Description
I want to solve all parts 1, 2, and the presentation. I want a separate file for each part I want to solve all parts 1, 2, and the presentation.
The project talks about Samsung ،، please no coping 🙏
Introduction to
Information Systems
1. Why Should I Study Information
Systems?
2. Overview of Computer-Based
Information Systems
3. How Does IT Impact Organizations?
4. Importance of Information Systems
to Society
1. Identify the reasons why being an informed
user of information systems is important in
today’s world.
2. Describe the various types of computer-based
information systems in an organization.
3. Discuss ways in which information technology
can affect managers and non-managerial
workers.
4. Identify positive and negative societal effects
of the increased use of information technology.
1.1 Why Should I Study
Information Systems
• The Informed User – You!
• IT Offers Career Opportunities
• Managing Information Resources
Reasons Why You Should
Be An Informed User…
1. You will benefit more from your
organization’s IT applications because
you will understand what is “behind”
those applications.
2. Your input can enhance your
organization’s IT applications.
3. As you enter the workforce you can
assist in selecting the IT applications
your organization will use.
Reasons Why You Should Be An
Informed User (con’t)…
4. You will aware of both new information
technologies and rapid developments in
existing technologies.
5. You will understand how using IT can
improve your organization’s
performance.
6. If you are entrepreneurial minded, you
can use IT to start your own business.
IT Offers Career
Opportunities
• Chief Information Officer (CIO)
• Substantial Demand for IT Staff
– Programmers
– Business Analysts
– System Analysts
– Designers
• $130,000 is the median salary in 2015
for IS Managers (US Dept of Labor)
IT Skills Open Many Doors
Because IT Is So Widely Used
Managing Information
Resources
• Managing information systems (IS)
is difficult and complex
• Contributing Factors:
– Strategic value of IS’s
– Acquiring, operating, and maintaining
IS’s is very expensive
– Evolution of the IS Function
1.2 Overview of
Computer-Based IS’s
• Data – Information – Knowledge
• Computer-Based Information
System (CBIS)
• Types of Computer-Based
Information Systems (CBIS)
Data – Information –
Knowledge
Data versus Information
versus Knowledge
Components of a CBIS
• Hardware
• Software
• Database
• Network
• Procedures
• People
Computer-Based
Information Systems (CBIS)
Types of Computer Based
Information Systems (CBIS)
• Breadth of Support for Information
Systems (IS)
• Support for Organizational
Employees
Breadth of Support for
Information Systems (IS)
• Functional Area Information Systems
(FAIS)
• Enterprise Resource Planning Systems
(ERP)
• Transaction Processing Systems (TPS)
• Interorganizational Information Systems
(IOS)
• E-Commerce Systems
Major Capabilities of Information
Systems
(Table 1.3)
• Perform high-speed, high-volume numerical computations.
• Provide fast, accurate communication and collaboration
within and among organizations.
• Store huge amounts of information in an easy-to-access,
yet small space.
• Allow quick and inexpensive access to vast amounts of
information, worldwide.
• Analyze and interpret vast amounts of data quickly and
efficiently.
• Automate both semiautomatic business processes and
manual tasks.
Figure 1.5: IS that function
among multiple organizations
Support for Organizational
Employees
• Knowledge Workers
• Office Automation Systems (OASs)
• Business Intelligence (BI) Systems
• Expert Systems (ES)
• Dashboards
Types of Organizational
Information Systems (Table 1.4)
1.3 How Does IT Impact
Organizations?
• IT Impacts Entire Industries
• IT Reduces the Number of Middle
Managers
• IT Change’s the Manager’s Job
• Will IT Eliminate Jobs?
• IT Impacts Employees at Work
IT Impacts Entire Industries
• Book Industry
• Music Industry
• Video Industry
• Software Industry
• Videogame Industry
• Photography Industry
• Marketing Industry
IT Impacts Entire Industries
(Continued)
• Recruiting Industry
• Financial Services Industry
• Motion Picture Industry
• Automotive Industry
• Agriculture Industry
• National Defense Industry
• Fashion Industry
IT Impacts Entire Industries
(Continued)
• Education
• Legal Profession
IT Impacts Employees at
Work
• IT Impacts Employees’ Health and
Safety
• IT Provides Opportunities for People
with Disabilities
Figure 1.6: Ergonomic products
protect computer users.
1.4 Importance of IS to
Society
• IT Affects Our Quality of Life
• The Robot Revolution is Here Now
• Improvements in Healthcare
CHAPTER 2
Organizational Strategy,
Competitive Advantage,
and Information Systems
1. Business Pressures, Organizational
Responses, and Information
Technology Support
2. Competitive Advantage and
Strategic Information Systems
1. Identify effective IT responses to
different kinds of business
pressures.
2. Describe the strategies that
organizations typically adopt to
counter Porter’s five competitive
forces.
Pressures,
2.1 Business
Organizational Responses,
and IT Support
• Business Pressures
• Organizational Responses
Business Pressures
• Market Pressures
• Technology Pressures
• Societal/Political/Legal Pressures
Figure 2.1: Business Pressures,
Organizational Performance & Responses,
and IT Support
Market Pressures
• Globalization
• Changing Nature of the Workforce
• Powerful Customers
Technology Pressures
• Technological Innovation and
Obsolescence
• Information Overload
Societal/Political/Legal
Pressures
• Social Responsibility
• Compliance with Government
Regulations
• Protection Against Terrorist Attacks
• Ethical Issues
Social Responsibility
• IT Assists “Go Green” Efforts in
Three Areas:
1. Facilities design and management
2. Carbon management
3. International and U.S. environmental
laws
• Digital Divide
Organizational Responses
• Strategic Systems
• Customer Focus
• Make-to-Order and Mass
Customization
• E-Business and E-Commerce
2.2 Competitive Advantage
and Strategic IS’s
• Porter’s Competitive Forces Model
• Porter’s Value Chain Model
• Strategies for Competitive
Advantage
• Business – Information Technology
Alignment
Porter’s Five Forces Model
1. The threat of new competitors
2. The bargaining power of suppliers
3. The bargaining power of customers
(buyers)
4. The threat of substitute products or
services
5. The rivalry among existing firms in
the industry
Figure 2.2: Porter’s
Competitive Forces Model
Porter’s Value Chain Model
• Value Chain
• Two Categories of Organization
Activities in the Value Chain
– Primary Activities
– Support Activities
Figure 2.3: Porter’s Value
Chain Model
Primary Activities
• Inbound logistics
• Operations
• Outbound logistics
• Marketing and sales
• Services
Support Activities
• The Firm’s Infrastructure
• Human Resources Management
• Product and Technology
Development
• Procurement
Strategies for Competitive
Advantage
1. Cost leadership strategy
2. Differentiation strategy
3. Innovation strategy
4. Organizational effectiveness
strategy
5. Customer orientation strategy
Figure 2.4: Strategies for
Competitive Advantage
Business-Information
Technology Alignment
• Business–Information Technology
Alignment
• Six Characteristics of Excellent
Business-IT Alignment:
Six Characteristics of Excellent
Business-IT Alignment
1. Organizations view IT as an engine of
innovation that continually transforms the
business, often creating new revenue
streams.
