Professional Documents
Culture Documents
Systems
Thirteenth Edition
Chapter 1
Business Information
Systems in Your Career
• Problem
– Improving revenue and player training through Big
Data.
• Solutions
– The Football Manager game simulation as a database
– A system of player-performance-enhancing IT
analytics apps
• Organizations
– Coordinate work through structured hierarchy and
business processes
– Business processes: related tasks and behaviors for
accomplishing work
▪ Examples: fulfilling an order, hiring an employee
▪ May be informal or include formal rules
– Culture embedded in information systems
▪ Example: UPS’s concern with placing service to
customer first
• People
– Information systems require skilled people to build,
maintain, and use them.
– Employee attitudes affect ability to use systems
productively.
– Role of managers:
▪ Perceive business challenges
▪ Set organizational strategy
▪ Allocate human and financial resources
▪ Creative work: new products, services
• Technology
– IT Infrastructure: Foundation or platform that
information systems are built on
▪ Computer hardware
▪ Computer software
▪ Data management technology
▪ Networking and telecommunications technology
– Internet and Web, extranets, intranets
– Voice, video communications
• Class discussion
– What technologies are used by JurongHealth? What
purpose do they serve?
– Search the web for RFID. Suggest an example of
using RFID for locating and tracking people.
– What information systems are implemented by
JurongHealth? Describe the input, processing, and
output of any one such system.
– Why are information systems important for
JurongHealth?
• Solution design
– Often many possible solutions
– Consider as many as possible to understand range of
solutions
• Solution Evaluation and Choice
– Factors include
▪ Cost
▪ Feasibility given resources and skills
▪ Length of time needed to implement solution
• Implementation
– Building or purchasing solution
– Testing solution, employee training
– Change management
– Measurement of outcomes
– Feedback, evaluation of solution
• Problem solving is a continuous process, not a single
event
– Sometimes chosen solution doesn’t work or needs
adjustment
• Accounting:
– Accountants increasingly rely on information systems
to summarize transactions, create financial records,
organize data, and perform financial analysis.
– Skills:
▪ Knowledge of databases and networks
▪ Online financial transactions and reporting
systems
▪ How systems are used to achieve accounting
functions
• Finance:
– Relationship between information systems and
financial management and services is so strong that
many advise finance majors to co-major in
information systems.
– Skills:
▪ Use systems for financial reporting, direct
investment activities, implementation of cash
management strategies
▪ Plan, organize, implement information systems
strategies for the firm
• Marketing:
– No field has undergone more technology-driven
change in the past five years than marketing and
advertising.
– Skills:
▪ Work with databases for tracking and reporting on
customer behavior, product performance, customer
feedback, product development
▪ Enterprise systems for product management, sales
force management, customer relationship
management
• Management:
– The job of management has been transformed by
information systems.
– Impossible to manage business today without
information systems
– Skills:
▪ Use of information systems for each function of
job, from desktop productivity tools to applications
coordinating the entire enterprise
• Information systems:
– Fast changing and dynamic profession because
information technologies are among most important
tools for achieving business firms’ key objectives
– Domestic and offshore outsourcing
– Skills:
▪ Uses of new and emerging hardware and software
to achieve six business objectives
▪ An ability to take a leadership role in the design
and implementation of new information systems
Chapter 2
Global E-business and
Collaboration
• Problem
– Hierarchical top-down processes
– Large geographically dispersed workforce
• Solutions
– Develop knowledge-sharing strategy and goals
– Redesign knowledge and collaboration processes
– Microsoft Yammer
– Enterprise social networking
• Class discussion
– What kinds of systems are illustrated in this case study? Where
do they obtain their data? What do they do with the data?
Describe some of the inputs and outputs of these systems.
– What business functions do these systems support? Explain
your answer.
– How do the data about teams and players captured by the NFL
help NFL football teams and the NFL itself make better
decisions? Give examples of two decisions that were improved
by the systems described in this case.
– How did using data help the NFL and its teams improve the way
they run their business?
• Enterprise applications
– Systems that span functional areas, focus on
executing business processes across the firm, and
include all levels of management
• Four major types
– Enterprise systems
– Supply chain management systems
– Customer relationship management systems
– Knowledge management systems
• E-business:
– Use of digital technology and Internet to drive major
business processes
• E-commerce:
– Subset of e-business
– Buying and selling goods and services through
Internet
• E-government:
– Using Internet technology to deliver information and
services to citizens, employees, and businesses
• Class discussion
– Discuss the features of Glasscubes as a collaboration
software.
