0% found this document useful (0 votes)
26 views12 pages

ADMS 2511 Master Guide

The document is a comprehensive teaching guide for ADMS 2511, covering key concepts in information systems for management across five sessions. It includes foundational topics such as data management, business processes, ethics, information security, and technology infrastructure. Each session is structured with definitions, mechanics, case studies, and exam cues to aid in understanding and review for midterm studies.

Uploaded by

shayanalam44
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views12 pages

ADMS 2511 Master Guide

The document is a comprehensive teaching guide for ADMS 2511, covering key concepts in information systems for management across five sessions. It includes foundational topics such as data management, business processes, ethics, information security, and technology infrastructure. Each session is structured with definitions, mechanics, case studies, and exam cues to aid in understanding and review for midterm studies.

Uploaded by

shayanalam44
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

ADMS 2511 – INFORMATION SYSTEMS FOR MANAGEMENT

Master Teaching Guide (Sessions 1–5, Combined & Fully Expanded)

York University – Faculty of Liberal Arts & Professional Studies


Prepared for midterm study and review.
Compiled teaching edition covering Sessions 1–5.

————————————————————————————————————

TABLE OF CONTENTS
Session 1 – Foundations of Information Systems
1.1 What is an Information System (IS)?
1.2 Data → Information → Knowledge
1.3 Computer-Based Information Systems (CBIS): Components
1.4 Types of Information Systems (TPS, MIS, DSS, EIS, ERP)
1.5 People and IT Collaboration (CIO included)
1.6 Impacts of IS on Organizations, Employees, and Society
1.7 Case Teaching Walkthroughs: Lululemon; Hybrid Work
1.8 Ethics and Academic Integrity
1.9 Session 1 Quick Review and Deep-Dive Notes

Session 2 – Business Processes, Global Pressures, and Competitive Strategy


2.1 What is a Business Process? Cross-Functional Flow
2.2 Improving Processes: BPR vs. BPI vs. BPM
2.3 Efficiency vs. Effectiveness
2.4 Global/Market/Tech/Societal Pressures
2.5 Organizational Responses
2.6 Porter’s Five Forces and Value Chain
2.7 Competitive Strategies
2.8 Governance and Business–IT Alignment
2.9 Case Teaching Walkthroughs: Hertz EV; MLSE
2.10 Session 2 Quick Review and Deep-Dive Notes

Session 3 – Ethics, Privacy, Information Security, and Controls


3.1 Ethical Frameworks and Tenets
3.2 Privacy Principles, Digital Dossiers/Footprints
3.3 Security Risks and Threat Types; CIA Triad
3.4 Risk Analysis and Responses
3.5 Security Controls: Preventive/Detective/Corrective
3.6 Control Layers: Environment, General, Application
3.7 Authentication, Authorization, Access Control
3.8 Business Continuity Planning (BCP)
3.9 Case Teaching Walkthroughs: Facial Recognition; SickKids “Code Grey”
3.10 Session 3 Quick Review and Deep-Dive Notes

Session 4 – Data, Databases, Big Data, and Knowledge Management


4.1 Data Management Problems and Governance
4.2 Master Data vs. Transaction Data; MDM
4.3 DBMS and the Relational Model; Keys; SQL; Data Hierarchy
4.4 E-R Modeling and Cardinalities
4.5 Big Data (3Vs), Warehouses, Marts, Lakes, Lakehouses
4.6 Knowledge Management: Tacit vs. Explicit; KM Cycle
4.7 Case Teaching Walkthroughs: Watson Health; Movie E-R
4.8 Session 4 Quick Review and Deep-Dive Notes

