Mastering Information Systems: Concepts and Business Applications
Posted by Anonymous and classified in Other subjects
Written on in
English with a size of 4.13 MB
Information Systems: Core Business Tools
Information Systems (IS) are vital tools that help businesses collect, store, process, and share information. They significantly improve business efficiency and performance.
Key Benefits of Information Systems
- Improves Decision Making: Managers receive accurate and quick information for better choices.
- Increases Efficiency: IS automates routine tasks like billing, payroll, and stock checking.
- Reduces Errors: Computer-based systems minimize human mistakes.
- Helps in Communication: Facilitates faster communication among employees, customers, and suppliers.
- Provides Competitive Advantage: Enables businesses to operate faster than competitors.
- Stores Large Data Volumes: Information is stored securely and remains accessible.
- Improves Customer Service: Supports faster responses, order tracking, and feedback systems.
- Supports All Departments: Finance, HR, marketing, and production all rely on IS.
Example: Amazon uses Information Systems to manage millions of orders, track delivery, maintain stock, automate payments, and provide customer support, ensuring quick and accurate product delivery.
Data, Information, and Knowledge Hierarchy
Data, information, and knowledge represent three stages of understanding, where raw facts gain meaning through processing and interpretation.
- Data: Raw facts lacking inherent meaning (e.g., numbers, symbols, names).
- Information: Processed and organized data that carries meaning and helps interpret the raw facts.
- Knowledge: Information combined with experience, understanding, and judgment, enabling decision-making.
Transformation Process
Data → Information (Data is collected, sorted, and organized). Information → Knowledge (Information is analyzed to support decisions).
Example: A shop collects raw data on daily shirt sales. Organizing this data reveals the information that "Blue shirts sell the most." The shopkeeper uses this information to decide to stock more blue shirts, which constitutes knowledge application.
Computer-Based Information Systems (CBIS)
A Computer-Based Information System (CBIS) utilizes computer technology to perform some or all of its information processing tasks, enhancing organizational efficiency in collecting, storing, processing, and distributing data.
Components of CBIS
- Hardware: Physical devices like computers, printers, and scanners.
- Software: Programs and applications that run on hardware to process data.
- Database: A structured collection of easily accessible and updatable data.
- Network: Communication systems connecting computers for data sharing.
- Procedures: Instructions and rules for correct CBIS operation.
- People: Users such as employees, managers, and IT staff who interact with the system.
CBIS integration of these components is essential for modern organizations to handle information quickly and accurately.
Porter’s Competitive Forces Model
This framework analyzes industry competition levels to inform business strategy by assessing five key forces:
- Threat of New Entrants: The ease with which new companies can enter the market and increase competition.
- Bargaining Power of Suppliers: Suppliers' ability to influence raw material costs, which is high if suppliers are few.
- Bargaining Power of Buyers: Customers' ability to demand lower prices or better quality if they have many alternatives.
- Threat of Substitute Products or Services: The availability of alternative offerings that can replace the company's products.
- Rivalry Among Existing Competitors: The intensity of competition among current industry players.
Business-IT Alignment Importance
Business-IT Alignment is the tight integration of the IT function with the organization's strategy, mission, and goals, ensuring mutual support between IT and business decisions.
Why Alignment Matters
- Ensures IT directly supports business priorities.
- Improves overall productivity and efficiency.
- Reduces wasteful spending on irrelevant technology.
- Helps the business achieve a competitive advantage.
- Improves communication between IT and business units.
- Enables faster response to market changes.
Characteristics of Excellent Alignment
- IT as an Engine of Innovation: IT is viewed as a tool for transformation, not just support.
- Customer Focus is Top Priority: Both IT and business teams prioritize customer needs.
- Rotation of Business & IT Staff: Cross-departmental rotation fosters mutual understanding.
- Clear Overall Goals: Organizational goals are clearly understood by all IT and business employees.
- IT Employees Understand the Business: IT professionals grasp how the company generates revenue.
- Strong Company Culture: A positive, collaborative, and inclusive work culture prevails.
Example: If a bank aims to improve customer service, IT supports this by developing mobile apps and chatbots, achieving alignment that drives growth.