– Why did the NSHCS require a tool for collaboration?
Was Glasscubes a feasible option?
– Name some other areas where such software can be
useful. Discuss at least one such area.
• Programmers
• Systems analysts
– Principle liaisons to rest of firm
• Information systems managers
– Leaders of teams of programmers and analysts,
project managers, physical facility managers,
telecommunications managers, database specialists,
managers of computer operations, and data entry staff
• Senior managers: CIO, CPO, CSO, CKO, CDO
• End users
Copyright © 2019 Pearson Education Ltd.
Information Systems Services
• Computing services
• Telecommunications services
• Data management services
• Application software services
• Physical facilities management services
• IT management services
• IT standards services
• IT educational services
• IT research and development services
Copyright © 2019 Pearson Education Ltd.
How Will MIS Help My Career?
Chapter 3
Achieving Competitive
Advantage with Information
Systems
• Problem
– expand the specialty food segment
– face off stiff competition from giant global competitors
– reconcile financial accounting systems across four
regions and thirty operating facilities
• Solutions
– Account Reconciliation and Task Management
system based on SAP’s ERP
• Demonstrates that businesses must change their
strategies over time
• Low-cost leadership
– Use information systems to achieve the lowest
operational costs and the lowest prices
– E.g. Walmart
▪ Inventory replenishment system sends orders to
suppliers when purchase recorded at cash register
▪ Minimizes inventory at warehouses, operating
costs
▪ Efficient customer response system
• Product differentiation
– Use information systems to enable new products and
services, or greatly change the customer convenience
in using your existing products and services
– E.g., Google's continuous innovations, Apple's iPhone
– Use information systems to customize, personalize
products to fit specifications of individual consumers
▪ E.g., Nike's NIKEiD program for customized
sneakers
• Network economics
– Marginal costs of adding another participant are near
zero, whereas marginal gain is much larger
– E.g., larger number of participants in Internet, greater
value to all participants
• Virtual company
– Uses networks to link people, resources, and ally with
other companies to create and distribute products
without traditional organizational boundaries or
physical locations
• Domestic exporters
• Multinationals
• Franchisers
• Transnationals
• Centralized systems
• Duplicated systems
• Decentralized systems
• Networked systems
Chapter 4
Ethical and Social Issues in
Information Systems
• Problem
– Opportunities from new technology
– Undeveloped legal environment
• Solutions
– Develop big data strategy
– Develop privacy policies
– Develop big data predictive models
– Develop big data mining technology
– Develop big data analytics tools and predictive
modeling systems
• Profiling
– Combining data from multiple sources to create
dossiers of detailed information on individuals
• Nonobvious relationship awareness (N ORA)
– Combining data from multiple sources to find obscure
hidden connections that might help identify criminals
or terrorists
• Golden Rule
– Do unto others as you would have them do unto you
• Immanuel Kant’s Categorical Imperative
– If an action is not right for everyone to take, it is not
right for anyone
• Slippery Slope Rule
– If an action cannot be taken repeatedly, it is not right
to take at all
• Utilitarian Principle
– Take the action that achieves the higher or greater
value
• Risk Aversion Principle
– Take the action that produces the least harm or
potential cost
• Ethical “No Free Lunch” Rule
– Assume that virtually all tangible and intangible
objects are owned by someone unless there is a
specific declaration otherwise
• Privacy
– Claim of individuals to be left alone, free from
surveillance or interference from other individuals,
organizations, or state; claim to be able to control
information about yourself
• In the United States, privacy protected by:
– First Amendment (freedom of speech and
association)
– Fourth Amendment (unreasonable search and
seizure)
– Additional federal statues (e.g., Privacy Act of 1974)
Copyright © 2019 Pearson Education Ltd.
Information Rights: Privacy and Freedom
in the Internet Age (2 of 3)
1. The Web server reads the user's Web browser and determines the
operating system, browser name, version number, Internet address, and
other information.
2. The server transmits a tiny text file with user identification information
called a cookie, which the user's browser receives and stores on the user's
computer.
3. When the user returns to the Web site, the server requests the contents of
any cookie it deposited previously in the user's computer.
4. The Web server reads the cookie, identifies the visitor, and calls up data on
the user.
