Professional Documents
Culture Documents
Managers – Session-01&02
1
Topics to be Covered
• Introduction to information systems
• Advances in information systems
• Impact on Business
• Functions of management
• Levels of management
2
Introduction to information
systems
•Information Technology supports every business
function
3
Advances in information systems
• Social networking sites, big data
• Applications in science and technology
• Mobile applications (e.g. BFSI segment)
• Automation (Education, retail, etc.)
• Artificial Intelligence (Decision making, etc.)
4
Impact on Business
• Globalization
• Improving top line
• Improving bottom line
• Informed decision making
• Increased customer satisfaction
5
Management
• Management is the process of
directing tasks and organizing
resources to achieve organization
goals
6
Functions of Management
• Planning
• Organizing
• Leading
• Controlling
7
Planning
• Establishing organization goals
• Developing strategies to achieve
goals
8
Organizing
• Developing the structure of the
organization
• Acquiring human resources
9
Leading
• Motivating and managing
employees
• Forming task groups
10
Controlling
• Evaluating performance
• Controlling the organization
resources
11
Levels of management
• Top management
• Middle management
• First line management
12
Top management
• Establishing the goals of the
organization
13
Middle management
• Allocating resources so that the
objectives of top management are
accomplished
14
First line management
• Supervising day-to-day operations
15
Activities of an organization
• Strategic planning (Long range
plans)
• Tactical planning (Budgets tactical
plans)
• Operational planning (Day-to-day
transactions)
16
Framework for information
systems
• Each level (Operational, tactical and
strategic planning) – requires specific
information systems
17
Operational systems
characteristics -1
• Repetitiveness – daily, weekly,
monthly
• Predictability
• Emphasis on the past – past
activities of an organization.
• Detailed nature – information is
very detailed e.g payslips
18
Operational systems
characteristics -2
• Internal origin – data comes from
internal sources. E.g. Payslip data
comes from timesheets
• Structured form – format of input
and output data is highly structured
• Great accuracy – data input and
output are carefully checked
19
Tactical systems
• Provide middle level managers with
the information they need to
monitor and control operations and
to allocate their resources effectively
20
Tactical systems characteristics -1
• Summary Reports – provide
management with important totals,
averages, key data and abstracts on the
activities of the organization
21
Tactical systems characteristics -2
• Adhoc Reports – Reports that
managers need, usually quickly, that
may never be needed again. E.g.
Overtime hours based on timesheets
22
Tactical systems characteristics -3
• Unexpected findings. E.g. Billing alerts
in a cloud computing environment due
to hacking
23
Tactical systems characteristics -4
• Summary form – The information is
usually not detailed, but in summary
form
24
Strategic planning systems
• Designed to provide top managers
with information that assists them in
making long-range planning decisions
for the organization.
25
Strategic planning systems
characteristics -1
• Adhoc basis – Information may be
produced either regularly or periodically.
26
Strategic planning systems
characteristics -2
• Summary form – Information is usually not detailed, but in
summary form. Long range planners are not usually
interested in detailed information; they are usually
concerned with more global data and trends.
• External data – A large part of the data used for input to the
system may be acquired from sources external to the
organization. E.g Gartner reports / Market research reports
• Unstructured format – Data used for input to the system
may contain data that are unstructured in format.
• Subjectivity – The data used for input to the system may be
highly subjective
27
Comparison of Information System
Characteristic Operational Tactical Strategic Planning
29
Stages of new information
technology growth
• Phase1: Investment / Project initiation
• Phase2: Technology learning and
adaptation
• Phase3: Management Control
• Phase4: Widespread technology transfer
30
Organization & Strategy
31
Summary
• Introduction to information systems
• Advances in information systems
• Impact on Business
• Functions of management
• Levels of management
•Components of information systems
•Stages of new information technology growth
•Organization & Strategy
32
Information Systems for
Managers - S03
Dr. C. Lakshmi Devasena,
IBS Hyderabad
1
Previous session
• Management, functions of management
• Levels of management
• Framework for information systems
•Components of IS
• Stages of new information technology
growth
2
Introduction
• Systems Concepts.
• Systems Characteristics
• Systems and their environment
• How a system works
• Systems approach to problem solving
• Transition to learning organization
3
Systems Concepts
• A system is an integrated set of
components, or entities that interact
to achieve a particular function or
goal.
4
Systems Characteristics
• System boundaries
•Purpose
•Systems and sub-systems - E.g. In a
business system, marketing, finance
and HR are examples of sub-systems
•Constraints
•Environment
•Outputs and inputs
•Interfaces
5
Systems and their environment -
01
• The system’s environment consists of
people, organizations and other
systems that supply data to or that
receive data from the system.
6
Systems and their environments
- 02
• Open systems - Open systems operate
in an external environment and
exchange information and data with
that environment.
• Closed systems - Closed system is
relatively self contained. It doesn’t
exchange information with its
environment.
7
Systems and their environments
- 03
• System feedback – Feedback is an
indicator of current performance when
compared to a set of standards. With
effective feedback, continuous adjustments
in the activities of a system can be made to
assure that the system achieves its goals
8
How a system works - 01
• System concepts in business – Systems approach
is a way of analyzing business problems. It views the
business organization as a system of interrelated
parts designed to accomplish goals. Managers must
understand the goals of the total system and design
the functions of the sub-system.
9
How a system works - 02
• Information system as a system – An
information system contains elements such
as hardware, software, personnel, databases
and procedures to accomplish its objectives.
• Hardware consists of computer devices and
communication equipment. Software
consists of instructions that the hardware
uses. Software consists of application
software and systems software.
10
How a system works - 03
• Sub systems – Each sub-system performs a
specialized task that supports the business
objectives. If one of the sub-systems breaks
down, the overall business will feel the
effect.
11
How a system works - 04
• Hierarchy of sub-systems – The sub-
systems within an information system
can be organized into a hierarchy to
represent their functions within the
overall system. Each sub-system
performs a specialized function.
