Mastering Information Systems: Concepts and Business Applications

Posted by Anonymous and classified in Other subjects

Written on in English with a size of 4.13 MB

Information Systems: Core Business Tools

Information Systems (IS) are vital tools that help businesses collect, store, process, and share information. They significantly improve business efficiency and performance.

Key Benefits of Information Systems

  • Improves Decision Making: Managers receive accurate and quick information for better choices.
  • Increases Efficiency: IS automates routine tasks like billing, payroll, and stock checking.
  • Reduces Errors: Computer-based systems minimize human mistakes.
  • Helps in Communication: Facilitates faster communication among employees, customers, and suppliers.
  • Provides Competitive Advantage: Enables businesses to operate faster than competitors.
  • Stores Large Data Volumes: Information is stored securely and remains accessible.
  • Improves Customer Service: Supports faster responses, order tracking, and feedback systems.
  • Supports All Departments: Finance, HR, marketing, and production all rely on IS.

Example: Amazon uses Information Systems to manage millions of orders, track delivery, maintain stock, automate payments, and provide customer support, ensuring quick and accurate product delivery.

Data, Information, and Knowledge Hierarchy

Data, information, and knowledge represent three stages of understanding, where raw facts gain meaning through processing and interpretation.

  • Data: Raw facts lacking inherent meaning (e.g., numbers, symbols, names).
  • Information: Processed and organized data that carries meaning and helps interpret the raw facts.
  • Knowledge: Information combined with experience, understanding, and judgment, enabling decision-making.

Transformation Process

Data → Information (Data is collected, sorted, and organized). Information → Knowledge (Information is analyzed to support decisions).

Example: A shop collects raw data on daily shirt sales. Organizing this data reveals the information that "Blue shirts sell the most." The shopkeeper uses this information to decide to stock more blue shirts, which constitutes knowledge application.

Computer-Based Information Systems (CBIS)

A Computer-Based Information System (CBIS) utilizes computer technology to perform some or all of its information processing tasks, enhancing organizational efficiency in collecting, storing, processing, and distributing data.

Components of CBIS

  • Hardware: Physical devices like computers, printers, and scanners.
  • Software: Programs and applications that run on hardware to process data.
  • Database: A structured collection of easily accessible and updatable data.
  • Network: Communication systems connecting computers for data sharing.
  • Procedures: Instructions and rules for correct CBIS operation.
  • People: Users such as employees, managers, and IT staff who interact with the system.

CBIS integration of these components is essential for modern organizations to handle information quickly and accurately.

Porter’s Competitive Forces Model

This framework analyzes industry competition levels to inform business strategy by assessing five key forces:

  1. Threat of New Entrants: The ease with which new companies can enter the market and increase competition.
  2. Bargaining Power of Suppliers: Suppliers' ability to influence raw material costs, which is high if suppliers are few.
  3. Bargaining Power of Buyers: Customers' ability to demand lower prices or better quality if they have many alternatives.
  4. Threat of Substitute Products or Services: The availability of alternative offerings that can replace the company's products.
  5. Rivalry Among Existing Competitors: The intensity of competition among current industry players.

Business-IT Alignment Importance

Business-IT Alignment is the tight integration of the IT function with the organization's strategy, mission, and goals, ensuring mutual support between IT and business decisions.

Why Alignment Matters

  • Ensures IT directly supports business priorities.
  • Improves overall productivity and efficiency.
  • Reduces wasteful spending on irrelevant technology.
  • Helps the business achieve a competitive advantage.
  • Improves communication between IT and business units.
  • Enables faster response to market changes.

Characteristics of Excellent Alignment

  1. IT as an Engine of Innovation: IT is viewed as a tool for transformation, not just support.
  2. Customer Focus is Top Priority: Both IT and business teams prioritize customer needs.
  3. Rotation of Business & IT Staff: Cross-departmental rotation fosters mutual understanding.
  4. Clear Overall Goals: Organizational goals are clearly understood by all IT and business employees.
  5. IT Employees Understand the Business: IT professionals grasp how the company generates revenue.
  6. Strong Company Culture: A positive, collaborative, and inclusive work culture prevails.

Example: If a bank aims to improve customer service, IT supports this by developing mobile apps and chatbots, achieving alignment that drives growth.

Understanding Big Data

Big Data involves datasets characterized by high volume, high velocity, and high variety, exceeding the capacity of traditional databases. Its primary use is pattern discovery and prediction.

