45 Chapters

Information Systems

L# TOPIC
1Defining Needs
2Areas Covered
3Organization and Information Requirements
4Unique Attributes of Organization
5Effect of Changes in Environment
6Systems vs Procedures
7Types of Systems
8What are Systems
9Infrastructure
10Support Systems
11Data Mart
12CBIS from Functional View Point
13Organizational Structure
14Marketing
15Decision Making
16Phases of decision-making
17Planning for System Development
18Systems Development Life Cycle
19System Design
20Incremental Model
21Spiral Model
22System Analysis
23Benefits of Good System Design
24Symbols used for flow charts
25Rules for DFDs
L# TOPIC
26Symbols
27Object Oriented Analysis and Design
28Critical Success Factors
29Security of Information System
30Threat Identification
31Control Adjustment
32Unauthorized intrusion
33Antivirus software
34Types of Controls
35Audit trails and logs
36Risk Management
37Control Analysis
38Risk Management-1
39Web Security
40Factors Encouraging Internet Attacks
41E-Commerce
42Supply Chain Management
43Enterprise Resource Planning
44ERP and E-commerce
45Importance of ethics in IS

Table of Contents

Chapter No.1 Defining Needs 10

1.1 Need for information 10

1.2 Sources of Information 10

1.3 Primary Sources 11

1.4 Secondary Sources 11

1.5 Tertiary Sources 12

1.6 Changing Needs 12

Chapter No.2 Areas Covered 14

2.1 Need for Organization 14

2.2 Data vs. Information 14

2.3 Information Quality Checklist 15

2.4 Organization & Information Requirements 15

Chapter No.3 Organization & Information Requirements 17

3.1 Size of the Organization and Information Requirements 17

3.1.1 Small Organizations 17

3.1.2 Medium Sized Organizations 17

3.1.3 Large Organizations 18

3.2 Nature of Business & Information Requirements 19

Chapter No.4 Unique Attributes of Organization 20

4.1 Organizational Structure Pyramid/Tall/Hierarchical 20

4.1.1 Hierarchical organization 20

4.1.2 Organizational Structure 20

4.1.3 Culture of the Organization 21

4.2 Management Styles 21

4.2.1 Authoritative 21

4.2.2 Participative 22

4.2.3 Mixed 22

4.3 Decision Making Approach 22

4.4 Sources of information in Organizations 22

4.5 Direction of Information Flow 23

Chapter No.5 Effect of Changes in Environment 24

5.1 Elements of Environment 24

5.1.1 Legal 24

5.1.2 Economic 24

5.1.3 Social 25

5.1.4 Technological 25

5.1.5 Corporate social responsibility 26

5.1.6 Ethics 27

Chapter No.6 Systems vs. Procedures 28

6.1 Purpose of Systems & Procedures 28

6.2 Data & Information 28

6.3 Data & Information 28

6.4 Manual Vs Computerised Information Systems 28

6.5 What is Computer based Information System (CBIS)? 28

6.6 Why Information Systems? 29

6.7 Emerging Global Economies 29

6.8 Transforming Industrial Economies 29

6.9 Transformed Business Enterprise 29

6.10 Emerging Digital Firms 29

Chapter No.7 Types of Systems 30

7.1 What are Systems? 30

7.2 Components of a system 30

7.3 Types of Systems 30

7.3.1 Open-Loop System 30

7.3.2 Closed Loop System 30

7.3.3 Open Systems 31

7.3.4 Closed Systems 31

7.4 Level of Planning 31

7.5 Strategic Planning for Information Resources (SPIR) 32

Chapter No.8 What are Systems? 33

8.1 Components of a system 33

8.2 Types of Systems 33

8.3 Open Loop System 34

8.4 Closed Loop System 35

8.5 Attributes of an IS/CBIS 36

Chapter No.9 Infrastructure 39

9.1 Architecture 39

9.1.1 Information Architecture 39

9.2 Components/Sub-Systems of CBIS 40

9.3 Transaction Processing System 40

9.4 Management Information System 42

Chapter No.10 Support Systems 43

10.1 Support systems can be classified into two categories 43

10.1.1 Office Automation Systems 43

10.1.2 Decision Support Systems 43

10.2 Functionalities of MIS and DSS 44

10.3 Types of DSS 44

10.3.1 Model Driven DSS 44

10.3.2 Data Driven DSS 45

Chapter No.11 Data Mart 47

11.1 Online Analytical Processing (OLAP) 47

11.2 Data Mining 48

11.3 Types of Models Used in DSS 48

11.3.1 Physical Models 48

11.3.2 Narrative Models 48

11.3.3 Graphic Models 48

11.3.4 Mathematical Models 48

11.4 Knowledge / Intelligent Systems 49

