Information Systems Concepts PDF

Summary

This document covers information systems concepts including information, systems, and components. It also details history of hardware and general concepts.

Full Transcript

**Lesson 1: Information Systems Concepts** **INFORMATION:** Processes, manipulated, and interpreted data. It is the collection of data organized in such a way that they have value beyond the data itself. Information is created by defining and organizing relationships among data. **SYSTEM:** A set...

**Lesson 1: Information Systems Concepts** **INFORMATION:** Processes, manipulated, and interpreted data. It is the collection of data organized in such a way that they have value beyond the data itself. Information is created by defining and organizing relationships among data. **SYSTEM:** A set of components that work together to achieve a common goal. Accepts input, processes it, and produces an output. Composed of one or more subsystems. May be a closed or open system. **CLOSED SYSTEM:** A stand-alone system that does not interact wth other systems. **OPEN SYSTEM:** Interacts with another systems. - Input: Capture the data to be processes - Processing: Change the data into information - Output: Disseminate the information product to its destination. **INFORMATION SYSTEMS (IS):** Can be an organized combination of people, hardware, software, communication networks, data resources, and policies and procedures that stores, retrieves, transforms, and disseminate information in an organization. *People rely on modern information systems to communicate with one another using:* - A variety of physical devices (hardware) - Information processing instructions and procedures (software) - Communications channels (networks) - Stored data (data resources) **FRAMEWORK OF MAJOR AREAS** 1. Foundation Concepts: Fundamental behavior, technical business, and managerial concepts about IS. 2. Information Technologies: Major concepts, developments, and management issues in IT. 3. Business Applications: Major uses of IS for operations, management, and competitive advantaged. 4. Development Process: How an IS is planned, developed, and implemented to meet business opportunities. 5. Management Challenges: Effectively and ethically managing IT at the end-user, enterprise, and global levels of business. **COMPONENTS OF INFORMATIONS SYSTEMS** 1. People, hardware, software, data, and networks: the basic components of IS\> 2. People resources: include end users and IS specialists, hardware resources consist of machines and media, software resources include both programs and procedures, data resources include data and knowledge bases, and networks. 3. Data resources: transformed by information processing activities into a variety of information products for end users. 4. Information processing consists of the system activities of input, processing, output, storage, and control. HARDWARE: All physical devices and materials used in information processing. SOFTWARE: All sets of information processing instructions. PEOPLE: Associated with the manpower required to run and manage the system. DATA: Raw facts and figures that are unorganized that are later processed to generate information. NETWORK: Telecommunication technologies and networks like the internet, intranets, and extranets are essential to the successful e-business and e-commerce operations of all types of organizations and their computer-based information systems. IS AND THE DECISION-MAKING PROCESS *(input the pic, labo kc)* For operations support: help run the daily business, but do not provide too much information for managerial decision-making. - Transaction processing systems (batch or real-time) - Process Control Systems (industrial processes) - Enterprise Collaboration Systems (office autonomation; team communication/productivity) For management support: - Management Information Systems (pre-defined reports) e.g. Annual budgeting - Decision Support Systems (modeling; what if analysis) e.g. Contract cost-analysis - Executive Information Systems (Internal/external sources) e.g. 5-year operating plan **Lesson 2: Computer Resource** **Computer Resources** refers to a wide range of tools and components, both tangible and intangible, required for performing computational tasks. Key Catergories: - Hardware Software - Data Network - Human Resource - Energy Resource EARLY BEGINNINGS OF EARLY BEGINNINGS OF EARLY BEGINNINGS OF COMPUTER RESOURCES **Pre-Computing Tools**. The early tools and devices used for calculations and data processing: Abacus, Punch Cards, Slide Rule, Napier's Bones, Mechanical Calculators **Hardware** refers to the physical components of a computer system, such as the CPU, memory, and storage devices. *Characteristics:* - Physical Presence: Tangible and can be physically touched and seen. - Durability: Built to last for extended periods but susceptible to wear over time. - Dependent on Software: Requires software to function properly. - Upgradeable: Can be replaced or upgraded to enhance system performance. - Power Consumption: Requires energy to operate and can vary in efficiency **HISTORY OF HARDWARE** 1. FIRST GENERATION (1940S-1950S): This era was characterized by the use of VACUUM TUBES. First Computer utilize Vacuum tubes: - ENIAC (Electronic Numerical Integrator and Computer) - UNIVAC (Universal Automatic Computer) Characteristics and Limitations: - Extremely large, often filing entire rooms. - Generated a substantial amount of heat, leading to frequent overheating and malfunctions. - Limited to basic arithmetic and logical operations with relatively slow processing speeds compared to later generations. 