Summary

This document appears to be a final exam review, covering topics related to information technology. Topics include computer-based information systems, hardware, cloud computing, database management, data warehousing, business analytics, and e-commerce, as well as ethical and security considerations.

Full Transcript

Final Exam Review 1. Computer-based information systems (CBIS) ▪ IS: collects, processes, stores, analyzes and disseminates information for specific purpose. ▪Data ▪Information ▪Knowledge ▪ Computer-based information systems are information systems that use computer technology to perform some...

Final Exam Review 1. Computer-based information systems (CBIS) ▪ IS: collects, processes, stores, analyzes and disseminates information for specific purpose. ▪Data ▪Information ▪Knowledge ▪ Computer-based information systems are information systems that use computer technology to perform some or all of their intended tasks. Information Technology Inside an Organization Types Of Information Systems (IS) Inter- Consumer facing Intelligent Enterprise IS (ES) organizational IS IS Systems (IOS) Transaction Customer E-commerce processing systems relationship systems Business management Intelligence Functional area ISs Mobile apps Supply Chain Artificial Enterprise resource Management Social systems intelligence planning systems platforms/apps 2. Introduction to Hardware ▪ Hardware: used for processing, output, input and storage. ▪CPU ▪Primary storage ▪Secondary storage ▪Input ▪Output ▪communication ▪ 3 factors: appropriateness, speed and cost. COMPUTER MEMORY Two basic categories ⚫ Primary storage ◦ Stores small amounts of data and Instructional information that the CPU will use immediately. ⚫ Secondary storage ◦ Stores much larger amounts of data and information— an entire software program, for example—for extended periods of time. 3. Cloud Computing  What’s cloud computing services –definition and characteristics  Types of cloud computing services  Business value of cloud computing services  Concerns of cloud computing services 4. Introducing database Why should we study database Database is core to an information system/IT application Understand database can help to fully communicate user requirements Database requirement is an important part of the information system user requirements A necessary skill for data analytics The Database Approach Databases minimize the following problems: ◦ Data redundancy: The same data are stored in many places. ◦ Data inconsistency: Various copies of the data do not agree. ◦ Data Sharing Database Management Systems Software for creating and managing databases ◦ The DBMS provides users and programmers with a systematic way to create, retrieve, update and manage data ⚫ RDBMS ⚫ A software system used to maintain relational databases is a relational database management system (RDBMS) ⚫ Microsoft Access for small business ⚫ for large businesses, Oracle 12c, IBM DB2, SAP HANA, and Microsoft SQL Server Implementing ER model ER model RDMS Entity → Table Attribute → Field/Column Instance → Tuple/row/record Primary key → Primary key Foreign key Foreign key: Primary key used in a second table as a look-up field to identify records from the original table 5. Data warehouse and data mart Data warehouse (DW) ◦ A repository of historical data that are organized by dimensions to support decision makers in the organization. ◦ Organized toward data analytics Data Mart ◦ A scaled down version of a DW that is designed for the end user needs in an individual department. Characteristics of DW Data Warehouse Framework Characteristics of Big Data Types of Knowledge Explicit knowledge: objective, rational, technical knowledge that has been documented. Examples: policies, procedural guides, reports, products, strategies, and goals Tacit knowledge: cumulative store of subjective or experiential learning Examples: experiences, insights, expertise, know-how, trade secrets, understanding, and skill sets 6. IT & Business Process ❑ Business Processes: concept ❑IT and business processes ❑Toward business process excellence: o Business Process Reengineering (BPR) o Business Process Improvement (BPI) o Business Process Management (BPM) 7. Strategic information systems To harness the power of IT, Information systems have to be aligned with organization strategies ⚫ The information systems that are aligned with and support organization strategies are called