Professional Documents
Culture Documents
Study Questions
Q1: What is a computer network? Q2: What are the components of a LAN? Q3: What are the fundamental concepts you should know about the Internet? Q4: What processing occurs on a typical Web server? Q5: Why is the cloud the future for most organizations? Q6: How can organizations use the cloud? Q7: 2022?
Copyright 2013 Pearson Education, Inc. Publishing as Prentice Hall
LAN Protocol
IEEE 802.3
Wired LAN 10/100/1000 Mbps Ethernet
IEEEE 802.11
Wireless LAN 802.11n Bluetooth
Copyright 2013 Pearson Education, Inc. Publishing as Prentice Hall
Connecting to an ISP
Q3: What Are the Fundamental Concepts You Should Know About the Internet?
IP Addressing
Public IP Addresses
Identify a particular device on public Internet Public IP addresses must be unique, worldwide Assignment controlled by ICANN (Internet Corporation for Assigned Names and Numbers)
Private IP Addresses
Identify a particular device on a private network
Major benefits
1. Public IP: All devices on LAN share a public IP address.
2. Private IP address, need not register computer with ICANN-approved agencies.
Copyright 2013 Pearson Education, Inc. Publishing as Prentice Hall
Q7: 2022?
Cloud computing benefit Individuals on iCloud Small groups using Office 365 Startups Using PaaS Huge organizations using IaaS New categories of products and services Create new jobs? Tele-action Telediagnosis, telesurgery, telelaw enforcement
Copyright 2013 Pearson Education, Inc. Publishing as Prentice Hall
Active Review
Q1: What is a computer network? Q2: What are the components of a LAN? Q3: What are the fundamental concepts you should know about the Internet? Q4: What processing occurs on a typical Web server? Q5: Why is the cloud the future for most organizations? Q6: How can organizations use the cloud? Q7: 2022?
Copyright 2013 Pearson Education, Inc. Publishing as Prentice Hall
Study Questions
Q1: What are the basic types of structured processes? Q2: How can information systems improve process quality? Q3: How do enterprise systems eliminate problems of information silos? Q4: How do CRM, ERP, and EAI support structured enterprise processes? Q5: What are the elements of an ERP System? Q6: What are the challenges of implementing enterprise systems? Q7: How will service-oriented architecture impact enterprise information systems? Q8: 2022?
Islands of Automation
Q3: How Do Enterprise Systems Eliminate Information Silo Problems? How Do Information System Silos Arise? Data isolated in islands of automation Different department goals Different personal and workgroup needs Duplicate data as organization grows
CRM Applications
Q6: What Are the Challenges When Implementing New Enterprise Systems?
Four Primary Factors Collaborative management Requirements gaps Transition problems Employee resistance due to threats to selfefficacy
What Is SOA?
Web service Encapsulated software service provided anywhere over the Internet Service description documents how to use service, and publishes description using Web Service Description Language (WSDL) Services delivered via XML, SOAP, REST, et al. Used by SAP, Oracle ERP
Copyright 2013 Pearson Education, Inc. Publishing as Prentice Hall
Q8: 2022?
Islands of Automation, Version 2.0 Storing of data in various places in the iCloud, while other versions of data stored in corporate data in SAP Version 2.0 silos more isolated and less secure than previous silos
Active Review
Q1: What are the basic types of structured processes? Q2: How can information systems improve process quality? Q3: How do enterprise systems eliminate problems of information silos? Q4: How do CRM, ERP, and EAI support structured enterprise processes? Q5: What are the elements of an ERP System? Q6: What are the challenges of implementing enterprise systems? Q7: How will service oriented architecture impact Enterprise Information Systems? Q8: 2022?
Study Questions
Q1: What is a social media information system (SMIS)? Q2: How do SMIS advance organizational strategy? Q3: How do SMIS increase social capital? Q4: What roles do SMIS play in the hyper-social organization? Q5: How do organizations use Web 2.0? Q6: How can organizations manage the risks of social media and Web 2.0? Q7: 2022?
Copyright 2013 Pearson Education, Inc. Publishing as Prentice Hall
Example of a Mashup
Q6: How Can Organizations Manage the Risks of Social Media and Web 2.0 Applications?
