You are on page 1of 45

Chapter 1

The Importance of MIS

This could happen to you!

1-2

But Today, Theyre Not Enough.


Jennifer lacks skills GearUp needs
1. Abstract reasoning skills
2. Systems thinking skills
3. Collaboration skills
4. Experimentation skills

1-3

Reichs four skills


Robert Bernard Reich (/ra/;[1]
born June 24, 1946) is an
American political economist,
professor, author, and political
commentator. He served in the
administrations of Presidents
Gerald Ford and Jimmy Carter
and was Secretary of Labor
under President Bill Clinton from
1993 to 1997.

1-4

Study Questions
Q1: Why is Introduction to MIS the most
important class in the business school?
Q2: What is an information system?
Q3: What is MIS?
Q4: Why is the difference between
information technology and information
systems important to you?
Q5: What is your role in IS security?

1-5

Q1: Why Is Introduction to MIS the Most


Important Class in the Business School?
Number of transistors per square inch on an
integrated chip doubles every 18 months
Speed of computer chip increases in
proportion to density of transistors
Price/performance ratio falls dramatically

1-6

Transistor?

1-7

Computer Price/Performance Ratio


Decreases

1-8

All of These Companies Exist Because


of Moores Law

Cost of
data
communications
and data storage
essentially zero

YouTube
iPhone
Facebook
Second Life
Pandora
Twitter
LinkedIn

1-9

What Are Cost-Effective Business


Applications of Facebook and Twitter or
Whatever Will Soon Appear?
Are these applications cost-effective?
Do they generate revenue worth the time
and expense of running them?
Future business professionals need to
assess, evaluate, and apply emerging
information technology to their business
to gain a competitive advantage
1-10

1-11

Technology trends impacting the


way we work
Mobile
By

2016

Social
,

smartphones and
tablets will put power in
the pockets of

a billion

global

consumers.

The worlds mobile


worker population
will reach

1.3 billion
over 37% of the total
workforceby 2015.

Cloud

80%

Millennials
will make up

75%

of

2025

of companies
are deploying at
least one

social
software
tool.

of

new apps will


be distributed
or deployed on
clouds in
2012.

the American
workforce by

65%

Over

70%

of organizations are
either using or
investigating

cloud
computing
solutions

Big
data

Digital content will grow


to 2.7ZB in 2012,
up 48% from 2011,
rocketing toward
8ZB by 2015.

80%
growth of
unstructured data is
predicted
over the next five
years.

How Can I Attain Job Security?


Only job security exists that is a marketable skill
and the courage to use it
Knowledge and skills are your job security
What skills will be marketable?
Ability to cope with rapid technological change
Develop non-routine cognitive skills and ability.
Organizations favor those with strong non-routine
cognitive skills

How Can I Attain Job Security? (cont'd)


Knowledge gained in this course will help you
attain skills that lead to greater job security.

1-14

Why Jennifer Lost Her Job

1-15

How Can Intro to MIS Help You Learn


Non-Routine Skills?
Abstract Reasoning
Chapter 1: Model of an information system
Chapter 2: How to use IS model to assess
scope of any new information system
project
Chapter 5: How to create data models
Chapter 7: How to make process models

1-16

Model?

1-17

How Can Intro to MIS Help You Learn


Non-Routine Skills? (contd)
Systems Thinking
Ability to model system components,
connect inputs and outputs among
components to reflect structure and
dynamics of system observed
Every chapter, especially Ch. 27 and 10

1-18

How Can Intro to MIS Help You Learn


Non-Routine Skills? (contd)
Collaboration
Activity of two or more people working
together to achieve a common goal, result,
or work product
Chapter Extensions 2A and 2B discuss
collaboration skills and illustrate several
sample collaboration information systems

1-19

How Can Intro to MIS Help You Learn


Non-Routine Skills? (contd)
Ability to Experiment
Making a reasoned analysis of an opportunity, envisioning
potential solution, evaluating those solutions, developing
the most promising ones, consistent with the resource you
have
Fear of failure paralyzes many good people/ ideas
Ive never done this before.
I dont know how to do it.
But will it work?
Is it too weird for the market?

1-20

Job Growth over the Past Twenty Years

1-21

What is the Bottom Line?


1. It gives you the background to assess, evaluate, and
apply emerging information systems technology to
business.
2. Help you learn abstraction, systems thinking,
collaboration, and experimentation.
3. There is strong growth in the number of available jobs
for those with strong cognitive skills.
4. Read Ethics Guides about ethical dilemmas.

1-22

Q2: What Is an Information System?


Group of components that interact to
produce information.

1-23

Experiencing MIS InClass Exercise 1:


Information Systems and Online Dating
Basis

Companies

Theory of relationships:
personality, compatibility, etc.

Chemistry
eHarmony
PerfectMatch
Plenty of Fish

Political interests

ConservativeDates
Liberalhearts

Common social/economic
interests

GoodGenes
MillionaireMatch

Common activity interests

Golfmates
EquestrianCupid
CowboyCowgirl
Single Firefighters
Asexual Pals
1-24

Q3: What Is MIS?


