101
Top 100 1 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Embed Size (px)

Citation preview

Page 1: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 1

MIS 300

100 Top Hits for Slides for the Course

With emphasis on the 2nd half

Page 2: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 2

Contents

• General Model of Problem Solving• MIS; DSS; GSS; ESS• Specialized Systems• Management Support Systems• Technological Leadership• System Development• Risk Management and Security• Computer Crime and Ethics

Page 3: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 3

Focus of the Course

First six weeks: Information technology and how it works, definitions, IT as a business enabler and platform

Last six weeks: What information technology can do for users; user roles; producing and managing information technology; effects of IT

Page 4: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 4

Decision Making as a Component of Problem Solving

Figure 6.1: How Decision Making Relates to Problem Solving

SEE THINK SAY DO LEARN

Page 5: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 5

Decision Making as a Component of Problem Solving (continued)

• Problem solving: a process that goes beyond decision making to include the implementation stage

• Implementation stage: a solution is put into effect

• Monitoring stage: decision makers evaluate the implementation

Page 6: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 6

Programmed Versus Nonprogrammed Decisions

• Programmed decisions– Decisions made using a rule, procedure,

or quantitative method

– Easy to computerize using traditional information systems

Page 7: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 7

Programmed Versus Nonprogrammed Decisions (continued)

• Nonprogrammed decisions– Decision that deals with unusual or

exceptional situations– Not easily quantifiable

Page 8: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 8

Optimization, Satisficing, and Heuristic Approaches

• Optimization model: a process that finds the best solution, usually the one that will best help the organization meet its goals

• Satisficing model: a process that finds a good—but not necessarily the best—problem solution

• Heuristics: commonly accepted guidelines or procedures that usually find a good solution

Page 9: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 9

An Overview of Management Information Systems: Management Information Systems in Perspective

• A management information system (MIS) provides managers with information that supports effective decision making and provides feedback on daily operations

• The use of MISs spans all levels of management

Page 10: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 10

Management Information Systems in

Perspective (continued)

Figure 6.3: Sources of Managerial Information

Page 11: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 11

Outputs of a Management Information System

• Scheduled report: produced periodically, or on a schedule

• Key-indicator report: summary of the previous day’s critical activities

• Demand report: developed to give certain information at someone’s request

• Exception report: automatically produced when a situation is unusual or requires management action

• Drill-down report: provides increasingly detailed data about a situation

Page 12: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 12

Functional Aspects of the MIS

• Most organizations are structured along functional lines or areas

• The MIS can be divided along functional lines to produce reports tailored to individual functions

• This tends to lead to fragmentation, the sort of effect that ERP is designed to counter!

Page 13: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 13

An Overview of Decision Support Systems

• A DSS is an organized collection of people, procedures, software, databases, and devices used to support problem-specific decision making and problem solving

• The focus of a DSS is on decision-making effectiveness when faced with unstructured or semistructured business problems

Page 14: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 14

Capabilities of a Decision Support System

• Support all problem-solving phases

• Support different decision frequencies

• Support different problem structures

• Support various decision-making levels

Page 15: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 15

Capabilities of a Decision Support System (continued)

Figure 6.10: Decision-Making Level

What else goes along with level? Why?

Page 16: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 16

Components of a DSS

• Model base: provides decision makers access to a variety of models and assists them in decision making

• Database• External database access• Access to the Internet and corporate intranet,

networks, and other computer systems• Dialogue manager: allows decision makers to

easily access and manipulate the DSS and to use common business terms and phrases

Page 17: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 17

Components of a DSS (continued)

Figure 6.11: Conceptual Model of a DSS

Page 18: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 18

Group Support Systems

• Group support system (GSS)– Consists of most elements in a DSS, plus

software to provide effective support in group decision making

– Also called group decision support system or computerized collaborative work system

Page 19: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 19

Group Support Systems (continued)

Figure 6.12: Configuration of a GSS (Cf. Figure 6.11)

Page 20: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 20

Characteristics of a GSS That Enhance Decision Making

• Special design• Ease of use• Flexibility• Decision-making support• Anonymous input• Reduction of negative group behavior• Parallel communication• Automated record keeping