Six guiding principles to employees: 1. Stick to your area of expertise. 2. Post meaningful, respectful comments. 3. Pause and think before posting 4. Respect proprietary information and content, and confidentiality. 5. When disagreeing with others, keep it appropriate and polite. 6. Know and follow company code of conduct and privacy policy.
Copyright 2013 Pearson Education, Inc. Publishing as Prentice Hall
Q7: 2022?
GPS devices in consumer products?
How to harness employee social behavior and partners to foster company strategy
Active Review
Q1: What is a social media information system (SMIS)? Q2: How do SMIS advance organizational strategy? Q3: How do SMIS increase social capital? Q4: What roles do SMIS play in the hyper-social organization? Q5: How do organizations use Web 2.0? Q6: How can organizations manage the risks of social media and Web 2.0? Q7: 2022?
Copyright 2013 Pearson Education, Inc. Publishing as Prentice Hall
Study Questions
Q1: How do organizations use business intelligence (BI) systems? Q2: What are the three primary activities in the BI process? Q3: How do organizations use data warehouses and data marts to acquire data? Q4: How do organizations use typical reporting applications? Q5: How do organizations use typical data mining applications? Q6: What is the role of knowledge management systems? Q7: What are the alternatives for publishing business intelligence? Q8: 2022?
Copyright 2013 Pearson Education, Inc. Publishing as Prentice Hall
Q2: What Are the Three Primary Activities in the Business Intelligence Process?
Publish Results
Options Print and distribute via email or collaboration tool Publish on Web server or SharePoint Publish on a BI server Automate results via Web service
Q3: How Do Organizations Use Data Warehouses and Data Marts to Acquire Data?
Why extract operational data for BI processing? Security and control Operational not structured for BI analysis BI analysis degrades operational server performance
Figure 9-17
Supervised
Model created before analysis Hypotheses created before analysis
Neural Networks
Used for predicting values and making classifications Complicated set of nonlinear equations Go to http://kdnuggets.com and search for neural network
Decision Rules
If student is a junior and works in a restaurant, then predict grade > 3.0. If student is a senior and is a nonbusiness major, then predict grade 3.0. If student is a junior and does not work in a restaurant, then predict grade 3.0. If student is a senior and is a business major, then make no prediction.
Expert Systems
Encode human knowledge as Rule-based systems (IF/THEN)
Q8: 2022
Companies will know more about your purchasing habits and psyche. Social singularity machines can build their own information systems. Will machines possess and create information for themselves?
Active Review
Q1: How do organizations use business intelligence systems? Q2: What are the three primary activities in the business intelligence process? Q3: How do organizations use data warehouses and data marts to acquire data? Q4: How do organizations use typical reporting applications? Q5: How do organizations use typical data mining applications? Q6: What is the role of knowledge management systems? Q7: What are the alternatives for publishing business intelligence? Q8: 2022?
Using MIS 5e Chapter 10 Business Process and Information Systems Development by David Kroenke
Youre Not Going to Take Your Vera Wang Gown into a Porta Potty.
Bathrooms not cleaned on busy Saturdays or repaired on weekends Plumbing not designed for large crowds Didnt think through consequences of wedding events business. Didnt know how wedding business would impact everything else. Business analyst, Laura, hired to help
Study Questions
Q1: Why do organizations need to manage business processes? Q2: What are the stages of Business Process Management (BPM)? Q3: How can BPMN process diagrams help identify and solve process problems? Q4: Which comes first, business processes or information systems? Q5: What are systems development activities? Q6: Why are business processes and systems development difficult and risky? Q7: What are the keys for successful process and systems development projects? Q8: 2022?
Q1: Why Do Organizations Need to Manage Business Processes? Reasons for change
1. Improve process quality 2. Change in technology 3. Change in business fundamentals
Market Product lines Supply chain Company policy Company organization Internationalization Business environment
Q3: How Can BPMN Process Diagrams Help Identify and Solve Process Problems?
In practice:
Organizations take both approaches
Off-the-shelf software:
Start with business processes and select application that works for those processes
use in deciding its development strategy. 2. Score Alternatives AC based on your criteria. 3. Recommend a course of action for Fox Lake to take. Justify your recommendation. 4. Present your recommendation to the rest of the class.
