Introduction to Information Systems
ISYS 363
David Chao
What Is an Information System?
• Information system is a collection of components that work together to process data and provide information to help in the operation and management of an organization.
• Information system is an organizational and management solution, based on information technology, to a challenge posed by the environment.
The Fundamental Roles of Information Systems
• Support of business operations• Support of managerial decision making• Support of strategic competitive advantage:
Information systems that give a company a competitive advantage in the market place.– Operational level:
• Travel websites: yahoo vs expedia• Auction: eBay
– Management level:• eBay store, Amazon associates
Fundamental Roles of IS in Business
Types of Information Systems
• Operations Support Systems• Management Support Systems
Operations Support Systems
• What do they do?– Efficiently process business transactions– Control industrial processes– Support communications and collaboration
Types of Operations Support Systems• Transaction Processing Systems
– Record and process business transactions– Large amount of data, high processing speed, high reliability,
accuracy, and security (fault tolerant)– Data: internal, historical, detailed– Examples: sales processing, accounting systems
• Process Control Systems– Monitor and control physical processes– Example: using sensors to monitor chemical processes in a
petroleum refinery• Enterprise Collaboration Systems
– Enhance team and workgroup communication– Examples: email, video conferencing
Two Ways to Process Transactions
• Batch Processing– Accumulate transactions over time and process
periodically– Example: a bank processes all checks received
in a batch at night
• Online Processing– Process transactions immediately– Example: a bank processes an ATM
withdrawal immediately
Management Support Systems
• What do they do?– Provide information and support for effective
decision making by managers
Types of Management Support Systems
• Management Information Systems (MIS)– Reports and displays – Example: daily sales analysis reports
• Decision Support Systems (DSS)– Interactive and ad hoc support– Example: a what-if analysis to determine where to
spend advertising dollars
• Executive Information Systems (EIS)– Critical information for executives and managers– Example: easy access to actions of competitors
Management Information Systems(Information Reporting Systems)
• Facilitate management control by producing summarized reports that compare actual performance against planned performance on a regular and recurring basis.
• Management control: Ensuring that performance meets established standards.
MIS Report Example
Examples:
• Budget control:– http://www.olemiss.edu/projects/sap/REPORT
S_II_Budget_Control_System.pdf• LYTD VS YTD Sales comparison
Sales Comparison
Information and Management Decisions
• A decision is a selection between several courses of action:– Penalty for bad decision
• Information helps reduce uncertainty:– Incomplete information
• Information systems improve decision-making effectiveness by providing decision makers with information related to the decisions for which they are responsible.
Decision Support Systems
• Facilities for assisting decision making.• Structured decision
– The information requirements are known precisely.
– The criteria for making decision are known.– The quality of a decision can be measured
precisely.• Internal and external data
Manager + Computer(DSS)
Solution
ComputerSolution
ManagerSolution
Structured Semistructured Unstructured
DEGREE OF PROBLEM STRUCTUREDEGREE OF PROBLEM STRUCTURE
The DSS Focuses on Semistructured ProblemsThe DSS Focuses on Semistructured Problems
Microsoft/Yahoo
Components of DSS• Database: Current & Historical Data from
Many Sources. – Internal and external data
• Model base: Collection of Mathematical & Analytical Building Blocks
• Interface for analysis: What - If Questions; sensitivity analysis
Using Decision Support Systems
• What-IF Analysis:Observing how changes to selected variables affect other variables.
• Sensitivity Analysis: Observing how repeated changes to a single variable affect other variables.
