Table of ContentsChapter No.1 Defining Needs 101.1 Need for information 10 1.2 Sources of Information 10 1.3 Primary Sources 11 1.4 Secondary Sources 11 1.5 Tertiary Sources 12 1.6 Changing Needs 12 Chapter No.2 Areas Covered 14 2.1 Need for Organization 14 2.2 Data vs. Information 14 2.3 Information Quality Checklist 15 2.4 Organization & Information Requirements 15 Chapter No.3 Organization & Information Requirements 17 3.1 Size of the Organization and Information Requirements 17 3.1.1 Small Organizations 17 3.1.2 Medium Sized Organizations 17 3.1.3 Large Organizations 18 3.2 Nature of Business & Information Requirements 19 Chapter No.4 Unique Attributes of Organization 20 4.1 Organizational Structure Pyramid/Tall/Hierarchical 20 4.1.1 Hierarchical organization 20 4.1.2 Organizational Structure 20 4.1.3 Culture of the Organization 21 4.2 Management Styles 21 4.2.1 Authoritative 21 4.2.2 Participative 22 4.2.3 Mixed 22 4.3 Decision Making Approach 22 4.4 Sources of information in Organizations 22 4.5 Direction of Information Flow 23 Chapter No.5 Effect of Changes in Environment 24 5.1 Elements of Environment 24 5.1.1 Legal 24 5.1.2 Economic 24 5.1.3 Social 25 5.1.4 Technological 25 5.1.5 Corporate social responsibility 26 5.1.6 Ethics 27 Chapter No.6 Systems vs. Procedures 28 6.1 Purpose of Systems & Procedures 28 6.2 Data & Information 28 6.3 Data & Information 28 6.4 Manual Vs Computerised Information Systems 28 6.5 What is Computer based Information System (CBIS)? 28 6.6 Why Information Systems? 29 6.7 Emerging Global Economies 29 6.8 Transforming Industrial Economies 29 6.9 Transformed Business Enterprise 29 6.10 Emerging Digital Firms 29 Chapter No.7 Types of Systems 30 7.1 What are Systems? 30 7.2 Components of a system 30 7.3 Types of Systems 30 7.3.1 Open-Loop System 30 7.3.2 Closed Loop System 30 7.3.3 Open Systems 31 7.3.4 Closed Systems 31 7.4 Level of Planning 31 7.5 Strategic Planning for Information Resources (SPIR) 32 Chapter No.8 What are Systems? 33 8.1 Components of a system 33 8.2 Types of Systems 33 8.3 Open Loop System 34 8.4 Closed Loop System 35 8.5 Attributes of an IS/CBIS 36 Chapter No.9 Infrastructure 39 9.1 Architecture 39 9.1.1 Information Architecture 39 9.2 Components/Sub-Systems of CBIS 40 9.3 Transaction Processing System 40 9.4 Management Information System 42 Chapter No.10 Support Systems 43 10.1 Support systems can be classified into two categories 43 10.1.1 Office Automation Systems 43 10.1.2 Decision Support Systems 43 10.2 Functionalities of MIS and DSS 44 10.3 Types of DSS 44 10.3.1 Model Driven DSS 44 10.3.2 Data Driven DSS 45 Chapter No.11 Data Mart 47 11.1 Online Analytical Processing (OLAP) 47 11.2 Data Mining 48 11.3 Types of Models Used in DSS 48 11.3.1 Physical Models 48 11.3.2 Narrative Models 48 11.3.3 Graphic Models 48 11.3.4 Mathematical Models 48 11.4 Knowledge / Intelligent Systems 49 11.5 Knowledge Support Systems (KSS) / Intelligent Systems 49 11.6 Components of an Expert System 50 Chapter No.12 CBIS from Functional View Point 52 12.1 Organizational Information Systems (OIS) 52 12.2 Marketing Information Systems (MKIS) 53 12.3 Benefits of Marketing IS 53 12.4 Management Levels in MKIS 53 12.5 New Dimensions in MKIS 53 12.6 Key CRM Tasks 56 12.7 CRM Issues 56 12.8 Call Center 56 Chapter No.13 Organizational Structure 57 13.1 Financial Sector 57 13.2 Air Line Industry 57 13.3 Manufacturing Information System 58 13.4 Inventory Sub System 59 13.5 Production Sub System 59 13.6 Maintenance & Scheduling Sub System 60 13.7 Quality Sub system 60 13.8 Total Quality Management (TQM) 61 13.9 Planning Productions/Operations52 62 13.10 Materials Requirement Planning (MRP) 62 13.11 Manufacturing Resource Planning (MRP II) 62 13.12 Computer Aided Design (CAD) 63 13.13 Computer Aided Manufacturing (CAM) 63 13.14 Computer Integrated Manufacturing (CIM) 63 13.15 Computer Integrated Manufacturing (CIM) Goals 64 Chapter No.14 Marketing 65 14.1 Accounting & Financial Information Systems 66 14.2 Human Resource Information Systems 66 14.3 IT Department 67 14.3.1 Evolution of the IT Department 67 Chapter No.15 Decision Making 69 15.1 Types of Problems 69 15.2 Type of Decisions 70 15.3 Decision-making process 71 Chapter No.16 Phases of decision-making 73 16.1 Phases of decision-making process 73 16.2 The Intelligence Phase 73 16.3 The Design Phase 73 16.4 The Choice Phase 74 16.5 The Implementation Phase 75 16.6 Rational Individual Models of Decision Making 75 16.7 Organizational Models in Decision Making 75 Chapter No.17 Planning for System Development 77 17.1 Phases of IT planning 77 17.2 Models Used for System Development 78 17.3 Systems Development Life Cycle 78 17.4 Types of System Development Life-Cycle 78 Chapter No.18 Systems Development Life Cycle 81 18.1 Project lifecycle vs. SDLC 81 18.2 Types of System Development Life-Cycle Model 81 18.3 Costs of Proposed System 83 18.4 Benefits from the proposed system 84 18.5 Classic lifecycle Model / Waterfall Model 84 18.6 Analysis of Existing system 85 18.7 Elicitation of Detailed Requirements 87 Chapter No.19 System Design 88 19.1 Entity Relationship Diagram (ERD) 88 19.2 Design of the information flow 90 19.3 Design of data base 90 19.4 Design of the User Interface 91 19.5 Physical Design 91 19.6 Program Development 91 19.7 Procedures Development 92 19.8 Testing 92 19.9 Operations & Maintenance 92 19.10 Evaluating Waterfall 92 Chapter No.20 Incremental Model 95 20.1 Characteristics of the Incremental Mode l 95 20.2 Incremental Model-Evaluation 95 20.3 Iterative Models – Evaluation 96 20.4 Incremental vs. Iterative 97 Chapter No.21 Spiral Model 98 21.1 Determine Objectives, Alternatives and Constraints. 98 21.2 Prototyping 99 21.3 Advantages of Prototype 100 21.4 Risks of Prototyping 101 Chapter No.22 System Analysis 102 22.1 Computerized vs. Manual environment 102 22.2 Systems Analyst 103 22.3 System Design 103 22.4 Designing user interface 104 Chapter No.23 Benefits of Good System Design 107 23.1 System Analysis & Design Methods 107 23.2 Structured Analysis and Design 107 23.3 Flow Chart 107 Chapter No.24 Symbols used for flow charts 110 24.1 Symbols 110 24.2 Good Practices 114 24.3 Data Flow Diagram 115 Chapter No.25 Rules for DFD’s 118 25.1 Entity Relationship Diagram 120 25.2 Entity 123 25.3 Value Sets 124 25.4 Relationships 124 Chapter No.26 Symbols 126 26.1 Why need Object-Orientation? 127 26.2 Object Oriented Analysis 128 Chapter No.27 Object Oriented Analysis and Design 131 27.1 Object 131 27.2 Classes 131 27.3 Inheritance 131 27.4 Encapsulation 132 27.5 Polymorphism 132 27.6 What is Business Process Reengineering? 133 Chapter No.28 Critical Success Factors (CSF) 135 28.1 Sources of Critical Success Factors 135 28.2 CSF vs. Key Performance Indicator 135 28.3 Centralized vs. Distributed Processing 136 28.4 Web based Environment 137 28.5 Internet 138 Chapter No.29 Security of Information System 139 29.1 Security Issues 139 29.2 Security Objective 139 29.3 Scope of Security 140 29.4 Security Policy 140 29.5 Security Program 141 29.6 Identification of Assets 141 Chapter No.30 Threat Identification 143 30.1 Types of Threats 143 30.2 Control Analysis 143 30.3 Impact analysis 144 30.4 Risk Determination/Exposure Analysis 144 30.5 Occurrence of threat 145 30.6 Computing Expected Loss 146 Chapter No.31 Control Adjustment 147 31.1 Security to be cost effective 147 31.2 Roles & Responsibility 147 31.3 Report Preparation 148 31.4 Types of Threat 148 Chapter No.32 Unauthorized intrusion 149 32.1 Physical Access vs. Logical access 149 32.2 Viruses 149 32.3 Sources of Transmissions 150 32.4 Types of Viruses 150 32.5 Management procedural controls 151 32.6 Technical controls 151 Chapter No.33 Antivirus software 153 33.1 Scanners 152 33.2 Active monitors 152 33.3 Behavior blockers 152 33.4 Logical intrusion 152 33.5 Best Password practices 153 33.6 Firewall 154 Chapter No.34 Types of Controls 156 34.1 Access Controls 156 34.2 Cryptography 156 34.3 Biometrics 157 Chapter No.35 Audit trails and logs 159 35.1 Documentation 159 35.2 Audit trails and types of errors 160 35.3 Definition of Audit 160 35.4 IS audit 160 35.5 Parameters of IS audit 161 35.6 Risk Based Audit Approach 161 Chapter No.36 Risk Management 162 36.1 Phases of Risk Management 162 36.2 What is focal Point? 162 36.3 System Characterization 162 36.4 Steps in threat identification 163 36.5 Vulnerability Assessment 163 Chapter No.37 Control Analysis 166 37.1 Likelihood Determination 166 37.2 Impact Analysis 166 37.3 Risk Determination 167 37.4 Results Documentation 168 37.5 Implementation 168 37.6 Monitoring and evaluation 168 Chapter No.38 Risk Management 169 38.1 Corporate Culture and Risk Management 169 38.2 Constituents of Risk Management 169 38.3 Risk management 169 38.4 Business Continuity Planning 169 38.5 Components of BCP 170 38.6 Phases of BCP 170 38.7 Incident Management: 171 38.8 Business Impact Analysis (BIA) 171 38.9 Recovery Strategies 171 38.10 Development of Business Continuity and Disaster Recovery Plans 172 38.11 Monitoring 173 Chapter No.39 Web Security 174 39.1 Web Security Threats 174 39.2 Passive attacks 174 9.3 Active Attacks 174 39.4 Types of Active attacks 174 39.5 Threat Impact 175 39.6 Methods to avoid internet attacks: 175 Chapter No.40 Factors Encouraging Internet Attacks 177 40.1 Internet Security Controls 177 40.2 Firewall Security Systems 177 40.3 Intrusion Detection Systems (IDS) 178 40.4 Components of IDS 179 0.5 Web Server Logs 180 40.6 Web Security audits 180 40.7 Digital Certificates 181 Chapter No.41 E-Commerce 182 41.1 Why E-Commerce? 182 41.2 Commerce vs. E-Business 182 41.3 Business to Consumer (B2C) 183 41.4 Electronic Data Interchange (EDI): 184 41.5 E-Government 185 41.6 Other Forms of E-Commerce 186 41.7 M-Commerce 186 41.8 E-Business Opportunities 187 41.9 E-Business IT Risks 188 Chapter No.42 Supply Chain Management 191 42.1 Integrating systems 192 42.2 Methods of integration 192 42.3 Using SCM Software 193 42.4 Components of Supply Chain 193 42.5 Types of Supply Chains 194 Chapter No.43 Enterprise Resource Planning 195 43.1 Business Objectives and IT 195 43.2 Using ERP Software 195 43.3 ERP Compared to integrated Software 196 43.4 Evolution of ERP 197 43.5 ERP & Customer relationship management 199 Chapter No.44 ERP & E-commerce 200 44.1 ERP & CRM 200 44.2 Change management 201 44.3 Phases of Change Management 202 44.4 Change agent: 204 44.5 ERP– Ownership and sponsor ship: 204 Chapter No.45 Importance of ethics in IS 205 45.1 Meaning of Ethics 205 45.2 Ethical Challenges 205 45.3 Privacy and Ethics 206 45.4 Threats to Privacy 207 45.5 Electronic Surveillance 207 45.6 Data Profiling 208 45.7 Online Privacy and E-Commerce 208 45.8 Workplace Monitoring 208 45.9 TRIPS 210 45.10 Privacy Codes and Policies 210 |
Tags
最新内容
- 1 day 20 hours ago
- 1 day 22 hours ago
- 1 day 22 hours ago
- 4 days 14 hours ago
- 4 days 21 hours ago
- 4 days 22 hours ago
- 4 days 22 hours ago
- 4 days 22 hours ago
- 1 week 2 days ago
- 1 week 2 days ago