Вы находитесь на странице: 1из 77

Why are information systems essential in business today?

Describe four trends in the global business environment that have made information systems so important. The emergence of a global economy, transformation of industrial economies, transformation of the business enterprise, and the emergence of the digital firm make information systems essential in business today. These trends present the business firm and its management with several new challenges. Table 1-1 summarizes these challenges. As a growing percentage of the advanced industrial economies in the United tates, !urope, and Asia depends on imports and e"ports, information systems supply both communications and analytic instruments for engaging in trade and for managing businesses that are spread throughout the world. The ma#or industrial powers in the United tates, !urope, and Asia are being transformed from industrial economies to knowledge- and information-based service economies. $n these economies, information systems and technology have become critical to these economies, and in this day and age, they have become essential to economies that remain reliant upon manufacturing. %evelopment of the power and capabilities of information systems has transformed the possibilities for organizing and managing business enterprises. &usinesses of this style are less hierarchical 'flatter( and are more decentralized, allowing them to rely more on informal commitments and temporary task forces. )any managers have become more reliant upon individuals who report to them for decision making as these subordinates have more learning and current knowledge. Also, more and more under this transformation, companies are becoming more customer-oriented. The emerging technology and the organizational redesign that has accompanied it have created the condition for the emergence of the digital firm. *hile truly digital firms are still few and far between, they are growing in number. +erhaps more important right now, almost all larger firms and even many smaller ones have become reliant upon digital firm technology for much of their activity, including relations with customers and suppliers. Describe the capabilities of a digital firm. Why are digital firms so powerful? What are the four principal systems driving the movement toward digital firms? %igital firms e"tensively use $nternet technology for electronic commerce and electronic business to manage their internal processes and relationships with customers, suppliers, and other e"ternal entities. ,ore business processes, key corporate assets, and environmental responses are digitally managed. &ecause a digital firm relies heavily on information technology to enable, mediate, and streamline its internal and e"ternal operations, the firm is more fle"ible, profitable, competitive, and efficient than a traditional firm. upply chain management systems, customer relationship management systems, enterprise systems, and knowledge management systems are the four principal systems driving the movement toward digital firms. As the te"tbook suggests, these

four systems are where corporations are digitally integrating information flows and making significant information systems investments. What is an information system? Distinguish between a computer, a computer program, and an information system. What is the difference between data and information? An information system consists of interrelated components that work together to collect, process, store, and disseminate information to support decision making, coordination, control, analysis, and visualization in an organization. A computer system is the physical e-uipment used for input, processing, and output activities in an information system. ,omputer programs provide the computer with necessary instructions on how to process the data into information. %ata are raw facts. these raw facts, in their current form, are not in a useful format. $nformation is data that have been processed into a useful, meaningful form. $t is important for students to recognize that computers and information systems are not e-uivalent. $t is important to stress that information systems have management, organization, and technology dimensions. ,omputers and programs are technology components of an information system. *ithout addressing the organization and management dimensions, the technology components are relatively useless. /or instance, you can purchase a computer and software, but unless you have determined how the technology will be used to help manage and organize your work, you essentially have a decorative bo" for your desk. What activities convert raw data to usable information in information systems? What is their relationship to feedback? $nput captures raw data, processing converts the data into a more meaningful form, and output transfers the processed information to people or activities where it will be used. ome of the output will be used to correct any problems found and also to provide feedback that will then be used to evaluate the data. What are the functions of an information system from a business perspective? What role do they play in the business information value chain? $nformation systems facilitate the ac-uisition, transformation, and distribution of information. $nformation systems can improve decision making, enhance organizational performance, and help increase firm profitability, thus contributing to corporate value. What is information systems literacy? How does it differ from computer literacy? $nformation systems literacy is a broad-based understanding of information systems. $n contrast, computer literacy is limited to understanding computers. $nformation systems literacy includes the behavioural understanding of the organization and management dimensions of information systems as well as the technological dimensions. What are the organization, management, and technology dimensions of information systems?

0rganization1 $nformation systems are part of organizations, and in some cases 'such as credit card companies and financial information services(, they are the organization. $nformation systems will have the 0+s and the culture of an organization embedded within them. )anagement1 $nformation systems supply tools and information needed by managers to allocate, coordinate and monitor their work, make decisions, create new products and services, and make long-range strategic decisions. Technology1 )anagement uses technology 'hardware, software, storage, and telecommunications( to carry out their functions. $t is one of the many tools managers use to cope with change. Distinguish between a behavioural and a technical approach to information systems in terms of the questions asked and the answers provided. What ma or disciplines contribute to an understanding of information systems? A behavioural approach to information systems focuses on -uestions such as strategic business integration, behavioural problems of systems utilization, system design and implementation, social and organizational impacts of information systems, political impacts of information systems, and individual responses to information systems. olutions to problems created by information technology are primarily changes in attitudes, management, organizational policy, and behaviour. A technical approach to information systems emphasizes mathematically-based models to study information systems and the physical technology and formal capabilities of information systems. tudents should know the differences between computer science 'theories of computability, computation methods, and data storage and access methods(, management science 'development of models for decision making and managerial practice(, and operations research 'mathematical techni-ues for optimizing organizational parameters such as transportation, inventory control and transaction costs(. What is the relationship between an organization and its information systems? How has this relationship changed over time? 2otable changes occurring over time include a growing interdependence between the organization and its information systems and a movement from primarily technical changes to include both managerial and institutional changes. There is a growing interdependence between the organization and its information systems. 0ften, a change in the business3s strategy, rules, or procedures re-uires changes in the information systems software, hardware, databases, and telecommunications. An organization4s present and future accomplishments depend in many respects on what its systems will permit it to do now and later. Also, system pro#ects are increasing in reach and scope. *hereas early information systems addressed primarily technical or operational issues, contemporary information systems are integral to the management and strategic goals of the firm. Today information systems affect a much larger part of the organization itself, such as organizational products, ob#ectives, and structure. )ore and more business activities at all levels involve the use of information systems.

What are the !nternet and World Wide Web? How have they changed the role played by information systems in organizations? The $nternet is an international network of hundreds of thousands of public and private networks with over 566 million people connected in over 766 countries working in science, education, government, and business. $ndividuals and organizations use the $nternet to e"change information and perform business transactions with other individuals and organizations around the globe. $t should be noted that the digital firm uses the $nternet as its primary technology platform. The *orld *ide *eb is a system with universally accepted standards for storing, retrieving, formatting, and displaying information in a networked environment. The *eb is a part of the $nternet and provides a graphically-based system of pages for storing information on the $nternet. The $nternet and the *orld *ide *eb have had a tremendous impact on the role information systems play in organizations. The $nternet and the *orld *ide *eb are responsible for increased connectivity and collaboration within and outside the organization. The $nternet, the *orld *ide *eb, and other technologies have led to the redesign and reshaping of organizations. The $nternet and the *orld *ide *eb have helped transform the organization3s structure, scope of operations, reporting and control mechanisms, work practices, work flows, and products and services. Describe some of the ma or changes that information systems are bringing to organizations. $nformation systems are driving both daily operations and organizational strategy. +owerful computers, software, and networks, including the $nternet, have helped organizations become more fle"ible, eliminate layers of management, separate work from location, and restructure work flows, giving new powers to both line workers and management. The flattening of organizations is probably one change that students are likely to cite, particularly with the concern over downsizing. The parallel increase in information and in the decision power of line workers 'empowerment( has also increased the workers4 corresponding work satisfaction as management span of control is broadened. The empowering of the line worker means managers can spend more time thinking more strategically. How are information systems changing the management process? ,ontemporary information systems are providing managers with powerful new tools for more precise planning, forecasting, and monitoring, allowing them to respond more -uickly to changes in the market for a product or in production conditions. ystems also give managers new tools for communicating with their subordinates so that they can manage larger numbers of people across greater distances than in the past.

What is the relationship between the network revolution, the digital firm, electronic commerce, and electronic business? The $nternet and other networks have made it possible for the firm to replace manual and paper-based processes with the electronic flow of information. This change can enable many companies ultimately to become digital firms. The digital firm uses the $nternet and digital technology to e"pedite the e"change of information and facilitates communication and coordination both inside the organization and between the organization and its partners. *ithout this linkage of buyers and sellers through networks and the $nternet, there would be no way to transmit the many transactions of the electronic market, which would leave buyers and sellers to depend on paper transactions with their time delays, inaccuracies, and e"penses. !-business, the use of $nternet technologies to facilitate an organization4s internal processes, also facilitates e-commerce, the e"ternal transactions facilitated by $nternet technologies. Together, ebusiness and e-commerce move firms closer to being truly digital. What are interorganizational systems? Why are they becoming more important? How have the !nternet and Web technology affected these systems? $nterorganizational systems automate the flow of information across organizational boundaries, linking a company to its customers, distributors, or suppliers, and sometimes even their competitors. $nterorganizational systems allow companies to electronically conduct transactions with different companies. This enables companies to respond more -uickly to market demands and to lower transaction costs. )oreover, companies can work #ointly and more -uickly and fully with partners to design, produce, and sell products. This method can result in higher levels of efficiency and value to customers and even result in a significant competitive advantage. The *eb and the $nternet can lower cost for all those involved, even making it possible for small companies to participate where they might not if costs were higher. What do we mean by information architecture and information technology infrastructure? Why are they important concerns for managers? The information architecture of the organization is the particular form or design that information technology assumes in a specific organization to achieve selected goals or functions. $t is a design for the business application systems that serve each functional specialty and level of the organization and the specific ways that they are used by each organization. ,ontemporary information architectures are increasingly designed around business processes and clusters of system applications spanning multiple functions and organizational levels. The firm4s information technology '$T( infrastructure provides the technology platform for this architecture and consists of computer hardware, software, data and storage technology, and networks along with the human resources re-uired to operate the technology. &ecause managers and employees directly interact with these systems, it is important for the company now and in the future that the information architecture and $T infrastructure meet the business re-uirements of the company and that the systems can work together where needed.

What are the key management challenges involved in building, operating, and maintaining information systems today? The te"tbook identifies five key management challenges, including the strategic business challenge, globalization challenge, information architecture and infrastructure challenge, information systems investment challenge, and the responsibility and control challenge. The strategic business challenge encourages students to realize that they must be able to use information technology to design organizations so that they are competitive, effective, and digitally-enabled. The globalization challenge facing students is that they know how firms can understand the systems re-uirements of a global environment. The information architecture and infrastructure challenge is that students must be able to help their organizations develop an information architecture that is able to support the company goals when both the business conditions and the technologies are changing so rapidly. The information systems investment challenge is for students to know how their organization can determine the business value of systems. /inally, the responsibility and control challenge is for students to understand how organizations can ensure that their information systems are used in an ethically and socially responsible way. What is an organization? "ompare the technical definition of organizations with the behavioural definition. The technical definition for an organization defines an organization as a stable, formal social structure that takes resources from the environment and processes them to produce outputs. The technical definition of an organization focuses on three elements1 capital and labor, production, and products for consumption. The technical definition also implies that organizations are more stable than an informal group, are formal legal entities, and are social structures. The behavioural definition states that an organization is a collection of rights, privileges, obligations, and responsibilities that are delicately balanced over a period of time through conflict and conflict resolution. This definition highlights the people within the organization, their ways of working, and their relationships. The technical definition shows us how a firm combines capital, labor, and information technology. The behavioural definition e"amines how information technology impacts the inner workings of the organization. The behavioural definition is the more realistic of the two. What features do all organizations have in common? !n what ways can organizations differ? Table 8-8 summarizes the common and uni-ue features of organizations. ,ommon features for organizations include formal structure, standard operating procedures, politics, and culture. 0rganizations can differ in their organizational type, environments, goals, power, constituencies, function, leadership, tasks, technology, and business processes.