strategic information systems. Competitive forces model The power of competitors to enter a market The power of suppliers to drive The power of customer up the price of materials to drive down prices The power of customers to buy substitute products 8. TPS Transaction processing system (TPS) ◦ Supports the monitoring, collection, storage and processing of data generated by an organization’s basic business transactions. TPS is strategic ◦ Transaction is a key step in customer conversion. ◦ Inputs for functional area information systems and business intelligence systems Enterprise Resource Planning Systems ❖ Enterprise Resource Planning (ERP) system adopts a business process view of the overall organization to integrate the planning, management, and use of all of an organization’s resources, employing a common software platform and database. ❖ ERP integrates FAISs, eliminates information silos and provide support for cross functional business processes ❖ Three tier I software vendors: SAP, Oracle and Microsoft COPYRIGHT JOHN WILEY & SONS CANADA 18 9. CRM & SCM Customer relationship management (CRM) 1. What is CRM? 2. Types of CRM systems Supply chain management (SCM) 1. What is supply chain management? 2. The role of IT in supporting SCM COPYRIGHT JOHN WILEY & SONS CANADA 20 10. Business Analytics(BA) process of developing actionable decisions or recommendations for actions Based on insights generated from historical data Multi-disciplinary approach an iterative, methodical exploration of an organization's data to drive decision-making COPYRIGHT JOHN WILEY & SONS 23 CANADA BA: Process Types of Business Analytics Categories of BA applications ❖Applications for data analysis a) Decision support system b) OLAP c) Data mining ❖Applications for data visualization a) Dashboard b) Geographical information systems COPYRIGHT JOHN WILEY & SONS 26 CANADA Data visualization – two major applications Dashboard: provide at-a-glance views of KPIs (key performance indicators) Drill-down Trend analysis Exception reporting Geographical information systems: display data on a map Example: Saskatoon Crime map COPYRIGHT JOHN WILEY & SONS 27 CANADA 10. Artificial Intelligence and Intelligent System ❑Artificial intelligence (AI) oA branch of CS that creates computer or machines as intelligent as humans. oA subfield that studies the thought processes of humans and recreate the effects of those processes through information systems. oThe goal is to create intelligent systems that are capable of certain intelligent behaviors. Turing test A test of machines’ ability to exhibit human intelligence A human and a computer both pretend to be a human, and a human interviewer has to identify which is the real human. https://commons.wikimedia.org/wiki/File:Test_de_Turing.jpg AI technologies ❖Major types of AI technologies Expert systems Neural networks Expert system (ES) ❖ Computer systems that attempt to mimic human experts by applying expertise in a specific domain. ❖Work with heuristics Artificial Neural networks A system that simulates the underlying concepts of the biological brain. Image from: https://phys.org/news/2015-04-modular-brains-skills.html A biological neuron Dendrites: inputs Cell body: process inputs Axon: output Synapses: connections between neurons Neural network: simulating a single neuron Takes the Inputs Calculate the summation of the Inputs Compare it with the threshold being set during the training stage 11. E-commerce Electronic commerce is the process of buying, selling, or exchanging products and services via computer networks. Benefits: Reach Eliminate entry barriers Types of e-commerce B2C e-commerce business models ❑Electronic storefront Revenue model: direct product sales, subscription and advertising ❑Electronic Mall Revenue model: transaction commission fee, and others such as service fees and advertising fees. ❑Issues in Electronic retailing (e-tailing) Product experience, channel conflict, Order fulfillment B2B e-commerce business models electronic relationship with distributors, resellers, suppliers, customers, and other partners. Models Sell-side market place Buy-side market place Issues with e-commerce -Threat to privacy, - Cyber & Data security -Online Identity Verification -Cross border e-commerce -Domain name -Taxes How Will V-Commerce Arrive? Consumers Show the Way was written by Dan McKone, Robert Haslehurst and Maria Steingoltz, Managing Directors in L.E.K. Consulting’s Consumer Products and Retail practice. 