Page 21: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 21

Executive Support Systems

• Executive support system (ESS): specialized DSS that includes all hardware, software, data, procedures, and people used to assist senior-level executives within the organization

Page 22: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 22

Executive Support Systems in Perspective

• Tailored to individual executives

• Easy to use

• Drill-down capable

• Support the need for external data

• Can help when uncertainty is high

• Future-oriented

• Linked to value-added processes

Page 23: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 23

Capabilities of Executive Support Systems

• Support for defining an overall vision

• Support for strategic planning

• Support for strategic organizing and staffing

• Support for strategic control

• Support for crisis management

Page 24: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 24

An Overview of Artificial Intelligence

• Artificial intelligence (AI): the ability of computers to mimic or duplicate the functions of the human brain

• Artificial intelligence systems: the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that demonstrate the characteristics of intelligence

Page 25: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 25

The Nature of Intelligence

• Learn from experiences and apply knowledge acquired from experience

• Handle complex situations• Solve problems when important information is

missing• Determine what is important• React quickly and correctly to a new situation• By definition, a computer is unintelligent• The hallmark of intelligence is generating

information out of experience.

Page 26: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 26

The Nature of Intelligence (continued)

• Understand visual images

• Process and manipulate symbols

• Be creative and imaginative

• Use heuristics

Page 27: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 27

The Difference Between Natural and Artificial Intelligence

Table 7.1: A Comparison of Natural and Artificial Intelligence

Page 28: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 28

Expert Systems

• Hardware and software that stores knowledge and makes inferences, similar to a human expert

• Used in many business applications

Page 29: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 29

Robotics

• Mechanical or computer devices that perform tasks that either require a high degree of precision or are tedious or hazardous for humans

• Contemporary robotics combines high-precision machine capabilities with sophisticated controlling software

• Many applications of robotics exist today• Research into robots is continuing

Page 30: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 30

Vision Systems

• The hardware and software that permit computers to capture, store, and manipulate visual images and pictures

• Used by the U.S. Justice Department to perform fingerprint analysis

• Used for identifying people based on facial features

Page 31: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 31

Natural Language Processing

• Processing that allows the computer to understand and react to statements and commands made in a “natural” language, such as English

• Three levels of voice recognition– Command: recognition of dozens to hundreds of

words– Discrete: recognition of dictated speech with

pauses between words– Continuous: recognition of natural speech

Page 32: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 32

An Overview of Expert Systems: Characteristics and Limitations of an Expert

System

• Can explain its reasoning or suggested decisions

• Can display “intelligent” behavior

• Can draw conclusions from complex relationships

• Can provide portable knowledge

• Can deal with uncertainty

Page 33: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 33

Characteristics and Limitations of an Expert System (continued)

• Not widely used or tested• Difficult to use• Limited to relatively narrow problems• Cannot readily deal with “mixed” knowledge• Possibility of error• Cannot refine its own knowledge• Difficult to maintain• May have high development costs• Raises legal and ethical concerns

Page 34: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 34

When to Use Expert Systems

• Provide a high potential payoff or significantly reduce downside risk

• Capture and preserve irreplaceable human expertise

• Solve a problem that is not easily solved using traditional programming techniques

• Develop a system more consistent than human experts

Page 35: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 35

When to Use Expert Systems (continued)

• Provide expertise needed at a number of locations at the same time or in a hostile environment that is dangerous to human health

• Provide expertise that is expensive or rare• Develop a solution faster than human experts

can• Provide expertise needed for training and

development to share the wisdom and experience of human experts with a large number of people Do you see a

potential problem here?

