Professional Documents
Culture Documents
Chapter 1
Think about:
• How do you use technology when you do your banking or
make payments?
• How has technology helped your financial institution?
Enterprise resource planning Integrates all functional areas of the Oracle, SAP system
organization
Functional area IS Supports the activities within specific System for processing payroll
functional area
Decision support system Provides access to data and analysis “What-if” analysis of changes in budget
tools
Expert system Mimics human expert in a particular area Credit card approval analysis
and makes decisions
Dashboards Present structured, summarized Status of sales by product
information about aspects of business
important to executives
Supply chain management Manages flows of products, services, and Walmart Retail Link system connecting
system information among organizations suppliers to Walmart
Electronic commerce system Enables transactions among www.dell.com
organizations and between organizations
and customers
• Baxter
• LoweBots
• Drones
• Autonomous vehicles
Think about:
• Technology has helped farmers work more precisely with
their crops and with other partners: how much could that
be worth?
• Should software maintenance for any product be “locked
in” to specific suppliers or more readily accessible?
Chapter 2
Organizational Strategy, Competitive
Advantage, and Information Systems
Think about:
• How interorganizational systems via apps are facilitating
digital transformation
• How business process changes could improve your concert
or sports experience
• Competitive Advantage
• Cross-Functional Processes
• Information Systems and Business Processes
• Reengineering
• Improvement
• Management
BPI BPR
• Low risk/low cost • High risk/high cost
• Incremental change • Radical redesign
• Bottom-up approach • Top-down approach
• Takes less time • Time consuming
• Quantifiable results • Impacts can be
• All employees trained in overwhelming
BPI • High failure rate
• Market pressures
• Technology pressures
• Societal/political/legal pressures
• Globalization
• Changing nature of the workforce
• Powerful customers
• Social responsibility
• Compliance with government regulations
• Protection against terrorist attacks
• Ethical issues
• Green IT
o Facilities design and management
o Carbon management
o International and Canadian provincial environmental laws
• Digital Divide
o One Laptop per Child (OLPC): one.laptop.org
• Strategic systems
• Customer focus
• Make-to-order and mass customization
• E-business and e-commerce
• Value chain
o A sequence of activities through which the organization’s
inputs are transformed into valuable outputs
• Primary activities
o Relate to production and distribution of products and
services
• Support activities
o Support primary activities contributing to competitive
advantage
• Cost leadership
• Differentiation
• Innovation
• Operational effectiveness
• Customer orientation
Think about:
• How do Domino’s Pizza’s problems relate to Porter’s Value
Chain Model?
• How has Domino’s Pizza improved its efficiency and
effectiveness?
Copyright © 2021 John Wiley & Sons Canada, Ltd. or the author. All rights
reserved. Students and instructors who are authorized users of this course are
permitted to download these materials and use them in connection with the
course. No part of these materials should be reproduced, stored in a retrieval
system, or transmitted, in any form or by any means, electronic, mechanical,
photocopying, recording or otherwise, except as permitted by law. Advice on
how to obtain permission to reuse this material is available at
http://www.wiley.com/go/permissions.
Chapter 3
1. Ethical Issues
2. Privacy
• Ethics:
o The principles of right and wrong that individuals use to
make choices that guide their behavior
• Ethical Frameworks
• Ethics in the Corporate Environment
• Ethics and IT
• Code of ethics
• Fundamental tenets of ethics:
o Responsibility
o Accountability
o Liability
• What is unethical is not necessarily illegal
• Introduction
• Electronic Surveillance
• Personal Information in Databases
• Information on Internet Bulletin Boards, Newsgroups, and
Social Networking Sites
• Privacy Codes and Policies
• International Aspects of Privacy
• Privacy:
o The right to be left alone and to be free of unreasonable
personal intrusions
• Information privacy:
o The right to determine when, and to what extent, information
about you can be gathered and/or communicated to others
Consider:
• Whether all personally identifiable data is confidential
• Whether you would be concerned if all of your Facebook
data was made available to Facebook app developers
Copyright © 2021 John Wiley & Sons Canada, Ltd. or the author. All rights
reserved. Students and instructors who are authorized users of this course are
permitted to download these materials and use them in connection with the
course. No part of these materials should be reproduced, stored in a retrieval
system, or transmitted, in any form or by any means, electronic, mechanical,
photocopying, recording or otherwise, except as permitted by law. Advice on how
to obtain permission to reuse this material is available at
http://www.wiley.com/go/permissions.
Chapter 4
Information Security
Copyright
Copyright©2021
©2021John
JohnWiley
Wiley&&Sons
SonsCanada,
Canada,Ltd.
Ltd. 137
Learning Objectives (1 of 2)
Think about:
• The importance of immediate response to software updates.
Is your computer on “automatic update”?
• How could your credit rating be affected by identity theft?
• Security
• Information security
• Threat
• Exposure
• Vulnerability
• Social engineering:
o An attack in which the perpetrator uses social skills to trick
or manipulate legitimate employees into providing
confidential company information such as passwords
• Example:
o Kevin Mitnick, famous hacker and former FBI’s most
wanted
• Adware
• Spyware
o Keyloggers, screen scrapers
• Spamware
• Cookies
o Tracking cookies
• Risk acceptance
• Risk limitation
• Risk transference
Consider:
• What are the resources required to carefully investigate
a data breach?
• The seriousness of the consequences for individuals
who leak or sell confidential data
• Categories of Controls
• Physical Controls
• Access Controls
• Communication Controls
• Business Continuity Planning
• Information Systems Auditing
• Firewalls
• Anti-malware systems
• Whitelisting and blacklisting
• Encryption
• Virtual private networking
• Transport layer security (TLS)
• Employee monitoring systems
• BCP’s purpose:
o Provide continuous availability
o Be able to recover in the event of a hardware or software
failure or attack (e.g., due to ransomware)
o Ensure that critical systems are available and operating
Chapter 6
• Basic Concepts
• Communications Media and Channels
• Network Protocols
• Types of Network Processing
• Twisted-pair wire
• Coaxial cable
• Fibre optic cable
• Ethernet
• Transmission Control Protocol/Internet Protocol (TCP/IP)
o Packet switching
o Four layers (described in Figure 6.6)
Consider:
• How broadband access facilitated separation strategies
implemented in response to the COVID-19 pandemic
• The different methods that you use to access the Internet
• Commercial portal
• Affinity portal
• Corporate portal (aka enterprise portal)
• Industrywide portal
FIGURE 6.10 Google Translate. (Google and the Google logo are
registered trademarks of Google Inc., used with permission).
• E-learning
o Learning supported by the web
• Distance learning
o Any learning situation in which teachers and students do not
meet face-to-face
• Virtual universities
o Online universities in which students take classes via the
Internet at home or an off-site location
Chapter 5
1. Managing Data
2. The Database Approach
3. Big Data
4. Data Warehouses and Data Marts
5. Knowledge Management
6. Appendix: Fundamentals of Relational Database
Operations
• Internal sources
o Corporate databases, company documents
• Personal sources
o Personal thoughts, opinions, experiences
• External sources
o Commercial databases, government reports, corporate
websites, clickstream data
• New sources
o Blogs, Tweets, videos, sensor tags
• Bit
• Byte
• Field
• Record
• Data file or table
• Database
• Exhibit variety
• Include structured, unstructured, and semi-structured data
• Are generated at high velocity with an uncertain pattern
• Do not fit neatly into traditional structured, relational
databases
• Can be captured, processed, transformed, and analyzed in a
reasonable amount of time only by sophisticated
information systems
Types:
• Structured Query Language (SQL)
• Query by Example (QBE)