How are information technology services delivered in organizations? Describe the role played by programmers, systems analysts, information systems managers, and the chief information officer #"!$%. $nformation services are usually designed, developed, and operated through information systems departments which are assigned the responsibilities of maintaining the hardware, software, data storage, and networks that comprise the firm4s information technology infrastructure. %epending on the size of the organization, and thus its information systems department, the department includes programmers, systems analysts, telecommunications and network specialists, and operations staff. +rogrammers are the people who actually write or create the computer instructions. ystems analysts are the liaison between the users of an information system and the people who create it. The information systems managers are the leaders of various specialists in the information systems department. The chief information officer ',$0( is the overall manager of the information systems department who sets policies and the direction for the information systems department. The ,$0 is at the same level as the chief operating officer ',00( and the chief financial officer ',/0( in the organization. !ach of these officers is responsible for part of the organization3s operation. The ,!0, ,/0, and ,$0 help to set policy for the firm. Describe the ma or economic theories that help e&plain how information systems affect organizations. The two economic theories discussed in the book are transaction cost theory and agency theory. Transaction cost theory is based on the notion that a firm incurs transaction costs when it buys on the marketplace rather than making products for itself. Traditionally, firms sought to reduce transaction costs by getting bigger, hiring more employees, vertical and horizontal integration, and small-company takeovers. $nformation technology helps firms lower the cost of market participation 'transaction costs( and helps firms shrink in size while producing the same or greater amount of output. Agency theory views the firm as a ne"us of contracts among interested individuals. The owner employs agents 'employees( to perform work on his or her behalf and delegates some decision-making authority to the agents. Agents need constant supervision and management, which introduces management costs. As firms grow, management costs rise. $nformation technology reduces agency costs by providing information more easily so that managers can supervise a larger number of people with fewer resources. Describe the ma or behavioural theories that help e&plain how information systems affect organizations. &ehavioural theories, from sociology, psychology, and political science are useful for describing the behaviour of individual firms. &ehavioural researchers theorize that information technology could change the decision-making hierarchy by lowering the costs of information ac-uisition and distribution. $T could eliminate middle managers and their clerical support by sending information from operating units directly to senior management and by enabling information to be sent directly to lower-level operating

units. $t even enables some organizations to act as virtual organizations because they are no longer limited by geographic locations. 0ne behavioural approach views information systems as the outcome of political competition between organizational subgroups. $T becomes very involved with this competition because it controls who has access to what information, and information systems can control who does what, when, where, and how. Why is there considerable organizational resistance to the introduction of information systems? There is considerable organizational resistance to new information systems because they change many important organizational dimensions, such as culture, structure, politics, and work. 9eavitt put forth a model that says that changes in technology are absorbed, deflected, and defeated by organizational task arrangements, structures, and people. $n this model the only way to bring about change is to change the technology, tasks, structure, and people simultaneously. $n a second model, the authors speak of the need to :unfreeze: organizations before introducing an innovation, -uickly implementing the new system, and then :refreezing: or institutionalizing the change. "ompare the descriptions of managerial behaviour in the classical and behavioural models. The classical model suggests that managers perform five classical functions. These functions are planning, organizing, coordinating, deciding, and controlling. Although the classical model describes formal managerial functions, it does not provide a description of what managers actually do. The behavioural models suggest that managerial behaviour is less systematic, more informal, less reflective, more reactive, less well-organized, and somewhat frivolous. The behavioural models differ from the classical model in that managers perform a great deal of work at an unrelenting pace, managerial activities are fragmented, managers prefer speculation, managers prefer oral forms of communication, and managers give the highest priority to maintaining a diverse and comple" web of contacts. What specific managerial roles can information systems support? Where are information systems particularly strong in supporting managers, and where are they weak? Table 8-; compares managerial roles with the support systems. $nformation systems support the liaison, nerve center, disseminator, spokesperson, and resource allocator roles. ,urrently information systems do not support the figurehead, leader, entrepreneur, disturbance handler, and negotiator roles. $nformation systems are the strongest at the informational role and the weakest at the interpersonal and decisional roles. What are the four stages of decision making described by 'imon? imon3s four stages of decision making include intelligence, design, choice, and implementation. %uring the intelligence stage, organizational problems are identified and understood. %uring the design stage, possible alternative solutions to the problem

are conceived. %uring the choice stage, a choice is made from the possible alternatives. %uring the implementation stage, the decision is put into effect, and the solution3s progress is reported. "ompare individual and organizational models of decision making. $ndividual models of decision making assume that human beings are in some sense rational although there are a number of individual models. The rational model assumes that individuals can identify goals, rank all possible alternatives, and then select the alternative that contributes the most. <owever, some research finds that this process is too comple", that individuals cannot possibly specify all alternatives, much less select the best. =esearch suggests that systematic decision makers structure the decision based on some formal method. 0n the other hand, intuitive decision makers use many different approaches and use trial and error to find a solution. 0rganizational decision making considers the structural and political characteristics of an organization. 0rganizational models suggest that decisions are not made individually, but are made by groups or the organization. The bureaucratic model of decision making suggests that decisions are shaped by the organization3s standard operating procedures. The political models of decision making suggest that decisions result from competition and bargaining among the organization3s interest groups and key leaders. The :garbage can: model suggests that organizations are not rational and that decisions are solutions that become attached to problems for accidental reasons. What is the impact of the !nternet on organizations and the process of management? The $nternet increases the accessibility, storage, and distribution of information and knowledge for organizations. nearly any information can be available anywhere at any time. The $nternet increases the scope, depth, and range of information and knowledge storage. $t lowers the cost and raises the -uality of information and knowledge distribution. that is, it lowers transaction and information ac-uisition costs. &y using the $nternet, organizations may reduce several levels of management, enabling closer and -uicker communication between upper levels of management and the lower levels. The $nternet also lowers agency costs. What is a strategic information system? What is the difference between a strategic information system and a strategic(level system? A strategic information system is a computer system at any organizational level that fundamentally changes the goals, operations, products, services, or environmental relationships of organizations, in effect changing the very nature of the firm4s business. $n contrast, strategic-level systems provide long-term planning information to senior e"ecutives. trategic information systems are more far-reaching and deeply rooted and fundamentally transform the organization itself. Describe appropriate models for analyzing strategy at the business level and the types of strategies and information systems that can be used to compete at this level.

9ow-cost producer, product differentiation, and focused differentiation are three generic strategies available at the business level. $f a business pursues the low-cost producer strategy, it can evaluate its value chain to identify primary and secondary activities where information technology can effectively help the business obtain a competitive advantage. trategic information systems help a company offer its products and services at a lower cost than its competitors, or strategic information systems enable the company to provide more value at the same cost as its competitors. trategic information systems enable the company to improve its internal value chain, as well as establish tight, efficient linkages with its suppliers, customers, and business partners. Additionally, a company can participate in a value web. /irms pursuing a product differentiation strategy use information systems to create new products and services. These products and services are not easily duplicated by competitors, and therefore, the company does not need to compete on the basis of cost. A company pursuing a focused differentiation strategy develops new market niches for its specialized products and services. The company competes in this target market by offering its products and services in a superior manner. A company can use strategic information systems to :mine: for information about a particular market or group of customers. The strategic information systems enable the company to analyze customer buying patterns, tastes, and preferences. ,ompanies can use their strategic information systems to establish tight linkages to customers and suppliers. ,ompanies can use their strategic information systems to create efficient customer response systems, switching costs, and in some instances, stockless inventories. Describe appropriate models for analyzing strategy at the firm level and the types of strategies and information systems that can be used to compete at this level. A firm is typically a collection of businesses which are organized financially as a collection of strategic business units. $nformation systems can enhance the integration of separate units into a whole 'synergy(. Also, information systems can allow different business units to share information in the organization4s core competencies. How can the competitive forces model, information partnerships, and network economics be used to identify strategies at the industry level? These industry-level models help a company answer the key strategic -uestion of ><ow and when should we compete with as opposed to cooperate with others in the industry?@ /irms can form information partnerships and even link their information systems to achieve uni-ue synergies. An information partnership enables companies to #oin forces without actually merging by sharing information. /or e"ample, these partnerships can help firms gain access to new customers as can be seen in the partnership between Air ,anada and ,$&,.

The competitive forces model e"plains the interaction of e"ternal influences 'threats and opportunities( that affect an organization3s strategy and ability to compete. The threats include new entrants into the market, pressure from substitute products and services, bargaining power of customers and suppliers, and positioning of traditional industry competitors. $nformation systems are used at this level to develop industrywide standards for e"changing information or business transactions, create value webs, and create industry-wide, $T-supported consortia, symposia, and communications networks for coordinating activities. Traditionally, the more any given resource is applied to production, the lower the marginal gain, until additional inputs do not produce additional outputs 'the law of diminishing returns(. <owever, some situations e"ist where adding additional participants adds almost nothing to costs. 0ne common e"ample is when the telephone company adds another person to its network. The company has almost no additional continuing costs. /inding such opportunities will benefit a company. /or e"ample, )icrosoft ,orporation supports a community of software developers around the world who support local companies in making better use of )icrosoft products. Adding an additional developer, or many new developers, costs )icrosoft almost nothing. The network economics model suggests that in a network the addition of another participant entails zero marginal costs but can create much larger marginal gain. /or instance, the $nternet can be used to build :communities of users.: How have the value chain and competitive forces models changed as a result of the !nternet and the emergence of digital firms? $nternet technology has enabled a firm to e"tend the concept of its value chain to include all of the firm4s suppliers and business partners into a single web. The main reason for this is that the $nternet greatly reduces the cost of connecting online with partners. This enables companies to work directly with companies around the world and with companies too small to build their own international network. The same is true with digital firms because they essentially e"ist mainly because they can operate over the $nternet. imilarly, because of the $nternet and digital firms, corporations find it cheaper and easier to relate to suppliers and customers, enabling the company to meet a competitive problem identified using the competitive forces model. The competitive forces model has also changed in the $nternet era because firms do not #ust compete with each other within the same industry. they compete as part of industry sets. Why are strategic information systems difficult to develop? Why are competitive advantages so hard to maintain? trategic information systems are difficult to develop because they can entail massive sociotechnical changes within the organization. 0rganizational boundaries between the firm and its customers and suppliers and between departments within the organization usually must be broken down. 2ew relationships among parts of the company and with customers and suppliers must be redefined. ometimes entirely new organizational structures may need to be developed. Also, resistance to such changes may e"ist because these changes impact responsibilities and #obs.