Copyright © 2019 Pearson Education Ltd.
Technical Solutions
• Solutions include:
– Email encryption
– Anonymity tools
– Anti-spyware tools
• Overall, technical solutions have failed to protect users
from being tracked from one site to another
– Browser features
▪ “Private” browsing
▪ “Do not track” options
• Intellectual property
– Tangible and intangible products of the mind created
by individuals or corporations
• Protected in four main ways:
– Copyright
– Patents
– Trademarks
– Trade secret
• Class discussion
– Identify the problem described in this case study. In
what sense is it an ethical dilemma?
– Should more tasks be automated? Why or why not?
Explain your answer.
– Can the problem of automation reducing cognitive
skills be solved? Explain your answer.
Chapter 5
IT Infrastructure: Hardware
and Software
• Problem
– providing customers with timely service and drivers
with enough fares
– matching demand with resources in an unpredictable
sector
• Solutions
– Managed cloud infrastructure
– On-demand, scalable services
• Illustrates use of cloud computing to improve
effectiveness and control costs
• IT infrastructure
– Platform for supporting all information systems in the
business
• Computer hardware
• Computer software
• Data management technology
• Networking and telecommunications technology
• Technology services
© forance/123RF
• Cloud computing:
– Computing resources obtained over the Internet
▪ Infrastructure as a service (IaaS)
▪ Software as a service (SaaS)
▪ Platform as a service (PaaS)
– Public v s. private clouds
ersu
• Green computing
– Green IT
– Practices and technologies for minimizing impact on
environment
• High-performance and power-saving processors
– Multicore processors
– Reduced power consumption
• Class discussion
– Why did Glory choose a cloud solution as opposed to
modernizing the systems it had?
– Why was it necessary to hire a systems integrator
firm?
– What were the main organizational change
requirements for implementing the new cloud
platform?
– Why did management choose a regional rollout
strategy? Why in the UK?
• Outsourcing
– Using external provider to run computer center and
networks
– Web hosting service
– Offshore software outsourcing
– Service level agreements (SLAs)
• Using cloud services
– Appealing to businesses with smaller I T budgets
– Pricing is per hour, per-use
– Switching costs
Copyright © 2019 Pearson Education Ltd.
Managing Mobile Platforms
• Software localization
– Local language interfaces
– Complex software interfaces
• Differences in local cultures
• Differences in business processes
• These factors add to TCO of using technology service
providers
Chapter 6
Foundations of Business
Intelligence: Databases and
Information Management
• Problem
– Large volumes of data in isolated databases
– Outdated data management technology
• Solutions
– SAP HANA
– Data warehouse
– FanTracker
• Illustrates the importance of data management for better
decision making and customer analysis
• Database:
– Collection of related files containing records on people,
places, or things
• Entity:
– Generalized category representing person, place, thing
– E.g., SUPPLIER, PART
• Attributes:
– Specific characteristics of each entity:
▪ SUPPLIER name, address
▪ PART description, unit price, supplier
Copyright © 2019 Pearson Education Ltd.
Relational Databases
• Entity-relationship diagram
– Used to clarify table relationships in a relational
database
• Relational database tables may have:
– One-to-one relationship
– One-to-many relationship
– Many-to-many relationship
▪ Requires “join table” or intersection relation that
links the two tables to join information
• Normalization
– Streamlining complex groups of data
– Minimizes redundant data elements
– Minimizes awkward many-to-many relationships
– Increases stability and flexibility
• Referential integrity rules
– Ensure that relationships between coupled tables
remain consistent
• Select:
– Creates a subset of all records meeting stated criteria
• Join:
– Combines relational tables to present the server with
more information than is available from individual
tables
• Project:
– Creates a subset consisting of columns in a table
– Permits user to create new tables containing only
desired information
• “NoSQL”
• Handle large data sets of data that are not easily
organized into tables, columns, and rows
• Use more flexible data model
– Don’t require extensive structuring
• Can manage unstructured data, such as social media
and graphics
• E.g. Amazon’s SimpleDB, MetLife’s MongoDB
• Data warehouse:
– Database that stores current and historical data that
may be of interest to decision makers
– Consolidates and standardizes data from many
systems, operational and transactional databases
– Data can be accessed but not altered
• Data mart:
– Subset of data warehouses that is highly focused and
isolated for a specific population of users
• Information policy
– States organization’s rules for organizing, managing,
storing, sharing information
• Data administration
– Responsible for specific policies and procedures
through which data can be managed as a resource
• Database administration
– Database design and management group responsible
for defining and organizing the structure and content
of the database, and maintaining the database.