Session 5 – Computer Hardware, Software, Networks, and Cloud Computing


5.1 Computer Hierarchy and Capacity
5.2 Input/Output; Primary vs. Secondary Storage (with explicit comms sentence)
5.2.1 Networks & Applications (new subsection)
5.3 System vs. Application Software; Open Systems vs. Open Source
5.4 Strategic Software/Hardware Issues and E-waste
5.5 Cloud Computing: Characteristics, Models (IaaS/PaaS/SaaS), Deployment (Public/Private/Hybrid)
5.6 Cloud Benefits and Risks; Grid/Utility/Virtualization
5.6.1 Background Note – Internet Origins (ARPAnet) (new note)
5.7 Case Teaching Walkthroughs: Lululemon Infrastructure; Hybrid Meetings
5.8 Session 5 Quick Review and Deep-Dive Notes

Comprehensive Quick Review (All Sessions)


Practice Teach-Back Prompts & Mini-Exercises
Exam Ready Answer Templates
Glossary: Precisely Worded, Exam-Core Definitions

————————————————————————————————————

SESSION 1 — FOUNDATIONS OF INFORMATION SYSTEMS


Overview
This session establishes how organizations turn raw data into decisions and value using information systems
(IS). You’ll master the DIK ladder, the CBIS “anatomy,” system types, and the people/governance needed for
success.

1.1 What is an Information System (IS)?


Definition
• IS = people + processes + data + technology organized to collect, process, store, and distribute information
supporting decisions, coordination, control, analysis, and visualization.

Why it exists
• To convert data → information → knowledge that drives action and performance.

How it works (mechanics)


• Inputs (data) → Processing (software + procedures) → Storage (databases) → Outputs
(reports/dashboards/alerts) → Feedback loop (changes to decisions/procedures).

Use cases / results / pitfalls


• Retail sales, hospital EHR, university enrollment, supply chains.
• Results: faster decisions, fewer errors, better CX, compliance.
• Pitfalls: tech without people/procedures fails; poor data quality → “garbage in, garbage out.”

Exam cue
• Always mention all four pillars (people/process/data/tech). Missing one = not a complete IS.

1.2 Data → Information → Knowledge (DIK)


What they are
• Data: raw facts (no meaning).
• Information: organized/contextualized data answering a question.
• Knowledge: information applied with experience to justify an action.

Use & results


• Data (time-stamped sales) → Information (Friday spikes) → Knowledge (add Fri promo + staff) → Results:
higher availability, fewer stockouts.

Pitfalls
• Calling a dashboard “knowledge.” Knowledge requires a recommended action.

Exam cue
• Use the action test: if you can act now with justification, you’re at knowledge.

1.3 CBIS Components (the “Anatomy”)


• Hardware (input, CPU, output, storage, communications)
• Software (system software runs the machine; application software runs the business)
• Database (organized store; queries, transactions, reports)
• Network (connectivity enabling remote/cloud collaboration)
• Procedures (rules/workflows: approvals, backups, returns)
• People (users, managers, IT: BA, Dev, DBA, Net, Sec)

Exam cue
• Map a case to each component with specific examples.

1.4 Types of Information Systems (by decision level)


• TPS (operational capture), MIS (periodic control reports), DSS (what-if models), EIS (executive summaries),
ERP (enterprise integration/single truth).

Flow
• TPS → MIS/EIS; DSS pulls from multiple sources; ERP synchronizes master data.

Exam cue
• “Routine/high-volume” → TPS; “what-if” → DSS.

1.5 People and IT Collaboration (CIO included)


Roles
• BA: process pain → requirements.
• Developer: build/change applications.
• DBA: integrity, performance, backups.
• Network/Security: connectivity, resilience, protection.
• CIO: top IS/IT executive for strategy, governance, and alignment; accountable for portfolio value, security,
compliance.

Exam cue
• “Who is responsible for IT at the top?” → CIO (alignment + governance).

1.6 Impacts of IS
• Organizations: flatten layers, real-time decisions, hybrid work.
• Employees: upskilling, some automation of routine tasks.
• Society: access vs privacy/digital divide trade-offs.

1.7 Case Teaching Walkthroughs


• Lululemon: DIK in action; CBIS mapping; TPS→MIS→DSS; ERP for inventory; real-world actions
(promos/staffing).
• Hybrid Work: collaboration suites; benefits (flexibility/inclusion) vs risks (fatigue/security).

