Infosys Midterm Reviewer PDF
Document Details
Tags
Summary
This document is a reviewer for a midterm exam in Infosys, covering basic information systems concepts. It defines and discusses the characteristics of information, types of systems, including closed and open.
Full Transcript
LESSON 1: INFORMATION SYSTEMS CONCEPTS People rely on modern information systems to Slide 1-14 communicate with one another using: Definition; Attributes of Information A var...
LESSON 1: INFORMATION SYSTEMS CONCEPTS People rely on modern information systems to Slide 1-14 communicate with one another using: Definition; Attributes of Information A variety of physical devices (hardware) Information processing instructions and procedures Information is processed, interpreted data, manipulated, and (software) interpreted data. Communications channels (networks) Stored data (data resources) It is the collection of data organized in such a way that they have Framework of Information Systems value beyond the data itself. Information is created by defining Management Challenges and organizing relationships among data. Certified Lean Six Sigma Yellow Belt (CLSSYB) The characteristics of the information are listed as follows: 1. Accurate: Information must not contain any errors. It must be accurate. 2. Accessible: Authorized users should be able to access the information whenever required. 3. Complete: Information must contain all important and related data. 4. Economical: Information should be economical to produce both in terms of time and cost. 5. Format: Information should be available in the desired format. 6. Flexible: Information should be flexible enough to be Framework of major areas: used for different purposes. 7. Reliable: Information is dependable and is generated 1. Foundation Concepts - Fundamental behavior, using correct data. technical business, and managerial concepts about 8. Relevant: Information must be relevant so that it can information systems. be used by the organization. 2. Information Technologies - Major concepts, 9. Secure: Unauthorized users should not be able to developments, and management issues in IT. access the information. Access is allowed only to 3. Business Applications - Major uses of IS for authorized individuals. operations, management, and competitive advantage. 10. Simple: Information must be easily understandable 4. Development Process - How an IS is planned, and usable. Complex information is difficult to use and developed, and implemented to meet business may not serve its purpose. opportunities. 11. Timely: Information must be available when it is 5. Management Challenges - Effectively and ethically needed. Late or outdated information is of no use. managing IT at the end-user, enterprise, and global 12. Verifiable: There should be a means to cross check levels of business. the available information. Components of Information Systems What is a System? System A set of components that work together to achieve a common goal. Accepts input, processes it, and produces an output. Composed of one or more subsystems. May be a closed or open system. Closed System A stand-alone system that does not interact with other systems. Open System Interacts with another systems People, hardware, software, data, and networks are the five basic components of information systems People resources include end users and IS specialists, hardware resources consist of machines and media, software resources include both programs and procedures, data resources include data and knowledge bases, and network resources include communications media and networks. · Input - Capture the data to be processed Processing - Change Data resources are transformed by information processing the data into information Output - Disseminate the information activities into a variety of information products for end users. product to its destination. Information processing consists of the system activities Information Systems of input, processing, output, storage, and control. An Information Systems (IS) can be any organized the following components of an Information System: combination of people, hardware, software, communication networks, data resources, and policies and procedures that 1. HARDWARE - all physical devices and materials used stores, retrieves, transforms, and disseminates information in an organization. in information processing. 2. SOFTWARE - all sets of information processing instructions. 3. PEOPLE - associated with the manpower required to look for ways to gain an advantage over other retailers in run and manage the system. the competition for customers.) 4. DATA - raw facts and figures that are unorganized that are later processed to generate information. Types of Information Systems 5. NETWORK - Telecommunications technologies and For operations support: help run the daily business, but do not networks like the Internet, intranets, and extranets are provide much information for managerial decision-making essential to the successful e-business and e- Transaction processing systems (batch or real-time) commerce operations of all types of organizations and Process Control Systems (industrial processes) their computer-based information systems. Enterprise Collaboration Systems (office automation; team communication/productivity) Information System Resources and Products For management support: Management Information Systems (pre-defined People Resources reports) e.g. Annual budgeting Specialists - systems analysts, software developers, Decision