81
James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

  • View
    222

  • Download
    1

Embed Size (px)

Citation preview

Page 1: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

James Nowotarski

8 May 2008

IS 425Enterprise Information

Spring 2008

Page 2: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

2

Topic Duration

Recap of 5/1 45 minutes

Security and risk 30 minutes

*** Break 15 minutes

Security and risk (cont.) 30 minutes

eCommerce 60 minutes

Wrap-up 10 minutes

Today’s Agenda

Page 3: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

3

Systems development life cycle (SDLC)

Planning Modeling Construction Deployment

Example

Core Concepts

Page 4: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

4

The waterfall model is the granddaddy of life cycle models

Core Concepts

Planning

Modeling

Construction

Deployment

Page 5: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

5

Systemrequirements

Softwarerequirements

Analysis

Program design

Coding

Testing

Operations

Source: Royce, W. (1970, August). Managing the development of large software systems. IEEE Proceedings, WESCON, 1-9.

Waterfall model

Page 6: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

6

Protracted integration and late breakage

Conventional application of the waterfall model typically results in late integration and performance showstoppers

Dev

elop

men

t p

rogr

ess

(% c

oded

)

100%Late designbreakage

Original target date

Source: Royce, W. Software Project Management: A Unified Framework. Addison-Wesley (1998).

Integrationbegins

What’s wrong with waterfall?

Page 7: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

7

Iterative/Evolutionary/Spiral life cycle models advocate multiple “threads” through the SDLC phases

M C DVersion 1

M C DVersion 2

M C DVersion 3

Core Concepts

Page 8: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

8

Incremental life cycle models advocate delivering the end product piecemeal

M C DVersion 1

M C DVersion 2

M C DVersion 3

Core Concepts

Page 9: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

9Copyright © 1997 by Rational Software Corporation

Risk

Transition

Inception

Elaboration

Construction

PreliminaryIteration

Architect.Iteration

Architect.Iteration

Devel. Iteration

Devel. Iteration

Devel. Iteration

TransitionIteration

TransitionIteration

Post-deployment

Waterfall

Time

Risk Profile: Iterative vs. Waterfall

Iterative

Page 10: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

10

Rational Unified Process (RUP)

Page 11: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

11

Each Iteration is a mini-waterfall

R

A&D

C

T

R

A&D

C

T

R

A&D

C

T

Page 12: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

13

Phase boundaries in waterfall are activities

Systemrequirements

Softwarerequirements

Analysis

Program design

Coding

Testing

Operations

Phase

Phase

Phase

Phase

Phase

Phase

Page 13: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

14

Phase boundaries in RUP are milestones

Systemrequirements

Softwarerequirements

Analysis

Program design

Coding

Testing

Operations

RUP Phase

Milestone

Page 14: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

15

Agile/Light/Lean Methods

“We have come to value: Individuals and interactions over processes and tools Working software over comprehensive

documentation Customer collaboration over contract negotiation Responding to change over following a plan”

Page 15: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

16

Agile methods wind the RUP model more tightly

Systemrequirements

Softwarerequirements

Analysis

Program design

Coding

Testing

Operations

Each day on an Agile project

FunctioningCode

Page 16: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

17

Approach References

XP www.extremeprogramming.org

www.xprogramming.com

M. Marchesi et al, Extreme Programming Perspectives, Addison-Wesley, 2002.

Crystal A. Cockburn, Agile Software Development, Addison-Wesley, 2001

SCRUM K. Schwaber and M. Beedle, Agile Software Development with Scrum, Prentice Hall, 2001.

Adaptive Software Development

J. Highsmith, Adaptive Software Development, Dorset House, 2000.

FDD S. Palmer, A Practical Guide to Feature-Driven Development, Prentice Hall, 2002.

Agile - General http://www.agilealliance.org/home

http://www.agilemodeling.com

Agile/Light/Lean Methods

Page 17: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

18

Key Practices – Agile Methods

Customer on-site as integral part of team Short iterations, small releases

2 month releases, 2 week iterations Refactoring and evolutionary design Test all the time Pair programming (XP) 40-hour week (XP)

Page 18: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

19

Iterative/Agile Guiding Principles

QualityCustomerValue

Attack riskAccommodatechange

Work togetherExecutablesoftware

Architecturebaseline

Component-baseddevelopment

Objectives

Strategies

Tactics

IterativeDevelopment

Page 19: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

20

Iterative/Agile Guiding Principles

QualityCustomerValue

Attack riskAccommodatechange

Work togetherExecutablesoftware

Architecturebaseline

Component-baseddevelopment

Objectives

Strategies

Tactics

IterativeDevelopment

Page 20: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

21

Why focus on change?