12
How a system works - 05
• Sub-system interfaces – Interfaces
exist between the sub-systems of an
information system. Generally the
sub-systems are loosely coupled.
13
How a system works - 06
• Input controls – Input control ensures
that data is valid before they are
processed accurately. Password security
is used to ensure authorized access.
14
Systems approach to problem
solving
Systems approach to problem solving
involves the following steps
• Define the problem.
• Gather the data describing the problem
• Identify alternative solutions
• Evaluate these alternatives
• Select and implement the best alternative
• Follow up to determine whether the
solution is working
15
Transition to learning
organization - 01
• The most successful organizations will
be the learning organizations, and the
ability to learn faster than the
competitor will be the key to
maintaining a sustainable competitive
organization.
16
Transition to learning
organization - 02
Five disciplines of the learning organization
• Personal Mastery
• Mental models
• Building shared vision
• Team learning
• Systems thinking
17
Transition to learning
organization - 03
Learning disabilities that interfere with
systems thinking
• Individuals focus on their own position
• Individuals blame someone else when
problems arise
• Reactiveness instead of Proactiveness
• Individuals spend time on events rather
than processes
• Functional hierarchies
18
Transition to learning
organization - 04
Corporations can use the systems
approach to analyze and understand
the problems that occur in business
systems
19
Transition to learning
organization - 05
Feedback in the learning organization
• Balancing feedback is a type of feedback
that tries to achieve stability. E.g. Training
need analysis based on 360 degree
feedback
20
Summary
• Systems Concepts.
• Systems Characteristics
• Systems and their environment
• How a system works
• Systems approach to problem
solving
• Transition to learning organization
21
Information Systems for
Managers - 04
1
Introduction
• Business Processes
• Impact of IT
• Reengineering of work
• IT and Business Process Redesign
• Management challenges in Business Process
Redesign
2
Business Processes
• Business processes refer to the manner in
which work is organized, coordinated and
focused to produce a valuable product or
service.
• They are the collection of activities required to
produce a product or service.
• Performance of a business firm depends on
how well its business processes are designed
and coordinated.
3
Order Fulfillment Process
production
Assemble product Ship product
4
Cashless Claims Process
How IT improves Business Processes
• Information systems automate many steps in
business processes that were formally
performed manually. E.g. Leave management
System
• Business processes can be improved by using
information technology to achieve greater
efficiency, innovation and customer services.
E.g. core banking system
6
Impact of IT - 01
• Efficiency - doing things right
• Effectiveness - doing the right things
• Transformation - Transforming the way a
functional unit or an organization does
business using information technology
7
Impact of IT - 02
How do applications that achieve the objectives
of efficiency, effectiveness and transformation
affect the individual, functional unit and the
organization?
8
Impact of IT - 03
Applications that have an impact on individual
Efficiency Task Mechanization Word processing.
Using a
spreadsheet to do
budget plan
9
Impact of IT - 04
Applications that have an impact on functional
unit
Efficiency Process Automation Order-entry; credit
checking
10
Impact of IT - 05
Applications that have an impact on the
organization
Efficiency Boundary extension Online order entry
linking customers
and suppliers
11
Framework for application of IT
Individual Functional Unit Organization
12
Reengineering of work
• Process of reengineering of work
– Organize around outcomes, not around tasks
– Have those who use output of a process to
actually perform the process
– Treat geographically dispersed units as if they are
centralized
– Link parallel activities during the process, rather
than at the end of the process
– Capture information once at the source
13
Business Process Reengineering and
Business Process Redesign
14
IT and Business Process Redesign
• Steps in business process redesign
– Develop business vision and process objectives
– Identify processes to be re-designed
– Understand and measure existing processes
– Identify IT levers
– Design and build prototype of the process
15
Role of IT in Business processes
(re-design)
• Entities
– Inter-organizational processes
– Inter-functional processes
– Inter-personal processes
• Activities
– Operational activities
– Managerial activities
16
Management challenges in Business
process re-design
• Guidelines to manage transition
– Create task force with people from cross functional
groups
– Have re-design teams work closely with managers and
staff
– Explain thoroughly the information systems group wrt
power offered by technology
– Build a team of industrial engineers with strong
interpersonal skills, understanding of multiple
functions, process measurement etc.
– Build IT technology platforms that support cross
functional applications.
17
Summary
• Business Processes
• Impact of IT
• Reengineering of work
• IT and Business Process Redesign
• Management challenges in Business Process
Redesign
18
Information systems for managers –
S06
1
Introduction
• Types of information systems
• Systems for linking enterprise
• e-business, e-commerce, e-governance
• Collaboration
• Systems and tools for collaboration
• IS department and functions
2
Types of Information Systems
• Transaction Process Systems(TPS)
– For operational managers. e.g Payroll transaction processing system
• Business Intelligence Systems(BIS) or Mgt Info System (MIS)
– For middle level managers and will help in decision making
– It is normally in the form of reports and dashboards
– TPS supply summarized data to the BIS or MIS.
• Decision Support Systems(DSS)
– Support non-routine decision making
– DSS bring in information from external sources such as current stock
prices or product prices of competitors
– Systems use a variety of models to analyze data.
• Executive Support Systems(ESS)
– For senior level managers who use these along with BI
– Reports and dash boards in form of charts and graphs
– They are reviewed periodically( weekly ,monthly, quarterly etc.)
3
Transaction Processing System
A transaction processing system collects and
stores data about transactions and sometimes
controls decisions made as part of a
transaction.
The transaction is the activity that changes
stored data, examples of such an activity
would be using a credit card to make a
reservation or making a cash withdrawal at an
ATM.