Support Systems (modeling; what if analysis) systems operators. e.g. Contract cost-analysis End Users - anyone else who uses information Executive Information Systems (internal/external systems. sources) e.g. 5-year operating plan Hardware Resources Information Systems and the Decision-Making Process Machines - computers, video monitors, magnetic disk Management Support Systems drives, printers, optical scanners. - When information system applications focus on Media - floppy disks, magnetic tape, optical disks, providing information and support for effective decision plastic cards, paper forms. making by managers. Software Resources Management Support Systems: Programs - operating system programs, spreadsheet 1. Management information systems. Provide programs, word processing programs, payroll information in the form of prespecified reports and programs. displays to support business decision making. Procedures - data entry procedures, error correction Examples: sales analysis, production performance, procedures, paycheck distribution procedures. and cost trend reporting systems. 2. Decision support systems. Provide interactive ad Data Resources hoc support for the decision-making processes of Product descriptions, customer records, employee managers and other business professionals. files, inventory databases. Examples: product pricing, profitability forecasting, and risk analysis systems. Network Resources 3. Executive information systems. Provide critical Communications media, communications processors, information from MIS, DSS, and other sources tailored network access, control software. to the infor- mation needs of executives. Examples: systems for easy access to analyses of business Information Products performance, actions of competi- tors, and economic Management reports and business documents using developments to support strategic planning. text and graphics displays, audio responses, and paper forms. LESSON 2: COMPUTER RESOURCE Slides 1-52 Information Systems and the Decision-Making Processes Computer Resource: Computer Resources refers to a wide range of tools and components, both tangible and intangible, required for performing computational tasks. Key Catergories: Hardware Software Data Network Human Resource Energy Resource Early Beginning of Computer Tools: Pre Computing Tools The early tools and devices used for calculations and data This conceptual overview emphasizes the main purposes of processing. information systems that support business operations and Abacus managerial decision making Punch Cards Slide Rule Information Systems and the Decision-Making Process Napier’s Bones Mechanical Calculators Information systems also help store managers and other HARDWARE: business professionals make better decisions. Hardware refers to the physical components of a computer system, such as Example: Decisions about what lines of merchandise need to the CPU, memory, and storage devices. be added or discontinued and what kind of investments they require are typically made after an analysis provided by Characteristics: computer-based information systems. Physical Presence: Tangible and can be physically touched and seen. (This function not only supports the decision making of Durability: Built to last for extended periods but susceptible to store managers, buyers, and others, but also helps them wear over time. FOURTH GENERATION (1970S-1990S) Dependent on Software: Requires software to function The development of microprocessors—entire CPUs integrated properly. onto a single Upgradeable: Can be replaced or upgraded to enhance system chip. This generation marked the beginning of personal performance. computing. Power Consumption: Requires energy to operate and can vary in efficiency. Examples: FIRST GENERATION (1940S-1950S): VACUUM TUBES The introduction of microprocessors like the Intel 4004 In this generation it was characterized by the use of vacuum led to the development of personal computers, tubes for circuitry. including the Apple II, IBM PC, and Commodore 64. These tubes controlled the flow of electrical signals, functioning as switches that Characteristics and limitations: could amplify and switch electronic signals Graphical User Interfaces (GUIs): made user First Computer utilize Vacuum tubes: interfaces more accessible, enabling non-technical users to operate computers but ENIAC (Electronic Numerical Integrator and pretty basic. Computer) Early PCs still experienced hardware failures and UNIVAC (Universal Automatic Computer) software bugs.Early microprocessors had limited computing power, Characteristics and Limitations: storage, and GUIs. Programs were not compatible across platforms. Extremely large, often filling entire rooms. PCs experienced hardware and software issues. Generated a substantial amount of heat, leading to ARTIFICIAL INTELLIGENCE: frequent overheating and Fifth Generation(1990s-Present) malfunctions. Limited to basic arithmetic and logical operations with Artificial Intelligence: Machine learning, neural networks, and relatively slow processing speeds compared to later AI technologies are revolutionizing fields such as healthcare, generations. finance, and robotics, enabling computers to process data in TRANSISTOR: ways that mimic human thought. SECOND GENERATION(1950S-1960S) Quantum Computing: While still in the research phase, The second generation of computers, emerging in the late quantum computing has the potential to solve complex problems 1950s, saw the far beyond the capabilities of traditional