Podcast
Questions and Answers
What is the primary role of Information Systems (IS) in business processes?
What is the primary role of Information Systems (IS) in business processes?
- To complicate business operations.
- To execute processes, capture/store data, and monitor performance. (correct)
- To increase employee workload.
- To create unnecessary tasks for employees.
Business Process Reengineering (BPR) involves incremental changes to existing processes.
Business Process Reengineering (BPR) involves incremental changes to existing processes.
False (B)
What are the three key elements that comprise a business process?
What are the three key elements that comprise a business process?
Inputs, Resources, and Outputs
___________ means doing things right, while effectiveness means doing the right things.
___________ means doing things right, while effectiveness means doing the right things.
Match the following business strategies with their descriptions:
Match the following business strategies with their descriptions:
According to Porter's Competitive Forces Model, which condition indicates a high threat of new entrants?
According to Porter's Competitive Forces Model, which condition indicates a high threat of new entrants?
IT governance is solely the responsibility of the IT department.
IT governance is solely the responsibility of the IT department.
What is the Utilitarian approach to ethics?
What is the Utilitarian approach to ethics?
According to GDPR, the right ___________ refers to the right to have personal data deleted.
According to GDPR, the right ___________ refers to the right to have personal data deleted.
Which of the following describes 'sensitive personal data' under GDPR?
Which of the following describes 'sensitive personal data' under GDPR?
What is the primary goal of risk management regarding information resources?
What is the primary goal of risk management regarding information resources?
Whitelisting allows everything to run unless it is on the blacklist.
Whitelisting allows everything to run unless it is on the blacklist.
What is social engineering in the context of information security?
What is social engineering in the context of information security?
___________ relies on a fully configured computer facility, which may be costly to maintain.
___________ relies on a fully configured computer facility, which may be costly to maintain.
What is the main objective of Business Continuity Planning (BCP)?
What is the main objective of Business Continuity Planning (BCP)?
Which characteristic is NOT typically associated with high-quality data?
Which characteristic is NOT typically associated with high-quality data?
Transactional data includes core data applied to multiple transactions.
Transactional data includes core data applied to multiple transactions.
In the context of databases, what does SQL stand for?
In the context of databases, what does SQL stand for?
In database terminology, a ___________ is a column or group of columns that uniquely identifies a row in a table.
In database terminology, a ___________ is a column or group of columns that uniquely identifies a row in a table.
Which of the following is NOT a typical characteristic of Big Data?
Which of the following is NOT a typical characteristic of Big Data?
Flashcards
Informed User Benefits
Informed User Benefits
The inner workings of IT applications, providing input and making recommendations.
Digital Transformation
Digital Transformation
Leveraging IT to enhance relationships with employees, customers, and partners.
Chief Information Officer (CIO)
Chief Information Officer (CIO)
A top-level IT position responsible for information and technology strategy.
Info Systems
Info Systems
Signup and view all the flashcards
Data
Data
Signup and view all the flashcards
Information
Information
Signup and view all the flashcards
Knowledge
Knowledge
Signup and view all the flashcards
CBIS Components
CBIS Components
Signup and view all the flashcards
FAIS
FAIS
Signup and view all the flashcards
ERP Systems
ERP Systems
Signup and view all the flashcards
TPS
TPS
Signup and view all the flashcards
IOS
IOS
Signup and view all the flashcards
Business Processes
Business Processes
Signup and view all the flashcards
Business Process elements
Business Process elements
Signup and view all the flashcards
Efficiency vs Effectiveness
Efficiency vs Effectiveness
Signup and view all the flashcards
Cross-Functional Processes
Cross-Functional Processes
Signup and view all the flashcards
Business Process Improvement (BPI)
Business Process Improvement (BPI)
Signup and view all the flashcards
Business Process Management
Business Process Management
Signup and view all the flashcards
Competitive Strategy
Competitive Strategy
Signup and view all the flashcards
Strategic Info System (SIS)
Strategic Info System (SIS)
Signup and view all the flashcards
Study Notes
Benefits of Being an Informed User