4
Transaction Processing System
5
Transaction Processing System
A TPS for payroll processing captures employee payment transaction data (such as a
time card). System outputs include online and hard-copy reports for management
and employee paychecks
6
Management Information System
In the system illustrated by this diagram, three TPS supply summarized transaction data to
the MIS reporting system at the end of the time period. Managers gain access to the
organizational data through the MIS, which provides them with the appropriate reports. 7
Business Intelligence System
Simple MIS Report
8
Decision Support System
A decision support system (DSS) is a computer
application that analyzes business data and
presents report so that managers can make
business decisions more easily.
9
Executive Support System
Executive Support System (ESS) is a reporting tool (software) that allows you
to turn your organization's data into useful summarized reports.
• For example, the CEO of Leiner Health Products, one of the largest
manufacturers of private-label vitamins and supplements in the United
States, has an ESS that provides on his desktop a minute-to-minute view of
the firm’s financial performance as measured by working capital, accounts
receivable, accounts payable, cash flow, and inventory. The information is
presented in the form of a digital dashboard, which displays on a single
screen graphs and charts of key performance indicators for managing a
company
10
Systems for Linking Enterprise
• Specific to that organization
• ERP( Enterprise Resource Planning) systems
systems that span functional areas, focus on executing business processes across the business firm,
and include all levels of management
• Supply Chain Management (SCM) Systems
– Inter organizational system
• These systems help suppliers, purchasing firms, distributors, and logistics companies
share information about orders, production, inventory levels, and delivery of products
and services so that they can source, produce, and deliver goods and services efficiently.
• Customer Relationship Management(CRM) Systems
Used to optimize
– Revenue and profits
– Customer satisfaction
– Customer retention
– Customer expansion
• This information helps firms identify, attract, and retain the most profitable customers;
provide better service to existing customers; and increase sales.
11
Enterprise Resource Planning (ERP)
12
Supply Chain Management (SCM)
13
Systems for Linking Enterprise(contd.)
• Knowledge Management (KM) Systems
– Knowledge acquisition
– Knowledge retention
– Knowledge dispersion/distribution
– Proficiency building
– Continual improvement
– Customized knowledge building
• Intranet and Extranet for information sharing
14
Enterprise Application Architecture
15
E-business
• Use of digital technology and the internet to
execute major business processes in the
enterprise. E.g. Alibaba.com
it includes
– Activities for the internal management
– Coordination with suppliers
– Coordination with customers and also
– E-commerce
16
E-commerce
• It is that part of the e-business that deals with buying and
selling goods and services over the internet. E.g. Flipkart,
Amazon
17
E-governance
• Application of internet and networking
technologies to digitally enable government
and public sector agencies’ relationship with
citizens, business and other groups of
government
18
Collaboration
• In simple term it is team work
• It is working with others to achieve shared goals
or/and explicit goals
• Ranging from “one to one” to “many to many”
• The extent and magnitude varies depending on
task
• Could be internal to organization or external or
mix of both
19
Reasons for Collaboration
• Changing nature of work - A recent report from the consulting firm McKinsey
and Company argued that 41 percent of the U.S. labor force is now composed of jobs
where interaction (talking, e-mailing, presenting, and persuading) is the primary value-
adding activity
• Changing organization of the firm - Today, work is organized into groups and
teams, who are expected to develop their own methods for accomplishing the task.
• Changing scope of the firm - The work of the firm has changed from a single
location to multiple locations—offices or factories throughout a region, a nation, or
even around the globe
• Emphasis on innovation - Bill Gates and Steve Jobs (founders of Microsoft and
Apple), both of whom are highly regarded innovators, and both of whom built strong
collaborative teams to nurture and support innovation in their firms
21
Requirements for effective
collaboration
• Collaboration capability
– Open culture CC
– Decentralized structure
CQ FP
– Breadth of collaboration
• Collaboration Technology CT
22
Tools and Technology for Collaboration
• e-mail
• Instant messaging
• Social network
• Blogs
• WiKi
• Virtual worlds eg. Second Life
23
Internet based collaboration
environment
• Virtual meeting systems (skype)
• Google apps and sites
• Microsoft share point
• IBM’s Lotus notes
24
Time Space Matrix
26
Summary
• Types of information systems
• Systems for linking enterprise
• e-business, e-commerce, e-governance
• Collaboration
• Systems and tools for collaboration
• IS department and functions
27
Information systems for managers –
S08
1
Topics Covered
• IT Infrastructure
• Infrastructure components
• Current hardware trends
• Current software trends
• Open source software
• Cloud computing
2
Infrastructure
– The basic facilities, physical and organizational structures and
facilities needed for the operation of a society or organization or
a function.
4
5
Mainframe
6
Minicomputer
7
Multi-tier Client Server
8
Other Classification
• Based on capacity and size
– Super computers - bips
– Mainframe computers - mips
– Minicomputers
– Microcomputers (Desktop PCs, laptops)
– Personal devices like laptop, notebook etc.
– Personal digital assistants
– Smart phones
Size varies from a large room/hall to palmtop
9
Technology Drivers
• Moore’s Law 01010111 =87
– Computing power doubles every 18 months
– Price of computing falls by half every 18 months
• The law of Mass digital storage
– Amount of digital information roughly doubling every year
• Metcalfe’s Law & Network Economics
– value of a telecommunications network is proportional to the
square of the number of connected users of the system
• Declining Commn. Cost & The internet
• Standards and N/W effects
– Technology standards eg. ASCII, OSI Model, TCP/IP, Ethernet,
IBM/MS/Intel PC,
10
Moore’s Law
11
IT infrastructure Components/ Eco
Systems
• Computer Hardware platforms
– Dell, IBM, HP, Sun Micro Systems (now by Oracle)
– Chip producers: Intel, AMD, IBM
• Operating systems platforms
– MS-Dos, Unix, Windows, Linux etc.
• Enterprise software applications
– SAP, MS Project, Oracle ERP, etc
• Networking/Telecommunications
– AT&T, Nortel, CISCO
• Consultants and system integrators
– IBM, Infosys, TCS etc.