• Goal-Seeking Analysis:Set a target value for a variable, and then repeatedly changes other variables until the target is achieved.– Example: Benefit.Xls
• Optimization Analysis• Simulation
Other Information Systems• Expert Systems
– Provide expert advice– Knowledge base and rules– Example: Investment Expert System
• http://myweb.lsbu.ac.uk/~canopej/IES/ES.html
• Knowledge Management Systems– Support creation, organization, and dissemination
of business knowledge throughout company– Example: intranet access to best business
practices, FAQ
Other Information Systems
• Functional Business Systems– Focus on operational and managerial
applications of basic business functions– Examples: accounting, finance, or marketing
Components of an Information System
• Information technology• People• Database• Procedure
People
• Information specialists– programmer, system analyst, database
administrator, etc.• End-user:
– Menu-level end users– Command-level end users– End-user programmer
• End-user computing
Ethical Responsibilities
• What uses of IT might be considered improper or harmful to other individuals or society?
• What is the proper business use of the Internet or a company’s IT resources?
• How can you protect yourself from computer crime?
Do you think it is wrong to
• Copy company’s software for use at home?• 35 % say no.
• Use company equipment like computers to search for a new job?
• 34% say no.• Blame your own personal errors on
technological glitches?• 39% say no.
• Use office computers to do personal shopping on the Internet?
• 46% say no.
Workplace PCs May Not Be Very Private
• Don’t be fooled: It may be personal, but it is not private.
• Cyber-surveillance: The person most likely to be spying on you is your boss. 27% of businesses surveyed by the American Management Association said they review employee email.
• Reasons:– Productivity– Liability– Network performance
Detroit Mayor Scandal and Privacy
• Use city-issued pager• Communications are stored for legal
reasons.• "There's absolutely no expectation of privacy
with phones, e-mails, text messages or computers," expert said.
• Comment: HOW IN THE WORLD DIDTHE PRESS DIG UP TEXT MESSAGES FROM 2001? AND IF THEY CAN DO THAT FOR HIM... THEN WHAT ABOUT OUR PRIVACY RIGHTS AS WELL.. BECAUSE THAT SHOULD BE PROTECTED..IF WE ARE TALKING ON OUR PHONES OR TEXTING..OMG!!!!!!!!
Database
• A group of related files– Support business operations– Provide information
An example of database application
LuckyMarket presents another great way to save with your LuckyMarket Rewards Card! You can get up to 4 FREE movie tickets!
From Feb. 01 through June 9, 2007, use your LuckyMarket Rewards Card every time you shop at Lucky. When you accumulate between $250 - $399.99 in groceries during the qualifying period, you get 2 FREE movie tickets! And if you purchase $400 or more during the same period you get 4 FREE movie tickets!
BART Tries Pay-By-Phone Systemhttp://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2008/01/30/BUPEUODJN.DTL&type=tech
• A contact-free cell phone payment program – puts a chip inside a phone, eliminating the
need for additional cards. – lets people pay by passing their phone over a
wireless reader.
Major Functions of Database Management
• Creating a database– Analysis: Entity-Relationship Diagram– Design: Design file structure– Implementation
• Accessing a database• Updating a database
Database Security
• Logical protection:– Illegal access– Illegal update– Virus
• Physical protection
Internet firms flocks to store data in blast-proof bunker
• Some biggest companies are running their Internet operations on systems installed in a 300-foot-deep nuclear blast-proof bunker.
Procedures• Procedure: A step-by-step process or a
set of instructions for accomplishing specific results.– Operations– Backup and Recovery– Security– Development
• Operations Procedure: A procedure that describes how a computer system or application is used, how often it can be used, who is authorized to use it, and where the results of processing should go.
• Backup Procedure: A procedure that describes how and when to make extra copies of information or software to protect against losses.– http://www.tldp.org/LDP/lame/LAME/linux-
admin-made-easy/server-backup.html• Recovery Procedure: An action taken when
information or software must be restored.• Security Procedure: A procedure designed to
safeguard data centers, communications networks, computers, and other IT components from accidental intrusion or intentional damage.
• Development Procedure: A procedure that explains how IT professionals should describe user needs and develop applications to meet those needs.
Measuring IS Success
• Efficiency– Minimize cost, time, and use of information
resources
• Effectiveness– Support business strategies– Enable business processes– Enhance organizational structure and culture– Increase customer and business value