Professional Documents
Culture Documents
Overview
Organisations use computers and information systems to reduce costs and gain a competitive
advantage.
Help be more effective and productive.
The process generates the most useful type of information for decision making, including
transaction processing reports and models for decision making.
Information consists of facts that have been analyzed by the process component and is an
output of an information system.
Data
o The data component in considered the input to the system. The information users need
affect the type of data. Two sources of data are internal which includes sale records,
personnel records etc. and external which include customers, competitors, suppliers,
government, financial institutions, labor and population stats and economic conditions.
o Is the heart of an information system, collection of all relevant data organized in a series
of integrated files.
Process
o The includes transaction processing reports and models of decision analysis that can be
built in or assessed externally.
o Should grow with the organize so that they can redefine and restructure models to
incorporate new information in their analysis.
Information
o Consists of facts that have been analyzed by the process component and are more
useful to the MIS user.
o The quality of the system is determined by its usefulness and the usefulness determines
the success of the system. To be useful, information must have qualities:
Timeliness
Relevance
o Systems user interface must be flexible and easy to use. GUI (graphical user interface)
has features such as menus and buttons and must present information in different
formats including graphs and tables.
Information systems are designed to collect data, process the collected data and deliver useful
information and to achieve this goal, information systems use different information technologies. For
example: internet for worldwide communication, computer networks, database systems, POS systems
and radio-frequency-identification RFID
The importance of information systems
Information is the second most important resource in an organization after human resources.
o Manpower
o Machinery
o Materials
o Money
To manage these resources different types of information systems have been developed.
Or human resource information system (HRIS) helps carry out their tasks. Web
technologies have played a major roles in improving HR departments e.g
intranets SAP
Supports actions like choosing the best candidate for the job / scheduling and
assigning employees / predict personnel needs / stats on employee
demographics / allocate human and financial resources.
Supports analyses market share, sales and personnel / sales forecast / price and
cost analysis
Information technologies can help bottom line and top line strategies.
Improve efficiency by reducing overall costs and generate revenue top line strategy.
Analyzing an organization, its position in the market place and how information systems could
be used to make it more competitive
Potential
Potential
Entrants
Entrants
Industry
Industry
competitors
competitors
Suppliers
Suppliers Buyers
Buyers
Rivalry
Rivalry
Threat of substitute
products
Suppliers bargaining Buyers bargaining
power power
Substitutes
Substitutes
Buyer power is high when customers have many choices, low when they have few choices.
Businesses use the differentiation strategy which limits the buyer making it difficult to switch.
Shops offer club card discounts an example of overall cost leadership strategies. By using the
strategies, organizations aim to combat threats by increasing customer loyalty.
Supplier power is the opposite of buying power – high when customers have few options and
low when they have more options.
Threat of substitutes is high when there are many alternatives to the products.
Rivalry among existing competitors is high when many competitors occupy the same market
place position; it is low when there are few competitors.
Future outlooks
Hardware and software costs will decline so processing information will be less expensive
Technologies will continue to improve and expand which will impact information systems.
Computer literacy of users will improve
Networking technology will improve making connectivity easier and sending information faster.
CHAPTER 2 – Computers
Defining a computer
a computer is a machine that accepts data as input, processes data without human intervention
by using stored instructions and outputs information.
The instructions also called a “program” is the step-by-step directions for performing a specific
task, written in a language the computer understands.
A computer only processes RAW data – it cannot correct or change any data that is entered.
GIGO – garbage in garbage out – if incorrect data is inserted then the computer provides
incorrect data as well.
To write a program – you need to know what needs to be done – plan a method to achieving the
goal – select the right language.
Write a program – also referred to as a source code. The source code must be translated into
object code – binary 1’s and 0’s. binary code is a set of instructions used to control the
computer and uses 1’s and 0’s which the computer understands as on or off signals.
Some have a single processor and some have multiple processors called multiprocessors.
Multiprocessors use two or more CPU’s in a single computer system. They have better
performance.
Dual-core processors – uses two processors in one to improve processing power. Common in
PC’s and apple.
BUS – link between devices connected to the computer. A bus can be parallel or serial, internal
or external. An internal bus enables communication between internal components such as video
card and memory. An external bus is capable of communicating with external devices such as a
USB (universal serial bus) device.
SERIAL PORT – is a communication interface where information is transferred one bit at a time.
PARALLEL PORT – interface between a computer and print and the computer transfers multiple
bits of information to the printer simultaneously.
A computer consists of hardware and software. Hardware components are physical devices such
as keyboards monitors and processing units. Software components are programs written in
computer languages.
CPU – CENTRAL PROCESSING UNIT – the heart of the computer divided into 2:
o CONTROL UNIT – tells the computer what to do such as which device to read or send
output to.
CPU CASE - computer chasis or tower. It is the enclosure containing the computers main
components.
MOTHERBOARD – is the main circuit board containing connectors for attaching additional
boards. It usually contains the CPU, BIOS, memory, storage interfaces, serial and parallel ports,
expansion slots and all controllers for standard peripheral devices – display monitor etc.
CPU
CONTROL
UNIT
ALU
INPUT DEVICES OUTPUT DEVICES
MAIN MEMORY
Generation examples:
Computers draw their power from 3 factors: speed, accuracy and storage and retrieval capabilities.
Speed
Millesecond – 1/1000
Accuracy
o Very accurate up to the last decimal.
o Saving data in computer memory and retrieval is accessing data from memory.
o PB - petabyte
o EB Exabyte
ASCII – American standard code for information interchange. Each character is represented by
a 7 bit binary number up to 128
IBCDIC– Extended binary coded decimal interchange code - represented by 8 bit binary
number.
Millipede – allows storage of one trillion bits of data per inch – 20 times more than magnetic
disks. nanotechnology
COMPUTER OPERATIONS
INPUT DEVICES
Send data and information to the computer. Following are input devices:
o Keyboards – are most widely used devices. Designed to resemble typewriters but
modified to improve use
o Mouse – is a pointing device for moving the cursor on the screen – graphics.
o Touch screens – work with menus are a combination of input devices. Some touch
screens reply on light detection to determine which menu item has been selected and
others are pressure sensitive.
o Light pens – are connected to the monitor with a cable. When the pen is placed on the
screen the data in this spot is sent to the computer. Easy to use, inexpensive and
accurate. Useful for graphic designed and engineers.
o Trackball – kept in a stationary location but can be rolled on its axis to control the
screen cursor. Track ball occupy less space than a mouse – positioning is better with a
mouse.
o A data tablet – consists of a small pas and a pen. Make selections with a pen. Mostly
used in computer aided design and manufacturing applications.
o Barcode readers – are optical scanners that use lasers to read codes in a bar form.
These devices are fast, accurate and have many applications in inventory, data entry and
tracking systems. Used with UPC in retail stores
o Optical character reader OCR – works same as barcode readers but read text. It must
recognize many special characters, uppercase, lowercase and is more difficult than
barcode reader. Used by united states postal service.
o Magnetic ink character recognition MICR - read character printed in magnetic ink and
are used in banks for reading information at the bottom of checks.
o Optical mark recognition OMR – Sometimes called “mark sensing” because it reads
marks on paper. Often used to grade multiple choice and true/false tests.
OUTPUT DEVICES
o Plasma display
o Inkjet – produce characters by projecting electrically charged droplets of ink onto paper
that create an image. High quality uses multi colour ink cartridges for near photo copy
output. Suitable for home users and photo printing
o Laser – use laser based technology that creates electrical charges on a rotating drum to
attract toner. The toner is fused to paper using heat process that creates output. Best
suited for larger office environments, high volumes.
MEMORY DEVICES
The more memory a computer has, the faster and more efficient is the input/output. Graphics cards
also called video adapters also enhance the computers performance. There are 2 types of memory: main
memory and secondary memory.
MAIN MEMORY
o The most common type of main memory is semiconductor memory chips made of
silicon. A semiconductor memory device can be volatile and non volatile.
o RAM – Random Access Memory – is the volatile memory and is read/write memory.
o CACHE RAM – resides on the processor. Cache RAM stores recently accessed memory so
that the processor isn’t waiting for memory transfer.
o ROM – Read only Memory – this is a non volatile memory and data CANNOT be written
to. BIOS information and the computers system clock is usually stored here.
SECONDARY MEMORY
o Is non volatile and holds data when the computer is off. Also serves as an archival
storage of large data for long periods. There are 3 main types:
o MAGNETIC DISK – is made of metal and used for random access processing. Data can be
accessed in any order, faster and more expensive
o MAGNETIC TAPE – is made of plastic material, resembles a cassette tape and stores data
in sequence. IRG – interRecordGap – used for storing backups.
o OPTICAL DISCS – use laser beams to access and store data. Can store vast amount of
data and is durable e.g. CD-ROMS, WORM Discs, DVD’s.
WRITE ONCE READ MANY (WORM) – also a permanent device. Information can
be recorded once and cannot be altered – it cannot be duplicated. Used to store
information like annual reports. SD Secure digital can store data for 100 years.
ERASABLE OPTICAL DISC – data can be erased and altered repeatedly. Used for
high volume and updating.
o Other:
Hard disks
Memory cards
o RAID redundant array of independent disks - is a collection of disk drives used for fault
tolerance and improved performance, in large network systems. Data can be stored in
multiple places so if one disk in the array fails, data is not lost.
o SAN storage area network – high speed network consisting of both hardware and
software used to connect and manage shared storage devices such as disk arrays, tape
libraries and optical storage devices. Makes storage devices available to all servers on a
LOCAL AREA NETWORK (LAN) – WIDE AREA NETWORK (WAN). Used only in large
enterprises because of cost and installation complexity.
CLASSES OF COMPUTERS
Computers are classified based on cost, amount of memory, speed and sophistication.
SERVER – is a computer and all the software managing network resources and offering services
to a network.
SERVER PLATFORMS
o Application servers – store computer software which users can access from their work
stations.
o Database servers – store and manage a vast amount of data for access from users
computers.
o Disk servers – contain large capacity hard drives and allow users to store files and
applications for retrieving later.
o Fax servers – contains software and hardware that enable users to send and receive
faxes.
o File servers – contains large capacity hard drives for storing and retrieving data files.
o RAS Remote access servers – allow offsite users to connect to the network resources.
o Web servers – store web pages for access over the internet.
SOFTWARE
Software is all the programs that run a computer system. It can be classified as system software and
application software. System software works in the background and takes care of housekeeping tasks
like deleting files. Application software is used to perform specialized tasked like excel.
OS is a set of programs for controlling and managing computer hardware and software. An OS
provides an interface between the computer and the user and increases computer efficiency
by helping users share resources and perform repetitive tasks. The OS consist of control
programs and supervisor programs.
Control programs – manage the computer hardware and resources by the following functions:
Data management – control data integrity by generating checksums to verify that data
hasn’t been corrupted or changed.
Supervisor programs – also known as kernel – is responsible for controlling all other programs
in the OS such as compilers, interpreters, assemblers, and special tasks. TIME SHARED OS Also
allow several users to user computer resources simultaneously.
OS APPLICATION SOFTWARE
A personal computer can perform a variety of tasks by using application software which can
be commercial software or in house software. In house software is usually more expensive
than commercial software but is more customized and fits the user’s needs better.
SPREADSHEET SOFTWARE
o is a table of rows and columns and is capable of performing numerous tasks with
information on a spreadsheet. You can prepare a budget and perform a “what if”
analysis on the data. E.g. MS excel, IBM lotus 123 and corel Quattro pro.
DATABASE SOFTWARE
o Database software makes accessing and working with data faster and more efficient.
Users can search information quickly and even tailor searches to meet a specific criteria.
E.g ms access, oracle and filemaker pro.
PRESENTATION SOFTWARE
o Is used to create and deliver slide shows. Powerpoint is a popular example. You can add
graphs, charts, embed graphics, sound, movie clips, time intervals and capture screens.
GRAPHICS SOFTWARE
o Designed to present data in a graphical format such as line graphs and pie charts.
o Aim is to help project managers to keep time and budget under control by solving
scheduling problems, planning and setting goals and highlighting bottlenecks. You can
study the cost, time and resource impact on schedule changes.
o Is used for design and drafting, mostly used in architecture and engineering. Eg AUTO
CAD.
COMPUTER LANGUAGES
First generation machine language – consists on a series of 0’s and 1’s representing data and
instructions. It depends on the machine which means code for one machine doesn’t work on
another machine and is time consuming
Second generation Assembly language – higher level than machine but is also machine
dependent. Uses a series of short codes to represent data and instructions.
Third generation high level language – are machine independent. Examples are C++, JAVA and
VB.NET. it is easier to learn and code.
Fourth generation languages 4GLs – are the easiest to use. This uses macro codes that take the
place of several lines of programming. Example SQL – structured query language.
Fifth generation languages 5GLs – use some artificial intelligence technologies such as NLP -
Natural language processing. Codes are automatically generated and designed to make the
computer solve a problem without a programmer or minimum programming effort.
Data Bases
A database is a collection of related data that can be stored in a central or multiple locations.
Like a filing cabinet but a database is faster.
In a database, a file is a group of related records and a record is a group of related fields.
DATA HIERARCHY is the structure and organization of data which involves fields, records and
files. (think excel)
Field
In a database system, all files are integrated e.g. you can look up all students in Marys class.
A database is a critical component of the information systems because any type of analysis is
based on data in the database.
The flat file system was inefficient, duplicated records taking up more space and causing data
redundancy.
The user requests information, DBMS searches and retrieves from the database and returns
information to the user.
Advantages of a database:
o More information
o No data redundancy
o Easily maintained
o More security.
Database needs to access internal and external data to generate business intelligence.
Internal data
External data
SEQUENTIAL FILE STRUCTURE – records in a file are organized and processed in numerical or
sequential order – typically the order in which they were entered. For example, to read record
number 10, records 1 to 9 must be read first. Used for large records that is processed quarterly
or yearly. This structure is used for backup and archive files because they need updating rarely.
RANDOM ACCESS FILE STRUCTURE – records can be accessed in any order, regardless of their
location. This method is fast and very effective when a small number of records need to be
processed daily or weekly. Stored on magnetic disks.
DISKS ARE RANDOM ACCESS DEVICES AND TAPES ARE SEQUENTIAL ACCESS DEVICES. Think
about a CD and a cassette tape – how would to change a song on each.
(ISAM) INDEXED SEQUENTIAL ACCESS METHOD – records can be accessed sequentially or
randomly depending on the number being accessed. For a small number, random access is used
and for a large number sequential access is used.
o uses indexed value and a pointer to the disk location – requires 2 disk accesses to
retrieve a record. Once for the index and once for the actual record.
Two ways information is viewed in a database i.e. physical view and logical view.
PHYSICAL VIEW – involves how data is stored on and retrieved from storage media such as hard
disks, magnetic tapes or CDS. There is only one physical view.
LOGICAL VIEW – involves how information appears to users and how it can be organized and
retrieved. There can be more than one logical view depending on the user.
DATA MODEL – The first step in database design is defining the data model. A data model
determines how data is created, represented, organized and maintained. It contains data
structure, operation and integrity rules.
o DATA STRUCTURE – describes how data is organized and the relationship among
records.
o OPERATIONS – describes methods and calculations that can be performed on data such
as updating and querying data.
HIERARCHICAL MODEL – the relationship between records form a treelike structure. Records
are called nodes and relationships between records are called branches. The node at the top is
called the root and every other node (called a child) has a parent. Nodes with the same parents
are called twins or siblings.
NETWORK MODEL – is similar to the hierarchical model but records are organized differently.
Each record can have multiple parent and child records.
THE RELATIONAL MODEL – uses 2 dimensional table of rows and columns of data. Rows are
records called tuples and columns are fields called attributes. Must define each table and the
fields in it which is called the data dictionary. In a relational database, every record must be
uniquely defined by a primary key. CAN HAVE
MULTIPLE PARENT
o Data retrieved in this model uses operations that pick and combine data from one or
AND CHILD
CASH more tables.
CREDIT
RECORDS
o Operations most commonly used.
SELECT – search data in a table and retrieves records based pm certain criteria
also called conditions. Think of a filter – show members in a particular area.
JOIN – combines two tables based on a common field. Think V LOOKUP. Primary
key in one table and foreign key in another table.
DATA DICTIONARY – stores definitions such as data types for fields, default values and
validation rules for data in each field.
PRIMARY KEY – uniquely identifies every record in a relational database. Examples are student
IDS, account numbers etc. – think unique field.
FOREIGN KEY – is a field in a relational table that matches the primary key column in another
table. It can be used to cross reference table – think V LOOKUP. Used to establish relationships
among tables so that data can be linked and retrieved more efficiently.
COMPONENTS OF A DBMS
Database engine
Data definition
Data manipulation
Application generation
Data administration
DATABASE ENGINE
A database engine is the heart of the DBMS software, that is responsible for data storage,
manipulation and retrieval. It converts logical requests from users into their physical equivalents
like a report, by interacting with other components of the DBMS.
DATA DEFINITION
This component is used to create and maintain the data dictionary and define the structure of
files in a database. Any changes such as adding or deleting fields, changing data type is made
with this component.
DATA MANIPULATION
This component is used to add, delete, modify and retrieve records of a database. A query
language is used for this component.
o SQL – structured query language
SELECT field FROM table or file WHERE conditions. After the select keyword, list
the fields you want to retrieve. After from list the tables and files the data is
retrieved from and after where list the conditions. (SELECT name, ssn, title,
FROM employee, payroll, WHERE employees=payroll.
APPLICATION GENERATION
Is used to design elements of an application using a database such as data entry screens,
interactive menus and interfaces – think front end system.
DATA ADMINISTRATION
Used by IT professionals and database administrators for tasks such as backup, recovery,
security and change management. It is also used for permissions – think roles. CRUD – create,
read, update and delete.
Found in large organizations, design and set up databases, establish security measures, develop
recovery procedures, evaluate database performance and add and fine tune database functions.
DATA DRIVEN WEBSITES - acts as an interface to a database, retrieving data for users and
allowing users to enter data in the database.
o The data driven website changes automatically because it retrieves content from
external data sources.
o Improves access to information and reduces support and overhead needed to maintain
the site.
o Useful for: commerce sites, news sites, newsletters, needing frequent updates.
If one server goes down, it does not affect the entire business.
Replication – each site stores a copy of data of the organizations database. This
can increase costs but also increases data availability.
Allocation – combines fragmentation and replication with each site storing the
data it uses most often.
Security – poses an issues because of multiple access points but that needs to
be clearly defined and authorised users must be identified.