11.5 Knowledge Support Systems (KSS) / Intelligent Systems 49

11.6 Components of an Expert System 50

Chapter No.12 CBIS from Functional View Point 52

12.1 Organizational Information Systems (OIS) 52

12.2 Marketing Information Systems (MKIS) 53

12.3 Benefits of Marketing IS 53

12.4 Management Levels in MKIS 53

12.5 New Dimensions in MKIS 53

12.6 Key CRM Tasks 56

12.7 CRM Issues 56

12.8 Call Center 56

Chapter No.13 Organizational Structure 57

13.1 Financial Sector 57

13.2 Air Line Industry 57

13.3 Manufacturing Information System 58

13.4 Inventory Sub System 59

13.5 Production Sub System 59

13.6 Maintenance & Scheduling Sub System 60

13.7 Quality Sub system 60

13.8 Total Quality Management (TQM) 61

13.9 Planning Productions/Operations52 62

13.10 Materials Requirement Planning (MRP) 62

13.11 Manufacturing Resource Planning (MRP II) 62

13.12 Computer Aided Design (CAD) 63

13.13 Computer Aided Manufacturing (CAM) 63

13.14 Computer Integrated Manufacturing (CIM) 63

13.15 Computer Integrated Manufacturing (CIM) Goals 64

Chapter No.14 Marketing 65

14.1 Accounting & Financial Information Systems 66

14.2 Human Resource Information Systems 66

14.3 IT Department 67

14.3.1 Evolution of the IT Department 67

Chapter No.15 Decision Making 69

15.1 Types of Problems 69

15.2 Type of Decisions 70

15.3 Decision-making process 71

Chapter No.16 Phases of decision-making 73

16.1 Phases of decision-making process 73

16.2 The Intelligence Phase 73

16.3 The Design Phase 73

16.4 The Choice Phase 74

16.5 The Implementation Phase 75

16.6 Rational Individual Models of Decision Making 75

16.7 Organizational Models in Decision Making 75

Chapter No.17 Planning for System Development 77

17.1 Phases of IT planning 77

17.2 Models Used for System Development 78

17.3 Systems Development Life Cycle 78

17.4 Types of System Development Life-Cycle 78

Chapter No.18 Systems Development Life Cycle 81

18.1 Project lifecycle vs. SDLC 81

18.2 Types of System Development Life-Cycle Model 81

18.3 Costs of Proposed System 83

18.4 Benefits from the proposed system 84

18.5 Classic lifecycle Model / Waterfall Model 84

18.6 Analysis of Existing system 85

18.7 Elicitation of Detailed Requirements 87

Chapter No.19 System Design 88

19.1 Entity Relationship Diagram (ERD) 88

19.2 Design of the information flow 90

19.3 Design of data base 90

19.4 Design of the User Interface 91

19.5 Physical Design 91

19.6 Program Development 91

19.7 Procedures Development 92

19.8 Testing 92

19.9 Operations & Maintenance 92

19.10 Evaluating Waterfall 92

Chapter No.20 Incremental Model 95

20.1 Characteristics of the Incremental Mode l 95

20.2 Incremental Model-Evaluation 95

20.3 Iterative Models – Evaluation 96

20.4 Incremental vs. Iterative 97

Chapter No.21 Spiral Model 98

21.1 Determine Objectives, Alternatives and Constraints. 98

21.2 Prototyping 99

21.3 Advantages of Prototype 100

21.4 Risks of Prototyping 101

Chapter No.22 System Analysis 102

22.1 Computerized vs. Manual environment 102

22.2 Systems Analyst 103

22.3 System Design 103

22.4 Designing user interface 104

Chapter No.23 Benefits of Good System Design 107

23.1 System Analysis & Design Methods 107

23.2 Structured Analysis and Design 107

23.3 Flow Chart 107

Chapter No.24 Symbols used for flow charts 110

24.1 Symbols 110

24.2 Good Practices 114

24.3 Data Flow Diagram 115

Chapter No.25 Rules for DFD’s 118

25.1 Entity Relationship Diagram 120

25.2 Entity 123

25.3 Value Sets 124

25.4 Relationships 124

Chapter No.26 Symbols 126

26.1 Why need Object-Orientation? 127

26.2 Object Oriented Analysis 128

Chapter No.27 Object Oriented Analysis and Design 131

27.1 Object 131

27.2 Classes 131

27.3 Inheritance 131

27.4 Encapsulation 132

27.5 Polymorphism 132

27.6 What is Business Process Reengineering? 133

Chapter No.28 Critical Success Factors (CSF) 135

28.1 Sources of Critical Success Factors 135

28.2 CSF vs. Key Performance Indicator 135

28.3 Centralized vs. Distributed Processing 136

28.4 Web based Environment 137

28.5 Internet 138