• Data Management and storage
– SQL Server, DB2, SAN (Storage area networks connect multiple storage devices on a separate
high speed network dedicated to storage)
• Internet platforms
– Java, .NET
12
IT Infrastructure Components
13
Hardware Platform trends -1
• Mobile digital platform – smartphones have taken on
many functionalities of PCs – surfing of internet, email,
messaging, exchanging data over extranets, kindle.
• Grid computing – connecting geographically remote
computers into a single network to create a virtual
supercomputer by combining the computational power
of all computers on the grid.
• Virtualization – is the process of presenting a set of
computing resources so that they can all be accessed in
ways that are not restricted by physical configuration
or geographical location.
14
Hardware Platform trends - 2
• Cloud computing features
– on demand self service (individuals can get computing capabilities on
their own)
– Network access from anywhere on internet
– Location independent resource pooling
– Rapid elasticity
– Measured services
• Services Provided
– SaaS
– PaaS
– IaaS
• Types
– Public
– Private
– Community
– Hybrid
15
Hardware Platform trends - 3
• Green computing – minimize impact on the
environment (reducing power consumption)
• Autonomous computing (develop systems
that can heal themselves, optimize and tune
themselves, protect from intruders).
16
Software Trends
• Open source software – software produced by a
community of several programmers which is free. E.g.
Linux, Apache web server, MySQL database, Mozilla firefox
browser
• Software for the Web
– Java: OS independent object oriented programming language
– Ajax (Asynchronous javascript and XML): client and server
exchange data without reloading the entire page, HTML for
presentation, XML for data transfer
• Web services and service oriented architecture
• Enterprise applications
• Cloud based software services and tools
• Mobile Apps
17
Summary
• IT Infrastructure
• Infrastructure components
• Current hardware trends
• Current software trends
• Open source software
• Cloud computing
18
EMERGING TRENDS, TECHNOLOGIES,
AND APPLICATIONS
Trends in Software and Service Distribution
• Recent trends in software and service
distribution include:
– Pull and push technologies
– Application service providers
• Pull technology
– User states a need before getting information
• Push technology (Webcasting)
– Web server delivers information to users who have
signed up for a service
Application Service Providers
• Application service providers (ASPs)
– Provide access to software or services for a fee
• Software as a service (SaaS), or on-
demand software
– Model for ASPs to deliver software to users for a fee
– Software might be for temporary or long-term use
– Users don’t need to be concerned with new software
versions and compatibility problems
Application Service Providers (cont’d.)
• Advantages:
– Similar to outsourcing
• Less expensive
• Delivering information more quickly
• Vendors:
– Google, NetSuite, Salesforce.com
Virtual Reality
• Goal of virtual reality (VR):
– Create an environment in which users can interact
and participate as they do in the real world
• VR technology
– Uses computer-generated, three-dimensional images
to create the illusion of interaction in a real-world
environment
Virtual Reality (cont’d.)
• VR terms:
– Simulation
– Interaction
– Immersion
– Telepresence
– Full-body immersion
– Networked communication
Types of Virtual Environments
• Egocentric environment
– User is totally immersed in the VR world
– Most common technology used with this environment
is a head-mounted display (HMD)
• Exocentric environment
– Data is still rendered in 3-D
– Users can only view it onscreen
– Main technology used in this environment is 3-D
graphics
Exhibit 4.1 Egocentric VR Technologies
Components of a Virtual Reality System
• Visual and aural systems
• Manual control for navigation
• Central coordinating processor and software
system
Exhibit 4.2 VR Components
Virtual Reality Applications
• Military flight simulations
• Medicine for “bloodless” surgery
• Entertainment industry
• Will one day be used for user interfaces in
information systems
• Current applications:
– Applications for the disabled
– Architectural design
– Education
– Flight simulation
– Videoconferencing
Radio Frequency Identification: An Overview
• Radio frequency identification (RFID) tag
– Small electronic device consisting of a small chip and
an antenna
– Provides a unique identification for the card or the
object carrying the tag
– Can be read from a distance of about 20 feet
Table1 RFID Applications
RFID Applications
Category Examples
Tracking and identification Railway cars and shipping containers, livestock and
pets, supply-chain management (tracking merchandise
from manufacturers to retailers to
customers), inventory control, retail checkout and POS
systems, recycling and waste disposal
Payment and stored-value systems Electronic toll systems, contactless credit cards (require
no swiping), subway and bus passes, casino tokens,
concert tickets
SUMIF(J3:J10,"C",I3:I10)
COUNTIF(E15:E22,"Pass")
RANK(I3,$I$3:$I$10,0)
59
Date Function
• Date function: 05 May 2021
• =Today() indicates current date
• =now() indicates current time also
• Year(date1)-year(date2) will give years between
the dates
• Month(date1)-Month(date2) will give months
between the dates
• day(date1)-day(date2) will give days between the
dates
• Find out how many days you completed at IBS
Datedif(A2,A3,”y”)
• y gives completed years
• m gives completed months
• d gives completed days
• ym months ignoring years
• yd days ignoring years
• md days ignoring months
• DATEDIF(A2,A3,"y")&"years”,
This will give completed years between the dates
( A2 is the cell address of one date and A3 is the cell
address of earlier date)
Name Manger(Reference)
• A name that represents a cell, range of cells, formula, or constant value. You can
create your own defined name.
• All names have a scope, either to a specific worksheet (also called the local
worksheet level) or to the entire workbook (also called the global workbook level).
• The letters "C", "c", "R", or "r" or reserved names of excel can NOT used to define a
name,
• Cell references disallowed Names cannot be the same as a cell reference, such as
Z$100 or R1C1.
• Spaces are not valid
• Name length A name can contain up to 255 characters.