CLIENT/SERVER DATABASES – users workstations are linked to a LAN to share the services of a
single server. Think intranet.
OBJECT-ORIENTED DATABASES – both data and their relationships are contained in a single
object. An object consists of attributes and methods that can be performed on the objects data.
o Encapsulation – refers to the grouping into a class of various objects along with their
attributes and methods. Helps more complex data like images and graphs.
o Inheritance – refers to new objects being created faster and more easily by entering
new data in attributes. Example: you can add BMW as another vehicle object by having
in inherit the attributes and methods of the vehicle class.
object name Class
Car 1: Vehicle
License number
Year
attributes Make
model
Add vehicle
method
DATA WAREHOUSES
A data warehouse is a collection of data from a variety of sources used to support decision
making applications and generate business intelligence.
o Time variant – categorized based on time such as historic information whereas data in a
database only keeps recent activity in memory.
o Type of data – captures aggregated data whereas data in a database captures raw
transaction data.
o Purpose – used for analytical purposes, but data in a database is used for capturing and
managing transactions.
INPUT – data can come from a variety of sources including databases, transaction files, ERP
enterprise resource planning systems - collects integrates and process data that can be used by
all functional areas. CRM customer relationship management systems – collects and processes
customer data to provide better customer services.
ETL – EXTRACTION means collecting data from a variety of sources and converting it into a
format that can be used in transformation processing. This process can also parse (divide into
pieces) data to make sure it means structural requirements. TRANSFORMATION processing is
done to make sure data meets the data warehouses needs, its tasks are:
LOADING – is the process of transferring data to the data warehouse. Can overwrite or add
to existing data.
STORAGE – collected data is organized in a data warehouse as raw data, summary data or
metadata.
o Metadata – is information about data – its content, quality, condition, origin, and other
characteristics. Tells the users how, when and by whom data was collected and how
data has been formatted and converted to its present form.
o OLTP – OnLine Transaction Processing - Systems are used to facilitate and manage
transaction orientated applications such as point of sale, data entry, and retrieval
transaction processing. They utilize internal data and respond in real time. which
generates:
OLAP – OnLine Analytical Processing. Generates business intelligence. It uses multiple sources
of information and provides multidimensional analysis such as viewing data based on time,
product and location. Slicing and dicing. Drill up.
DATA MINING ANALYSIS – is used to discover patterns and relationships. For example: examine
point of sale data to generate reports on customers purchase history. Based on this information
companies can better target marketing promotions to certain customers. Answers the following:
DECISION MAKING REPORTS – examples of what a data warehouse can allow you to do:
DATA MARTS
A data mart is usually a smaller version of a data warehouse, used by a single department or function.
Focus on functions for a specific user group like marketing. Following advantages to a
warehouse:
o Less expensive.
o Users are targeted better because it is designed for a specific department. But a data
warehouse is designed for the whole organization.
They have limited scope and consolidating information from different departments is more
difficult.
COOKIES – are small text files with unique ID tags that are embedded in a web browser and
saved on the user’s hard drive. They make is possible for web sites to customize pages for users.
They can be considered an invasion on privacy. Cookies provide information about the users
location and computer equipment and this information can be used for unauthorized purposes
such as corporate espionage. You can disable cookies by installing a cookie manager.
SPYWARE – is software that secretly gathers information about users while they browse the
web. It can interfere with the users control of their computers by installing additional software
and redirecting web browsers. Install antivirus software to protect from spyware.
ADWARE – is a form of spyware that collects information about the user to display
advertisements in the web browser, based on information it collects from the users browsing
patterns. Install ad blocking feature to protect against this.
PHISHING – is sending fraudulent emails that seem to come from a legitimate source, such as
banks for the purpose of capturing private information such as bank details and security
numbers.
KEYLOGGERS – monitor and record keystrokes and can be hardware or software. Can be used
for collecting credit card numbers.
SNIFFING – is capturing and recording network traffic. It can be used to check network
performance but hackers use it to intercept information.
Computer crimes include: Denial of service attack, Identity theft, Software piracy, Distributing
child pornography, Email spamming, stealing files and sabotage etc.
PRIVACY ISSUES
Information technologies have created concern about privacy in the workplace. Where employers
monitor staffs performance.
There are a number of databases that store and share personal information for marketing purposes.
There are 3 concepts regarding internet and network privacy: acceptable use policies, accountability
and non repudiation.
ACCEPTABLE USE POLICIES – is a set of rules specifying the legal and ethical use of a system and the
consequences of non compliance.
ACCOUNTABILITY – refers to issues involving both users and the organizations responsibility and liability.
NON REPUDIATION – is basically a method for binding all the involved parties into a contract.
o Any data collection must have a stated purpose and data that is necessary.
EMAIL – one issue is junk email or spam (is unsolicited email sent for advertising purposes).
Many organization state that emails are company property and they have right to access them
at any time.
DATA COLLECTION ON THE INTERNET – hackers are getting access to credit card details via the
internet.
o LOG FILES – This is generated by Web server software, record users actions on a web
site.
o Identity misrepresentation – when users give the incorrect information (dating sites).
o Data collected on the internet must be used and interpreted with caution.
ETHICAL ISSUES
Ethics mean doing the right thing and its meaning can vary from person to person to cultures.
The line between legal and illegal is clear but the line between ethical and unethical is not
always clear.
Legal Illegal
Ethical I ii
Unethical iii iv
CENSORSHIP
Public information that is information posted by an organization or agency can be censored for
public policy reasons such as not allowing military secrets to be published or if it is offensive to
cultures etc.
Private information that is information posted y an individual person is not subject to censorship
because they have right to freedom of speech.
Another type of censorship is restricting access to the internet – think about companies that
block facebook etc. Also for parents who don’t want their children exposed on the internet can
use cyberpatrol, cybersitter, net nanny, safesurf etc.
INTELLECTUAL PROPERTY
Copyrighted material which covers literary and artistic works. Copyright law protects tangible
material like books and drawings and also cover web pages, HTML code and computer graphics.
Copyright law gives the creator exclusive rights which means that no one else can reproduce,
distribute, and perform work without permission.
FAIR USE DOCTRINE – under the copyright law allowing you to use copyrighted material for a
certain purpose like quoting a line from a book.
Organization can benefit from patents by licensing patent to others for revenue, use patent to
attract funding, keep competitors from entering markets etc.
Software piracy is a concern – you cannot duplicate or use copyrighted programs without
consent.
CYBERSQUATTING – is registering, selling and using a domain name to profit someone elses
trademark.
Information technology and the internet have created a digital divide – computers are still not
affordable for many people. The digital divide has implications for education.
Students who don’t have access to internet or PCs at home are at a disadvantage and often lag
behind in their education.
Reduced production costs and increased purchasing power resulting in a stronger economy.
“JOB DESKILLING” – this occurs when a skilled labor is eliminated by high technology or when
a job is downgraded from a skilled to a semiskilled or unskilled position. It is usually when a
job is automated or when a complex job is fragmented into sequence.
“JOB UPGRADING” – when clerical workers use computers for word processing. Can have new
tasks and responsibilities because system is more efficient. – THINK MAIL MERGE
o Each company can focus on its strengths, costs are reduced, response to customers’
faster, new inventions introduced quicker, focus on client needs.
IT AND HEALTH ISSUES
VDT – video display terminals – no proven study that VDT can cause harm.
The work environment in which computers are used: static electricity, inadequate ventilation,
poor lighting, dry air and few breaks can cause health problems.
Health issues include, blurred vision, fatigue, back strain, wrist pain etc.
GREEN COMPUTING
ICT – information and communications technology generates 2% of the worlds carbon dioxide. We
need tool that can reduce CO2 omissions.
Green computing involves design, manufacture, use and disposal of computers, servers and computer
devices in such a way that it has minimal impact on the environment.
CONFIDENTIALITY – means that a system must prevent disclosing information to anyone who isn’t
authorized to access it.
AVAILABILITY – means that computers and networks are operating and authorized users can access the
information they need. It also means a quick recovery in the event of a system failure or disaster.
Committee of National security systems introduced the McCumber Cube. John McCumber
created this framework for evaluating information security. Represented as a three dimensional
cube, it defines NINE characteristics of information security.
First step is FAULT TOLERANT SYSTEMS – ensure availability in the event of a system failure by
using a combination of hardware and software. Some commonly used methods:
SECURITY THREATS
VIRUSES – consists of self propagating program code that’s triggered by a specific time or event.
When the program or operating system containing the virus is used, the virus attached itself to
other files and the cycle continues.
WORMS – A worm travels from computer to computer in a network, but it doesn’t usually erase
data. Unlike viruses, worms are independent programs that can spread themselves without
having to be attached to a host program.
TROJAN PROGRAMS – contains code intended to disrupt a computer, network, or website and it
is usually hidden inside a popular program. Users run the program, unaware that the malicious
program is also running in the background.
LOGIC BOMBS – is a type of Trojan program used to release a virus, worm or other destructive
code. Logic Bombs are triggered at a certain time or by a specific event, such as the user
pressing the enter button or running a certain program.
BACKDOORS – Also called trapdoors. Is a programming routine built into a system by its
designer or programmer? It enables the designer to bypass system security and sneak back into
the system later to access program files.
BLENDED THREAT – is a security threat that combines the characteristics of computer viruses,
worms and other codes with vulnerabilities found on public or private networks.
o Targets weak points and send codes on server or via email with worm attachment. Can
launch a DOS attack.
