IUB BUS-K 201 - K201 lecture (12 pages)

Previewing pages 1, 2, 3, 4 of 12 page document View the full content.
View Full Document

K201 lecture



Previewing pages 1, 2, 3, 4 of actual document.

View the full content.
View Full Document
View Full Document

K201 lecture

449 views


Pages:
12
School:
Indiana University, Bloomington
Course:
Bus-K 201 - The Computer in Business
Unformatted text preview:

K201 lecture Which component is the most difficult to change in an information system PEOPLE What does Wal Mart s ability to offer items at a lower price than other stores do to the buyer power of customers DECREASES BUYER POWER Some online stores make personal recommendations of products based on previous purchases What kind of IS does thaT CUSTOMER RELATIONSHIP MANAGEMENT The process of designing or changing a business to take advantage of new information systems is called BUSINESS PROCESS REENGINEERING What is the big deal with information silos Data warehouses obtain information clean data and store it in a data warehouse database people in charge of data info don t want people to process informational data because it could have consequences on data Problems with Operational Data Dirty Data Missing Values Inconsistent Data Data not integrated when trying to combine data from two or more dif systems Wrong Granularity level of detail presented by the data not enough or too much Too Much Data Datamart subset of data warehouse addresses a function of a data warehouse CHAPTER 10 managing business processes four stages in BPM Business Processing Modeling cycle model processes create components hardware software data systems and people implement processes assess results In theory Better to start with business processes More likely to result in processes and systems that are aligned with the organization s strategy and direction Organizations take both approaches though Ontheshelf software starts with business processes and select application that works best Keys for Successful PRocess and Systems Development Projects Create a work breakdown structure break into smaller tasks until each task is small enough to estimate Adjust plans via trade off balancing scope cost and time A data mart is smaller than a data warehouse so it addresses the needs of a particular department or functional area of a business WEEK FIVE Computer Hardware Inputs Keyboard everything that gets data into the computer Outputs printer etc everything that displays things Storage disks and drives and Process CPU main memory RAM random Acess Memory memory you lose when you turn off computer or when power goes out Computer Data CPU is main actor in how computer words computer transfers info from disk to main memory a copy of instruction is moved from there to CPU the CPU has a small memory called cache and the instructions are stored there having a large cache makes the computer faster but more expensive CPU loads things into memory by chunks because it can t all fit in the memory of the computer Difference between a Clients Computers and Servers Computers Client programs that control client computer s resources and they have software that lets them connect ot a network private network or use public network Server email websites large and shared databases it must be fast with many CPUS lots of main memories Many servers are organized into a server farm and have mirror servers that work if one breaks they start working as if nothing has happened Computer Software Operating Systems Software ownership and licensing you don t buy the system you buy the right to use it and the company licenses it to you Virtualization where one computer hosts the appearance of many computer virtual machine opperates as if it has control over other sources Types of Software Apps Sources of System Costs chart Goal Pick things that satisfy requirements at minimun costs Business Manager s Role in Hardware and Software Specifications chart cComputer Networks collection of computers that communicate with one another over wireless or not wireless ways Type Local Area network Wide area network The Internet Modem this is all chapter 6 Transmission speeds are measured in megabytes or gigabytes for second when talking about networking Application Layer Protocols Hyper Text Transport Protocol http HTTPS secure HTTP data transmission Simple Mail Transfer Protocol SMTP File Transfer Protocol TCP and IP Protocols TCP trasmission Control protocol most important breaks traffic up into packets and sends each one along its way IP internet protocol addressing Public IP addresses Identify a particular device on public internet must be unique worldwide Prive IP addresses IDentify a particular device on a private network benefits all device on LAN share a public IP address you also don t need to register a public IP address on your computer with ICCANapproved agencies URL uniform resource locator address on the internet consists of a protocol http etc followed by a domain name indiana edu etc or a public address Cloud Computing Cloud and Elastic Cloud elastic leasing of pooled computer resources over the internet Elastic check slide 3 Fundamental cloud types SaaS software as a service Paas Platform as a service Iaas Infrastructure as a Service most basic WEEK SIX SUMMARY Information Systems Security Threat person or business that tries to get info illegally without owners permission or knowledge Vulnerability opportunity for threat to gain access to the information Safe guard mesher that organizations take to block the threat from achieving their goal Target asset that is desired by the threat Security Threats and Loss Human Error Computer Crime Natural Disasters are threats Loss Types common threats pretexting tr spoofing pretending to be someone else phishing link to a site in an email that can infect your computer Incorrect data modification procedures not followed or incorrectly designed Increasing a customer s dicount Fault Service incorrect data modification systems wrong wrong procedurl mistakes progamming errors IT installation errors DENIAL OF SERVICE system overload intentional where people can shut down a server by starting an application happens when a hacker floods a website with bogus service requests LOSS of ingrastructure human accidents theft and terrorist evens natural disasters etc threats can be stopped or reduced safeguards are expensive and reduce work efficiency GOAL of info systems security find trade off between risk of loss and cost of safeguards creat strong passwords use many pesswords etc Elements of a policy check screen shot RIsk assessment tangible consequences intangible likelihood probably that threat will hit assett probable loss risk management decisions give probably loss what to protext which safeguards are inexpensive and easy which bulnerabilities are expensive to eliminate how to balands cost of safeguards with


View Full Document

Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view K201 lecture and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view K201 lecture and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?