2. Organizations view their internal & external
customers & their customer service function
as supremely important.
3. Organizations rotate business & IT
professionals across departments and job
functions.
Six Characteristics of Excellent
Business-IT Alignment (continued)
4. Organizations provide overarching
goals that are completely clear to
each IT and business employee.
5. Organizations ensure that IT employees
understand how the company makes (or
loses) money.
6. Organizations create a vibrant and
inclusive company culture.
CHAPTER 3
Data and Knowledge
Management
1. Managing Data
2. The Database Approach
3. Big Data
4. Data Warehouses and Data Marts
5. Knowledge Management
1. Discuss ways that common challenges in
managing data can be addressed using data
governance.
2. Discuss the advantages and disadvantages of
relational databases.
3. Define Big Data, and discuss its basic
characteristics.
4. Explain the elements necessary to successfully
implement and maintain data warehouses.
5. Describe the benefits and challenges of
implementing knowledge management systems
in organizations.
3.1 Managing Data
• Difficulties of Managing Data
• Data Governance
The Difficulties of Managing
Data
• The amount of data increases
exponentially over time
• Data are scattered throughout
organizations
• Data are generated from multiple
sources (internal, personal, external)
–Clickstream Data
• New sources of data
The Difficulties of Managing
Data (continued)
• Data Degradation
• Data Rot
• Data security, quality, and integrity
are critical
• Legal requirements change
frequently and differ among
countries & industries
Data Governance
• Master Data Management
• Master Data
3.2 The Database
Approach
• Data File
• Database Systems Minimize &
Maximize Three Things
• The Data Hierarchy
• The Relational Database Model
Figure 3.1: Database
Management System
Database Management
Systems (DBMS) Minimize:
• Data Redundancy
• Data Isolation
• Data Inconsistency
Database Management
Systems (DBMS) Maximize:
• Data Security
• Data Integrity
• Data Independence
Data Hierarchy
• Bit
• Byte
• Field
• Record
• Data File (Table)
• Database
Figure 3.2: Hierarchy of Data
for a Computer-based File
The Relational Database
Model
• Database Management System
(DBMS)
• Relational Database Model
• Data Model
• Entity
• Instance
• Attribute
The Relational Database
Model (continued)
• Primary Key
• Secondary Key
• Foreign Key
• Unstructured Data
Figure 3.3: Student
Database Example
3.3 Big Data
• Defining Big Data
• Characteristics of Big Data
• Issues with Big Data
• Managing Big Data
• Putting Big Data to Use
• Big Data Used in the Functional
Areas of the Organization
Defining Big Data
• Gartner (www.gartner.com)
• Big Data Institute
Defining Big Data: Gartner
• Diverse, high volume, high-velocity
information assets that require new
forms of processing to enable
enhanced decision making, insight
discovery, and process optimization.
Defining Big Data: The Big
Data Institute (TBDI)
• Vast Datasets that:
– Exhibit variety
– Include structured, unstructured, and semistructured data
– Generated at high velocity with an uncertain pattern
– Do not fit neatly into traditional, structured,
relational databases
– Can be captured, processed, transformed, and
analyzed in a reasonable amount of time only by
sophisticated information systems.
Big Data Generally Consist
of the Following:
• Traditional Enterprise Data
• Machine-Generated/Sensor Data
• Social Data
• Images Captured by Billions of
Devices Located Throughout the
World
Characteristics of Big Data
• Volume
• Velocity
• Variety
Issues with Big Data
• Untrusted data sources
• Big Data is dirty
• Big Data changes, especially in data
streams
Managing Big Data
• Big Data makes it possible to do
many things that were previously
impossible:
– Spot business trends more rapidly and
accurately
– tracking the spread of disease
– tracking crime
– detecting fraud
Managing Big Data
(continued)
• First Step:
– Integrate information silos into a
database environment and develop
data warehouses for decision making.
• Second Step:
– making sense of their proliferating
data.
Managing Big Data
(continued)
• Many organizations are turning to
NoSQL databases to process Big
Data
Putting Big Data to Use
• Making Big Data Available
• Enabling Organizations to Conduct
Experiments
• Micro-Segmentation of Customers
• Creating New Business Models
• Organizations Can Analyze Far More
Data
Big Data Used in the Functional
Areas of the Organization
• Human Resources
• Product Development
• Operations
• Marketing
• Government Operations
3.4 Data Warehouses and
Data Marts
• Describing Data Warehouses and
Data Marts
• A Generic Data Warehouse
Environment
Describing Data
Warehouses and Data Marts
• Organized by business dimension or
Use online analytical processing
(OLAP)
• Integrated
• Time variant
• Nonvolatile
• Multidimensional
A Generic Data Warehouse
Environment
• Source Systems
• Data Integration
• Storing the Data
• Metadata
• Data Quality
• Governance
• Users
Figure 3.4: Data Warehouse
Framework
Figure 3.5: Relational
Databases
Figure 3.6: Data Cube
Figure 3.7: Equivalence Between
Relational and Multidimensional
Databases
3.5 Knowledge
Management
• Concepts and Definitions
• Knowledge Management Systems
• The KMS Cycle
Concepts and Definitions
• Knowledge Management
• Knowledge
• Explicit and Tacit Knowledge
• Knowledge Management Systems
• The KMS Cycle
Figure 3.8: The Knowledge
Management System Cycle
CHAPTER 4
Telecommunications
and Networking
1. What Is a Computer Network?
2. Network Fundamentals
3. The Internet and the World Wide
Web
4. Network Applications: Discovery
5. Network Applications:
Communication
6. Network Applications: Collaboration
7. Network Applications: Education
1. Compare and contrast the major types
of networks.
2. Describe the wireline communications
media and transmission technologies.
3. Describe the most common methods
for accessing the Internet.
4. Explain the impact that discovery
network applications have had on
business and everyday life.
5. Explain the impact that communication
network applications have had on
business and everyday life.
6. Explain the impact that collaboration
network applications have had on
business and everyday life.
7. Explain the impact that educational
network applications have had on
business and everyday life.
Opening Case
• What to Do About Landline
Telephones?
1. Should the large carriers be able to eliminate
their POTS networks?
a) Debate this argument from the viewpoint of the
large telecommunications carriers.
b) Debate this argument from the viewpoint of rural
customers.
2. Why are wireless networks unable to take
over all of the functions of POTS networks at
this time (September 2015)?
About Business 4.1
• The Least Connected Country on Earth
1. Describe the impacts of a lack of
telecommunications infrastructure on Eritrea.
2. Besides improving the economy, what other
areas of Eritrean life would be impacted by a
greatly improved telecommunications
infrastructure?
3. Can the government of Eritrea allow an
improved telecommunications infrastructure
while maintaining strict control over
communications and information? Why or why
not? Support your answer.
4.1 What Is a Computer
Network?