DENIAL OF SERVICE ATTACKS(DOS) – floods the network or server with service requests to
prevent legitimate users to access the system. Difficult to trace.
SOCIAL ENGINEERING – means people skills – such as being a good listener and assuming a
friendly unthreatening air – to trick others into revealing private information. This attack takes
advantages of the human element of security systems.
o “DUMPSTER DIVING” – search through deleted items and junk mail for personal
information.
o Facial recognition – identify by checking unique shape, pattern and facial features.
o Hand geometry – compare length of fingers, fingertips and webbing against stored
hands.
o Iris analysis – use a video camera to capture the users iris and compare to stored one.
o Palm prints – palm reader uses near infrared light to capture a users vein patterns which
is unique to each individual. Compared to stored data.
o Retinal scanning – scan the retina using a binocular eye camera and check stored data.
o Signature analysis – check users signature and pen pressure, speed and time.
o Vein Analysis – analyze pattern of veins in the wrist and back of the hand without
making any direct contact with veins.
o Voice recognition – translate words into digital patterns which are recorded and
examined for tone and pitch. It can work over long distances via ordinary phones.
o Call back modems – verifies whether a users access is valid by logging the user off after
she attempts to connect to the network and the calling the user back at a
predetermined number.
Application filtering – generally more secure and flexible but are more
expensive. Software is stored on a host computer to control use of network
applications such as email, telnet and FTP. It monitors time and filters viruses
and log actions more efficiently than packet. But are slower.
Hackers use IP Spoofing to trick firewalls into treating packets as coming from a
legitimate address.
o INTRUSION DETECTION SYSTEMS(IDS) – can protect against both external and internal
access. It usually placed in front of a firewall and can identify attack signatures, trace
patterns, generate alarms for the network administrator and cause routers to terminate
connections with suspicious sources. Can also prevent DOS attacks. Monitors network
traffic, uses the “prevent, detect and react” approach to security.
PHYSICAL SECURITY MEASURES – primarily control access to computers and networks and
include devices for securing computers and peripherals from theft. Measures include:
o Cable shielding – braided layers around the conductor cable protect it from
electromagnetic interference (EMI).
o Steel encasements – these fit over the entire computer and can be locked.
ACCESS CONTROLS – are designed to protect systems from unauthorized access in order to
preserve data integrity.
o Terminal resource security – software that erases the screen and signs the user off
automatically after a specified amount of time.
8 characters or longer.
VIRTUAL PRIVATE NETWORK (VPN) – provides a secure “tunnel” through the internet for
transmitting messages and data via a private network. Also provides security for extranets.
o data is encrypted before it is sent through the tunnel with a protocol, such as layer 2
tunneling protocol.
o the rule for encryption is called “encryption algorithm” determines how simple or
complex the transformation process should be.
o Julius Caesar developed the simple substitution algorithm, in which each letter is
substituted by a letter 3 positions farther.
o Secure sockets layers (SSL) – is a commonly used encryption protocol that manages
transmission security on the internet. (https).
o Transport layer security (TSL) – is a cryptographic protocol that ensures data security
and integrity over public networks such as internet.
o Asymmetric encryption – uses two keys: a public key know to everyone and a private
key or secret key known only to the recipient. A message encrypted with a public key
can be decrypted only with the same algorithm used by the public key and requires the
recipients’ private key too. Anyone intercepting the message cant decrypt it without the
private key. Slow and requires a lot of processing power.
o Symmetric encryption – also called “secret key encryption”, the same key is used to
encrypt and decrypt the message. The sender and receiver must agree on the key and
keep it a secret.
o Confidentiality – how can we ensure only the recipient reads the message?
o Non repudiation from origin – the sender can’t deny sending. Digital signatures are
used to bind partners in a transaction.
COMPUTER EMERGENCY RESPONSE TEAM (CERT) – teams that can handle network intrusions
and attacks quickly (think 2000). Handling and preventing incidents.
Post security policy where visible, revoke access for terminated employees, lock work stations,
never leave work stations unattended, limit access, investigate billing discrepancies, install
antivirus systems, install only licensed software.
Test alarms and fire systems ,check humidity and temperature, use physical security measures,
or biometric measures, install fires walls.
BUSINESS CONTINUITY PLAN – outlines procedures for keeping an organization operation in the
event of a natural disaster or network attack. Prepare for disaster:
o Make sure staff are aware of the plan. And keep a copy of the plan off site.
o Insurance policy.
o if disaster strikes, you should get a recovery team to oversee the recovery plan, contact
insurance company, restore phone lines and other communication systems, notify all
affected people, set up help desk, document all actions to review plan later.
Data communication – is the electronic transfer of data from one location to another.
Information systems effectiveness is measured by how efficiently it delivers information and a
data communication system is what enables an information system to carry out this function.
Data communication system can improve flexibility of data collection and transmission.
o Data communication enables you to use emails and electronic file transfer to improve
efficiency and productivity.
o Internet research.
o Boundaries between work and personal life are less clear-cut as data communication is
more available at home.
BANDWIDTH – is the amount of data that can b transferred from one point to another in a
certain time period, usually one second. It is often expressed in bits per second(bps), kilo bytes
per second (kbps) and megabytes per second(mbps) and gigabytes per second(gbps).
ATTENUATION – is the loss of power in a signal as it travels from the sending device to the
receiving device.
BROADBAND – is a data transmission channel, multiple pieces of data are sent simultaneously
to increase the transmission rate.
PROTOCOLS – a communication link between two devices must be synchronized meaning that
they must start and stop communicating at the same point. This synchronization is handled with
PROTOCOLS. They are rules that govern data communication, including error detection,
message length, and transmission speed.
o An input/output device or “thin client” is used only for sending or receiving information,
it has NO processing power.
o A smart terminal is an input/output device that can perform certain processing tasks,
BUT IS NOT a full featured computer. Used in factories.
o A netbook computer is low cost, diskless computer used to connect to the internet or a
LAN. It runs software off a server and saves data to a server.
MODEMS – short for modulator demodulator, is a device that connects a user to the internet.
o Not all internet connections require a modem e.g. wireless users connect via access
points
o DSL – DIGITAL SUBSCRIBER LINE – a common carrier service is a high speed service that
uses ordinary phone lines.
COMMUNICATION MEDIA – or channels, connect sender and receiver devices. They can be
conducted (wired) or radiated(wireless).
CONDUCTED MEDIA – provide a physical path along which signals are transmitted including
twisted pair, coaxial and fibre optics cable
o TWISTED PAIR – consists of two copper lines twisted around each other and either
shielded or unshielded. It is used in telephone network and communication within
buildings.
o COAXIAL CABLE – are thick cables that can be used for both data and voice
transmissions. Used for long distance telephone transmissions.
o FIBRE-OPTIC CABLE – are glass tubes (thin) surrounded by concentric layers of glass
called cladding to form a light path through wire cables. Have higher capacity, smaller
size, lighter weight, lower attenuation and higher security and highest bandwidth.
RADIATED MEDIA – use an antenna for transmitting data through air or water.
Communication medium can use point to point system, only one device at a time uses the
medium or multipoint system, several devices share the same medium.
PROCESSING CONFIGURATIONS
CENTRALIZED PROCESSING – in this system, all processing is done at one central computer. The
main disadvantage is the lack of responsiveness to users needs.
DECENTRALIZED PROCESSING – in this system, each user, department, or division has its own
computer “organizational unit”, for performing processing tasks. It is responsive to users needs
however, there is lack of coordination among units, high costs and duplication of efforts.
DISTRIBUTED PROCESSING – solves two main problems – by maintaining centralized control and
decentralizing operations. Processing power is distributed among several locations. Advantages:
o Reliable because system failures are limited to one site. More responsive.
o Transport layer – makes sure packets are delivered without error, in sequence and with
no loss or duplication. Control data flow.
o Physical layer – specifies the electrical connections and physical medium used.
Concerned with transmitting binary data or bits over a communication network.
TYPES OF NETWORKS
All networks interface using a Network Interface Card (NIC) – is a hardware component that enables
computers to communicate over a network
Local Area Network (LAN) – connects workstations and peripheral devices that are in close
proximity. Limited geographical area such as a building or campus and one company owns it.
Most often used to share resources, integrate services.
Wide Area Network (WAN) – can span several cities, states or even countries and it is usually
owned by several different parties. Uses coaxial cables, satellite and fibre optics.
Metropolitan Area Network (MAN) – is designed to handle data communication for multiple
organizations in a city and sometimes nearby cities too.
NETWORK TOPOLOGIES
Network topologies represent a networks physical layout including the arrangement of computers
and cables.
STAR TOPOLOGY – usually consists of a central computer (host computer, often a server) and a
series of nodes (typically workstations or peripheral devices). If the host fails the entire network
goes down. Advantages: easy to modify cables, detecting problems, nodes can be added easily,
handle heavy but short outbursts of traffic. Disadvantages: single point of failure, high costs for
cables.
RING TOPOLOGY – no host computer is required, because each computer manages its own
connectivity. Computers and devices are arranged in a circle so that each node is connected to
two other nodes: upstream and downstream neighbor. Transmission is in ONE DIRECTION. If any
link between the nodes is severed, the entire network is affected. TOKEN RING – common in ring
topology where it only receives transmission from its immediate neigbour and uses FDDI (fibre
distributed data interface) and capable of bidirectional transmission. Less cables required but
detecting problems are more difficult.