Life cycle phase

Co

st

of

ch

an

ge

Req Anal. Des. Impl. Test Prod

y = axp

Page 21: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

22

Change curve – Agile methods

Time

Co

st

of

ch

an

ge

Agile methods purport to change the curve so that the cost to find and repair software problems does not rise dramatically over time

Page 22: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

23

Iterative/Agile Guiding Principles

IterativeDevelopment

QualityCustomerValue

Attack riskAccommodatechange

Work togetherExecutablesoftware

Architecturebaseline

Component-baseddevelopment

Objectives

Strategies

Tactics

IterativeDevelopment

Page 23: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

24

Why emphasis on executable software?

“Without this first pass, the project manager is at the mercy of human judgment. With this first-pass ‘simulation,’ he can at least perform experimental tests of some key hypotheses and scope down what remains for human judgment, which in the case of computer program design . . . is invariably and seriously optimistic”

Source: Royce, W. (1970, August). Managing the development of large software systems. IEEE Proceedings, WESCON, 1-9.

Page 24: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

25

Who is Fritz Bauer?

• Chairman of 1968 NATO Software Engineering Conference

• Credited with coining the term “software engineering”

Page 25: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

26

Software Engineering

• The establishment and use of sound engineering principles in order to economically obtain software that is reliable and works efficiently on real machines (Fritz Bauer, 1969)

Core Concepts

Page 26: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

27

RUP Guiding Principles

IterativeDevelopment

QualityCustomerValue

Attack riskAccommodatechange

Work togetherExecutablesoftware

Architecturebaseline

Component-baseddevelopment

Objectives

Strategies

Tactics

IterativeDevelopment

Page 27: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

28

Architecture

arch·i·tec·ture n. The fundamental organization of a system embodied in its components, their relationships to each other, and to the environment, and the principles guiding its design and evolution. Source: IEEE

Page 28: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

29

Software architecture is a level of design that “involves the description of elements from which systems are built, interactions among those elements, patterns that guide their composition, and constraints on these patterns.”

What is software architecture?

Shaw, M., Garlan, D. (1996). Software architecture: Perspectives on an emerging discipline. Upper Saddle River, NJ: Prentice-Hall.

Page 29: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

30

Software architecture

Applications and Data

Middleware

Hardware/Network

System Software

• Presentation layer• Application logic• Data management

Page 30: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

31

Key principles of architectural design

Abstraction Modularity Reuse

Page 31: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

32

Abstraction

There is a limit to the number of ideas you can comprehend at any one time 7 +/- 2

Raise the level of detail by creating relationshipsExample: Grouping

Think in logical instead of physical terms

Page 32: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

33

Grouping: What’s easier to understand and retain?

Grapes Oranges

Milk Butter

Potatoes Apples

Eggs Sour cream

Carrots

Milk

Dairy Fruit Vegetable

ButterEggs

Sour cream

Page 33: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Logical vs. Physical

34

Businessproblem

IT-enabledsolution

AnalysisLogicalDesign

PhysicalDesign

BuildTest Deploy

Magic!!!

Page 34: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

35

Entity relationship diagram (ERD)

Page 35: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

36

Think in logical instead of physical terms

READ_DATA

CALC_SALARY

CALC_TAXES

PRINT_PAYCHECK

employee_data

employee_data

salary

salary

taxes

Big idea: As a prelude to creating a design, represent the basic computational requirement for the system to be designed in more abstract terms, i.e., in terms of data flow

Page 36: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

37

SafeHome Security: State Transition Diagram

Resetting

Entry/set systemStatus “inactive”Entry/set displayMsg1 “Starting system”Entry/set displayMsg2 “Please wait”Entry/set displayStatus showBlinkingDo: run diagnostics