• Computer Network
• Bandwidth
• Broadband
• Local Area Networks
• Wide Area Networks
• Enterprise Networks
Figure 4.1: Ethernet Local
Area Network (LAN)
Figure 4.2: Enterprise
Network
4.2 Network
Fundamentals
• Communications Media and
Channels
• Network Protocols
• Types of Network Processing
Communications Media and
Channels
• Twisted-Pair Wire
• Coaxial Cable
• Fiber Optics
Table 4.1: Advantages and Disadvantages
of Wireline Communications Channels
Communications Media:
Twisted-Pair Wire
Communications Media:
Coaxial Cable
Communications Media: Fiber
Optics
Network Protocols
• Ethernet
• Transmission Control Protocol /
Internet Protocol (TCP/IP)
Transmission Control
Protocol / Internet Protocol
• Three Basic Functions of TCP
• Packets & Packet Switching
• Four Layers of the TCP/IP Reference
Model
Three Basic Functions of
the TCP
1. Manages the movement of data
packets between computers by
establishing a connection between
the computers
2. Sequences the transfer of packets
3. Acknowledges the packets that
have been transmitted
Four Layers of the TCP/IP
Reference Model
1. Application Layer
2. Transport Layer
3. Internet Layer
4. Network Interface Layer
Figure 4.6: The Four Layers of
the TCP/IP Reference Model
Figure 4.7: Packet
Switching
Types of Network
Processing
• Client/Server Computing
• Peer-to-Peer Processing
4.3 The Internet and the
World Wide Web
• Internet (“the Net”)
• Accessing the Internet
• The Future of the Internet
• The World Wide Web
Accessing the Internet
• Connecting via an Online Service
• Connecting via Other Means
– Satellite
– Google Fiber
• Addresses on the Internet
Figure 4.9: Internet
(backbone in white)
Table 4.2: Internet
Connection Methods
Future of the Internet
• High User Demand = Reduced
Performance in the Near Future
• The Internet is unreliable and not
secure.
• Internet2
The World Wide Web
(WWW)
• World Wide Web
• Hypertext
• URL
4.4 Network Applications:
Discovery
• Search Engines and Metasearch
Engines
• Publication of Material in Foreign
Languages
• Portals
Publication of Materials in
Foreign Languages
Affinity Portals
4.5 Network Applications:
Communication
• Electronic Mail
• Web-Based Call Centers
• Electronic Chat Rooms
• Voice Communication
– Voice Over Internet Protocol (VoIP)
• Unified Communications
• Telecommuting
4.6 Network Applications:
Collaboration
• Workgroup
• Workflow
• Virtual Group (Team)
• Virtual Collaboration
• Crowdsourcing
• Electronic Teleconferencing and
Video Conferencing
Figure 4.11: Telepresence
System
About Business 4.2
• The Collaboration Environment at
Raytheon
1. Describe the use of information technologies
in Raytheon’s CAVEs.
2. What are potential disadvantages of using
CAVEs in the product design process?
4.7 Network Applications:
Educational
• E-Learning
• Distance Education
– MOOC’s
• Virtual Universities
About Business 4.3
• Massive Open Online Courses in India
1. Discuss possible quality control issues with
MOOCs in India. For each issue, explain how
you would solve the problem.
2. Discuss the possible impacts of MOOCs on
traditional higher education in India.
3. Would you be willing to enroll in a MOOC as a
full-time student at your university? Why or
why not?
4. Would you be willing to enroll in a MOOC after
you graduate? Why or why not?
CHAPTER 5
Business Analytics
1. Managers and Decision Making
2. The Business Analytics Process
3. Business Analytics Tools
4. Business Analytics Models:
Descriptive Analytics, Predictive
Analytics, and Prescriptive Analytics
1. Use a decision support framework to
demonstrate how technology supports
managerial decision making at each
phase of the decision-making process.
2. Describe each phase of the business
analytics process.
3. Describe each of the various analytics
tools and examples of their uses.
4. Provide a definition and a use case
example for descriptive analytics,
predictive analytics, and prescriptive
analytics.
Opening Case
• Rent the Runway
1. Describe the descriptive analytics applications
of Rent the Runway’s business model.
2. Describe the predictive analytics applications
of Rent the Runway’s business model.
3. Describe a possible prescriptive analytics
application for Rent the Runway.
4. What companies and industries are in danger
of being disrupted by Rent the Runway? (Hint:
Will Rent the Runway change the way that
women buy clothes?)
• Business Analytics (BA)
• Business Intelligence (BI)
• BA versus BI
5.1 Managers and
Decision Making
• The Manager’s Job and Decision
Making
• Why Managers Need IT Support
• A Framework for Computerized
Decision Analysis
The Manager’s Job and
Decision Making
• Management
• Productivity
• Three Basic
Roles of Managers
• Decision
• Four Phases
of Decision Making
Three Basic Roles of
Managers
• Interpersonal Roles
• Informational Roles
• Decisional Roles
Figure 5.1: The Process and
Phases in Decision Making
Why Managers Need IT
Support
• The number of alternatives is
constantly increasing
• Most decisions are made under time
constraints
• Increased uncertainty requires
sophisticated analyses
• Group decision making required
without incurring major expenses
A Framework for Computerized
Decision Analysis
• Problem Structure
• The Nature of Decisions
– Operational Control
– Management Control
– Strategic Planning
• Decision Matrix
Figure 5.2: Decision Support
Framework
5.2 The Business
Analytics Process
• The Scope of Business Analytics
Figure 5.3: The Business
Analytics Process
The Scope of Business
Analytics
• The Development of One or a Few
Related Analytics Applications
• The Development of Infrastructure
to Support Enterprisewide Analytics
• Support for Organizational
Transformation
About Business 5.1
• Darden Restaurants
1. What is the scope of business analytics for
each company?
2. Describe how Darden Restaurants might
employ predictive and prescriptive
analytics.
3. Describe how Twiddy & Company might
employ predictive and prescriptive
analytics.
4. Describe how Point Defiance might employ
prescriptive analytics.
5.3 Business Analytics
Tools
• Excel
• Multidimensional Analysis or Online
Analytical Processing
• Data Mining
• Decision Support Systems
Multidimensional Analysis or
Online Analytical Processing
• Online Analytical Processing
• Multi-dimensional Analysis
Data Mining
• Two Basic Data Mining Operations
– Predicting trends and behaviors
– Identifying previously unknown
patterns
Data-Mining Applications Used
in Business and Other Fields
• Retailing and Sales
• Banking
• Manufacturing & Production
• Insurance
• Policework
• Healthcare
Data-Mining Applications Used
in Business and Other Fields
• Marketing
• Politics
• Weather
• Higher Education
• Social Good
Decision Support Systems
(DSS)
• Sensitivity Analysis
• What-If Analysis
• Goal-Seeking Analysis
Analytics Models:
5.4 Business
Descriptive, Predictive, and
Prescriptive Analytics
• Descriptive Analytics
• Predictive Analytics
• Prescriptive Analytics
• Presentation Tools
About Business 5.2
• Esurance Uses Analytics to Provide
Personalized Quotes
1. Describe how Esurance’s CRE analytics
package contributes to the customer’s
experience.