Need for Big Data Analysis

  • Helps organizations quickly understand trends and behavior.
  • Supports real-time decision-making.
  • Useful for fraud detection, crime tracking, and disease monitoring.
  • Enables processing data from IoT sensors and smart devices.
  • Supports innovation in business models and services.

Characteristics of Big Data (The 5 Vs)

  • Volume: Massive amounts of data from sensors, social media, and transactions.
  • Velocity: Extremely high speed of data flow (e.g., live streams, online transactions).
  • Variety: Diverse data forms, including audio, video, text, and sensor data.
  • Veracity: Data quality issues, such as incompleteness or inaccuracy from untrusted sources.
  • Value: The useful insights derived from analysis that improve organizational performance.

Big Data Management Issues

Managing extremely large, fast, and diverse datasets presents several difficulties:

  1. Untrusted Data Sources: Data quality varies across internal and external sources, requiring verification.
  2. Big Data is Dirty: Low-quality data includes duplicates, missing values, or errors, complicating cleaning and preprocessing.
  3. Big Data Changes Frequently: Real-time data streams change rapidly, making it difficult to maintain consistency and quality.

Data Storage Comparison: Warehouse vs. Mart

FeatureData WarehouseData Mart
MeaningCentral repository for the whole organizationSmaller, department-level database
ScopeEnterprise-wideSingle department
SizeVery large (100GB – TB)Small (<100GB)
CostVery expensiveCheaper
Setup TimeLong (months – years)Short (3 – 6 months)
Data SourcesMany internal + external sourcesFew sources
UsersSenior executives, analystsDepartment managers
Data TypeDetailed + summarized dataMostly summarized data
PurposeStrategic decisionsTactical/operational decisions
ExampleWhole company sales, HR, finance combinedOnly sales department data

Web Evolution: Web 2.0 vs. Web 3.0

FeatureWeb 2.0Web 3.0
MeaningSocial & interactive webIntelligent & decentralized web
ControlCentralized (companies)Decentralized (blockchain)
Who owns data?CompaniesUsers themselves
TechnologySocial media, cloudAI, blockchain, crypto
ExampleYouTube, FacebookBitcoin, Metaverse apps
FocusSharing & collaborationPersonalization & ownership

Data Warehouse Environment Structure

The Data Warehouse Environment is the complete structure for collecting, cleaning, storing, and delivering data for decision-making. It involves four main stages:

  1. Source Systems: Operational systems generating raw data (e.g., ERP, POS machines, external sources).
  2. Data Integration (ETL): Extraction (collecting data), Transformation (cleaning and standardizing), and Loading (placing data into the warehouse). A Metadata Repository stores data about the data.
  3. Data Storage: The central repository, including the Enterprise Data Warehouse (main storage) and Data Marts (department-level storage for historical and integrated data).
  4. Business Intelligence Layer: The user interface for analysis, including Dashboards, Decision Support Systems (DSS), OLAP tools, Query tools, and Reporting tools.

Knowledge Management System (KMS) Cycle

A Knowledge Management System (KMS) facilitates the effective collection, storage, sharing, and use of organizational knowledge. The KMS Cycle is continuous:

  1. Create or Capture Knowledge: Identifying and generating knowledge from experience, documents, and feedback.
  2. Represent Knowledge: Formatting knowledge clearly (manuals, rules, charts).
  3. Store Knowledge: Saving knowledge in accessible digital libraries or databases.
  4. Access / Share Knowledge: Making knowledge available to authorized users anytime.
  5. Use / Apply Knowledge: Employing stored knowledge for problem-solving and decision-making.
  6. Refine and Update Knowledge: Regularly correcting and improving knowledge to maintain accuracy.

Simon’s Model of Decision-Making

Decision-making, a key managerial activity, involves selecting the best alternative. Simon's model outlines three major phases:

  1. Intelligence Phase: Identifying and defining the problem through data collection and observation.
  2. Design Phase: Generating possible solutions, developing models, and evaluating the feasibility and consequences of alternatives.
  3. Choice Phase: Selecting the most effective and practical alternative, followed by implementation.

Multidimensional Analysis in BI

Multidimensional analysis is a Business Intelligence technique using OLAP tools and data cubes to examine data from various perspectives (dimensions like time, product, geography).