• Class discussion
– What are the benefits of intelligence-driven
prosecution for crime fighters and the general public?
– What problems does this approach to crime fighting
pose?
– What management, organization, and technology
issues should be considered when setting up
information systems for intelligence-driven
prosecution?
Chapter 7
Telecommunications, the
Internet, and Wireless
Technology
• Problem
– omnichannel retail strategy
– supply chain
• Solutions
– Hema app
– curating through QR codes
• Convergence
– Telephone networks and computer networks
converging into single digital network using Internet
standards
• Broadband
– Majority of U.S. Internet users have broadband
access
• Broadband wireless
– Voice, data communication are increasingly taking
place over broadband wireless platforms
• Client/server computing
– Distributed computing model
– Clients linked through network controlled by network
server computer
– Server sets rules of communication for network and
provides every client with an address so others can
find it on the network
– Has largely replaced centralized mainframe
computing
– The Internet: largest implementation of client/server
computing
Copyright © 2019 Pearson Education Ltd.
Key Digital Networking Technologies (2 of 3)
• Packet switching
– Method of slicing digital messages into parcels
(packets), sending packets along different
communication paths as they become available, and
then reassembling packets at destination
– Previous circuit-switched networks required assembly
of complete point-to-point circuit
– Packet switching more efficient use of network’s
communications capacity
• IPv6
– New addressing scheme for IP numbers
– Will provide more than a quadrillion new addresses
– Not compatible with current IPv5 addressing
• Internet2
– Advanced networking consortium
▪ Universities, businesses, government agencies,
other institutions
– Developed high-capacity 100 G bps testing network
– Testing leading-edge new technologies for Internet
Copyright © 2019 Pearson Education Ltd.
Internet Services and Communication
Tools (1 of 2)
• Internet services
– Email
– Chatting and instant messaging
– Newsgroups
– Telnet
– File Transfer Protocol (FTP)
– World Wide Web
• Voice over IP (VoIP)
– Digital voice communication using I P, packet
switching
• Unified communications
– Communications systems that integrate voice, data,
email, conferencing
• Virtual private network (VPN)
– Secure, encrypted, private network run over Internet
– PPTP
– Tunneling
• Class discussion
– Should managers monitor employee email and Internet
usage? Why or why not?
– Describe an effective email and web use policy for a
company.
– Should managers inform employees that their web
behavior is being monitored? Or should managers monitor
secretly? Why or why not?
• Search engines
– Google’s PageRank System
• Mobile search
• Semantic search
• Social search
• Visual search and the visual web
– Tagging
– Pinterest
• Second-generation services
• Enabling collaboration, sharing information, and creating
new services online
• Features
– Interactivity
– Real-time user control
– Social participation (sharing)
– User-generated content
• Competing standards
– CDMA: United States only
– GSM: Rest of world, AT&T, T-Mobile
• Third-generation (3G) networks
– 144 Kbps
– Suitable for email access, web browsing
• Fourth-generation (4G) networks
– Up to 100 Mbps
– Suitable for Internet video
– LTE and WiMax
Copyright © 2019 Pearson Education Ltd.