Q6: Why Are Business Processes and Systems Development Difficult & Risky?
Q7: What Are the Keys for Successful Process and Systems Development Projects?
Create a work-breakdown structure (WBS)
Break project into smaller tasks until each task is small enough to estimate and manage Every task results in deliverables
Estimate time and costs Create a project plan Adjust the plan via trade-offs Manage development challenges
Create a Project Plan: Gantt Chart with Assigned Resources & Critical Path
Q8: 2022?
1. Users more knowledgeable and demanding 2. More agile systems using SOA and other techniques 3. More Cloud-based development 4. Emergence of new software vendor business models
Active Review
Q1: Why do organizations need to manage business processes? Q2: What are the stages of Business Process Management (BPM)? Q3: How can BPMN process diagrams help identify and solve process problems? Q4: Which comes first, business processes or information systems? Q5: What are systems development activities? Q6: Why are business processes and systems development difficult and risky? Q7: What are the keys for successful process and systems development projects? Q8: 2022?
Copyright 2013 Pearson Education, Inc. Publishing as Prentice Hall
Chapter 12-2
Study Questions
Q1: What is the goal of information systems security? Q2: How should you respond to security threats? Q3: How should organizations respond to security threats? Q4: What technical safeguards are available? Q5: What data safeguards are available?
Chapter 12-3
Chapter 12-4
Examples of Threat/Loss
Chapter 12-5
Human Error
Chapter 12-6
Chapter 12-7
Chapter 12-8
Faulty Service
Incorrect data modification Systems working incorrectly Procedural mistakes Programming errors IT installation errors Usurpation Denial of service (unintentional) Denial-of-service attacks (intentional)
Copyright 2013 Pearson Education, Inc. Publishing as Prentice Hall
Chapter 12-9
Loss of Infrastructure
Human accidents Theft and terrorist events Disgruntled or terminated employees Natural disasters
Chapter 12-10
Chapter 12-11
Chapter 12-12
Chapter 12-13
Using MIS InClass 12: Phishing for Credit Cards, Identifying Numbers, Bank Accounts
In this exercise, you and a group of your fellow students will investigate phishing attacks. Search the Web for phishing, be aware that your search may bring the attention of an active phisher. Therefore, do not give any data to any site that you visit as part of this exercise!
Chapter 12-14
Chapter 12-15
Chapter 12-16
Managing Risks
Risk threats & consequences we know about Uncertainty things we do not know that we do not know
Chapter 12-17
Chapter 12-18
Chapter 12-19
Chapter 12-20
Chapter 12-21
Wireless Access
VPNs and special security servers WEP (Wired-Equivalent Privacy) WPA, WPA2 (WiFI Protected Access)
Copyright 2013 Pearson Education, Inc. Publishing as Prentice Hall
Chapter 12-22
Chapter 12-23
Chapter 12-24
Chapter 12-25
Malware Safeguards
1. 2. 3. 4. Antivirus and antispyware programs Scan frequently Update malware definitions Open email attachments only from known sources 5. Install software updates 6. Browse only reputable Internet neighborhoods
Chapter 12-26
Chapter 12-27
Chapter 12-28
Chapter 12-29
Chapter 12-30
Account Administration
Account Management Standards for new user accounts, modification of account permissions, removal of unneeded accounts. Password Management Users should change passwords frequently Help Desk Policies
Chapter 12-31
Chapter 12-32
Systems Procedures
Chapter 12-33
Chapter 12-34
Chapter 12-35
Chapter 12-36
Q7: 2022?
Challenges likely to be iOS and other intelligent portable devices Harder for the lone hacker to find vulnerability to exploit Continued investment in safeguards Continued problem of electronically porous national borders
Chapter 12-37
Active Review
Q1: What is the goal of information systems security? Q2: How should you respond to security threats? Q3: How should organizations respond to security threats? Q4: What technical safeguards are available? Q5: What data safeguards are available?
Chapter 12-38
Chapter 12-39
Chapter 12-40
Chapter 12-41
Chapter 12-42