Page 36: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 36

Components of Expert Systems

Figure 7.2: Components of an Expert System

Page 37: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 37

The Explanation Facility

• Allows a user or decision maker to understand how the expert system arrived at certain conclusions or results

• For example: it allows a doctor to find out the logic or rationale of the diagnosis made by a medical expert system

Page 38: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 38

The Knowledge Acquisition Facility

• Provides convenient and efficient means of capturing and storing all the components of the knowledge base

• Acts as an interface between experts and the knowledge base

Page 39: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 39

Participants in Developing and Using Expert Systems

• Domain expert: individual or group that has the expertise or knowledge one is trying to capture in the expert system

• Knowledge engineer: an individual who has training or experience in the design, development, implementation, and maintenance of an expert system

• Knowledge user: individual or group that uses and benefits from the expert system

Page 40: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 40

Applications of Expert Systems and Artificial Intelligence

• Credit granting and loan analysis• Catching cheats and terrorists• Information management and retrieval• AI and expert systems embedded in products• Plant layout and manufacturing• Hospitals and medical facilities• Help desks and assistance• Employee performance evaluations

Page 41: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 41

What Is SUPPORTED?

• Managers are employed to create conclusions, to make things happen

• Thus, any support they receive can be only of two types:– To make it easier to make things happen or– To make others think things have happened

(i.e., to increase the perception of things happening)

Tools for bringing things to conclusion

Tools for helping others see that things have happened

Page 42: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 42

What Is a Conclusion?

• A Decision

• Agreement or consensus

• Realization of a model or plan

• Addition to knowledge

• Increase in confidence

• Any (presumed positive) change in resources (such as cash, staff, customers, etc.)

Page 43: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 43

What is the Support in Management Support Systems ?

SEE THINK SAY DO LEARN

Gather Access, Analyze Display, Communicate Remember better Knowledge Array, Compare Debate Archive Data Compute

WHAT A MANAGEMENT SUPPORT SYSTEM CAN DO FOR MANAGERS TO INCREASE CONFIDENCE AND EFFECTIVENESS OF PROBLEM-SOLVING

Manage this Process

Page 44: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 44

What Kinds of Tools Are There

• Display and Data Formatting (Presentation)

• Data Search and Processing (MIS)

• Suggested Action (Consulting)

• Evaluation of Action (DSS)

• Logical Conclusion (Expert System)

• Action (Operational System)

Page 45: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 45

How These Tools Differ

• Each one incorporates more “knowledge” than those above.

• The value of the knowledge is higher and the knowledge is more specific.

• Each removes some of the burden from the problem solver in generating and evaluating solutions

Page 46: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 46

Manager in Need of Support

Structure of a Management Support System

MODELCAPTURE

MODELBASE

DIALOGMANAGER

ADVICE

Knowledgeable Advisor

This takes place continually, refining theQuality and relevance of the stored data

LEARNING

Page 47: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 47

System Management

Model Usage

Model Management

Manager in Need of Support

Structure of a Management Support System

MODELCAPTURE

MODELBASE

DIALOGMANAGER

ADVICE

Knowledgeable Advisor

LEARNING

Page 48: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 48

General Model of a Management Support System

KnowledgeEngineering

Know-ledgeBase

Advisors

LEARNINGFeedback

Advice

AdvisingSystem

Interface

Managers ProblemDescription

Page 49: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 49

Who Is a Technology Leader?

• Technology developers

• Technology commercializers

• Technology stewards

Those who specify and build the systems

Those who figure out how to make a profit

Those who get the systems built and

employed

Project Process ProductUSE

Page 50: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 50

Who Is a Technology Leader?

• Technology stewards– User management– Project managers & clients– Process managers– Product owners

Page 51: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 51

Technology Leadership

• Three components:– Assessment– Forecasting– Management– Transfer

• A technological leader fosters technological innovation, and understands the technology life cycle.

• Such a leader initiates and steers commercialization of technological advances, links business and technology strategies, manages technology R&D and understands technological revolutions.

Page 52: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 52

Technology Management Components

• Technology Assessment– Evaluating technologies as they are created– To make wise investments, understand the true

costs, improve existing technologies, and develop ways of employing technologies

• Technology Forecasting– Predicting what technologies are going to be

available– To strategize technology use, second-guess the

competition, stay on top of the technology wave

Page 53: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 53

Technology Management Components

• Technology Management– Developing and using appropriate technologies– To lead the technology, employ it in the best

way, and to profit from technology use.