computers by utilizing replacement of vacuum tubes with transistors, which were quantum mechanics principles. smaller, more efficient, and reliable. Transistor is a semiconductor device Supercomputers: The computational power of supercomputers used to amplify or has grown exponentially, with applications in weather switch electrical signals and power. forecasting, drug discovery, and space exploration. Example: SOFTWARE: Definition: Software refers to a collection of programs, data, IBM 7090: used to develop the first weather and instructions that tell a computer or electronic device how to forecasting models, and it was also used to perform perform specific tasks. It is the non-tangible component of a the calculations for the Apollo 11 moon landing. computer system, as opposed to hardware, which consists of the physical components. Characteristics and Limitations: Transistors still generated heat, although less than Characteristics: vacuum tubes. Computers remained relatively large. Intangible: Unlike hardware, software cannot be Operating systems were basic, limiting multitasking. physically touched or held. Required specialized knowledge for operation and Modifiable: Software can be updated or modified to maintenance. improve functionality or INTEGRATED CIRCUITS: address security vulnerabilities. THIRD GENERATION (1960S-1970S) Dependent on Hardware: Software requires hardware Brought the invention of integrated circuits (ICs), which to run and perform its combined multiple Functions. transistors onto a single chip, further reducing the size of computers and FORTRAN: boosting their performance. Definition: Software in this 1950's to 1960's era was designed for specific tasks, mainly for scientific and military purposes, as Examples: computers were large and expensive. Minicomputers: Smaller, less expensive computers Example: like the DEC PDP-8 Large Mainframes: Dominant computers of the era, FORTRAN (Formula Translation): Introduced in 1957, this large and costly but powerful. high-level programming language was designed for scientific and engineering calculations, enabling users to write complex Characteristics: programs more easily than using assembly language. Thousands of transistors on a single silicon chip. Characteristics & Limitations: Reduced cost, size and improved performance of computers. Low-level languages like assembly and early high-level Powerful computers for complex business and languages like FORTRAN and COBOL were used. scientific operations. Software was single-purpose and hardware- Constrained memory capacity. dependent. Basic and complex programming tools for non-experts. Informal methods of development, lacking portability MICROPROCESSOR and automation. Programs were input manually, often error-prone, with EDUCATION: limited storage and power. - ACCESS TO INFORMATION UNIX: Computers and the internet provide pupils, students, Definition: The 1970s witnessed the emergence of operating and educators with access to virtually limitless systems, standardizing resource management and enabling amounts of multitasking. information and educational resources. - INTERACTIVE LEARNING Example: Offers interactive learning experiences through multimedia, simulations, and other educational Unix: Developed at Bell Labs in 1969, Unix became one of the software. most influential operating systems, known for its modular design - DIGITAL LITERACY and portability, serving as the foundation for many modern Promote skills in navigating digital environments, systems. crucial for academic and career success in the modern era. Characteristics & Limitations: ENTERTAINMENT: Enabled time-sharing, file management, and memory allocation. IMPORTANCE: Introduction of multi-user capabilities but still limited in ENTERTAINMENT functionality. OS tied to specific hardware, reducing portability. Diverse Access and Content Creation Computer resources offer a wide range of MICROSOFT WINDOWS: entertainment options, including streaming services Definition: The 1980s and 1990s saw a dramatic expansion in and video games, and creative software tools offer the software industry, the PC revolution expanded the software diverse entertainment. They also provide tools for industry with user-friendly applications for the public. content creation, allowing individuals to express their creativity and share their work with a broader audience. Example: Microsoft Windows: Launched in 1985, Windows popularized SECURITY AND CRIME graphical user interfaces, Awareness of Cyber Risks making computing more accessible to the general public. Computer resources also present risks such as Apple Macintosh: Released in 1984, it further showcased the cybercrime, identity theft, and online fraud. potential of GUI, Understanding these risks and implementing robust influencing software design across platforms security measures like using antivirus software and creating complex passwords is crucial for protecting Characteristics & Limitations: personal information and ensuring online safety. Shift from system to consumer applications (word ENTERTAINMENT: processors, databases). DIVERSE ACCESS AND CREATION Object-Oriented Programming (OOP) emerged, Offer entertainment and creative tools for promoting code reuse. streaming, gaming, and content creation, Increased complexity brought software bugs, security enabling global sharing and expression. flaws, and compatibility issues. SECURITY AND CRIME: GOOGLE CLOUD PLATFORM: AWARENESS OF RISK Definition: The 21st century has seen