12. Wireless Technologies Wireless Transmission Media: Microwave: electromagnetic waves Satellite: Low-earth-orbit(LEO):400-600miles Medium-earth-orbit (MEO):~6000 miles Geostationary-earth-orbit (GEO):22,300 miles Radio wave 42 Mobile Computing and Mobile Commerce Mobile Computing o Mobility and reach Five value added attributes o Ubiquity o Convenience and instant connectivity o Personalization o Localization of products and services Mobile Commerce Mobile Commerce: new services and attract new customers Mobile Commerce Applications oFinancial services Banking, wireless payments, mobile wallet oLocation based Applications and services (L-commerce) oMobile Advertising 13. Internet of Things(IoT) A system in which any object has a unique identity, and is able to send and receive information over a network without human intervention Other names Internet of everything Internet of anything Industrial internet 45 Simplified architecture of an IOT system Application Data analytics and Smart devices Reporting Wireless network: Software to set up the Sensor devices rules Wi-Fi or other wireless networks Interface devices PC Control devices Ipad and Smartphone Wall mounted devices Servers Or Servers in the cloud (IoT cloud) In a broad sense, IoT, 5G, cloud computing, data analytics and AI reinforce each other 46 Challenges of IoT ❑Security issue Mission critical equipment may be attacked ❑Privacy issue Too much data is gathered ❑Technical reliability oUnreliable smarthome https://www.youtube.com/watch?v=ZzSzkAuKPe0 https://www.youtube.com/watch?v=nwPtcqcqz00 ❑Data compatibility 47 14. Social Computing in Business Social Commerce Examples Benefits Customers Businesses 48 Key features and functionalities Storefront on social profiles Shoppable organic posts Shoppable paid ads Influencer content Live shopping 49 Social shopping to support online customer shopping Some business models: Online reviews (Yelp; TripAdvisor) Collaborative consumption (Uber and AirBnB) Social Marketplaces (Etsy) GroupShopping 50 15. Planning for and Justifying IT Applications IS planning process Evaluating and justifying IT investment COPYRIGHT JOHN WILEY & SONS CANADA 51 Cost and Benefit analysis MAJOR COST CATEGORIES: MAJOR BENEFIT CATEGORIES: ◆Fixed costs ◆Strategic benefits ◆Ongoing costs ◆Operational benefits ◆Managerial benefits 52 Strategies for Acquiring IT application Buy the Application Customize a Prewritten application Lease the application Application service providers Software as a service Use Open source software Use outsourcing COPYRIGHT JOHN WILEY & SONS CANADA 53 12. Acquiring information System System Development Life Cycle Consists of 6 phases Weakness: relies on requirement identification, lack of user interaction Agile Methodology Works in sprints 13. Ethical issues: Privacy issues ❑The right to privacy othe right “to be left alone” oThe right to be free of unreasonable personal intrusions. ❑Threats to privacy oPersonal information in database oElectronic surveillance oSocial media 55 Accuracy issues ❑ Involve the authenticity, fidelity and correctness of information that is generated, collected, and processed ❑The right to the truth o Responsibility to maintain information and information processing accuracy ❑Threats to accuracy: Algorithm accuracy Misinformation- fake news :https://www.factcheck.org/fake-news/ COPYRIGHT JOHN WILEY & SONS CANADA 56 Property issues ❑ Involve the ownership and value of the information. ❑The right to property ❑Data ownership challenges oHard to define and hard to protect oData ownership in IoT systems COPYRIGHT JOHN WILEY & SONS CANADA 57 Accessibility issues ❑Involve the right to access information and information processing details ⚫What information and information processing details does a person or an organization have a right or a privilege to obtain, and under what conditions? ◆Threats to accessibility (varied) oLack of access to personal data stored in company database oAlgorithm transparency COPYRIGHT JOHN WILEY & SONS CANADA 58 14. Information security ❖Security ❖Information security ❖Information security has become a critical issue in today’s business environment -- Why Threats to information security Un-intentional threats Human errors Social engineering Deliberate threats Identity theft Software attack- DDOS Supervisory control and data acquisition attacks (SCADA) Information security control