1.8 Ethics and Academic Integrity


• Cite sources (including AI). Protect customer data; avoid dark patterns; be transparent.

1.9 Session 1 Quick Review and Deep-Dive Notes


• IS = people + process + data + tech.
• DIK ladder and action test.
• CBIS mapping drill.
• System types → level/decision.
• CIO = strategy + governance + alignment.

————————————————————————————————————

SESSION 2 — BUSINESS PROCESSES, GLOBAL PRESSURES, AND


COMPETITIVE STRATEGY
Overview
You’ll connect how work actually flows (process) with why the firm must change (pressures) and how it
competes (Porter + strategies). You’ll also learn which improvement approach to use (BPR/BPI/BPM).

2.1 Business Processes (cross-functional)


Definition
• Linked activities + roles + rules + data transforming inputs/resources into valuable outputs.

Mechanics
• Trigger → activities → handoffs → outputs → metrics → continuous improvement.

Exam cue
• Always provide two metrics: one efficiency (cycle time) + one effectiveness (fill rate/NPS).
2.2 BPR vs. BPI vs. BPM
BPR (radical redesign)
• Use when process is broken or disruption needed.
• Results: step-change gains; Pitfalls: resistance/high risk.

BPI (incremental improvement)


• Use for steady tuning; Pitfalls: local optimization.
• Safeguard: maintain end-to-end view.

BPM (govern/manage)
• KPIs, workflow/rules engines, process mining.
• Pitfall: “dashboard theater” if not linked to decisions.

Exam cue
• Name when and why you’d pick each.

2.3 Efficiency vs. Effectiveness


• Efficiency = doing things right (time/cost); Effectiveness = doing the right things (meets customer/strategy).
• Keep the balance.

2.4 Pressures on Organizations


• Market/Economic, Technological, Societal/Legal, Workforce → justify transformation.

2.5 IT-Enabled Responses


• Strategic systems, customer focus, make-to-order/customization, e-business.

2.6 Porter’s Five Forces (industry level)


Forces
• New entrants, Supplier power, Buyer power, Substitutes, Rivalry.

Digital effect
• Lowers entry barriers; raises buyer power & rivalry; expands substitutes.

Exam cue
• Force → digital lever → business effect → IS response.

2.7 Porter’s Value Chain (firm level)


• Primary: inbound, operations, outbound, marketing/sales, service.
• Support: infra, HR, tech, procurement.
• IS lever: reduce cost or increase value at each link.

Exam cue
• “IS reduces cost in X by Y” or “raises value in Z by W.”

2.8 Competitive Strategies


• Cost leadership, differentiation, innovation, operational effectiveness, customer orientation.
• Pick one; show how IS executes it and the measurable result.

2.9 Governance & Business–IT Alignment


• IT steering committee, portfolio mgmt, benefits realization.
• Alignment test: trace each IT dollar to a goal + KPI.

2.10 Case Teaching Walkthroughs


• Hertz: cross-functional flow; metrics (time/accuracy/NPS); analytics for fleet/charging.
• MLSE: Value Chain + Differentiation/Customer orientation via analytics, apps, cashless mobile.

Session 2 Quick Review and Deep-Dive Notes


• BPR vs BPI vs BPM decision logic; Five Forces & Value Chain (applied); strategy → IS mechanism → result;
governance language.

————————————————————————————————————

SESSION 3 — ETHICS, PRIVACY, INFORMATION SECURITY, AND


CONTROLS
Overview
From what tech can do to what it should do, with privacy/ethics frameworks and layered controls to manage
risk. You’ll also learn BCP language (RTO/RPO).

3.1 Ethical Frameworks & Tenets


Frameworks
• Utilitarian (net good), Rights (autonomy/consent), Fairness/Justice (avoid bias), Common Good (community
welfare), Deontology (duty/rules).
Tenets
• Responsibility, Accountability, Liability.

Exam cue
• Name the framework and argue consistently with it.

3.2 Privacy Principles & Digital Footprints


Principles
• Consent, purpose limitation, minimization, accuracy, safeguards, openness, access, accountability.
Digital footprint
• Persists → practice minimization and transparency.

