0% found this document useful (0 votes)
52 views13 pages

Using MIS

The document discusses the importance of management information systems (MIS) and how information systems affect organizations and individuals. It covers topics such as the components of information systems, how strategy determines systems structure, and how systems can provide competitive advantages. The document is divided into multiple sections and includes questions, answers, sidebars and case studies about MIS concepts and tools.

Uploaded by

GS GS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views13 pages

Using MIS

The document discusses the importance of management information systems (MIS) and how information systems affect organizations and individuals. It covers topics such as the components of information systems, how strategy determines systems structure, and how systems can provide competitive advantages. The document is divided into multiple sections and includes questions, answers, sidebars and case studies about MIS concepts and tools.

Uploaded by

GS GS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

T E N T H E D I T I O N

G LO B A L E D I T I O N

Using MIS
David M. Kroenke
Randall J. Boyle

Harlow, England • London • New York • Boston • San Francisco • Toronto • Sydney • Dubai • Singapore • Hong Kong
Tokyo • Seoul • Taipei • New Delhi • Cape Town • Sao Paulo • Mexico City • Madrid • Amsterdam • Munich • Paris • Milan

A01_KORE2509_10_GE_FM.indd 7 08/06/17 10:57 am


CONTENTS

Part 1: Why MIS?


1: The Importance of MIS 37

Q1-1 Why Is Introduction to MIS the Most Important Class in the


Business School? 39
The Digital Revolution 39
Evolving Capabilities 40
Moore’s Law 40
Metcalfe’s Law 41
Other Forces Pushing Digital Change 42
This Is the Most Important Class in the School of Business 43

Q1-2 How Will MIS Affect Me? 43


How Can I Attain Job Security? 43
How Can Intro to MIS Help You Learn Nonroutine Skills? 44
What Is the Bottom Line? 48

Q1-3 What Is MIS? 48


Components of an Information System 48
Management and Use of Information Systems 49
Achieving Strategies 50

Q1-4 How Can You Use the Five-Component Model? 50


The Most Important Component—You 51
All Components Must Work 51
High-Tech Versus Low-Tech Information Systems 51
• So What? A Is for Alphabet 52
Understanding the Scope of New Information Systems 53
Components Ordered by Difficulty and Disruption 53

Q1-5 What Is Information? 53


Definitions Vary 54
Where Is Information? 54

Q1-6 What Are Necessary Data Characteristics? 55


Accurate 55
Timely 55
Relevant 56
Just Barely Sufficient 56
Worth Its Cost 56

A01_KORE2509_10_GE_FM.indd 10 08/06/17 10:57 am


Contents 11

Q1-7 2027? 56
• Ethics Guide: Ethics and Professional Responsibility 57
• Security Guide: Passwords and Password Etiquette 60
• Career Guide: Five-Component Careers 62
Case Study 1: Tesco 67

2: Collaboration Information Systems 71

Q2-1 What Are the Two Key Characteristics of


Collaboration? 73
Importance of Constructive Criticism 74
Guidelines for Giving and Receiving Constructive Criticism 74
Warning! 75

Q2-2 What Are Three Criteria for Successful Collaboration? 76


Successful Outcome 76
Growth in Team Capability 77
Meaningful and Satisfying Experience 77

Q2-3 What Are the Four Primary Purposes of Collaboration? 77


Becoming Informed 78
Making Decisions 78
Solving Problems 80
Managing Projects 80

Q2-4 What Are the Requirements for a Collaboration Information


System? 82
The Five Components of an IS for Collaboration 82
Primary Functions: Communication and Content Sharing 83

Q2-5 How Can You Use Collaboration Tools to Improve Team


Communication? 83

Q2-6 How Can You Use Collaboration Tools to Manage Shared


Content? 87
Shared Content with No Control 89
Shared Content with Version Management on Google Drive 89
Shared Content with Version Control 92
• Ethics Guide: Big Brother Wearables 94

Q2-7 How Can You Use Collaboration Tools to Manage


Tasks? 96
Sharing a Task List on Google Drive 96
Sharing a Task List Using Microsoft SharePoint 96
• So What? Augmented Collaboration 97