Understanding Big Data
Big Data involves datasets characterized by high volume, high velocity, and high variety, exceeding the capacity of traditional databases. Its primary use is pattern discovery and prediction.
Need for Big Data Analysis
- Helps organizations quickly understand trends and behavior.
- Supports real-time decision-making.
- Useful for fraud detection, crime tracking, and disease monitoring.
- Enables processing data from IoT sensors and smart devices.
- Supports innovation in business models and services.
Characteristics of Big Data (The 5 Vs)
- Volume: Massive amounts of data from sensors, social media, and transactions.
- Velocity: Extremely high speed of data flow (e.g., live streams, online transactions).
- Variety: Diverse data forms, including audio, video, text, and sensor data.
- Veracity: Data quality issues, such as incompleteness or inaccuracy from untrusted sources.
- Value: The useful insights derived from analysis that improve organizational performance.
Big Data Management Issues
Managing extremely large, fast, and diverse datasets presents several difficulties:
- Untrusted Data Sources: Data quality varies across internal and external sources, requiring verification.
- Big Data is Dirty: Low-quality data includes duplicates, missing values, or errors, complicating cleaning and preprocessing.
- Big Data Changes Frequently: Real-time data streams change rapidly, making it difficult to maintain consistency and quality.
Data Storage Comparison: Warehouse vs. Mart
| Feature | Data Warehouse | Data Mart |
|---|---|---|
| Meaning | Central repository for the whole organization | Smaller, department-level database |
| Scope | Enterprise-wide | Single department |
| Size | Very large (100GB – TB) | Small (<100GB) |
| Cost | Very expensive | Cheaper |
| Setup Time | Long (months – years) | Short (3 – 6 months) |
| Data Sources | Many internal + external sources | Few sources |
| Users | Senior executives, analysts | Department managers |
| Data Type | Detailed + summarized data | Mostly summarized data |
| Purpose | Strategic decisions | Tactical/operational decisions |
| Example | Whole company sales, HR, finance combined | Only sales department data |
Web Evolution: Web 2.0 vs. Web 3.0
| Feature | Web 2.0 | Web 3.0 |
|---|---|---|
| Meaning | Social & interactive web | Intelligent & decentralized web |
| Control | Centralized (companies) | Decentralized (blockchain) |
| Who owns data? | Companies | Users themselves |
| Technology | Social media, cloud | AI, blockchain, crypto |
| Example | YouTube, Facebook | Bitcoin, Metaverse apps |
| Focus | Sharing & collaboration | Personalization & ownership |
Data Warehouse Environment Structure
The Data Warehouse Environment is the complete structure for collecting, cleaning, storing, and delivering data for decision-making. It involves four main stages:
- Source Systems: Operational systems generating raw data (e.g., ERP, POS machines, external sources).
- Data Integration (ETL): Extraction (collecting data), Transformation (cleaning and standardizing), and Loading (placing data into the warehouse). A Metadata Repository stores data about the data.
- Data Storage: The central repository, including the Enterprise Data Warehouse (main storage) and Data Marts (department-level storage for historical and integrated data).
- Business Intelligence Layer: The user interface for analysis, including Dashboards, Decision Support Systems (DSS), OLAP tools, Query tools, and Reporting tools.
Knowledge Management System (KMS) Cycle
A Knowledge Management System (KMS) facilitates the effective collection, storage, sharing, and use of organizational knowledge. The KMS Cycle is continuous:
- Create or Capture Knowledge: Identifying and generating knowledge from experience, documents, and feedback.
- Represent Knowledge: Formatting knowledge clearly (manuals, rules, charts).
- Store Knowledge: Saving knowledge in accessible digital libraries or databases.
- Access / Share Knowledge: Making knowledge available to authorized users anytime.
- Use / Apply Knowledge: Employing stored knowledge for problem-solving and decision-making.
- Refine and Update Knowledge: Regularly correcting and improving knowledge to maintain accuracy.
Simon’s Model of Decision-Making
Decision-making, a key managerial activity, involves selecting the best alternative. Simon's model outlines three major phases:
- Intelligence Phase: Identifying and defining the problem through data collection and observation.
- Design Phase: Generating possible solutions, developing models, and evaluating the feasibility and consequences of alternatives.
