Email.pdf
Document Details
Uploaded by WellBacklitRosemary
Related
- PCSII Depression/Anxiety/Strong Emotions 2024 Document
- A Concise History of the World: A New World of Connections (1500-1800)
- Human Bio Test PDF
- University of Santo Tomas Pre-Laboratory Discussion of LA No. 1 PDF
- Vertebrate Pest Management PDF
- Lg 5 International Environmental Laws, Treaties, Protocols, and Conventions
Full Transcript
Data, Information, Knowledge, Intelligence: Data: Raw facts and figures without context (e.g., numbers, dates). Information: When data is organized and processed to have meaning (e.g., a report showing sales numbers over time). Knowledge: Insight derived from analyzing informa...
Data, Information, Knowledge, Intelligence: Data: Raw facts and figures without context (e.g., numbers, dates). Information: When data is organized and processed to have meaning (e.g., a report showing sales numbers over time). Knowledge: Insight derived from analyzing information, such as recognizing patterns or trends. Intelligence: The capability to predict trends and make decisions based on knowledge, such as predicting future market changes to inform strategy. Characteristics of Information Quality: Timeliness: Information must be up-to-date. Relevancy: Information should be pertinent to the task at hand. Form: The format should be usable (e.g., graphs, charts). Source Validity: The information must come from credible sources. Sufficiency: The information should be complete enough to make decisions. Information Technology Categories: Hardware: Physical devices (e.g., computers). Following Moore’s law, hardware components become smaller and faster every two years. Software: Applications and programs used to process data. Can be open source (OSS) or proprietary. Telecommunications: Systems for data transmission, like Wi-Fi, 5G, or RFID. Types of Information Systems (IS) in Organizations: Automation: Replacing manual tasks to reduce labor and errors. Informing Users: Providing insights through data analysis (e.g., "What if?" scenarios). Transforming Processes: Redesigning processes, often through innovations like Netflix's streaming model or Uber’s ride-sharing app. Competitive Advantages & Strategy: Competitive Advantage: The ability to perform better than competitors in terms of cost, quality, or speed, resulting in benefits like customer loyalty or higher market share. Competitive Strategy: Long-term plans to leverage competitive advantages. IT plays a crucial role in creating these strategies. Business Pressures: Societal/Political/Legal: Includes terrorist attacks, ethical issues, and government regulations. Technological: Information overload and the fast pace of technological change. Economic: Customer demands, workforce changes, global competition. Organizational Responses to Business Pressures: IT Solutions: E-commerce, Customer Relationship Management (CRM), Enterprise Resource Planning (ERP), and continuous improvement through technologies like just-in-time manufacturing. Value Chain in Different Industries: A value chain consists of all the activities involved in creating and delivering a product or service. Examples include research and training in the service industry, user base development in social media, etc. Network Types: PAN (Personal Area Network): A small network around a person (e.g., Bluetooth). LAN (Local Area Network): A network within a limited area like a building. WAN (Wide Area Network): A broader network over large distances, like the internet. Communication Media: Wired vs. Wireless: Different types of media for data transmission. Wired media like Ethernet offer stability, while wireless media like Wi-Fi or cellular networks offer mobility. Network Topologies: Star: All nodes are connected to a central hub. Bus: Nodes share a common communication line. Ring: Nodes are connected in a circular fashion. Token Ring: A token circulates, granting permission to transmit. Client-Server Computing: Thin Client: A lightweight client that relies on a server for processing. Fat Client: A more powerful client that can do its own processing. Smart Client: A client that can perform both local processing and interact efficiently with a server. Cloud Computing: Benefits: Flexibility, scalability, cost-effectiveness. Risks: Security concerns, dependency on the provider. Types: SaaS (Software as a Service), IaaS (Infrastructure as a Service), PaaS (Platform as a Service). Data Management: Flat Files: Simple, unstructured storage of data. Lists: Basic organization, but can be inconsistent. Databases: Structured storage with relationships between data elements to ensure consistency and integrity. Database Concepts: o Primary Key: A unique identifier for a record. o Foreign Key: A key that links related data in different tables. Big Data: Defined by the 4Vs: o Volume: Massive amounts of data. o Velocity: The speed at which data is processed. o Variety: Different types of data (structured, unstructured). o Veracity: Ensuring data accuracy and trustworthiness. Use of a Business Process Map to Identify IT Opportunities: A business process map visually represents the steps in a process. By mapping processes, organizations can spot inefficiencies or areas where technology can be applied to improve operations, such as automating steps, streamlining workflows, or integrating systems for better data flow. IT opportunities often arise in areas where