,ompetitive advantages are hard to maintain because first-mover advantages are easily eroded by the competition, who can come to the market at a lower cost with appro"imately the same product or service as the first-mover company. !ven companies that have a competitive advantage must continually seek more competitive advantages. this process is known as strategic intent. !dentify and describe the four levels of the organizational hierarchy. What types of information systems serve each level? /rom lowest to highest, the four levels of the organizational hierarchy are operational, knowledge, management, and strategic. Types of information systems include transaction processing systems, office systems, knowledge work systems, decisionsupport systems, management information systems, and e"ecutive support systems. Transaction processing systems, such as order tracking, payroll, machine control, and compensation, serve the operational level. !ngineering workstations, word processing, graphics workstations, managerial workstations, document imaging, and electronic calendars are e"amples of knowledge work systems and office systems that serve the knowledge level. ales region analysis, cost analysis, annual budgeting, and relocation analysis are e"amples of decision-support systems and management information systems. )any of these systems are programs that students learn in their management science or -uantitative methods courses. ome are based on database management systems. !"amples of e"ecutive support systems that serve the strategic level are sales trend forecasting, operating plan development, budget forecasting, profit planning, and manpower planning. )ist and briefly describe the ma or types of systems in organizations. Transaction processing systems, office systems, knowledge work systems, decisionsupport systems, management information systems, and e"ecutive support systems are the ma#or types of systems in organizations. Transaction processing systems function at the operational level of the organization. !"amples of transaction processing systems include order tracking, order processing, machine control, plant scheduling, compensation, and securities trading. Anowledge work systems help create and integrate new knowledge within the organization. !"amples of knowledge work systems include engineering workstations, managerial workstations, and graphics workstations. 0ffice systems help increase data worker productivity and include word processing, document imaging, and electronic calendars. )anagement information systems provide managers with reports based primarily on data pulled from transaction processing systems, have an internal orientation, and have limited fle"ibility. !"amples of management information systems include sales management, inventory control, and capital investment analysis. %ecision-support systems function at the management level and provide analytical models and data analysis tools to provide support for semistructured and unstructured decision-making activities. !"amples of decision-support systems include sales region analysis, cost analysis, and contract cost analysis.

!"ecutive support systems function at the strategic level, support unstructured decision making, and use advanced graphics and communications. !"amples of e"ecutive support systems include sales trend forecasting, budget forecasting, and personnel planning. The systems form a hierarchy of systems, with all types either formatting, filtering, or processing the information from a lower level. /or instance, the office systems provide reports or presentations based on the information or data in transaction processing systems. %ecision-support and e"ecutive support systems often use office systems in presenting information e"tracted from transaction processing systems and management information system. )anagement information systems depend on data from transaction processing systems. ome systems, including knowledge work systems, decision-support systems, and e"ecutive support systems may use e"ternal information, such as stock market information and design information from suppliers. What are the five types of *+' in business organizations? What functions do they perform? ,ive e&amples of each. The five types of transaction processing systems include salesBmarketing systems, manufacturingBproduction systems, financeBaccounting systems, human resources systems, and other types. /igure 7-; identifies and provides e"amples for each type of transaction processing system. alesBmarketing systems provide sales management, market research, promotion, pricing, and new product functions. !"amples include sales order information systems, market research systems, and sales commission systems. )anufacturingBproduction systems provide scheduling, purchasing, shippingBreceiving, engineering, and operations functions. !"amples of manufacturing systems include machine control systems, purchase order systems, and -uality control systems. /inanceBaccounting systems provide budgeting, general ledger, billing, and cost accounting functions. !"amples of financeBaccounting systems include general ledger, accounts receivableBpayable, and funds management systems. <uman resource systems provide personnel records, benefits, compensation, labor relations, training, and payroll functions. !"amples include employee records, benefit systems, and career path systems. 0ther types include admissions, grade records, course records, and alumni for a university. !"amples of transaction processing systems for a university include a registration system, student transcript system, and an alumni benefactor system. Describe the functions performed by knowledge work systems and office systems and some typical applications of each. Anowledge work systems 'A* ( aid knowledge work professionals to create new information and knowledge, and ensure that new knowledge and technical e"pertise are properly used in their corporations. !"amples of knowledge workers 'and some of their software( include engineers 'graphics workstations(, stock traders, analysts and arbitrageurs 'financial and stock market workstations(, research scientists, doctors, and designers ',A% systems(. 0ffice systems provide support for data workers, including secretaries, accountants, filing clerks, and some managers. oftware e"amples include word processing, desktop publishing, presentation programs, electronic calendars, and document imaging.

What are the characteristics of -!'? How do -!' differ from *+'? .rom D''? )$ support the management level by providing routine summary reports and e"ception reports for various purposes, including planning, controlling, and decision making. !"amples include sales and profit per customer and per region, relocation summary and analysis, inventory control, capital investment analysis, and even a report on students who were enrolled in the autumn but did not return in the spring. )$ differs from T+ in that )$ deals with summarized and compressed data from the T+ and usually routine analysis of that summarized data. %ecision-support systems provide material for analysis for the solution of semistructured problems, which often are uni-ue or rapidly changing. Typically, they provide the ability to do >what if@ analysis. *hile )$ have an internal orientation, % will often use data from e"ternal sources, as well as data from T+ and )$ . % support >right now@ analysis rather than the long-term structured analysis of )$ . )$ are generally not fle"ible and provide little analytical capabilities. $n contrast, % are designed for analytical purposes and are fle"ible. What are the characteristics of D''? How do they differ from those of /''? % provide sophisticated analytical models and data analysis tools to support semistructured and unstructured decision-making activities. % use data from T+ , )$ , and e"ternal sources, provide more analytical power than other systems, combine data, and are interactive. ! support senior managers with unstructured strategic-level decision making. They may be less analytical than % with less use of models such as linear programming or forecasting. <owever, they often rely on e"ternal data and rely heavily on graphics. Describe the relationship between *+', office systems, 0W', -!', D'', and /''. The various types of systems in the organization e"change data with one another. T+ are a ma#or source of data for other systems, especially )$ and % . T+ are operational-level systems that collect transaction data. !"amples of these are payroll or order processing that track the flow of the daily routine transactions that are necessary to conduct business. T+ provide data that are re-uired by office systems, A* , )$ and % , although these systems may also use other data. A* and office systems not only use data from T+ but also from )$ . % not only use data from T+ but also from A* , office systems, and )$ . )$ rely heavily on data from T+ but also use data from A* and office systems. ! obtain most of their internal data from )$ and % . What is a business process? ,ive two e&amples of processes for functional areas of the business and one e&ample of a cross(functional process. &usiness processes are the ways in which organizations coordinate and organize work activities, information, and knowledge to produce their valuable products or services. &usiness processes for the manufacturing and production area include product assembly, -uality checking, and producing bills of materials. /or the sales and

marketing area, business processes include identifying customers, making customers aware of the product, and selling the product. /or finance and accounting, business processes includes paying creditors, creating financial statements, and managing cash accounts. /or human resources, business processes include hiring employees, evaluating #ob performance of employees, and enrolling employees in benefits plans. The order fulfillment process is an e"ample of a cross-functional process. As /igure 716 illustrates, the order fulfillment process involves activities performed by sales, accounting, and manufacturing functions. Why are organizations trying to integrate their business processes? What are the four key enterprise applications for organization(wide process integration? An organization operates in an ever-increasingly competitive global environment. 0perating in a global environment re-uires an organization to focus on the efficient e"ecution of its processes, customer service, and speed to market. To accomplish these goals, the organization must e"change valuable information across different functions, levels, and business units. &y integrating its processes, the organization can more efficiently e"change information among its functional areas, business units, suppliers, and customers. The four key enterprise applications are enterprise systems, supply chain management systems, customer relationship management systems, and knowledge management systems. What are enterprise systems? How do they change the way an organization works? !nterprise systems integrate the key business processes of an organization into a single software system. %ata from various functional areas are maintained centrally where they can be accessed and used by other functions and cross-functional processes. This changes the work flow of an organization. 2ow information can seamlessly flow throughout the organization, improving coordination, efficiency, and decision making. What are the benefits and challenges of implementing enterprise systems? !nterprise systems are firm-wide information systems that integrate key business processes so that information can flow freely between different parts of the firm. !nterprise systems help create a more uniform organization in which everyone uses similar processes and innovation and measures their work in terms of organizationwide performance standards. !nterprise systems are very difficult to successfully implement and once implemented, are very difficult to change. !nterprise systems re-uire e"tensive organizational change, use complicated technologies, and re-uire large up-front costs for long-term benefits that are difficult to -uantify.

What is supply chain management? What activities does it comprise? Why is it so important to businesses? How do information systems facilitate supply chain management? upply chain management is the close linkage of activities involved in the processes of buying, making, and moving a product. upply chain management is important to a business because through its efficiency it can coordinate, schedule, and control the delivery of products and services to customers. upply chain management closely links and coordinates activities in buying, making, and moving a product. The system should lower costs and streamline the user4s business. $nformation systems make supply chain management more efficient by helping companies coordinate, schedule, and control procurement, production, inventory management, and delivery of products and services to customers. $nformation systems help organizations achieve great efficiencies by automating parts of these processes or by helping organizations rethink and streamline these processes. What is collaborative commerce? How can organizations benefit from it? /or supply chain management to work, an atmosphere of trust must e"ist among supply chain members. )embers need to work together on a common goal, and they must redesign appropriate business processes so they can more easily coordinate their activities. ,ollaborative commerce uses digital technologies to enable the members of the supply chain to collaboratively design, develop, build, and manage products through their lifecycles. $t helps the various partners to integrate their systems with each other. Aside from gaining benefits from having a successful supply chain, they also benefit by achieving new levels of efficiency in reducing product design cycles, minimizing e"cess inventory, forecasting demand, and keeping all partners informed. How can organizations benefit from participating in private industrial networks? +rivate industrial networks are *eb-enabled networks that permit firms and their business partners to share such activities as product design and development, marketing, inventory, production scheduling, and communications, including graphics, ,A% drawings, and e-mail. &enefits include the ability to reduce inventory, product cycle time, inventory costs, and system costs. +rivate industrial networks also improve the coordination and sharing of information and provide the ability to track a product from raw materials to the customer, track demand, ad#ust production, and ad#ust the timing and size of deliveries, as well as monitor product availability, production capacity, and inventory levels. What is customer relationship management? Why is it so important to businesses? How do information systems facilitate customer relationship management? ,ustomer relationship management is a business and technology discipline to coordinate all of the business processes for dealing with e"isting and potential customers. *ith the growth of the *eb, potential customers can easily comparison shop for retail and wholesale goods and even raw materials, so better treatment of