- Understanding the inner workings of IT applications is essential for success
- Providing valuable input can improve IT applications
- Awareness of new technology will help drive efficiency
- Recognizing how IT enhances performance is a key duty
- Being beneficial for entrepreneurs is a great quality
Digital Transformation
- Organizations are continuously pursuing digital transformation for efficiency
- Leverage IT to enhance relationships with employees, customers, and business partners
- New technologies for digital transformation include: big data, social computing, cloud computing and artificial intelligence
IT Career Opportunities
- IT is essential for modern businesses and offers lucrative career opportunities
- Careers include programmers, business analysts, systems analysts, and designers
- The IS field encompasses designers, users, and managers of information systems
- The Chief Information Officer (CIO) has a top-level position in IT
- Career opportunities are expected to remain strong in the future
Managing Information Resources
- Managing information systems in modern organizations is complex due to their strategic importance and high costs
- The responsibility for managing information resources is divided between MIS personnel and end users, depending on various factors
- The MIS department is generally responsible for corporate-level and shared resources, while end users manage departmental resources
Overview of Computer-Based Information Systems
- Involves planning, development, management, and use of IT tools
- Information systems collect, process, store, analyze, and disseminate information for specific purposes
- Delivering the right information to the right people at the right time in the right format is the key purpose
Data, Information, and Knowledge
- Data includes description of things, events, activities, and transactions
- Data items are unorganized, such as numbers and characters: "3.11" is data
- Information refers to organized data that conveys meaning and value to the recipient i.e., A student's name combined with their GPA is information
- Knowledge includes data and/or information that are organized and processed to convey understanding, experience, learning, and expertise i.e., "Students with grade point averages over 3.0 have experienced the greatest success in its management program"
Computer-Based Information System (CBIS)
- Comprises six basic components:
- hardware, software, database, network
- procedures and people
Information Technology Inside Your Organization
- IT components form the IT platform
- IT personnel utilize the IT platform to provide information technology services
- Organizational information systems sit at the top of the pyramid
Types of Computer-Based Information Systems
- Various departmental information systems for different functional areas within an organization are Functional Area Information Systems (FAIS)
- HR IS, Accounting IS, Finance IS, Marketing IS, POM IS
Breadth of Support of Information Systems
- Enterprise Resource Planning (ERP) systems facilitate communication among functional area ISs
- Transaction Processing Systems (TPS) support day-to-day operations and basic business transactions
- Interorganizational Information Systems (IOS) connect two or more organizations supporting various interorganizational operations.
- Supply Chain Management (SCM) and Electronic Commerce (e-commerce) systems
- Information systems are essential for all types of workers, including clerical workers, managers (lower level and middle), knowledge workers, and executives
IT Impacts Entire Industries
- Disrupting market-leading companies while helping new companies gain a competitive advantage i.e., book, music, video, software, video game, photography, marketing, recruiting, financial services, automobile, agriculture, fashion, and legal industries
- Results: increasing managers' productivity allowing one manager to oversee more employees, reducing the need for as many middle managers
- Decision-making is a crucial managerial task that is changed by providing real-time information, managers have less time to make decisions by providing analysis to assist in handling large volumes of information
IT Impacts Employees' Health and Safety
- Causing job stress, work-life balance issues, eye strain, repetitive strain injuries (RSI), while enabling remote work, flexibility, opportunities for people with disabilities, ergonomic office designs
Importance of Information Systems to Society
- Impacts and enhances many of our abilities
- Enhances our quality of life by transforming how we live and work providing easier access to services like mobile banking, mobile shopping, and GPS
- Smartphones enable constant access to communication, blurring the lines between work and leisure
- Autonomous drones and autonomous vehicles are increasingly common in factories, hospitals, and farm fields.
- Improves accuracy of diagnoses, streamline the research & development of new drugs and enable surgeons to plan complex surgeries using virtual reality and to perform remote surgery using robots
Introduction - CHAPTER 2
- The modern world is complex and high-tech
- Organizations face numerous business pressures
- Information Systems (IS) can offer a competitive advantage when used properly
Business Processes
- Ongoing activities that create value for organizations, business partners, and customers including:
- Inputs, Resources, Outputs
Measuring Business Processes
- Successful Organizations measure processes for efficiency and effectiveness where:
- Effectiveness Means doing the Right Things
- Efficiency Means Doing Things Right
Information Systems and Business Processes
- Information Systems (IS) play a vital role in three areas of business processes:
- Executing the Process by informing employees, providing necessary data, and supporting the completion of tasks
- Processes generate data, dates, times, product numbers, quantities, prices, addresses, names, and employee actions, and they capturing and storing process Data using transaction data automatically/manually generating benefits: Includes Data Being Entered, Only Once, Easy Access, And Real-Time Feedback
- Information Systems (IS) Evaluate The Execution Of Processes and the evaluations occur at two levels: the process as a whole, and specific tasks or activities which identifies issues for process improvement
Business Process Improvement, Business Reengineering, and Business Process Management
- Excellence in executing business processes is crucial for competitive Performance
- Measures of performance include: customer satisfaction, cost reduction, cycle and fulfillment time reduction, quality, differentiation, and productivity
- Business Process Reengineering (BPR) involves a radical redesign of processes for profits
- Business Process Improvement (BPI) is a the systematic approach aimed at enhancing the efficiency, effectiveness, and overall performance while reducing variation in process outputs by identifying the underlying causes of variation: Known as DMAIC Define, Measure, Analyze, Improve and Control Business Process Management (BPM)
- Management system that supports continuous BPI initiatives for core business processes over time that involves:
- Process modeling, business activity monitoring (BAM), business process management suites (BPMS), and an integrated set of applications used for BPM
Business Pressures, Organizational Responses, and Information Technology Support
- Business environment comprises social, legal, economic, physical, and political factors in response to pressures
Market Pressures
- Globalization, IT-Driven: Intensified competition on a global scale
- Increasing workforce diversity facilitates telecommuting through IT
- Growing consumer sophistication and expectations requires acknowledgment of customer importance, focusing on customer relationship management
Technology Pressures
- Technological innovation with BYOD (Bring Your Own Device) requires rapid development of new & substitute products/services by solving information overload, and data management challenges
- Various social affecting including the physical environment, philanthropy, education encompass Green IT, which requires facilities design/management, carbon management, and compliance with environmental laws
Societal/Political/Legal Pressures
- Protection against terrorist attacks/compliance with government regulations is needed from cyberterrorist attacks by providing security systems with analytics tools for protection
- Ethical Issues focuses on standards of right and wrong in information processing: Monitor Employee Email and Ensure Customer Privacy
Competitive Advantage and Strategic Information Systems
- Strategic Information Systems (SISS): provide a competitive advantage by helping organizations implement goals, improve performance, and enhance productivity
Porter's Competitive Forces Model
- Framework identifying The bargaining power of suppliers (high when buyers have few choices), The bargaining power of customers (high when buyers have many choices, loyalty Programs), The threat of substitute products or services (high when many alternatives are available, reduces switching costs), The rivalry among existing firms in the industry (high when there is intense competition)
- Aids Design general strategies (competitive forces model) and identify specific activities for competitive strategies
Strategies for Competitive Advantage
- Assessments of the five forces determine responses and selection aligns with the industry structure
- Five Common Competitive Strategies include: cost leadership, differentiation, Innovation, Operational Effectiveness and customer orientation
- Maximizing the strategic value of IT involves achieving business-IT alignment, the Integration with Mission, and Goals
Challenges in Business-IT Alignment
- Different Objectives leading to a lack of mutual understanding between the business and IT departments with communication gaps: only 27% of organizations had adequate alignment.