Data Cube Operations

  • Data Cube: Data stored in a structure with three or more dimensions for fast, interactive analysis.
  • Slice: Selecting a single dimension from the cube.
  • Dice: Selecting a subcube using multiple dimensions.
  • Drill Down: Moving from summarized data to more detailed data.
  • Roll Up: Moving from detailed data to summarized data.
  • Pivot: Rotating the cube to change the data view.

This technique supports faster data analysis, trend identification, and better decision-making.

Enterprise Resource Planning (ERP)

Enterprise Resource Planning (ERP) is an integrated software system connecting all major business functions using a single, shared database. This integration ensures the entire organization operates on real-time, consistent data.

ERP Modules and Features

  • Core Modules: Finance, HR, Production.
  • Extended Modules: CRM, SCM, BI, E-Business.
  • Features: Standardization, automation, and integration across departments.

Advantages of ERP

  1. Organizational Flexibility to support growth.
  2. Improved Quality & Efficiency through standardized, automated workflows.
  3. Better Decision Making due to real-time data and accurate reporting.
  4. Better Customer Service via centralized customer information.
  5. Cost Reduction over time by minimizing waste and duplication.

Limitations of ERP

  1. Requires adapting existing workflows to match ERP's predefined best practices.
  2. Difficult and lengthy implementation (months or years).
  3. High initial costs (software, hardware, training).
  4. Potential failure risks if project management is poor.
  5. Significant employee training required for adaptation.

Common ERP Failures

ERP failures often stem from poor planning or an inability to manage complexity:

  • Lack of Employee Involvement leading to system resistance.
  • Attempting Too Much Too Fast by running all modules simultaneously.
  • Insufficient Training resulting in user errors and data issues.
  • Poor Data Conversion if old data is not cleaned before migration.
  • Inadequate Testing causing bugs and incorrect calculations.
  • Poor Project Management regarding timelines and budgets.
  • No Management Support, causing lower-level employees to ignore the system.

How ERP Works

All departments input data into one central system. ERP instantly updates every related part of the company, providing managers with real-time information for superior decision-making.

Customer Relationship Management (CRM)

Customer Relationship Management (CRM) involves strategies and technologies used to manage customer interactions, aiming to create a 360-degree view of the customer using data from all touchpoints (calls, web, social media).

CRM Types

  • Operational CRM: Supports front-office processes like sales automation, marketing campaigns, and customer service (e.g., FAQs, loyalty programs).
  • Analytical CRM: Uses data warehouses for data mining and business intelligence to analyze customer behavior and patterns.
  • Other Types: On-Demand CRM (cloud-based), Mobile CRM, Open-Source CRM, Social CRM, and Real-Time CRM.

Social Commerce and Computing

Social Commerce

Social commerce is the use of social media platforms for buying and selling, merging social networking with e-commerce.

Benefits

  • Convenience: Quick purchases within social media apps.
  • Personalized Recommendations based on user behavior.
  • Social Proof: Reviews and likes aid purchasing decisions.
  • Direct Interaction with sellers.
  • Increased Reach for businesses and cost-effective marketing.

Risks

  • Fraud and Fake Sellers, leading to non-delivery.
  • Privacy Concerns regarding personal data misuse.
  • Fake Reviews influencing customer choices.
  • Payment Risks from unsafe links.
  • Product Quality Issues where the item differs from the image.

Social Computing

Social Computing involves using social media, user-generated content, and interactive technologies for communication, sharing, and collaboration. It helps businesses create value through social interactions.

Business Applications

  1. Understanding Customer Behaviour through reviews and discussions.
  2. Enhanced Marketing via targeted ads and viral promotions.
  3. Improved Customer Service through instant response to complaints.
  4. Quick Feedback and Product Testing with online users.
  5. Building Brand Awareness and Community via user-generated content.
  6. Better Human Resource Management for recruitment and training.

Electronic Commerce (E-Commerce)

E-Commerce involves buying, selling, transferring, or exchanging products, services, or information through electronic networks like the Internet, enabling global online operations.

Advantages

  • Global Market Reach to national and international customers.
  • Lower Operational Costs by reducing distribution and storage expenses.
  • 24/7 Customer Convenience.
  • Wide Range of Products available for comparison.
  • Fast Information Access regarding product details and reviews.

Limitations

  • Technological Limits: Security standards, network reliability issues, and high initial technology costs.
  • Non-Technological Limits: Perceived lack of security, legal ambiguities, and low local market participation.
  • Product Inspection Issues: Customers cannot physically test items beforehand.
  • Delivery Problems and logistical failures.
  • Fraud and Security Risks, including identity theft.