Wireless Computer Networks and Internet
Access (1 of 2)
• Bluetooth (802.15)
– Links up to 8 devices in 10-m area using low-power,
radio-based communication
– Useful for personal networking (PANs)
• Wi-Fi (802.11)
– Set of standards: 802.11
– Used for wireless LAN and wireless Internet access
– Use access points: device with radio
receiver/transmitter for connecting wireless devices to
a wired LAN
Chapter 8
Securing Information
Systems
• Problem
– Information technology is pervasive
– Social engineering attacks
• Solutions
– Educate customers about security practices
– Manage data breaches proactively
• Security
– Policies, procedures, and technical measures used to
prevent unauthorized access, alteration, theft, or
physical damage to information systems
• Controls
– Methods, policies, and organizational procedures that
ensure safety of organization’s assets; accuracy and
reliability of its accounting records; and operational
adherence to management standards
• Accessibility of networks
• Hardware problems (breakdowns, configuration errors,
damage from improper use or crime)
• Software problems (programming errors, installation
errors, unauthorized changes)
• Disasters
• Use of networks/computers outside of firm’s control
• Loss and theft of portable devices
• Trojan horse
• SQL injection attacks
• Ransomware
• Spyware
– Key loggers
– Other types
▪ Reset browser home page
▪ Redirect search requests
▪ Slow computer performance by taking up memory
• Hackers v s. crackers
ersu
• Activities include:
– System intrusion
– System damage
– Cybervandalism
▪ Intentional disruption, defacement, destruction of
website or corporate information system
• Spoofing and sniffing
• Identity theft
– Phishing
– Evil twins
– Pharming
• Click fraud
• Cyberterrorism
• Cyberwarfare
• H IPAA
– Medical security and privacy rules and procedures
• Gramm-Leach-Bliley Act
– Requires financial institutions to ensure the security
and confidentiality of customer data
• Sarbanes-Oxley Act
– Imposes responsibility on companies and their
management to safeguard the accuracy and integrity
of financial information that is used internally and
released externally
• Electronic evidence
– Evidence for white collar crimes often in digital form
– Proper control of data can save time and money
when responding to legal discovery request
• Computer forensics
– Scientific collection, examination, authentication,
preservation, and analysis of data from computer
storage media for use as evidence in court of law
– Recovery of ambient data
• Firewall
– Combination of hardware and software that prevents
unauthorized users from accessing private networks
– Packet filtering
– Stateful inspection
– Network address translation (NAT)
– Application proxy filtering
• WEP security
– Static encryption keys are relatively easy to crack
– Improved if used in conjunction with V PN
• WPA2 specification
– Replaces WEP with stronger standards
– Continually changing, longer encryption keys
• Encryption
– Transforming text or data into cipher text that cannot
be read by unintended recipients
– Two methods for encryption on networks
▪ Secure Sockets Layer (SSL) and successor
Transport Layer Security (TLS)
▪ Secure Hypertext Transfer Protocol (S-HTTP)
• Class discussion
– It has been said that a smartphone is a computer in
your hand. Discuss the security implications of this
statement.
– What kinds of security problems do mobile computing
devices pose?
– What management, organizational, and technology
issues must be addressed by smartphone security?
– What steps can individuals and businesses take to
make their smartphones more secure?
Chapter 9
Achieving Operational
Excellence and Customer
Intimacy: Enterprise
Applications
• Problem
– Antiquated IT infrastructure and ERP system
– disparate processes for each country and market
– massive operational inefficiencies
• Solutions
– Numerous separate legacy systems replaced with
Oracle’s JD Edwards EnterpriseOne ERP system
• Demonstrates use of technology to maximize supply
chain efficiency, integrate data into a common source
• Class discussion
– Identify the delivery problems Alibaba faced. How does
physical flow impact its business?
– What factors contributed to Alibaba’s problems with
physical flow?
– How did Cainiao Networks impact Alibaba’s business?
‘
• Operational CRM
– Customer-facing applications
– Sales force automation Call center and customer
service support
– Marketing automation
• Analytical CRM
– Based on data warehouses populated by operational
CRM systems and customer touch points
– Analyzes customer data (OLAP, data mining, etc.)
▪ Customer lifetime value (CLTV)
• Class discussion
– What was the problem at Kenya Airways described in this case?
What people, organization, and technology factors contributed to
this problem?
– What was the relationship of customer relationship management
to Kenya Airway’s business performance and business strategy?
– Describe Kenya Airway’s solution to its problem. What people,
organization, and technology issues had to be addressed by the
solution?
– How effective was this solution? How did it affect the way Kenya
Airways ran its business and its business performance?
• Enterprise solutions/suites
– Make applications more flexible, web-enabled,
integrated with other systems
• SOA standards
• Open-source applications
• On-demand solutions
• Cloud-based versions
• Functionality for mobile platform
• Social CRM
– Incorporating social networking technologies
– Company social networks
– Monitor social media activity; social media analytics
– Manage social and web-based campaigns
• Business intelligence
– Inclusion of BI with enterprise applications
– Flexible reporting, ad hoc analysis, “what-if”
scenarios, digital dashboards, data visualization
Chapter 10
E-commerce: Digital
Markets, Digital Goods
• Problem
– Opportunities presented by new technology
– Political and regulatory hurdles
• Solutions
– Driver and rider apps
– Demand prediction software
• Illustrates the use of IT to create new services as well as
business models
• Demonstrates the disruptive effects of new technologies
Sources: Based on data from e Marketer, “US Retail Ecommerce Sales, 2015-2021,”
2017a; eMarketer, “US Digital Travel Sales, 2014-2020,” 2016; and eMarketer chart, “U S
Mobile Downloads and In-App Revenues 2013-2016,” 2016.