2. Provide an example of a predictive analytics
application that Esurance could implement.
3. Provide an example of a prescriptive
analytics application that Esurance could
implement.
About Business 5.3
• TaKaDu’s Dashboard Helps to
Conserve Water
1. How does the TaKaDu system utilize the
Internet of Things? (Hint: See Chapter 10.)
2. Provide an example of how TaKaDu uses its
system for predictive analytics.
3. Provide an example of how TaKaDu could
use its system for prescriptive analytics.
4. Refer to Chapter 2. Is the TaKaDu system a
strategic information system for Jerusalem?
Why or why not?
About Business 5.4
• Simpa Networks Provide Solar
Energy to India’s Poor
1. Describe how Simpa Networks uses
descriptive analytics to further its mission.
2. How does predictive analytics help Simpa
Networks provide solar energy to India’s
underserved population?
3. Describe how Simpa Networks could use
prescriptive analytics to further its mission.
Predictive Analytics:
Examples…
• Drive the coupons you receive at the
grocery store register
• Website predict which ads you will
click on
• President Obama was re-elected in
2012 with the help of voter prediction
• Leading online dating companies
match compatible individuals
Predictive Analytics:
Examples (Continued)
• Automatic grading of student essays
• Wireless carriers predict customer
churn
• Insurance companies predict body
injury liability from car crashes
• Better diagnosis of breast cancer
• Predict the likelihood a convict will
offend again
Predictive Analytics:
Examples (Continued)
• Financial Service Firms produce
credit scores
• Predict sales based on which
products are purchased together
• Sentiment analysis
Presentation Tools
• Dashboards
• Geographic Information Systems
Table 5.1: The Capabilities
of Dashboards
Figure 5.3: Sample
Performance Dashboard
Figure 5.5: Bloomberg
Terminal
Figure 5.6: Management
Cockpit
CHAPTER 7
Information Security
1. Introduction to Information Security
2. Unintentional Threats to Information
Systems
3. Deliberate Threats to Information
Systems
4. What Organizations Are Doing to
Protect Information Resources
5. Information Security Controls
1. Identify the five factors that contribute
to the increasing vulnerability of
information resources and specific
examples of each factor.
2. Compare and contrast human
mistakes and social engineering, along
with specific examples of each one.
3. Discuss the 10 types of deliberate
attacks.
4. Describe the three risk mitigation
strategies and examples of each one
in the context of owning a home.
5. Identify the three major types of
controls that organizations can use
to protect their information
resources along with an example of
each one.
Opening Case
• The St. Louis Cardinals
Investigated for Hacking the
Houston Astros
1. Describe how the Cardinals apparently were
able to gain access to the Astros’ computer
system.
2. What lessons should the Astros learn from
this security breach?
7.1 Introduction to
Information Security
• Information Security
• Threat
• Exposure
• Vulnerability
• Five Key Factors Increasing
Vulnerability
• Cybercrime
Five Key Factors Increasing
Vulnerability
1. Today’s interconnected, interdependent,
wirelessly networked business environment
2. Smaller, faster, cheaper computers and
storage devices
3. Decreasing skills necessary to be a
computer hacker
4. International organized crime taking over
cybercrime
5. Lack of management support
7.2 Unintentional Threats to
Information Systems
• Human Errors
• Social Engineering
Figure 7.1
Security
Threats
Human Errors
• Higher employee levels = higher
levels of security risk
• Most Dangerous Employees
• Human Mistakes
Dangerous Employees
• Two organizational areas pose the
greatest risk
– Human Resources
– Information Systems
• Janitors and Guards Frequently
Overlooked
Human Mistakes
• Carelessness with laptops
• Carelessness with computing
devices
• Opening questionable e-mails
• Careless Internet surfing
• Poor password selection and use
• Carelessness with one’s office
Human Mistakes
(continued)
• Carelessness using unmanaged
devices
• Carelessness with discarded
equipment
• Careless monitoring of
environmental hazards
Table 7.1: Human Mistakes
Social
Engineering
• Social Engineering:
– an attack in which the perpetrator uses
social skills to trick or manipulate
legitimate employees into providing
confidential company information such
as passwords.
7.3 Deliberate Threats to
Information Systems
1. Espionage or Trespass
2. Information Extortion
3. Sabotage or Vandalism
4. Theft of Equipment or Information
5. Identity Theft
6. Compromises to Intellectual
Property
Threats to
7.3 Deliberate
Information Systems
(continued)
7. Software Attacks
8. Alien Software
9. Supervisory Control and Data
Acquisition Attacks
10. Cyberterrorism and Cyberwarfare
6. Compromises to
Intellectual Property
• Intellectual Property
• Trade Secret
• Patent
• Copyright
7. Software Attacks: Three
Categories
1. Remote Attacks Requiring User
Action
– Virus
– Worm
– Phishing Attack
– Spear Phishing
7. Software Attacks: Three
Categories (continued)
2. Remote Attacks Needing No User
Action
– Denial-of-Service Attack
– Distributed Denial-of-Service Attack
7. Software Attacks: Three
Categories (continued)
3. Attacks by a Programmer
Developing a System
– Trojan Horse
– Back Door
– Logic bomb
ABOUT BUSINESS 7.1
• Ransomeware
1. Why is ransomware more than a nuisance?
2. Are your digital files adequately backed up?
Why or why not?
8. Alien Software
• Adware
• Spyware
• Spamware
• Spam
• Cookies
Organizations Are
7.4 What
Doing to Protect Information
Resources
• Risk
• Risk Management
• Risk Analysis
• Risk Mitigation
Table 7.3: The Difficulties in
Protecting Information Resources
ABOUT BUSINESS 7.2
• Catching a Hacker
1. Why did the FBI need to “argue with law
enforcement officials in various countries”?
2. Describe the diff iculties that investigators
encounter in bringing cybercriminals to
justice. Can you propose any additional
strategies they should consider?
Risk Management
Three Processes of Risk Management:
1. risk analysis
2. risk mitigation
3. controls evaluation
Risk Analysis
Three Steps of Risk Analysis
1. assessing the value of each asset
being protected
2. estimating the probability that each
asset will be compromised
3. comparing the probable costs of the
asset’s being compromised with the
costs of protecting that asset
Risk Mitigation
• Risk Acceptance
• Rick Limitation
• Risk Transference
7.5 Information Security
Controls
• Physical Controls
• Access Controls
• Communications Controls
• Business Continuity Planning
• Information Systems Auditing
Figure 7.2: Where Defense
Mechanisms are Located.
Physical Controls
• Walls
• Doors
• Fencing
• Gates
• Locks
• Badges
• Guards
• Alarm Systems
Access Controls
• Authentication
• Authorization
– Something the user is (Biometrics)
– Something the user has
– Something the user does
– Something the user knows
ABOUT BUSINESS 7.3
• Trustev: Helping to Prevent Credit
Card Fraud
1. Describe how Trustev’s authentication
method differs from other authentication
methods.
2. What are potential disadvantages with
Trustev’s authentication method?
Communications Controls
• Firewall
– Demilitarized Zone (DMZ)
• Anti-malware Systems
• Whitelisting
• Blacklisting
• Encryption
• Virtual Private Network (VPN)
Communications Controls
(Continued)
• Transport Layer Security (formerly
called Secure Socket Layer)
• Employee Monitoring Systems
Figure 7.3: (a) Basic Firewall for Home
Computer. (b) Organization with Two
Firewalls and Demilitarized Zone
Figure 7.4: How Public-key
Encryption Works
Figure 7.5: How Digital
Certificates Work.
Figure 7.6: Virtual Private
Network (VPN) and Tunneling
Business Continuity
Planning
• Business Continuity
• Business Continuity Plan
Information Systems
Auditing
• Internal Audits
• External Audits
• Three Categories of IS auditing
procedures
Three Categories of IS
auditing procedures:
• Auditing Around the Computer
• Auditing Through the Computer
• Auditing With the Computer
CHAPTER10
Wireless, Mobile
Computing, and Mobile
Commerce
1. Wireless Technologies
2. Wireless Computer Networks and
Internet Access
3. Mobile Computing and Mobile
Commerce
4. The Internet of Things
1. Identify advantages and disadvantages
of each of the four main types of
wireless transmission media.
2. Explain how businesses can use shortrange, medium-range, and long-range
wireless networks.
3. Provide a specific example of how each
of the five major m-commerce
applications can benefit a business.
4. Describe the Internet of Things,
along with examples of how
organizations can utilize the Internet
of Things.
Opening Case
• Google’s Project Fi
1. Describe how Google’s Project Fi works.
2. Assume that you are the CEO of Verizon
Wireless (www.verizonwireless.com). How
would you compete with Project Fi?
10. Wireless Technologies
1
• Wireless Devices
– Dematerialization
• Wireless Transmission Media
• Wireless Security
Wireless Devices
Wireless Devices Provide Three Major
Advantages:
1. Small enough to easily carry or wear
2. Sufficient computing power to
perform productive tasks.
3. Can communicate wirelessly with the
Internet and other devices.
Figure 10.1: Dematerialization
with Smartphones
ABOUT BUSINESS 10.1
• Smartphones Drive Growth of
Electronic Commerce in Vietnam
1. Discuss the impact of wireless
communications technologies on the growth
of electronic commerce in Vietnam.
2. Describe the advantages of wireless
connections over landline connections.
3. Discuss the implications of Vietnam
“skipping” wireline communications by
moving directly to wireless communications.
Wireless Transmission
Media
• Microwave
• Satellite
– Types of Orbits
– Global Positioning Systems
– Radio
Wireless Transmission
Media: Microwave
• Advantages of Microware
– High bandwidth
– Relatively inexpensive
• Disadvantages of Microwave
– Must have unobstructed line of sight
– Susceptible to environmental
– interference
Wireless Transmission
Media: Satellite
• Advantages of Satellite
– High bandwidth
– Large coverage area
• Disadvantages of Satellite
– Expensive
– Must have unobstructed line of sight
– Signals experience propagation delay
– Must use encryption for security
Table 10.1 Advantages &
Disadvantages of Wireless Media
Satellites
• Three Types of Satellites Circling Earth
1. Geostationary-Earth-Orbit (GEO)
2. Medium-Earth-Orbit (MEO)
3. Low-Earth-Orbit (LEO)
• Footprint
• Propagation Delay
• Internet over Satellite (IoS)
Table 10.2: Three Basic Types of
Telecommunications Satellites
Satellites: GeostationaryEarth-Orbit (GEO)
• 22,300 miles above earth
• Stationary relative to a point on Earth
• Transmission delay (.25 seconds)
• Longest orbital life (many years)
• Few Needed for Global Coverage
• Used for Television Signals
• Most Expensive to Build and Launch
Satellites: Medium-EarthOrbit (MEO)
• 6,434 miles above earth
• Satellites moves relative to a point on Earth
• Negligible transmission delay
• Moderate orbital life (6-12 years)
• Moderate number needed for global
coverage
• Used for Global Positioning Systems
• Less Expensive to Build and Launch
Satellites: Low-Earth-Orbit
(LEO)
• 400-700 miles above earth
• Move rapidly in relation to a point on
Earth
• Negligible transmission delay
• Shortest orbital life (low as 5 years)
• Large Number Needed for Global
Coverage
• Least Expensive to Build and Launch
Figure 10.3: Obtaining GPS
Information in an Automobile
ABOUT BUSINESS 10.2
• Digital Pricing Displays
1. Why are brick-and-mortar retailers
beginning to implement digital pricing
displays?
2. What are possible disadvantages to digital
pricing displays?
Wireless Transmission
Media: Radio
• Advantages of Radio
– High bandwidth
– Signals pass through walls
– Inexpensive and easy to install
• Disadvantages of Radio
– Creates electrical interference problems
– Susceptible to snooping unless encrypted
Wireless Security
• Four Major Challenges to Wireless
Networks:
– Rogue Access
• Evil Twin Attack
• Hotspotter
– War Driving
– Eavesdropping
– Radio-Frequency (RF) Jamming
Computer Networks
10. Wireless
and Internet Access
2
• Short-Range Wireless Networks
• Medium-Range Wireless Networks
• Wide-Area Wireless Networks
Short-Range Wireless
Networks
• Bluetooth
– Bluetooth 1.0
– Bluetooth 4.0
– Personal Area Network
• Ultra-Wideband
• Near-Field Communications
Medium-Range Wireless
Networks
• Wireless Fidelity (Wi-Fi)
• Wireless Mesh Networks
Figure 10.4: Wireless Access
Point
Wireless Fidelity (Wi-Fi)
• Wireless Access Point
• Hotspot
• IEEE Wi-Fi Standards
• Major Benefits of Wi-Fi
• Wi-Fi Direct
• MiFi
• Super Wi-Fi
IEEE Wi-Fi Standards
• Institute of Electrical and Electronics
Engineers (IEEE) WiFI Standards
• 802.11a
• 802.11b
• 802.11g
• 802.11n
• 802.11ac
• 802.11 ad
Figure 10.5: Smartphone and
GPS System
ABOUT BUSINESS 10.3
• Wi-Fi Network Provides Advantages
to a Belgian Theme Park
1. Describe the advantages of the Wi-Fi
network to Bobbejaanland Family Park.
2. Describe potential disadvantages of the WiFi network to Bobbejaanland Family Park.
Major Benefits of Wi-Fi
• Low cost
• Ability to provide simple Internet
access
Three Factors Preventing
Commercial Wi-Fi Market from
Expanding:
• Roaming
• Security
• Cost
Wide-Area Wireless
Networks
• Cellular Radio
• Generations of Cellular Technology
Evolution
• Wireless Broadband or WiMAX
Figure 10.5: Smart Phone &
GPS system
Generations of Cellular
Technology Evolution
• (1G) First generation
• (2G) Second generation
• 2.5G
• (3G) Third generation
• (4G) Fourth generation
• (5G) Fifth generation
Wireless Broadband or
WiMAX
• Worldwide Interoperability for
Microwave Access (WiMAX)
• WiMAX = IEEE Standard 802.16
• Wireless access range of up to 31 miles
• Data transfer rate of up to 75 Mbps
• A secure system offering voice and
video
10. Mobile Computing and
Mobile Commerce
3
• Mobile Computing
– Mobility
– Broad Reach
• Mobile Commerce
• Mobile Commerce Applications
Mobility and Broad Reach
Mobility and Broad Reach Create
Five Value-added Attributes:
1. Ubiquity
2. Convenience
3. Instant connectivity
4. Personalization
5. Localization of products and services
Mobile Commerce
Development of M-Commerce is
Driven by:
– Widespread availability of mobile
devices
– Declining prices
– Bandwidth improvement
Mobile Commerce
Applications
• Mobile Wallets
• Location-Based Applications and Services
• Mobile Advertising
• Financial Services
• Intrabusiness Applications
• Accessing Information
– Mobile Portal
– Voice Portal
• Telemetry Applications
Mobile Wallets
• Softcard
• Google Wallet
• Android Pay
• MasterCard’s Contactless, American
Express’s ExpressPay, and Visa’s
PayWave
• Apple Pay
Location-Based Applications
and Services
• Location-Based Commerce
(L-Commerce)
• Benefits of Location-Based Services
for Users
• Benefits of Location-Based Services
for Service Providers
Benefits of Location-Based
Services for Users:
• Request the nearest business or
service
• Receive alerts
• Find a friend
• Locating taxis, service personnel,
doctors, and rental equipment
Benefits of Location-Based
Services for Service Providers
• Schedule fleets
• Tracking objects such as packages
and train boxcars
• Find information such as navigation,
weather, traffic, and room schedules
• Targeting advertising
• Automating airport check-ins
ABOUT BUSINESS 10.4
• Mobile Advertising in Rural India
1. Why is it so important to adapt business
strategies to existing technologies? Provide
examples from this case in your answer.
2. Describe the impacts of wireless
technologies on various companies’
marketing campaigns in India.
3. Discuss the limitations that “basic” cell
phones can place on marketing campaigns.
Mobile Commerce Applications:
Financial Services
• Banking
• Micropayments
• Money Transfers
• Wireless Mobile Wallets (M-Wallets)
• Bill Payment Services
Intrabusiness Applications
Mobile Computing For Employee
Support:
• Workflow Applications
• Dispatch Functions
Accessing Information
• Mobile Portals
• Voice Portals
Mobile Computing
Applications: Telemetry
• Identify maintenance problems in
equipment
• Monitor medical patients
• Control medical equipment remotely
• Remote vehicle diagnosis &
preventive maintenance
• Find My iPhone
10. The Internet of Things
4
• Wireless Sensor Networks
• Radio-Frequency Identification
(RFID)
• Examples of the Internet of Things
in Use
Radio-Frequency
Identification (RFID)
• RFID
• Bar Codes
• QR Codes
Bar Codes
Limitations of Bar Codes:
• Requires line of sight from scanning device
• Pose substantial problems in
manufacturing plants, warehouses and
shipping/receiving docks
• Paper bar codes are easily damaged
• Identifies the manufacturer and product
but not the actual item
QR Codes:
Advantages Over Bar Codes
• Store more information
• Data types stored include numbers,
text, URLs, and even Japanese
characters.
• Smaller because they store information
both horizontally and vertically.
• Read from any direction or angle
• More resistant to damage
RFID
• RFID Systems
• Two Basic Types of RFID Tags
– Active RFID Tags
– Passive RFID Tags
The Internet of Things (IoT)
• Capabilities of IoT
• Examples of IoT Use
Capabilities of IoT
• Reducing waste, loss, and cost
• Identifying the need for repair,
replacement, or recall
• Tracking expiration data on
perishable items
Examples of IoT Use
• Smart Home
• Healthcare
• Automotive
• Supply Chain Management
• Environmental Monitoring
• Energy Management
• Agriculture
• Transportation
ABOUT BUSINESS 10.5
• The Internet of Things Improves
FedEx’s Dock Operations
1. Describe the problems faced by FedEx that
led to the company’s decision to implement
the EDEN system.
2. Discuss the advantages of the EDEN
system.
3. Discuss potential disadvantages of the EDEN
system.
CHAPTER11
Information Systems
within the Organization
1. Transaction Processing Systems
2. Functional Area Information Systems
3. Enterprise Resource Planning (ERP)
Systems
4. ERP Support for Business Processes
1. Explain the purpose of transaction
processing systems.
2. Explain the types of support that
information systems can provide for
each functional area of the
organization.
3. Identify advantages and drawbacks to
businesses implementing an
enterprise resource planning system.
4. Describe the three main business
processes supported by ERP
systems.
Opening Case
• The Lion King Continues Its Box
Office Dominance
1. Why are yield management systems so
important to the producers of Broadway
shows? (Hint: What is the value of an unsold
seat once the curtain goes up?)
2. Describe potential disadvantages of Disney’s
yield management system.
11. Transaction Processing
Systems
1
• Transaction
• Transaction Processing System
(TPS)
• Batch Processing
• Online Transaction Processing
(OLTP)
Figure 11.1: How TPS
Manage Data
11. Functional Area
Information Systems
2
• IS for Accounting and Finance
• IS for Marketing
• IS for Production/Operations
Management
• IS for Human Resource
Management
• Reports
IS for Accounting and
Finance
• Financial Planning and Budgeting
• Managing Financial Transactions
• Investment Management
• Control and Auditing
Financial Planning and
Budgeting
• Financial and economic forecasting
• Budgeting
Managing Financial
Transactions
• Global stock exchanges
• Managing multiple currencies
• Virtual close
• Expense management automation
(EMA)
Control and Auditing
• Budgetary control
• Auditing
• Financial ratio analysis
IS for Production/Operations
Management (POM)
• In-House Logistics and Materials
Management
• Inventory Management
• Quality Control
• Planning Production and Operations
Management
• Computer-Integrated Manufacturing
• Product Lifecycle Management
IS for Human Resource
Management
• Recruitment
• Human Resources Development
• Human Resources Planning and
Management
Three Areas of IT support in HR
Planning and Management
1. Payroll and employees’ records
2. Benefits administration
3. Employee relationship
management
Figure 11.2: Systems
supporting functional Areas
Reports
• Routine Reports
• Ad-hoc (On-Demand) Reports
– Drill-down reports
– Key indicator reports
– Comparative reports
– Exception reports
Monthly Sales Report
11. Enterprise Resource
Planning (ERP) Systems
3
• ERP II Systems
• Benefits and Limitations of ERP
Systems
• Implementing ERP Systems
• Enterprise Application Integration
ABOUT BUSINESS 11.1
• The Army Transitions from Legacy
Systems to Enterprise Resource
Planning Tools
1. Why do you think the U.S. Army’s legacy
systems were not as useful today as they
were when they were developed?
2. How does this military example parallel
large businesses like Sears and Walmart
that have had to maintain their own legacy
systems?