BUS TOPOLOGY – also called linear bus, connects nodes along a network segment, but the ends
of the cable aren’t connected as they are in a ring topology. A terminator is used at each end of
the cable to absorb the signal. Advantages: easy to extend, reliable, less cable than any
topology, simple wiring, can handle steady traffic. Disadvantages: difficult to detect problems
and can bottleneck in heavy traffic.
HIERARCHICAL TOPOLOGY - also called a tree topology, combines computers with different
processing strengths in different organization levels. Failure of nodes at the bottom might not
have a big impact on the network performance but the middle and especially the top node
(which controls the entire network) are crucial for network operation. The mainframe computer
is at the top, front-end processing(FEP) make up the next level, controllers and multiplexers are
at the next level and terminals and workstations make up the last level. A controller is a
hardware and software device that controls data transfer from a computer to a peripheral
device and vice versa (monitor, printer, keyboard). A multiplexer is a hardware device that
allows several nodes to share one communication channel. Advantages: network control, low
cost. Disadvantages: network expansion, traffic congestion.
MESH TOPOLOGY – also called plex/interconnected, every node (which can differ in size and
configuration) is connected to every other node. This is very reliable and failure of other nodes
doesn’t cause a major problem in the network but can be costly and difficult to maintain and
expand.
o two major controls are TCP which operates at the OSI models transport layer and IP
which operates at the OSI models network layer.
o TCP primary functions are establishing a link between hosts, ensuring message integrity,
sequencing and acknowledging packet delivery and regulating data flow between source
and destination nodes.
o IP is responsible for packet forwarding. IP networks combine network and node address
into one IP address, example: 163.202.63.12
ROUTING – is a process of deciding which path to take on a network. This is determined by the
type of network and the software used to transmit data. Based on the amount of traffic and
availability of the circuit. Two ways:
o Routing table – is generated automatically by software and used to determine the best
possible route. The routing table lists modes on a network and the path to each node,
with alternate paths and speed.
o Centralized routing – one node is in charge if selecting the path for all packets. This
node, considered the network routing manager, stores the routing table and any
changes to the route must be made at this node. Can determine over and under usage.
If the controlling node fails no routing information is available.
o Distributed processing – relies on each node to calculate its own best possible route.
Each node contains its own routing table with current information on the status of
adjacent nodes so that the best possible route can be followed. If one node fails, the
table is updated and the packet is sent along a different path.
o Packet switching – a network communication method that divides data into small
packets and transmits them to an address, where they are reassembled. Can handle
multimedia data.
o A packet – is a collection of binary digits, including message data and control characters
for formatting and transmitting, sent from computer to computer over a network.
ROUTERS – A router is a network connection device containing software that connects network
systems and controls traffic flow between them. Routers operate at the network layer of the OSI
model and handle routing packets on a network. They can choose the best possible path for
packets based on distance or costs; routers can prevent network jams that delay packet delivery
and handle packets of different sizes.
o A router can also be used to isolate a portion of the LAN from the rest of the network –
this is called segmenting.
o Static router – requires the network routing manager to give it information about which
addresses are on which network.
o Dynamic router – can build tables that identify addresses on each network.
CLIENT/SERVER MODEL – software runs on the local computer (the client) and communicates
with the remote server to request information or services. A server is a remote computer on the
network that provides information or services in response to client requests. Steps:
o Client accepts the request and formats it so that the server can understand.
o The results are formatted and displayed to the user in an understandable format.
o 3 levels of logic
Presentation logic – the topmost level, is concerned with how data is returned
to the client. GUI.
o Two-tier architecture – known as the traditional client/server model, a client (tier one)
communicates directly with the server (tier two). Effective for small groups and any
changes require major modifications.
o N-Tier architecture – attempts to balance the workload between client and server by
removing application processing from both the client and server and placing it on a
middle tier server. The 3 tier leave the presentation logic on the client and the data
management logic on the server.
WIRELESS AND MOBILE NETWORKS
Mobile Network – also called cellular network, is a network operating on a radio frequency (RF),
consisting of radio cells, each served by a fixed transmitter, known as a cell site or base station.
Wireless networks are flexible, easy to install and low costs. However drawbacks include:
Limited Range – the distance a signal can travel without losing strength is more limited in
mobile and wireless networks.
In building penetration problems – wireless signals might not be able to pass through certain
building materials.
Vulnerability to frequency noise – interference from other signals, usually called noise can
cause transmission problems. Etc. thunderstorms and lightning.
Wireless LANS have the same features and characteristics’ as wired LAN except they use wireless media
such as infrared.
WIRELESS TECHNOLOGIES
In a wireless environment, portable computers use small antennas to communicate with radio towers in
the surrounding areas. They rely on the RF spectrum as the communication medium but differ. They fall
in two groups:
Wireless (WLAN) - these are becoming more important. WLAN are characterized by having one
owner and covering a limited area. Security is lower.
Wireless (WWAN) – cover a broader area such as cellular networks, cellular digital packet data
(CDPD), paging networks, personal communication systems (PCS), packet radio networks,
broadband personal communication system (BPCS) etc.
MOBILE NETWORKS
Mobile telephone switching offices(MTOS) – transfer calls between national or global phone
networks and base stations.
Subscribers – users connect base stations by using mobile communication devices.
Mobile devices must register by subscribing to a carrier service provider. Roaming is using a cellular
phone outside of a carriers limited service area..
Time Division Multiple Access(TDMA) – divides each channel into six time slots. Each user is
allocated two slots: one for transmission and one for reception. This method increases efficiency
by 300% as it allows carrying 3 calls in 1 channel.
Code Division Multiple Access (CDMA) – transmits multiple encoded messages over a wide
frequency and then decodes them at the receiving end.
WIRELESS SECURITY
There are several techniques for improving the security on a wireless network:
Service Set Identifier (SSID) – all users trying to access the access point are required to include a
SSID in all of their packets. But it can be picked up by other devices within range.
Wired Equivalent Privacy (WEP) – a key must be manually entered into the AP and the client
computers. The key encrypts the message before transmission. Time consuming, not suitable for
large networks.
Extensible Authentication Protocol (EAP) – EAP keys are dynamically generated based on the
users ID and password. A new key is generated every time the user logs on.
WiFi Protected Access (WPA) – combined WEP and EAP. Keys are fixed or dynamically changed.
Key is longer and more difficult to break.
WPA2 – this technique uses EAP to obtain a master key. After the session the master key is
discarded.
Convergence – refer to integrating voice, video and data so that multimedia information can be
used for decision making.
Internet – is a worldwide collection of millions of computers and networks of all sizes. The
internet is a network of networks.
Internet backbone – is a foundation network linked with fibre-optic cables that can support very
high bandwidth. It is made up of many interconnected government, academic, commercial and
other high capacity data routers.
NAP – Network access points determine how traffic is routed over the internet.
Hypermedia – documents include embedded references to audio, text, images, video and other
documents. And retrieve information by the click of a button.
Hypertext – the embedded references in hypermedia documents are called hypertext – they
consist of links users can click to follow a particular thread/topic.
Domain Name System (DNS) – when information is transferred from one network to another,
domain names are converted to IP addresses by the protocol DNS. Servers using this protocol
maintain lists of computers and websites addresses and their associated IP addresses.
Uniform resource locators (URL) - also called universal resource locators to identify web page.
A URL is the address of a document or site on the internet.
http://www.csub.edu/~hbidgoli/books.html
o The domain name is csub.edu. every domain name has a suffix indicating the TLD(top
level domain) it belongs to. In the example, the suffix is .edu. spaces are not allowed
o http – stands for hyper text transfer protocol, the protocol used for accessing most web
sites.
o www.csub.edu – world wide web , the sub domain, is the network consisting of millions
of internet sites that offer text, graphics, sounds, animations and other multimedia
resources. This is the unique website.
o /~hbidgoli – this part is the name of the directory in which the files are stored.
o Symmetric digital subscriber line(SDSL) – has the same data transmission rate as a
telephone line in both directions.
o Very high-speed digital subscriber line(VDSL) – has both ways 100Mbps rate over short
distances.
Tools are used to find what you looking for over the internet.
NAVIGATIONAL TOOLS
o Navigational tools are used to travel from site to site (surf) the internet.
o Examples: Internet Explorer (IE), firefox, google chrome, safari and opera.
o You have the following options with these browsers: menu options to file, edit and help,
view history, bookmarking favourites, navigation buttons to move backward and
forwards.
SEARCH ENGINES
o A search engine, such as google.com and ask.com, is an information system that enables
users to retrieve data from the Web by searching for information using search terms. All
have a 3 step process:
1. Step one is Crawling the Web – they use software called crawlers, spiders and
bots. These automated modules search the Web continuously for new data.
They find new data, make sure links work and ensure search engine has the
most current information.
2. They use server farms to index data coming in from crawlers by using keywords.
The index entry is linked to the company website, along with all other sites
containing the term searched.
3. The search process. When you enter a search term, the search engine uses the
index created in Step 2 to look up the term.
DIRECTORIES
o Directories organize information into categories. The two kinds of directories are:
1. Automated, crawler based directory. The search engine uses and creates
indexes of search terms and collects them using crawlers.
2. The second type is the human powered directory. If you want your web page to
be listed in a search engines results, you have to manually submit keywords to a
human powered directory. It doesn’t use crawlers to collect date, instead it
relies on users to supply the data. Doesn’t have updated content.