• Case sensitivity Names can contain uppercase and lowercase letters.
buying selling profit qty total cost
=SUMIF(buying,">
450")
=SUM(buying)
=COUNTIF(selling,
"<500")
Name Manger and if functions
buying selling profit qty total cost
234 256 =selling-buying 5 =buying*qty
434 450 =selling-buying 6 =buying*qty
458 450 =selling-buying 7 =buying*qty
769 850 =selling-buying 8 =buying*qty
=SUMIF(buying,">4
50")
=SUM(buying)
=COUNTIF(selling,"
<500")
Operator precedence
Principle amount
Principle amount
DBMS – Introduction to
DBMS
1
Previous Session
• Excel exercises
2
Today’s Session
• Data organization in file system
• Database approach to data management
3
Organizing Data in a Traditional File Environment
4
Organizing Data in a Traditional File Environment
A computer system
organizes data in a
hierarchy that starts with
the bit, which represents
either a 0 or a 1. Bits can
be grouped to form a
byte to represent one
character, number, or
symbol. Bytes can be
grouped to form a field,
and related fields can be
grouped to form a record.
Related records can be
collected to form a file,
and related files can be
organized into a
database.
Figure 6-1
5
Organizing Data in a Traditional File Environment
6
Organizing Data in a Traditional File Environment
Traditional File Processing
The use of a traditional approach to file processing encourages each functional area in a corporation to
develop specialized applications and files. Each application requires a unique data file that is likely to be a
subset of the master file. These subsets of the master file lead to data redundancy and inconsistency,
processing inflexibility, and wasted storage resources. 7
Database Management System (DBMS)
• Database:
• Collection of data organized to serve many applications by centralizing
data and controlling redundant data
• Database management system:
• Interfaces between application programs and physical data files
• Separates logical and physical views of data
• Solves problems of traditional file environment
• Controls redundancy
• Eliminated inconsistency
• Uncouples programs and data
• Enables central management and security
9
The Database Approach to Data Management
A single human resources database provides many different views of data, depending on the information requirements of
the user. Illustrated here are two possible views, one of interest to a benefits specialist and one of interest to a member
of the company’s payroll department.
10
The Database Approach to Data Management
• Relational DBMS
• Represent data as two-dimensional tables called relations or files
• Each table contains data on entity and attributes
• Table: Grid of columns and rows
• Rows (tuples): Records for different entities
• Fields (columns): Represents attribute for entity
• Key field: Field used to identify each record
• Primary key: Field used to uniquely identify each record, not null
• Foreign key: Primary key used in second table as look-up field to identify
records from original table
11
The Database Approach to Data Management
Relational Database Tables
A relational database organizes data in the form of two-dimensional tables. Illustrated here are
tables for the entities SUPPLIER and PART showing how they represent each entity and its
attributes. Supplier_Number is a primary key for the SUPPLIER table and a foreign key for the
PART table.
12
The Database Approach to Data Management
13
The Database Approach to Data Management
14
The Database Approach to Data Management
The Three Basic Operations of a Relational DBMS
The select, project, and join operations enable data from two different
tables to be combined and only selected attributes to be displayed.
15
The Database Approach to Data Management
16
The Database Approach to Data Management
Example of an SQL Query
Illustrated here are the SQL statements for a query to select suppliers for parts 137 or 150.
17
The Database Approach to Data Management
An Access Query
Illustrated here is how the query specified early would be constructed using query-building
tools in the Access Query Design View. It shows the tables, fields, and selection criteria used
for the query. 18
The Database Approach to Data Management
• Designing Databases
• Conceptual (logical) design: abstract model from business
perspective
• Physical design: How database is arranged on direct-access
storage devices
• Design process identifies:
• Relationships among data elements, redundant database
elements
• Most efficient way to group data elements to meet business
requirements, needs of application programs
• Normalization
• Streamlining complex groupings of data to minimize
redundant data elements and awkward many-to-many
relationships
19
The Database Approach to Data Management
An unnormalized relation contains repeating groups. For example, there can be many parts and
suppliers for each order. There is only a one-to-one correspondence between Order_Number and
Order_Date.
20
The Database Approach to Data Management
After normalization, the original relation ORDER has been broken down into four smaller relations. The relation ORDER is
left with only two attributes and the relation LINE_ITEM has a combined, or concatenated, key consisting of Order_Number
and Part_Number.
21
Normal Forms
• Entity-relationship diagram
• Used by database designers to document the data model
• Illustrates relationships between entities
23
The Database Approach to Data Management
An Entity-Relationship Diagram
This diagram shows the relationships between the entities ORDER, LINE_ITEM, PART, and
SUPPLIER that might be used to model the database specified above.
24
Using Databases to Improve Business Performance and
Decision Making
25
Using Databases to Improve Business Performance and
Decision Making
• Database warehouses
• Data warehouse:
• Stores current and historical data from many core operational
transaction systems
• Consolidates and standardizes information for use across enterprise,
but data cannot be altered
• Data warehouse system will provide query, analysis, and reporting
tools
• Data marts:
• Subset of data warehouse with summarized or highly focused
portion of firm’s data for use by specific population of users
• Typically focuses on single subject or line of business
26
Using Databases to Improve Business Performance and
Decision Making
Components of a Data Warehouse
ETL
The data warehouse extracts current and historical data from multiple operational systems inside the
organization. These data are combined with data from external sources and reorganized into a central
database designed for management reporting and analysis. The information directory provides users with
information about the data available in the warehouse.
27
Using Databases to Improve Business Performance and
Decision Making
• Business Intelligence:
• Tools for consolidating, analyzing, and providing access to
vast amounts of data to help users make better business
decisions
• Principle tools include:
• Software for database query and reporting
• Online analytical processing (OLAP)
• Data mining
28
Using Databases to Improve Business Performance and
Decision Making
Business Intelligence
A series of analytical
tools works with data
stored in databases
to find patterns and
insights for helping
managers and
employees make
better decisions to
improve
organizational
performance.