- Choice Phase: Selecting the most effective and practical alternative, followed by implementation.
Multidimensional Analysis in BI
Multidimensional analysis is a Business Intelligence technique using OLAP tools and data cubes to examine data from various perspectives (dimensions like time, product, geography).
Data Cube Operations
- Data Cube: Data stored in a structure with three or more dimensions for fast, interactive analysis.
- Slice: Selecting a single dimension from the cube.
- Dice: Selecting a subcube using multiple dimensions.
- Drill Down: Moving from summarized data to more detailed data.
- Roll Up: Moving from detailed data to summarized data.
- Pivot: Rotating the cube to change the data view.
This technique supports faster data analysis, trend identification, and better decision-making.
Enterprise Resource Planning (ERP)
Enterprise Resource Planning (ERP) is an integrated software system connecting all major business functions using a single, shared database. This integration ensures the entire organization operates on real-time, consistent data.
ERP Modules and Features
- Core Modules: Finance, HR, Production.
- Extended Modules: CRM, SCM, BI, E-Business.
- Features: Standardization, automation, and integration across departments.
Advantages of ERP
- Organizational Flexibility to support growth.
- Improved Quality & Efficiency through standardized, automated workflows.
- Better Decision Making due to real-time data and accurate reporting.
- Better Customer Service via centralized customer information.
- Cost Reduction over time by minimizing waste and duplication.
Limitations of ERP
- Requires adapting existing workflows to match ERP's predefined best practices.
- Difficult and lengthy implementation (months or years).
- High initial costs (software, hardware, training).
- Potential failure risks if project management is poor.
- Significant employee training required for adaptation.
Common ERP Failures
ERP failures often stem from poor planning or an inability to manage complexity:
- Lack of Employee Involvement leading to system resistance.
- Attempting Too Much Too Fast by running all modules simultaneously.
- Insufficient Training resulting in user errors and data issues.
- Poor Data Conversion if old data is not cleaned before migration.
- Inadequate Testing causing bugs and incorrect calculations.
- Poor Project Management regarding timelines and budgets.
- No Management Support, causing lower-level employees to ignore the system.
How ERP Works
All departments input data into one central system. ERP instantly updates every related part of the company, providing managers with real-time information for superior decision-making.
Customer Relationship Management (CRM)
Customer Relationship Management (CRM) involves strategies and technologies used to manage customer interactions, aiming to create a 360-degree view of the customer using data from all touchpoints (calls, web, social media).
CRM Types
- Operational CRM: Supports front-office processes like sales automation, marketing campaigns, and customer service (e.g., FAQs, loyalty programs).
- Analytical CRM: Uses data warehouses for data mining and business intelligence to analyze customer behavior and patterns.
- Other Types: On-Demand CRM (cloud-based), Mobile CRM, Open-Source CRM, Social CRM, and Real-Time CRM.
Social Commerce and Computing
Social Commerce
Social commerce is the use of social media platforms for buying and selling, merging social networking with e-commerce.
Benefits
- Convenience: Quick purchases within social media apps.
- Personalized Recommendations based on user behavior.
- Social Proof: Reviews and likes aid purchasing decisions.
- Direct Interaction with sellers.
- Increased Reach for businesses and cost-effective marketing.
Risks
- Fraud and Fake Sellers, leading to non-delivery.
- Privacy Concerns regarding personal data misuse.
- Fake Reviews influencing customer choices.
- Payment Risks from unsafe links.
- Product Quality Issues where the item differs from the image.
Social Computing
Social Computing involves using social media, user-generated content, and interactive technologies for communication, sharing, and collaboration. It helps businesses create value through social interactions.
Business Applications
- Understanding Customer Behaviour through reviews and discussions.
- Enhanced Marketing via targeted ads and viral promotions.
- Improved Customer Service through instant response to complaints.
- Quick Feedback and Product Testing with online users.
- Building Brand Awareness and Community via user-generated content.
- Better Human Resource Management for recruitment and training.
Electronic Commerce (E-Commerce)
E-Commerce involves buying, selling, transferring, or exchanging products, services, or information through electronic networks like the Internet, enabling global online operations.
Advantages
- Global Market Reach to national and international customers.