A01_KORE2509_10_GE_FM.indd 11 08/06/17 10:57 am


12 Contents

Q2-8 Which Collaboration IS Is Right for Your Team? 99


Three Sets of Collaboration Tools 100
Choosing the Set for Your Team 101
Don’t Forget Procedures and People! 102

Q2-9 2027? 103


• Security Guide: Evolving Security 104
• Career Guide: Software Product Manager 106
Case Study 2: Eating Our Own Dog Food 109

3: Strategy and Information Systems 115

Q3-1 How Does Organizational Strategy Determine Information


Systems Structure? 117

Q3-2 What Five Forces Determine Industry Structure? 118

Q3-3 How Does Analysis of Industry Structure Determine


Competitive Strategy? 119
• Ethics Guide: The Lure of Love Bots 120

Q3-4 How Does Competitive Strategy Determine Value Chain


Structure? 122
Primary Activities in the Value Chain 122
Support Activities in the Value Chain 123
Value Chain Linkages 123

Q3-5 How Do Business Processes Generate Value? 124

Q3-6 How Does Competitive Strategy Determine Business


Processes and the Structure of Information Systems? 126

Q3-7 How Do Information Systems Provide Competitive


Advantages? 127
Competitive Advantage via Products 127
• So What? The Autonomous Race 128
Competitive Advantage via Business Processes 129
How Does an Actual Company Use IS to Create Competitive Advantages? 130
How Does This System Create a Competitive Advantage? 131

Q3-8 2027? 133


• Security Guide: Hacking Smart Things 134
• Career Guide: Director of Architecture 137
Case Study 3: The Amazon of Innovation 140

A01_KORE2509_10_GE_FM.indd 12 08/06/17 10:57 am


Contents 13

Part 2: Information Technology


4: Hardware, Software, and Mobile Systems 147

Q4-1 What Do Business Professionals Need to Know About


Computer Hardware? 149
Hardware Components 149
Types of Hardware 150
Computer Data 151

Q4-2 How Can New Hardware Affect Competitive


Strategies? 153
Internet of Things 153
Digital Reality Devices 155
Self-driving Cars 156
3D Printing 159

Q4-3 What Do Business Professionals Need to Know About


Software? 160
What Are the Major Operating Systems? 161
Virtualization 163
Own Versus License 165
What Types of Applications Exist, and How Do Organizations Obtain Them? 165
What Is Firmware? 166

Q4-4 Is Open Source Software a Viable Alternative? 167


Why Do Programmers Volunteer Their Services? 167
• So What? New from CES 2016 168
How Does Open Source Work? 169
So, Is Open Source Viable? 170

Q4-5 What Are the Differences Between Native and Web


Applications? 170
Developing Native Applications 170
Developing Web Applications 171
Which Is Better? 173

Q4-6 Why Are Mobile Systems Increasingly Important? 173


Hardware 174
Software 175
Data 175
• Ethics Guide: Free Apps For Data 176
Procedures 178
People 178

Q4-7 What Are the Challenges of Personal Mobile Devices


at Work? 179
Advantages and Disadvantages of Employee Use of Mobile Systems at Work 179
Survey of Organizational BYOD Policy 180

A01_KORE2509_10_GE_FM.indd 13 08/06/17 10:57 am


14 Contents

Q4-8 2027? 181


• Security Guide: Poisoned App-les 182
• Career Guide: Technical Account Manager 184
Case Study 4: PSA: Cruising with Information Systems 189

5: Database Processing 193

Q5-1 What Is the Purpose of a Database? 195

Q5-2 What Is a Database? 197


Relationships Among Rows 198
Metadata 199
• Ethics Guide: Querying Inequality? 200

Q5-3 What Is a Database Management System (DBMS)? 202


Creating the Database and Its Structures 202
Processing the Database 203
Administering the Database 203
• So What? Slick Analytics 204

Q5-4 How Do Database Applications Make Databases More


Useful? 206
Traditional Forms, Queries, Reports, and Applications 206
Browser Forms, Reports, Queries, and Applications 208
Multi-user Processing 209

Q5-5 How Are Data Models Used for Database Development? 210
What Is the Entity-Relationship Data Model? 211

Q5-6 How Is a Data Model Transformed into a Database Design? 214


Normalization 215
Representing Relationships 216
Users’ Role in the Development of Databases 218