the rise of the internet Introduce risks such as cybercrime, identity and cloud computing software theft, and online fraud. distribution into services over the web. SECURITY MEASURES: Employing antivirus software and strong Example: passwords is essential for online safety. Amazon Web Services (AWS): Launched in 2006, AWS revolutionized the tech landscape by providing scalable cloud computing services. LESSON 2: COMPUTER RESOURCE Google Cloud Platform (GCP): Launched in 2008, provides Slides 53-95 cloud services for building and scaling applications on Google’s infrastructure. It offers tools for Hardware Resource computing, data storage, and machine learning - Physical component of a computer are the foundational components of a computer. They are the Characteristics & Limitations: physical parts that make up the system, each with a Rise of SaaS, web applications (e.g., Google Docs), specific function. Think of them as the bricks, mortar, Agile/DevOps methodologies. and beams that construct a building. Cloud computing and virtualization allowed scalability Primary Function of Hardware Resources but rely on constant internet access. - The primary purpose of hardware resources is to Security and data privacy concerns increased with facilitate interaction between humans and cloud adoption. computers. Hardware Resources act as COMMUNICATION: intermediaries, allowing us to communicate with the IMPORTANCE computer and receive its response. They form the COMMUNICATION- Instant Connectivity and Collaboration bridge between the digital world and our physical Enhance global connectivity by enabling instant world. communication through the internet, social media, and digital platforms. Components of Hardware BUSINESS - STREAMLINED OPERATIONS A. Input Devices - BUSINESS INTELLIGENCE Collect and analyze large amounts of data sets to gain Keyboard: Used to type text and enter commands. insights to make informed, growth-focused decisions. Mouse: Used to point, click, and drag on the screen. ENHANCED CUSTOMER EXPERIENCE Scanner: Converts physical documents into digital Enable personalized marketing, efficient customer images. support, and smooth online transactions. Microphone: Used for voice input and audio recording. B. Output Devices Network Infrastructure Management Monitor: Displays visual information. - Network administrators ensure optimal network Printer: Produces physical copies of documents. performance by identifying bottlenecks, solving Speakers: Output sound. issues, and scaling infrastructure to support business C. Central Processing Unit (CPU) growth. - The "brain" of the computer, it processes instructions and performs calculations. Five Key Areas D. Memory - Network Infrastructure Monitoring - Stores data and instructions that the CPU needs to - Configuration Management access. - Performance Management E. Storage Devices - Fault Management - Store data persistently, even when the computer is - Security Management turned off. Examples include hard drives and solid- state drives. End-user of Information System F. Network Interface Card (NIC) - Accountants, Engineers, and Sales-person - Enables the computer to connect to a network, such as the internet. HR & Technology Technology has transformed HR. G. Motherboard - The main circuit board that connects all the Two key ways data resources are organized in information component of the computer. systems. H. Power Supply Unit (PSU) - Databases and Knowledge Bases - Converts AC power from the wall outlet into DC power for the computer's components. Data Forms - Alphanumeric Data Software Resource - Text Data - The software programs that run on a computer - Image Data - Software Resources are the invisible part of the - Audio Data computer. While hardware components are the physical building blocks, software is the set of Data instructions that tells the hardware what to do. It's like - Raw the operating system and applications that run on your computer. Information Primary Function of Software Resources - Processed - To control the Hardware - Software Resources are like boss of the hardware. Seven Quality Management Principles They tell the hardware what to do and how to do it. It (Principles of Management) provides the instructions and commands that 1. Customer Focus determine how the hardware components work 2. Engagement of People together. 3. Evidence-based Decision-Making Focus 4. Leadership Type of Software Resources 5. Relationship Management 6. Improvement A. System Software 7. Process Approach - Foundation of the computer: This type of software manages the computer's hardware and provides a Cloud and Virtual Resources platform for other software to run. - Typically use to scale IT infrastructure while - Examples: Operating systems (like Windows, macOS, optimizing costs and enhancing flexibility in modern Linux), device drivers, firmware. computing environments. B. Application Software - It describes infrastructure and computer services that - Tools for specific tasks: Designed to perform are hosted online as opposed to being physically particular functions for users. located on-site. Without requiring actual hardware, - Examples: Word processors, spreadsheets, web these remotely accessible resources which include browsers, games, media players. storage, processing power, and applications allow C. Utility Software enterprises to scale up or down as needed. - Specialized tools for system maintenance: Helps manage and optimize the computer's Cloud Computing performance. - It is the