customers has become very important. Cood ,=) systems consolidate customer data from multiple sources and provide analytical tools for answering -uestions such as1 *hat is the value of a particular customer to the firm over his or her lifetime? ,=) tools integrate the firm4s customer-related processes and consolidate customer information from multiple communication channels, so that the firm can put one coherent face to the customer. What is the role of knowledge management systems in the enterprise? What organizational processes are supported by knowledge management applications? Anowledge management systems codify knowledge and e"perience, make the collected knowledge and e"perience available when and where it is needed, and provide links to e"ternal sources of knowledge. 0rganizational processes include creating knowledge, discovering and codifying knowledge, sharing knowledge, and distributing knowledge. Anowledge work systems support knowledge creation. artificial intelligence systems support knowledge discovery and codification. group collaboration systems support knowledge sharing, and office and communication tools support knowledge distribution. What are the advantages of using the !nternet as the infrastructure for electronic commerce and electronic business? The $nternet is an international network of networks connecting many millions of people from well over 166 countries. $t is the largest information superhighway in the world. The $nternet provides a universal and easy-to-use set of technologies and standards that can be adopted by all organizations, no matter what computer system or information technology platform they are using. provides a much lower cost and easier-to-use alternative for coordination activities than proprietary networks. reduces organizational transaction and agency costs. increases communication, including electronic mail, online forums, and chatting. provides access to increased information and information retrieval from many thousands of online databases around the world. and increases market potential with online offerings of information and products through the easy-to-use *orld *ide *eb. How is the !nternet changing the economics of information and business models? The $nternet radically reduces the cost of creating, sending, and storing information while making that information more widely available. The $nternet reduces search costs, allowing customers to locate products, suppliers, prices, and delivery terms. The $nternet enables companies to collect and analyze more detailed and accurate information about their customers, allowing these companies to better target market their products and services. The $nternet shrinks information asymmetry and has transformed the richness and reach of information. $t can help companies create and capture profits in new ways by adding e"tra value to e"isting products and services. $t also provides the foundation for new products and services. 1ame and describe si& !nternet business models for electronic commerce. Distinguish between a pure(play !nternet business model and a clicks(and( mortar business model.

Table ;-7 identifies eight $nternet business models. These models are virtual storefront, information broker, transaction broker, online marketplace, content provider, online service provider, virtual community, and portal. Dirtual storefronts sell physical products directly to consumers or individual businesses. $nformation brokers provide product, pricing, and availability information to individuals and businesses. they generate revenue from advertising or from directing buyers to sellers. The transaction broker saves users money and time by processing online sale transactions and generates a fee each time. The online marketplace provides a digital environment where buyers and sellers meet, search for and display products, and establish prices for those products. it can provide online auctions and reverse auctions. A content provider creates revenue by providing digital content, such as digital news, music, photos, or video over the *eb. The online service provider provides online services for individuals and businesses and generates revenue from subscription or transaction fees and from advertising. The virtual community provides an online meeting place where people with similar interests can communicate and find useful information. The portal provides an initial point of entry to the *eb along with specialized content and other services. A pure-play business model is based purely on the $nternet. A clicks-and-mortar business model has a *eb site that is an e"tension of a traditional bricks-and-mortar business. 1ame and describe the various categories of electronic commerce. The three ma#or types of electronic commerce are business-to-consumer '&7,(, business-to-business '&7&(, and consumer-to-consumer ',7,(. &usiness-toconsumer involves retailing products and services to individual shoppers. &arnesand2oble.com is an e"ample of business-to-consumer electronic commerce. &usiness-to-business involves the sale of goods and services among businesses. )illpro.com provides business-to-business electronic commerce. ,onsumer-toconsumer involves consumers selling directly to consumers. An e"ample of consumerto-consumer electronic commerce is e&ay.com. !lectronic commerce transactions can also be classified based on the participants4 physical connections to the *eb. +articipants can use wired networks or mobile commerce. How can the !nternet facilitate sales and marketing to individual customers? Describe the role played by Web personalization. The $nternet enables a company to create closer, cost-effective relationships with its customers. The company can use the $nternet to provide information, service, support, and in many instances, the product over the *eb. The $nternet facilitates direct sales over the *eb, interactive marketing and personalization, and customer self-service. The $nternet digitally enables the firm. The firm can link to customers and suppliers so that electronic commerce, automating business-to-business transactions such as invoices, purchase orders, and sometimes payments 'digital cash and electronic funds transfer(, is economically and technically feasible.

$n many instances, the customer can purchase a product or service from a company3s *eb site. A *eb site also allows potential customers to obtain information about the products, distributors, and service centres. The information about distributors allows a company to use the *eb site to market, while avoiding channel conflict. A /AE 'fre-uently asked -uestions( list can allow support for the product without tying up phone lines with common, easily answered -uestions. /AEs can raise customer comfort with the product and the company. *eb personalization directly tailors the *eb content to the specific user and at a low cost. +ersonalization helps firms form a lasting relationship with an individual customer. How can the !nternet help provide customer service? ,ustomer service starts with the ease customers have in researching products themselves and then the ease of purchasing. Then, when the product has arrived 'whether it is a digital product delivered over the $nternet or a physical product delivered by mail or e"press delivery(, the customer can obtain help on its usage over the $nternet, often very easily. As was noted in -uestion 5, /AEs provide support for easy -uestions, such as instructions for assembly or use of products or services. Answers to -uestions can be e-mailed from the *eb site without making customers wait for telephone support. )any customers are happy with an answer even if it takes eight hours to receive as long as they know they are going to get it. /urther, with chat or $nternet telephony linked to the site, customers can talk to representatives. )any vendors, such as %ell, have people assigned to answer the -uestions or complaints of users. The $nternet is also an easy, fast way to place orders because it reduces conversation, misunderstanding, errors, and time. How can !nternet technology support business(to(business electronic commerce? &usiness-to-business transactions can occur via a company3s *eb site, net marketplace, or private e"change. *eb sites make it easy to sell and buy over the $nternet, compare suppliers, products, and prices, and even find out how others feel about the product. /urther, supply chain linkages through intranets and e"tranets can support F$T, reduce cycle times, and support other practices of continuous improvement. &ecause of the ease and efficiencies brought by the $nternet, businessto-business participants can save a significant amount of money and time.

What are 1et marketplaces? Why do they represent an important business model for 232 e(commerce? How do they differ from private industrial networks? A net marketplace is a single digital marketplace based on $nternet technology linking many buyers to many sellers. The net marketplace is an important business model for &7& e-commerce because some net marketplaces serve vertical markets for specific industries and other net marketplaces serve horizontal markets, selling goods that are available in many different industries. Also, net marketplaces can sell either direct goods or indirect goods. 2et marketplaces are more transaction-oriented and less relationship-oriented than private industrial networks. 1ame and describe the principal electronic payment systems used on the !nternet. Table ;-8 summarizes the electronic payment systems. The electronic payment systems discussed in the chapter include digital credit card payment, digital wallet, accumulated balance payment, stored value payment systems, digital cash, peer-topeer payment systems, digital checking, and electronic billing presentment and payment. %igital credit card payment systems provide secure services for credit card payments on the $nternet and protect information transmitted among users, merchant sites, and processing banks. %igital wallets store credit card and owner identification information and provide these data automatically during electronic commerce purchase transactions. Accumulated balance payment systems accumulate micropayment purchases as a debit balance that must be paid periodically on credit card or telephone bills. tored value payment systems enable customers to make instant online payments from a value stored in a digital account. A smart card is a credit-card-size plastic card that stores digital information and can be used for electronic payments. %igital cash is an electronic form of currency, moves outside the normal network of money, and is used for micropayments or larger purchases. A peer-to-peer payment system is an electronic payment system for people who want to send money to vendors or individuals who are not set up to accept credit card payments. A digital check is an electronic check with a secure digital signature. An electronic billing presentment and payment system is used to pay routine monthly bills. it allows users to view their bills electronically and pay them through electronic funds transfers from bank or credit card accounts. Why are intranets so useful for electronic business? Table ;-; summarizes the organizational benefits of intranets. $ntranet benefits include connectivity from most computing platforms, and they can be tied to internal corporate systems and core transaction databases. $ntranets can create interactive applications with te"t, audio, and video, are scalable to larger or smaller computing platforms as re-uirements change, are easy-to-use, provide a universal *eb interface, have low start-up costs, are richer and provide a more responsive information environment, and reduce information distribution costs.

How can intranets support organizational collaboration? 0rganizations are using intranets to create enterprise collaboration environments. =egardless of location, intranets allow organizational members to e"change ideas, share information, and work together on common pro#ects and assignments. Describe the uses of intranets for e(business in sales and marketing, human resources, finance and accounting, and manufacturing. Tables ;-5 to ;-G provide e"amples of how intranets are used in the functional areas. $n sales and marketing, intranets help oversee and coordinate the activities of the sales force. The sales force can obtain updates on pricing, promotions, rebates, customers, and competitors. The sales force can also access presentation and sales documents, which they can customize for specific customers. $n the human resources area, intranets keep employees informed of company issues and policies, allow employees to access and update their personnel records, and take online competency tests. /urther, #ob postings and internal #ob information can be made available to employees. !mployees can enroll in health care, benefit plans, or company training seminars. $n finance and accounting, intranets provide an online, integrated view of financial and accounting information in an easy-to-use format. $n the manufacturing area, intranets integrate comple" information across plant floors or many plants, particularly in managing work flow and process control. How can companies use !nternet technology for supply chain management? ,ompanies can use $nternet technology for supply chain management to simplify, integrate, and electronically coordinate business processes that span more than one functional area or span the business processes of other companies. integrate procurement, production and logistics processes to supply goods and services from their source through to delivery to the customer. improve the coordination among their internal supply chain processes, as well as coordinate the shared supply chain processes of business partners. support the instant communication between all members of the supply chain. provide online collaboration. provide a -uicker, more accurate response to customer demand. tap into suppliers4 systems to see inventory and production capabilities. monitor customers4 order status. share production, scheduling, inventory, forecasting and logistics information. communicate up-to-date manufacturing information to suppliers. and obtain customer feedback. Describe the management challenges posed by electronic commerce and electronic business on the !nternet. !lectronic commerce and electronic business pose several management challenges, including inade-uate security, given the sensitive and proprietary nature of information that people might want to communicate through the 2et. e-commerce and e-business re-uire careful orchestration of the firm4s divisions, production sites, and sales offices, as well as closer relationships with customers, suppliers, and other business partners in its network of value creation. technology problems, including the lack of standards, the growing need of bandwidth, inade-uate telecommunications facilities in many less developed countries, and the abundance of data without the technical ability yet to search for and locate it -uickly and easily. lack of clarity on many critical legal -uestions that affect the transmission of data nationally and internationally. unproven

