Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to Information Systems ISYS 363 David Chao.

Similar presentations


Presentation on theme: "Introduction to Information Systems ISYS 363 David Chao."— Presentation transcript:

1 Introduction to Information Systems ISYS 363 David Chao

2 What Is an Information System? Information system is a collection of components that work together to process data and provide information to help in the operation and management of an organization. Information system is an organizational and management solution, based on information technology, to a challenge posed by the environment.

3 The Fundamental Roles of Information Systems Support of business operations Support of managerial decision making Support of strategic competitive advantage: Information systems that give a company a competitive advantage in the market place. –Operational level: Travel websites: yahoo vs expedia Auction: eBay –Management level: eBay store, Amazon associates

4 Fundamental Roles of IS in Business

5 Types of Information Systems Operations Support Systems Management Support Systems

6 Operations Support Systems What do they do? –Efficiently process business transactions –Control industrial processes –Support communications and collaboration

7 Types of Operations Support Systems Transaction Processing Systems –Record and process business transactions –Large amount of data, high processing speed, high reliability, accuracy, and security (fault tolerant) –Data: internal, historical, detailed –Examples: sales processing, accounting systems Process Control Systems –Monitor and control physical processes –Example: using sensors to monitor chemical processes in a petroleum refinery Enterprise Collaboration Systems –Enhance team and workgroup communication –Examples: email, video conferencing

8 Two Ways to Process Transactions Batch Processing –Accumulate transactions over time and process periodically –Example: a bank processes all checks received in a batch at night Online Processing –Process transactions immediately –Example: a bank processes an ATM withdrawal immediately

9 Management Support Systems What do they do? –Provide information and support for effective decision making by managers

10 Types of Management Support Systems Management Information Systems (MIS) –Reports and displays –Example: daily sales analysis reports Decision Support Systems (DSS) –Interactive and ad hoc support –Example: a what-if analysis to determine where to spend advertising dollars Executive Information Systems (EIS) –Critical information for executives and managers –Example: easy access to actions of competitors

11 Management Information Systems (Information Reporting Systems) Facilitate management control by producing summarized reports that compare actual performance against planned performance on a regular and recurring basis. Management control: Ensuring that performance meets established standards.

12 MIS Report Example

13 Examples: Budget control: –http://www.olemiss.edu/projects/sap/REPORT S_II_Budget_Control_System.pdfhttp://www.olemiss.edu/projects/sap/REPORT S_II_Budget_Control_System.pdf LYTD VS YTD Sales comparison

14

15 Sales Comparison

16

17 Information and Management Decisions A decision is a selection between several courses of action: –Penalty for bad decision Information helps reduce uncertainty: –Incomplete information Information systems improve decision- making effectiveness by providing decision makers with information related to the decisions for which they are responsible.

18 Decision Support Systems Facilities for assisting decision making. Structured decision –The information requirements are known precisely. –The criteria for making decision are known. –The quality of a decision can be measured precisely. Internal and external data

19 Manager + Computer (DSS) Solution Computer Solution Manager Solution Structured Semistructured Unstructured DEGREE OF PROBLEM STRUCTURE The DSS Focuses on Semistructured Problems

20 Microsoft/Yahoo

21 Components of DSS Database: Current & Historical Data from Many Sources. –Internal and external data Model base: Collection of Mathematical & Analytical Building Blocks Interface for analysis: What - If Questions; sensitivity analysis

22 Using Decision Support Systems What-IF Analysis:Observing how changes to selected variables affect other variables. Sensitivity Analysis: Observing how repeated changes to a single variable affect other variables. Goal-Seeking Analysis:Set a target value for a variable, and then repeatedly changes other variables until the target is achieved. –Example: Benefit.Xls Optimization Analysis Simulation

23 Other Information Systems Expert Systems –Provide expert advice –Knowledge base and rules –Example: Investment Expert System http://myweb.lsbu.ac.uk/~canopej/IES/ES.html Knowledge Management Systems –Support creation, organization, and dissemination of business knowledge throughout company –Example: intranet access to best business practices, FAQ

24 Other Information Systems Functional Business Systems –Focus on operational and managerial applications of basic business functions –Examples: accounting, finance, or marketing

25 Components of an Information System Information technology People Database Procedure

26 People Information specialists –programmer, system analyst, database administrator, etc. End-user: –Menu-level end users –Command-level end users –End-user programmer End-user computing

27 Ethical Responsibilities What uses of IT might be considered improper or harmful to other individuals or society? What is the proper business use of the Internet or a company’s IT resources? How can you protect yourself from computer crime?

28 Do you think it is wrong to Copy company’s software for use at home? 35 % say no. Use company equipment like computers to search for a new job? 34% say no. Blame your own personal errors on technological glitches? 39% say no. Use office computers to do personal shopping on the Internet? 46% say no.

29 Workplace PCs May Not Be Very Private Don’t be fooled: It may be personal, but it is not private. Cyber-surveillance: The person most likely to be spying on you is your boss. 27% of businesses surveyed by the American Management Association said they review employee email. Reasons: –Productivity –Liability –Network performance

30 Detroit Mayor Scandal and Privacy Use city-issued pager Communications are stored for legal reasons. "There's absolutely no expectation of privacy with phones, e-mails, text messages or computers," expert said. Comment: HOW IN THE WORLD DIDTHE PRESS DIG UP TEXT MESSAGES FROM 2001? AND IF THEY CAN DO THAT FOR HIM... THEN WHAT ABOUT OUR PRIVACY RIGHTS AS WELL.. BECAUSE THAT SHOULD BE PROTECTED..IF WE ARE TALKING ON OUR PHONES OR TEXTING..OMG!!!!!!!!

31 Database A group of related files –Support business operations –Provide information

32 An example of database application LuckyMarket presents another great way to save with your LuckyMarket Rewards Card! You can get up to 4 FREE movie tickets! From Feb. 01 through June 9, 2007, use your LuckyMarket Rewards Card every time you shop at Lucky. When you accumulate between $250 - $399.99 in groceries during the qualifying period, you get 2 FREE movie tickets! And if you purchase $400 or more during the same period you get 4 FREE movie tickets!

33 BART Tries Pay-By-Phone System http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2008/01/30/BUPEUODJN.DTL&type=tech A contact-free cell phone payment program –puts a chip inside a phone, eliminating the need for additional cards. –lets people pay by passing their phone over a wireless reader.

34 Major Functions of Database Management Creating a database –Analysis: Entity-Relationship Diagram –Design: Design file structure –Implementation Accessing a database Updating a database

35 Database Security Logical protection: –Illegal access –Illegal update –Virus Physical protection

36 Internet firms flocks to store data in blast-proof bunker Some biggest companies are running their Internet operations on systems installed in a 300-foot-deep nuclear blast-proof bunker.

37 Procedures Procedure: A step-by-step process or a set of instructions for accomplishing specific results. –Operations –Backup and Recovery –Security –Development

38 Operations Procedure: A procedure that describes how a computer system or application is used, how often it can be used, who is authorized to use it, and where the results of processing should go. Backup Procedure: A procedure that describes how and when to make extra copies of information or software to protect against losses. –http://www.tldp.org/LDP/lame/LAME/linux- admin-made-easy/server-backup.html Recovery Procedure: An action taken when information or software must be restored. Security Procedure: A procedure designed to safeguard data centers, communications networks, computers, and other IT components from accidental intrusion or intentional damage. Development Procedure: A procedure that explains how IT professionals should describe user needs and develop applications to meet those needs.

39 Measuring IS Success Efficiency –Minimize cost, time, and use of information resources Effectiveness –Support business strategies –Enable business processes –Enhance organizational structure and culture –Increase customer and business value


Download ppt "Introduction to Information Systems ISYS 363 David Chao."

Similar presentations


Ads by Google