Professional Documents
Culture Documents
• Capital management
• Productivity
1.1
Management Information Systems
Managing the Digital Firm
Capital Management:
1.3
Management Information Systems
Managing the Digital Firm
There is a growing interdependence between a firm’s information systems and its business capabilities.
Changes in strategy, rules, and business processes increasingly require changes in hardware, software,
databases, and telecommunications. Often, what the organization would like to do depends on what its
systems will permit it to do.
1.4
Management Information Systems
Managing the Digital Firm
Productivity:
• IT is one of the most important tools managers
have to increase productivity and efficiency of
businesses.
1.6
Management Information Systems
Managing the Digital Firm
1.7
Management Information Systems
Managing the Digital Firm
1.8
Management Information Systems
Managing the Digital Firm
1.9
Management Information Systems
Managing the Digital Firm
• Time-based competition
• Turbulent environment
1.10
Management Information Systems
Managing the Digital Firm
1.11
The Emerging Digital Firm
1.12
Management Information Systems
Managing the Digital Firm
WHY INFORMATION SYSTEMS?
Business processes:
Refer to the set of logically related tasks & behaviors that
organizations develop over time to produce specific business
results & the unique manner in which these activities are
organized & coordinated.
1.13
Management Information Systems
Managing the Digital Firm
1.14
Management Information Systems
Managing the Digital Firm
1.15
Management Information Systems
Managing the Digital Firm
Raw data from a supermarket checkout counter can be processed and organized to produce meaningful information,
such as the total unit sales of dish detergent or the total sales revenue from dish detergent for a specific store or sales
territory.
1.16
Management Information Systems
Managing the Digital Firm
1.17
Management Information Systems
Managing the Digital Firm
• I/p captures raw data from within the org. or from its external
environment
• Processing – converts raw i/p into a meaningful form
• O/P – transfers the processed information to the users
• Feedback – used to evaluate or correct the i/p stage
1.18
Management Information Systems
Managing the Digital Firm
1.19
Management Information Systems
Managing the Digital Firm
1.20
Management Information Systems
Managing the Digital Firm
1.22
Management Information Systems
Managing the Digital Firm
1.23
Management Information Systems
Managing the Digital Firm
1.24
Management Information
System (MIS)
Information is critical
The information we have
is not what we want,
The information we want
is not the information we need,
The information we need
is not available.
Information is a Resource
It is scarce
It has a cost
It has alternative uses
There is an opportunity cost factor involved
if one does not process information
Data and Information
Data vs. Information
■ Data
A “given,” or fact; a number, a statement, or an image
Represents something (quantities, actions and objects) in the real
world
The raw materials in the production of information
■ Information
Data that have meaning within a context
Data that has been processed into a form that is meaningful to the
recipient and is of real or perceived value in the current or in the
prospective actions or decisions of the recipient.
Data Manipulation
Example: customer survey
■ Reading through data collected from a customer survey with questions
in various categories would be time-consuming and not very helpful.
■ When manipulated, the surveys may provide useful information.
Types and classification of Information
Characteristics of Useful Information
System
System: A set of components that work together to
achieve a common goal. Computer-based Information
Systems take data as raw material, process it, and
produce information as output.
Components of an Information System
A Networked Information System:
Three-Tier Architecture
Corporate Corporate Mainframe
Databases Headquarters Divisional
Minicomputers
with Divisional
Databases
Marketing
and Sales Finance Production
Divisional
Databases
Regional
Office
Work-
stations Plant Minicomputers
Salesforce
Notebooks Local Area Network: Telecommunications
PCs with Local Databases Link
Types of Information Systems
Operational-level systems support operational managers
by keeping track of the elementary activities and
transactions of the organization, such as sales, receipts,
cash deposits, payroll, credit decisions, and the flow of
materials in a factory.
Management-level systems serve the monitoring,
controlling, decision-making, and administrative activities of
middle managers. The principal question addressed by such
systems is this: Are things working well?
Strategic-level systems help senior management tackle
and address strategic issues and long-term trends, both in
the firm and in the external environment.