• Technology Transfer– Helping others learn the benefits and uses of

appropriate technologies– Making technologies available to others

Page 54: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 54

Technology Transfer

Rest of Organization

Technology Innovation

Source

Infusion

Adaptation

Innovation

Dilution

Evolution

Commercialization

Page 55: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 55

Technology Management Process(Pre-implementation)

PlanDevelop the technology plan

ResearchFind out what is needed, forecast technologies, assess technology menu

Procure or Develop

Find out what is available, developing acquisition and finance strategies

Page 56: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 56

Technology Management Process (Post-implementation)

ImproveMonitor use, develop improvement strategies, adhere to technology plan

ControlCommercialize, transfer, plan for obsolescence, train,

manage culture clashDispose

Scrap, reinvoke management cycle

PlanDevelop the technology plan

Page 57: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 57

Technology Life Cycle

Time

Market penetration,

Use, Acceptance,

Volume, etc.

Development

Application Launch

Application Growth

Mature Technology Substitution

and Obsolescence

Page 58: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 58

Commercialization and Marketing of Technology

Time

Sales Profit

Break-even

Are all internally developed systems “loss leaders”?

Page 59: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 59

An Overview of Systems Development: Participants in Systems Development

• Development team– Responsible for determining the objectives of

the information system and delivering a system that meets these objectives

– Usually consists of stakeholders, users, managers, systems development specialists, and various support personnel

Page 60: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 60

Systems Development Methods

• The systems development process is also called a systems development life cycle (SDLC)

• Traditional systems development life cycle

• Prototyping

• Rapid application development (RAD)

• End-user development

Page 61: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 61

The Traditional Systems Development Life Cycle

Figure 8.4: The Traditional Systems Development Life Cycle

Page 62: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 62

The Traditional Systems Development Life Cycle

(continued)• Systems investigation: problems and

opportunities are identified and considered in light of the goals of the business

• Systems analysis: study of existing systems and work processes to identify strengths, weaknesses, and opportunities for improvement

• Systems design: defines how the information system will do what it must do to obtain the problem’s solution

These two often take place at the

same time.

Page 63: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 63

The Traditional Systems Development Life Cycle

(continued)• Systems implementation: the creation or

acquiring of various system components detailed in the systems design, assembling them, and placing the new or modified system into operation

• Systems maintenance and review: ensures that the system operates, and modifies the system so that it continues to meet changing business needs

Page 64: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 64

The Major Phases of System Development

ReviewEvaluation

MainenanceAnalysis

Implemen-tation

Design

Focus onReal Systems Models of Systems

Focus on Users

Systems

Page 65: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 65

Prototyping

Figure 8.5: Prototyping Is

an Iterative Approach to

Systems Development

ExpertImple-menta-

tion

Page 66: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 66

The End-User Systems Development Life Cycle

• Any systems development project in which the primary effort is undertaken by a combination of business managers and users

• End-user-developed systems can be structured as complementary to, rather than in conflict with, existing and emerging information systems

Page 67: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 67

Outsourcing and On Demand Computing

• An outside consulting firm or computer company that specializes in systems development can be hired to take over some or all of the development and operations activities

• Outsourcing can involve a large number of countries and companies in bringing new products and services to market

Page 68: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 68

Systems Investigation

• What primary problems might a new or enhanced system solve?

• What opportunities might a new or enhanced system provide?

• What new hardware, software, databases, telecommunications, personnel, or procedures will improve an existing system or are required in a new system?

• What are the potential costs (variable and fixed)?

• What are the associated risks?

Page 69: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 69

Feasibility Analysis

• Technical feasibility

• Economic feasibility

• Schedule feasibility

• Legal feasibility

• Operational feasibility

Is there a workable technology?

Can we afford the potential

implementations?

Can we do it in time?

These two types of feasibility are often joined with othersinto a set of criteria termed

“organizational will”. Do we have the courage and

culture tocarry out the implementation?