Q5-7 How Can Falcon Security Benefit from a Database


System? 220

Q5-8 2027? 221


• Security Guide: Big Data . . . Losses 222
• Career Guide: Database Engineer 224
Case Study 5: Searching for Classic and Vintage Car Parts . . . 228

6: The Cloud 235

Q6-1 Why Are Organizations Moving to the Cloud? 237


Cloud Computing 238
Why Do Organizations Prefer the Cloud? 239
When Does the Cloud Not Make Sense? 240

A01_KORE2509_10_GE_FM.indd 14 08/06/17 10:57 am


Contents 15

Q6-2 How Do Organizations Use the Cloud? 241


Resource Elasticity 241
Pooling Resources 242
Over the Internet 243
Cloud Services from Cloud Vendors 243
Content Delivery Networks 246
Using Web Services Internally 247

Q6-3 What Network Technology Supports the Cloud? 248


What Are the Components of a LAN? 249
• Ethics Guide: Cloudy Profit? 250
Connecting Your LAN to the Internet 252

Q6-4 How Does the Internet Work? 254


The Internet and the U.S. Postal System 254
Step 1: Assemble Package (Packets) 255
Step 2: Put Name on Package (Domain Names) 255
Step 3: Look Up Address (IP Address) 255
Step 4: Put Address on Package (IP Address on Packet) 256
Step 5: Put Registered Mail Sticker on Package (TCP) 256
Step 6: Ship Package (Packets Transported by Carriers) 257

Q6-5 How Do Web Servers Support the Cloud? 258


Three-Tier Architecture 259
Watch the Three Tiers in Action! 259
Service-Oriented Architecture (SOA) 260
A SOA Analogy 260
SOA for Three-Tier Architecture 262
Internet Protocols 263
TCP/IP Protocol Architecture 263

Q6-6 How Can Falcon Security Use the Cloud? 265


SaaS Services at Falcon Security 265
PaaS Services at Falcon Security 266
IaaS Services at Falcon Security 266

Q6-7 How Can Organizations Use Cloud Services


Securely? 266
Virtual Private Networks (VPNs) 267
Using a Private Cloud 267
Using a Virtual Private Cloud 269
• So What? Quantum Learning 270

Q6-8 2027? 271


• Security Guide: From Anthem to Anathema 272
• Career Guide: Senior Network Manager 275
Case Study 6: Cloud Solutions and Infrastructure That Safely Test
for Consumer Risk and Financial Stability 279

A01_KORE2509_10_GE_FM.indd 15 08/06/17 10:57 am


16 Contents

Part 3: Using IS for


Competitive Advantage
7: Processes, Organizations, and Information Systems 285

Q7-1 What Are the Basic Types of Processes? 287


How Do Structured Processes Differ from Dynamic Processes? 288
How Do Processes Vary by Organizational Scope? 289

Q7-2 How Can Information Systems Improve Process Quality? 291


How Can Processes Be Improved? 292
How Can Information Systems Improve Process Quality? 292

Q7-3 How Do Information Systems Eliminate the Problems of


Information Silos? 293
What Are the Problems of Information Silos? 294
How Do Organizations Solve the Problems of Information Silos? 295
An Enterprise System for Patient Discharge 296

Q7-4 How Do CRM, ERP, and EAI Support Enterprise Processes? 296
The Need for Business Process Engineering 297
Emergence of Enterprise Application Solutions 297
Customer Relationship Management (CRM) 298
Enterprise Resource Planning (ERP) 299
• So What? Workflow Problems 300
• Ethics Guide: Paid Deletion 302
Enterprise Application Integration (EAI) 304

Q7-5 What Are the Elements of an ERP System? 306


Hardware 306
ERP Application Programs 307
ERP Databases 307
Business Process Procedures 307
Training and Consulting 308
Industry-Specific Solutions 309
Which Companies Are the Major ERP Vendors? 310

Q7-6 What Are the Challenges of Implementing and Upgrading


Enterprise Information Systems? 310
Collaborative Management 310
Requirements Gaps 310
Transition Problems 311
Employee Resistance 311
New Technology 311