1. Development and use of information
systems
2. Achieve business goals and objectives
Goal of MIS
Aligning IS to achieve business
goals and objectives

1-25

What Is MIS (contd)


Management
Means develop, maintain, and adapt
To create an information system that meets
your needs, take an active role in systems
development. Why?
Business professionals understand
business needs and requirements.

1-26

Development and Use of Information


Systems
Business professionals need to:
Take active role in IS to ensure systems meet their
needs
Understand how information systems are
constructed
Consider users needs during development
Learn how to use information systems
Take into account ancillary IS functions (security,
backups)

1-27

Achieving Strategies
MIS empowers users to achieve business
objectives
Information systems exist to assist
business people
Information systems exist to help achieve
business goals and objectives

1-28

Q4: Why Is the Difference Between


Information Technology and
Information Systems Important to You?
Information technology (IT)
1.
2.
3.
4.

Products
Methods
Inventions
Standards

. IT components = Hardware + Software + Data


. IS = IT + Procedures + People

1-29

Why Is the Difference Between Information


Technology and Information Systems
Important to You? (contd)
Avoid a common mistake: Cannot buy an IS
Can buy, rent or lease hardware, software and
databases, with predesigned procedures.
People execute procedures to employ new IT.
Use of new system requires training, overcoming
employees resistance, and managing
employees as they use new system.

1-30

Q5: What Is Your Role in IS Security?


Security systems have five components,
including people.
Security system ultimately depends on
behavior of its users.
If security procedures are not followed, then
hardware, software, and data components
of security system are wasted expense.

1-31

Passwords Are Necessary


Should have a strong password
Protect passwords from others (critical)
Practice proper etiquette
Never write down your password
Do not share it with others
Never ask others for their password

1-32

Creating a Strong Password


Rules for strong password:
Use ten or more characters
Do not include your user name, real name, or company
name
Do not use complete dictionary word in any language
Is different from previous passwords you have used
Contains both upper- and lowercase letters, numbers,
and special characters (such as ~ ! @; # $ % ^; &; * ( )
_ +; =; { } | [ ] \ : ; <; >;? , . /)

Copyright 2014 Pearson Education, Inc. Publishing As Prentice Hall

1-33

Password Etiquette: Mark of a Business


Professional
Never write down your password, do not
share it with others
Never ask others for their password
Never give your password to someone else
do-si-do moveone person getting out of
way so another person can enter a password
common professional practice

Copyright 2014 Pearson Education, Inc. Publishing As Prentice Hall

1-34

How Does the Knowledge in This


Chapter Help You?
Learn Reichs four key skills: abstract
reasoning, systems thinking,
experimentation, and collaboration. Then,
practice, practice, practice.
Future belongs to businesspeople who can
creatively envision new applications of
information systems and technology.

Copyright 2014 Pearson Education, Inc. Publishing As Prentice Hall

1-35

How Does the Knowledge in This


Chapter Help You? (contd)
Learn IS components and understand
business professionals need to take active
role in information systems development
Know difference between IT and IS
Create strong passwords, use them and
follow professional password etiquette

Copyright 2014 Pearson Education, Inc. Publishing As Prentice Hall

1-36

Ethics Guide: Ethics of Misdirected


Information Use
You overhear a conversation between a real
estate agent and the couple competing with you
to purchase a condo.
Should you listen?
Should you use the information you hear?

You receive same information above through an


email accidentally sent to your inbox.
Should you read the email?
Should you use the information to your
advantage?

1-37

Ethics Guide: Ethics of Misdirected


Information Use (contd)
1. While selling computer software, a customer
mistakenly sends you an internal email that contains
maximum amount they can pay.
Q: Do you share the email with others?
Q: Do you notify the person who sent it?
Q: Do you use the information or recuse yourself from
the deal?
Q: Whats the ethical thing to do? Whats the best longterm business thing to do? Explain.

1-38

Ethics Guide: Ethics of Misdirected


Information Use (contd)
2. A friend inadvertently emails you personal
medical data. You read the email and learn
embarrassing information about the friend.
Your friend asks if you read the email.
Q: What should you say?

1-39

Ethics Guide: Ethics of Misdirected


Information Use (contd)
3. You are a network administrator with
unrestricted access to mailing lists. You
insert your email address into several lists
and receive confidential information. One
email shows that your best friends
department is going to be eliminated.
Q: Do you warn your friend?

1-40

Five-Component Careers

1-41

Active Review
Q1: Why is Introduction to MIS the most important
class in the business school?
Q2: What is an information system?
Q3: What is MIS?
Q4: Why is the difference between information
technology and information systems important to
you?
Q5: What is your role in IS security?

Copyright 2014 Pearson Education, Inc. Publishing As Prentice Hall

1-42

Case Study 1: The Amazon of


Innovation

Copyright 2014 Pearson Education, Inc. Publishing As Prentice Hall

1-43

Case Study 1: The Amazon of


Innovation (cont'd)
Amazons business lines three categories:
1. Online retailing
Own inventory
Associates program
Consignment
2. Order fulfillment
3. Cloud services

Copyright 2014 Pearson Education, Inc. Publishing As Prentice Hall

1-44

1-45

You might also like