Page 70: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 70

The Systems Investigation Report

• Summarizes the results of systems investigation and the process of feasibility analysis

• Recommends a course of action: continue on into systems analysis, modify the project in some manner, or drop it

Page 71: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 71

Systems Analysis

• Answers the question “What must the information system do to solve the problem?”

• Primary outcome: a prioritized list of system requirements

Page 72: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 72

Data Analysis

• A set of diagramming techniques• Data modeling

– Entity-relationship (ER) diagrams– Relatively easy to understand; a narrative of

what entities (actors, objects) produce or use what information

• Activity modeling– Data-flow diagrams (DFDs)– Conceptual, intuitive, should be shared with

potential users for verification

Page 73: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 73

The Systems Analysis Report

• The systems analysis report should cover:– The strengths and weaknesses of the existing

system from a stakeholder’s perspective– The user/stakeholder requirements for the new

system (also called the functional requirements)– The organizational requirements for the new

system– A description of what the new information

system should do to solve the problem

Page 74: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 74

Systems Design

• Answers the question “How will the information system do what it must do to solve a problem?”

• Has two dimensions: logical and physical• Logical design: description of the functional

requirements of a system: a model of the user• Physical design: specification of the

characteristics of the system components necessary to put the logical design into action: a model of the system

Page 75: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 75

Systems Implementation: User Roles

Figure 8.18: Typical Steps in Systems Implementation

Heavy user involvement

Page 76: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 76

Personnel: Hiring and Training

• IS manager

• Systems analysts

• Computer programmers

• Data-entry operators

• Hiring users: describe the job; match the skills

• Users may take up to three months to learn the new jobs.

Page 77: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 77

Data Preparation

• Also called data conversion

• Ensuring all files and databases are ready to be used with new computer software and systems

• With mission-critical data, generally a really expensive proposition

Page 78: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 78

Testing

• Unit testing: testing of individual programs• System testing: testing the entire system of

programs• Volume testing: testing the application with

a large amount of data• Integration testing: testing all related

systems together• Acceptance testing: conducting any

tests required by the user

Page 79: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 79

Installation

• The process of physically placing the computer equipment on the site and making it operational

• Normally the manufacturer is responsible for installing computer equipment

• Someone from the organization (usually the IS manager) should oversee the process

Page 80: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 80

Start-Up

• The process of making the final tested information system fully operational

• Direct conversion (also called plunge or direct cutover – “Black Monday” effect)

• Phase-in approach (function by function; perhaps department by department)

• Pilot start-up (a test area, function or department)• Parallel start-up (where mission critical information

is required or involved, where absolutely reliable service is needed)

Page 81: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 81

User Acceptance

• User-acceptance document: formal agreement signed by the user that states that a phase of the installation or the complete system is approved

Page 82: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 82

Systems Operation and Maintenance

• Systems operation: use of a new or modified system

• Systems maintenance: checking, changing, and enhancing the system to make it more useful in achieving user and organizational goals

Page 83: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 83

Systems Review

• Process of analyzing systems to make sure that they are operating as intended

• Often compares the performance and benefits of the system as it was designed with the actual performance and benefits of the system in operation

• Event-driven review: review triggered by a problem or opportunity, such as an error, a corporate merger, or a new market for products

• Time-driven review: review performed after a specified amount of time

Page 84: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 84

General Risk Model

Threat

Awareness,Assessment

Avoidance, Deterence

Threat haseffects

Defence

Effects haveImplications

Detection, Recovery

Reassessment(Retaliation)

Page 85: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 85

Risk Management Components

• Assessment/Awareness• Avoidance• Deterence/Deflection• Defence• Audit/Detection• Recovery• Retaliation• Reassessment/Learning

Costs rise rapidly as risk manage-ment tactics evolve in time by powers of 2 to 10

$1

$2-10

$4-100

$8-1000

$16-10000

$32-100000

$64-1000000

Priceless!