Q7-7 How Do Inter-enterprise IS Solve the Problems of Enterprise


Silos? 312

A01_KORE2509_10_GE_FM.indd 16 08/06/17 10:57 am


Contents 17

Q7-8 2027? 313


• Security Guide: It’s Not Me . . . It’s You 314
• Career Guide: IT Technical Manager 316
Case Study 7: A Tale of Two Interorganizational IS 322

8: Social Media Information Systems 327

Q8-1 What Is a Social Media Information System (SMIS)? 329


Three SMIS Roles 329
SMIS Components 332

Q8-2 How Do SMIS Advance Organizational Strategy? 334


Social Media and the Sales and Marketing Activity 334
Social Media and Customer Service 335
Social Media and Inbound and Outbound Logistics 336
Social Media and Manufacturing and Operations 336
Social Media and Human Resources 337

Q8-3 How Do SMIS Increase Social Capital? 337


What Is the Value of Social Capital? 338
How Do Social Networks Add Value to Businesses? 338
Using Social Networking to Increase the Number of Relationships 339
• So What? Enhanced Golf Fan 340
Using Social Networks to Increase the Strength of Relationships 341
Using Social Networks to Connect to Those with More Resources 342

Q8-4 How Do (Some) Companies Earn Revenue from Social


Media? 343
You Are the Product 343
Revenue Models for Social Media 343
Does Mobility Reduce Online Ad Revenue? 344
• Ethics Guide: Synthetic Friends 346

Q8-5 How Do Organizations Develop an Effective SMIS? 347


Step 1: Define Your Goals 348
Step 2: Identify Success Metrics 348
Step 3: Identify the Target Audience 349
Step 4: Define Your Value 349
Step 5: Make Personal Connections 350
Step 6: Gather and Analyze Data 350

Q8-6 What Is an Enterprise Social Network (ESN)? 351


Enterprise 2.0 351
Changing Communication 352
Deploying Successful Enterprise Social Networks 352

Q8-7 How Can Organizations Address SMIS Security


Concerns? 353
Managing the Risk of Employee Communication 353
Managing the Risk of Inappropriate Content 354

A01_KORE2509_10_GE_FM.indd 17 04/07/17 1:42 pm


18 Contents

Q8-8 2027? 356


• Security Guide: Digital is Forever 359
• Career Guide: International Content Director 361
Case Study 8: Sedona Social 364

9: Business Intelligence Systems 369

Q9-1 How Do Organizations Use Business Intelligence (BI)


Systems? 372
How Do Organizations Use BI? 373
What Are Typical BI Applications? 373

Q9-2 What Are the Three Primary Activities in the BI Process? 375
Using Business Intelligence to Find Candidate Parts 375

Q9-3 How Do Organizations Use Data Warehouses and Data


Marts to Acquire Data? 380
Problems with Operational Data 382
Data Warehouses Versus Data Marts 383
• Ethics Guide: MIS-diagnosis 384

Q9-4 How Do Organizations Use Reporting Applications? 386


Basic Reporting Operations 386
RFM Analysis 386
Online Analytical Processing (OLAP) 387

Q9-5 How Do Organizations Use Data Mining Applications? 389


Intelligent Machines 390
Unsupervised Data Mining 391
Supervised Data Mining 391
Market-Basket Analysis 392
Decision Trees 393

Q9-6 How Do Organizations Use Big Data Applications? 395


MapReduce 395
• So What? BI for Securities Trading? 396
Hadoop 397

Q9-7 What Is the Role of Knowledge Management Systems? 398


What Are Expert Systems? 398
What Are Content Management Systems? 400
What Are the Challenges of Content Management? 400
What Are Content Management Application Alternatives? 401
How Do Hyper-Social Organizations Manage Knowledge? 401
Hyper-Social KM Alternative Media 402
Resistance to Knowledge Sharing 402

Q9-8 What Are the Alternatives for Publishing BI? 403


Characteristics of BI Publishing Alternatives 403
What Are the Two Functions of a BI Server? 404

A01_KORE2509_10_GE_FM.indd 18 08/06/17 10:57 am


Contents 19

Q9-9 2027? 405


• Security Guide: Semantic Security 406
• Career Guide: Manager, Data and Analytics 408
Case Study 9: Hadoop the Cookie Cutter 412

Part 4: Information Systems


Management
10: Information Systems Security 417

Q10-1 What Is the Goal of Information Systems


Security? 420
The IS Security Threat/Loss Scenario 420
What Are the Sources of Threats? 421
What Types of Security Loss Exist? 422
Goal of Information Systems Security 424

Q10-2 How Big Is the Computer Security Problem? 424

Q10-3 How Should You Respond to Security Threats? 426

Q10-4 How Should Organizations Respond to Security


Threats? 428
• So What? New from Black Hat 2015 429

Q10-5 How Can Technical Safeguards Protect Against Security


Threats? 430
Identification and Authentication 430
Single Sign-on for Multiple Systems 431
Encryption 431
• Ethics Guide: Securing Privacy 432
Firewalls 435
Malware Protection 436
Design for Secure Applications 437

Q10-6 How Can Data Safeguards Protect Against Security


Threats? 438

Q10-7 How Can Human Safeguards Protect Against Security


Threats? 439
Human Safeguards for Employees 439
Human Safeguards for Nonemployee Personnel 441
Account Administration 441
Systems Procedures 443
Security Monitoring 443

A01_KORE2509_10_GE_FM.indd 19 08/06/17 10:57 am


20 Contents

Q10-8 How Should Organizations Respond to Security


Incidents? 444

Q10-9 2027? 445


• Security Guide: Exhaustive Cheating 446
• Career Guide: Senior Consultant 448
Case Study 10: Hitting the Target 452

11: Information Systems Management 457

Q11-1 What Are the Functions and Organization of the IS


Department? 459
How Is the IS Department Organized? 460
Security Officers 461
What IS-Related Job Positions Exist? 461

Q11-2 How Do Organizations Plan the Use of IS? 463


Align Information Systems with Organizational Strategy 463
• So What? Managing the IS Department 464
Communicate IS Issues to the Executive Group 465
Develop Priorities and Enforce Them Within the IS Department 465
Sponsor the Steering Committee 465

Q11-3 What Are the Advantages and Disadvantages of


Outsourcing? 465
• Ethics Guide: Training Your Replacement 466
Outsourcing Information Systems 467
International Outsourcing 469
What Are the Outsourcing Alternatives? 470
What Are the Risks of Outsourcing? 471

Q11-4 What Are Your User Rights and Responsibilities? 473


Your User Rights 473
Your User Responsibilities 474

Q11-5 2027? 475


• Security Guide: Watching the Watchers 476
• Career Guide: Senior Data Analyst 478
Case Study 11: Automating Labor 481

12: Information Systems Development 485

Q12-1 How Are Business Processes, IS, and Applications


Developed? 487
How Do Business Processes, Information Systems, and Applications Differ and
Relate? 488
Which Development Processes Are Used for Which? 489

A01_KORE2509_10_GE_FM.indd 20 08/06/17 10:57 am


Contents 21

Q12-2 How Do Organizations Use Business Process Management


(BPM)? 491
Why Do Processes Need Management? 491
What Are BPM Activities? 492

Q12-3 How Is Business Process Modeling Notation (BPMN) Used


to Model Processes? 494
Need for Standard for Business Processing Notation 494
Documenting the As-Is Business Order Process 494

Q12-4 What Are the Phases in the Systems Development Life Cycle
(SDLC)? 497
Define the System 499
• Ethics Guide: Estimation Ethics 500
Determine Requirements 502
Design System Components 504
System Implementation 505
Maintain System 506

Q12-5 What Are the Keys for Successful SDLC Projects? 507
Create a Work Breakdown Structure 507
Estimate Time and Costs 508
Create a Project Plan 509
Adjust Plan via Trade-offs 510
Manage Development Challenges 512

Q12-6 How Can Scrum Overcome the Problems of the SDLC? 513
• So What? Banking on IoT 514
What Are the Principles of Agile Development Methodologies? 515
What Is the Scrum Process? 516
How Do Requirements Drive the Scrum Process? 518

Q12-7 2027? 520


Fetch! 520
User-Driven Systems 521
Industry Will Push Change 521
• Security Guide: Psst. There’s another Way, You Know… 522
• Career Guide: Developing Your Personal Brand 524
Case Study 12: When Will We Learn? 529

The International Dimension 532


Application Exercises 553
Glossary 572
Index 589

A01_KORE2509_10_GE_FM.indd 21 08/06/17 10:57 am

You might also like