INTERNET SERVICES
o Web based email enables you to access your email account from any computer and in
some cases, store your emails on a Web server. Examples are hotmail and gmail.
o Client based email, which consists of an email program you install on your computer,
email is downloaded to and stored locally on your computer. Examples outlook, apple
mail.
o Discussion groups – are usually for exchanging opinions and ideas on a specific topic,
usually technical or scholarly nature. Group members post messages or articles that
others in the group can read.
o Newsgroups – are typically more general in nature and can cover any topic. They allow
people to get together for fun or for business purposes.
o Internet Relay Chat(IRC) – enables users in a chat room to exchange text messages with
people in other locations in real time.
o IM – is a service for communicating with others via a private chat room on the internet.
INTERNET TELEPHONY
o Internet telephony is using the internet rather than the telephone network to exchange
spoken conversations. VoIP – Voice over Internet Protocol – is used for this.
Advantages:
WEB APPLICATIONS
o Travel and tourism have benefited from e-commerce web applications. In the form of
online brochures, allow booking of plane tickets and rent cars.
PUBLISHING
o Websites offer descriptions of forthcoming books, post sample chapters, online ordering
and search features for different books. There is also the ebook that can be purchased
and read online.
HIGHER EDUCATON
o Many universities have websites with information about departments, programs, faculty
and academic resources. Some even have virtual tours of the campus. There are online
degree programs and online classes.
REAL ESTATE
o Have up to date listings of homes for sale. Buyers can review the neighborhood, schools
and local real estate prices and use these sites to find real estate agents and brokerages.
They also have virtual tours, financing options etc.
EMPLOYMENT
o Monster.com and careers24 are examples. These sites offer job seekers the following:
Job alerts
Career tests
Salary calculators.
FINANCIAL INSTITUTIONS
o Offering online banking and use email to communicate with customers by sending
account statements and financial reports. Electronic signature and passwords are used
to secure personal information. Banking services include:
Paying bills.
SOFTWARE DISTRIBUTION
o Many vendors distribute software on the internet as well as drivers and patches. For
example the antivirus updates are available for download. There are challenges for
developing online copyright protection.
HEALTH CARE
o With patient records stored on the internet, health care workers can order lab tests and
prescriptions, admit patients to hospital and refer patients to other doctors. Also test
results can be directed automatically.
o PHIS = Personal Health Information System. Can make medical tools available to the
public. Telepresence surgery allows surgeons to operate all over the world without
physically travelling anywhere. A robot performs the surgery based on digitized
information sent by the surgeon via the internet.
POLITICS
o Make use of web sites for campaigns, publicizing their voting records.
I NTRANETS
INTRANET – An intranet is a network within an organization that uses internet protocols and
technologies (TCP/IP,FTP, SMTP) for collecting, storing, and disseminating useful information that
supports business activities such as sales, customer service, human resources, and marketing.
Intranets are also called “corporate portals”. The main difference is that the company website is
usually public while an intranet is for internal use by employees.
Uses a computer network to connect to the intranet. Usually setup behind a firewall.
Users Anybody – public Approved users only – private Closely related to the
network network company
APPLICATIONS OF AN INTRANET
EXTRANETS
EXTRANET – An extranet is a secure network that uses the internet and web technologies to connect
to intranets of business partners so that communication between organizations or between
consumers is possible.
Structure
o DMZ – demilitarized zone, an area of the network that separate from the organizations
LAN, where the extranet server is placed.
o There is a firewall between the organization network and the extranet and the extranet
and the internet.
o Advantages:
NEW TRENDS
Web 2.0 – refers to the trend toward web application that are more interactive than traditional
web applications. Collaboration or e-collaboration is one its its key components. Main forcus is
social networking and collaboration.
Web 3.0 – semantic web, provides personalization that allows users to access the web more
intelligently. Computers, not their users, will perform the tedious work involved in finding,
combining and acting upon information on the web. Main focus is intelligent web applications
using intelligent technologies.
BLOGS – a blog (short for weblog) is a journal or newsletter that’s updated frequently and
intended for the general public. Blogs reflect their authors personalities and often include
philosophical reflections and opinions on social or political issues.
WIKIS – A wiki is a type of website that allows users to add, delete, and sometimes modify
content. A best example is Wikipedia. What is unique is that a user can also be an information
provider.
SOCIAL NETWORKING – refers to a broad class of websites and services that allow users to
connect with friends, family and collegues online as well as meet people with similar interests or
hobbies. Examples are Myspace and facebook. Can also be used for business, advertising etc.
RSS FEEDS (Really Simple Syndication) – are fast, easy way to distribute web content in
extensible markup language XML format. It is a subscription service you sign up for, and new
content from websites you’ve selected is delivered via a feed reader to one convenient spot.
PODCASTING – A podcast is an electronic audio file, such as an MP3 file, that’s posted on the
web for users to download on their mobile devices – iphones, ipods and zune for example or
even their computers. Involves multimedia.
THE INTERNET2 – is a collaborative effort involving more than 200 US universities and
corporations to develop advanced internet technologies and applications for higher education
and academic research.
o Applications:
DEFINING E COMMERCE
E-Business encompasses all the activities a company performs in selling and buying products
and services using computers and communication technologies.
E-commerce – is buying and selling goods and services over the internet.
o A value chain is a series of activities designed to meet business needs by adding value or
cost in each phase of the e-commerce process.
Technological development
procurement
end products to user
Outbound logistics –
move from suppliers
– customer needs
processing into
Operations –
to vendors
service
and sales
products
o New ways to reduce costs:
Check product available Phone calls, faxes, letters Email, websites and extranets
ADVANTAGES DISADVANTAGES
Increasing customers
o Companies need a business model governing how they plan to make a profit and sustain
a business for future growth.
o MERCHANT MODEL – the merchant model transfers the old retail model to the e-
commerce world by using the medium of the internet. Example Amazon.com.
o BROKERAGE MODEL – brings sellers and buyers together on the Web and collects
commissions on transactions between these parties. Example eBay.
o MIXED MODEL – the mixed model refers to generating revenue from more than one
source. For example an auction site generates revenue from commissions collected
from buyers and sellers and from advertising.
o Government to citizen (G2C) - tax filing and payments, completing forms, request for
records, online voter registrations.
o SELLER-SIDE MARKET PLACE MODEL – this is the most popular B2B model. In this
model, sellers who cater to specialized markets, such as chemicals, electronics and auto
components, come together to create a common marketplace for buyers – sort of a one
stop shop.
THIRD-PARTY EXCHANGE MARKET PLACE MODEL – this model isn’t controlled by sellers or
buyers. Instead, its controlled by a third party and the market place generates revenue from the
fees charged for matching buyers and sellers. These market places are usually active in vertical
or horizontal markets.
o Wireless area networks, 3G and 4G networks. WiFi, WiMAX, Bluetooth and RFID.
o Microsoft has a version of internet explorer called internet explorer mobile and google
offers features for searching news, maps and Gmail to mobiles.
o Voice based ecommerce - relies on voice recognition and text to speech technologies.
Security features include the following:
Call recognition so that calls have to be placed from specific mobile devices.
o SMART CARD – a smart card is about the size of a credit card and contains an embedded
microprocessor chip for storing important financial and personal information. The chip
can be loaded with information and updated periodically.
o E-CASH – a secure and convenient alternative to bills and coins. Complements credit,
debit and charge cards and adds convenience and control to everyday cash transactions.
E-cash usually works with a smart card, and the amount cash stored on the chip can be
recharged electronically.
o E-CHECK – the electronic version of a paper check, offers high security, speed and
convenience for online transactions.
o E-WALLETS – are available for most handheld devices and offer a secure, convenient,
and portable tool for online shopping. They store personal and financial information,
such as credit card numbers, passwords and PINS. E-wallets can be used for
micropayments and are useful for frequent online shoppers.
o PAYPAL – is a popular online payment system used in many online auction sites. Users
with a valid email address can set up an account and use it for secure payments of
online transactions, using their credit cards or bank accounts.
o MICROPAYMENTS – are used for very small payments on the Web. They began as a
method for advertisers to pay for cost per view or cost per click. Small amounts are
accumulated until they are large enough to offset the transaction fee and then the
account is deducted. The World Wide Web consortium has cancelled the support for
micropayments.
WEB MARKETING – uses the web and its supporting technologies to promote goods and
services. Understand the list of terms for web marketing:
o Banner ads – usually placed on frequently visited websites. By clicking on the banner, it
displays a message and redirects to another websites.
o Click – the opportunity for a user to click a URL or a banner ad and be transferred to
another website. For example each time a keyword used for searching takes a user to a
particular page the site owner (advertiser) pays the search engine a cost per click.
o Cost per mille = thousand (CPM) – advertising is usually priced based on a cost per
thousand ad impressions.
o Click though rate (CTR) - this rate is computed by dividing the number of clicks an ad
gets by the total impressions bought. For example if an advertisers buys 100000
impressions and gets 20000 clicks, the CTR is 20%(20000/100000).
o Cookie - information a web site stores on the user’s hard drive so that it can be
remembered for later visit, such as greeting a visitor by name. record user preference
and browsing habits.
o Hit – every element of a web page is counted as a hit to a server.
o Meta tag – this HTML tag doesn’t affect how a web page is displayed; it simply provides
information about a web page, such as keywords that represent the page content, the
web designer, and frequency of page updates.
o Pop under ad – opens a new window hidden under the active window. Pop down ads
don’t interrupt users as much as pop up ads.
o Splash screen – a web page displayed when the user first visits the site: its designed to
capture the users attention and motivate the users to browse through the site.
o Spot leasing – search engines offer space that companies can purchase for advertising
purposes. Spots have an advantage over banner ads because their placement is
permanent and can be expensive.