Core ERP
Modules
ERP II
SYSTEM
Manufacturi
ng
Accountin
g and
Financial
Module
&
Production
Module
Human
Resources
Module
Suppliers
Supply
Chain
Managem
ent
Module
ERP
Platform
&
Database
Business
Intelligenc
e
Module
Customers
Customer
Relationsh
ip
Manageme
nt Module
E-Business
Module
Extended ERP Modules
ERP Systems: Benefits
• Organizational Flexibility and Agility
• Decision Support
• Quality and Efficiency
ERP Systems: Limitations
• Business Processes Predefined by
Best Practices
• Difficult to Implement
• Potential for Failure
Major Causes of ERP
Implementation Failure
• Failure to involve affected
employees in planning and
development
• Attempting too much too fast
• Insufficient training
• Failure to perform proper data
conversion and testing
Implementing ERP Systems
• On-Premise ERP Implementation
• Software-as-a-Service (SaaS) ERP
Implementation
On-Premise ERP
Implementation
• Vanilla Approach
• Custom Approach
• Best of Breed Approach
11. ERP Support for
Business Processes
4
• The Procurement, Fulfillment, and
Production Processes
• Interorganizational Processes: ERP
with SCM and CRM
The Procurement, Fulfillment,
and Production Processes
• Procurement Process
• Order Fulfillment Process
• Production Process
Figure 11.4: Departments &
Documents Flow in Procurement
Figure 11.5: Departments &
Documents Flow in Fulfillment
Figure 11.6: Departments &
Documents Flow in Production
Figure 11.7: Integrated
Processes with ERP Systems
Interorganizational Processes:
ERP with SCM and CRM
• Enterprise Resource Planning (ERP)
Supply Chain Management (SCM)
Systems
• Enterprise Resource Planning (ERP)
Customer Relationship Management
(CRM) Systems
CHAPTER12
Customer Relationship
Management
1. Defining Customer Relationship
Management
2. Operational Customer Relationship
Management
3. Other Types of Customer
Relationship Management Systems
1. Identify the primary functions of both
customer relationship management (CRM)
and collaborative CRM strategies.
2. Describe how businesses might utilize
applications of each of the two major
components of operational CRM systems.
3. Explain the advantages and disadvantages
of mobile CRM systems, on-demand CRM
systems, open-source CRM systems, social
CRM systems, and real-time CRM systems.
Opening Case
• Do Persuasive Technologies Go
Too Far?
1. Discuss the advantages and disadvantages of
persuasive technologies to companies.
2. Discuss the advantages and disadvantages of
persuasive technologies to consumers.
3. Debate the ethical nature of persuasive
technologies. (Hint: Refer to Chapter 6 for
ethical frameworks.)
4. Do persuasive technologies take customer
relationship management too far? Why or why
not? Support your answer.
12. Defining Customer
Relationship Management
1
• Customer Touch Points
• Data Consolidation
Figure 12.1: CRM Process
Figure 12.2: Customer
Touchpoints
ABOUT BUSINESS 12.1
• Location-Based Systems in
Customer Relationship Management
1. Describe the advantages
that Amazon has over bricks-and-mortar
retailers.
2. Describe the many facets of Amazon’s
relentless focus on customer relationship
management.
Customer
12. Operational
Relationship Management
System
2
• Customer-Facing Applications
• Customer-Touching Applications
Customer Facing
Applications
• Customer Service and Support
• Sales Force Automation
• Marketing
• Campaign Management
Customer Facing Applications:
Customer Service & Support
• Customer Interaction Centers (CIC)
• Call Center
• Oubound Telesales
• Inbound Teleservice
• Information Help Desk
• Live Chat
ABOUT BUSINESS 12.2
• Priceline.com’s New Customer
Contact Center
1. Discuss the reasons why Priceline needed a
new customer contact center.
2. Describe the benefits of the KANA solution
to customers and to Priceline.
Customer Facing Applications:
Sales Force Automation
• Contact Management System
• Sales Lead Tracking System
• Sales Forecasting System
• Product Knowledge System
• Configurator
Customer Facing
Applications: Marketing
• Data Mining
• Cross-Selling
• Upselling
• Bundling
Customer Facing Applications:
Campaign Management
• Campaign Planning
– Right messages
– Right people
– Right channels
– Marketing communications opt-out
Customer Touching
Applications
• Search & Comparison Capabilities
• Technical and Other Information and
Services
• Customized Products and Services
• Mass Customization
• Personalized Web Pages
• Frequently Asked Questions (FAQs)
• E-mail and Automated Response
• Loyalty Programs
Figure 12.3: Relationship Between
Operational CRM & Analytical CRM
Types of Customer
12. Other
Relationship Management
Systems
3
• On-Demand CRM Systems
• Mobile CRM Systems
• Open-Source CRM Systems
• Social CRM
• Real-Time CRM
Open-Source CRM Systems
• Benefits of Open-Source CRM
Systems
• Disadvantages of Open-Source CRM
Systems
• Examples
Open-Source CRM Systems:
Benefits
• Favorable pricing
• Wide variety of applications
• Easy to customize
• Updates and bug (software error)
fixes rapidly distributed
• Extensive support information
available for free
Open-Source CRM Systems:
Disadvantages
• Risk related to quality control
• Company’s IT platform must match
development platform of opensource CRM system
Open-Source CRM Systems:
Examples
• SugarCRM
– (www.sugarcrm.com)
• Concursive
– (www.concursive.com)
• Vtiger
– (www.vtiger.com)
Social CRM
• Provides two-way communication
between organization & customers
• Organizations monitor social media
sites and respond accordingly
• Customers obtain faster, better
customer service
ABOUT BUSINESS 12.3
• Morton’s Steakhouse Surprises a
Customer
1. Explain how Morton’s monitoring of social
media illustrates how CRM is reviving
personal marketing.
2. Do you see any disadvantages in such close
monitoring of social media? Provide specific
examples to support your answer.
CHAPTER13
Supply Chain
Management
1. Supply Chains
2. Supply Chain Management
3. Information Technology Support for
Supply Chain Management
1. Describe the three components and
the three flows of a supply chain.
2. Identify popular strategies to solving
different challenges of supply
chains.
3. Explain the utility of each of the
three major technologies that
support supply chain management.
13. Supply Chains
1
• Supply Chain
• Supply Chain Visibility
The Structure and Components
of Supply Chains
• Three Segments of the Supply
Chain
• Tiers of Suppliers
• The Flows of the Supply Chain
Three Segments of the
Supply Chain
• Upstream
• Internal
• Downstream
Three Flows of the Supply
Chain
1. Material Flows
– Reverse Flows
2. Information Flows
3. Financial Flows
13. Supply Chain
Management (SCM)
2
• Five Basic Components of SCM
• Supply Chain Management Systems
• The Push Model Versus the Pull
Model
• Problems Along the Supply Chain
• Solutions to Supply Chain Problems
Five Basic Components of
SCM
1. Plan
2. Source
3. Make
4. Deliver
5. Return
The Push Model Versus the Pull Model
Problems Along the Supply
Chain
Two Primary Sources of Problems
Along the Supply Chain:
1. Uncertainties
2. The need to coordinate multiple
activities, internal units, and business
partners.
• Demand Forecast
• Bullwhip Effect
Figure 13.2: The Bullwhip
Effect
Solutions to Supply Chain
Problems
Using Inventories to Solve Supply
Chain Problems
– Vertical Integration
– Just-In-Time Inventory
– Information Sharing
– Vendor-Managed Inventory (VMI)
13. IT Support for Supply
Chain Management
3
• Electronic Data Interchange (EDI)
• Extranets
• Portals and Exchanges
Electronic Data Interchange
(EDI): Benefits
• Minimizes data entry errors
• Length of the message can be shorter
• Messages are secured
• Reduces cycle time
• Increases productivity
• Enhances customer service
• Minimizes paper usage and storage
Electronic Data Interchange
(EDI): Disadvantages
• Business processes sometimes must
be restructured to fit EDI
requirements
• Many EDI standards in use today
Figure 13.3: Purchase Order
Fulfillment without EDI
Figure 13.3: Purchase Order
Fulfillment with EDI
Extranet
• A Company and Its Dealers,
Customers, or Suppliers
• Industry Extranet
• Joint Ventures and Other Business
Partnerships
Figure 13.4: The Structure of
an Extranet
Portals and Exchanges
• Procurement Portal
• Distribution Portal
Saudi Electronic University
College of Administrative and Financial Sciences
E-commerce Department
Student Name:
Student ID:
Course Title: Management Information Course Code: MIS201
System
Academic Year/ Semester:
CRN:
Instructor Name:
Student Grade:
Grade Level:
Low/ Middle / High
Saudi Electronic University
College of Administrative and Financial Sciences
Assignment of MIS201- Management Information System
MIS201 – Project
Second Semester 2024-2025
Submission
Part 1
Part 2
Part 3
Submission: Week 6 Saturday 01/03/2025
Submission: Week 12Saturday 26/04/2025
Submission: Instructors will manage the date and time for presentation during week 13
40 Marks
Assignment Details
The project involves studying the IT infrastructure of a relevant information system (IS)/
information technology (IT) used by selecting any organization of your choice locally or
internationally
The idea is to investigate the selected organization using the main components of IT
(Hardware, software, services, data management and networking). Infrastructure
Investigation, which is in a selected industry, should be carried out by using articles,
websites, books and journal papers and /or interviews. In the report, you are expected to
discuss:
Project Report Structure: Part 1
Submission: Week 6 Saturday 01/03/2025
Marks: 17 Marks
1. Cover Page (1 Mark).
This must contain topic title (0.25), student names and Students ID (0.5), section number and course
name (0.25).
(You can find the cover page in the blackboard)
2. Table of Contents (0.5 Mark).
Make sure the table of contents contains and corresponds to the headings in the text, figures, and
tables.
3. Executive Summary (2.5 Marks).
What does the assignment about (1), The name and field of the chosen company (0.5), and briefly
explain the distinct features (1).
4. Organizational Profile (3 Marks).
Brief background of the business including organization details (1), purpose (1), and organizational
structure (1).
5. Strategies (4 Marks).
Discuss different types of strategies for competitive advantages (2), and then select and discuss the
most appropriate strategies to improve the performance of the organization (2).
(You can discuss any points that you learned in this course and its related to your selected organization)
6. Technology Involved (3 Marks).
How is the organization set up in terms of its IT infrastructure? Discuss the hardware (0.5), software
(0.5), telecommunication (0.5), information security (0.5), networks (0.5), and other elements (0,5).
(You can discuss any points that you learned in this course, and it’s related to your selected
organization)
7. Data Management (2 Marks).
Discuss the methods the organization uses to manage and process data (1), and then give one
advantage and one disadvantage of these methods (1).
(You can discuss any points that you learned in this course (chapter 3) and link it to your selected
organization)
8. Identify the Stakeholders (1 Mark)
Who are the main individuals, groups, or departments affected by the information system?
(You can choose any stakeholder who has a major influence on the IS or vice versa. You can choose 1
stakeholder to discuss)
Project Report Structure: Part 2
Submission: Week 12 Saturday 26/04/2025
Marks: 13 Marks
9. Analysis of Existing System (5 Marks).
Analyze the key problems of the existing system used by the company (2). Also, discuss the
Information Systems used within the company (3) for example:
•
•
•
•
•
Transaction processing systems (TPS)
Enterprise Resource Planning (ERP) Systems
Functional Area Information Systems
Business intelligence
DSS
(You can discuss any points that you learned in this course and it’s related to your selected organization)
10. System Evaluation (2 Marks).
Evaluate the current system that the company use (your chosen company) with one of the following
options (1):
•
•
•
Success
Partial failure/partial success
Total failure
Then, State the reasons for your choice (1)
11. Suggestions for the company (3 Marks)
Design or choose a system to help the company solve its main problems. State the following:
•
•
•
The new system name (1)
Its features (1)
Problems that will be solved (1)
(If the system that the company uses is successful and does not need to be changed, you can
mention that (1), mention its features (1), and mention the problems that it solved or prevented
from happening (1).)
(You can discuss any points that you learned in this course and it’s related to your selected organization)
12. Conclusion (2 Marks).
Summarize your report (including part 1)
13. References (1 Mark).
Use APA referencing style format
Project Presentation: Part 3
Submission: Instructors will manage the date and time for presentation during week 13
Marks: 10 Marks
Make a power-point presentation of your Project work mentioning all the above contents and
present in a group (All team members must participate( (1). There must be minimum 10 slides
in the presentation with a good background design (0.5), readable font size and style with an
appropriate color (0.5).
Presentation must have the following format:
•
First slide: Group members name and Student id & Title of the Project (1)
•
Company Profile (1)
•
Strategies (1)
•
Technology Involved and Data Management (1)
•
Analysis of Existing System (1)
•
Evaluation and suggestions (1)
•
Conclusion (1)
•
References (1)
Guidelines for the assignment:
✓ Make sure to include the cover page with all information required. One mark will be deducted if
there is no cover page
✓ This is a group project (4-5 students), which is part of your course score. It requires effort, research,
and critical thinking.
✓ Use font Times New Roman, 12 font sizes
✓ Use 1.5 line spacing with adjust to all paragraphs (alignment).
✓ Use the footer function to insert page number.
✓ Ensure that you follow the APA style in your project and references.
✓ The minimum number of required references is 3 for each part (1 and 2).
✓ Your project report length Part 1 should be between 1500 to 2200 words & Part 2 should be
between 1000 to 2000 words.
✓ You must check the spelling and grammar mistakes before submitting the assignment.
✓ Up to 20% of the total grade will be deducted for providing a poor structure of assignment
(Structure includes these elements paper style, free of spelling and grammar mistakes, referencing
and word count).
✓ Assignment must be in Word format only NO PDF
✓ Your file should be saved as Word doc [Example]: [Your Name] [CRN] MIS201 – Project Assignment
Part 1.doc
Useful links:
✓
✓ APA reference system
✓ About plagiarism
✓ About plagiarism
Purchase answer to see full
attachment