Cloud Computing Models

Cloud computing delivers computing resources (storage, software, processing) over the Internet, eliminating the need for users to manage physical hardware.

Deployment Models

  • Public Cloud: Shared resources available to the general public; low cost.
  • Private Cloud: Dedicated to a single organization; high security and control.
  • Community Cloud: Shared among organizations with similar requirements.
  • Hybrid Cloud: A combination of two or more cloud types for flexibility.

Service Models

  1. IaaS (Infrastructure as a Service): Provides virtual machines, storage, and networks (Example: Amazon EC2). User controls the OS and applications.
  2. PaaS (Platform as a Service): Provides a platform for application development with necessary tools (Example: Google App Engine). User controls applications.
  3. SaaS (Software as a Service): Provides ready-to-use applications accessed via a web browser (Example: Gmail, Google Docs).

Wired vs. Wireless Media Comparison

FeatureWired (UTP, Coaxial, Fiber)Wireless (Microwave, Radio, Satellite)
MediumPhysical cableAir / radio waves
SpeedVery high (especially fiber)Medium to high
InterferenceLow interferenceHigh interference (weather, walls)
SecurityMore secureLess secure unless encrypted
CostHigher installation costLower installation cost
MobilityDevices fixedHighly mobile

Wireless Media Advantages & Disadvantages

  • Microwave: High bandwidth advantage; requires clear line-of-sight and is affected by weather.
  • Satellite: Very high bandwidth and global coverage advantage; expensive and has signal delay.
  • Radio: Signals pass through walls (good indoor use) advantage; causes electrical interference and is easily intercepted.
  • Infrared: Cheap for short distances advantage; requires line-of-sight and has low to medium bandwidth.

Evolution of Mobile Generations

GenSpeedTechnologyKey Features
1G14.4 KbpsAnalogOnly voice calls
2G9.6–14.4 KbpsTDMA, CDMAVoice + data (SMS)
2.5G / 2.75G171–236 KbpsGPRS / EDGEInternet browsing
3G0.5–3 MbpsCDMA2000, UMTSVideo calling, multimedia
3.5GUp to 7 MbpsHSPAFaster mobile internet
4G100 Mbps–1 GbpsLTE, Wi-FiHD streaming, gaming, video conferencing
5G1–10 GbpsAdvanced LTE, NRUltra high speed, low latency, IoT, smart cities

Transaction Processing Systems (TPS)

A Transaction Processing System (TPS) records, stores, and processes every business transaction, such as sales, payments, and orders.

TPS Flow and Types

  1. Business Event: Example: Cashier scans a product.
  2. Transaction Processing System: Captures and processes the event.
  3. Organization Database: Data is stored securely.
  4. Other Systems Use the Data: FAIS, DSS, BI, ES utilize the stored data.
  5. Detailed Reports Generated: Used for analysis.

Processing Types: Batch Processing (data collected and processed periodically) and OLTP (Online Transaction Processing, where data is processed instantly).

System Development Life Cycle (SDLC)

The System Development Life Cycle (SDLC) is a structured, step-by-step method for developing high-quality information systems.

SDLC Phases

  1. Systems Investigation: Problem identification and feasibility study (technical, economic, behavioural); Go/No-Go decision.
  2. Systems Analysis: Gathering user requirements and understanding data flows; output is the System Requirements Document.
  3. Systems Design: Converting requirements into technical specifications, defining inputs, outputs, and architecture.
  4. Programming & Testing: Coding by programmers; includes unit, system, and integration testing.
  5. Implementation: Converting to the new system using strategies like Direct, Pilot, Phased, or Parallel conversion.
  6. Operation & Maintenance: Fixing bugs, updating features, and adding new modules.

Alternative Development Models

Agile Development

A flexible model building software in small parts called iterations or sprints.

  • Iterative Development: Software built in small pieces every 2–4 weeks.
  • Continuous Feedback: Users review each version for suggestions.
  • Scrum Roles: Scrum Master, Product Owner, and Team Members.
  • Features: Fast delivery, frequent updates, and easy handling of changing requirements.

Rapid Application Development (RAD)

A model focused on quick system development using prototypes and high user involvement.

  • Focus on Fast Development: Emphasizes quick building over lengthy planning.
  • Prototype Creation: A rough system model is built rapidly.
  • User Involvement: Users continuously check and suggest improvements to the prototype.
  • Advantages: Very fast delivery and high user involvement.