business models. and control and coordination problems, particularly in e"tranets and business-to-business sites. What is channel conflict? Why is it becoming a growing problem in electronic commerce? ,hannel conflict is competition between two or more different distribution chains used to sell the products or services of the same company. /or e"ample, channel conflict occurs when a company with an established sales force begins to sell over the $nternet. 2eedless to say, the sales staff will be loath to sell or support the products of a company that directly competes with them. )ore and more organizations are feeling pressure to offer direct sales over the $nternet by the purchasers of their products and by competitive pressure. tudents may see that this will not be limited to for-profit firms alone but may be a problem for not-for-profit organizations also. The local <abitat for <umanity or =ed ,ross chapter may not be happy or even able to function if local donors are giving to the national <abitat for <umanity or =ed ,ross instead of the local charities. What are the features of the new information technology infrastructure? /igure H-1 demonstrates the new information technology infrastructure. The information technology infrastructure consists of a mi"ture of computer hardware supplied by different vendors, including mainframes, +,s, and servers which are networked to each other. The infrastructure also gives more processing power to the desktop through client-server computing and mobile personal information devices that provide remote access to the desktop from outside the organization. The new $T infrastructure is highly networked and promotes the flow of information across the enterprise. $t also incorporates public infrastructures, such as telephone systems, the $nternet, and public network services. The $nternet plays a critical role in the new infrastructure, serving as the principal communication channel with customers, employees, vendors, and distributors. Why is connectivity so important for the digital firm? )ist and describe the ma or connectivity standards for networking and the !nternet. ,onnectivity is a measure of how well computers and computer-based devices can communicate with one another and share information in a meaningful way without human intervention. $t is essential in enterprise networking in the new information technology infrastructure, where different hardware, software, and network components must work together to transfer information seamlessly from one part of the organization to another. ,hapter H discusses open systems, Transmission ,ontrol +rotocolB$nternet +rotocol 'T,+B$+(, 0pen ystems $nterconnect '0 $(, *ireless Application +rotocol '*A+(, and *ireless )arkup 9anguage '*)9(. 0pen systems are built on public, nonproprietary operating systems, user interfaces, application standards, and networking protocols. The T,+B$+ model is based on a five-layer reference model, and is used by the $nternet. The 0 $ model is an alternative, seven-layer model developed by the $nternational tandards 0rganization for linking different types of computers and networks and is designed to support global networks with large volumes of transaction

processing. *A+ is a system of protocols and technologies that lets cell phones and other wireless devices with tiny displays, low-bandwidth connections, and minimal memory access *eb-based information services. *)9 is a markup language for wireless *eb sites. it is based on I)9 and optimized for tiny displays. What is the !nternet? )ist and describe alternative ways of accessing the !nternet. The $nternet is an international network of networks connecting hundreds of millions of people. The $nternet is the primary infrastructure for e-commerce, e-business, and the digital firm. $ndividuals access the $nternet through $nternet service providers, popular online services or through their company3s network. An individual cannot access the $nternet directly. $nstead an individual with a computer e-uipped with a modem pays a small fee to an $nternet ervice +rovider to access the $nternet. +eople can also subscribe to popular online services, such as America 0nline and )icrosoft 2etwork. Alternatively, people who are part of an organization with its own network that is connected to the $nternet can access the $nternet through the organization3s network. $t is also important to point out that individuals use a variety of client platforms to retrieve information from the $nternet. Table H-1 summarizes these platforms. these platforms include a +,, 2et +,, smart phone, video game console, +%A, wireless email handheld, and a TD $nternet receiver. )ist and describe the principal !nternet capabilities. Table H-7 identifies the ma#or $nternet services. These services include e-mail, Usenet newsgroups, 9$ T !=Ds, chatting, Telnet, /T+, and the *orld *ide *eb. !-mail supports person-to-person messaging and document sharing. Usenet groups are forums in which people share information and ideas on a defined topic through large electronic bulletin boards where anyone can post messages on the topic for others to see and to which others can respond. 9$ T !=Ds conduct online discussions by using e-mail broadcast from mailing list servers. ,hatting refers to live, interactive conversations that are conducted over a public network. Telnet is a network tool that allows someone to log on to one computer system while doing work on another. /T+ is a tool for retrieving and transferring files from a remote computer. The *orld *ide *eb is a system of universally accepted standards for retrieving, formatting, and displaying information. Describe the capabilities of ne&t generation networks, including "a41et 5? How do they differ from those of the e&isting public !nternet? What benefits can they provide? ,aJnet 8 is based on dense wave division multiple"ing '%*%)( technology, which e"pands the information carrying capacity of individual optical fibres by multiple"ing a number of wavelengths of laser light. ,aJ2et 8 makes it easier to deliver highbandwidth applications, such as videoconferencing, video on demand, and multimedia. The $nternet was not designed to handle the huge -uantities of data that are flowing through its interconnected networks. !"perimental national research networks attempt to address this problem by providing test beds for leading-edge technology for

research institutions, universities, and corporations. The technologies enable companies to distribute video, audio, three-dimensional simulations, and life-size video teleconferencing without performance degradation. Table H-8 describes K2!T, *elsh Dideo 2etwork, Asia +acific Advanced 2etwork, and ,A2A=$!. Why is the World Wide Web so useful for individuals and businesses? The *eb is central to the rapid growth of the $nternet because of its universally accepted standards for storing, retrieving, formatting and displaying information using clientBserver architecture. $t can handle all types of digital communication anywhere in the world. $t is now critical to people who want to retrieve information and communicate with others wherever they are. ince it no longer matters where documents are stored, people can easily switch from document to document and site to site. Define and describe the following6 home page, uniform resource locator #78)%, !nternet telephony, virtual private network #9+1%, and voice portal. A home page is the first page that a visitor reaches when he visits an organization3s *eb site. The home page is a *orld *ide *eb te"t and graphical screen display that welcomes the user and e"plains the organization that has established the page. A U=9 is the address of a specific resource on the $nternet. $nternet telephony refers to technologies that use the $nternet +rotocol3s packet-switched connections for voice service. A virtual private network is a secure connection between two points across the $nternet to transmit corporate data. A voice portal is a portal that can accept voice commands for accessing information from the *eb. )ist and describe alternative ways of locating information on the Web. *eb site directories, search engines, and :push: technology are the principle methods for locating information. *ith *eb site directories, individuals and organizations submit sites of interest. these sites of interest are then preclassified. To locate a site of interest, a keyword's( is used to locate all preclassified pages and categories that have the keyword's( appearing in their titles. A search engine does not re-uire *eb site preclassification. The search engine automatically searches *eb pages on its own. The *eb pages are usually displayed based on a ranking method. +ush technology broadcasts information directly to the user based on prespecified interests. hopping bots should also be mentioned since they can help people interested in making a purchase filter and retrieve information about products of interest, evaluate competing products according to criteria they have established, and negotiate with vendors for price and delivery terms. What are intranets and e&tranets? How do they differ from the Web? $ntranets are internal *eb sites for a company or organization. they are protected from public visits by a firewall. They use the same <T)9 and T,+B$+ technology and standards as the *orld *ide *eb. $ntranets are used to communicate within the organization and to share information. !"tranets are private intranets that are outside the main firewall set up for the benefit of the organization and authorized e"ternal users, such as suppliers. What is the Wireless Web? How does it differ from the conventional Web?

The *ireless *eb enables users to access digital information from the $nternet and be connected anywhere, any time, and any place using wireless mobile computing devices. pecialized portals steer users of *eb-enabled wireless devices to the information they are most likely to need. The *ireless *eb is an entirely new medium, allowing new content and services to be delivered to the individual. 0ntario +atient Transfer is an e"ample of how one company uses the *ireless *eb to better coordinate its logistics and fleet of patient transport vehicles. +erhaps one of the most e"citing capabilities of the *ireless *eb is its ability to provide location-based services. )ist and describe the types of m(commerce services and applications supported by the Wireless Web. Table H-5 summarizes popular m-commerce services and applications, including information-based services, transaction-based services, and personalized services. $nformation-based services include instant messaging, e-mail, and searching for a movie or restaurant by using a cell phone or handheld +%A. Transaction-based services include purchasing stocks, concert tickets, music, or games. searching for the best price of an item using a cell phone, and then buying the item in a physical store or on the *eb. +ersonalized services are services that anticipate what you want based on your location or data profile, such as updated airline flight information or beaming coupons for nearby restaurants. "ompare the W:+ and !(mode Wireless Web standards. *A+ and $-mode are two competing standards for accessing information from the *ireless *eb. *ireless Application +rotocol '*A+( is a system of protocols that lets cell phones and other wireless devices with tiny displays, low bandwidth connections, and minimal memory access *eb-based information and services. *A+ uses *)9, which is based on I)9 and optimized for tiny displays. *A+ uses a dial-up connection. mode was developed by Fapan4s 2TT %o,o)o mobile phone network. $t uses compact <T)9 to deliver content, making it easier for businesses to convert their <T)9 *eb sites to mobile service. $-mode uses packet switching, allowing users to be constantly connected to the network and content providers to broadcast relevant information to users. $-mode can handle colour graphic displays.

)ist and describe the principal technologies for supporting electronic commerce and electronic business. The principal technologies for supporting electronic commerce and electronic business are *eb server and electronic software, customer tracking and personalization tools, *eb content management tools, and *eb site performance monitoring tools. *eb servers are the software necessary to run *eb sites, intranets, and e"tranets. *eb servers locate and manage stored *eb pages. !-commerce server software provides functions essential for running e-commerce *eb sites. These functions include setting up electronic storefronts and electronic catalogues to display product and pricing information. designing electronic shopping carts so customers can collect the items they wish to purchase. making shipping arrangements. linking to electronic payment processing systems. displaying product availability and tracking shipments. and connecting to back-office systems where necessary. ,ustomer tracking and personalization tools collect and store data on the behaviour of online customers and combine that data with data already stored in the company3s back-office systems, analyze the data in order to better understand the behaviour of online customers, and identify customer preferences and trends. *eb content management tools are software to facilitate the collection, assembly, and management of content on a *eb site, intranet, or e"tranet. *eb performance monitoring tools monitor the time to download *eb pages and perform *eb transactions, identify broken links between *eb pages, and pinpoint other *eb site problems and bottlenecks. 7nder what conditions should firms consider Web hosting services? ,ompanies that lack the financial or technical resources to operate their own *eb sites or electronic commerce services can use *eb hosting services. *eb hosting services offer solutions to small companies that do not have the resources to operate their own *eb sites or companies that are still e"perimenting with e-commerce. 9arge companies that want 7; hour global availability and sophisticated *eb sites might also choose a hosting service. Describe five problems posed by the new !* infrastructure. 9oss of management control over information systems, connectivity and application integration challenges, the need for organizational change, the hidden costs of enterprise computing, and the difficulty of ensuring infrastructure scalability, reliability, and security are five problems posed by the new $T infrastructure. %ata and software are no longer confined to the mainframe environment and under the management of the traditional information systems department. $nstead data and software may reside on many different computing platforms, leading to the loss of management control. $ncompatible networks and standards, as well as connectivity problems with wireless networks, can lead to connectivity and application integration problems. Therefore, application integration is difficult to achieve for many firms. The movement to enterprise-wide computing re-uires organizational changes in the organizational culture and structure. These changes can be difficult and time