use of hosted services, such as data storage, - Examples: Antivirus software, disk cleaners, servers, databases, networking, and software over backup tools, compression utilities. the internet. Network Resources Deployment Model - Is any physical or virtual component of limited availability within a computer system 1. Public Cloud Types of Network Resources - Services are delivered over the internet to - Intranet multiple customers, often in a multi-tenant - Extranet environment. - Internet 2. Private Cloud Network Infrastructure - Infrastructure is dedicated to a single - Network infrastructure refers to the hardware and organization, either hosted on-premises or software that enable network connectivity and by a cloud provider. communication between users, devices, apps, the 3. Hybrid Cloud internet, and more. - Combines both public and private clouds, allowing data and applications to be shared Three Types of Network Infrastracture between them. - Hardware Infrastracture 4. Community Cloud - Software Infrastructure - Shared infrastructure between several - Network Services organizations with similar requirements. - Smart grids can help consumers reduce their Cloud Services electricity bills by advising them to use 3 Main Types devices with a lower priority when the electrical rates are lower. This also helps in 1. IaaS the real-time analysis of electrical usage and - Infrastructure as a Service charges. (IaaS) providers, such as Amazon Web Decentralization of Power Generation Services (AWS), supply a virtual server - Smart grids help decentralize power grids instance and storage, as well as application since they can easily help incorporate programming interfaces (APIs) that let users renewable energy sources such as solar migrate workloads to a virtual machine (VM). panels at an individual scale and discretion. 2. PaaS - Platform as a service (PaaS), cloud Sustainable IT providers host development tools on their - It is an approach to corporate information technology infrastructures. that aims to minimize the environmental impact of IT 3. SaaS operations and their contribution to climate change. - Software as a service (SaaS) is a distribution Benefits of a Sustainable IT: model that delivers software applications Energy efficiency over the internet; these applications are Renewable energy often called “web services”. Cloud computing Virtualization Additionals: Sustainable sourcing Product lifecycle 4. FaaS Sustainable software development - Function as a Service (FaaS), known as New technologies “serverless computing”, where developers run small pieces of code in response to events without managing servers. 5. STaaS - Storage as a Service (STaaS), A scalable storage resources over the cloud. Remote Access - Ability of users to access a device or a network from any location Remote Desktop Protocol (RDP) - A Microsoft protocol allows users to remotely control a Windows computer via a network connection. LESSON 2: COMPUTER RESOURCE Virtual Private Network (VPN) Slides 96-133 - A secure tunnel that enables remote users to access private network resources, as though they were CATEGORY: CHALLENGES OF COMPUTER connected locally. RESOURCES Secure Shell (SSH) - A protocol that allows secure remote access to Computer resources are immune to overutilization: BLUFF servers and computers, primarily used for command- Overutilization in computer resources, especially within the line access and administration. context of information systems, refers to the situation where Virtual Network Computing (VNC) computer resources such as processors, memory, storage, - Allows graphical desktop sharing, enabling users to or network bandwidth are used beyond their optimal remotely control a computer. capacity. When the resources are overutilized, the system cannot handle additional requests efficiently, leading to several Energy Monitory Systems problems. - Enables to track energy consumption within your Ex. When the system’s CPU or memory is overutilized, response business through the use of software times increase, making applications and processes run slower - By using software, an energy monitoring system than expected. makes it possible to monitor on how much energy is used within a company. It has the capacity to Emerging technologies only refer to brand new simultaneously track a full building or just one room. inventions: BLUFF When talking about emerging technology, it is mainly used for Which provides significant benefits such as : describing two things: - Real-Time Energy Data 1. New Technology - Measure Results 2. Development in Existing Technology - Improve Facility Performance - Reduces Operational Costs, and CAD software is indeed used for creating detailed designs - Improve your Company’s Brand Image and models. In contrast, numerical computing tools such as MATLAB are specifically used for performing complex Smart Grid and IOT calculations and simulations: FACT - A network of electricity supply systems that incorporates IOT technologies to improve efficiency, reliability, and sustainability. IOT (Internet of Things) Load Handling - The load that a power grid needs to supply towards is every-changing. Smart grids can help advise consumers to change their usage patterns during times of heavy load. Hardware obsolescence refers to the process by which Demand Response Support hardware becomes outdated, no longer supported, or unable to meet current technological needs due to Cybersecurity and Privacy Solutions - creates a advances in