Types of Information Systems
MAJOR TYPES OF SYSTEMS IN
ORGANIZATIONS
20
Interrelationship Among Systems
The various types of systems in the organization have interdependencies. TPS are major producers of information
that is required by many other systems in the firm, which, in turn, produce information for other systems. These
different types of systems are loosely coupled in most business firms, but increasingly firms are using new
technologies to integrate information that resides in many different systems.
MAJOR TYPES OF SYSTEMS IN ORGANIZATIONS
Expert system:
Knowledge based IS that uses its knowledge
about a specific, complex application area to
act as an expert consultant to end users.
Table 2-2
Management Information Systems
Information Systems in the Enterprise
Table 2-4
Management Information Systems
Information Systems in the Enterprise
Table 2-5
Types of Information Systems
Outsourcing
The purchase of an externally produced good or
service that was previously produced internally
Advantages
■ Economy
■ Predictability
■ Frees up human resources
Disadvantages
■ Loss of control
■ Vulnerability of strategic information
■ Dependency
Outsourcing, In sourcing & Off shoring
PARTS OF THE COMPUTER SYSTEM
Hardware
The mechanical devices that make up the computer are called
Hardware. A computer’s hardware consists of interconnected
electronic devices that you can use to control the computer’s
operation, input, and output.
Software
Software is a set of instructions that makes the computer perform
tasks. In other words we can say that, software tells the
computer what to do. Here the program refers to any piece of
software
Data
Data consist of individual facts or pieces of information that by
themselves may not make much sense to a person. A computer
primary job is to process these tiny pieces of data in various
ways, converting them into useful information
Users
Peoples are the computer operators, also known as users. One
can argue that some computer systems are complete without a
person’s involvement; however no computer is totally
autonomous.
MEMORY
INPUT OUTPUT
CU
ALU
ESSENTIAL COMPUTER HARDWARE
A Computer’s hardware devices fall into one of four categories.
Processor: The procedure that transforms raw data into useful information is
called processing. The processor is like the brain of computer system. A
personal computer’s processor is usually a Single or a set of chips contained on
a circuit board.
Memory devices:
Memory devices are of two types.
R A M (Random Access Memory):RAM is like an electronic scratch pad inside
the computer.RAM is made up of a set of chips mounted on a small circuit
board.RAM is a volatile memory. RAM has a tremendous impact on the speed
and power of the computer.
All the computer’s resources are managed from the control unit.
It act as a traffic signal directing the flow of data through the CPU
as well as to and from other devices. The CPU instructions for
carrying out commands are built into the control unit.
The control unit is the logical hub of the computer.
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Computer
Software
–
–
–
–
–
–
–
•
•
•
•
•
•
•
–
–
•
•
•
•
–
–
•
•
•
•
–
–
•
•
•
❖
▪
▪
▪
▪
•
1.
2.
To have a clear picture
We first need to
understand...
• What is problem with existing
technology?
• Why Cloud Computing?
What is problem with existing technology?
Applications
• Oracle
• SAP
• Microsoft
Team of Experts
• Space
• Cooling
• Bandwidth
• Storage
• R&D
Business
Huge Servers
What is problem with existing technology?
Each of these Businesses has:
• Complexities
• Slowdown
• Crashes
• Increased Costs
Now imagine a system with one
CENTRALIZED SERVER:
Benefits:
• Simplicity
• Increased Speed
• No Crashes
• More Security
• Reduced Costs
• No Limits
What is Cloud?
•In other words, we can say that Cloud is something, which is present
at remote location.
1. Deployment Models
2. Service Models
Deployment Models
HYBRID CLOUD : The Hybrid Cloud is mixture of public and private cloud.
However, the critical activities are performed using private cloud while the
non-critical activities are performed using public cloud. Ex. IBM
Service Models
PaaS provides all of the facilities required to support the complete life
cycle of building and delivering web applications and services entirely
from the Internet.