SEARCH ENGINE OPTIMIZATION (SEO) – is a method for improving the volume or quality of
traffic to a web site. A higher ranking in a search result should generate more revenue for a
website. It aims at increasing a websites performance on search engines in a natural and free
fashion. It makes it easier for search engines to find and index a site for certain keywords. The
following are recommendations for optimizing a web site:
o Keywords – decide on a few keywords that best describe a website and use them
consistently throughout the sites contents.
o Page title – make sure the page title reflects the site and its contents accurately.
o Inbound links - get people to comment on your website, using one of your top
keywords.
CHAPTER 10: BUILDING SUCCESSFUL INFORMATION SYSTEMS
Systems development life cycle (SDLC) - also known as “waterfall model”, is a series of well
defined phases performed in sequence that serves as a framework for developing a system or
project.
o During the planning phase, which is one of the most crucial phases of the SDLC model,
the systems designer must understand and define the problem the organization faces,
taking care not to define symptoms rather than the underlying problem.
o After identifying the problem, an analyst or team assesses the current and future needs
of the organization.
o During this phase they need to make sure that the users understand the four Ws:
o The end result of this phase should give users and top management a clear view of what
the problem is and how the information system will solve the problem.
To ensure that the information systems success, users must have input in the
planning, requirements gathering and analysis, design and implementation
phases. For this reason, a task force is formed, consisting of representatives
from different departments. There are 2 types of users to gather information
from:
Internal users – are employees who will use the system regularly, and
they can offer important feedback on the systems strengths and
weaknesses.
External users – aren’t employees but do use the system; they include
customers, contractors, suppliers and other business partners. Their
input is essential.
Joint application design (JAD) – is a collective activity involving users, top
management and IT professionals. It centers around a structured workshop
where users and system people come together to develop an application. It
involves a detailed agenda, visual aids, a leader who moderates the session and
a scribe who records the specifications. It results in a final document containing
definitions for data elements, workflows, screens, reports and general system
specifications. Advantage is varying view points.
must bear in mind that a system that is feasible on the outset could
become unfeasible later. That is why incorporating feasibility check
points into the SDLC process is important.
Tangible benefits:
Monthly savings
Lesser staff
Intangible benefits:
Increased flexibility
Improved communication.
o In the requirements gathering and analysis phase, analysts define the problem and
generate alternatives for solving it. During this phase the team attempts to understand
the requirements for the system, analyzes these requirements to determine the main
problem with the current systems or processes and looks for ways to solve problems by
designing the new system.
o The first step of this phase is gathering information. Several techniques include surveys,
observations, interviews and the JAD approach. The intent is to find out what users do,
how they do it, what problems they gave in performing their jobs, how the new system
would address these problems, what users expect from the system, what decisions are
made, what data is needed to make decisions, where data comes from, how data should
be presented and what tools are needed to examine data for the decisions users make.
o All the information above is used to determine what the new system should do (process
analysis) and what data is needed for this process to be performed (data analysis).
o Systems specifications – defining the project scope, including what the system should
and shouldn’t do. The models created during this phase constitute the design
specifications.
o Two major approached for analysis and design of information systems: structured
systems analysis and design (SSAD) and the object orientated approach.
The SSAD approach treats process and data independently and is a sequential
approach that requires completing the analysis before beginning the design.
The object orientated approach combines process and data analysis and the line
between analysis and design is so thin that analysis and design seem to be a
single phase instead of two distinct phases as in SSAD.
Data flow Process analysis and Helps breakdown a complex process into
diagram(DFD) design simpler, more manageable and more
understandable sub processes; shows how
data needed by each process flows
between processes and what data is stored
in the system; it also helps define the
systems scope.
o During the design phase, analysts choose the solution that’s the most realistic and offers
the highest payoff for the organization. Details of the proposed solution are outlined,
and the output of this phase is a document with the exact specifications for
implementing the system, including files and database, forms and reports,
documentation, procedures, hardware and software, networking components and
general system specifications.
o The design phase consists of three parts: conceptual design, logical design and physical
design. The conceptual design is an overview of the system and doesn’t include
hardware and software choices. The logical design makes the conceptual design more
specific by indicating hardware and software. The physical design is created for a specific
platform.
o Design tools:
CASE tools support the design phase by helping analysts do the following:
Specification document
PROTOTYPING – a small scale version of the system is developed, but one that’s
large enough to illustrate the systems benefits and allows users to offer
feedback. Prototypes are used for the following purposes:
Advantages Disadvantages
they reduce the need for Might not reflect the systems
training information systems actual operations which can be
users misleading
Improve documentation
PHASE 4: IMPLEMENTATION
o During the implementation phase, the solution is transferred from paper to action, and
the team configures the system and procures components for it. Tasks that take place in
the implementation phase are:
Training employees
Coding
Testing
Parallel conversion – the old system and the new systems runs simultaneously
for a short time to ensure that the new system works correctly first.
Plunge (direct cutover) conversion – the old system is stopped and the new
system is implemented. This can be risky but can save on costs.
Pilot conversion – the analyst introduces the system in only a limited area of the
organization, such as a division or department. If the system works correctly, its
implemented in the rest of the organization in stages or all at once.
The main advantage – is that all vendors get the same information and
requirements so bids can be evaluated more fairly.
o IMPLEMENTATION ALTERNATIVES
SELF SOURCING – is when end users develop their own information systems
with little or no formal assistance from the information systems team. These
users might not know how to write programming code but are typically skilled
enough to use of the shelf software such as spreadsheets and database
packages to produce custom built applications.
PHASE 5: MAINTENANCE
As part of this phase, the team collects performance data and gathers
information on whether the system is meeting it objectives by talking with
users, customers and other people affected by the new system.
The SDLC model might not be suitable for the following situation:
Lack of specifications
Users needs change constantly meaning that the system will have to undergo many changes.
o The fundamental principle behind SOA is that the blocks of codes can be reused in a
variety of different applications, allowing new business processes to be created from a
pool of existing services. This means a reduced application development time, greater
flexibility and an improved return on investment.
EXTREME PROGRAMMING (XP) – divides a project into smaller functions, and developers cant
go on to the next phase until the current phase is completed. Each function of the overall
project is developed in a step by step fashion.
o Analysts write down features the proposed system should have called “the story” on
index cards. These cards include the time and effort needed to develop these features,
then the organization decides which features should be implemented and in which
order based on current needs.
o SDLC develops the entire system at once; XP develops the system in incremental
phases. XP key features are:
Simplicity
Incremental process
Teamwork
Continuous communication
ENTERPRISE SYSTEM – is an application used in all the functions of a business that supports decision
making throughout the organization.
o SUPPLY CHAIN MANAGEMENT (SCM) – is the process of working with suppliers and
other partners in the supply chain to improve procedures for delivering products and
services. An SCM system coordinates the following functions:
Procuring materials
SCM TECHNOLOGIES:
o Electronic data interchange (EDI) – enables business partners to send and receive
information on business transactions. By using the internet and established web
protocols for electronic exchange of information, companies can improve the efficiency
and effectiveness of the supply chain process. EDI expedites the delivery of accurate
information in the following processes among others:
Transaction acknowledgement
Financial reporting
Order status
Purchasing
EDI lowers cost of transmitting documents but also has drawbacks because it is
only beneficial if many companies are on the same EDI network.
o Internet enabled SCM – improves information sharing throughout the supply chain,
which helps reduce costs for information transmission and improves customer service.
Internet enabled SCM can improve the following SCM activities:
Order processing – checking orders, returns and improving speed and quality
o E-MARKETPLACES – is a third party exchange (B2B model) that provides a platform for
buyers and sellers to interact with each other and trade more efficiently online. E-
marketplaces can assist in the following ways
o ONLINE AUCTIONS – brings traditional auctions to customers around the globe and
makes it possible to sell far more goods and services than at a traditional auction.
A reverse auction invites sellers to submit bids for products and services. In
other words, there’s one buyer and many sellers: a one to many relationship.
The buyer can choose the seller that offers the service or product at the lowest
price.
o CRM system helps organizations make better use of data, information and knowledge to
understand their customer interactions for sales personnel and customer service
representatives so they can perform their jobs more effectively and efficiently.
o UPSELLING – can offer the same product but a different brand which is more expensive.
Order processing
Marketing automation
Customer support
Knowledge management
Personalization technology
o CRM APPLICATIONS***
PERSONALIZATION TECHNOLOGY
ENTERPRISE RESOURCE PLANNING (ERP) – is an integrated system that collects and processes
data and manages and coordinates resources, information and functions throughout an
organization. The drawbacks are high costs, difficult installation, training and compatibility
issues.
o ERP COMPONENTS
COMPONENTS FUNCTION
Unified database Collects and analyses relevant internal and external data and
information needed by other functions
PHASE TWO: THE DESIGN PHASE – the objective is to define criteria for the decision,
generate alternatives for meeting the criteria and define associations between the
criteria and the alternatives. Criteria are goals and objectives that decision makers
establish in order to achieve certain performance.