technology, changes in software requirements, safe digital environment where individuals can trust or a lack of compatibility with modern systems: FACT that their data is secure and handled properly As newer and more efficient hardware is developed, older High Performance Computing (HPC) - the practice of hardware may struggle to keep up, leading to performance using supercomputers and parallel processing issues, inefficiencies, and increased costs. techniques to solve complex computational problems at significantly higher speeds that traditional Ex. Obsolete hardware often no longer receives firmware or computers. security updates, leaving systems exposed to security risks. High Performance Computing (HPC) - current advancements in mobile network technology but also Finite Element Analysis (FEA) software is crucial for the ongoing evolution towards even faster, more assessing structural behavior, while data analysis tools are reliable, and interconnected systems. mainly used for creating 3D models: BLUFF Simulation software allows engineers to test systems Data analysis tools, such as Microsoft Excel, are used to without physical prototypes, and Building Information manipulate and interpret data, not for creating 3D models. Modeling (BIM) software enhances collaboration in construction projects, while automation software increases manual tasks. BLUFF: Automation software actually reduces manual tasks, streamlining repetitive processes, not increases manual tasks. In Machine Learning, a program can generate itself without any human input: BLUFF Artificial Intelligence (AI) is a trained final output machine which mimic like human brain Applications for engineers are essential tools that help Ex. Amazon Alexa improve efficiency, accuracy, and collaboration in Machine Learning (ML) is a technique to achieve AI. engineering tasks. Ex. Spam Detection FACT: Applications for engineers, such as CAD, FEA, and data analysis tools, play a vital role in enhancing OTHER TRENDS workflow, enabling professionals to design, analyze, Edge Computing - a distributed information and implement solutions more effectively. technology (IT) architecture in which client data is processed at the periphery of the network, as close to LESSON 3: GENERAL SYSTEMS MODEL OF A FIRM the originating source as possible. Slides 1-25 Quantum Computing - represents a radical departure from classical computing, promising to solve complex WHAT IS A FIRM? problems that are currently intractable for classical A firm is a business entity that aims to profit by selling goods and computers. services. Augmented Reality (AR) ○ Overlay of Real and Digital World TYPES OF FIRMS ○ Registration and alignment in 3D a. Sole Proprietorship - a sole proprietorship is a business ○ Real time interaction owned and run by one individual. This person is entirely Virtual Reality (VR) accountable for all expenses and obligations and holds ○ The creation of a virtual world where others ownership of all assets related to the business. may react ○ Graphics used are made to trick our minds in b. Partnership - a partnership is a business owned by two or believing that there is no difference between more individuals, with no maximum limit on the number of that world and our world partners who can hold an ownership interest. Data Breaches and Unauthorized Access, Distributed c. Corporation - are public companies that are legally distinct Denial of Service (DDoS) Attacks, and Insider Threats are from their owners, setting them apart from other types of firms. some of the cybersecurity challenges that computer resources face: FACT d. Cooperative - A cooperative is like a corporation in that its Cybersecurity issues in computer resources (CR) arise when owners enjoy limited liability; however, unlike a corporation, its systems are exposed to risks that could compromise the members have a voice in the company's operations. confidentiality, integrity, or availability of data and operations. As organizations increasingly rely on complex IT infrastructures, HOW DO FIRMS FUNCTION? protecting these resources from cyber threats becomes more a. Input - are the resources that a company uses to create challenging. goods or services. Data Breaches - unauthorized access to sensitive b. Process - process component includes the activities that turn data inputs into outputs. Data Attacks - exploit the fact that many systems have c. Output - the results of these processes manifest as limited capacity to handle a surge in traffic completed products, provided services, financial outcomes, Insider Threats - occur when individuals within an customer insights, and the overall standing in the market organization misuse their access to computer resources for malicious purposes THE GENERAL SYSTEMS MODEL - is a conceptual framework that views an organization as an Cyber-criminals primarily target social media sites to steal open system interacting with its environment. personal data, while bank transactions are generally safe a. Physical Resource Flow and do not require security measures: FACT - refers to the movement of tangible resources within a firm OTHER TRENDS b. Virtual Resource Flow - refers to the movement of intangible resources within a suppliers of raw materials and extends all the way to the final firm customer. FIRM’S CONTROL MECHANISM The goal of supply chain management is to match supply a. Performance Standard to demand as effectively as possible. - A benchmark or target set by management that defines Key issues relate to: the expected level of performance in specific areas, Determining the appropriate level of outsourcing such as productivity, quality, efficiency, or financial Managing procurement results. Managing suppliers b. Information Processor Managing customer relationships - Collects, analyzes, and reports data regarding the Being able to quickly identify problems and respond to organization’s performance. This can include them automated systems or manual processes. c. Management ENTERPRISE RESOURCE PLANNING - Responsible for interpreting the data and making It is a software that helps integrate the components of a decisions based on how actual performance compares company, including most of the supply chain processes, by to the performance standards. sharing and organizing information and data among supply chain members. FEEDBACK LOOP IN A FIRM CUSTOMER RELATIONSHIP MANAGEMENT Feedback Loop - is a process in which information about the - It is the combination of practices, strategies and outcome or performance which involves collecting inputs from technologies that companies use to manage and computers, employees, or other stakeholders, analyzing the analyze customer interaction and data throughout the data, and utilizing the insights to help identify the areas for customer lifecycle. improvement and drive positive changes. a. Positive Feedback Loop The Key Features of Customer Relationship Management: A positive feedback loop starts when a customer or employee - Contact Management shares a great review about the business. These loops help to - Sales Management reinforce positive action and encourage repeat business. - Customer Support b. Negative Feedback Loop - Marketing Automation A negative feedback loop is the cycle of turning customer or - Analysis employee complaints into improvements. These loops help to - Social Networking find problem areas and spot issues before they escalate further. - Access by Smartphone - Import Contact Data HOW TO CREATE AN EFFECTIVE FEEDBACK LOOP Set goals and objectives ORGANIZATIONAL CULTURE Choose the right channels - It consists of the major understandings and Focus on accessibility and ease of use assumptions for a business, corporation, or other Act on feedback organization. The understandings, which can include Frequently review feedback loop common values, norms, behaviors, and approaches to decision making are often not stated or documented as CHALLENGES ON IMPLEMENTING FEEDBACK LOOP goals or formal policies. Resistant to Change Key Components: Poor Communication - Values Data Overload - Norms - Behaviors WHAT IS VALUE CHAIN? It is a series (chain) of activities that includes inbound logistics, ORGANIZATIONAL CHANGE warehouse and storage, production and manufacturing, finished - Deals with how for-profit and nonprofit organizations product storage, outbound logistics, marketing and sales, and plan for implement, and handle change. Change can customer service. be caused by internal factors, such as those initiated by employees at all levels, or by external factors, such SUPPLY CHAIN MANAGEMENT as activities brought by competitors, stockholders, Supply Chain Management - is the strategic coordination of federal and state laws, community regulations, natural business functions within a business organization and occurrences (such as hurricanes), and general throughout its supply chain for the purpose of integrating supply economic conditions. and demand management. A. Sustain Change B. Disruptive Change A supply chain is the sequence of organizations - their facilities, ORGANIZATIONAL CULTURE AND CHANGE functions, and activities - that are involved in producing and - Organizational culture and change are deeply delivering a product or service. The sequence begins with basic interconnected. Culture can either support or resist change, depending on how aligned the existing cultures is with the changes being introduced. When changes clash with the organization’s culture, resistance often occurs, making change efforts difficult. USER SATISFACTION - To be effective, enhancements must satisfy users and be embraced by all members of the organization. - User’s satisfaction with the computer system and the information it provides is typically determined by the system’s quality and the value of the information. TECHNOLOGY ACCEPTANCE MODEL - Perceived Usefulness (PU) “DREAM BIG, PRAY BIG, BELIEVE BIG” - Perceived Ease of Use (PEOU) - Ephesians 3:20 - Quality of the Information System - Organizational support TECHNOLOGY DIFFUSION “COMMIT TO THE LORD WHATEVER YOU DO, - A measure of how widely technology is spread AND YOUR PLANS WILL SUCCEED.” throughout the organization. - Proverbs 16:3 TECHNOLOGY INFUSION - Is the extent to which technology is deeply integrated into an area or department. PERFORMANCE-BASED INFORMATION SYSTEMS - A management approach that focuses on measuring and evaluating the performance of information systems to ensure they are aligned with the organization’s goals and objectives. Three Stages in the Business Use of Information Systems 1. Cost Reduction and Productivity - To reduce cost and improve productivity 2. Competitive Advantage - To gain a competitive edge in the market 3. Performance- Based Management - To consider strategic advantages and costs, focusing on productivity, ROI, and net present value. COMMON MEASURES OF INFORMATION SYSTEMS (IS) Productivity Return of Investment Earnings Growth Market Share and Speed to Market Customer Awareness and Satisfaction Total Cost of Ownership (TCO)