•
•
•
•
•
•
•
•
•
•
•
1)
2)
3)
4)
5)
Modes of communication
1. Simplex Data Communication:
The communication is unidirectional.
•
•
•
Client/Server Computing
In client/server computing, computer processing is split between client machines and server
machines linked by a network. Users interface with the client machines.
•
•
A Multitiered Client/Server Network (N-Tier)
In a multitiered client/server network, client requests for service are handled by different
levels of servers.
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
–
–
–
•
–
–
–
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
It refers to the arrangement of the computers on the network or
shape of the network.
Topology describes where the cables are run and where the
workstations, nodes, routers, and gateways are located.
Clie
Clie nt Clie
nt nt
Clie Clie
SERVER nt
nt
Clie Clie
Clie nt
nt
nt
•
1.
2.
3.
•
1.
2.
•
1.
2.
•
1.
2.
3.
Client Client Client
Terminat
or
Client Client
•
1.
2.
3.
•
1.
2.
•
•
•
•
•
•
•
•
•
•
•
•
• A DSL (Digital Subscribers Lines) modem is a
communication device that provides high speed
communication over the regular telephone lines. DSL
modem is also known as a broadband modem.
•
•
•
•
•
•
–
–
•
•
•
•
•
•
1.
2.
3.
4.
5.
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Intelligence
Activity
Feedbac
Design Activity
k
Choice
Activity
Implementation
Review
•
•
•
•
•
•
• •
•
•
■
■
•
•
•
•
•
•
•
•
•
DATA WAREHOUSING, DATA
MINING & OLAP (On
Line Analytical Processing)
Foundation Data Concepts
Foundation Data Concepts
Data
Lega Warehous
cy e
Syst
em
– Measurement of
attributes.
– physical attribute.
of data remarks
– naming conventions.
loa
access
d
Operational v/s Historic Data
Features Operational Historic
Characteristics Operational processing Informational processing
Orientation Transaction Analysis
User Clerk,DBA,database Knowledge workers
professional
Function Day to day operation Decision support
Data Current Historical
View Detailed,flat relational Summarized,
multidimensional
DB design Application oriented Subject oriented
Unit of work Short ,simple transaction Complex query
Access Read/write Mostly read
Operational v/s Historic System
• Data marts:
Transfor
Extract Load
m
• Data extraction:
– Process of copying relevant data from a variety of transactional
databases for inclusion in a DW.
– May occur at regular intervals (e.g., weekly, monthly) to add new
data.
– Data from incompatible databases, flat files, text documents, etc.
must be filtered through appropriate API (application programming
interfaces) as needed.
• Data transformation:
– Next slide.
• Data loading:
– Extracted, cleaned, and transformed data is loaded into DW at a
predetermined data refresh frequency.
Building a Data Warehouse
• Data transformation:
– Data extracted from transactional databases must be cleaned
(“scrubbed”) and transformed before loading into a DW.
– Format differences across different tables/databases must be
reconciled.
– Missing or misspelled data values must be resolved.
– Erroneous data are identified using application programs, and
scrutinized/ corrected by DW analysts using system-generated
exception reports.
– Transaction-level data is aggregated by business dimensions.
– Key step in DW construction since DW is very sensitive to data
errors.
Life Insurance Auto Insurance Home Insurance
Database
PK: SS# (123-45-6789) Database
PK: DL# Database
PK: Acc# (12345678905)
Name (Robert G. (FL-B12345678)
Name (R. G. Smith)
Smith) Name (Bob Smith)
Challenges of Data
Data Mining
Data Mining works with
Warehouse Data
• Data Warehousing provides
the Enterprise with a memory
• 4 Stages of Data
– Data
– Information
– Knowledge
– Intelligence
Knowledge Discovery in Databases (KDD)
Steps in Knowledge Discovery in Databases
(KDD)
• Data Cleaning − In this step, the noise and inconsistent data is removed.
• Data Selection − In this step, data relevant to the analysis task are retrieved from the
database.
• Data Mining − In this step, intelligent methods are applied in order to extract data patterns.