29
Using Databases to Improve Business Performance and
Decision Making
30
Using Databases to Improve Business Performance and
Decision Making
• Data mining:
• More discovery driven than OLAP
• Finds hidden patterns, relationships in large databases
• Infers rules to predict future behavior
• The patterns and rules are used to guide decision making and
forecast the effect of those decisions
• Popularly used to provide detailed analyses of patterns in
customer data for one-to-one marketing campaigns or to
identify profitable customers.
• Less well known: used to trace calls from specific
neighborhoods that use stolen cell phones and phone
accounts 31
Using Databases to Improve Business Performance and
Decision Making
32
Using Databases to Improve Business Performance and
Decision Making
33
Using Databases to Improve Business Performance and
Decision Making
Users access an organization’s internal database through the Web using their desktop PCs
and Web browser software.
34
Text mining and web mining
• Text mining tools extract key elements from
large unstructured data sets, discover patterns
and relationships and summarize the
information.
• Web mining is the discovery and analysis of
useful patterns and information from the
world wide web.
35
Summary
• Data organization in file system
• Database approach to data management
36
Business Intelligence
and Knowledge Management
Objectives
• Explain the concepts of data mining and online analytical processing
13
BI & KM, Dr. C. Lakshmi Devasena, IBS Hyd
INFORMATION REQUIREMENTS OF KEY DECISION-MAKING GROUPS IN A FIRM
Senior managers, middle managers, operational managers, and employees have different types of decisions and
information requirements.
14
BI & KM, Dr. C. Lakshmi Devasena, IBS Hyd
• The 4 stages of the decision making process
1. Intelligence
• Discovering, identifying, and understanding the
problems occurring in the organization
2. Design
• Identifying and exploring solutions to the problem
3. Choice
• Choosing among solution alternatives
4. Implementation
• Making chosen alternative work and continuing to
monitor how well solution is working
15
BI & KM, Dr. C. Lakshmi Devasena, IBS Hyd
STAGES IN DECISION MAKING
The decision-
making process
is broken down
into four stages.
16
BI & KM, Dr. C. Lakshmi Devasena, IBS Hyd
• Business intelligence
– Infrastructure for collecting, storing, analyzing data
produced by business
– Databases, data warehouses, data marts
• Business analytics
– Tools and techniques for analyzing data
– OLAP, statistics, models, data mining
• Business intelligence vendors
– Create business intelligence and analytics purchased
by firms
17
BI & KM, Dr. C. Lakshmi Devasena, IBS Hyd
• Business intelligence users
– 80% are casual users relying on production reports
– Senior executives
• Use monitoring functionalities
– Middle managers and analysts
• Ad-hoc analysis
– Operational employees
• Prepackaged reports
• E.g. sales forecasts, customer satisfaction, loyalty and
attrition, supply chain backlog, employee productivity
18
BI & KM, Dr. C. Lakshmi Devasena, IBS Hyd
Group Decision Support Systems (GDSS)
22
BI & KM, Dr. C. Lakshmi Devasena, IBS Hyd
THE KNOWLEDGE MANAGEMENT VALUE CHAIN
Knowledge management today involves both information systems activities and a host of enabling management and
organizational activities.
23
BI & KM, Dr. C. Lakshmi Devasena, IBS Hyd
Capturing and Sorting
Organizational Knowledge
• Knowledge workers: research, prepare, and provide
information
– There is much overlap in the work they do
• Money can be saved by collecting and organizing
knowledge gained by workers
– Avoid having workers solve the same problem that
has already been solved by others
• External users
– Include customers, contractors, suppliers, and other business
partners
Feasibility Study
• Feasibility
– Measure of how beneficial or practical an information
system will be to an organization
– Should be measured continuously throughout the
SDLC process
• Usually has five major dimensions:
– Economic, technical, operational, schedule, and legal
Phase 2: Requirements Gathering and Analysis
• Requirements-gathering and analysis
phase
– Analysts define the problem and generate alternatives
for solving
• First step
– Gathering requirements
– Interviews, surveys, observations, JAD approach, etc.
• Team uses this information to determine:
– What the new system should do (process analysis)
– What data is needed for this process to be performed
(data analysis)
Phase 2: Requirements Gathering and Analysis
(cont’d.)
• Two major approaches for analysis and design
of information systems:
– Structured systems analysis and design (SSAD)
approach
– Object-oriented approach
• Use different tools for creating analysis models
Table 10.1 Examples of Tools Used in SSAD Analysis Models
Exhibit 18.3 A Context Diagram for ABC’s Inventory Management System
Phase 3: Design
• Design phase
– Analysts choose the solution that’s the most realistic and offers
the highest payoff for the organization
• Output of this phase
– Document with exact specifications for implementing the system
– Includes files and databases, forms and reports, documentation,
procedures, hardware and software, networking components,
and general system specifications
• Outputs:
– Specifications documents
– Documentation of the analysis, including models and
explanations
– Design specifications with related documentation
– Logical and physical design documents based on the conceptual
design
– Code modules that can be incorporated into the system
Prototyping
• Small-scale version of the system is developed
– Large enough to illustrate the system’s benefits
– Allows users to offer feedback
• Steps:
– Define the initial requirements
– Develop the prototype
– Review and evaluate the prototype
– Revise the prototype
Phase 4: Implementation
• Implementation phase
– Solution is transferred from paper to action
– Team configures the system and procures components for it
• Tasks
– Acquiring new equipment
– Hiring new employees
– Training employees
– Planning and designing the system’s physical layout
– Coding
– Testing
– Designing security measures and safeguards
– Creating a disaster recovery plan
Phase 4: Implementation (cont’d.)