- Overcoming this requires IT governance, aiding organizations in effectively managing IT operations and providing a framework and structure
CHAPTER 3 - Ethical Issues
- Ethics are The Principles Of Right and Wrong that Guide Individual's Behaviour using various ethical frameworks
Ethical Frameworks (aka "standards")
- Utilitarian Approach: produces greatest good/least harm
- Rights approach: action best protects & respects moral rights of affected parties
- Fairness approach: Treat all equally (or fairly upon defensible standard)
- Common Good Approach: Respect and compassion for all
- Deontology approach: Based only on if the action itself is right or wrong, regardless of the consequences
Ethics in the Corporate Environment
- Code of ethics serves as a collection of guiding organizational principles ie the computing (ACM)
- Key principles in ethics focus on: responsibility, accountability and liability
- "Is Unethical" "Is Not Necessarily Illegal"
Ethical Issues in Information Technology
- Privacy: Collecting, storing, and disseminating information about individuals
- Accuracy: Authenticity, fidelity, and correctness of information collected/processed
- Property: Ownership and value of information
- Accessibility: Includes Who Should Access Info and the payment Terms
Privacy
- Right to be left alone with 2 key rules: Right to privacy is not absolute (balanced with the needs), and public has information rights
- Sources include daily generated data, databases, Internet bulletin boards, social networking sites and blogs To overcome data breaches employ Privacy Codes/Policies of protection, and client/employee guidelines Inform clients using methods of Informed Consent where to choose if data is being collected or not
International Aspects of Privacy
- Requires consideration of inconsistent standards with transborder data flows between countries
- Solve this by leveraging general data protection regulation (GDPR), the world's strongest enacting law
GDPR - General Data Protection Regulation
- Covers personal (name/address) and also sensitive (racial, political) and includes the data:
- Controllers: Organizations that have such relationships
- Processors: Organizations that work processing personal data for the controllers
- Individuals hold rights such as the right to: know what organizations are doing, ask for copies/justification, and correct/delete data (forgotten)
Introduction to Information Security - CHAPTER 4
- Security provides protection against criminal activity, danger, damage, or loss
- Information security includes processes/policies designed to protect an organization's information
Vulnerability of Organizational Information Resources
- Facilitates exploitation of Smaller, Faster and cheaper computers today with Less Skills required when hacking using both deliberate and unintentional threads: Requires Management Support to take charge
- Unintentional Threads: are Acts Performed with no intention to Malice but Poses a Risk
- Deliberate Threats: theft, identity theft, software attacks, and Alien software like Ransomeware block a computer until Money is Given
Protecting Information Resources
- Requires proper risk management to Identify, control, and minimize the Impact of Threats
- This involved Risk Analysis, Risk mitigation, and Control evaluation performed by Organizations to Ensure Programs Cost-Effective If costs of controls Implementation outweigh value being protected, it is not cost-effective
Information Security Controls
- Purpose of Control include safeguard assets, optimize the use of the organization's resources and to prevent/detect Errors or Frauds
- Essential aspects of controls include User Education/Training
Categories of Controls: "LAYERS":
- Control Environment: Management Attitudes toward control.
- General Controls: Applies to more than one functional area.
- Application Controls: Controls specific to One Application, such as physical controls, access Control (logical levels), authentication, communication levels, firewalls, anti-malware, whitelist, encryption, and digital certificates
CHAPTER 5: - Introduction
- Data/Data Management are critical for organizations because users Must use Data Data has Key attributes: High quality, accurate, concise and should be used in every IT Application
- Solutions include effective Data Governance
Data Governance
- A transparent (single version of Truth) set of policies for Handling Rules Address Creating, Collecting, Handling, and Protecting Data Includes management, and a toolset
Transactional Data and Master Data: : Store, Maintain, Exchange & Synchronize
- Transactional Date contains activities from retailers for example
- Master Data includes core data for governance
The Database Approach
- Minimizes Data Redundancy, Isolation and inconsistency while maximizing Data security, integrity, and independence
- DBMS is crucial for managing data
Data Hierarchy
- Bit (Binary Digit-1s-or-0s), Byte (8-Bits), Field, Record and Database
- DBMS uses programs allowing users to create & manage (Add, Delete, Access, Analyze)
Relational Database Model
- 2-D tables designed with related tables of records(columns) and fields/attributes (horizontal), SQL with examples i.e., Oracle and Microsoft Access
- Has 2 key attributes: -Primary Key: Column (s) that uniquely identifies Row in Table(s) -Foreign Keys: Primary Keys in a different Table
Big Data
- Diverse, High Volume/Velocity with Assets requiring new Processing Methods for Enhanced Optimization, Discovery and Decision-Making (PER Gartner Research)
- Requires Database analysis useful for structured, unstructured, inconsistent, and missing.
- Examples are Cassaandra and MongoDB In general used in product development, operations, and marketing.
Data Warehouses and Data Marts
- Data Warehouse (Subjected, Historical Data to Support) -vs- Data (Scaled Version for individual department(s)
Describing Data Warehouses and Data Marts
- Organized by Business dimension or subject
- Use online analytical processing (OLAP), -Integrated
- Time Variant
- Non Volatile
- Multidimensional
- Data Cube: data in (3D)
Generic Data Warehouse Environment
- Requires proper sourcing, integration, processing and handling by warehouses
Knowledge Management (KM)
- Organizations manipulate Knowledge assets with Types of knowledge
- Explicit (easy to articulate)
- Tacit (challenging to Express)
- Streamlines best practices accessible to a range of Employees, performance and to maintain the integrity of information
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.