Copyright © 2019 Pearson Education Ltd.
Why E-Commerce is Different (1 of 2)
• Ubiquity
– Marketspace is virtual
– Transaction costs reduced
• Global reach
– Transactions cross cultural and national boundaries
• Universal standards
– One set of technology standards: Internet standards
• Richness
– Supports video, audio, and text messages
• Interactivity
• Information density
– Greater price and cost transparency
– Enables price discrimination
• Personalization/customization
– Technology permits modification of messages, goods
• Social technology
– Promotes user content generation and social
networking
• Portal
• E-tailer
• Content provider
• Transaction broker
• Market creator
• Service provider
• Community provider
• Advertising
• Sales
• Subscription
• Free/Freemium
• Transaction fee
• Affiliate
Sources: Data from eMarketer chart “Retail Mcommerce Sales, US, (billions)
2015-2021,” eMarketer, 2017
Chapter 11
Improving Decision Making
and Managing Knowledge
• Problem
– Opportunities from new technology
– Aging population
• Solutions
– Healthcare monitoring your body’s vital signs in real
time
– Cloud servers
– Big Data software analytics
– Smartphone connections to patients
1. Intelligence
– Discovering, identifying, and understanding the
problems occurring in the organization
2. Design
– Identifying and exploring various solutions
3. Choice
– Choosing among solution alternatives
4. Implementation
– Making chosen alternative work and monitoring how
well solution is working
Copyright © 2019 Pearson Education Ltd.
Figure 11.2 Stages in Decision Making
• Humans eliminated
• Decision-making process capture by computer algorithms
• Predefined range of acceptable solutions
• Decisions made faster than managers can monitor and
control
• E.g. Trading programs at electronic stock exchanges
• Accuracy
• Comprehensiveness
• Fairness
• Speed (efficiency)
• Coherence
• Due process
• Production reports
• Parameterized reports
• Dashboards/scorecards
• Ad-hoc query/search/report creation
• Drill-down
• Forecasts, scenarios, models
– Linear forecasting, what-if scenario analysis, data
analysis
• Operational intelligence
– Day-to-day monitoring of business decisions and
activity
• Real-time monitoring
• Schneider National truckload logistics services provider
– Data developed from sensors in trucks, trains,
industrial systems
• The Internet of Things (IoT) providing huge streams of
data from connected sensors and devices
• Location analytics
– Big data analytics that uses location data from mobile
phones, sensors, and maps
– E.g. Helping a utility company view customer costs as
related to location
• GIS – Geographic information systems
– Help decision makers visualize problems with
mapping
– Tie location data about resources to map
• Artificial intelligence
• Intelligent techniques
– Capture knowledge
– Discover patterns and behaviors in large amounts of
data
– Perform some human-like action
– Generate solutions to problems to complex for
humans to solve alone
– Used in decision making and knowledge
management
• Class discussion
– What technologies are used by SSI? What is their
purpose?
– To what extent was technology responsible for Team
Singapore’s success at the SEA games? Explain.
– Search the web for SimulCam and StroMotion. How
can these tools be used for video analysis?
– Search the web for the role of big data in the German
team’s 2014 World Cup victory and compare it with
Team Singapore’s success at the SEA Games.
Copyright © 2019 Pearson Education Ltd.
Figure 11.8 How a Neural Network Works
• Intelligent agents
– Software programs that work in the background to
carry out specific repetitive tasks
• Natural language processing
– Software that can process voice or text commands
using natural human language
• Computer vision systems
– Emulate human visual system to view and extract
information from real-world images
• Robotics
– Design and use of movable machines that can
substitute for humans
• Expert systems
– Capture human expertise in a limited domain of
knowledge
– Express expertise as a set of rules in a software
system
– Knowledge base
– Inference engine
• Class discussion
– Why have robots caught on in manufacturing? What
knowledge do they require?
– Can robots replace human workers in manufacturing?
Explain your answer.
– If you were considering introducing robots in your
manufacturing plant, what people, organization, and
technology issues would you need to address?