Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to Information Systems BUS 782 David Chao.

Similar presentations


Presentation on theme: "Introduction to Information Systems BUS 782 David Chao."— Presentation transcript:

1 Introduction to Information Systems BUS 782 David Chao

2 Information Systems An information system is a computerized system enabled by information technologies to solve business problems. Operational problems: –Reducing costs, improving efficiency Managerial problems: –Improving management by providing better information Strategic problems –Gain competitive advantage by providing better services

3 Fundamental Roles of IS in Business

4 Information System Components People Hardware and software Communication networks Data resources Policies and procedures.

5 Types of Information Systems Operations Support Systems –Efficiently support day-to-day operations Management Support Systems –Provide information and support for effective decision making by managers Strategic Information Systems –Help get a strategic advantage over customer

6 Transaction Processing Systems, TPS –Record and process business transactions Any exchange of money or other benefits between two or more parties Order processing, purchasing General ledger, accounts payable, accounts receivable –Large amount of data, high processing speed, high reliability, accuracy, and security (fault tolerant) –Data: internal, historical, detailed Operations Support Systems

7 Scalability Scalability is the ability of a system to handle a growing amount of work in a capable manner or its ability to be enlarged to accommodate that growth. A system is said to scale if it is suitably efficient when applied to large input data set. If the system fails when a quantity increases, it does not scale. Solutions: –Hardware –Software

8 Microsoft Azure Cloud Service A cloud service is a multi-tier web application in Azure, consisting of multiple roles to distribute processing and allow flexible scaling of your application: Web roles: A web role provides a dedicated virtual machine with an Internet Information Services (IIS) web-server used for hosting front-end web applications. Worker roles: Applications that run asynchronous tasks sent from a web role. For example, a complex application might use a web role to handle incoming requests from users, then pass the work those requests create to a worker role for processing. The Service Bus Queue is used to handle the communication between the web role and worker role.

9

10 Current Trend in Operations Support Systems Enterprise Resources Planning, ERP Customer Relationship Management, CRM

11 What is ERP? Video:Decentralized vs Centralized system –http://www.youtube.com/watch?v=lYCEQqSM08Ihttp://www.youtube.com/watch?v=lYCEQqSM08I –http://www.youtube.com/watch?v=PVRgIXLWDHs&fea ture=relatedhttp://www.youtube.com/watch?v=PVRgIXLWDHs&fea ture=related Readings: –http://en.wikipedia.org/wiki/Enterprise_resourc e_planninghttp://en.wikipedia.org/wiki/Enterprise_resourc e_planning

12 Enterprise Resources Planning, ERP ERP software is multi-module application software that integrates activities across functional departments, from product planning, parts purchasing, inventory control, product distribution, to order tracking. ERP software may include application modules for the finance, accounting and human resources aspects of a business. Major characteristics: –Integrated –Cross-functional –Shared database

13 Major Modules of an ERP System Product planning, cost and development Manufacturing Marketing and sales –Fulfillment process: All steps involved in selling and delivering the products to customers. Inventory management Finance and accounting

14 ERP Market SAP, Oracle, Microsoft, Sage, etc. Sage ERP X3: https://www.youtube.com/watch?v=ollFsXTMrfM Difference between tier 1, 2 and 3: –http://blog.compudata.com/blog/the_difference_between_tier_i_ti er_ii_and_tier_iii_erphttp://blog.compudata.com/blog/the_difference_between_tier_i_ti er_ii_and_tier_iii_erp Tier 1: http://www.youtube.com/watch?v=4R6GG9eL_1E Market share: –https://lcolumbus.files.wordpress.com/2014/05/erp-market-share-2013.jpg

15 Customer Relationship Management, CRM What is CRM: –https://www.youtube.com/watch?v=B- r3NTztAyQ Small business: –https://www.youtube.com/watch?v=wJ63PqPIjcMhttps://www.youtube.com/watch?v=wJ63PqPIjcM

16 Major Functions of CRM Front office operations: Call Center Direct interaction with customers, e.g. phone calls, e- mail, online services etc. Sales Force Automation tracks all contact that has been made with a given customer, the purpose of the contact, and any follow up that might be required. Sales Intelligence Cross-selling: selling an additional product or service to an existing customer Up-selling: induces the customer to purchase more expensive items, upgrades, or other add-ons. Switch-selling: customers are attracted by a special offer on some goods but the salesman's real aim is to sell other more expensive goods instead

17 Example of CRM Vendor Microsoft Dynamics CRM: –http://crm.dynamics.com/en-us/homehttp://crm.dynamics.com/en-us/home –http://www.microsoft.com/en-us/dynamics/crm- sales.aspxDemo: –http://uscrmdynamics.cloudapp.net/demos/Dynamics-CRM-2011-Driving-Sales- Productivity/CRM-2011-Driving-Sales-Productivity.html SalesForce.Com –Sales Cloud http://www.youtube.com/watch?v=nJQW- rbHMS0&list=PL50274E7562393953

18 Social Media Listening Social media listening, also known as social media monitoring, is the process of identifying and assessing what is being said about a company, individual, product or brand on the Internet. –http://www.youtube.com/watch?v=aqRZZrvOBnQhttp://www.youtube.com/watch?v=aqRZZrvOBnQ Tools: –Google Alert: http://www.google.com/alertshttp://www.google.com/alerts

19 Why Is Social Media Listening Important? Find potential customers Find influencers in your industry Help your business remains “socially relevant” Identify happy customers and keep them that way Find and create remarkable content Find and convert unhappy customers to happy customers