- Lower Operational Costs by reducing distribution and storage expenses.
- 24/7 Customer Convenience.
- Wide Range of Products available for comparison.
- Fast Information Access regarding product details and reviews.
Limitations
- Technological Limits: Security standards, network reliability issues, and high initial technology costs.
- Non-Technological Limits: Perceived lack of security, legal ambiguities, and low local market participation.
- Product Inspection Issues: Customers cannot physically test items beforehand.
- Delivery Problems and logistical failures.
- Fraud and Security Risks, including identity theft.
Cloud Computing Models
Cloud computing delivers computing resources (storage, software, processing) over the Internet, eliminating the need for users to manage physical hardware.
Deployment Models
- Public Cloud: Shared resources available to the general public; low cost.
- Private Cloud: Dedicated to a single organization; high security and control.
- Community Cloud: Shared among organizations with similar requirements.
- Hybrid Cloud: A combination of two or more cloud types for flexibility.
Service Models
- IaaS (Infrastructure as a Service): Provides virtual machines, storage, and networks (Example: Amazon EC2). User controls the OS and applications.
- PaaS (Platform as a Service): Provides a platform for application development with necessary tools (Example: Google App Engine). User controls applications.
- SaaS (Software as a Service): Provides ready-to-use applications accessed via a web browser (Example: Gmail, Google Docs).
Wired vs. Wireless Media Comparison
| Feature | Wired (UTP, Coaxial, Fiber) | Wireless (Microwave, Radio, Satellite) |
|---|---|---|
| Medium | Physical cable | Air / radio waves |
| Speed | Very high (especially fiber) | Medium to high |
| Interference | Low interference | High interference (weather, walls) |
| Security | More secure | Less secure unless encrypted |
| Cost | Higher installation cost | Lower installation cost |
| Mobility | Devices fixed | Highly mobile |
Wireless Media Advantages & Disadvantages
- Microwave: High bandwidth advantage; requires clear line-of-sight and is affected by weather.
- Satellite: Very high bandwidth and global coverage advantage; expensive and has signal delay.
- Radio: Signals pass through walls (good indoor use) advantage; causes electrical interference and is easily intercepted.
- Infrared: Cheap for short distances advantage; requires line-of-sight and has low to medium bandwidth.
Evolution of Mobile Generations
| Gen | Speed | Technology | Key Features |
|---|---|---|---|
| 1G | 14.4 Kbps | Analog | Only voice calls |
| 2G | 9.6–14.4 Kbps | TDMA, CDMA | Voice + data (SMS) |
| 2.5G / 2.75G | 171–236 Kbps | GPRS / EDGE | Internet browsing |
| 3G | 0.5–3 Mbps | CDMA2000, UMTS | Video calling, multimedia |
| 3.5G | Up to 7 Mbps | HSPA | Faster mobile internet |
| 4G | 100 Mbps–1 Gbps | LTE, Wi-Fi | HD streaming, gaming, video conferencing |
| 5G | 1–10 Gbps | Advanced LTE, NR | Ultra high speed, low latency, IoT, smart cities |
Transaction Processing Systems (TPS)
A Transaction Processing System (TPS) records, stores, and processes every business transaction, such as sales, payments, and orders.
TPS Flow and Types
- Business Event: Example: Cashier scans a product.
- Transaction Processing System: Captures and processes the event.
- Organization Database: Data is stored securely.
- Other Systems Use the Data: FAIS, DSS, BI, ES utilize the stored data.
- Detailed Reports Generated: Used for analysis.
Processing Types: Batch Processing (data collected and processed periodically) and OLTP (Online Transaction Processing, where data is processed instantly).
System Development Life Cycle (SDLC)
The System Development Life Cycle (SDLC) is a structured, step-by-step method for developing high-quality information systems.
SDLC Phases
- Systems Investigation: Problem identification and feasibility study (technical, economic, behavioural); Go/No-Go decision.
- Systems Analysis: Gathering user requirements and understanding data flows; output is the System Requirements Document.
- Systems Design: Converting requirements into technical specifications, defining inputs, outputs, and architecture.
- Programming & Testing: Coding by programmers; includes unit, system, and integration testing.
- Implementation: Converting to the new system using strategies like Direct, Pilot, Phased, or Parallel conversion.
- Operation & Maintenance: Fixing bugs, updating features, and adding new modules.
Alternative Development Models
Agile Development
A flexible model building software in small parts called iterations or sprints.
- Iterative Development: Software built in small pieces every 2–4 weeks.
- Continuous Feedback: Users review each version for suggestions.
- Scrum Roles: Scrum Master, Product Owner, and Team Members.
- Features: Fast delivery, frequent updates, and easy handling of changing requirements.
Rapid Application Development (RAD)
A model focused on quick system development using prototypes and high user involvement.
- Focus on Fast Development: Emphasizes quick building over lengthy planning.
- Prototype Creation: A rough system model is built rapidly.
- User Involvement: Users continuously check and suggest improvements to the prototype.
- Advantages: Very fast delivery and high user involvement.
Information Ethics and Privacy
Privacy Concerns
Privacy is the right to be free from unnecessary observation and control over personal information collection and use.
Threats to Privacy
- Electronic Surveillance: Monitoring via smartphones, facial recognition, and geotagging.
- Personal Information in Databases: Risks of inaccuracy, misuse, or unauthorized data sales.
- Tracking Through Cookies & Online Tools: Building user profiles shared with advertisers.
- Data Theft and Hacking: Leading to identity theft and fraud.
- Workplace Monitoring: Tracking employee emails and activities.
Ethical Frameworks
Ethics involves the moral principles guiding right and wrong behavior in business and technology.
General Ethical Framework
- Recognize the Issue.
- Get the Facts.
- Evaluate Alternative Actions (using utilitarian, rights, fairness approaches).
- Make a Decision and Test It.
- Act and Reflect on the outcome.
Four Categories of IT Ethical Issues
- Privacy Issues: Collecting, storing, and sharing personal data.
- Accuracy Issues: Ensuring stored information is correct.
- Property Issues: Ownership of digital content and software.
- Accessibility Issues: Determining who can access information and associated costs.
Rules for Privacy
- Rule 1: Privacy is not absolute: Individual rights must balance society's needs (e.g., national security).
- Rule 2: Public's right to know supersedes individual privacy: Information vital for public welfare must be disclosed.
Information Security Controls
Information security controls are measures used to protect organizational data and systems from unauthorized access, damage, or misuse.
- Physical Controls: Walls, locks, guards, and alarm systems protecting physical IT assets.
- Access Controls: Authentication (verifying identity via passwords/biometrics) and Authorization (defining user permissions).
- Communication Controls: Firewalls, encryption, VPNs, and TLS/SSL protecting data during transmission.
- Business Continuity Planning (BCP): Procedures (backups, recovery) to ensure work continues after disasters.
- Information Systems Auditing: Systematic examination to ensure controls are effective and policies are followed.
Code of Ethics
A Code of Ethics is a written document outlining the moral standards, rules, and values that guide employee behavior and decision-making.
Purpose of a Code of Ethics
- Promotes Ethical Behaviour and responsibility.
- Builds Trust with customers and society.
- Prevents Misconduct such as fraud and corruption.
- Protects Company Reputation and goodwill.
- Provides guidance during complex decision-making situations.
Information System Threats
Information systems face threats that can cause data harm, operational disruption, and financial loss. Threats are classified as non-deliberate (unintentional) or deliberate (intentional).
1. Non-Deliberate Threats (Unintentional)
These arise from accidents, carelessness, or lack of awareness.
- Human Errors: Poor password use, data mistyping, or leaving systems unattended.
- Social Engineering: Manipulating employees into revealing confidential data (e.g., fake calls).
2. Deliberate Threats (Intentional)
These are intentional attacks aimed at theft, damage, or misuse.
- Espionage / Trespass: Unauthorized access to confidential information.
- Information Extortion: Stealing data and demanding payment for its return.
- Sabotage / Vandalism: Damaging digital assets or defacing websites.
- Software Attacks: Viruses, worms, phishing, and Denial of Service (DoS) attacks.
- Compromise of Intellectual Property: Stealing trade secrets or copyrighted material.
- Cyberterrorism & Cyberwarfare: Large-scale attacks targeting critical infrastructure.