Chapter No.29 Security of Information System 139

29.1 Security Issues 139

29.2 Security Objective 139

29.3 Scope of Security 140

29.4 Security Policy 140

29.5 Security Program 141

29.6 Identification of Assets 141

Chapter No.30 Threat Identification 143

30.1 Types of Threats 143

30.2 Control Analysis 143

30.3 Impact analysis 144

30.4 Risk Determination/Exposure Analysis 144

30.5 Occurrence of threat 145

30.6 Computing Expected Loss 146

Chapter No.31 Control Adjustment 147

31.1 Security to be cost effective 147

31.2 Roles & Responsibility 147

31.3 Report Preparation 148

31.4 Types of Threat 148

Chapter No.32 Unauthorized intrusion 149

32.1 Physical Access vs. Logical access 149

32.2 Viruses 149

32.3 Sources of Transmissions 150

32.4 Types of Viruses 150

32.5 Management procedural controls 151

32.6 Technical controls 151

Chapter No.33 Antivirus software 153

33.1 Scanners 152

33.2 Active monitors 152

33.3 Behavior blockers 152

33.4 Logical intrusion 152

33.5 Best Password practices 153

33.6 Firewall 154

Chapter No.34 Types of Controls 156

34.1 Access Controls 156

34.2 Cryptography 156

34.3 Biometrics 157

Chapter No.35 Audit trails and logs 159

35.1 Documentation 159

35.2 Audit trails and types of errors 160

35.3 Definition of Audit 160

35.4 IS audit 160

35.5 Parameters of IS audit 161

35.6 Risk Based Audit Approach 161

Chapter No.36 Risk Management 162

36.1 Phases of Risk Management 162

36.2 What is focal Point? 162

36.3 System Characterization 162

36.4 Steps in threat identification 163

36.5 Vulnerability Assessment 163

Chapter No.37 Control Analysis 166

37.1 Likelihood Determination 166

37.2 Impact Analysis 166

37.3 Risk Determination 167

37.4 Results Documentation 168

37.5 Implementation 168

37.6 Monitoring and evaluation 168

Chapter No.38 Risk Management 169

38.1 Corporate Culture and Risk Management 169

38.2 Constituents of Risk Management 169

38.3 Risk management 169

38.4 Business Continuity Planning 169

38.5 Components of BCP 170

38.6 Phases of BCP 170

38.7 Incident Management: 171

38.8 Business Impact Analysis (BIA) 171

38.9 Recovery Strategies 171

38.10 Development of Business Continuity and Disaster Recovery Plans 172

38.11 Monitoring 173

Chapter No.39 Web Security 174

39.1 Web Security Threats 174

39.2 Passive attacks 174

9.3 Active Attacks 174

39.4 Types of Active attacks 174

39.5 Threat Impact 175

39.6 Methods to avoid internet attacks: 175

Chapter No.40 Factors Encouraging Internet Attacks 177

40.1 Internet Security Controls 177

40.2 Firewall Security Systems 177

40.3 Intrusion Detection Systems (IDS) 178

40.4 Components of IDS 179

0.5 Web Server Logs 180

40.6 Web Security audits 180

40.7 Digital Certificates 181

Chapter No.41 E-Commerce 182

41.1 Why E-Commerce? 182

41.2 Commerce vs. E-Business 182

41.3 Business to Consumer (B2C) 183

41.4 Electronic Data Interchange (EDI): 184

41.5 E-Government 185

41.6 Other Forms of E-Commerce 186

41.7 M-Commerce 186

41.8 E-Business Opportunities 187

41.9 E-Business IT Risks 188

Chapter No.42 Supply Chain Management 191

42.1 Integrating systems 192

42.2 Methods of integration 192

42.3 Using SCM Software 193

42.4 Components of Supply Chain 193

42.5 Types of Supply Chains 194

Chapter No.43 Enterprise Resource Planning 195

43.1 Business Objectives and IT 195

43.2 Using ERP Software 195

43.3 ERP Compared to integrated Software 196

43.4 Evolution of ERP 197

43.5 ERP & Customer relationship management 199

Chapter No.44 ERP & E-commerce 200

44.1 ERP & CRM 200

44.2 Change management 201

44.3 Phases of Change Management 202

44.4 Change agent: 204

44.5 ERP– Ownership and sponsor ship: 204

Chapter No.45 Importance of ethics in IS 205

45.1 Meaning of Ethics 205

45.2 Ethical Challenges 205

45.3 Privacy and Ethics 206

45.4 Threats to Privacy 207

45.5 Electronic Surveillance 207

45.6 Data Profiling 208

45.7 Online Privacy and E-Commerce 208

45.8 Workplace Monitoring 208

45.9 TRIPS 210

45.10 Privacy Codes and Policies 210

Links:
geo news live

Copyright © 2008-2013 zainbooks All Rights Reserved