• Options for conversion:
– Parallel conversion
– Phased-in-phased-out conversion
– Plunge (direct cutover) conversion
– Pilot conversion
Implementation Alternatives
• Insourcing
– Organization’s team develops the system internally
• Self-sourcing
– End users develop information systems with little or no formal
assistance from the information systems team
• Outsourcing
– Organization hires an external vendor or consultant who specializes in
providing development services
– Options:
• Onshore
• Nearshore
• Offshore
– Disadvantages of outsourcing:
• Loss of control
• Dependency
• Vulnerability of strategic information
Phase 5: Maintenance
• Information system is operating
• Enhancements and modifications to the system have
been developed and tested
• Hardware and software components have been added or
replaced
• Team collects performance data and gathers information
on whether the system is meeting its objectives
– By talking with users, customers, and other people affected by
the new system
New Trends in Systems Analysis and Design
• SDLC model might not be appropriate in these
situations:
– Lack of specifications
– Input-output process can’t be identified completely
– Problem is “ad hoc”
– Users’ needs change constantly
Service-Oriented Architecture
• SOA focuses on the development, use, and reuse of
small, self-contained blocks of codes (called services) to
meet the software needs of an organization
• Pair programming
– Two programmers participate in one development
effort at one workstation
Agile Methodology
• Similar to XP
• Less emphasis on team coding and more emphasis on
limiting the project’s scope
• Focuses on setting a minimum number of requirements
and turning them into a working product
• Agile Alliance organization
– Manifesto contains principles for this methodology
Summary
• SDLC phases:
– Planning, requirements gathering and analysis,
design, implementation, and maintenance
• CASE tools
• Prototyping
• Self sourcing and outsourcing
• New trends in systems development
E-COMMERCE
Defining E-Commerce
• E-business
– Activities a company performs for selling and buying
products and services, using computers and
communication technologies
• E-commerce
– Buying and selling goods and services over the
Internet
Defining E-Commerce (cont’d.)
• Business applications that use the Internet:
– Buying and selling products and services
– Collaborating with other companies
– Communicating with business partners
– Gathering business intelligence on customers and
competitors
– Providing customer service
– Publishing and disseminating information
E-Commerce versus Traditional Commerce
• Internet and telecommunication technologies play major
role
• No physical store
• Click-and-brick e-commerce
– Mix of traditional and e-commerce
Advantages and Disadvantages of E-Commerce
• Advantages:
– Better relationships with suppliers, customers,
business partners
– Price transparency
– Round the clock and globe operations
– More information on potential customers
– Increasing customer involvement
– Improving customer service
– Increasing flexibility and ease of shopping
Advantages and Disadvantages of E-Commerce
(cont’d.)
– Increasing the number of customers
– Increasing opportunities for collaboration with
business partners
– Increasing return on investment because inventory
needs are reduced
– Offering personalized services and product
customization
– Reducing administrative and transaction costs
Advantages and Disadvantages of E-Commerce
(cont’d.)
• Disadvantages:
– Bandwidth capacity problems
– Security issues
– Accessibility
– Acceptance
– Lack of privacy of customers
E-Commerce Business Models
• E-commerce companies focus their operations in
different parts of the value chain
• Types:
– Merchant – Amazon.com, Dell, HP, Cisco (direct to cust.)
– Brokerage – online auction sites (ebay.com), online stockbrokers
– Advertising – Yahoo, Google (AdWords)
– Mixed – (more than one source) ISPs, online auction sites
– Informediary – (consumers & business and sell it to other
companies) Bizrate.com – performance of websites & sell to advertisers
– Subscription – (sell digital products or services) Wall Street
Journal, Consumer Reports, antivirus vendors
Exhibit 20.3 Business-to-Consumer E-Commerce
Categories Major
of E-Commerce
Categories of E-Commerce
C2C - eBay.com
B2C - Amazon.com
B2B – Walmart
C2B - Priceline.com
A B2C E-Commerce Cycle
• Major activities:
– Information sharing
– Ordering
– Payment
– Fulfillment
– Service and support
B2B E-Commerce
• B2Bs use these additional technologies
extensively:
– Intranets
– Extranets
– Virtual private networks
– Electronic data interchange (EDI)
– Electronic funds transfer (EFT)
• Lowers production costs and improves accuracy
– By eliminating many labor-intensive tasks
Mobile and Voice-Based E-Commerce
• Mobile commerce (m-commerce)
– Based on Wireless Application Protocol (WAP)
– Using handheld devices, such as smart phones or
PDAs, to conduct business transactions
• Supporting technologies:
– Wireless wide-area networks and 4G networks
– Short-range wireless communication technologies
• Examples:
– iPhone apps
– Internet Explorer Mobile
– Google mobile
Mobile and Voice-Based E-Commerce (cont’d.)
• Voice-based e-commerce
– Rely on voice recognition and text-to-speech
technologies
– Can conduct business using e-wallets
– Security features
• Call recognition, voice recognition, fixed shipping
address
E-Commerce Supporting Technologies
• Electronic payment systems
• Web marketing
• Search engine optimization
Electronic Payment Systems
• Electronic payment
– Money that is exchanged only electronically
• Payment cards:
– Credit, debit, and smart cards
• Smart cards
– Credit card sized
– Contain an embedded microprocessor chip storing important
financial and personal information
• Other types of payments:
– E-cash
– E-check
– E-wallets
– PayPal
– Micropayments
– Crypto Transfer
Web Marketing
• Uses the Web and its supporting technologies to promote goods and
services
• Terms:
– Ad impression
– Banner ads
– Click
– Cost per thousand (CPM)
– Cost per click (CPC)
– Cookie
– Hit
– Page view (PV)
– Pop-up ads
– Pop-under ads
– Splash screen
– Spot leasing
Search Engine Optimization
• Method for improving the volume or quality of
traffic to a Web site
• Some companies offer SEO service
– Editing a site’s contents and HTML code to increase
its relevance to specific keywords
• Recommendations for optimizing a Web site:
– Keywords
– Page title
– Inbound links
Summary
• e-commerce with traditional commerce
• Major e-commerce business models
• Main categories of e-commerce
• B2C e-commerce business cycle
• B2B e-commerce business models
• Mobile and voice e-commerce
• Supporting technologies
Unique features of e-commerce
Ubiquity
o Internet/Web technology available everywhere: work, home, etc., anytime.