PHASE THREE: THE CHOICE PHASE – from the practical alternatives, the best and most
effective course of action is chosen.
PHASE FOUR: THE IMPLEMENTATION PHASE – the organization devises a plan for
carrying out the alternative selected in the choice phase and obtains the resources to
implement the plan.
COMPONENTS OF A DSS:
USER INTERFACE – is how users access the DSS, such as when querying the
database or models for help in making decisions. It must be flexible and user
friendly.
What if analysis – this shows the effect of a change in one variable. For example
if the cost is increased how with the final cost be affected.
Goal seeking – this is the reverse of what if analysis. It asks what has to be done
to achieve a particular goal.
Sensitivity analysis – this enables you to apply different variables, such as
determining the maximum price you could pay for raw materials and still make a
profit.
Cost savings
Better decisions
The systems objectives aren’t linked to factors that is critical to the business
success
Executives busy schedules and frequent travel make long training sessions
difficult.
EIS is useful for the following tasks: tracking performance, flagging exceptions,
ranking, comparing, spotting trends, and investigating/exploring.
GROUP SUPPORT SYSTEMS (GSS) – assist decision makers working in groups. These
systems use computer and communication technologies to formulate, process and
implement decision making task and can be considers a kind of intervention technology
that helps overcome the limitation of group interactions.
The intervention aspect of a GSS reduces communication barriers and introduces order
and efficiency into situations that are inherently unsystematic and inefficient such as
group meetings.
Matching the GSS level and sophistication to the groups size and scope of task.
Brainstorming
Database access
Online chat
Scheduling
To do lists
Workflow automation
Advantages Disadvantage
Costs and stress levels are reduces Lack of human touch – gestures,
because of less travelings handshakes, eye contact etc.
More time to talk and solve problems Unnecessary meetings – because arranging
a GSS is easy, they can schedule more than
is necessary
o Show the customers who live with a 5 mile radius to the sort, show driving route
home.
o Real estate – finding properties that meet buyers preferences and prices ranges.
Can help in establishing selling prices by surveying an entire city.
Get support from the top – management must support the system.
Define objectives and benefits clearly – identifying all costs and benefits in order to
present a convincing case to top management.
Identify executives information needs – examine the decision making process executives
use to find out is the decision are structured, semi structured or unstructured.
Keep the lines of communication open – make sure key decision makers are involved in
designing the MSS.
Hide the systems complexity and keep the interface simple – avoid using technical jargon
because managements main concern is getting the information they need in the
simplest possible way
Keep the look and feel consisting – should use standard layouts, formats, and colors in
windows, menus and dialog boxes for consistency and ease of use
Design a flexible system – all aspects of MSS change over time because of rapid
developments in technology and changing business needs. A flexible system can take
incorporate these changes quickly.
Make sure response time is fast – MSS designers must monitor response times as
executives won’t tolerate slow systems.
What if – this analysis is used in decision support systems. Decision makers use
it to monitor the effect of a change in one or more variables.
ROBOTICS
o ROBOTICS – robots and robotics are some of the most successful applications of AI.
They perform well at simple, repetitive tasks and can be used to free workers from
tedious hazardous jobs.
They don’t fall in love with coworkers, get insulted or call in sick
Personal robots include: twenty one robot, motorman robot and apriattenda
robot
.
EXPERT SYSTEMS
o EXPERT SYSTEMS – mimic human expertise in a particular field to solve a problem in a
well defined area. An expert system consists of programs that mimic human thought
behavior in a specific area that human experts have solved successfully.
o Heuristics data – consist of common sense, rules of thumb, educated guesses, and
instinctive judgment and using heuristic data encourages applying knowledge based on
experience to solve or describe a problem.
Forensics lab work – used to review DNA samples and generate results quickly
and accurately.
Banking and finance – assess historical trends, new events and buying and
selling factors.
Food industry – capture expertise that a highly specialized, long time employee
had about the business.
Security – track credit card holders purchasing trends and report deviations.
A lot of human expertise is needed but a single expert cant tackle the problem
on his own.
The decision or task has already been handled successfully by human experts.
Broad range of topics and there are not many rules involved.
o CASE BASED REASONING (CBR) – is a problem solving technique that matches a new
case (problem), with a previously solved case and its solution, both stored in a database.
After searching for a match, the CBR systems offers a solution; if no match can be found
even after supplying more information, the human expert must solve the problem.
INTELLIGENT AGENTS
Mobility – able to migrate from one platform to another with minimum human
intervention.
Reactivity – able to select problems or situations that need attention and act on
them.
o Categories of agents:
Personal agents
o Shopping and information agents – helps users navigate through vast resources
available on the Web and provide better results in finding information. These agents can
navigate the Web much faster than humans and gather more consistent, detailed
information. They can serve as search engines, site reminders, or personal surfing
assistants. Example pricescan.
o Personal agents – perform specific tasks for a user, such as remembering information
for filling out web forms or completing email addresses after the first few characters are
typed. They can generate auto responses, forward incoming messages and create email
replies.
o Data mining agents – work with a data warehouse and can detect trend changes and
discover new information and relationship among data items that aren’t readily
apparent.
o Monitoring and surveillance agents – usually track and report on computer equipment
and network systems to predict when a system crash or failure might occur.
FUZZY LOGIC
o FUZZY LOGIC – allows a smooth, gradual transition between human and computer
vocabularies and deals with variations in linguistic terms by using a degree in
membership. A degree of membership shows how relevant an item or object is to a set.
It is designed to help computers simulate vagueness and uncertainty in common
situations.
Dryers that convert information on load size, fabric type and flow of hot air into
drying times.
o ARTIFICIAL NEURAL NETWORKS (ANN) – are networks that learn and are capable of
performing tasks that are difficult with conventional computers, such as playing chess,
recognizing patterns in faces and objects and filtering spam email. ANN has an output
payer, an input layer and a middle (hidden) layer where learning takes place.
Bankruptcy prediction
Credit rating
Investment analysis
Target marketing.
GENETIC ALGORITHMS
Interface to databases
o The two types of activities are: interfacing, accepting human language as input, carrying
out the corresponding command and generating the necessary output. The second is
knowledge acquisition: using the computer to read large amounts of text and
understand the information well enough to summarize important point and store
information for future use.
o AI can improve DSS. They can add explanation capabilities (by integrating expert
systems), and learning capabilities (by integrating ANN systems) and create an interface
that’s easier to use (by integrating an NLP systems). Benefits of integrating the systems
are:
o PULL TECHNOLOGY – a user stats a need before getting information, as when a URL is
entered in a Web browser so that the user can go to a certain website.
Advantages:
Updated software
Disadvantages:
Risk that the applications might not fully meet the organizations needs
VIRTUAL REALITY
o VIRTUAL REALITY (VR) – uses computer generated three dimensional images to create
the illusion of interaction in a real world environment. It can be integrated with stereo
sound and tactile sensations to give users the feel of being immersed in a three
dimensional real world. In VR terminology, the everyday physical world is referred to as
an information environment.
o Familiar terms:
Telepresence – giving users the sense that they are in another location and can
manipulate objects as though they are really there.
Exocentric environment – the user is given a window view. Data is still rendered
in 3D, but users can only view it onscreen. They cant interact with objects, as in
an egocentric environment. Example a 3D movie.
Visual and aural systems – these components allow users to see and hear the
virtual world.
Manual control for navigation – this component allows the user to navigate in
the VR environment and control various objects. The most common used device
is the data glove which users can point, grab and manipulate objects. A data
glove can also be used as an input device like a mouse.
Walker – this input device captures and records movements of the users feet as
the user walks or turns in different directions.
Architectural design – can use the VR system to create blueprints and build
prototypes to show to clients.
Flight simulation – commercial airlines and the military have been using flight
simulators for training pilots to handle new equipment or unusual operating
conditions. It is safer and less expensive.
One major obstacle to using VR technology is that not enough fibre optic cables
are currently available to carry the data transmissions needed for a VR
environment capable of recreating a conference.
The following problems must be solved first before this technologys potential
can be realized:
Mobility and other problems with HMD’s – users are limited to an area
while wearing an HMD and cant switch to performing tasks outside the
virtual world without removing the gear.
o Passive RFID tags have no internal power supply, they can be very small. They absorb
the signal from the receiver device, convert this signal into energy and use this energy to
respond to the receiver. Passive tags last longer than active tags, 10 years.
o Active RFID tags have an internal power source and are usually more reliable than
passive tags and can broadcast signals over a wider range.
o RFID applications:
o APPLICATIONS:
ATM, credit and debit cards – if users forget their pins they can use biometric
attributes to access their cards.
Airport security and fast check in – use smart cards to check in.
Passports and highly secured government ID cards – a biometrically
authenticated passport or ID card can never be copied and used by an
unauthorized person.
TRENDS IN NETWORKING
o BLUETOOTH – which can be used to create a personal area network (PAN), is a wireless
technology for transferring data over short distances (usually within 30 feet) for fixed
and mobile devices.
o UTILITY (ON DEMAND) COMPUTING – is similar to the SaaS model and provides IT
services on demand. Users pay for computing or storage resources on an as needed
basis, similar to paying for utilities. Convenience and cost savings are two main
advantages of utility computing but draw backs are privacy and security.
NANOTECHNOLOGY
Information and communication (larger and faster storage devices, faster and
cheaper computers)