3.3 Security Risks & CIA Triad


• CIA: Confidentiality, Integrity, Availability.
• Threats: unintentional, deliberate (phishing/malware/ransomware), environmental.

3.4 Risk Analysis & Responses


• Identify asset/impact/likelihood → accept, transfer, or limit (controls) → monitor.

3.5 Controls: Type × Layer Matrix


Types
• Preventive (MFA, least privilege, field validation).
• Detective (SIEM alerts, exception reports).
• Corrective (backups, DR exercises).
Layers
• Control environment (policies, tone).
• General controls (change, access, backup, network).
• Application controls (input/processing/output checks).
Exam cue
• Always give type + layer.

3.6 Identity & Access


• AuthN: something you know/have/are (MFA).
• AuthZ: least privilege, roles.
• Session security: locking/timeouts, device posture, geo-fencing.

3.7 Business Continuity Planning (BCP)


• Set RTO (max downtime) and RPO (max data loss); alternate sites; test regularly.

3.8 Case Teaching Walkthroughs


• Facial Recognition: consent/purpose/accuracy/ownership; propose safeguards and oversight.
• SickKids: classify threats; prevent/detect/correct; BCP with RTO/RPO.

Session 3 Quick Review and Deep-Dive Notes


• Framework match; CIA + threats; risk responses; controls matrix; BCP language with numbers.

————————————————————————————————————

SESSION 4 — DATA, DATABASES, BIG DATA, AND KNOWLEDGE


MANAGEMENT
Overview
Data is the fuel. Learn governance/MDM, relational design, E-R modeling, Big Data stores, and KM that turns
experience into reusable assets.

4.1 Data Problems & Governance


Problems
• Silos, redundancy, inconsistency, stale/dirty data, access friction, security gaps.
Governance
• Roles, standards, quality rules, metadata, lineage, audits → “single version of the truth.”

4.2 Master vs Transaction Data; MDM


• Master: stable nouns (Customer, Product).
• Transaction: time-stamped events (Order, Payment).
• MDM: dedupe/match/merge to golden records; synchronize across systems.

4.3 DBMS & Relational Model


• Tables, rows, columns; PK (unique id), FK (link), ACID (transaction safety), Normalization (reduce
redundancy; up to ~3NF), Indexes (fast reads/slow writes tradeoff).
• SQL basics: SELECT/INSERT/UPDATE/DELETE; joins.

4.4 E-R Modeling & Cardinalities


• Steps: entities → attributes (PK first) → relationships → cardinality (1:1, 1:M, M:M) → resolve M:M via
bridge.
• Design: keys stable/simple; ensure referential integrity.

4.5 Big Data & Analytical Stores


• 3Vs: Volume, Velocity, Variety (+ Veracity/Value).
• Warehouse: curated, structured, historical; Mart: departmental slice.
• Lake: raw, schema-on-read; Lakehouse: unified with governance/performance.
• ETL vs ELT, MPP processing.

4.6 Knowledge Management (KM)


• Explicit vs Tacit knowledge; KM Cycle: create → capture → refine → store → manage → disseminate →
reuse.

4.7 Case Teaching Walkthroughs


• Watson Health: poor data quality -> poor model; fix with governance, validation, metadata catalogs, quality
dashboards.
• Movie E-R: entities/relationships; PK/FK; M:M via MovieActor; sample SQL.

Session 4 Quick Review and Deep-Dive Notes


• Governance/MDM vocabulary; keys/joins/cardinality; 3Vs & store selection; KM cycle.

————————————————————————————————————

SESSION 5 — COMPUTER HARDWARE, SOFTWARE, NETWORKS, AND


CLOUD
Overview
The tech stack: compute/memory, I/O/storage, software layers, networking, and cloud models/economics/risks
(plus ARPAnet background).

5.1 Computer Hierarchy & Capacity


• Supercomputers → Mainframes → Servers → PCs/Laptops → Tablets/Phones/Wearables.
• Choose based on speed, capacity, portability, cost.

5.2 Input/Output & Storage (with explicit comms sentence)


• Input: keyboard, scanner, sensors.
• Output: displays, printers, speakers/AR-VR.
• Primary storage (volatile): registers, cache, RAM, ROM.
• Secondary storage (non-volatile): SSD/HDD, optical, tape, flash.
• Communication technologies (NICs, modems, routers, switches, WAPs) carry data across networks, linking
devices to local/remote systems and the cloud.
• Analogy: RAM = short-term memory; SSD = notebook.

5.2.1 Networks & Applications (new subsection)


• Computer network: connected devices via communications media to transmit data/information.
• Network applications: Discovery (search/browse, retrieval); Collaboration (co-authoring, shared workspaces);
Communication (email, chat, voice/video).
• Social networks (Web 2.0): user-generated content & interactive communities.
• Tie-in: wired/wireless links + routers/switches move bits across LAN/WAN/Internet.
• Exam cue: If asked what networks enable → discovery + collaboration + communication with one example
each.

5.3 System vs. Application Software; Open Systems vs. Open Source
• System software: OS/drivers/utilities (run the machine).
• Application software: perform business tasks (ERP/CRM/Office/design).
• Open systems: interoperability via standards (compatibility).
• Open source: visible/modifiable source (collaboration).
• Exam trap: Not the same thing—define each first.

5.4 Strategic Software/Hardware Issues & E-waste


• Capacity planning, refresh timing, BYOD vs corp, training, bugs/downtime, licensing/compliance.
• Recycling/refurbishment; vendor viability/support.

5.5 Cloud Computing


• Characteristics: on-demand, broad access, pooling, elasticity, measured service.
• Service models: IaaS (you manage OS & above), PaaS (you manage code & data), SaaS (you configure/use).
• Deployment: public, private, hybrid.

5.6 Cloud Benefits & Risks; Concept Bridges


• Benefits: OpEx model, scale, collaboration, speed.
• Risks: migration, outages, privacy/residency, shared responsibility confusion.
• Bridges: Grid/Utility/Virtualization → enablers; virtualization = one physical host running many logical
machines.

5.6.1 Background Note – Internet Origins (ARPAnet) (new note)


• ARPAnet (1969) demonstrated resilient packet-switched networking for sharing data, exchanging messages,
and transferring files, enabling the open protocols that underpin today’s Internet/cloud.

5.7 Case Teaching Walkthroughs


• Lululemon Infrastructure: POS/tablets/scanners; ERP/e-comm/analytics; SSDs + cloud buckets; elasticity at
peak; role-based access/MFA.
• Hybrid Meetings: benefits (inclusion, knowledge capture) vs risks (outages, leakage, unauthorized access);
mitigations (SSO+MFA, lobbies, region pinning, DLP, training).

5.8 Session 5 Quick Review and Deep-Dive Notes


• Hierarchy; I/O; primary vs secondary storage.
• System vs application; open systems vs open source.
• Cloud: characteristics, models, deployments; benefits/risks.
• Networks enable discovery, collaboration, communication; Web 2.0 = social UGC.
• ARPAnet context for Internet/cloud lineage.

————————————————————————————————————

COMPREHENSIVE QUICK REVIEW (ALL SESSIONS)


• DIK (S1) → Processes & Strategy (S2) → Ethics/Privacy/Security (S3) → Data/DB/Big Data/KM (S4) →
Hardware/Software/Cloud/Networks (S5).
• Definitions at a glance; case hooks; common exam traps; answer templates.

PRACTICE TEACH-BACK PROMPTS & MINI-EXERCISES


• DIK ladder; process map; Five Forces; ethics match; controls matrix; data governance + keys; warehouse vs
lake; HW/SW/Cloud map; hybrid meetings.

EXAM READY ANSWER TEMPLATES


• Concept + case; process/architecture; strategy/Porter.

GLOSSARY — PRECISE, EXAM-CORE DEFINITIONS


• Full list included in the guide sections above.

You might also like