Global reach
o The technology reaches across national boundaries, around Earth
Universal standards
o One set of technology standards: Internet standards
Richness
o Supports video, audio, and text messages
Interactivity
o The technology works through interaction with the user
Information density
o Large increases in information density—the total amount and quality of
information available to all market participants
Personalization / Customization
o Technology permits modification of messages, goods
Social technology
o The technology promotes user content generation and social networking
INFORMATION SECURITY
Computer and Network Security: Basic Safeguards
• Threats
– Include sharing passwords with coworkers, leaving a computer
unattended while logged on to the network, or even spilling
coffee on a keyboard
Computer and Network Security: Basic Safeguards
(cont’d.)
• Comprehensive security system
– Includes hardware, software, procedures, and personnel that
collectively protect information resources
• Confidentiality
– System must not allow disclosing information to anyone who isn’t
authorized to access it
• Integrity
– Ensures the accuracy of information resources in an organization eg.
Financial transactions
• Availability
– Ensures that computers and networks are operating & Authorized users
can access the information they need
Exhibit 21.1 The McCumber Cube
Computer and Network Security: Basic Safeguards
(cont’d.)
• Three levels of security
– Level 1: front-end systems
– Level 2: back-end servers
– Level 3: corporate network
• Fault-tolerant systems
– Combination of hardware and software for improving reliability
– Uninterruptible power supply (UPS)
– Redundant array of independent disks (RAID)
• Store data in multiple places, checksum
– Mirror disks
Security Threats: An Overview
• Some threats can be controlled completely or
partially, but some can’t be controlled
• Categories
– Unintentional
– Intentional
Intentional Threats
• Viruses - Consists of self-propagating program code that’s triggered by a specified
time or event eg. I Love You, Michelangelo
• Worms - Travel from computer to computer in a network, Replicate into a full-
blown version that eats up computing resources eg. Code Red, Melissa, and Sasser
• Trojan programs - Contains code intended to disrupt a computer, network, or
Web site. Usually hidden inside a popular program eg. Infostealer Trojan
• Logic bombs - Type of Trojan program used to release a virus, worm, or other
destructive code. Triggered at a certain time or by an event
• Backdoors - Enable the designer or programmer to bypass system security and
sneak back into the system later to access programs or files , cybercriminals hid
malware inside of a free file converter.
• Blended threats (e.g., worm launched by Trojan) - characteristics of computer
viruses + worms + other malicious codes. vulnerabilities found on public and private
networks. Main goal is not just to start attack, but also to spread it. Multi-layer
security system could guard against blended threats
• Denial-of-service attacks - Flood a network or server with service requests
• Social engineering - Use the private information they’ve gathered to break into
servers and networks and steal data. Commonly used social-engineering techniques
are “Dumpster diving” and “shoulder surfing”
Protecting Against Data Theft and Data Loss
• Portable storage media
– Theft or loss of data
– Stealing company data
Security Measures and Enforcement: An Overview
• Biometric security measures
• Nonbiometric security measures
• Physical security measures
• Access controls
• Virtual private networks
• Data encryption
• E-commerce transaction security measures
• Computer Emergency Response Team
Biometric Security Measures
• Use a physiological element to enhance security
measures
• Devices and measures
– Facial recognition – Vein analysis
– Fingerprints – Voice recognition
– Hand geometry
– Iris analysis
– Palmprints
– Retinal scanning
– Signature analysis
Exhibit 21.2 Examples of Biometric Devices
Nonbiometric Security Measures
• Main security measures:
– Callback modems
• Verify whether a user’s access is valid by:
– Logging the user off
– Calling the user back at a predetermined number
• Useful in organizations with many employees who work off-site
– Firewalls
• Combination of hardware and software
• Act as a filter or barrier between a private network and external
computers or networks
– Intrusion detection systems
• Protect against both external and internal access
• Placed in front of a firewall
• Prevent against DoS attacks
• Monitor network traffic
• “Prevent, detect, and react” approach
• Require a lot of processing power and can affect network
performance
Physical Security Measures
• Primarily control access to computers and networks
• Include:
– Cable shielding
– Electronic trackers
– Identification (ID) badges
– Proximity-release door openers
– Room shielding
Access Controls
• Terminal resource security
– Software feature that erases the screen and signs the user off
automatically after a specified length of inactivity
• Password
– Combination of numbers, characters, and symbols that’s entered
to allow access to a system
– Length and complexity determine its vulnerability to discovery
– Guidelines for strong passwords
Virtual Private Networks
• Provide a secure “tunnel” through the Internet
– For transmitting messages and data via a private
network
• Remote users have a secure connection to the
organization’s network
• Low cost
• Slow transmission speeds
Data Encryption
• Transforms data, “plaintext” or “cleartext,”
into a scrambled form called “ciphertext”
• Rules for encryption determine how simple
or complex the transformation process should be
– Known as the “encryption algorithm”
• Protocols:
– Secure Sockets Layer (SSL)
– Transport Layer Security (TLS)
• Key size
– Between 32 and 168 bits
• Main types of encryption
– Asymmetric also called “public key encryption”
– Symmetric
Computer Emergency Response Team (CERT)
• Developed by the Defense Advanced Research Projects
Agency
• Focuses on security breaches and DoS attacks
• Offers guidelines on handling and preventing these
incidents
• Cyber Incident Response Capability
– CIRC, http://www.doecirc.energy.gov/aboutus.html
Guidelines for Comprehensive Security System
• Train employees
• Guidelines and steps involved:
– People
– Procedures
– Equipment and technology
Business Continuity Planning
• Outlines procedures for keeping an organization
operational
• Prepare for disaster
• Plan steps for resuming normal operations as
soon as possible
Summary
• Types of threat
• Basic safeguards
– Biometric
– Nonbiometric
• Fault tolerance
• Establish comprehensive security system and
business continuity plan