Idle

Entry/set systemStatus “inactive”Entry/set displayMsg1 “Ready”Entry/set displayMsg2 “”Entry/set displayStatus steadykeyHit/handleKey

ActingOnAlarm

Entry/set systemStatus “monitorAndAlarm”Entry/set displayMsg1 “ALARM”Entry/set displayMsg2 triggeringSensor Entry/set displayStatus fastBlinkingDo: soundAlarmDo: notifyAlarmResponderskeyHit/handleKey

MonitoringSystemStatus

Entry/set systemStatus “monitoring”Entry/set displayMsg1 “Armed”Entry/set displayMsg2 “”Entry/set displayStatus steadyDo: monitorAndControlSystemKeyHit/handleKey

Start/ stop switch power “on”

failureDetected / set displayMsg2 “contact Vendor”

SystemOK

Reset

Activate

deactivatePassword

falseAlarm

timeOut

sensorTriggered/startTimer

sensorTriggered/restartTimer

deactivate Password

off/powerOff

Page 37: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

38

Students at a university

Inquiry Lead Applicant

Admitted

Rejected

Withdrawn

Enrolled Matriculated Graduated

Drop Out

Page 38: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

39

Modular design Reduces complexity Facilitates change Results in easier implementation by supporting parallel

development of different parts of the system.

Information hiding

Functional independence

Objectives: High cohesion, low coupling

Modularity

Page 39: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

40

Call and return

PROCESS_PAYROLL for each employee get_data(:employee_data) calc_salary(employee_data:salary) calc_tax(salary:tax) print_check(employee_data, salary, tax)

GET_DATA

employee_data

CALC_SALARY

employee_ data

salary

CALC_TAX

salary

tax

PRINT_CHECK

employee_data

salary

tax

Page 40: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

41

CohesionA measure of the relative functional strength of a module

Cohesion and coupling

Func A-1

Func A-2

Func A-3

Func B-1

Func B-2

Func B-3

High Cohesion (good)

CouplingA measure of the relative interdependence among modules

High coupling (bad)

Page 41: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

42

Topic Duration

Recap of 5/1 45 minutes

Security and risk 30 minutes

*** Break 15 minutes

Security and risk (cont.) 30 minutes

eCommerce 60 minutes

Wrap-up 10 minutes

Today’s Agenda

Page 42: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

43

Security is a pervasive thread throughout the SDLC

Planning

se

cu

rity

Analysis Design Implementation

Page 43: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Security terminology

Backup Controls Decryption/Encryption Exposure Fault tolerance Integrity (of data) Threats (or hazards) Risk Vulnerability

44

Page 44: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Types of threats

ThreatsUnintentionalIntentional

• Attack• Data tampering• Programming fraud

45

Page 45: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Controls address threats

Prevention and deterrence Detection Limitation Recovery Correction

46

Page 46: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Types of controls

General controlsPhysicalAccessData securityCommunication networkAdministrative

47

Page 47: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

48

“The basic problem of software development is risk”

Beck, K. (2000). Extreme Programming Explained. Boston, MA: Addison-Wesley

Risk management

Page 48: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

49

Risk management process

Identify Analyze Plan

Cost of protection Cost of exposure

$$ $$

Control

Page 49: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Chief Information Security Officer

Audits &Controls

Management

RoleManagement,

Security Access Design

SecurityGovernance,

Risk Managementand

BusinessContinuity

InformationSecurity

Research

Threat andVulnerability

Services

SecurityManagers byGeography

EMEA

Asia Pacific

Americas

Security & Controls

Page 50: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

51

Information Security - Today

The Facts– Vulnerability – Increasing points and modes

of attack – Threat – Increasing attackers and

incidents– Risk – Increasing value available for

compromise

The Result– Time stolen by security measures is increasing– Money invested in security measures is increasing– Effectiveness and life-cycle of security measures are

decreasing

Page 51: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

52

Contents

What is information risk (i-risk) Why is i-risk management important How do you assess

i-risk How do you manage

i-risk What this means to you

Page 52: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

53

Information risk is the chance or possibility of harm

being caused to a business as a result of a loss of the

confidentiality, integrity or availability of information

Definition: Information Risk

Likelihood of suffering harmNature and level of harm

The 3 key properties of information to be protected

Exists in varying forms: held in people’s heads communicated face-to-

face recorded in deeds and

other securities entered into, stored,

processed, transmitted and presented via IT

Page 53: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

54

I-Risk Impacts Other Business Risk

Borrowings and investment positions

Projected rates of interest Projected cash flows External developments

Sales forecasts Forecast

expenditure Actual sales and

expenditure Key variances

Information risk status reports

Identity of key assets (equipment, facilities and employees)