consuming to make. !nterprise computing can result in higher, une"pected costs. 0ften more time for network maintenance, data backup, technical problem solving, and updates of hardware and software are often needed. !nterprise computing re-uires an infrastructure that can rapidly scale to meet future demands, provides high levels of performance for mission-critical applications, and offers secure access to authorized individuals both inside and outside the company. Describe some solutions to the problems posed by the new !* infrastructure. +ossible solutions include planning for and managing business and organizational changes. increasing end-user training. asserting data administration disciplines. and considering connectivity, application integration, bandwidth, and cost controls in technology planning. !n what ways are ethical, social, and political issues connected? ,ive some e&amples. !thics refers to principles of right and wrong which individuals use to guide their behaviour. $ndividuals act within a social environment that, in turn, e"ists within a political environment. !thical dilemmas are problems that affect society and that often are addressed in the political arena. /or e"ample, new computer technology makes it easier to gain private information about individuals, creating an ethical dilemma for the potential user of that information 'whether or not to invade the privacy of the individual(. ociety will respond by demanding new laws to regulate the use of data. tudents will be able to give a range of e"amples of this connection. What are the key technological trends that heighten ethical concerns? Table 5-1 identifies the four key technology trends. These trends include computer power doubling every 1G months, the rapid decline in data storage costs, data analysis advances, and networking advances and the $nternet. The doubling of computing power every 1G months is creating a growing dependence on systems and a conse-uent vulnerability to system errors, poor data -uality, and failure of critical systems. Advances in data storage techni-ues and rapidly declining storage costs provide for massive data storage capabilities on individual systems and enable the routine violation of individual privacy. Advances in datamining techni-ues for large databases allow those who are able to dominate supercomputing capacity 'large businesses and governments( to increase their power over individuals through the analysis of massive amounts of data about individuals. Advances in telecommunications infrastructure allow the movement of massive amounts of data at greatly reduced cost, permitting the duplication and use of data and, as a result, the invasion of privacy on a scale and precision unimaginable to us now. What are the differences between responsibility, accountability, and liability? =esponsibility means that you accept the potential costs, duties, and obligations for the decisions you make. Accountability is a feature of systems and social institutions that allows the determination of who is responsible. 9iability is a feature of political systems that permits individuals to recover damages done to them by responsible individuals or organizations.

What are the five steps in an ethical analysis? The five steps in an ethical analysis are outlined in the )anager3s Toolkit. The five steps include '1( identify and describe clearly the facts. '7( define the conflict or dilemma and identify the higher order values involved. '8( identify the stakeholders. ';( identify the options you can reasonably take, and '5( identify the potential conse-uences of your options. !dentify and describe si& ethical principles. The si" ethical principles include the golden rule, $mmanuel Aant3s ,ategorical $mperative, %escartes3 rule of change, the Utilitarian +rinciple, the =isk Aversion +rinciple, and the ethical :no free lunch: rule. The Colden =ule suggests doing unto others as you would have them do unto you. Aant3s ,ategorical $mperative suggests that if an action is not right for everyone to take, then it is not right for anyone. %escartes3 rule of change, also known as the >slippery slope rule@, suggests that if an action cannot be taken repeatedly, then it is not right to be taken at any time. The Utilitarian +rinciple suggests taking the action that achieves the higher or greater value. The =isk Aversion +rinciple suggests taking the action that produces the least harm or the least potential cost. The ethical :no free lunch: rule says that virtually all tangible and intangible ob#ects are owned by someone unless there is a specific declaration otherwise. What is a professional code of conduct? *hen groups of people claim to be professionals, they subscribe to special rights and obligations. As professionals, they enter into even more constraining relationships with employers, customers, and society because of their special claims to knowledge, wisdom, and respect. +rofessional codes of conduct are promulgated by associations of professionals in order to regulate entrance -ualifications and competencies and to establish codes of ethics and practice. What are meant by ;privacy; and ;fair information practices<? +rivacy is the claim that individuals have the right to be left alone, free from surveillance or interference from other individuals or organizations, including the state. ,laims to privacy involve the workplace as well as the home. $nformation technology threatens individual claims to privacy by making the invasion of privacy cheap, profitable, and effective. /air information practices '/$+( is a set of principles governing the collection and use of information about individuals. The five /$+ principles are1 '1( noticeBawareness. '7( choiceBconsent. '8( accessBparticipation. ';( security. and '5( enforcement. How is the !nternet challenging the protection of individual privacy? ,ookies, *eb bugs, and other means of collecting information about $nternet users can be used or shared without the $nternet user3s consent. This allows information that a user may have given voluntarily for a good purpose, say logging into the Winnipeg

Free Press site, to be shared with some other site. pamming or e-mail that spoofs a user4s e-mail address is another invasion of privacy. What role can informed consent, legislation, industry self(regulation, and technology tools play in protecting individual privacy of !nternet users? $nformed consent means that the *eb site visitor knowingly permits the collection of data about his or her and his or her visit to the company3s *eb site. /ederal privacy laws help regulate the collection, usage, and disclosure of information in ,anada. Table 5-8 lists several of the federal privacy laws in the United tates. &usinesses have taken some steps, including publishing statements about how their information will be used and sometimes offering an opt-out right. <owever, few businesses offer an opt-in approach. everal technology tools are available to combat privacy invasion. Technical solutions enable e-mail encryption, anonymous e-mailing and surfing, and cookie re#ection. Table 5-; lists several privacy tools. 0f particular interest is the +8+ standard that allows the user to have more control over personal information that is gathered on the *eb sites that he or she visits. What are the three different regimes that protect intellectual property rights? What challenges to intellectual property rights are posed by the !nternet? Three different legal traditions that protect property rights are trade secret, copyright, and patent. A trade secret is any intellectual work product used for a business purpose that can be classified as belonging to that business, provided it is not based on information in the public domain. The drawback to trade secret protection is that once an idea falls into the public domain, it can no longer be protected as a trade secret. A copyright is a statutory grant that protects creators of intellectual property against copying by others for any purpose for a period of 76 years. The drawback of this protection is that underlying ideas are not protected, only their manifestations in a work. A patent grants the owner a monopoly on the ideas behind an invention for 76 years. *hile patent protection does grant a monopoly on the underlying concepts and ideas, the difficulty is passing stringent criteria of non-obviousness, originality, and novelty. The $nternet makes it very easy to widely distribute and reproduce intellectual property. Why is it so difficult to hold software services liable for failure or in ury? $t is very difficult, if not impossible, to hold software producers liable for their software products because it is only when software acts as a part of a defective product that strict liability pertains. $f the software is strictly a service 'not part of a product(, these laws do not apply. As part of a product, software is still considered to be like books, which historically are protected from liability claims by the /irst Amendment guaranteeing freedom of e"pression. What is the most common cause of system quality problems? The three principal sources of system -uality problems are hardware and facility failures, software bugs and errors, and data -uality. <owever, the most common cause of system -uality problems is data -uality. According to the 1HHG =edman study cited in the te"tbook, individual organizations report data error rates ranging from 6.5 to 86 percent.

1ame and describe four ;quality of life; impacts of computers and information systems. The te"tbook describes eight :-uality of life: impacts of computers and information systems. These include balancing power, rapidity of change, maintaining boundaries, dependency and vulnerability, computer crime and abuse, employment, e-uity and access, and health risks. &alancing power describes the shift toward highly decentralized computing, coupled with an ideology of :empowerment: of thousands of workers and decentralization of decision making to lower organizational levels. The problem is that the lower-level worker involvement in decision making tends to be trivial. Aey policy decisions are as centralized as in the past. The rapidity of change impact suggests that information systems have increased the efficiency of the global marketplace. As a result, businesses no longer have many years to ad#ust to competition. &usinesses can now be wiped out very rapidly, and along with them, #obs. The maintaining boundaries impact suggests that portable computers and telecommuting have created the condition where people can take their work anywhere with them and do it at any time. As a result, workers find that their work is cutting into family time, vacations, and leisure, weakening the traditional institutions of family and friends and blurring the line between public and private life. The dependency and vulnerability impact suggests that businesses, governments, schools, and private associations are becoming more and more dependent on information systems, and so they are highly vulnerable to the failure of those systems. The computer crime and abuse impact suggests that computers have created new opportunities for committing crimes and have themselves become the target of crimes. The employment impact suggests that redesigning business processes could potentially cause millions of middle-level managers and clerical workers to lose their #obs. *orse, if reengineering actually works as claimed, these workers will not find similar employment because the demand for their skills will decline. The e-uity and access impact suggests that access to computer and information resources is not e-uitably distributed throughout society. Access is distributed ine-uitably along racial, economic, and social class lines 'as are many other information resources(. +oor children attending poor school districts are less likely to use computers at school. ,hildren from wealthy homes are five times more likely to use +,s for schoolwork than poor children. *hite children are more likely to use computers at home for schoolwork than 2ative children. +otentially, we could create a society of information haves and have-nots, further increasing the social cleavages in our society. <ealth risks have been attributed to computers and information technologies. /or instance, business now spends L76 billion a year to compensate and treat victims of

computer-related occupational diseases. Those illnesses include = $ 'repetitive stress in#ury(, ,D 'computer vision syndrome(, and technostress. What is technostress, and how would you identify it? Technostress is defined as stress induced by computer-use. $ts symptoms are aggravation, hostility towards humans, impatience, and enervation. 1ame three management actions that could reduce 8'!. )anagement can reduce = $ 'repetitive stress in#ury( by using workstations 'mainly keyboards( designed for a neutral wrist position 'using a wrist rest to support the wrist(. Use of proper monitor stands and footrests will contribute to proper posture and so reduce = $, as will allowing 'or re-uiring( employees to take fre-uent breaks from their work to walk around. /inally, use of new, ergonomically designed keyboards will also help. What are the components of a contemporary computer system? The ma#or components of a contemporary computer system are the central processing unit ',+U(, primary storage, secondary storage, input devices, output devices, and communication devices. /igure K-1 shows the hardware components of a computer system. 1ame the ma or components of the "+7 and the function of each. The control unit and the arithmetic-logic unit are the ma#or ,+U components. The control unit of the ,+U coordinates and controls the other parts of the computer system. $t reads a stored program and directs other components of the computer system to perform the tasks re-uired by the program. The arithmetic-logic unit performs the principal logical and arithmetic operations of the computer. $t can add, subtract, and determine when one -uantity is greater or lesser than another -uantity, or when they are e-ual. Distinguish between serial, parallel, and massively parallel processing. erial processing processes one instruction at a time, using one processing unit ',+U(. +arallel processing processes a number of instructions simultaneously by the use of multiple processing units ',+Us(. The problem to be processed is broken down into smaller parts and various ,+Us each work on one part. +arallel processing uses a small number of powerful, e"pensive, and specialized chips. *ith massively parallel processing, huge networks of hundreds or thousands of ine"pensive, commonly used processor chips are interwoven in comple" and fle"ible ways to work on a computing problem. )ist the most important secondary storage media. What are the strengths and limitations of each? The most important secondary storage media are magnetic disk, optical disk, and magnetic tape. )agnetic disks are the most widely used secondary storage medium