tasks are manual, data is siloed, or decision-making can be enhanced with real-time information. Compare Network Topologies: Star Topology: Each device is connected to a central hub or switch. Pros: If one connection fails, others remain operational. Cons: If the central hub fails, the whole network goes down. Bus Topology: All devices share a single communication line or cable. Pros: Easy to set up. Cons: A failure in the main cable can bring down the entire network. Token Ring Topology: Devices pass a token around the network, and only the device holding the token can transmit. Pros: Ensures that only one device transmits at a time, avoiding collisions. Cons: Can be slower, and if the token is lost, the network can fail. Ring Topology: Each device is connected to two others, forming a circle. Pros: Data travels in one direction, reducing collisions. Cons: If a single connection breaks, the whole network may be affected. 5G Network Risks and Concerns: Security: With faster speeds and more connected devices, 5G expands the potential attack surface for hackers. Privacy: Increased connectivity and the use of IoT (Internet of Things) devices could lead to more data collection and potential misuse. Infrastructure: Building a 5G network requires significant investment in infrastructure, including new towers and equipment. Health Concerns: Some groups are concerned about the potential health risks of the higher-frequency electromagnetic waves used in 5G networks, though research is ongoing. Benefits of Cloud Computing for Business: Cost Efficiency: Reduces the need for expensive hardware and maintenance. Scalability: Easily scale up or down depending on the needs of the business. Flexibility: Employees can access systems from anywhere, supporting remote work. Disaster Recovery: Cloud services often provide built-in backup and recovery options, ensuring data safety. Cloud Computing Risks and Concerns: Security: Storing sensitive data offsite raises concerns about who has access and how data is protected. Compliance: Businesses may have to ensure their cloud providers meet legal and regulatory requirements, especially when dealing with international data. Downtime: While cloud services are generally reliable, outages can happen, causing disruptions. Vendor Lock-In: Once you’re deeply invested in a particular cloud service provider, switching to another can be costly and complex. Compare Data Management Methods: Flat Files: Simple and easy to use but often result in data redundancy and inconsistencies. Lists: Organized collections of data but can become difficult to manage as they grow, leading to inefficiency. Databases: A structured way to store data, using tables and relationships to ensure data integrity, reduce redundancy, and allow for complex queries. Database ER (Entity-Relationship) Diagram: A database ER diagram visually represents the entities in a system and how they relate to each other. It helps in designing a database by showing relationships (e.g., one-to-one, one-to-many) between entities (such as customers, orders, products). For example, a customer can place many orders, so there would be a one-to-many relationship between the customer and orders tables in a database. 5-Component Model: The 5-component model of information systems consists of: o Hardware: Physical devices like computers, servers, or mobile phones. o Software: Programs and applications that process data. o Data: Raw facts that need to be processed into information. o People: Users who interact with the system. o Processes: Procedures that define how tasks are completed. The Triangle Model: The triangle model typically refers to the balance between cost, scope, and time in project management, also known as the project management triangle. In the context of IT, it might involve balancing technical capabilities, user needs, and budget constraints to ensure successful system implementation. People Using IS in an Organization: End users: Employees or customers who interact with the system to perform tasks. IT professionals: Individuals who design, manage, and maintain the system (e.g., developers, database administrators). Managers: People who use the information from systems to make strategic decisions. Porter’s Competitive Strategy Model: Michael Porter’s model outlines three primary strategies for gaining a competitive advantage: o Cost Leadership: Becoming the lowest-cost producer in the industry. o Differentiation: Offering unique products or services that stand out. o Focus: Targeting a specific market segment and tailoring services or products to that group. 3 Value Disciplines: These are three different strategies companies can adopt to gain a competitive advantage: o Operational Excellence: Providing products or services at a lower cost through efficient processes (e.g., Walmart). o Product Leadership: Offering superior products (e.g., Apple). o Customer Intimacy: Building close relationships with customers and offering tailored solutions (e.g., Amazon). Porter’s Value Chain Model: Porter’s value chain breaks down the activities a business performs into primary and support activities: o Primary activities: Involve the creation and delivery of the product (e.g., inbound logistics, operations, outbound logistics, marketing & sales, services). o Support activities: Help enhance the efficiency of primary activities (e.g., HR management, technology, procurement).