Status of continuity arrangements

Market riskMarket risk (factors beyond the control

of management such as interest and currency rates)

Financial riskFinancial risk (uncertainties about projected earnings or

expenditure)

Operational riskOperational risk (information riskinformation risk, theft, fraud, loss of facilities or

key employees)

Information risk Information risk is an increasingly important

component of operational risk

Information risk

intensifies all other

business risks

Sound information is needed to manage each category of risk. Thus, managing information risk well is essential.

Page 54: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

55

The Chance of Incidents Is High

100%

0%

25%

75%

50%

400

0

100

300

200

Business applications

(260)

Communications networks

(159)

Computer installations

(247)

Systems development

activities (115)

Overall average

(781)

52%

147

56%

276

58%

334

55%

88

55%220

Average no. of incidents suffered over a year per information resource

Percentage of information resources that suffered a MAJOR incident

Collectively known as

information resources

Information incidents are a feature of day-to-day business life, and there’s a high chance of suffering a MAJOR incident

Page 55: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

56

Why is I-Risk Important?

Information risk is– One of the most important and fastest growing components of business risk – Required for good corporate governance

Because information risk is not well understood or managed – A business-critical information resource has a 50% chance of experiencing a

MAJOR incident over the course of a year– Minor incidents are accepted as a part of day-to-day business life

Incidents sap an organization’s energy, compromise service targets, erode profitability, and can seriously harm an organization’s reputation

Page 56: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

57

Definition: Risk Management

Risk management is a process to identify, measure, control, and minimize or eliminate the likelihood of an incident

Risk management must strike a balance between the impact of risks and the cost of protective measures

Identify Evaluate Act

Identify different types of risk that affect

Evaluate their relative significance

Initiate action to keep risks within acceptable levels

Page 57: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

58

Definition: Risk Assessment

A risk assessment identifies different types of risk to Organization information resources and evaluates their relative significance

Info Resource’s Importance

Control Weaknesses

Information Resource(Application, Computer, Network)

Criticality

Vulnerabilities

Threats

Business Impact

History of Past Incidents

Magnitude of Incident’s Harm

Page 58: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

59

Driving Down Risk

Based on a risk assessment, to drive down risk

– Strengthen existing controlsor implement new controls

– Increase user education– Add layers of physical and

information security– Implement or revise business

processes– Implement or revise policies

and standards– Add resources– Make contingency arrangements

Page 59: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Paring SOX Down to Size: The Impact of Sarbanes-Oxley on IT Governance

Page 60: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

61

• What does it require, why and who cares?• State of the market

• Investments and Organization• Building a Defensible Compliance Strategy• Recommendations

“We did not formally build a compliance architecture. It just sort of happened.”

What is SOX

Page 61: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

62

The Sarbanes-Oxley Act of 2002

• Increasing responsibilities and liabilities for:

• CEOs, CFOs, Ind. Auditors, Boards/Committees

• Internal Controls

• Adequacy

• Changes

• Auditors and management

• Must report & attest to accuracy of financial statements and disclosures

Page 62: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

63

The Sarbanes-Oxley Act of 2002

• Applies to US public companies, private companies with public debt and accounting firms

• Does not exempt foreign private firms or non-U.S. public accounting firms

• Driven by the Enron, Tyco and WorldCom fiascos • SOX has sections covering

– Reporting – improves disclosure requirements

– Roles – strengthens corporate governance

– Conduct – expands on accountability

– Enforcement – improves oversight

– Penalties – broadens sanctions

– Relationships – forces auditor independence

Page 63: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

64

Why is it a Big Deal for IT?

• Lack of comprehensive documentation of existing internal controls at most firms

• No comprehensive evaluation of internal controls by the majority of firms

• SOX often has to be fit into on-going development activities

• Limited resources available

• 1 in 10 companies have made financial restatements in the past five years (U.S. GAO study)

Page 64: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

65

What the Fortune 50 are Saying

• “Our controller’s department has direct responsibility for Sarbanes-Oxley implementation. We have a program team with finance devoted to this today.”