and include floppy and hard disks. )agnetic disks are convenient to use, permit direct access to individual records, are reasonably priced, and provide fast access speeds. /loppy disks are removable and portable, yet are limited in their storage capacities. <ard drives provide fast access to data and larger storage capacities. =A$% technology packages more than 166 smaller disk drives with a controller chip and specialized software in a single larger unit to deliver data over multiple paths simultaneously. 0ptical disks store data at far greater densities than conventional magnetic disks, making them valuable for storing vast -uantities of data such as reference materials or documents. There are several types of optical disk systems. ,%-=0) is read-only storage, *0=) allows users to record data only once, ,%-=* allows users to rewrite data to the disk, and %D% is a high-capacity optical storage medium, capable of storing a minimum of ;.M gigabytes of data. $nformation stored on magnetic tape is more time consuming to access than information stored on a magnetic disk. )agnetic tape se-uentially stores and accesses information, and each reel of tape must be individually mounted and dismounted. Tape storage is cheaper than disk, useful for batch applications 'such as payroll(, and for archiving large -uantities of data that do not re-uire immediate usage. Tape storage is also more stable than disk storage. '%isk packs can crash and disks must be backed up to record the transactions that have occurred.( %isk technology is most useful for online applications where direct access is re-uired and for databases where interrelationships among records e"ist. )ist and describe the ma or computer input and output devices and the types of ports. Table K-7 lists the ma#or input and output devices. $nput devices include the keyboard, computer mouse, touch screen, optical character recognition, magnetic ink character recognition, pen-based input, digital scanner, audio input, sensors, and radio fre-uency identification. 0utput devices include display screen monitors, printers, and audio output. The keyboard is the principal method of data entry. The computer mouse is a handheld device with point-and-click capabilities. &y moving the mouse around on the desktop, the user can position the cursor. 0nce positioned, the user can press one of the mouse buttons to communicate a command to the system. Touch screens allow the user to touch the surface of a sensitized video display monitor with a finger or a pointer to make a selection. 0ptical character recognition '0,=( devices translate specially designed marks, characters, and codes into digital form. )agnetic ink character recognition ')$,=( readers read magnetic characters on documents such as bank checks. +en-based input devices are mainly handwriting recognition devices used on touch-sensitive screens and are often seen with package delivery people. %igital scanners translate images such as pictures or documents into digital form. Audio input devices compare the electrical patterns produced by the speaker3s voice to a set of prerecorded patterns and accept the sounds when a pattern is recognized. ensors are devices that collect data directly from the environment for input into a computer system. =adio fre-uency identification use tags that incorporate microchips to transmit information about items and their location to special =/$% readers.

A display screen monitor or ,=T displays the output on a screen much like a television set. +rinters produce printed copy of information output by the computer. There are impact printers 'dot matri"( and non-impact printers 'laser, ink#et, or thermal transfer(. Audio output devices are voice output devices that convert digitally stored words into intelligent speech. +orts provide connections to the central computer unit for peripheral devices, such as printers, modems, flash card readers, digital cameras, and synchronizing devices for +%As. erial ports send signals along the serial cable one bit at a time while parallel ports send their signals along parallel cables multiple bits at a time, much faster than serial connections. U & and /irewire ports are much faster than serial and parallel ports. U & technology permits the >daisy-chaining@ of up to 17M devices through the use of U & hubs. What is the difference between batch and online processing? Diagram the difference. &atch processing involves grouping transactions together and then processing these transactions at some later point to update a master file. 0nline processing involves entering a transaction directly into the computer and processing it immediately. *ith online processing, information in the system is always up-to-date and current. /igure K-K compares and contrasts batch and online processing. What is multimedia? What technologies are involved in multimedia? )ultimedia integrates two or more types of media, such as graphics, sound, voice, full motion video, still video, or animation into a computer-based application. ,urrent technologies include computer, high-resolution monitors, audio, video, graphics, and streaming technologies. ,%-=0) and %D% are important storage technologies for multimedia. What is the difference between a mainframe, a minicomputer, a server, and a +"? 2etween a +" and a workstation? The difference between these machines depends, to some degree, on size. The mainframe is bigger and faster, has more storage, and can allow more users than a +,. &ig A B;66s are really mainframes. A big, fast +, with superior graphics capability is not much, if any, different from a workstation. )idrange computers are middle-sized and have larger memory, storage, and are multi-user. +,s are for single users, as are workstations. A server can be a mainframe or desktop computer, but specialized server computers are often used in the role. ervers store and process shared data. They also perform back-end functions not visible to users. An e"ample is managing network activities. *orkstations have faster speeds, better graphics capability, and bigger monitors than +,s. As the te"t e"plains, the lines between the types of computers are blurring. "ompare the client(server, network computer, and peer(to(peer models of computing. The term client-server refers to a model for computing that splits processing between :clients: and :servers: on a network, assigning functions to the machine most able to

perform the function. /igure K-M shows how client-server works. A network computer is a thin client with minimal memory, storage, and processor power. A network computer does not store software or data. The peer-to-peer computing model is a form of distributed processing that links computers via the $nternet or private networks so that they can share processing tasks. !ach computer, or peer, is considered e-ual in terms of responsibilities, and each acts as a server to the others in the network. Unlike the client-server model, a dedicated file server is not re-uired. <owever, network performance is generally not as good as with the client-server, especially under heavy loads. What are the ma or types of software? How do they differ in terms of users and uses? The ma#or types of software are system software and application software. ystem software is concerned with the operating system, a special set of computer programs to manage and control the central processing unit and its peripheral e-uipment. ystem software acts as an intermediary between other software and the physical computer. Application software is a set of programs for accomplishing specific tasks or business functions re-uired by end users. !nd users use application software to perform activities such as word processing, *eb page development, and data management. What is the operating system of a computer? What does it do? What roles do multiprogramming, virtual storage, time sharing, and multiprocessing play in the operation of an information system? The operating system manages and controls the general computing environment and the activities of the computer system. $t allocates and assigns computer resources 'such as primary memory, input and output devices, and telecommunications links(, schedules computer resources and #obs, and monitors computer system activities. )ultiprogramming is an operating system capability that permits multiple programs to share a computer system3s resources at the same time. 0nly one program is actually using the ,+U at any moment, but the computer3s input and output facilities and portions of primary memory can be allocated to other programs. Although only one program is using the ,+U at any one moment, multiple programs can be e"ecuting concurrently. Dirtual storage is a way of ma"imizing primary memory capacity for storing software programs or for primary storage to deal with programs that re-uire more memory than is available. $n virtual storage, a single program is broken down into a number of sections called pages, each of which has a relatively small size. ince only a section of a program is resident in primary memory, many more programs can be processed with limited primary memory, since the programs can be broken down into pages. Time sharing is an operating system capability that enables many users to share computer resources at the same time. !ach user uses the ,+U for a tiny slice of time 'appro"imately 7 milliseconds(, but many users can be simultaneously connected to a ,+U. )ultiprocessing links together two or more ,+Us to work in parallel in a single computer system.

)ist and describe the ma or +" operating systems. Table K-; lists and describes the ma#or +, operating systems. The table provides information about *indows I+, *indows HGB)e, *indows 7666, *indows ,!, U2$I, 9inu", 0 B7, +alm 0 , )ac 0 , and %0 . Nou should focus student understanding on the facilities and powers of the different operating systems, the age of the systems, and the fact that )ac 0 is an operating system for a different machine. )ist and describe the ma or application programming languages for business. How do they differ from fourth(generation languages? Table K-5 summarizes the ma#or application programming languages, including ,0&09, ,, ,OO, /0=T=A2, &A $,, +ascal, and assembly language. ,0&09 ',0mmon &usiness 0riented 9anguage( was developed in the early 1HK6s. $t was designed with business in mind. $t is used for processing large data files with alphanumeric characters and for performing repetitive tasks such as payroll. $t is poor at comple", mathematical calculations. , and ,OO are powerful and efficient languages developed at ATPT4s &ell 9abs. They combine machine portability with tight control and efficient use of computer resources. ,OO is ob#ect-oriented. /0=T=A2 '/0=mula translator( is useful in processing numeric data and is used primarily for scientific and engineering applications. &A $, and +ascal are used primarily in the teaching of programming. Assembly language resembles machine language, but it substitutes mnemonics for 1s and 6s, making it easier to program 'although it is perhaps the most difficult language(. Assembly language is designed for a specific machine and specific microprocessors. /ourth-generation languages are sophisticated languages that enable end users to perform programming tasks with little or no professional programmer assistance. They also enhance the productivity of professional programmers. /or e"ample, very highlevel programming languages, -uery languages, or application generators have features that can be employed by end users or less skilled programmers and can dramatically increase application development productivity. The seven categories of fourth-generation tools are +, software tools, -uery languages, report generators, graphics languages, application generators, application software packages, and very high-level programming languages. Table K-K provides a brief description of these categories. The main differences between fourth-generation tools and conventional programming languages are the degree of user-friendliness and the ability to perform the same functions with fewer lines of program instructions. )any fourth-generation languages are nonprocedural or less procedural than conventional languages. What is ob ect(oriented programming? How does it differ from conventional software development? 0b#ect-oriented programming combines data and specific procedures that operate on that data into an ob#ect. $nstead of passing data to procedures, programs send a message for an ob#ect to perform a procedure that is already embedded in it. +rogrammers can focus on what they want an ob#ect to do, and the ob#ect decides

how to do it. !ach ob#ect is an independent software building block that can be used in many different systems without changing the program code. $n traditional programming, data and procedures are treated as independent components and are not combined as in ob#ect-oriented programming. A separate programming procedure must be written every time someone wants to take an action on a particular piece of data. +rocedures act on data the program passes to them. What are =ava, H*-), >28), and >-)? "ompare their capabilities. Why are they important? Fava is a programming language that delivers only the software functionality needed for a particular task. *ith Fava, the programmer writes small programs called applets that can run on another machine on a network. *ith Fava, programmers write programs that can e"ecute on a variety of operating systems and environments. /urther, any program could be a series of applets which are distributed over networks as they are needed and as they are upgraded. <T)9 '<yperte"t )arkup 9anguage( is the language of the *eb. $t is the language that is used to write *eb pages, or as the te"t says, the page description language for *eb pages. $t is based on C)9, standard generalized markup language, which was originally a mainframe-based page markup language. The hyperte"t part of the language is in the links to other *eb pages or sites. $t has become significant because of the importance of the *orld *ide *eb. )ost documents on the *orld *ide *eb are written in <T)9. I)9, eItensible )arkup 9anguage, is another standard which is an e"tension of <T)9 that allows content which is live and more structured, thereby allowing manipulation of data. I&=9 'eItensible &usiness =eporting 9anguage( is a variant on I)9, with tags defined to permit analysis of business reports. 0ther such markup languages are being developed, too. They are important because the *eb is important, and because they provide a standard format for data e"change and for *eb page descriptions. 1ame and describe the most important +" productivity software tools. The most important and widely used +, productivity software includes word processing, spreadsheet, data management, presentation graphics, integrated software packages, e-mail, *eb browsers, and groupware. *ord processing software allows users to make changes in documents electronically in memory, eliminating the need to retype entire pages to make corrections. $t often includes advanced features such as spelling checkers and thesaurus programs. preadsheets provide computerized versions of traditional financial modeling tools such as the accountant3s columnar pad. preadsheets are composed of a grid of columns and rows and are good at performing calculations on interrelated pieces of data. %ata management software is used for creating and manipulating lists and for combining information from different fields. %ata management software typically has facilities for creating files and databases to store, modify, and manipulate data for reports and -ueries. +resentation graphics software allows users to create

