Hello there! Want a discount? Grab 5% OFFon your first order!
Hello there! Want a discount? Grab 5% OFF on your first order!

Description

Description

I want to solve all parts 1, 2, and the presentation. I want a separate file for each part I want to solve all parts 1, 2, and the presentation.

The project talks about Samsung ،، please no coping 🙏

CHAPTER 1

Introduction to
Information Systems

1. Why Should I Study Information
Systems?
2. Overview of Computer-Based
Information Systems
3. How Does IT Impact Organizations?
4. Importance of Information Systems
to Society

1. Identify the reasons why being an informed
user of information systems is important in
today’s world.
2. Describe the various types of computer-based
information systems in an organization.
3. Discuss ways in which information technology
can affect managers and non-managerial
workers.
4. Identify positive and negative societal effects
of the increased use of information technology.

1.1 Why Should I Study

Information Systems

• The Informed User – You!
• IT Offers Career Opportunities
• Managing Information Resources

Reasons Why You Should
Be An Informed User…
1. You will benefit more from your
organization’s IT applications because
you will understand what is “behind”
those applications.
2. Your input can enhance your
organization’s IT applications.
3. As you enter the workforce you can
assist in selecting the IT applications
your organization will use.

Reasons Why You Should Be An
Informed User (con’t)…
4. You will aware of both new information
technologies and rapid developments in
existing technologies.
5. You will understand how using IT can
improve your organization’s
performance.
6. If you are entrepreneurial minded, you
can use IT to start your own business.

IT Offers Career
Opportunities
• Chief Information Officer (CIO)
• Substantial Demand for IT Staff
– Programmers
– Business Analysts
– System Analysts
– Designers

• $130,000 is the median salary in 2015
for IS Managers (US Dept of Labor)

IT Skills Open Many Doors
Because IT Is So Widely Used

Managing Information
Resources
• Managing information systems (IS)
is difficult and complex
• Contributing Factors:
– Strategic value of IS’s
– Acquiring, operating, and maintaining
IS’s is very expensive
– Evolution of the IS Function

1.2 Overview of

Computer-Based IS’s

• Data – Information – Knowledge
• Computer-Based Information
System (CBIS)
• Types of Computer-Based
Information Systems (CBIS)

Data – Information –
Knowledge

Data versus Information
versus Knowledge

Components of a CBIS
• Hardware
• Software
• Database
• Network
• Procedures
• People

Computer-Based
Information Systems (CBIS)

Types of Computer Based
Information Systems (CBIS)
• Breadth of Support for Information
Systems (IS)
• Support for Organizational
Employees

Breadth of Support for
Information Systems (IS)
• Functional Area Information Systems
(FAIS)
• Enterprise Resource Planning Systems
(ERP)
• Transaction Processing Systems (TPS)
• Interorganizational Information Systems
(IOS)
• E-Commerce Systems

Major Capabilities of Information
Systems
(Table 1.3)
• Perform high-speed, high-volume numerical computations.
• Provide fast, accurate communication and collaboration
within and among organizations.
• Store huge amounts of information in an easy-to-access,
yet small space.
• Allow quick and inexpensive access to vast amounts of
information, worldwide.
• Analyze and interpret vast amounts of data quickly and
efficiently.
• Automate both semiautomatic business processes and
manual tasks.

Figure 1.5: IS that function
among multiple organizations

Support for Organizational
Employees
• Knowledge Workers
• Office Automation Systems (OASs)
• Business Intelligence (BI) Systems
• Expert Systems (ES)
• Dashboards

Types of Organizational
Information Systems (Table 1.4)

1.3 How Does IT Impact
Organizations?

• IT Impacts Entire Industries
• IT Reduces the Number of Middle
Managers
• IT Change’s the Manager’s Job
• Will IT Eliminate Jobs?
• IT Impacts Employees at Work

IT Impacts Entire Industries
• Book Industry
• Music Industry
• Video Industry
• Software Industry
• Videogame Industry
• Photography Industry
• Marketing Industry

IT Impacts Entire Industries
(Continued)
• Recruiting Industry
• Financial Services Industry
• Motion Picture Industry
• Automotive Industry
• Agriculture Industry
• National Defense Industry
• Fashion Industry

IT Impacts Entire Industries
(Continued)
• Education
• Legal Profession

IT Impacts Employees at
Work
• IT Impacts Employees’ Health and
Safety
• IT Provides Opportunities for People
with Disabilities

Figure 1.6: Ergonomic products
protect computer users.

1.4 Importance of IS to
Society

• IT Affects Our Quality of Life
• The Robot Revolution is Here Now
• Improvements in Healthcare

CHAPTER 2

Organizational Strategy,
Competitive Advantage,
and Information Systems

1. Business Pressures, Organizational
Responses, and Information
Technology Support
2. Competitive Advantage and
Strategic Information Systems

1. Identify effective IT responses to
different kinds of business
pressures.
2. Describe the strategies that
organizations typically adopt to
counter Porter’s five competitive
forces.

Pressures,
2.1 Business
Organizational Responses,
and IT Support

• Business Pressures
• Organizational Responses

Business Pressures
• Market Pressures
• Technology Pressures
• Societal/Political/Legal Pressures

Figure 2.1: Business Pressures,
Organizational Performance & Responses,
and IT Support

Market Pressures
• Globalization
• Changing Nature of the Workforce
• Powerful Customers

Technology Pressures
• Technological Innovation and
Obsolescence
• Information Overload

Societal/Political/Legal
Pressures
• Social Responsibility
• Compliance with Government
Regulations
• Protection Against Terrorist Attacks
• Ethical Issues

Social Responsibility
• IT Assists “Go Green” Efforts in
Three Areas:
1. Facilities design and management
2. Carbon management
3. International and U.S. environmental
laws

• Digital Divide

Organizational Responses
• Strategic Systems
• Customer Focus
• Make-to-Order and Mass
Customization
• E-Business and E-Commerce

2.2 Competitive Advantage
and Strategic IS’s

• Porter’s Competitive Forces Model
• Porter’s Value Chain Model
• Strategies for Competitive
Advantage
• Business – Information Technology
Alignment

Porter’s Five Forces Model
1. The threat of new competitors
2. The bargaining power of suppliers
3. The bargaining power of customers
(buyers)
4. The threat of substitute products or
services
5. The rivalry among existing firms in
the industry

Figure 2.2: Porter’s
Competitive Forces Model

Porter’s Value Chain Model
• Value Chain
• Two Categories of Organization
Activities in the Value Chain
– Primary Activities
– Support Activities

Figure 2.3: Porter’s Value
Chain Model

Primary Activities
• Inbound logistics
• Operations
• Outbound logistics
• Marketing and sales
• Services

Support Activities
• The Firm’s Infrastructure
• Human Resources Management
• Product and Technology
Development
• Procurement

Strategies for Competitive
Advantage
1. Cost leadership strategy
2. Differentiation strategy
3. Innovation strategy
4. Organizational effectiveness
strategy
5. Customer orientation strategy

Figure 2.4: Strategies for
Competitive Advantage

Business-Information
Technology Alignment
• Business–Information Technology
Alignment
• Six Characteristics of Excellent
Business-IT Alignment:

Six Characteristics of Excellent
Business-IT Alignment
1. Organizations view IT as an engine of
innovation that continually transforms the
business, often creating new revenue
streams.
2. Organizations view their internal & external
customers & their customer service function
as supremely important.
3. Organizations rotate business & IT
professionals across departments and job
functions.

Six Characteristics of Excellent
Business-IT Alignment (continued)
4. Organizations provide overarching

goals that are completely clear to
each IT and business employee.
5. Organizations ensure that IT employees
understand how the company makes (or
loses) money.
6. Organizations create a vibrant and
inclusive company culture.

CHAPTER 3

Data and Knowledge
Management

1. Managing Data
2. The Database Approach
3. Big Data
4. Data Warehouses and Data Marts
5. Knowledge Management

1. Discuss ways that common challenges in
managing data can be addressed using data
governance.
2. Discuss the advantages and disadvantages of
relational databases.
3. Define Big Data, and discuss its basic
characteristics.
4. Explain the elements necessary to successfully
implement and maintain data warehouses.
5. Describe the benefits and challenges of
implementing knowledge management systems
in organizations.

3.1 Managing Data
• Difficulties of Managing Data
• Data Governance

The Difficulties of Managing
Data
• The amount of data increases
exponentially over time
• Data are scattered throughout
organizations
• Data are generated from multiple
sources (internal, personal, external)
–Clickstream Data

• New sources of data

The Difficulties of Managing
Data (continued)
• Data Degradation
• Data Rot
• Data security, quality, and integrity
are critical
• Legal requirements change
frequently and differ among
countries & industries

Data Governance
• Master Data Management
• Master Data

3.2 The Database
Approach

• Data File
• Database Systems Minimize &
Maximize Three Things
• The Data Hierarchy
• The Relational Database Model

Figure 3.1: Database
Management System

Database Management
Systems (DBMS) Minimize:
• Data Redundancy
• Data Isolation
• Data Inconsistency

Database Management
Systems (DBMS) Maximize:
• Data Security
• Data Integrity
• Data Independence

Data Hierarchy
• Bit
• Byte
• Field
• Record
• Data File (Table)
• Database

Figure 3.2: Hierarchy of Data
for a Computer-based File

The Relational Database
Model
• Database Management System
(DBMS)
• Relational Database Model
• Data Model
• Entity
• Instance
• Attribute

The Relational Database
Model (continued)
• Primary Key
• Secondary Key
• Foreign Key
• Unstructured Data

Figure 3.3: Student
Database Example

3.3 Big Data
• Defining Big Data
• Characteristics of Big Data
• Issues with Big Data
• Managing Big Data
• Putting Big Data to Use
• Big Data Used in the Functional
Areas of the Organization

Defining Big Data
• Gartner (www.gartner.com)
• Big Data Institute

Defining Big Data: Gartner
• Diverse, high volume, high-velocity
information assets that require new
forms of processing to enable
enhanced decision making, insight
discovery, and process optimization.

Defining Big Data: The Big
Data Institute (TBDI)
• Vast Datasets that:
– Exhibit variety
– Include structured, unstructured, and semistructured data
– Generated at high velocity with an uncertain pattern
– Do not fit neatly into traditional, structured,
relational databases
– Can be captured, processed, transformed, and
analyzed in a reasonable amount of time only by
sophisticated information systems.

Big Data Generally Consist
of the Following:
• Traditional Enterprise Data
• Machine-Generated/Sensor Data
• Social Data
• Images Captured by Billions of
Devices Located Throughout the
World

Characteristics of Big Data
• Volume
• Velocity
• Variety

Issues with Big Data
• Untrusted data sources
• Big Data is dirty
• Big Data changes, especially in data
streams

Managing Big Data
• Big Data makes it possible to do
many things that were previously
impossible:
– Spot business trends more rapidly and
accurately
– tracking the spread of disease
– tracking crime
– detecting fraud

Managing Big Data
(continued)
• First Step:
– Integrate information silos into a
database environment and develop
data warehouses for decision making.

• Second Step:
– making sense of their proliferating
data.

Managing Big Data
(continued)
• Many organizations are turning to
NoSQL databases to process Big
Data

Putting Big Data to Use
• Making Big Data Available
• Enabling Organizations to Conduct
Experiments
• Micro-Segmentation of Customers
• Creating New Business Models
• Organizations Can Analyze Far More
Data

Big Data Used in the Functional
Areas of the Organization
• Human Resources
• Product Development
• Operations
• Marketing
• Government Operations

3.4 Data Warehouses and
Data Marts

• Describing Data Warehouses and
Data Marts
• A Generic Data Warehouse
Environment

Describing Data
Warehouses and Data Marts
• Organized by business dimension or
Use online analytical processing
(OLAP)
• Integrated
• Time variant
• Nonvolatile
• Multidimensional

A Generic Data Warehouse
Environment
• Source Systems
• Data Integration
• Storing the Data
• Metadata
• Data Quality
• Governance
• Users

Figure 3.4: Data Warehouse
Framework

Figure 3.5: Relational
Databases

Figure 3.6: Data Cube

Figure 3.7: Equivalence Between
Relational and Multidimensional
Databases

3.5 Knowledge

Management

• Concepts and Definitions
• Knowledge Management Systems
• The KMS Cycle

Concepts and Definitions
• Knowledge Management
• Knowledge
• Explicit and Tacit Knowledge
• Knowledge Management Systems
• The KMS Cycle

Figure 3.8: The Knowledge
Management System Cycle

CHAPTER 4

Telecommunications
and Networking

1. What Is a Computer Network?
2. Network Fundamentals
3. The Internet and the World Wide
Web
4. Network Applications: Discovery
5. Network Applications:
Communication
6. Network Applications: Collaboration
7. Network Applications: Education

1. Compare and contrast the major types
of networks.
2. Describe the wireline communications
media and transmission technologies.
3. Describe the most common methods
for accessing the Internet.
4. Explain the impact that discovery
network applications have had on
business and everyday life.

5. Explain the impact that communication
network applications have had on
business and everyday life.
6. Explain the impact that collaboration
network applications have had on
business and everyday life.
7. Explain the impact that educational
network applications have had on
business and everyday life.

Opening Case
• What to Do About Landline
Telephones?
1. Should the large carriers be able to eliminate
their POTS networks?
a) Debate this argument from the viewpoint of the
large telecommunications carriers.
b) Debate this argument from the viewpoint of rural
customers.

2. Why are wireless networks unable to take
over all of the functions of POTS networks at
this time (September 2015)?

About Business 4.1
• The Least Connected Country on Earth
1. Describe the impacts of a lack of
telecommunications infrastructure on Eritrea.
2. Besides improving the economy, what other
areas of Eritrean life would be impacted by a
greatly improved telecommunications
infrastructure?
3. Can the government of Eritrea allow an
improved telecommunications infrastructure
while maintaining strict control over
communications and information? Why or why
not? Support your answer.

4.1 What Is a Computer
Network?

• Computer Network
• Bandwidth
• Broadband
• Local Area Networks
• Wide Area Networks
• Enterprise Networks

Figure 4.1: Ethernet Local
Area Network (LAN)

Figure 4.2: Enterprise
Network

4.2 Network

Fundamentals

• Communications Media and
Channels
• Network Protocols
• Types of Network Processing

Communications Media and
Channels
• Twisted-Pair Wire
• Coaxial Cable
• Fiber Optics

Table 4.1: Advantages and Disadvantages
of Wireline Communications Channels

Communications Media:
Twisted-Pair Wire

Communications Media:
Coaxial Cable

Communications Media: Fiber
Optics

Network Protocols
• Ethernet
• Transmission Control Protocol /
Internet Protocol (TCP/IP)

Transmission Control
Protocol / Internet Protocol
• Three Basic Functions of TCP
• Packets & Packet Switching
• Four Layers of the TCP/IP Reference
Model

Three Basic Functions of
the TCP
1. Manages the movement of data
packets between computers by
establishing a connection between
the computers
2. Sequences the transfer of packets
3. Acknowledges the packets that
have been transmitted

Four Layers of the TCP/IP
Reference Model
1. Application Layer
2. Transport Layer
3. Internet Layer
4. Network Interface Layer

Figure 4.6: The Four Layers of
the TCP/IP Reference Model

Figure 4.7: Packet
Switching

Types of Network
Processing
• Client/Server Computing
• Peer-to-Peer Processing

4.3 The Internet and the
World Wide Web

• Internet (“the Net”)
• Accessing the Internet
• The Future of the Internet
• The World Wide Web

Accessing the Internet
• Connecting via an Online Service
• Connecting via Other Means
– Satellite
– Google Fiber

• Addresses on the Internet

Figure 4.9: Internet
(backbone in white)

Table 4.2: Internet
Connection Methods

Future of the Internet
• High User Demand = Reduced
Performance in the Near Future
• The Internet is unreliable and not
secure.
• Internet2

The World Wide Web
(WWW)
• World Wide Web
• Hypertext
• URL

4.4 Network Applications:
Discovery

• Search Engines and Metasearch
Engines
• Publication of Material in Foreign
Languages
• Portals

Publication of Materials in
Foreign Languages

Affinity Portals

4.5 Network Applications:
Communication

• Electronic Mail
• Web-Based Call Centers
• Electronic Chat Rooms
• Voice Communication
– Voice Over Internet Protocol (VoIP)

• Unified Communications
• Telecommuting

4.6 Network Applications:
Collaboration

• Workgroup
• Workflow
• Virtual Group (Team)
• Virtual Collaboration
• Crowdsourcing
• Electronic Teleconferencing and
Video Conferencing

Figure 4.11: Telepresence
System

About Business 4.2
• The Collaboration Environment at
Raytheon
1. Describe the use of information technologies
in Raytheon’s CAVEs.
2. What are potential disadvantages of using
CAVEs in the product design process?

4.7 Network Applications:
Educational

• E-Learning
• Distance Education
– MOOC’s

• Virtual Universities

About Business 4.3
• Massive Open Online Courses in India
1. Discuss possible quality control issues with
MOOCs in India. For each issue, explain how
you would solve the problem.
2. Discuss the possible impacts of MOOCs on
traditional higher education in India.
3. Would you be willing to enroll in a MOOC as a
full-time student at your university? Why or
why not?
4. Would you be willing to enroll in a MOOC after
you graduate? Why or why not?

CHAPTER 5

Business Analytics

1. Managers and Decision Making
2. The Business Analytics Process
3. Business Analytics Tools
4. Business Analytics Models:
Descriptive Analytics, Predictive
Analytics, and Prescriptive Analytics

1. Use a decision support framework to
demonstrate how technology supports
managerial decision making at each
phase of the decision-making process.
2. Describe each phase of the business
analytics process.
3. Describe each of the various analytics
tools and examples of their uses.

4. Provide a definition and a use case
example for descriptive analytics,
predictive analytics, and prescriptive
analytics.

Opening Case
• Rent the Runway
1. Describe the descriptive analytics applications
of Rent the Runway’s business model.
2. Describe the predictive analytics applications
of Rent the Runway’s business model.
3. Describe a possible prescriptive analytics
application for Rent the Runway.
4. What companies and industries are in danger
of being disrupted by Rent the Runway? (Hint:
Will Rent the Runway change the way that
women buy clothes?)

• Business Analytics (BA)
• Business Intelligence (BI)
• BA versus BI

5.1 Managers and

Decision Making

• The Manager’s Job and Decision
Making
• Why Managers Need IT Support
• A Framework for Computerized
Decision Analysis

The Manager’s Job and
Decision Making
• Management
• Productivity
• Three Basic
Roles of Managers
• Decision
• Four Phases
of Decision Making

Three Basic Roles of
Managers
• Interpersonal Roles
• Informational Roles
• Decisional Roles

Figure 5.1: The Process and
Phases in Decision Making

Why Managers Need IT
Support
• The number of alternatives is
constantly increasing
• Most decisions are made under time
constraints
• Increased uncertainty requires
sophisticated analyses
• Group decision making required
without incurring major expenses

A Framework for Computerized
Decision Analysis
• Problem Structure
• The Nature of Decisions
– Operational Control
– Management Control
– Strategic Planning

• Decision Matrix

Figure 5.2: Decision Support
Framework

5.2 The Business

Analytics Process

• The Scope of Business Analytics

Figure 5.3: The Business
Analytics Process

The Scope of Business
Analytics
• The Development of One or a Few
Related Analytics Applications
• The Development of Infrastructure
to Support Enterprisewide Analytics
• Support for Organizational
Transformation

About Business 5.1
• Darden Restaurants
1. What is the scope of business analytics for
each company?
2. Describe how Darden Restaurants might
employ predictive and prescriptive
analytics.
3. Describe how Twiddy & Company might
employ predictive and prescriptive
analytics.
4. Describe how Point Defiance might employ
prescriptive analytics.

5.3 Business Analytics
Tools

• Excel
• Multidimensional Analysis or Online
Analytical Processing
• Data Mining
• Decision Support Systems

Multidimensional Analysis or
Online Analytical Processing
• Online Analytical Processing
• Multi-dimensional Analysis

Data Mining
• Two Basic Data Mining Operations
– Predicting trends and behaviors
– Identifying previously unknown
patterns

Data-Mining Applications Used
in Business and Other Fields
• Retailing and Sales
• Banking
• Manufacturing & Production
• Insurance
• Policework
• Healthcare

Data-Mining Applications Used
in Business and Other Fields
• Marketing
• Politics
• Weather
• Higher Education
• Social Good

Decision Support Systems
(DSS)
• Sensitivity Analysis
• What-If Analysis
• Goal-Seeking Analysis

Analytics Models:
5.4 Business
Descriptive, Predictive, and
Prescriptive Analytics

• Descriptive Analytics
• Predictive Analytics
• Prescriptive Analytics
• Presentation Tools

About Business 5.2
• Esurance Uses Analytics to Provide
Personalized Quotes
1. Describe how Esurance’s CRE analytics
package contributes to the customer’s
experience.
2. Provide an example of a predictive analytics
application that Esurance could implement.
3. Provide an example of a prescriptive
analytics application that Esurance could
implement.

About Business 5.3
• TaKaDu’s Dashboard Helps to
Conserve Water
1. How does the TaKaDu system utilize the
Internet of Things? (Hint: See Chapter 10.)
2. Provide an example of how TaKaDu uses its
system for predictive analytics.
3. Provide an example of how TaKaDu could
use its system for prescriptive analytics.
4. Refer to Chapter 2. Is the TaKaDu system a
strategic information system for Jerusalem?
Why or why not?

About Business 5.4
• Simpa Networks Provide Solar
Energy to India’s Poor
1. Describe how Simpa Networks uses
descriptive analytics to further its mission.
2. How does predictive analytics help Simpa
Networks provide solar energy to India’s
underserved population?
3. Describe how Simpa Networks could use
prescriptive analytics to further its mission.

Predictive Analytics:
Examples…
• Drive the coupons you receive at the
grocery store register
• Website predict which ads you will
click on
• President Obama was re-elected in
2012 with the help of voter prediction
• Leading online dating companies
match compatible individuals

Predictive Analytics:
Examples (Continued)
• Automatic grading of student essays
• Wireless carriers predict customer
churn
• Insurance companies predict body
injury liability from car crashes
• Better diagnosis of breast cancer
• Predict the likelihood a convict will
offend again

Predictive Analytics:
Examples (Continued)
• Financial Service Firms produce
credit scores
• Predict sales based on which
products are purchased together
• Sentiment analysis

Presentation Tools
• Dashboards
• Geographic Information Systems

Table 5.1: The Capabilities
of Dashboards

Figure 5.3: Sample
Performance Dashboard

Figure 5.5: Bloomberg
Terminal

Figure 5.6: Management
Cockpit

CHAPTER 7

Information Security

1. Introduction to Information Security
2. Unintentional Threats to Information
Systems
3. Deliberate Threats to Information
Systems
4. What Organizations Are Doing to
Protect Information Resources
5. Information Security Controls

1. Identify the five factors that contribute
to the increasing vulnerability of
information resources and specific
examples of each factor.
2. Compare and contrast human
mistakes and social engineering, along
with specific examples of each one.
3. Discuss the 10 types of deliberate
attacks.

4. Describe the three risk mitigation
strategies and examples of each one
in the context of owning a home.
5. Identify the three major types of
controls that organizations can use
to protect their information
resources along with an example of
each one.

Opening Case
• The St. Louis Cardinals
Investigated for Hacking the
Houston Astros
1. Describe how the Cardinals apparently were
able to gain access to the Astros’ computer
system.
2. What lessons should the Astros learn from
this security breach?

7.1 Introduction to

Information Security

• Information Security
• Threat
• Exposure
• Vulnerability
• Five Key Factors Increasing
Vulnerability
• Cybercrime

Five Key Factors Increasing
Vulnerability
1. Today’s interconnected, interdependent,
wirelessly networked business environment
2. Smaller, faster, cheaper computers and
storage devices
3. Decreasing skills necessary to be a
computer hacker
4. International organized crime taking over
cybercrime
5. Lack of management support

7.2 Unintentional Threats to
Information Systems

• Human Errors
• Social Engineering

Figure 7.1
Security
Threats

Human Errors
• Higher employee levels = higher
levels of security risk
• Most Dangerous Employees
• Human Mistakes

Dangerous Employees
• Two organizational areas pose the
greatest risk
– Human Resources
– Information Systems

• Janitors and Guards Frequently
Overlooked

Human Mistakes
• Carelessness with laptops
• Carelessness with computing
devices
• Opening questionable e-mails
• Careless Internet surfing
• Poor password selection and use
• Carelessness with one’s office

Human Mistakes
(continued)
• Carelessness using unmanaged
devices
• Carelessness with discarded
equipment
• Careless monitoring of
environmental hazards

Table 7.1: Human Mistakes

Social
Engineering
• Social Engineering:
– an attack in which the perpetrator uses
social skills to trick or manipulate
legitimate employees into providing
confidential company information such
as passwords.

7.3 Deliberate Threats to
Information Systems

1. Espionage or Trespass
2. Information Extortion
3. Sabotage or Vandalism
4. Theft of Equipment or Information
5. Identity Theft
6. Compromises to Intellectual
Property

Threats to
7.3 Deliberate
Information Systems
(continued)

7. Software Attacks
8. Alien Software
9. Supervisory Control and Data
Acquisition Attacks
10. Cyberterrorism and Cyberwarfare

6. Compromises to
Intellectual Property
• Intellectual Property
• Trade Secret
• Patent
• Copyright

7. Software Attacks: Three
Categories
1. Remote Attacks Requiring User
Action
– Virus
– Worm
– Phishing Attack
– Spear Phishing

7. Software Attacks: Three
Categories (continued)
2. Remote Attacks Needing No User
Action
– Denial-of-Service Attack
– Distributed Denial-of-Service Attack

7. Software Attacks: Three
Categories (continued)
3. Attacks by a Programmer
Developing a System
– Trojan Horse
– Back Door
– Logic bomb

ABOUT BUSINESS 7.1
• Ransomeware
1. Why is ransomware more than a nuisance?
2. Are your digital files adequately backed up?
Why or why not?

8. Alien Software
• Adware
• Spyware
• Spamware
• Spam
• Cookies

Organizations Are
7.4 What
Doing to Protect Information
Resources

• Risk
• Risk Management
• Risk Analysis
• Risk Mitigation

Table 7.3: The Difficulties in
Protecting Information Resources

ABOUT BUSINESS 7.2
• Catching a Hacker
1. Why did the FBI need to “argue with law
enforcement officials in various countries”?
2. Describe the diff iculties that investigators
encounter in bringing cybercriminals to
justice. Can you propose any additional
strategies they should consider?

Risk Management
Three Processes of Risk Management:
1. risk analysis
2. risk mitigation
3. controls evaluation

Risk Analysis
Three Steps of Risk Analysis
1. assessing the value of each asset
being protected
2. estimating the probability that each
asset will be compromised
3. comparing the probable costs of the
asset’s being compromised with the
costs of protecting that asset

Risk Mitigation
• Risk Acceptance
• Rick Limitation
• Risk Transference

7.5 Information Security
Controls

• Physical Controls
• Access Controls
• Communications Controls
• Business Continuity Planning
• Information Systems Auditing

Figure 7.2: Where Defense
Mechanisms are Located.

Physical Controls
• Walls
• Doors
• Fencing
• Gates

• Locks
• Badges
• Guards
• Alarm Systems

Access Controls
• Authentication
• Authorization
– Something the user is (Biometrics)
– Something the user has
– Something the user does
– Something the user knows

ABOUT BUSINESS 7.3
• Trustev: Helping to Prevent Credit
Card Fraud
1. Describe how Trustev’s authentication
method differs from other authentication
methods.
2. What are potential disadvantages with
Trustev’s authentication method?

Communications Controls
• Firewall
– Demilitarized Zone (DMZ)

• Anti-malware Systems
• Whitelisting
• Blacklisting
• Encryption
• Virtual Private Network (VPN)

Communications Controls
(Continued)
• Transport Layer Security (formerly
called Secure Socket Layer)
• Employee Monitoring Systems

Figure 7.3: (a) Basic Firewall for Home
Computer. (b) Organization with Two
Firewalls and Demilitarized Zone

Figure 7.4: How Public-key
Encryption Works

Figure 7.5: How Digital
Certificates Work.

Figure 7.6: Virtual Private
Network (VPN) and Tunneling

Business Continuity
Planning
• Business Continuity
• Business Continuity Plan

Information Systems
Auditing
• Internal Audits
• External Audits
• Three Categories of IS auditing
procedures

Three Categories of IS
auditing procedures:
• Auditing Around the Computer
• Auditing Through the Computer
• Auditing With the Computer

CHAPTER10

Wireless, Mobile
Computing, and Mobile
Commerce

1. Wireless Technologies
2. Wireless Computer Networks and
Internet Access
3. Mobile Computing and Mobile
Commerce
4. The Internet of Things

1. Identify advantages and disadvantages
of each of the four main types of
wireless transmission media.
2. Explain how businesses can use shortrange, medium-range, and long-range
wireless networks.
3. Provide a specific example of how each
of the five major m-commerce
applications can benefit a business.

4. Describe the Internet of Things,
along with examples of how
organizations can utilize the Internet
of Things.

Opening Case
• Google’s Project Fi
1. Describe how Google’s Project Fi works.
2. Assume that you are the CEO of Verizon
Wireless (www.verizonwireless.com). How
would you compete with Project Fi?

10. Wireless Technologies
1
• Wireless Devices

– Dematerialization

• Wireless Transmission Media
• Wireless Security

Wireless Devices
Wireless Devices Provide Three Major
Advantages:
1. Small enough to easily carry or wear
2. Sufficient computing power to
perform productive tasks.
3. Can communicate wirelessly with the
Internet and other devices.

Figure 10.1: Dematerialization
with Smartphones

ABOUT BUSINESS 10.1
• Smartphones Drive Growth of
Electronic Commerce in Vietnam
1. Discuss the impact of wireless
communications technologies on the growth
of electronic commerce in Vietnam.
2. Describe the advantages of wireless
connections over landline connections.
3. Discuss the implications of Vietnam
“skipping” wireline communications by
moving directly to wireless communications.

Wireless Transmission
Media
• Microwave
• Satellite
– Types of Orbits
– Global Positioning Systems
– Radio

Wireless Transmission
Media: Microwave
• Advantages of Microware
– High bandwidth
– Relatively inexpensive

• Disadvantages of Microwave
– Must have unobstructed line of sight
– Susceptible to environmental
– interference

Wireless Transmission
Media: Satellite
• Advantages of Satellite
– High bandwidth
– Large coverage area

• Disadvantages of Satellite
– Expensive
– Must have unobstructed line of sight
– Signals experience propagation delay
– Must use encryption for security

Table 10.1 Advantages &
Disadvantages of Wireless Media

Satellites
• Three Types of Satellites Circling Earth
1. Geostationary-Earth-Orbit (GEO)
2. Medium-Earth-Orbit (MEO)
3. Low-Earth-Orbit (LEO)

• Footprint
• Propagation Delay
• Internet over Satellite (IoS)

Table 10.2: Three Basic Types of
Telecommunications Satellites

Satellites: GeostationaryEarth-Orbit (GEO)
• 22,300 miles above earth
• Stationary relative to a point on Earth
• Transmission delay (.25 seconds)
• Longest orbital life (many years)
• Few Needed for Global Coverage
• Used for Television Signals
• Most Expensive to Build and Launch

Satellites: Medium-EarthOrbit (MEO)
• 6,434 miles above earth
• Satellites moves relative to a point on Earth
• Negligible transmission delay
• Moderate orbital life (6-12 years)
• Moderate number needed for global
coverage
• Used for Global Positioning Systems
• Less Expensive to Build and Launch

Satellites: Low-Earth-Orbit
(LEO)
• 400-700 miles above earth
• Move rapidly in relation to a point on
Earth
• Negligible transmission delay
• Shortest orbital life (low as 5 years)
• Large Number Needed for Global
Coverage
• Least Expensive to Build and Launch

Figure 10.3: Obtaining GPS
Information in an Automobile

ABOUT BUSINESS 10.2
• Digital Pricing Displays
1. Why are brick-and-mortar retailers
beginning to implement digital pricing
displays?
2. What are possible disadvantages to digital
pricing displays?

Wireless Transmission
Media: Radio
• Advantages of Radio
– High bandwidth
– Signals pass through walls
– Inexpensive and easy to install

• Disadvantages of Radio
– Creates electrical interference problems
– Susceptible to snooping unless encrypted

Wireless Security
• Four Major Challenges to Wireless
Networks:
– Rogue Access
• Evil Twin Attack
• Hotspotter

– War Driving
– Eavesdropping
– Radio-Frequency (RF) Jamming

Computer Networks
10. Wireless
and Internet Access
2
• Short-Range Wireless Networks
• Medium-Range Wireless Networks
• Wide-Area Wireless Networks

Short-Range Wireless
Networks
• Bluetooth
– Bluetooth 1.0
– Bluetooth 4.0
– Personal Area Network

• Ultra-Wideband
• Near-Field Communications

Medium-Range Wireless
Networks
• Wireless Fidelity (Wi-Fi)
• Wireless Mesh Networks

Figure 10.4: Wireless Access
Point

Wireless Fidelity (Wi-Fi)
• Wireless Access Point
• Hotspot
• IEEE Wi-Fi Standards
• Major Benefits of Wi-Fi
• Wi-Fi Direct
• MiFi
• Super Wi-Fi

IEEE Wi-Fi Standards
• Institute of Electrical and Electronics
Engineers (IEEE) WiFI Standards
• 802.11a
• 802.11b
• 802.11g
• 802.11n
• 802.11ac
• 802.11 ad

Figure 10.5: Smartphone and
GPS System

ABOUT BUSINESS 10.3
• Wi-Fi Network Provides Advantages
to a Belgian Theme Park
1. Describe the advantages of the Wi-Fi
network to Bobbejaanland Family Park.
2. Describe potential disadvantages of the WiFi network to Bobbejaanland Family Park.

Major Benefits of Wi-Fi
• Low cost
• Ability to provide simple Internet
access

Three Factors Preventing
Commercial Wi-Fi Market from
Expanding:
• Roaming
• Security
• Cost

Wide-Area Wireless
Networks
• Cellular Radio
• Generations of Cellular Technology
Evolution
• Wireless Broadband or WiMAX

Figure 10.5: Smart Phone &
GPS system

Generations of Cellular
Technology Evolution
• (1G) First generation
• (2G) Second generation
• 2.5G
• (3G) Third generation
• (4G) Fourth generation
• (5G) Fifth generation

Wireless Broadband or
WiMAX
• Worldwide Interoperability for
Microwave Access (WiMAX)
• WiMAX = IEEE Standard 802.16
• Wireless access range of up to 31 miles
• Data transfer rate of up to 75 Mbps
• A secure system offering voice and
video

10. Mobile Computing and
Mobile Commerce
3
• Mobile Computing
– Mobility
– Broad Reach

• Mobile Commerce
• Mobile Commerce Applications

Mobility and Broad Reach
Mobility and Broad Reach Create
Five Value-added Attributes:
1. Ubiquity
2. Convenience
3. Instant connectivity
4. Personalization
5. Localization of products and services

Mobile Commerce
Development of M-Commerce is
Driven by:
– Widespread availability of mobile
devices
– Declining prices
– Bandwidth improvement

Mobile Commerce
Applications
• Mobile Wallets
• Location-Based Applications and Services
• Mobile Advertising
• Financial Services
• Intrabusiness Applications
• Accessing Information
– Mobile Portal
– Voice Portal

• Telemetry Applications

Mobile Wallets
• Softcard
• Google Wallet
• Android Pay
• MasterCard’s Contactless, American
Express’s ExpressPay, and Visa’s
PayWave
• Apple Pay

Location-Based Applications
and Services
• Location-Based Commerce
(L-Commerce)
• Benefits of Location-Based Services
for Users
• Benefits of Location-Based Services
for Service Providers

Benefits of Location-Based
Services for Users:
• Request the nearest business or
service
• Receive alerts
• Find a friend
• Locating taxis, service personnel,
doctors, and rental equipment

Benefits of Location-Based
Services for Service Providers
• Schedule fleets
• Tracking objects such as packages
and train boxcars
• Find information such as navigation,
weather, traffic, and room schedules
• Targeting advertising
• Automating airport check-ins

ABOUT BUSINESS 10.4
• Mobile Advertising in Rural India
1. Why is it so important to adapt business
strategies to existing technologies? Provide
examples from this case in your answer.
2. Describe the impacts of wireless
technologies on various companies’
marketing campaigns in India.
3. Discuss the limitations that “basic” cell
phones can place on marketing campaigns.

Mobile Commerce Applications:
Financial Services
• Banking
• Micropayments
• Money Transfers
• Wireless Mobile Wallets (M-Wallets)
• Bill Payment Services

Intrabusiness Applications
Mobile Computing For Employee
Support:
• Workflow Applications
• Dispatch Functions

Accessing Information
• Mobile Portals
• Voice Portals

Mobile Computing
Applications: Telemetry
• Identify maintenance problems in
equipment
• Monitor medical patients
• Control medical equipment remotely
• Remote vehicle diagnosis &
preventive maintenance
• Find My iPhone

10. The Internet of Things
4
• Wireless Sensor Networks
• Radio-Frequency Identification
(RFID)
• Examples of the Internet of Things
in Use

Radio-Frequency
Identification (RFID)
• RFID
• Bar Codes
• QR Codes

Bar Codes
Limitations of Bar Codes:
• Requires line of sight from scanning device
• Pose substantial problems in
manufacturing plants, warehouses and
shipping/receiving docks
• Paper bar codes are easily damaged
• Identifies the manufacturer and product
but not the actual item

QR Codes:
Advantages Over Bar Codes
• Store more information
• Data types stored include numbers,
text, URLs, and even Japanese
characters.
• Smaller because they store information
both horizontally and vertically.
• Read from any direction or angle
• More resistant to damage

RFID
• RFID Systems
• Two Basic Types of RFID Tags
– Active RFID Tags
– Passive RFID Tags

The Internet of Things (IoT)
• Capabilities of IoT
• Examples of IoT Use

Capabilities of IoT
• Reducing waste, loss, and cost
• Identifying the need for repair,
replacement, or recall
• Tracking expiration data on
perishable items

Examples of IoT Use
• Smart Home
• Healthcare
• Automotive
• Supply Chain Management
• Environmental Monitoring
• Energy Management
• Agriculture
• Transportation

ABOUT BUSINESS 10.5
• The Internet of Things Improves
FedEx’s Dock Operations
1. Describe the problems faced by FedEx that
led to the company’s decision to implement
the EDEN system.
2. Discuss the advantages of the EDEN
system.
3. Discuss potential disadvantages of the EDEN
system.

CHAPTER11

Information Systems
within the Organization

1. Transaction Processing Systems
2. Functional Area Information Systems
3. Enterprise Resource Planning (ERP)
Systems
4. ERP Support for Business Processes

1. Explain the purpose of transaction
processing systems.
2. Explain the types of support that
information systems can provide for
each functional area of the
organization.
3. Identify advantages and drawbacks to
businesses implementing an
enterprise resource planning system.

4. Describe the three main business
processes supported by ERP
systems.

Opening Case
• The Lion King Continues Its Box
Office Dominance
1. Why are yield management systems so
important to the producers of Broadway
shows? (Hint: What is the value of an unsold
seat once the curtain goes up?)
2. Describe potential disadvantages of Disney’s
yield management system.

11. Transaction Processing
Systems
1
• Transaction
• Transaction Processing System
(TPS)
• Batch Processing
• Online Transaction Processing
(OLTP)

Figure 11.1: How TPS
Manage Data

11. Functional Area
Information Systems
2
• IS for Accounting and Finance
• IS for Marketing
• IS for Production/Operations
Management
• IS for Human Resource
Management
• Reports

IS for Accounting and
Finance
• Financial Planning and Budgeting
• Managing Financial Transactions
• Investment Management
• Control and Auditing

Financial Planning and
Budgeting
• Financial and economic forecasting
• Budgeting

Managing Financial
Transactions
• Global stock exchanges
• Managing multiple currencies
• Virtual close
• Expense management automation
(EMA)

Control and Auditing
• Budgetary control
• Auditing
• Financial ratio analysis

IS for Production/Operations
Management (POM)
• In-House Logistics and Materials
Management
• Inventory Management
• Quality Control
• Planning Production and Operations
Management
• Computer-Integrated Manufacturing
• Product Lifecycle Management

IS for Human Resource
Management
• Recruitment
• Human Resources Development
• Human Resources Planning and
Management

Three Areas of IT support in HR
Planning and Management
1. Payroll and employees’ records
2. Benefits administration
3. Employee relationship
management

Figure 11.2: Systems
supporting functional Areas

Reports
• Routine Reports
• Ad-hoc (On-Demand) Reports
– Drill-down reports
– Key indicator reports
– Comparative reports
– Exception reports

Monthly Sales Report

11. Enterprise Resource
Planning (ERP) Systems
3
• ERP II Systems
• Benefits and Limitations of ERP
Systems
• Implementing ERP Systems
• Enterprise Application Integration

ABOUT BUSINESS 11.1
• The Army Transitions from Legacy
Systems to Enterprise Resource
Planning Tools
1. Why do you think the U.S. Army’s legacy
systems were not as useful today as they
were when they were developed?
2. How does this military example parallel
large businesses like Sears and Walmart
that have had to maintain their own legacy
systems?

Core ERP
Modules

ERP II
SYSTEM

Manufacturi
ng

Accountin
g and
Financial
Module

&
Production
Module

Human
Resources
Module

Suppliers
Supply
Chain
Managem
ent
Module

ERP

Platform
&
Database

Business
Intelligenc
e
Module

Customers
Customer
Relationsh
ip
Manageme
nt Module

E-Business
Module

Extended ERP Modules

ERP Systems: Benefits
• Organizational Flexibility and Agility
• Decision Support
• Quality and Efficiency

ERP Systems: Limitations
• Business Processes Predefined by
Best Practices
• Difficult to Implement
• Potential for Failure

Major Causes of ERP
Implementation Failure
• Failure to involve affected
employees in planning and
development
• Attempting too much too fast
• Insufficient training
• Failure to perform proper data
conversion and testing

Implementing ERP Systems
• On-Premise ERP Implementation
• Software-as-a-Service (SaaS) ERP
Implementation

On-Premise ERP
Implementation
• Vanilla Approach
• Custom Approach
• Best of Breed Approach

11. ERP Support for
Business Processes
4

• The Procurement, Fulfillment, and
Production Processes
• Interorganizational Processes: ERP
with SCM and CRM

The Procurement, Fulfillment,
and Production Processes
• Procurement Process
• Order Fulfillment Process
• Production Process

Figure 11.4: Departments &
Documents Flow in Procurement

Figure 11.5: Departments &
Documents Flow in Fulfillment

Figure 11.6: Departments &
Documents Flow in Production

Figure 11.7: Integrated
Processes with ERP Systems

Interorganizational Processes:
ERP with SCM and CRM
• Enterprise Resource Planning (ERP)
Supply Chain Management (SCM)
Systems
• Enterprise Resource Planning (ERP)
Customer Relationship Management
(CRM) Systems

CHAPTER12

Customer Relationship
Management

1. Defining Customer Relationship
Management
2. Operational Customer Relationship
Management
3. Other Types of Customer
Relationship Management Systems

1. Identify the primary functions of both
customer relationship management (CRM)
and collaborative CRM strategies.
2. Describe how businesses might utilize
applications of each of the two major
components of operational CRM systems.
3. Explain the advantages and disadvantages
of mobile CRM systems, on-demand CRM
systems, open-source CRM systems, social
CRM systems, and real-time CRM systems.

Opening Case
• Do Persuasive Technologies Go
Too Far?
1. Discuss the advantages and disadvantages of
persuasive technologies to companies.
2. Discuss the advantages and disadvantages of
persuasive technologies to consumers.
3. Debate the ethical nature of persuasive
technologies. (Hint: Refer to Chapter 6 for
ethical frameworks.)
4. Do persuasive technologies take customer
relationship management too far? Why or why
not? Support your answer.

12. Defining Customer
Relationship Management
1
• Customer Touch Points
• Data Consolidation

Figure 12.1: CRM Process

Figure 12.2: Customer
Touchpoints

ABOUT BUSINESS 12.1
• Location-Based Systems in
Customer Relationship Management
1. Describe the advantages
that Amazon has over bricks-and-mortar
retailers.
2. Describe the many facets of Amazon’s
relentless focus on customer relationship
management.

Customer
12. Operational
Relationship Management
System
2
• Customer-Facing Applications
• Customer-Touching Applications

Customer Facing
Applications
• Customer Service and Support
• Sales Force Automation
• Marketing
• Campaign Management

Customer Facing Applications:
Customer Service & Support
• Customer Interaction Centers (CIC)
• Call Center
• Oubound Telesales
• Inbound Teleservice
• Information Help Desk
• Live Chat

ABOUT BUSINESS 12.2
• Priceline.com’s New Customer
Contact Center
1. Discuss the reasons why Priceline needed a
new customer contact center.
2. Describe the benefits of the KANA solution
to customers and to Priceline.

Customer Facing Applications:
Sales Force Automation
• Contact Management System
• Sales Lead Tracking System
• Sales Forecasting System
• Product Knowledge System
• Configurator

Customer Facing
Applications: Marketing
• Data Mining
• Cross-Selling
• Upselling
• Bundling

Customer Facing Applications:
Campaign Management
• Campaign Planning
– Right messages
– Right people
– Right channels
– Marketing communications opt-out

Customer Touching
Applications
• Search & Comparison Capabilities
• Technical and Other Information and
Services
• Customized Products and Services
• Mass Customization
• Personalized Web Pages
• Frequently Asked Questions (FAQs)
• E-mail and Automated Response
• Loyalty Programs

Figure 12.3: Relationship Between
Operational CRM & Analytical CRM

Types of Customer
12. Other
Relationship Management
Systems
3
• On-Demand CRM Systems
• Mobile CRM Systems
• Open-Source CRM Systems
• Social CRM
• Real-Time CRM

Open-Source CRM Systems
• Benefits of Open-Source CRM
Systems
• Disadvantages of Open-Source CRM
Systems
• Examples

Open-Source CRM Systems:
Benefits
• Favorable pricing
• Wide variety of applications
• Easy to customize
• Updates and bug (software error)
fixes rapidly distributed
• Extensive support information
available for free

Open-Source CRM Systems:
Disadvantages
• Risk related to quality control
• Company’s IT platform must match
development platform of opensource CRM system

Open-Source CRM Systems:
Examples
• SugarCRM
– (www.sugarcrm.com)

• Concursive
– (www.concursive.com)

• Vtiger
– (www.vtiger.com)

Social CRM
• Provides two-way communication
between organization & customers
• Organizations monitor social media
sites and respond accordingly
• Customers obtain faster, better
customer service

ABOUT BUSINESS 12.3
• Morton’s Steakhouse Surprises a
Customer
1. Explain how Morton’s monitoring of social
media illustrates how CRM is reviving
personal marketing.
2. Do you see any disadvantages in such close
monitoring of social media? Provide specific
examples to support your answer.

CHAPTER13

Supply Chain
Management

1. Supply Chains
2. Supply Chain Management
3. Information Technology Support for
Supply Chain Management

1. Describe the three components and
the three flows of a supply chain.
2. Identify popular strategies to solving
different challenges of supply
chains.
3. Explain the utility of each of the
three major technologies that
support supply chain management.

13. Supply Chains
1
• Supply Chain
• Supply Chain Visibility

The Structure and Components
of Supply Chains
• Three Segments of the Supply
Chain
• Tiers of Suppliers
• The Flows of the Supply Chain

Three Segments of the
Supply Chain
• Upstream
• Internal
• Downstream

Three Flows of the Supply
Chain
1. Material Flows
– Reverse Flows

2. Information Flows
3. Financial Flows

13. Supply Chain
Management (SCM)
2

• Five Basic Components of SCM
• Supply Chain Management Systems
• The Push Model Versus the Pull
Model
• Problems Along the Supply Chain
• Solutions to Supply Chain Problems

Five Basic Components of
SCM
1. Plan
2. Source
3. Make
4. Deliver
5. Return

The Push Model Versus the Pull Model

Problems Along the Supply
Chain
Two Primary Sources of Problems
Along the Supply Chain:
1. Uncertainties
2. The need to coordinate multiple
activities, internal units, and business
partners.

• Demand Forecast
• Bullwhip Effect

Figure 13.2: The Bullwhip
Effect

Solutions to Supply Chain
Problems
Using Inventories to Solve Supply
Chain Problems
– Vertical Integration
– Just-In-Time Inventory
– Information Sharing
– Vendor-Managed Inventory (VMI)

13. IT Support for Supply
Chain Management
3
• Electronic Data Interchange (EDI)
• Extranets
• Portals and Exchanges

Electronic Data Interchange
(EDI): Benefits
• Minimizes data entry errors
• Length of the message can be shorter
• Messages are secured
• Reduces cycle time
• Increases productivity
• Enhances customer service
• Minimizes paper usage and storage

Electronic Data Interchange
(EDI): Disadvantages
• Business processes sometimes must
be restructured to fit EDI
requirements
• Many EDI standards in use today

Figure 13.3: Purchase Order
Fulfillment without EDI

Figure 13.3: Purchase Order
Fulfillment with EDI

Extranet
• A Company and Its Dealers,
Customers, or Suppliers
• Industry Extranet
• Joint Ventures and Other Business
Partnerships

Figure 13.4: The Structure of
an Extranet

Portals and Exchanges
• Procurement Portal
• Distribution Portal

Saudi Electronic University
College of Administrative and Financial Sciences
E-commerce Department

Student Name:

Student ID:

Course Title: Management Information Course Code: MIS201
System
Academic Year/ Semester:

CRN:

Instructor Name:
Student Grade:

Grade Level:
Low/ Middle / High

Saudi Electronic University
College of Administrative and Financial Sciences
Assignment of MIS201- Management Information System

MIS201 – Project
Second Semester 2024-2025
Submission
Part 1
Part 2
Part 3

Submission: Week 6 Saturday 01/03/2025
Submission: Week 12Saturday 26/04/2025
Submission: Instructors will manage the date and time for presentation during week 13

40 Marks

Assignment Details
The project involves studying the IT infrastructure of a relevant information system (IS)/
information technology (IT) used by selecting any organization of your choice locally or
internationally
The idea is to investigate the selected organization using the main components of IT
(Hardware, software, services, data management and networking). Infrastructure
Investigation, which is in a selected industry, should be carried out by using articles,
websites, books and journal papers and /or interviews. In the report, you are expected to
discuss:

Project Report Structure: Part 1
Submission: Week 6 Saturday 01/03/2025

Marks: 17 Marks
1. Cover Page (1 Mark).
This must contain topic title (0.25), student names and Students ID (0.5), section number and course
name (0.25).
(You can find the cover page in the blackboard)

2. Table of Contents (0.5 Mark).
Make sure the table of contents contains and corresponds to the headings in the text, figures, and
tables.

3. Executive Summary (2.5 Marks).
What does the assignment about (1), The name and field of the chosen company (0.5), and briefly
explain the distinct features (1).

4. Organizational Profile (3 Marks).
Brief background of the business including organization details (1), purpose (1), and organizational
structure (1).