• “We are still trying to put together a plan of what should be the overall governance of all IT systems. We want to use the structure we have put in place for Sarbanes-Oxley to be used for other compliance initiatives.”

• “Our success in working through activities the first time has depended on buy in from the CEO and CFO.”

• “The IT compliance manager and internal audit are joined at the hip and coordinate all activities together.”

Page 65: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

66

Big IT Impact Anticipated

Page 66: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

67

People, Processes and Systems will be Impacted

Page 67: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

68

Which Provisions Apply to IT?

• 302 – Corporate responsibility for financial reporting

• Is our financial data accurate?

• Do we have transaction level detail if required?

• Do we understand all the processes involved?

• 404 – Annual mgmt assessment of internal controls

• How does our control structure operate?

• Who is accountable?

• Is it monitored?

• Is it documented?

• 409 – Real-time disclosure of material changes

• 802 – Retention of relevant records for audits/reviews

Page 68: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

69

Emerging IT Requirements/Impact

• Definitely influence, perhaps certify…

– Anti-fraud techniques – development & operations – Change management process– Data integrity– Disaster recovery practices– Electronic records retention policy

– “properly recorded and reported” transactions– “reasonable assurance” test

– Integrity of communications– Patch management – Process/work flows – internal & partners– Security policies and practices

– SOX compliance built into overall security architecture

Page 69: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

70

30% 30%

20% 20%

1 2 3 4

What is SOX’s impact on IT?

1. Minimal

2. Some impact

3. Big impact

4. Impacts most of development and operations

Page 70: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

71

Key Organizational Issues

• The Sarbanes-Oxley Act of 2002 has brought companies to focus on a more centralized way to address governance and compliance.

• Centralized authority usually resides in finance or an audit group for assuring overall regulatory compliance. IT compliance is treated as an operational consideration and is usually handled by an IT compliance officer or an IT compliance committee.

• Companies normally have a compliance committee that consists of members from IT, finance and lines of business (LOBs). The committee facilitates constant and clear communications among the member participant departments.

Page 71: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

Information Systems IS 425

DePaul University

72

1. Companies not focusing on technology fixes - instead auditing, procedures and reporting. Most not buying new technology to solve, but may upgrade or partially replace to address. Most drive to 90%+.

2. Split on whether finance understands technology issues involved in SOX compliance, and whether IT understands the business issues

3. IT will be affected by SOX, more so than all other departments except finance. Most viewed SOX compliance more resource intensive than other regulatory compliance projects.

4. Confident that 404 requirements will be met.

5. Almost 1 in 10 think their job is at risk if the firm is non-compliant and 1 in 4 must certify results personally.

6. Successful companies have strong support by CxO management in driving compliance activities across the organization. It was not just the role of the CIO.

Key Findings of Recent Research

Page 72: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

73

Topic Duration

Recap of 5/1 45 minutes

Security and risk 30 minutes

*** Break 15 minutes

Security and risk (cont.) 30 minutes

eCommerce 60 minutes

Wrap-up 10 minutes

Today’s Agenda

Page 73: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

74

eCommerce

eBusiness

Page 74: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

75

What is eCommerce?

eCommerce

Marketing, buying, and selling . . .

. . . of goods and services . . .

. . . over the Internet

Page 75: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

76

What is eBusiness?

eBusiness

Conducting of business . . .

. . . over the Internet

Page 76: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

77

eBusiness Models

Business to Business (B2B) Business to Consumer (B2C) Consumer to Business (C2B) Consumer to Consumer (C2C) Business to Employee (B2E) Etc.

Our focus

Page 77: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

eBusiness “value chain”

Attract Interact Act React

• •

• •

• •

• •

Page 78: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

79

How can IT enable?

Attract Interact Act React

B2C

B2B

Information commerce

1 2

3 4

5 6

Page 79: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

80

eBusiness Processes

Page 80: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

81

Readings on architecture DL: Discussion on Business intelligence

(due May 22)

For May 15

Page 81: James Nowotarski 8 May 2008 IS 425 Enterprise Information Spring 2008

82

Extra slides