minimize the Impact of Threats
  • This involved Risk Analysis, Risk mitigation, and Control evaluation performed by Organizations to Ensure Programs Cost-Effective If costs of controls Implementation outweigh value being protected, it is not cost-effective

Information Security Controls

  • Purpose of Control include safeguard assets, optimize the use of the organization's resources and to prevent/detect Errors or Frauds
  • Essential aspects of controls include User Education/Training

Categories of Controls: "LAYERS":

  • Control Environment: Management Attitudes toward control.
  • General Controls: Applies to more than one functional area.
  • Application Controls: Controls specific to One Application, such as physical controls, access Control (logical levels), authentication, communication levels, firewalls, anti-malware, whitelist, encryption, and digital certificates

CHAPTER 5: - Introduction

  • Data/Data Management are critical for organizations because users Must use Data Data has Key attributes: High quality, accurate, concise and should be used in every IT Application
  • Solutions include effective Data Governance

Data Governance

  • A transparent (single version of Truth) set of policies for Handling Rules Address Creating, Collecting, Handling, and Protecting Data Includes management, and a toolset

Transactional Data and Master Data: : Store, Maintain, Exchange & Synchronize

  • Transactional Date contains activities from retailers for example
  • Master Data includes core data for governance

The Database Approach

  • Minimizes Data Redundancy, Isolation and inconsistency while maximizing Data security, integrity, and independence
  • DBMS is crucial for managing data

Data Hierarchy

  • Bit (Binary Digit-1s-or-0s), Byte (8-Bits), Field, Record and Database
  • DBMS uses programs allowing users to create & manage (Add, Delete, Access, Analyze)

Relational Database Model

  • 2-D tables designed with related tables of records(columns) and fields/attributes (horizontal), SQL with examples i.e., Oracle and Microsoft Access
  • Has 2 key attributes: -Primary Key: Column (s) that uniquely identifies Row in Table(s) -Foreign Keys: Primary Keys in a different Table

Big Data

  • Diverse, High Volume/Velocity with Assets requiring new Processing Methods for Enhanced Optimization, Discovery and Decision-Making (PER Gartner Research)
  • Requires Database analysis useful for structured, unstructured, inconsistent, and missing.
  • Examples are Cassaandra and MongoDB In general used in product development, operations, and marketing.

Data Warehouses and Data Marts

  • Data Warehouse (Subjected, Historical Data to Support) -vs- Data (Scaled Version for individual department(s)

Describing Data Warehouses and Data Marts

  • Organized by Business dimension or subject
  • Use online analytical processing (OLAP), -Integrated
  • Time Variant
  • Non Volatile
  • Multidimensional
  • Data Cube: data in (3D)

Generic Data Warehouse Environment

  • Requires proper sourcing, integration, processing and handling by warehouses

Knowledge Management (KM)

  • Organizations manipulate Knowledge assets with Types of knowledge
  • Explicit (easy to articulate)
  • Tacit (challenging to Express)
  • Streamlines best practices accessible to a range of Employees, performance and to maintain the integrity of information

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser