Sunday, April 21, 2013

Chapter 15: Managing Global Systems




Summary:

In the final chapter of our textbook we take a look into how the advent of information systems is a driving force behind international business. In many instances, nationalized organizations have been overcome by competitors that have fast-paced network capabilities on global scales. This explosion of global commerce is possible because of the ever decreasing cost of international communication and transportation brought about by information systems. Also, the relative equality of information available through the presence of the internet and World Wide Web creates a growing knowledge base of world culture, shared by all, which allows for the creation of world-wide standards in global markets, production, coordination, distribution, and global economies of scale.

When developing a global business, there are four basic strategies available. Domestic exporter strategy is when an organization completes most activities in its country of origin and products are shipped out of the country for international sales. Multinational companies concentrate financial and strategy decisions on the country of origin, but decentralize other activities such as production, marketing, and sales to foreign countries. Franchiser strategy is when the origination of an idea or product takes place in a home country, with licensed “clones” being operated on foreign soil with local resources and personnel. Finally, transnational strategy operates all activities on a coordinated global scale. Their management structure closely resembles that of a federal entity, with strong centralized decision making, yet with extensive diffusion of power throughout the global divisions. There is a direct relation between the strategy a firm employs and the information systems design it requires.  Please see figure 15-3 below, taken from our textbook, that explains this relation.


As all information systems have challenges associated with them, global information systems have challenges on a somewhat larger scale based upon their own inherent scope of operations. Some of these challenges include cultural, political, lingual (language diversity), and local information systems that are difficult to integrate. Management solutions for these issues should focus on core systems, those that are absolutely critical for organizational function, and ensure that systems are built and implemented for those business processes that are essential. Furthermore, recalling the key lesson from the previous chapter, managers must manage implementation effectively, especially when dealing with global information systems. For example, legitimacy can be difficult to establish and maintain when you are thousands of miles from your subordinates and have never personally met them. Legitimacy is the authority you derive from your position, experience, and ability to influence others in the design change process. Cultural differences specifically can have a great effect on a change agent’s legitimacy.

These global enterprises and systems would not be possible on such scales without technology. As such, technology platforms must be kept forefront in development of global system requirements. As discussed previously, system integration is one of the main hardware issues that will arise, and to maintain integration, connectivity is essential. A solution for integration issues is to operate with open systems technology, while connectivity problems can be solved by building global networks based upon the Internet, which is exponentially becoming more widespread and reliable. 

Saturday, April 20, 2013

Chapter 14: Managing Projects




Summary:

Up to this point, our textbook has shown us What information systems are, Who utilizes them, Where in an organization they should be implemented, and Why they are critical to conducting business today. That is 4 out of the 5 W’s. There is a very high failure rate among IS projects, and chapter 14 answers the question of How to ensure success with information systems projects.

To me, project management consists of three controls; being on-time, on-budget, and on-track. A good project manager accomplishes this by being heavily involved in planning, assessing risk, acquiring resources, organizing, directing, and analyzing results.  Within these activities are five major variables that must be considered: scope, time, cost, quality, and risk.

In the early stages of project management there are typically many different courses of action available for solving problems or improving performance. During this phase, proper selection of which projects to pursue is key to success and should be driven by an organizations overall business strategy. In larger corporations, there is usually a management structure already in place that is responsible for making the decision on which projects will receive priority and deliver the greatest benefit to the company. To help make these decisions, management must have a clear understanding of its information requirements, both in the near-term and the far-term. A tool for the analysis of these requirements is the critical success factors (CSF’s) of managers. Examples of CSF’s include styling, quality, and increased profits. Another useful way for selecting projects is through the use of a scoring model, which assigns weights, or values, to selected criteria and then calculates the total score.

To ensure that a project remains on-budget, a firm must assess the business value of a proposed project in relation to cost and benefits. Benefits can be classified as either tangible, quantifiable or able to be assigned a monetary value, or intangible, not immediately quantifiable such as improved customer service but may lead to gains in the far-term that can be assigned a monetary value. Even in projects where benefits exceed the costs, additional analysis should be utilized to determine the feasibility and overall value of investing in long-term projects. In these situations, capital budgeting models are an effective technique for making these assessments.

As I stated in my review of chapter 8, a well thought out plan always includes a risk assessment. When managing risk in relation to information systems projects, there are three key factors to take into consideration: 1) project size, 2) project structure, and 3) experience with technology. All three are defined in depth in this chapter of our textbook. With the exception of experience with technology, most risk factors are mainly organizational. The highest failure rates are attributed to those that involve enterprise applications or process reengineering because they demand widespread organizational change.

Finally, once a project has been chosen, it must be introduced to the firm through implementation. This refers to all of the actions that are associated with the adoption, management, and routinization of a new information system. This can have a massive impact on a firm’s behavioral and organizational structure and requires careful change management. Vital to this step is the support of management at all levels of the organization. Again, risk factors can rear their ugly heads during the implementation phase of a project but these can be mitigated through the careful application of a combination of internal and external integration tools, formal planning tools, and formal control tools.



Friday, April 19, 2013

Chapter 13: Building Information Systems



Summary:

 The decision to create or invest in a new information system is not to be taken lightly. Its implementation will require major organizational change to jobs, skills, and management. Let us look at four kinds of structural change that a new information system can enable, with varying degrees of risk vs. reward. 


Automation is the most common form of organizational change. This involves technology that increases employee’s efficiency and effectiveness in performing tasks. Rationalization is the streamlining of standard operating procedures. This includes well-known programs such as total quality management and six sigma. Next on the chart is Business process redesign, which focuses on analyzing and then simplifying business processes to restructure workflows and eliminate repetitive tasks. Highest on the risk vs. reward scale are Paradigm shifts. This involves a transformation of the nature of the organization, as opposed to the specific business parts changed by redesign and rationalization. While many companies attempt to exploit the rewards associated with such high risk changes, the vast majority of corporations concentrate on business process management in the hope to achieve spectacular increases in productivity.

The production of new information systems is accomplished through a process called systems development. Systems development includes systems analysis, systems design, programming, testing, and production activities, among others. The purpose of this is to identify a solution for a specific requirement or problem that exists and develop an information system to accomplish it.

When modeling and designing systems, there are two prominent methods: 1) Structured, and 2) Object-oriented development. Structured methods concentrate on step by step modeling processes which are kept separate from data actions. This is accomplished primarily through a tool called the data flow diagram (DFD). These illustrate the processes, external entities, and data stores present in a systems component processes. Object-oriented development combines processes and data together as a collection of objects. They are more effective at modeling data than structured methodologies are; they accomplish this by modeling the systems around the concepts of class and inheritance.

As is becoming evident during my study of this chapter, there are a plethora of approaches for building new information systems. These systems vary in size and complexity in regards to the organizational problems that they are intended to rectify. The oldest method for systems building is the system life cycle process. It focuses on segmenting development into formal stages, but is also considered inflexible because one stage must be completed before the next stage can begin. This also translates into it being a costly and time-consuming process. Other alternative systems-building approaches include prototyping, utilization of application software packages, outsourcing, and end-user development. 



Organizations that exist primarily in the digital environment have a need to be capable of adding or retiring technological capabilities in such a rapidly changing environment. To do this, they rely upon rapid application development (RAD) or agile development to speed up the systems development process. For example, agile development breaks a large project into a set of smaller projects that can be completed quickly and effectively by teams through collaboration and continuous feedback. Other techniques discussed in our textbook include the use of component-based development and the use of web services, which allow multiple systems to communicate regardless of their technology platforms.




Tuesday, April 2, 2013

Chapter 12: Enhancing Decision Making



Summary:


As the picture above so eloquently states, information is essential for proper decision making. Today, with the availability of information, decision making takes place at almost every level of an organization, to include the strategic, management, and operational levels. There are 4 distinct levels in decision making: 1) Intelligence, 2) Design, 3) Choice, and 4) Implementation. Below is a graphic aid that demonstrates how the process should flow, but it should be noted that if the chosen solution does not work you can return to a previous step and repeat as necessary.


For these systems to work, however, they must be supported by good information quality, management filters, and organizational culture. A great example of how corporate culture can negatively affect decision making would be the catastrophic crash of companies like Enron and WorldCom.

Managers play a key role in decision making within an organization. The textbook states that these roles fall into an interpersonal, informational, and decisional category each. In the Interpersonal role, managers act as leaders and liaisons to subordinates and other organizational levels. When operating in the informational role, they collect and disseminate the most accurate, up-to-date information to those who need it most. Finally, managers make decisions. They are often the first-line problem solvers and negotiators for any conflict or disturbance that may arise.

Business intelligence describes the infrastructure for warehousing, integrating, and analyzing data that comes from the business environment. Business analytics focused on the specific tools and procedures for analyzing data from the business environment. Both are intended to provide correct and relevant information to the decision makers to assist in the decision making process. This is accomplished through the use of functions such as production reports, dashboards, and the ability to create model scenarios and forecasts.

Within an organization, there are generally three main entities of management that exercise decision making powers. These are lower supervisory, middle management, and executive management. Each of them has a different responsibility and utilizes business intelligence in different ways. Supervisory and middle management usually monitor performance and make fairly structured, or repetitive, decisions. They typically use management information systems to support these decisions, and utilize more complex decisions support systems, which include pivot tables and spreadsheets, to handle any unstructured decisions that may fall in their laps. Executives are responsible for strategic decision making, so they utilize executive support systems such as virtual dashboards that display real-time performance information to affect their decisions.

As discussed in the earlier chapters, sometimes the “wisdom of the group” is a powerful tool. Group decision-support systems (GDSS) were created to make these types of work groups more efficient at achieving their goals. GDSS enables groups to increase size and productivity at the same time, which is usually difficult, because contributions are made simultaneously, as opposed to separately. 


Monday, April 1, 2013

Chapter 11: Managing Knowledge



Summary:

The last decade or so has been called the “information age” by many. In fact, we live in an information economy, where the majority of prosperity and wealth is based upon the production and distribution of knowledge and information. Therefore, Knowledge Management is key to any business firms overall business strategy. Now, there is an important difference in data, bits of information about a flow of events or transactions, and knowledge. Knowledge is the use of information, derived from data, which is discovered through the analyzation of patterns rules and contexts. Knowledge Management refers to the business processes of an organization that stores, creates, transfers, and applies knowledge.  A firm’s value is directly related to its ability to do so. The three types of Knowledge Management Systems (KMS) are: Enterprise-wide KMS, Knowledge work systems, and Intelligent techniques.

Enterprise-wide KMS are general purpose tools that manage knowledge organization-wide. They are capable of searching for information and storing both structured and unstructured data. Structured knowledge exists in formal documents and files that are explicitly gleaned. Un-structured data exists in memos, emails, graphics and proposals that are stored in many different locations, in many different formats. Enterprise-wide KMS provide great value to firms as long as they are well designed and accomplish their task efficiently.

Knowledge work systems (KWS) focus on the creation of new knowledge and its application to an existing organization. In essence, they enable the location of tacit knowledge and its transformation to explicit knowledge. KWS have pre-requisites that include easy access to an external knowledge base, computer hardware and support software that is graphics intensive, communication capabilities, and being user friendly. Computer-aided design (CAD) and virtual reality systems are major work applications that can be considered a KWS.

Intelligent Techniques are of great benefit to knowledge management. Expert systems, case-based reasoning, and Fuzzy Logic (a software technology for expressing knowledge in the form of rules with subjective values) are all used to capture tacit knowledge. The other intelligent techniques discussed in our textbook are based upon Artificial Intelligence (AI). These systems include neural networks, genetic algorithms, and intelligent agents (software programs that carry out specific, repetitive, and predictable tasks without direct human intervention). While AI is no substitute for the flexibility and creativity of human intelligence, it is very useful for capturing and codifying organizational knowledge.

Chapter 10: E-Commerce: Digital Markets, Digital Goods


Summary:


The Internet and the World Wide Web has given birth to a new form of commerce, E-Commerce. Since 2010, the percentage of all retail sales in the United States transacted through E-Commerce has grown 12 percent annually. E-Commerce is the digitally enabled commercial transactions that take place over the WWW and the Internet. E-commerce is unique from other forms of commerce because it supports a “marketspace” that is generally available to everyone…all the time. It is cheaper for the customer, for the sole reason that they do not have to spend money on gasoline to physically drive or walk to a store location to buy goods. It eliminates the need for companies to find and pay for shelf space from retailers, and also equalizes the asymmetry of information in the market. Digital goods such as music and software, probably the most popular goods that can be purchased through E-Commerce, can be delivered almost instantaneously over a digital network, eliminating shipping costs.

There are three main ways to classify E-Commerce transactions:  Business-to-Consumer (B2C), Business-to-Business (B2B), and Consumer-to-Consumer (C2C). An example of C2C transactions is the use of EBAY, the online auction site, where people sell their goods to other end-users. Websites use different models to create revenue. These include the advertising, sales, subscription, transaction fee, and affiliate revenue models. All of these are explained in depth in the chapter, but to utilize the EBay example again, they use the transaction fee model by charging the seller a small fee for every successful transaction.

The Internet has transformed the way that marketers identify and communicate with customers. Utilizing the “wisdom of crowds”, where large numbers of people make better decisions than a small group or single individual, organizations are able to connect to their customers on a level unheard of through traditional commerce and ultimately increase customer lifetime value.

B2B E-Commerce represents a large portion of the marketplace, projected to be about $5.1 trillion in 2014 in the United States. B2B transactions are inherently costly and laborious, with some firms estimating that, on average, they spend at least $100 in overheard per purchase order. In contrast, B2B E-Commerce transactions enable companies to locate suppliers, place orders, and track shipments almost cost free and in real-time. This is all usually accomplished through a Private Industrial Network, illustrated below. 


Even newer than E-Commerce is the ubiquitous M-Commerce. This is commerce that takes place on mobile digital platforms, such as IPads, IPhones, and BlackBerrys. The primary focus of these has been based upon location-finding services, utilizing a platforms built-in GPS and compass. Uses include finding nearby hotels, receiving real-time information about weather and traffic, and providing personalized marketing based upon an individuals’ geographical location. Today, M-Commerce platforms can handle almost any type of transaction that other E-Commerce systems can process.

So, do any of these advantages make you want to start your own E-Commerce based website? If so, understand that there are two very important challenges to being successful: 1) developing a clear understanding of your objectives, and 2) choosing the correct technology to meet those objectives. Finally, an alternative could be to outsource your needs and wishes to a professional website builder who is very knowledgeable in constructing E-Commerce sites.


Friday, March 29, 2013

Chapter 9: Achieving Operational Excellence and Customer Intimacy: Enterprise applications



Trying to inject a little humor into this blog…


Summary:

In chapter 2 of our textbook, the authors define Enterprise Systems as a set of software and business processes that integrate previously fragmented data from different systems. This is accomplished by storing all information in a centralized repository where it can be used by all parts of the business or organization. These are also commonly known as enterprise resource planning (ERP) systems and are essential for enabling a business to attain maximum efficiency and evaluate organizational performance.

Falling under the umbrella of ERP systems are supply chain management (SCM) systems. This software allows firms with large scale and complex manufacturing and distribution chains to effectively manage the business processes from producing and procuring raw materials to the final distribution of the finished product to the customer. Most supply chains can be broken down into 2 basic levels. The upstream portion includes the firms’ suppliers and the downstream portion deals with the processes for delivering and distributing the finished product to customers. Below is figure 9-2 from our textbook that illustrates Nike’s supply chain, but keep in mind that it is not to scale, in reality Nike has thousands of suppliers and distributors. 


A common issue with the utilization of SCM systems is the bullwhip effect. This occurs when information about the demand for a product is distorted as it moves through the supply chain processes.  To combat this problem, it behooves a company to consistently audit the accuracy of information passing through the system and being used for decision making. The software that runs SCM systems can be classified as either supply chain planning (SCP) systems or supply chain execution (SCE) systems. SCP’s tell the organization how to model their supply chain, and SCE’s actually direct the flow of products through the supply chain.

Unit 3 of this chapter explains the uses of customer relationship management (CRM) systems in an attempt to “get to know” the customer. CRM software crosses the full spectrum of customer relations, from personal tools that perform specific functions to organizational applications that capture all of the data from interactions with a customer and incorporate it into the other major enterprise systems that an organization uses. This software allows a firm to provide better customer service and better market their products to future customers. CRM software supports either the Operational or Analytical aspects of customer relations. The major CRM software producers include Oracle-owned Siebel Systems, Salesforce.com, and Microsoft Dynamics CRM.

One of the challenges to implementation of Enterprise Applications is a high cost of purchase. Including training, software, hardware, and consulting fees, the price can range into the double digit millions of dollars. Also, a firm must be ready for the fundamental changes to organization and processes that will occur with the introduction of ERP software. In the end, a company must look at whether or not they think the proverbial “juice” is worth the squeeze. 




Wednesday, March 27, 2013

Chapter 8: Securing Information Systems




Summary:

The same mechanisms that allow information systems to so effectively communicate with each other also provide a substantial vulnerability for malicious use and attack. All of the personal data and financial information that is collected by MIS, DSS, and ESS systems for effective decision making would be highly vulnerable to misuse and theft if not for the existence of Security and Control methods. Security refers to the procedures and measured used to prevent theft or damage to information systems. Controls are the methods and policies that maintain the accuracy and accountability of management and security standards. Anywhere that a large amount of digital data is stored is a likely target for hackers. The internet is designed to be an open system, but attacks such as a Denial-of-Service (DOS) attack causes serious disruptions and can be used to penetrate public and private networks. Without the presence of antivirus software or firewalls, almost every computer connected to the internet would be disabled by malicious software (MALWARE) such as a computer virus and a worm. Identity Theft is one of the fastest growing threats of IS security today. Identity theft is a crime in which a perpetrator obtains vital pieces of information about an individual in an attempt to impersonate someone else. The perpetrator is then able to perform various illegal activities such as obtaining a credit card using someone else’s name and social security number. Other types of attack include phishing, evil twins, pharming, and click fraud. All of these are explained in detail by our text.

Some organizations might be reticent to dump large amounts of money into overhauling and maintaining security for their information systems because it is not directly tied to profits, but the negative impact, to include legal ramifications, associated with data theft is vital to the operation of business today. Legal and regulatory requirements include the Health Insurance Portability and Accountability Act (HIPAA) and the well-known Sarbanes-Oxley Act of 2002. Our textbook states that one study found that a security breach of a large firm, on average, creates a loss of approximately 2.1% of market value (approximately $1.65 billion) per incident.

Being a military man myself, every good plan begins with a well thought out Risk Assessment. This determines the level of risk associated with a specific activity if not properly balanced with a control. When risks can be quantified and identified, then they are more easily mitigated. Information systems have General and Application controls as a framework for the risks they face. General controls govern the design, security and use of computer programs throughout an organizations network, while application controls are specific and unique to each computerized application. Organizations must also ensure the establishment of a security policy for protecting the company’s assets. A final check for all security frameworks should include frequent MIS audits to continually re-examine the environment for new threats.

The last section of this chapter presents the many technologies and tools that organizations have at their disposal for ensuring information security. Security software itself has become an enormous multi-billion dollar industry.

Below is a short video with some facts about Cyber-attacks and one company’s integrated strategy for protecting against them. 


Source - http://www.youtube.com/watch?v=NCV8j-Bn7HI


Tuesday, March 26, 2013

Chapter 7: Telecommunications, the Internet, and Wireless Technology

Summary:



In my opinion, the greatest, and primary, purpose of Information Technology is to facilitate a better medium of communication. With modern day global business and multi-national corporations, swift and effective communication is not only a luxury, but a necessity. The key component to successful communication lies in networks. The two traditional types of these were the telephone network and the computer network. Simple networks consist of two or more connected computers and include both hardware and system operating software via a hub or switch. The latest digital networks are made up of three technologies: client/server computing, packet switching, and standardized Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP is arguably the most important technology, which allows for a common set of rules that enables communication across a diverse set of hardware and software platforms.

Within a network, communication can be accomplished by either an Analog or a Digital signal. Examples of an analog signal include the speakers on your computer, a set of earphones, or telephone handset, basically anything that creates a wave form that your ear can hear. Digital signals exist in binary format. That is the alternating system of zero’s (0) and one’s (1) that computers use to interpret data. Digital signals are more efficient and have less data deterioration, but they still need to be converted to analog signals for human consumption. This is accomplished through Modems. Without Cable, Digital Subscriber Line (DSL), or Wi-Fi modems, computers would not be able to communicate with analog networks such as telephone systems. Networks are generally classified in terms of geographical scope and include the Local Area Network (LAN) and Wide Area Network (WAN) and typically fall into one of the three major topologies described by the illustration below.



I have given the internet my own personal nickname, the MOAN, short for the Mother of All Networks. Indeed, the internet is the most extensive public communication system in the world. For something that most of us use on a daily basis, most people probably don’t know how it works. This chapter breaks down the “how” into terms that the lay-person may understand, from those that provide internet service, to emerging technologies and governance of its use.

You don’t have to look far to see that we are living in the age of the wireless revolution. Wireless technology is all about transmitting data at ever-increasing speeds. Examples include the emergence of 3G networks…then 4G networks…and the skies the limit. Cellular phone data, for voice transmission, has two major standards. Code Division Multiple Access (CDMA), which is primarily used in the U.S., and the Global System for Mobile Communications (GSM), used throughout Europe and most of the rest of the globe.

Other wireless technologies include the Radio Frequency Identification (RFID) systems. This technology has become so common-place in today’s society that RFID tags have been implanted for many years into our pets, and most recently humans for medical trials. They also provide organizations and key decision-makers with a powerful tool for tracking merchandise. The best example of this being Wal-Mart’s’ supply chain management network. 

Thursday, March 21, 2013

FUTURE TECH: Implications of Google Glass




The internet and technology giant Google has been promoting the ground-breaking introduction of Google Glass, a wearable technology that merges the digital world with the physical world to form a “smart reality.” The potential for this product and the accompanying software technology is endless, yet I had only seen one article about this innovative technology before enrolling in this course. For those who do not take a particular interest in the tech industry, it is unlikely that they are aware of the existence of this product. Where is all the hype that Google executives are pushing so hard to create?

I believe that the potential for innovation with this product is being over-shadowed by possible violations of personal privacy and federal wiretapping laws. Public caution about getting too excited with Google Glass seems to be swayed heavily by today’s social-media mafia. In fact, there has already been one establishment in tech-savvy Seattle that has emplaced a ban on Google Glass in advance of their introduction to the public. Essentially, citing privacy issues, the owner expressed concern with the possibility of his patrons being videotaped without their knowledge or approval. Whether his reasoning, he runs a seedy bar that some patrons wouldn’t want other people knowing they go to, lends merit to his concerns or not, it definitely opens the debate for the negative uses that this technology could be used for. Please follow the link below for the full article.


Google Glass could be harmful to an individuals’ quality of life over a long enough timeline. Two diagnosed occupational illnesses related to technology are Computer Vision Syndrome (CVS) and Technostress. CVS is any eyestrain condition related to display screen use, and technostress is stress induced by computer use. Symptoms of technostress include aggravation, hostility toward humans and impatience…among others. These two maladies are the most likely to occur through the use of Google Glass, which, by its design, keeps users “plugged in” longer than almost any other device to date.

All negativity aside, the implications for this technology is exciting. I truly want to be a believer and would be very interested in trying it out…if it didn’t resemble that thing that Lavar Burton wore in Star Trek. Rule # 1 for my former job was to “always look cool” and this device in its present form would make that very difficult. I feel that if it was developed and engineered by Apple during the Steve Jobs era, it would probably be quite a bit more aesthetically pleasing in the same way as the IPad and the IPod.

Ultimately, I believe its introduction and shelf life of this product will closely resemble that of another “ground-breaking” invention that has maintained a presence in our society, albeit a much more minimal one than predicted and only in specific niche areas, the Segway. 

Tuesday, March 19, 2013

Chapter 6: Foundations of Business Intelligence: Databases and Information Management


Summary:

Digitalization of the business place creates massive amounts of data that must be properly managed to ensure efficiency. To do this, Information systems must be able to provide its users with accurate and timely information. This is why Data Management is so important. This chapter begins with an explanation of how computer systems organize data into a hierarchy. This hierarchy begins with a Bit, the smallest unit of data a computer can handle, and progresses to a Database, a group of related files.

The traditional data management style can make it difficult for companies to easily access data because of a tendency for functional systems and groups to be allowed to grow independently. The main problem with this system is data redundancy, inflexibility, poor security, and lack of availability. Enter the Database Management System (DBMS). This is software that permits an organization to centralize data, manage it efficiently, and provide access through application programs. The DBMS manages to accomplish this through the use of 3 capabilities. Data definition specifies the structure of the content of the database. Data dictionary capability automates the stored information about the data in the database. Data manipulation language, such as structured query language (SQL), is the specialized language for accessing and manipulating the data. 



Databases are not “one-size-fits-all” devices. Designing a database to fit an organizations needs is paramount to success. This requires both a logical and physical design. The logical aspect must reflect the business processes of the organization and meet the decision-making requirements. The physical aspect of its design illustrates how it is actually arranged on direct-access storage devices. As a whole, for a database to maintain efficiency, it must enforce referential integrity so the relationship between data tables remains consistent.

Navigating through the vast amounts of information in a database requires the use of powerful tools or software. One key tool is the Data Warehouse. A data warehouse consolidates current and historical data from different operational systems to a central database for analysis and decision-making. Another tool is Online Analytical Processing (OLAP). This enables the user to view the same data in different ways, using different dimensions such as price, cost, or time period.

Aside from managing database information, maintaining it requires policies and quality assurance checks for the sharing and use of gathered information. In most large corporations, a dedicated data administration department is responsible for information policy, protection, and enforcement. Inaccurate data creates serious implications for organizations that rely on this information for the day-to-day operation of their business. By conducting activities such as Data Cleansing, errors in data can be corrected and enforce industry-wide standards that prevent “bleed-over” into separate information systems. 

Chapter 5 – IT Infrastructure and Emerging Technologies


Summary:


In this chapter, we take a look at IT Infrastructure, which is the actual physical set of devices that is required to operate and maintain any information technology systems. This includes both Hardware (servers, computers, high speed data cables) and Software (programs, computer code, and internet browsers). Our text begins by describing the evolution of IT Infrastructure from the late 1950’s to the Cloud-computing revolution of the present day. Today, the infrastructure industry is a $1 Trillion enterprise, which can be easily illustrated by the software supremacy of companies like Microsoft, and hardware companies like IBM.

One of the most important gauge of how fast technology and processing power progresses is Moore’s Law, which states that the power of microprocessors doubles every 18 months, and vice versa, the cost of computing falls by half in the same time frame. Correlating to this law is the rapid decline in costs of communication. Unchecked, all of this astronomical growth on a global scale would be unattainable without established technology standards. Standardization of computing and communication maintains a compatibility of products throughout the global network.

Currently, the vast majority of computing is taking place on mobile platforms such as IPhones, laptops, tablet pc’s, etc. This hardware utilizes Operating System Platforms, usually through the use of Blade Servers(page 206), like Linux or Windows. There are several platforms that were developed primarily for the use of mobile devices. These include the Android OS, Google’s Chrome OS, and Apple’s Lion OS. Data management and storage is usually maintained on Storage Area Networks (SANs), which are connected to multiple storage devices that are on a separate network dedicated solely for rapid access to stored data.

This chapter attempts to cover and explain the most prevalent hardware processing platforms in use today. These include Green computing technology and the highly popular Cloud computing. Open source software allows for the sharing of vast amounts of information, often for free. Companies and organizations usually purchase their software applications from outside sources. This market is dominated by the “big players” Microsoft, Oracle and Adobe.

Managing the massive infrastructure of Information technology has its own issues. One of the ongoing issues is managing the constant change of infrastructure. Managers cope with this issue by monitoring the Scalability of their system. This refers to the ability of a system to expand to serve a larger network without breaking down. Most companies use a competitive forces model to analyze cost decision making in regards to IT infrastructure and establish the Total Cost Ownership of IT assets. This model, taken from our textbooks (page 227), is illustrated below. 



Sunday, March 17, 2013

Chapter 4 – Ethical and Social Issues in Information Systems

Summary


The explosion of Information Technology within the last decade has presented us with new ethical, social, and political questions about issues such as the protection of privacy and intellectual property. The use of Information Systems potentially allows the expansion of the possible impact that individuals and organizations are capable of making. In fact, the last decade alone has been the one of the most ethically challenging times for U.S. and international business, with scores of to-big-to-fail organizations being brought to their knees by immoral and scandalous business behavior. Examples of this include such disasters as Enron, WorldCom, and Lehman Brothers to name a few, and also provide excellent case studies for what not to do.  

The chart below, taken from our textbook (page 155), illustrates the ripple-like effect that IT has on these issues and 5 moral dimensions associated with them. When studying it, imagine the center, IT and Systems, as a stone thrown into a pond. Prior to the introduction of ITS, the majority of society and individuals had an understanding of the accepted norms and rules of behavior, supported by laws, for the conduct of business. The “stone”, a new plethora of information that is suddenly tossed in the delicate ecosystem, creates ripples that have ever-expanding effects that established institutions cannot adjust to overnight.



Key to this chapter is the introduction of several ethical principles for decision analysis. Having just finished an ethics class taught by Dr. Lewis, I am familiar with many of them. They are briefly described, as each could be broken down and discussed in length, and include the well-known “Golden Rule”, Kant’s Categorical Imperative, Descartes’ rule of change, Utilitarian Principle, Risk Aversion Principle, and the “no free lunch” rule. If, when utilizing one of these principles, an action does not easily pass the test, it deserves a closer inspection than normal and should have a “proceed with caution” sign hung around its neck.

Information Technology Systems enable organizations to easily gather personal data about individuals. Coupled with the Internet and the ability for this data to be monitored at many points through the use of tools such as Cookies or spyware, the potential to decimate personal privacy is ever-present. Furthermore, the protection of intellectual property rights is difficult to enforce due to the near-constant development of new IT systems. One of the established protections for this is the Digital Millennium Copyright Act of 1998, which acted on a global scale to curtail copyright infringement.

In most instances, people would agree that technology has improved the average individuals’ quality of life. Unfortunately, there are some inherent disadvantages of the digital revolution. Computers are not infallible, and computer error can cause very real harm to individuals and organizations. The mere digitalization of jobs can replace human workers and have a negative impact on society and the economy. Mankind will always try to take advantage of their fellow man in any medium possible, so computer crime and abuse is rampant. Finally, health problems, associated with computer use, include repetitive stress injury, carpal tunnel syndrome, and technostress. 

Sunday, March 10, 2013

Chapter 3: Information Systems, Organizations, and Strategy


Summary:

A more appropriate title for this chapter would have been How organizations utilize information systems for strategic decision making. To best understand this, we must first define what an organization is. The textbook definition is, “a stable, formal social structure that takes resources from the environment and processes them to produce outputs. “  As bastions of collectivity, organizations develop their own culture based off of the unquestioned assumptions that define their goals and products. Other features of organizations include the development of routines, or standard operating procedures, in business processes and the presence of politics brought about by varied viewpoints about resource management. Modern organizations are inherently specialized, hierarchical, and impartial, with the goal being to maximize efficiency. The differences in how an organization uses information systems is influenced by environmental factors such as goals, social roles, leadership styles, types of tasks performed, and type of structure.

The introduction of new Information Systems (IS) in organizations tends to be highly resisted. The very nature of an organization is resistant to change. For effective integration, information systems must be created with the end-user in mind. 4 factors must to be taken into consideration to ensure the successful introduction of a new technology: Tasks of the organization, People (culture, politics), Structure (hierarchy, routine, and business processes), and existing technology.

 Some technologies go so far as to be classified as Disruptive technologies. These are innovations that fundamentally change the business environment that an organization works in. For instance, a substitute product that works better than anything currently produced, like the automobile being substituted for the horse-drawn carriage. These technologies are intended to help an organization achieve a competitive advantage that will make the firm more profitable, productive, and valuable then their competitors. This chapter discusses the impact that the internet has on competitive advantage and further defines some of the different strategies for using information systems to both counter and enable competitive forces in an organizations’ environment.

Finally, Information technology greatly leverages the power of the business ecosystem. Our text describes a business ecosystem as loosely coupled but interdependent networks of suppliers, distributors, outsourcing firms, transportation service firms and technology manufacturers. Through the sharing of Information technology based platforms, developed by key firms such as Microsoft or Wal-Mart, entire industries can see enormous growth and profitability while ever-expanding the network of ecosystems in the environment.

Friday, March 8, 2013

Chapter 2: Global E-Business and Collaboration



Summary:

Business in the modern age relies heavily on information technology and information systems to optimize efficiency and improve business processes. This chapter begins by explaining what business processes are and how they are related to information systems, which are the set of interrelated components that collect, process, store, and distribute information to support decision making and control in an organization.

We are provided further elaboration of Management Information Systems (MIS) as they are used by middle management to monitor current performance and predict and control future performance. MIS data is mainly used for the routine decision making of day-to-day operations. In contrast, Decision-Support Systems (DSS) are utilized to help guide more non-routine decision making. Finally, Executive Support Systems (ESS) exist to provide long-term, strategic information to senior management to help address decision making that frequently requires high-level judgment and innovative solutions due to a lack of established procedure for uncommon situations. These are most commonly presented to executives in the form of a web Portal, utilizing an organizations intranet to provide relevant and personalized data, or a digital dashboard, a single-screen visual representation of key performance indicators. All of these systems form what is known as Business Intelligence, an all-encompassing term for the data and software tools that help managers and organizations make more informed decisions.

With the vast amount of data gathered by these systems, how can a business manage all the information effectively, if at all? Well, you introduce more systems to manage the systems of course! The systems are called Enterprise Applications. The four major types of enterprise applications are: enterprise systems, supply chain management systems, customer relationship management systems, and knowledge management systems. Each of these manages a specific set of functions and business processes to streamline the performance of the organization.

Albert Einstein once said “Nothing great was ever accomplished alone.”  Even in the E-World we live in, where many have minimal human business interactions because of the proliferation of E-Business, E-Commerce, and E-Government, collaboration is an integral part of accomplishing our goals. Collaboration is especially important today because of the overall change in the nature of work and the ease and availability of information through the internet. The text describes how most research on collaboration supports the position that teams are more efficient and get better results than individuals. The sharing of ideas also increases the likelihood of innovation.

As is the norm for this chapter, there are, of course, systems to support collaboration. These include the mundane and user friendly (email, Instant Message, social network sites) to the more complex (Google Doc’s, telepresence, virtual meetings, MS SharePoint).

Ultimately, all these systems and their information must be managed somehow. Aside from the smallest of organizations, most firms have an Information Systems Department assigned to manage these services. It is up to this department and the efforts of its Chief Information Officer, Chief Security Officer, Chief Privacy Officer, and Chief Knowledge Officer, or any other variation of these, to ensure that the Information Technology (IT) performs its intended functions.