• Knowledge Discovery
Concrete information gleaned from known data. Data you may
not have known, but which is supported by recorded facts.
(ie: Diapers and beer example)
• Knowledge Prediction
Uses known data to forecast future trends, events, etc. (ie:
Stock market predictions)
• Extra-Terrestrial Intelligence
Scanning Satellite receptions for possible transmissions from
other planets.
Text Mining
•Text Mining: the procedure of synthesizing the information
by analyzing the relations, the patterns, and the rules
among textual data - semi-structured or unstructured text.
•80% information is stored in text documents, journals, web
pages, emails, memos, reports...
Sales of DVDs
DIMENSIONS
y
in NY in August
cit
NY
DVD PRODUCT LOCATION TIME
category region year
produc
city day
mont
August
h store
Common OLAP Operations
• Roll-up: move up the
hierarchy
– e.g given total sales per city, PRODUCT LOCATION TIME
we can roll-up to get sales category region year
per state
product country quarter
• Drill-down: move down the
hierarchy state month week
– more fine-grained
aggregation
city day
– lowest level can be the
detail records (drill-through)
store
Slice and Dice Queries
t
uc
od
pr
stor
e
customer =
“Smith”
“Slicing and Dicing”
Household
Telecomm n s
io
eg
Video R Europe
Far East
Audio India
th
SF
n
Mo
10
Juice 47
Region
Cola
Milk
30
Cream 12 Product
⚫
⚫
⚫
⚫
⚫
⚫
⚫
⚫
⚫
⚫
⚫
⚫
⚫
⚫
⚫
⚫
TYPICAL SYMPTOMS
⚫ File deletion
⚫ File corruption
⚫ Visual effects
⚫ Pop-Ups
⚫ Computer crashes
Malware Types
Worms:
Programs that are capable of independently propagating
throughout a computer network.
They replicate fast and consume large amounts of the host
computers memory.
Malware Types
Trojan Horses:
Programs that contain hidden functionality that
can harm the host computer and the data it
contains.
These are not automatic replicators.
⚫
Phishing
Phishing is a technique used by strangers to
"fish" for information about you, information that
you would not normally disclose to a stranger,
such as your bank account number, PIN, and
other personal identifiers such as your National
Insurance number. These messages often contain
company/bank logos that look legitimate and use
flowery or legalistic language about improving
security by confirming your identity details.
Phishing example
A final word:
o Smart-card
o Biometric Authorization
o Firewalls
o Digital Signature
SECURITY MEASURES:
• In addition, users have to practice “safe
computing”
An important question arises that how can these crimes be prevented. A number of techniques and
solutions have been presented but the problems still exists and are increasing day by day.
Firewalls:
A firewall protects a computer network from unauthorized access. Network firewalls may be
hardware devices, software programs, or a combination of the two. A network firewall typically
guards an internal computer network against malicious access from outside the network.
What is a Firewall?
• a choke point of control and monitoring
• interconnects networks with differing trust
• imposes restrictions on network services
– only authorized traffic is allowed
– It controls incoming and outgoing traffic
– Acts as a gatekeeper, identifies names, IP addresses. It
checks it with access rules
– It is a combination of hardware and software.
Firewalls – Packet Filters
Crypto
• Cryptology ⎯ The art and science of
making and breaking “secret codes”
• Cryptography ⎯ making “secret
codes”
• Cryptanalysis ⎯ breaking “secret
codes”
• Crypto ⎯ all of the above (and more)
Basic Terminology
• plaintext - original message
• ciphertext - coded message
• cipher - algorithm for transforming plaintext to ciphertext
• key - info used in cipher known only to sender/receiver
• encipher (encrypt) - converting plaintext to ciphertext
• decipher (decrypt) - recovering ciphertext from plaintext
• cryptography - study of encryption principles/methods
• cryptanalysis (codebreaking) - study of principles/ methods of
deciphering ciphertext without knowing key
• cryptology - field of both cryptography and cryptanalysis
Crypto as Black Box
key key