Introduction to Information Systems

Post on 18-Mar-2016

24 views 5 download

Tags:

description

Introduction to Information Systems. ISYS 363 David Chao. What Is an Information System?. Information system is a collection of components that work together to process data and provide information to help in the operation and management of an organization. - PowerPoint PPT Presentation

transcript

Introduction to Information Systems

ISYS 363

David Chao

What Is an Information System?

• Information system is a collection of components that work together to process data and provide information to help in the operation and management of an organization.

• Information system is an organizational and management solution, based on information technology, to a challenge posed by the environment.

The Fundamental Roles of Information Systems

• Support of business operations• Support of managerial decision making• Support of strategic competitive advantage:

Information systems that give a company a competitive advantage in the market place.– Operational level:

• Travel websites: yahoo vs expedia• Auction: eBay

– Management level:• eBay store, Amazon associates

Fundamental Roles of IS in Business

Types of Information Systems

• Operations Support Systems• Management Support Systems

Operations Support Systems

• What do they do?– Efficiently process business transactions– Control industrial processes– Support communications and collaboration

Types of Operations Support Systems• Transaction Processing Systems

– Record and process business transactions– Large amount of data, high processing speed, high reliability,

accuracy, and security (fault tolerant)– Data: internal, historical, detailed– Examples: sales processing, accounting systems

• Process Control Systems– Monitor and control physical processes– Example: using sensors to monitor chemical processes in a

petroleum refinery• Enterprise Collaboration Systems

– Enhance team and workgroup communication– Examples: email, video conferencing

Two Ways to Process Transactions

• Batch Processing– Accumulate transactions over time and process

periodically– Example: a bank processes all checks received

in a batch at night

• Online Processing– Process transactions immediately– Example: a bank processes an ATM

withdrawal immediately

Management Support Systems

• What do they do?– Provide information and support for effective

decision making by managers

Types of Management Support Systems

• Management Information Systems (MIS)– Reports and displays – Example: daily sales analysis reports

• Decision Support Systems (DSS)– Interactive and ad hoc support– Example: a what-if analysis to determine where to

spend advertising dollars

• Executive Information Systems (EIS)– Critical information for executives and managers– Example: easy access to actions of competitors

Management Information Systems(Information Reporting Systems)

• Facilitate management control by producing summarized reports that compare actual performance against planned performance on a regular and recurring basis.

• Management control: Ensuring that performance meets established standards.

MIS Report Example

Examples:

• Budget control:– http://www.olemiss.edu/projects/sap/REPORT

S_II_Budget_Control_System.pdf• LYTD VS YTD Sales comparison

Sales Comparison

Information and Management Decisions

• A decision is a selection between several courses of action:– Penalty for bad decision

• Information helps reduce uncertainty:– Incomplete information

• Information systems improve decision-making effectiveness by providing decision makers with information related to the decisions for which they are responsible.

Decision Support Systems

• Facilities for assisting decision making.• Structured decision

– The information requirements are known precisely.

– The criteria for making decision are known.– The quality of a decision can be measured

precisely.• Internal and external data

Manager + Computer(DSS)

Solution

ComputerSolution

ManagerSolution

Structured Semistructured Unstructured

DEGREE OF PROBLEM STRUCTUREDEGREE OF PROBLEM STRUCTURE

The DSS Focuses on Semistructured ProblemsThe DSS Focuses on Semistructured Problems

Microsoft/Yahoo

Components of DSS• Database: Current & Historical Data from

Many Sources. – Internal and external data

• Model base: Collection of Mathematical & Analytical Building Blocks

• Interface for analysis: What - If Questions; sensitivity analysis

Using Decision Support Systems

• What-IF Analysis:Observing how changes to selected variables affect other variables.

• Sensitivity Analysis: Observing how repeated changes to a single variable affect other variables.

• Goal-Seeking Analysis:Set a target value for a variable, and then repeatedly changes other variables until the target is achieved.– Example: Benefit.Xls

• Optimization Analysis• Simulation

Other Information Systems• Expert Systems

– Provide expert advice– Knowledge base and rules– Example: Investment Expert System

• http://myweb.lsbu.ac.uk/~canopej/IES/ES.html

• Knowledge Management Systems– Support creation, organization, and dissemination

of business knowledge throughout company– Example: intranet access to best business

practices, FAQ

Other Information Systems

• Functional Business Systems– Focus on operational and managerial

applications of basic business functions– Examples: accounting, finance, or marketing

Components of an Information System

• Information technology• People• Database• Procedure

People

• Information specialists– programmer, system analyst, database

administrator, etc.• End-user:

– Menu-level end users– Command-level end users– End-user programmer

• End-user computing

Ethical Responsibilities

• What uses of IT might be considered improper or harmful to other individuals or society?

• What is the proper business use of the Internet or a company’s IT resources?

• How can you protect yourself from computer crime?

Do you think it is wrong to

• Copy company’s software for use at home?• 35 % say no.

• Use company equipment like computers to search for a new job?

• 34% say no.• Blame your own personal errors on

technological glitches?• 39% say no.

• Use office computers to do personal shopping on the Internet?

• 46% say no.

Workplace PCs May Not Be Very Private

• Don’t be fooled: It may be personal, but it is not private.

• Cyber-surveillance: The person most likely to be spying on you is your boss. 27% of businesses surveyed by the American Management Association said they review employee email.

• Reasons:– Productivity– Liability– Network performance

Detroit Mayor Scandal and Privacy

• Use city-issued pager• Communications are stored for legal

reasons.• "There's absolutely no expectation of privacy

with phones, e-mails, text messages or computers," expert said.

• Comment: HOW IN THE WORLD DIDTHE PRESS DIG UP TEXT MESSAGES FROM 2001? AND IF THEY CAN DO THAT FOR HIM... THEN WHAT ABOUT OUR PRIVACY RIGHTS AS WELL.. BECAUSE THAT SHOULD BE PROTECTED..IF WE ARE TALKING ON OUR PHONES OR TEXTING..OMG!!!!!!!!

Database

• A group of related files– Support business operations– Provide information

An example of database application

LuckyMarket presents another great way to save with your LuckyMarket Rewards Card! You can get up to 4 FREE movie tickets!

From Feb. 01 through June 9, 2007, use your LuckyMarket Rewards Card every time you shop at Lucky. When you accumulate between $250 - $399.99 in groceries during the qualifying period, you get 2 FREE movie tickets! And if you purchase $400 or more during the same period you get 4 FREE movie tickets!

BART Tries Pay-By-Phone Systemhttp://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2008/01/30/BUPEUODJN.DTL&type=tech

• A contact-free cell phone payment program – puts a chip inside a phone, eliminating the

need for additional cards. – lets people pay by passing their phone over a

wireless reader.

Major Functions of Database Management

• Creating a database– Analysis: Entity-Relationship Diagram– Design: Design file structure– Implementation

• Accessing a database• Updating a database

Database Security

• Logical protection:– Illegal access– Illegal update– Virus

• Physical protection

Internet firms flocks to store data in blast-proof bunker

• Some biggest companies are running their Internet operations on systems installed in a 300-foot-deep nuclear blast-proof bunker.

Procedures• Procedure: A step-by-step process or a

set of instructions for accomplishing specific results.– Operations– Backup and Recovery– Security– Development

• Operations Procedure: A procedure that describes how a computer system or application is used, how often it can be used, who is authorized to use it, and where the results of processing should go.

• Backup Procedure: A procedure that describes how and when to make extra copies of information or software to protect against losses.– http://www.tldp.org/LDP/lame/LAME/linux-

admin-made-easy/server-backup.html• Recovery Procedure: An action taken when

information or software must be restored.• Security Procedure: A procedure designed to

safeguard data centers, communications networks, computers, and other IT components from accidental intrusion or intentional damage.

• Development Procedure: A procedure that explains how IT professionals should describe user needs and develop applications to meet those needs.

Measuring IS Success

• Efficiency– Minimize cost, time, and use of information

resources

• Effectiveness– Support business strategies– Enable business processes– Enhance organizational structure and culture– Increase customer and business value