Information Ethics and Privacy

Privacy Concerns

Privacy is the right to be free from unnecessary observation and control over personal information collection and use.

Threats to Privacy

  • Electronic Surveillance: Monitoring via smartphones, facial recognition, and geotagging.
  • Personal Information in Databases: Risks of inaccuracy, misuse, or unauthorized data sales.
  • Tracking Through Cookies & Online Tools: Building user profiles shared with advertisers.
  • Data Theft and Hacking: Leading to identity theft and fraud.
  • Workplace Monitoring: Tracking employee emails and activities.

Ethical Frameworks

Ethics involves the moral principles guiding right and wrong behavior in business and technology.

General Ethical Framework

  1. Recognize the Issue.
  2. Get the Facts.
  3. Evaluate Alternative Actions (using utilitarian, rights, fairness approaches).
  4. Make a Decision and Test It.
  5. Act and Reflect on the outcome.

Four Categories of IT Ethical Issues

  • Privacy Issues: Collecting, storing, and sharing personal data.
  • Accuracy Issues: Ensuring stored information is correct.
  • Property Issues: Ownership of digital content and software.
  • Accessibility Issues: Determining who can access information and associated costs.

Rules for Privacy

  • Rule 1: Privacy is not absolute: Individual rights must balance society's needs (e.g., national security).
  • Rule 2: Public's right to know supersedes individual privacy: Information vital for public welfare must be disclosed.

Information Security Controls

Information security controls are measures used to protect organizational data and systems from unauthorized access, damage, or misuse.

  • Physical Controls: Walls, locks, guards, and alarm systems protecting physical IT assets.
  • Access Controls: Authentication (verifying identity via passwords/biometrics) and Authorization (defining user permissions).
  • Communication Controls: Firewalls, encryption, VPNs, and TLS/SSL protecting data during transmission.
  • Business Continuity Planning (BCP): Procedures (backups, recovery) to ensure work continues after disasters.
  • Information Systems Auditing: Systematic examination to ensure controls are effective and policies are followed.

Code of Ethics

A Code of Ethics is a written document outlining the moral standards, rules, and values that guide employee behavior and decision-making.

Purpose of a Code of Ethics

  • Promotes Ethical Behaviour and responsibility.
  • Builds Trust with customers and society.
  • Prevents Misconduct such as fraud and corruption.
  • Protects Company Reputation and goodwill.
  • Provides guidance during complex decision-making situations.

Information System Threats

Information systems face threats that can cause data harm, operational disruption, and financial loss. Threats are classified as non-deliberate (unintentional) or deliberate (intentional).

1. Non-Deliberate Threats (Unintentional)

These arise from accidents, carelessness, or lack of awareness.

  • Human Errors: Poor password use, data mistyping, or leaving systems unattended.
  • Social Engineering: Manipulating employees into revealing confidential data (e.g., fake calls).

2. Deliberate Threats (Intentional)

These are intentional attacks aimed at theft, damage, or misuse.

  • Espionage / Trespass: Unauthorized access to confidential information.
  • Information Extortion: Stealing data and demanding payment for its return.
  • Sabotage / Vandalism: Damaging digital assets or defacing websites.
  • Software Attacks: Viruses, worms, phishing, and Denial of Service (DoS) attacks.
  • Compromise of Intellectual Property: Stealing trade secrets or copyrighted material.
  • Cyberterrorism & Cyberwarfare: Large-scale attacks targeting critical infrastructure.

P2xRnzWVHYp7AAAAAElFTkSuQmCC

APJzg0QKWeJyAAAAAElFTkSuQmCC

qMfMAAAAASUVORK5CYII=

D1Sq+jR4eYxtAAAAAElFTkSuQmCC

VB1KMGDFixIgRI0aMGDFixIgRI0aMzx5iDaQYMWLEiBEjRowYMWLEiBEjRowYH4iYQIoRI0aMGDFixIgRI0aMGDFixIjxgYgJpBgxYsSIESNGjBgxYsSIESNGjBgfiJhAihEjRowYMWLEiBEjRowYMWLEiPGB+P8Dm1RQ7H0e5nYAAAAASUVORK5CYII=

JHf8SIdzJMAAAAAElFTkSuQmCC

5aWFeABN5XWAAAAAElFTkSuQmCC

Related entries: