We’re Halfway There! Today: Review Mid-term

Slides:



Advertisements
Similar presentations
CIS 429 Fall 2007 Review for Comprehensive Final.
Advertisements

Topic 4: Protecting People & Information Ethics, Privacy & Security MGMD 233-MIS AMN 2012.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
7-1 INTRODUCTION: SoA Introduced SoA in Chapter 6 Service-oriented architecture (SoA) - perspective that focuses on the development, use, and reuse of.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 7 Infrastructure, Cloud Computing, Metrics, and Business.
Building and Sustaining the Dynamic Enterprise
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 7 Infrastructure, Cloud Computing, Metrics, and Business.
Chapter 7 Enterprise Infrastructure, Metrics, and Business Continuity Planning: Building and Sustaining the Dynamic Enterprise Copyright © 2010 by the.
Chapter 7 Infrastructure, Cloud Computing, Metrics, and Business Continuity Planning.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 7 Enterprise Infrastructure, Metrics, and Business Continuity Planning: Building and Sustaining the Dynamic Enterprise McGraw-Hill/Irwin Copyright.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
1 Chapter 7 IT Infrastructures Business-Driven Technology
ENTERPRISE INFRASTRUCTURE, METRICS, AND BUSINESS CONTINUITY PLANNING
Performance Assessment Min Song, Ph.D. Is 465. LEARNING OUTCOMES 4.1 Compare efficiency IT metrics and effectiveness IT metrics 4.2 List and describe.
Business Driven Technology Unit 1
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
CHAPTER 04 Measuring the Success of Strategic Initiatives
MGMD 233 –MIS Topic 3: Enterprise Infrastructure & Integration AMN 2012/2013.
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved ©2005 The McGraw-Hill Companies, All rights reserved McGraw-Hill/Irwin.
Chapter CHAPTER FIVE OVERVIEW SECTION MANAGING ENTERPRISE ARCHITECTURES  Enterprise Architectures  Information Architecture  Infrastructure.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Protecting People and Information: Threats and Safeguards.
Protecting People and Information: Threats and Safeguards
Chapter 8 Protecting People and Information: Threats and Safeguards.
PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 7 Building and Sustaining the Dynamic Enterprise Chapter 7 ENTERPRISE INFRASTRUCTURE,
Enterprise Resource Planning Enterprise Resource Planning Systems is a computer system that integrates application programs in accounting, sales, manufacturing,
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
IT infrastructure Introduction Tehran university Mahdi Faghihi 2012 In The Name of God.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
Chapter 4 Measuring the Success of Strategic Initiatives.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
7-1 Chapter 7 IT Infrastructures Business-Driven Technology.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 4 Measuring the Success of Strategic Initiatives.
Chapter 7 Enterprise Infrastructure, Metrics, and Business Continuity Planning: Building and Sustaining the Dynamic Enterprise Copyright © 2010 by the.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 7 Infrastructure, Cloud Computing, Metrics, and Business.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
Chapter 13 Information Resource Management The McGraw-Hill Companies, Inc All rights reserved. Irwin/McGraw-Hill.
Exam 1 Terminology Review MIS Question 1 Information that describes a specific operational aspect of an organization: A. External B. Internal C.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Enterprise Resource Planning
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 4-1 BUSINESS DRIVEN TECHNOLOGY Chapter Four: Measuring the Success of Strategic.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Protecting People and Information: Threats and Safeguards.
Chapter 8 Protecting People and Information: Threats and Safeguards
Chapter 7 Enterprise Infrastructure, Metrics, and Business Continuity Planning: Building and Sustaining the Dynamic Enterprise
Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
Chapter 7 Building and Sustaining the Dynamic Enterprise Chapter 7 ENTERPRISE INFRASTRUCTURE, METRICS, AND BUSINESS CONTINUITY PLANNING Building and Sustaining.
Chapter 7 Infrastructure, Cloud Computing, Metrics, and Business Continuity Planning: Building and Sustaining the Dynamic Enterprise.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Exam 1 Terminology Review
IT INFRASTRUCTURES Business-Driven Technologies
Protecting People and Information: Threats and Safeguards
INFORMATION SYSTEMS SECURITY and CONTROL
PROTECTING PEOPLE & INFORMATION
Chapter 7 ENTERPRISE INFRASTRUCTURE, METRICS, AND BUSINESS CONTINUITY PLANNING Building and Sustaining the Dynamic Enterprise.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Chapter 8 Protecting People and Information: Threats and Safeguards
Presentation transcript:

We’re Halfway There! Today: Review Mid-term Answer questions on group project Chapters7/8 Discuss case Break (10 minutes) Marvin Irby on ERP and Contingency Planning at the Walt Disney Company

ERP Revisited From Chapter 2, Enterprise resource planning (ERP) system – collection of integrated software for business management, accounting, finance, supply chain management, inventory management, customer relationship management, e-collaboration, etc. ERP is big business Federal government will spend $7.7 billion on ERP in 2009 60% of Fortune 1000 companies have ERP systems Moving into smaller companies now

ERP Revisited Dominant ERP providers – SAP, Oracle/PeopleSoft, SSA Global, and Microsoft About 50 or so established emerging ERP vendors that will challenge the big 4

ERP Evolution MRP – 1970s; focus on production planning, calculating time requirements, procurement; basic automated manufacturing focus MRP II – 1980s; closed the loop to include financial and accounting systems and serve as a decision support tool for managers

ERP Evolution ERP – late 1980s/early 1990s; focus on critical “time to market”; shorter lead times; customers want it now ERP II – today; focus on complete ERP integration with CRM, business intelligence, and a host of other applications across the organization

ERP For ERP to integrate everything, everything must be plug-and-play components or services All modules of an ERP vendor must be interoperable Software from multiple ERP vendors must be interoperable The infrastructure beneath must be hidden from users and customers

ERP Advantages Reliable information access Avoids data and operations redundancy Delivery and cycle time reduction Cost reduction Easy adaptability Improved scalability Global outreach E-business support

ERP Disadvantages Time-consuming Expensive Lack of conformity of modules Vendor dependence Too many features Too much complexity Questionable scalability Not enough extended ERP capability

IT SUCCESS METRICS To justify costs of technology, you need to measure its success Metrics are also called benchmarks, baseline values a system seeks to attain. Benchmarking – process of continuously measuring system results and comparing them to benchmarks

Efficiency & Effectiveness Metrics Efficiency – doing something right In the least time At the lowest cost With the fewest errors Etc Effectiveness – doing the right things Getting customers to buy when they visit your site Answering the right question with the right answer the first time

Efficiency & Effectiveness Metrics Bottom-line initiatives typically focus on efficiency, while top-line initiatives tend to focus on effectiveness.

Types of IT Success Metrics Infrastructure-centric metrics Web-centric metrics Call center metrics Financial metrics

Infrastructure-Centric Metrics Infrastructure-centric metric – measure of efficiency, speed, and/or capacity of technology Throughput – amount of information that can pass through a system in a given amount of time Transaction speed – speed at which a system can process a transaction System availability – measured inversely as downtime, or the average amount of time a system is down or unavailable

Infrastructure-Centric Metrics Infrastructure-centric metric – measure of efficiency, speed, and/or capacity of technology Accuracy – measured inversely as error rate, or the number of errors per thousand/million that a system generates Response time – average time to respond to a user-generated event, such as a mouse click Scalability – conceptual metric related to how well a system can be adapted to increased demands

Web-Centric Metrics Web-centric metric – measure of the success of your Web and e-business initiatives Unique visitors – # of unique visitors to a site (Nielsen/Net Ratings primary metric) Total hits – number of visits to a site Page exposures – average page exposures to an individual visitor Conversion rate - % of potential customers who visit your site and who actually buy something www.compete.com

Web-Centric Metrics Web-centric metric – measure of the success of your Web and e-business initiatives Click-through - # of people who click on an ad and are taken to another site Cost-per-thousand – sales dollars generated per dollar of advertising Abandoned registrations - # who start to register at your site and then abandon the process Abandoned shopping carts - # who create a shopping cart and then abandon it

Call Center Metrics Call center metric – measures the success of call center efforts Abandon rate - % number of callers who hang up while waiting for their call to be answered Average speed to answer (ASA) – average time, usually in seconds, that it takes for a call to be answered by an actual person

Call Center Metrics Call center metric – measures the success of call center efforts Time service factor (TSF) - % of calls answered within a specific time frame, such as 30 or 90 seconds First call resolution (FCR) - % of calls that can be resolved without having to call back

Financial Metrics Ultimately, an IT system must make financial sense Financial metrics are also called capital analysis financial models Many and varied You will learn these and their applications in other classes

Financial Metrics

IT Metrics and Service Level Agreements Service level agreement (SLA) – formal, contractually obligated agreement between 2 parties SLAs must include IT success metrics SLAs are between your organization and outsourcing organizations SLAs define how you will measure the outsourcing organization’s efforts These measures are in service level specifications (SLS) or service level objectives (SLO)

IT Metrics and Service Level Agreements SLAs are also between your organization and an application service provider or SaaS provider. Application service provider (ASP) – supplies software applications (and related services) over the Internet that would otherwise reside on customers’ computers If you engage an ASP, you would do so with an SLA

BUSINESS CONTINUITY PLANNING Business continuity planning (BCP) – rigorous and well-informed organizational methodology for developing a business continuity plan, a step-by-step guideline defining how the organization will recover from a disaster or extended disruption BCP is very necessary today given terror threats, increased climate volatility, etc

BUSINESS CONTINUITY PLANNING METHODOLOGY

BCP METHODOLOGY Organizational strategic plan Analysis Design Implementation Testing Maintenance

Organizational Strategic Plan It all starts here The strategic plan defines what is and what is not important You must have a business continuity plan for what is important

Analysis Impact analysis – risk assessment, evaluating IT assets, their importance, and susceptibility to threat Threat analysis – document all possible major threats to organizational assets Impact scenario analysis – build worst-case scenario for each threat Requirement recovery document – identifies critical assets, threats to them, and worst-case scenarios

Design Build disaster recovery plan, detailed plan for recovering from a disaster. May include Collocation facility – rented space and telecommunications equipment Hot site – fully equipped facility where your company can move to Cold site – facility where your company can move to but has no computer equipment

Design Disaster recovery plan should include a disaster recovery cost curve, which charts the cost of unavailable information/technology compared to the cost to recover from a disaster over time.

Implementation Engage any businesses that will provide collocation facilities, hot sites, and cold sites Implement procedures for recovering from a disaster Train employees Evaluate each IT system to ensure that it is configured optimally for recovering from a disaster

Testing As opposed to traditional software development, testing in BCP methodology occurs after implementation Simulate disaster scenarios Have employees execute disaster recovery plans Evaluate success and refine as necessary

Chapter 8

ETHICS Ethics – the principles and standards that guide our behavior toward other people Ethics are rooted in history, culture, and religion

Factors the Determine How You Decide Ethical Issues Actions in ethical dilemmas determined by Your basic ethical structure The circumstances of the situation Your basic ethical structure determines what you consider to be Minor ethical violations Serious ethical violations Very serious ethical violations

Intellectual Property Intellectual property – intangible creative work that is embodied in physical form Copyright – legal protection afforded an expression of an idea Fair Use Doctrine – may use copyrighted material in certain situations

Intellectual Property Using copyrighted software without permission violates copyright law Pirated software – the unauthorized use, duplication, distribution, or sale of copyrighted software

An E-Mail is Stored on Many Computers

Identity Theft Phishing (carding, brand spoofing) – a technique to gain personal information for the purpose of identity theft NEVER Reply without question to an e-mail asking for personal information Click directly on a Web site provided in such an e-mail

Pharming Pharming - rerouting your request for a legitimate Web site sending it to a slightly different Web address or by redirecting you after you are already on the legitimate site Pharming is accomplished by gaining access to the giant databases that Internet providers use to route Web traffic. It often works because it’s hard to spot the tiny difference in the Web site address.

Privacy and Employees Companies need information about their employees to run their business effectively As of March 2005, 60% of employers monitored employee e-mails 70% of Web traffic occurs during work hours 78% of employers reported abuse 60% employees admitted abuse

Cookies Cookie – a small file that contains information about you and your Web activities, which a Web site places on your computer Handle cookies by using Web browser cookie management option Buy a program that manages cookies

Spam Spam – unsolicited e-mail from businesses advertising goods and services Gets past spam filters by Inserting extra characters Inserting HTML tags that do nothing Replying usually increases, rather than decreases, amount of spam

Adware and Spyware Adware – software to generate ads that installs itself when you download another program Spyware (sneakware, stealthware) – software that comes hidden in downloaded software and helps itself to your computer resources Brent-name of cookie company

Web Logs Web log – one line of information for every visitor to a Web site Clickstream – records information about you during a Web surfing session such as what Web sites you visited, how long you were there, what ads you looked at, and what you bought. Anonymous Web browsing (AWB) – hides your identity from the Web sites you visit The Anonymizer at www.anonymizer.com SuftSecret at www.surfsecret.com

Security and Outside Threats Hackers – knowledgeable computer users who use their knowledge to invade other people's computers Computer virus (virus) – software that is written with malicious intent to cause annoyance or damage Worm – type of virus that spreads itself from computer to computer usually via e-mail Denial-of-service (DoS) attack – floods a Web site with so many requests for service that it slows down or crashes

Security Measures Anti-virus software – detects and removes or quarantines computer viruses Anti-spyware and anti-adware software Spam protection software – identifies and marks and/or deletes Spam Anti-phishing software – lets you know when phishing attempts are being made Firewall – hardware and/or software that protects a computer or network from intruders