Business Information Management Revision PDF

Summary

These notes provide a summary of key concepts in Business Information Management, such as Moore's Law, Metcalfe's Law, and data analysis techniques. The notes cover the different components of an information system and explore important theories and concepts within the field.

Full Transcript

Technology Trends 1. AI Revolution 2. Building the Digital Future 3. Compute and Connectivity Frontiers 4. Cutting edge Engineering 5. A Sustainable World **Convergence**- The general process of becoming affordable and accessible **Moore's Law** - Moore's Law predicts that the number of...

Technology Trends 1. AI Revolution 2. Building the Digital Future 3. Compute and Connectivity Frontiers 4. Cutting edge Engineering 5. A Sustainable World **Convergence**- The general process of becoming affordable and accessible **Moore's Law** - Moore's Law predicts that the number of transistors fitting on a computer chip will double every one and a half to two years. **Metcalfe\'s Law**- Value or power of a network grows exponentially as a function of the number of network member Effects of Metcalfe's Law 1. Smaller, cheaper processor 2. Bigger and more valuable networks 3. More Applications and growth of the IT Industry **Digitisation**-the mass adoption of connected digital services by consumers, enterprises, and government - digitisation can play an important role in assisting policymakers to spur economic growth and employment. **Creative Destruction** - According to Schumpeter, the \"gale of creative destruction\" describes the \"process of industrial mutation that incessantly revolutionizes the economic structure from within, incessantly destroying the old one, incessantly creating a new one\". **Data**- raw facts and figures that on their own have no meaning Data has meaning when **processed** and in **context** **Information --** Communictaion, decision-making, support business processes **Knowledge-** understanding of rules needed to interpret information Knowledge types -- Explicit (eg, documents & databases) and Tacit (rotted in experience & values) **Database**- structured collection of related data **Database System**- computer programme for managing electronic databases - Records are subvided into fields - Important field = key - Primary key will contain no duplicates and no blank values **Relational Database**- A relational database is a collection of tables from which data can be accessed in many different ways without having to reorganise the database tables. **Boolean values** = "true" or "false" Basic operations in a database -- Design, data entries, queries, reports System- a set of processes that work together to produce an output **Input**: The activity of gathering and capturing data **Processing**: Converting or transforming data into useful outputs **Output**: Useful information, usually in the form of documents and/or reports Information Systems consist of **six i**mportant components; 1. Hardware 2. Software 3. Data 4. Telecommunications/network 5. People 6. Procedures **A Transaction Processing System (TPS**) is a type of information system that collects, stores, modifies and retrieves the data transactions of an enterprise. E.g. sales order entry, payroll, shipping **Management Information System**- an information system that uses the data collected by the transaction processing system and uses this data to create reports in a way that managers can use it to make routine business decisions in response to problems. **Information Management (IM)-** is the collection and management of information from one or more sources and the distribution of that information to one or more audiences Benefits of information systems 1. Gather 2. Store 3. Manipulate 4. Retrieve & communicate 5. Business rules - The motherboard is the main component of a computer system - The central processing unit is the control centre of a computer Called the "brain" Compromised of -- arithemic & logic unit, control unit, registers - Speed is measure in Hertz - **Memory** -- used to store data of processing time Primary memory 1. Registers 2. RAM 3. ROM 4. Cache memory Secondary memory- store data in a permanent manner **An embedded system** is a microcontroller or a microprocessor based system which is designed to perform a specific task. For example, a fire alarm is an embedded system; it will sense only smoke **Mobile Hardware**- Mobile devices have central processing units (CPUs), similar to those in computers, but optimised to operate in low power environments. Levels of Abstraction - Algorithms \> high level programming language \> low level programming language (machine code or assembly language) - **Algorithms**- a set of step by step procedures for accomplishing a task - Convert source code into machine codes by compilers and interpreters Operating systems -- mobile, personal and server - The combination of a CPU and operating system is referred to as a platform - **Opensource software(OSS**) is software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose. - Open Source software is made available for free under GPL (General Public Licence) **Network two or more computers linked together** 1. Local Area Networks 2. Wide Area Networks **Intranet-** an intranet is a private LAN designed for use by everyone within the organization **Extranet**- a network that connects people within the company with people who are outside your company Networks are classified by; 1. Topology 2. Protocol (procedures for transmitting data between two or more devices) 3. Architecture - Most networks use the Ethernet protocol - On the internet the major protocol is TCP/IP - Network architecture- refers to the way a network is designed and built Two types ; 1. Peer to peer architecture -- computers connect with each other in a work group to share files 2. Client/server architecture- sends information from a client comptuer to a server - The internet uses high speed data lines called **backbones** to carry data - **Internetworking**; the process of connecting seperate networks - The internet is a **packet-switching** network - *How do individuals and Organisations get the Internet?* They use an Internet Service Provider (ISP) - **Hypertext Markup Language** -- is the standard language for creating web pages and applications - A **Domain Name** is a is a unique name associated with a specific IP address by a programme that runs on an internet host computer - **HTTPS:** Hypertext Transfer Protocol Secure - **Dynamic web page:** is a web page that displays different content each time its viewed Two types 1. Client- side scripting 2. Server- side scripting **Cloud computing** -- network based computing that takes place over the internet Remotely hosted, Ubiquitous, Commodified **Ecommerce** -- business that involves a transfer of information across the internet Bitcoin- new currency that founded in 2009 by an unknown person using the alias Satoshi Nakamoto - **Strategic Information Systems-** an information system that gives its owner a competitive advantage Responding to competition -- cost leadership, differtiation, growth, innovation , alliance Search Engine -- an internet based tool that searches an index of documents for a particular term, phrase or text specified by user. Goals - Accumulate large index of web documents to search - Provide high relevant and high quality results to users - Generate revenue via paid advertising and related business ventures that typically leverage large amount of traffic. **Search Engine Optimisation** -- the process of affecting the visibility of a website or a web page in a web search engine\'s unpaid results often referred to as \"natural\", \"organic\", or \"earned\" results. **Pay Per Click** -- sponsored online advertising that is used on a wide range of websites, including search engines where the advertiser only pays if a web user clicks on their ad. Computer Security- techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorisation. - Confidentiality - Integrity - Availability Security vs Safety **Security** is the way in which we protect access to our computers and information eg. Firewall, antivirus software **Safety** is the way we behave while using the internet eg. Safe email behaviour **Logic bomb** = A set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects. **Trojan Horse**- Masquerades as beneficial program while quietly destroying data or damaging your system **Phishing= fake email** **Pharming= Fake web pages** **Rootkit**- a collection of programs that a hacker uses to mask intrusion and obtain administrator-level access to a computer. [Considerations in IT Architecture] - **Standardisation**- Buying the same products from the vendors for as many people as possible. - **Integration**- Ensuring that systems are integrated at the logical level to avoid data duplication and information silos System Development Phases - Maintenance - Implementation - Development - Design - Analysis - Initiation - The waterfall model is the classic lifecycle model ("common sense approach" ) - Prototyping -- developing a small part of the system at a time and building the system incrementally. Tends to be **rapid, simple, iterative, incremental, user centered** **Advances in data analysis techniqyes** - Profiling - Nonobvious relationship awareness - Mobile device growth Three main way intellectual property is protected; Trade secret, Copyright, Patents Big Data + Analytics = Smart Data **Data Analytics**- analysing data to draw out meaningful actionable insights used to inform and drive business decisions. **Data Visualisation** -- using visual elements such as charts, graphs etc.

Use Quizgecko on...
Browser
Browser