2. SECOND GENERATION (1950S-1960S): The replacement of vacuum tubes with TRANSISTORS, which were smaler, more efficient, and reliable. Example: - IBM 7090: used to develop the first weather forecasting models, and it was also used to perform the calculations for the Apolo 11 moon landing. - Transistors still generated heat, although less than vacuum tubes. - Computers remained relatively large. - Operating systems were basic, limiting multitasking. - Required specialized knowledge for operation and maintenance 3. THIRD GENERATION (1960S-1970S): Brought the invention of INTEGRATED CIRCUITS (ICs), which combined multiple transistors onto a single chip. - Minicomputers: Smaller, less expensive computers like the DEC PDP 8 - Large Mainframes: Dominant computers of the era, large and costly but powerful. - Reduced cost, size and improved performance of computers. - Powerful computers for complex business and scientific operations. - Constrained memory capacity. Basic and complex programming tools for non-experts. 4. FOURTH GENERATION (1970S-1990S): The development of MICROPROCESSORS--- entire CPUs integrated onto a single chip. This generation marked the beginning of personal computing. Examples: - The introduction of microprocessors like the Intel 4004 led to the development of personal computers, including the Apple II, IBM PC, and Commodore 64. Characteristics and limitations: - Graphical User Interfaces (GUIs): made user interfaces more accessible, enabling non-technical users to operate computers but pretty basic. - Early PCs stil experienced hardware failures and software bugs. - Early microprocessors had limited computing power, storage, and GUIs. - Programs were not compatible across platforms. PCs experienced hardware and software issues. 5. FIFTH GENERATION (1990S PRESENT): Defined by advancements in artificial intelligence (AI), quantum computing, and the growth of supercomputers. - Artificial Intelligence: Machine learning and neural networks transform fields like healthcare, finance, and robotics by alowing computers to process data like humans. - Quantum Computing: Utilizes quantum mechanics to solve complex problems beyond traditional computers. Stil in the research phase. - Supercomputers: Exponential growth in computational power, used in weather forecasting, drug discovery, and space exploration. **Software** refers to a collection of programs, data, and instructions that tell a computer or electronic device how to perform specific tasks. It is the non-tangible component of a computer system, as opposed to hardware, which consists of the physical components. Characteristics: - Intangible: Unlike hardware, software cannot be physically touched or held. - Modifiable: Software can be updated or modified to improve functionality or address security vulnerabilities. - Dependent on Hardware: Software requires hardware to run and perform its functions HISTORY OF SOFTWARE 1. EARLY SOFTWARE (1950S-1960S): Software in this 1950\'s to 1960\'s era was designed for specific tasks, mainly for scientific and military purposes, as computers were large and expensive. Example: - FORTRAN (Formula Translation): Introduced in 1957, this high-level programming language was designed for scientific and engineering calculations, enabling users to write complex programs more easily than using assembly language. - Low-level languages like assembly and early high-level languages like FORTRAN and COBOL were used. - Software was single-purpose and hardware-dependent. Informal methods of development, lacking portability and automation. - Programs were input manually, often error-prone, with limited storage and power. 2. RISE OF OPERATING SYSTEMS (1970S): The 1970s witnessed the emergence of operating systems, standardizing resource management and enabling multitasking. Example: - Unix: Developed at Bell Labs in 1969, Unix became one of the most influential operating systems, known for its modular design and portability, serving as the foundation for many modern systems. - Enabled time-sharing, file management, and memory allocation. - Introduction of multi-user capabilities but still limited in functionality. - OS tied to specific hardware, reducing portability. 3. SOFTWARE BOOM (1980S-1990S): The 1980s and 1990s saw a dramatic expansion in the software industry, the PC revolution expanded the software industry with user-friendly applications for the public. Example: - Microsoft Windows: Launched in 1985, Windows popularized graphical user interfaces, making computing more accessible to the general public. - Apple Macintosh: Released in 1984, it further showcased the potential of GUI, influencing software design across platforms. - Shift from system to consumer applications (word processors, databases). - Object-Oriented Programming (OOP) emerged, promoting code reuse. - Increased complexity brought software bugs, security flaws, and compatibility issues. 4. THE INTERNET AND CLOUD ERA (2000S-PRESENT): The 21st century has seen the rise of the internet and cloud computing software distribution into services over the web. - Amazon Web Services (AWS): Launched in 2006, AWS revolutionized the tech landscape by providing scalable cloud computing services. - Google Cloud Platform (GCP): Launched in 2008, provides cloud services for building and scaling applications on Google's infrastructure. It offers tools for computing, data storage, and machine learning - Rise of SaaS, web applications (e.g., Google Docs), Agile/DevOps methodologies. - Cloud computing and virtualization allowed scalability but rely on constant internet access. - Security and data privacy concerns increased with cloud adoption IMPORTANCE 1. Communication. Instant connectivity and collaboration. Enhance global connectivity by enabling instant communication through through the internet, social media, and digital platforms. 2. Business. - Streamlined Operations. - Business Intelligence: Colect and analyze large amounts of data sets to gain insights to make informed, growth-focused decisions. - Enhanced Customer Experiences: Enable personalized marketing, efficient customer support, and smooth online transactions. 3. Education. - Access to information: Computers and the internet provide pupils, students, and educators with access to virtualy limitless amounts of information and educational resources. - Interactive Learning: Offers interactive learning experiences through multimedia, simulations, and other educational software. - Digital Literacy: Promote skills in navigating digital environments, crucial for academic and career success in the modern era. 4. Entertainment. Diverse access and creation. Offer entertainment and creative tools for streaming, gaming, and content creation, enabling global sharing and expression. 5. Security & crime. - Awareness of Risks: Introduce risks such as cybercrime, identity theft, and online fraud. - Security antivirus Measures: Employing software and strong passwords is essential for online safety. **TYPES OF COMPUTER RESOURCES** **COMPONENT OF COMPUTER HARDWARE** 1. Input Devices: Keyboard, Mouse, Scanner, Microphone 2. Output Devices: Monitor, Printer, Speakers Central Processing Unit (CPU): The \"brain\" of the computer, it processes instructions performs calculations. Memory: Stores data and instructions that the CPU needs to access. Storage Devices: Store data persistently, even when the computer is turned off. Examples include hard drives and solid-state drives. Network Interface Card (NIC): Enables the computer to connect to a network, such as the internet. Motherboard: The main circuit board that connects all the components of the computer. Power Supply Unit (PSU): Converts AC power from the wall outlet into DC power for the computer\'s components. **TYPES OF SOFTWARE RESOURCE** 1. System Software: This type of software manages the computer\'s hardware and provides a platform for other software to run. Examples: Operating systems (like Windows, macOS, Linux), device drivers, firmware. 2. Application Software: Designed to perform particular functions for users. Examples: Word processors, spreadsheets, web browsers, games, media players. 3. Utility Software: Specialized tools for system maintenance: Helps manage and optimize the computer\'s performance. Examples: Antivirus software, disk cleaners, backup tools, compression utilities NETWORK INFRASTUCTURE: Network infrastructure refers to the hardware and software that enable connectivity communication between users, devices, apps, the internet, and more. 3 Types of NI: Hardware Infrastructure, Software Infrastructure, Network Services NETWORK INFRASTUCTURE MANAGEMENT: Network administrators ensure optimal network performance by identifying bottlenecks, solving issues, and scaling infrastructure to support business growth. Five Key Areas: 1. Network Infrastructure Monitoring 2. Configuration Management 3. Performance Management 4. Fault Management 5. Security Management RESOURCES (Raw vs. Processed) DATA FORMS: 1. Alphanumeric Data 2. Image Data 3. Text Data 4. Audio Data CLOUD AND VIRTUAL RESOURCES: It describes infrastructure and computer services that are hosted online as opposed to being physically located on-site. Without requiring actual hardware, these remotely accessible resources which include storage, processing power, and applications allow enterprises to scale up or down as needed. CLOUD COMPUTING: It is the use of hosted services, such as data storage, servers, databases, networking, and software over the internet. A diagram of cloud computing Description automatically generated Deployment Model: 1. Public Cloud: Services are delivered over the internet to multiple customers, often in a multi-tenant environment, 2. Private Cloud: Infrastructure is dedicated to a single organization, either hosted on-premises or by a cloud provider. 3. Hybrid Cloud: Combines both public and private clouds, allowing data and application to be shared between them. 4. Community Cloud: Shared infrastructure between several organizations with similar requirements. **Cloud Services:** - Infrastructure as a Service (IaaS) providers, such as Amazon Web Services (AWS), supply a virtual server instance and storage, as well as application programming interfaces (APIs) that let users migrate workloads to a virtual machine (VM). - Platform as a service (PaaS), cloud providers host development tools on their infrastructures. - Software as a service (SaaS) is a distribution model that delivers software applications over the internet; these applications are often called "web services". - Function as a Service (FaaS), known as computing", "serverless where developers run small pieces of code in response to events without managing servers. - Storage as a Service (STaaS), A scalable storage resources over the cloud. **Remote Access:** - Remote Desktop Protocol (RDP): A Microsoft protocol allowing users to remotely control a Windows computer via a network connection.' - Virtual Private Network (VPN. A secure tunnel that enables remote users to access private network resources, as though they were connected locally. - Secure Shell (SSH): A protocol that allows secure remote access to servers and computers, primarily used for command-line access and administration - Virtual Network Computing (VNC): Allows graphical desktop sharing, enabling users to remotely control a computer. ***Energy monitoring systems?*** By using software, an energy monitoring system makes it possible to monitor on how much energy is used within a company. It has the capacity to simultaneously track a full building or just one room. Which provides significant benefits such as: - Real-Time Energy Data - Measure Results - Improve Facility Performance - Reduces Operational Costs - Improve your Company's Brand Image **INTERNET OF THINGS (IOT)** - Load Handling: The load that a power grid needs to supply towards is every-changing. Smart grids can help advise consumers to change their usage patterns during times of heavy load. - Demand Response Support: Smart grids can help consumers reduce their electricity bills by advising them to use devices with a lower priority when the electrical rates are lower. This also helps in the real-time analysis of electrical usage and charges. - Decentralization of Power Generation: Smart grids help decentralize power grids since they can easily help incorporate renewable energy sources such as solar panels at an individual scale and discretion. **SUSTAINABILITY IT:** It is an approach to corporate information technology that aims to minimize the environmental impact of it operations and their contribution to climate change. ![](media/image2.png)Benefits of a Sustainable IT: - Energy efficiency - Renewable energy - Cloud computing - Virtualization - Sustainable sourcing - Product lifecycle - Sustainable software development - New technologies **CHALLENGES OF COMPUTER RESOURCES** 1. Resource allocation and scalability: Overutilization in computer resources, especially within the context of information systems, refers to the situation where computing resources such as processors, memory, storage, or network bandwidth are used beyond their optimal capacity. When resources are overutilized, the system cannot handle additional requests efficiently, leading to several problems. Ex. When the system's CPU or memory is overutilized, response times increase, making applications and processes run slower than expected. 2. Obsolescence: Hardware obsolescence refers to the process by which hardware becomes outdated, no longer supported, or unable to meet current technological needs due to advances in technology, changes in software requirements, or a lack of compatibility with modern systems. As newer and more efficient hardware is developed, older hardware may struggle to keep up, leading to performance issues, inefficiencies, and increased costs. Ex. Obsolete hardware often no longer receives firmware or security updates, leaving systems exposed to security risks. 3. Security and Data Privacy: Data Breaches and Unauthorized Access, Distributed Denial of Service (DDoS) Attacks, and Insider Threats are some of the cybersecurity issues that the resources might face. Cybersecurity issues in computer resources (CR) arise when systems are exposed to risks that could compromise the confidentiality, integrity, or availability of data and operations. As organizations increasingly rely on complex IT infrastructures, protecting these resources from cyber threats becomes more challenging. - Data Breaches - unauthorized access to sensitive data. - DDoS Attacks - exploit the fact that many systems have limited capacity to handle a surge in traffic. - Insider Threats - occur when individuals within an organization misuse their access to computer resources for malicious purposes **FUTURE TRENDS** 1. EMERGING TECHNOLOGIES: When talking about emerging technology it is mainly used for describing two things: *New Technology* and *Development in Existing Technology*. 2. AI AND MACHINE LEARNING: AI is a trained final output machine which mimic like human brain ML is a subset of AI. It is a technique to achieve AI. 3. EDGE COMPUTING: A distributed information technology (IT) architecture in which client data is processed at the periphery of the network, as close to the originating source as possible. 4. QUANTUM COMPUTING: Represents a radical departure from classical computing, promising to solve complex problems that are currently intractable for classical computers. 5. AUGMENTED REALITY (AR): - Overlay of Real and Digital World - Registration and alignment in 3D - Real time interaction 6. VIRTUAL REALITY (VR) a. The creation of a virtual world where others may react. b. Graphics used are made to trick our minds in believing that there is no difference between that world and our world. 7. CYBERSECURITY AND PRIVACY SOLUTIONS: creates a safe digital environment where individuals can trust that their data is secure and handled properly. 8. HIGH PERFORMANCE COMPUTING (HPC): the practice of using supercomputers and parallel processing techniques to solve complex computational problems at significantly higher speeds than traditional computers. 9. HIGH PERFORMANCE COMPUTING (HPC): current advancements in mobile network technology but also the ongoing evolution towards even faster, more reliable, and interconnected systems. 1. CAD SOFTWARE: Computer-Aided Design (CAD) software is essential for engineers to create precise 2D and 3D models. 2. NUMERICAL COMPUTING TOOLS: Numerical computing tools, such as MATLAB, are used for performing complex calculations, simulations, and algorithm development. 3. FEA SOFTWARE: FEA software or the Finite Element Analysis (FEA) Software, like Abaqus, is crucial for assessing how structures will behave under various conditions. 4. DATA ANALYSIS TOOL: Data analysis tools, such as Microsoft Excel, enable engineers to manipulate and interpret data effectively. 5. SIMULATION SOIFTWARE: Simulation software allows engineers to model and test systems under various scenarios without physical prototypes. 6. BIM SOFTWARE: BIM software, revolutionizes such the as Revit, architecture, engineering, and construction (AEC) industry by providing a digital representation of a building\'s physical and functional characteristics. 7. AUTOMATION SOFTWARE: Automation software streamlines repetitive tasks, reducing manual labor and increasing efficiency. **Lesson 3: General Systems Model of a Firm** *How do Firms function?* **Input:** are the resources that a company uses to create goods or services. **Process:** process component includes the activities that turn inputs into outputs. **Output:** the results of these processes manifest as completed products, provided services, financial outcomes, customer insights, and the overall standing in the market. **General Systems Model**: is a conceptual framework that views an organization as an open system interacting with its environment. A diagram of a process Description automatically generated **Physical Resource Flow:** refers to the movement of tangible resources within a firm. **Virtual Resource Flow**: refers to the movement of intangible resources within a firm. **Firm\'s Control Mechanism:** - **Performance Standard:** a benchmark or target set by management that defines the expected level of performance in specific areas, such as productivity, quality, efficiency, or financial results. - Information Processor: collects, analyzes, and reports data regarding the organization's performance. This can include automated systems or manual processes - Management: responsible for interpreting the data and making decisions based on how actual performance compares to the performance standards. *Feedback Loop in a Firm* **Feedback loop** is a process in which information about the outcome or performance which involves collecting inputs from customers, employees, or other stakeholders, analyzing the data, and utilizing the insights to help identify the areas for improvement and drive positive changes. - **Positive Feedback Loop:** A positive feedback loop starts when a customer or employee shares a great review about the business. These loops help to reinforce positive action and encourage repeat business. - **Negative Feedback Loop:** A negative feedback loop is the cycle of turning customer or employee complaints into improvements. These loops help to find problem areas and spot issues before they escalate further. **How to Create an Effective Feedback Loop** - Set goals and objectives. - Choose the right channels. - Focus on accessibility and ease of use. - Act on feedback. - Frequently review feedback loops. **Challenges on Implementing Feedback Loop** - Resistant to change - Poor communication - Data Overload **What is Value Chain?** It is a series (chain) of activities that includes inbound logistics, warehouse and storage, production and manufacturing, finished product storage, outbound logistics, marketing and sales, and customer service. ![A diagram of a person in a suit Description automatically generated](media/image4.png) **Supply Chain Management** The strategic coordination of business functions within a business organization and throughout its supply chain for the purpose of integrating supply and demand management. A supply chain is the sequence of organizations---their facilities, functions, and activities--- that are involved in producing and delivering a product or service. The sequence begins with basic suppliers of raw materials and extends all the way to the final customer. The goal of supply chain management is to match supply to demand as effectively and efficiently as possible. Key issues relate to: - Determining the appropriate level of outsourcing. - Managing procurement. - Managing suppliers. - Managing customer relationships. - Being able to quickly identify problems and respond to them. **Enterprise Resource Planning:** It is a software that helps integrate the components of a company, including most of the supply chain processes, by sharing and organizing information and data among supply chain members. **Customer Relationship Management:** It is the combination of practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle. The key features of a CRM system include the following: - Contact management - Sales management - Analysis - Marketing automation - Customer support - Import contact data - Access by smartphones - Social networking **Organizational Culture:** It consists of the major understandings and assumptions for a business, corporation, or other organization. The understandings, which can include common values, norms, behaviors, and approaches to decision making, are often not stated or documented as goals or formal policies. Key components: - \(1) Values, (2) Norms, (3) Behaviors **Organizational Change:** Deals with how for-profit and nonprofit organizations plan for, implement, and handle change. Change can be caused by internal factors, such as those initiated by employees at all levels, or by external factors, such as activities wrought by competitors, stockholders, federal and state laws, community regulations, natural occurrences (such as hurricanes), and general economic conditions. **Organizational Culture and Change:** Organizational culture and change are deeply interconnected. Culture can either support or resist change, depending on how aligned the existing culture is with the changes being introduced. When changes clash with the organization\'s culture, resistance often occurs, making change efforts difficult. **USER SATISFACTION:** To be effective, enhancements must satisfy users and be embraced by all members of the organization; Users\' satisfaction with a computer system and the information it provides is typically determined by the system\'s quality and the value of the information. Technology Acceptance Model: A model that describes the factors leading to higher levels of acceptance and usage of technology. - Perceived Usefulness (PU) - Perceived Ease of Use (PEOU) - Quality of the Information System - Organizational Support **Technology Diffusion:** a measure of how widely technology is spread throughout the organization. **Technology Infusion**: is the extent to which technology is deeply integrated into an area or department. A diagram of a company Description automatically generated **Performance-Based Information Systems:** A management approach that focuses on measuring and evaluating the performance of information systems to ensure they are aligned with the organization\'s goals and objectives. **Three Stages in the Business Use of IS:** 1. **Cost Reduction and Productivity:** to reduce costs and improve productivity. 2. **Competitive Advantage:** to gain a competitive edge in the market. 3. **Performance Based Management:** to considering strategic advantages and costs, focusing on productivity, ROI, and net present value. **Common Measures of IS Value** - Productivity - Return on Investment (ROI) - Earnings Growth - Market Share and Speed to Market - Customer Awareness and Satisfaction - Total Cost of Ownership (TCO)

Use Quizgecko on...
Browser
Browser