Page 86: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 86

Cost/Benefit Tradeoff

Benefits (lowered risk, damage)

Cost (money, effort, exposure)

Because loss is highest for late actions, there is a rapid increase in value of expense

At some point tactics are complex themselves and expose actor to further risk

Page 87: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 87

Computer Waste and Mistakes

• Computer waste– The inappropriate use of computer technology

and resources

• Computer-related mistakes– Errors, failures, and other computer problems

that make computer output incorrect or not useful

Page 88: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 88

Computer Waste

• Discarding of technology• Unused systems• Personal use of corporate time and

technology• Spam• Poorly designed systems• Unintelligent system use

Page 89: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 89

Computer-Related Mistakes

• Mistakes can be caused by unclear expectations and a lack of feedback

• A systems analyst might specify a system that is not what is needed or wanted

• A programmer might develop a program that contains errors

• Users might accept a system that is not what is needed or what is wanted

• A data-entry clerk might enter the wrong data

Page 90: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 90

Computer Crime

• Often defies detection

• The amount stolen or diverted can be substantial

• The crime is “clean” and nonviolent (so far!)

• The number of IT-related security incidents is increasing dramatically

• Computer crime is now global

Page 91: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 91

The Computer as a Tool to Commit Crime

• Criminals need two capabilities to commit most computer crimes:– Knowing how to gain access to the computer

system– Knowing how to manipulate the system to

produce the desired result

• Social engineering

• Dumpster diving

Page 92: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 92

Identity Theft

• An imposter obtains key pieces of personal identification information, such as Social Security or driver’s license numbers, in order to impersonate someone else

• The information is then used to obtain credit, merchandise, and services in the name of the victim or to provide the thief with false credentials

• Identity Theft and Assumption Deterrence Act of 1998

Page 93: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 93

Data Alteration and Destruction

• Virus: a computer program capable of attaching to disks or other files and replicating itself repeatedly, typically without the user’s knowledge or permission

• Worm: an independent program that replicates its own program files until it interrupts the operation of networks and computer systems

Page 94: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 94

Data Alteration and Destruction – 2

• Trojan horse: a program that appears to be useful but actually masks a destructive program

• Logic bomb: an application or system virus designed to “explode” or execute at a specified time and date

Page 95: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 95

Using Antivirus Programs

• Antivirus program: program or utility that prevents viruses and recovers from them if they infect a computer

• An antivirus software should be run and updated often

Page 96: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 96

Privacy Issues

• With information systems, privacy deals with the collection and use or misuse of data

• Privacy and the federal government

• Privacy at work: you don’t have any

• E-mail privacy: doesn’t exist

• Privacy and the Internet: caveat emptor

Page 97: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 97

Privacy: The Basic Issue

• Information about the individual may or may not “belong” to the individual as “property”

• English common law, the basis of our general law, recognizes property rights as inherent and inviolable (in general)

• Intellectual assets differ in many ways from physical property– Eg. Copyable without damage– Eg. Valuable only for brief period of time– Eg. Can cause damage as well as be an asset

Page 98: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 98

Information about Oneself

• In general this does NOT belong to the individual• Example: “public figure”• Example: customer records• Example: Employee records• Example: One’s image (visual or audio)• Information in general is inherent in an activity

and belongs to that activity; the owner of the activity is the owner of the information.

• This is not a well-developed field with clear-cut principles that juries and judges adhere to.

Page 99: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 99

Corporate Privacy Policies

• Should address a customer’s knowledge, control, notice, and consent over the storage and use of information

• May cover who has access to private data and when it may be used

• A good database design practice is to assign a single unique identifier to each customer

Page 100: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 100

Individual Efforts to Protect Privacy

• Find out what is stored about you in existing databases

• Be careful when you share information about yourself

• Be proactive to protect your privacy• When purchasing anything from a Web site,

make sure that you safeguard your credit card numbers, passwords, and personal information

Page 101: Top 1001 MIS 300 100 Top Hits for Slides for the Course With emphasis on the 2 nd half

Top 100 101

Foreign Language Guide Book

• “It’s cute but it doesn’t do what it’s supposed to do.”

• “I know YOU think it’s great technology, but it doesn’t meet my needs.”

• “Wow! This is really going to make me look good on the job!”

• “IT DOESN’T WORK!”

• “I DON’T WANT IT!”

• “THANKS!”

What you want to express What to say in ITish