20 Types of Management Support Systems Management Information Systems (MIS) –Reports and displays –Example: daily sales analysis reports Decision Support Systems (DSS) –Interactive and ad hoc support –Example: a what-if analysis to determine where to spend advertising dollars Executive Information Systems (EIS) –Critical information for executives and managers –Example: easy access to actions of competitors

21 Management Information Systems Facilitate management control by producing summarized reports that compare actual performance against planned performance on a regular and recurring basis. –Management control: Ensuring that performance meets established standards. Serve middle management Provide reports on firm’s current performance, based on data from TPS

22 Sample MIS Report

23

24 Other Examples: Budget control: –http://www.olemiss.edu/projects/sap/REPORT S_II_Budget_Control_System.pdfhttp://www.olemiss.edu/projects/sap/REPORT S_II_Budget_Control_System.pdf LYTD VS YTD Sales comparison

25 Budget Control Report

26

27 Sales Comparison

28

29 –Serve middle management –Support nonroutine decision making E.g. What is impact on production schedule if December sales doubled? –Often use external information as well from TPS and MIS Decision support systems

30 Information and Management Decisions A decision is a selection between several courses of action: –Penalty for bad decision Information helps reduce uncertainty: –Incomplete information Information systems improve decision- making effectiveness by providing decision makers with information related to the decisions for which they are responsible.

31 Components of DSS Database: Current & Historical Data from Many Sources. –Internal and external data Model base: Collection of Mathematical & Analytical Building Blocks Interface for analysis: What - If Questions ; visual dashboard

32 Using Decision Support Systems What-IF Analysis:Observing how changes to selected variables affect other variables. Sensitivity Analysis: Observing how repeated changes to a single variable affect other variables. Goal-Seeking Analysis:Set a target value for a variable, and then repeatedly changes other variables until the target is achieved. –Example: Benefit.Xls Optimization Analysis Simulation: IBM Innov8 2.0 –http://www-01.ibm.com/software/solutions/soa/innov8/index.html

33 Strategic Information System Information systems that provide a firm with competitive products and services which give it a strategic advantage over its competitors in the marketplace. –Information systems that promote business innovation, improve operational efficiency.

34 Strategic Advantage and Strategic Necessity Strategic advantage refers to obtaining a sustainable competitive edge over competitors. The ability to obtain a greater than normal return on investment. A strategic necessity is a system that must be installed to remain competitive and stay in business.

35 Threat of New Entrants Bargaining Power of Suppliers Bargaining Power of Customers Rivalry among Existing Competitors Threat of Substitute Products Competitive forces model by Michael Porter

36 Competitive Strategies Cost leadership strategy: –Become a low cost producer of products and services –Find ways to help suppliers or customers reduce their costs Product differentiation strategy. Innovation strategy: Finding new way of doing business, enter new market. Alliance strategy: Establish alliances with customer, suppliers, competitors, other company. Growth strategy: expanding, diversifying, integrating.

37 Strategic Roles for Information Systems Improving business operations Promoting business innovation Locking in customers and suppliers –Interorganizational IS, EDI, automatic inventory replenishment system Creating switching costs –make customers dependent on the continued use of innovative IS. Raising barriers to entry –discourage competitors from entering a market

38 Components of an Information System Information technology People Database Procedure

39 People Information specialists –programmer, system analyst, database administrator, etc. End-user: –Menu-level end users –Command-level end users –End-user programmer End-user computing and management

40 Ethical Responsibilities What uses of IT might be considered improper or harmful to other individuals or society? What is the proper business use of the Internet or a company’s IT resources? How can you protect yourself from computer crime?

41 Workplace Cyber Surveillance on the Rise http://www.awarenesstech.com/Employee/Articles/ Cyber-surveillance: The person most likely to be spying on you is your boss. 27% of businesses surveyed by the American Management Association said they review employee email. Reasons: –Productivity –Liability –Network performance

42 Typical Features Email monitor Instant message monitor Keystroke logger Monitor/Block websites Content filtering Take screenshots

43 Database A group of related files –Support business operations –Provide information

44 An example of database application LuckyMarket presents another great way to save with your LuckyMarket Rewards Card! You can get up to 4 FREE movie tickets! From Feb. 01 through June 9, 2014, use your LuckyMarket Rewards Card every time you shop at Lucky. When you accumulate between $250 - $399.99 in groceries during the qualifying period, you get 2 FREE movie tickets! And if you purchase $400 or more during the same period you get 4 FREE movie tickets!

45 Major Functions of Database Management Creating a database –Analysis: Entity-Relationship Diagram –Design: Design file structure –Implementation Accessing a database Updating a database

46 Database Security Logical protection: –Illegal access –Illegal update –Virus Physical protection

47 Internet firms flocks to store data in blast-proof bunker Some biggest companies are running their Internet operations on systems installed in a 300-foot-deep nuclear blast-proof bunker.

48 Weird Data Center Location http://en.wikipedia.org/wiki/Pionen

49 Procedures Procedure: A step-by-step process or a set of instructions for accomplishing specific results. –Operations –Backup and Recovery –Security –Development

50 Operations Procedure: A procedure that describes how a computer system or application is used, how often it can be used, who is authorized to use it, and where the results of processing should go. Backup Procedure: A procedure that describes how and when to make extra copies of information or software to protect against losses. –http://www.tldp.org/LDP/lame/LAME/linux- admin-made-easy/server-backup.html Recovery Procedure: An action taken when information or software must be restored. Security Procedure: A procedure designed to safeguard data centers, communications networks, computers, and other IT components from accidental intrusion or intentional damage. Development Procedure: A procedure that explains how IT professionals should describe user needs and develop applications to meet those needs.


Download ppt "Introduction to Information Systems BUS 782 David Chao."

Similar presentations


Ads by Google