5. Strategies (4 Marks).
Discuss different types of strategies for competitive advantages (2), and then select and discuss the
most appropriate strategies to improve the performance of the organization (2).
(You can discuss any points that you learned in this course and its related to your selected organization)

6. Technology Involved (3 Marks).
How is the organization set up in terms of its IT infrastructure? Discuss the hardware (0.5), software
(0.5), telecommunication (0.5), information security (0.5), networks (0.5), and other elements (0,5).
(You can discuss any points that you learned in this course, and it’s related to your selected
organization)

7. Data Management (2 Marks).
Discuss the methods the organization uses to manage and process data (1), and then give one
advantage and one disadvantage of these methods (1).
(You can discuss any points that you learned in this course (chapter 3) and link it to your selected
organization)

8. Identify the Stakeholders (1 Mark)
Who are the main individuals, groups, or departments affected by the information system?
(You can choose any stakeholder who has a major influence on the IS or vice versa. You can choose 1
stakeholder to discuss)

Project Report Structure: Part 2
Submission: Week 12 Saturday 26/04/2025

Marks: 13 Marks
9. Analysis of Existing System (5 Marks).
Analyze the key problems of the existing system used by the company (2). Also, discuss the
Information Systems used within the company (3) for example:




Transaction processing systems (TPS)
Enterprise Resource Planning (ERP) Systems
Functional Area Information Systems
Business intelligence
DSS

(You can discuss any points that you learned in this course and it’s related to your selected organization)

10. System Evaluation (2 Marks).
Evaluate the current system that the company use (your chosen company) with one of the following
options (1):


Success
Partial failure/partial success
Total failure

Then, State the reasons for your choice (1)

11. Suggestions for the company (3 Marks)
Design or choose a system to help the company solve its main problems. State the following:


The new system name (1)
Its features (1)
Problems that will be solved (1)

(If the system that the company uses is successful and does not need to be changed, you can
mention that (1), mention its features (1), and mention the problems that it solved or prevented
from happening (1).)
(You can discuss any points that you learned in this course and it’s related to your selected organization)

12. Conclusion (2 Marks).
Summarize your report (including part 1)

13. References (1 Mark).
Use APA referencing style format

Project Presentation: Part 3
Submission: Instructors will manage the date and time for presentation during week 13

Marks: 10 Marks

Make a power-point presentation of your Project work mentioning all the above contents and
present in a group (All team members must participate( (1). There must be minimum 10 slides
in the presentation with a good background design (0.5), readable font size and style with an
appropriate color (0.5).
Presentation must have the following format:

First slide: Group members name and Student id & Title of the Project (1)

Company Profile (1)

Strategies (1)

Technology Involved and Data Management (1)

Analysis of Existing System (1)

Evaluation and suggestions (1)

Conclusion (1)

References (1)

Guidelines for the assignment:
✓ Make sure to include the cover page with all information required. One mark will be deducted if
there is no cover page
✓ This is a group project (4-5 students), which is part of your course score. It requires effort, research,
and critical thinking.
✓ Use font Times New Roman, 12 font sizes
✓ Use 1.5 line spacing with adjust to all paragraphs (alignment).
✓ Use the footer function to insert page number.
✓ Ensure that you follow the APA style in your project and references.
✓ The minimum number of required references is 3 for each part (1 and 2).
✓ Your project report length Part 1 should be between 1500 to 2200 words & Part 2 should be
between 1000 to 2000 words.
✓ You must check the spelling and grammar mistakes before submitting the assignment.
✓ Up to 20% of the total grade will be deducted for providing a poor structure of assignment
(Structure includes these elements paper style, free of spelling and grammar mistakes, referencing
and word count).
✓ Assignment must be in Word format only NO PDF
✓ Your file should be saved as Word doc [Example]: [Your Name] [CRN] MIS201 – Project Assignment
Part 1.doc

Useful links:

✓ APA reference system
✓ About plagiarism
✓ About plagiarism

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Description

Description Learning Outcomes: 1.1: Recognize and memorize concepts of communication theory as they affect business organizations and the individuals in them. 1.2: Communicate better, knowing that good communicators make better managers, and that communication is a dynamic process basic to individuals and organizational life. Assignment Structure: Type Marks Assignment-1 Part

Description

Description Learning Outcomes: Describe the basic steps of the organizational development process. Evaluate the strategic role of change in the organization and its impact on organizational performance. Assignment Question(s): Please refer to the case study titled “Planned Change at The San Diego County Regional Airport Authority” given on Page number

Description

Description Learning Outcomes: Learning Outcomes: No Course Learning Outcomes (CLOs) CLO-1 Define a solid understanding of prominent theories of ethics and morality CLO-2 Develop awareness and understanding of cultural and national differences related to ethics. CLO-3 Justify their rationale for decisions related to acceptable and unacceptable business conduct based on

Description

Description Course Learning Outcomes-Covered Aligned (PLOs) Course Learning Outcomes (CLOs) Question MGT.K.1 (1.1) Find some structured ways of dealing with complex managerial decision problems. Question-1 MGT.K.3 (1.2) Explain simple decision models and management science ideas that provide powerful and (often surprising) qualitative insight about large spectrum of managerial problems. Question-3

Description

Description Learning Outcomes: Assignment Purposes/Learning Outcomes: After completion of Assignment-1 students will be able to understand the LO 1.1: Recognize the overall knowledge management processes, concepts, goals and strategies within the context of organization. LO 1.2: Describe how valuable individual, group and organizational knowledge is managed throughout the knowledge management

Description

Description NOCOPING 🙏 tomorrow’s schedule and writes some personal reminders before starting off on her 30-minute commute home. 1. How effectively do you think Troi spent her day? 2. What does the case tell you about what it is like to be a project manager? 1 Slack is a communications

Description

Description see PHC 312 Group Assignment Paper College of Health Sciences ASSIGNMENT COVER SHEET Course name: Health Communications Course code: PHC312 CRN: Assignment title or task: Students enrolled in PHC 312 in second term 2025 will be divided into groups (3-5 students per group). The first section will be designed

Description

Description Notice : 1- you must prepare 7 to 10 ppt slides 2- you will be asked to conduct class presentation . 3- the total points for this activity will be 10 marks. 4- each student should chose only one topic 5- No shared presentation. 6- the Excel file will

Description

Description # You should not copy from any website # References must be written # The assignment must be delivered on time # The agreed number of words must be adhered to # Give examples and write a perfect answer ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of

Description

Description # You should not copy from any website # References must be written # The assignment must be delivered on time # The agreed number of words must be adhered to # Give examples and write a perfect answer ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of

Description

Description Hi, I need help to solve the as Audit and Accounting Guide Property and Liability Insurance Entities September 1, 2018 23574-349 Copyright © 2018 by American Institute of Certified Public Accountants. All rights reserved. For information about the procedure for requesting permission to make copies of any part of

Description

Description Hi ,I need help to solving the assignment, I have added files and a solution template to help you College of Administrative and Financial Sciences Assignment (1) Deadline: Saturday 01/03/2025 @ 23:59 Course Name: Advanced Financial Accounting Student’s Name: Course Code: ACCT 302 Student’s ID Number: Semester: II CRN:

Description

Description Q3. The activities performed in a processing department are uniform in all units produced. Production cost flows in a sequence from one department to another. Explain Process Cost Flows from The Flow of Raw Materials to Finished Goods to COGS (in T-account form) with an appropriate example.

Description

Description see the attachment file. Please no using AI or other websites. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 1 Logistics Management (MGT 322) Due Date: 1/3/2025 @ 23:59 Course Name: Student’s

Description

Description ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 1 Organization Design and Development (MGT 404) Due Date: 01/03/2025 @ 23:59 Course Name: Student’s Name: Course Code: MGT404 Student’s ID Number: Semester: Second

Description

Description ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 1 Business Ethics and Organization Social Responsibility (MGT 422) Due Date: 01/03//2025 @ 23:59 Course Name: Business Ethics and Organization Social Responsibility Course Code:

Description

Description The Assignment must be submitted on Blackboard (WORD format only) via allocated folder. Students are advised to make their work clear and well presented; marks may be reduced for poor presentation. This includes filling your information on the cover page. Students must mention question number clearly in their answer.

Description

Description The Assignment must be submitted on Blackboard (WORD format only) via allocated folder. Assignments submitted through email will not be accepted. Students are advised to make their work clear and well presented; marks may be reduced for poor presentation. This includes filling your information on the cover page. Students