professional -uality graphics presentations. $ntegrated software packages combine the functions of the most important microcomputer software packages, such as spreadsheets, word processing, graphics, and data management. !-mail software is used for computer-to-computer e"change of messages. $t is an important tool for communication and collaborative work. *eb browsers are easy-to-use software tools for accessing the *eb and the $nternet. Croupware provides functions and services that support the collaborative activities of work groups. 1ame and describe the kinds of software that can be used for enterprise integration. !nterprise software, middleware, and enterprise application integration software are kinds of software that can be used for enterprise integration. !nterprise software consists of a set of interdependent modules for applications such as sales and distribution, financial accounting, investment management, materials management, production planning, plant maintenance, and human resources that allow data to be used by multiple functions and business processes for more precise organizational coordination and control. The modules can communicate with each other directly or by sharing a common repository of data. ,ontemporary enterprise systems use a clientserver computing architecture. )a#or enterprise software vendors include A+, 0racle, +eople oft, and &aan. These vendors are now enhancing their products to provide more capabilities for supply chain management and e"change of data with other enterprises. )iddleware connects two disparate applications, allowing them to communicate with each other and to e"change data. !nterprise application integration software ties together multiple applications to support enterprise integration. !nterprise application integration software allows system developers to graphically model systems and define rules that the applications should follow to make the processes work. Then the software will generate the underlying program instructions to link the e"isting applications to each other. )ist and describe the principal issues in managing hardware and software assets. Understanding the new technology re-uirements for electronic commerce and the digital firm, determining the total cost of ownership of technology assets, and determining whether to own and maintain technology assets or use e"ternal technology service providers for the firm3s $T infrastructure are the principal issues in managing hardware and software assets. !lectronic commerce and the digital firm place new technology re-uirements on the organization. <eavy demands are being made on both hardware and software because organizations are replacing many manual and paper-based processes with electronic ones. /or e"ample, the flood of digital transactions is making heavy demands on the firm. Two areas that $ must pay attention to are capacity planning and scalability. *hen selecting and managing an organization3s hardware and software assets, management must consider both direct and indirect costs. To determine the total costs of ownership, an organization must consider the costs associated with hardware ac-uisition, software ac-uisition, installation, training, support, maintenance, infrastructure, downtime, and space and energy.

0nce you know the total cost of ownership, you can then find out what the cost would be to have e"ternal service providers own and maintain the hardware and software for you. $f you find it is cheaper to turn to e"ternal $T providers, you then will need to look to +s, A +s, and other types of e"ternal providers. <owever, you must also determine whether the function is so strategic that it must be maintained internally. Why is file management important for overall system performance? $nformation cannot be used effectively if it is stored in a disorganized, infle"ible manner. *ithout proper file management, it may be difficult and even impossible to e"tract information from an automated system. =etrieving a simple report can be timely and costly if the information is not properly managed. /ile management must also be fle"ible enough to accommodate new pieces of information or to combine different pieces of information in changing ways. *hen computer files are poorly managed, poor performance, high costs, and minimal fle"ibility will result. )ist and describe each of the components in the data hierarchy. /igure M-1 shows the data hierarchy. The data hierarchy includes bits, bytes, fields, records, files, and databases. %ata are organized in a hierarchy that starts with the bit, which is represented by either a 6 'off( or a 1 'on(. &its can be grouped to form a byte to represent one character, number, or symbol. &ytes can be grouped to form a field, such as a name or date, and related fields can be grouped to form a record. =elated records can be collected to form files, and related files can be organized into a database. Define and e&plain the significance of entities, attributes, and key fields. An entity is a person, place, thing, or event on which information can be obtained. An attribute is a piece of information describing a particular entity. A key field is a field in a record that uni-uely identifies instances of that uni-ue record so that it can be retrieved, updated, or sorted. /or e"ample, a person4s name cannot be a key because there can be another person with the same name whereas a social insurance number is uni-ue. Also a product name may not be uni-ue, but a product number can be designed to be uni-ue.

)ist and describe some of the problems of the traditional file environment. +roblems with the traditional file environment include data redundancy and confusion, program-data dependence, lack of fle"ibility, poor security, and lack of data sharing and availability. %ata redundancy is the presence of duplicate data in multiple data files. $n this situation, confusion results because the data can have different meanings in different files. +rogram-data dependence is the tight relationship between data stored in files and the specific programs re-uired to update and maintain those files. This dependency is very inefficient, resulting in the need to make changes in many programs when a common piece of data, such as the postal codeformat, changes. 9ack of fle"ibility refers to the fact that it is very difficult to create new reports from data when needed. Ad hoc reports are impossible to generate. a new report could re-uire several weeks of work by more than one programmer and the creation of intermediate files to combine data from disparate files. +oor security results from the lack of control over the data because the data are so widespread. %ata sharing is virtually impossible because it is distributed in so many different files around the organization. Define the terms database and database management system. A database is a collection of data organized to service many applications efficiently by storing and managing data so that they appear to be in one location. $t also minimizes redundant data. A database management system '%&) ( is special software that permits an organization to centralize data, manage them efficiently, and provide access to the stored data by application programs. 1ame and briefly describe the three components of a D2-'. %ata definition language, data manipulation language, and data dictionary are the three components of a database management system. The data definition language is the formal language used by programmers to specify the content and structure of the database. The data manipulation language is the language used to manipulate data in the database. $t contains commands that permit end users and programming specialists to e"tract data from the database to satisfy information re-uests and develop applications. The data dictionary is an automated or manual file that stores definitions of data elements and data characteristics such as usage, physical representation, ownership, authorization, and security. What is the difference between logical and physical views of data? A logical view of data is the way data are perceived by end users or business specialists. A physical view of data is the way the data are actually organized and structured on physical storage media. )ist some benefits of a D2-'. A %&) can reduce the comple"ity of the information systems environment, reduce data redundancy and inconsistency, eliminate data confusion, create program-data independence, reduce program development and maintenance costs, enhance fle"ibility, enable the ad hoc retrieval of information, improve access and availability of information, and allow for the centralized management of data, their use, and security.

Describe the principal types of databases and the advantages and disadvantages of each. The principal types of databases discussed in the te"tbook include relational, hierarchical, network, and ob#ect-oriented. The relational database model organizes data into two dimensional tables. The relational model can relate any piece of information in one table to any piece of information in another table as long as the two tables share a common data element 'such as an employee number(. &ecause relational %&) can easily combine information from different sources, they are more fle"ible than the other %&) structures. Access paths to data are not pre-specified, so they can easily respond to ad-hoc in-uiries with less e"tensive programming. The main problem with relational %&) is poor processing efficiency. =esponse time can be very slow if large numbers of accesses to data are re-uired to select, #oin, and e"tract data from tables. %evelopments in relational technology, such as inde"ing, are starting to overcome this problem. The hierarchical database model stores data logically in a vertical hierarchy resembling a tree-like structure. An upper record is connected logically to a lower record in a parent-child relationship. A parent segment can have more than one child, but a child can only have one parent. <ierarchical %&) are good for treating one-tomany relationships. They can store large numbers of segments and process information efficiently, but they can only deliver information if a re-uest follows the linkages of the hierarchy. Their disadvantages are their low user-friendliness, infle"ibility, and programming comple"ity. They are good for high-volume, rapid response systems, such as airline reservation systems. The network model stores data logically in a structure that permits many-to-many relationships. Through e"tensive use of pointers, a child segment can have more than one parent. 2etwork %&) reduce redundancy and, like hierarchical databases, they process information efficiently. <owever, they are infle"ible and are very comple" to maintain and program. The ob#ect-oriented %&) stores data and the procedures acting on the data as ob#ects that can be automatically retrieved and shared. 0b#ect-oriented databases can store comple" types of information, but are slower at processing larger numbers of transactions when compared to relational %&) . 0b#ect-relational databases combine the capabilities of the relational database with the storage capabilities of an ob#ectoriented database. 1ame and describe the three most important '?) commands. The three most important E9 commands are !9!,T, /=0), and *<!=!. The !9!,T statement lists the columns from tables that will appear in the result table. The /=0) statement identifies the tables or views from which the columns will be selected. The *<!=! statement specifies the conditions for selecting specific rows within a single table and conditions for #oining multiple tables.

What is normalization? How is it related to the features of a well(designed relational database? 2ormalization is the process of creating small stable data structures from comple" groups of data when designing a relational database. 2ormalization streamlines relational database design by removing redundant data such as repeating groups. A well-designed relational database will be organized around the information needs of the business and will probably be in some normalized form. A database that is not normalized will have problems with insertion, deletion, and modification. What is a distributed database, and what are the two main ways of distributing data? A distributed database is one that is stored in more than one physical location. A distributed database can be partitioned or replicated. *hen partitioned, the database is divided into partitions, so that each remote processor has access to the data that it needs to serve its local area. These databases can be updated locally and later #ustified with the central database. *ith replication, the database is duplicated at various remote locations. /igure M-15 shows how a database is distributed. What are the four key organizational elements of a database environment? Describe each briefly. The four key organizational elements of a database environment are data administration, data planning and modelling methodology, database technology and management, and users. %ata administration is the organizational function for managing the organization3s data resources and is concerned with information policy, data planning, maintenance of data dictionaries, and data -uality standards. A data planning and modelling methodology focuses on enterprise-wide planning and analysis of data. The database technology and management element is responsible for defining and organizing the structure and content of the database as well as maintaining the database. The user element references the fact that end users have a wider role with %&) than in traditional systems and must be trained. Describe the capabilities of online analytical processing #$):+% and datamining. 0nline analytical processing and datamining enable the manipulation and analysis of large volumes of data from many perspectives, for e"ample, sales by item, by department, by store, by region, in order to find patterns in the data. uch patterns are difficult to find with normal database methods, which is why a data warehouse and datamining are usually parts of 09A+. %atamining uses a variety of techni-ues to find hidden patterns and relationships in large pools of data and to infer rules from them that can be used to predict future behavior and guide decision making. /or e"ample, <udson4s &ay ,ompany uses datamining to analyze data generated by visitors to its *eb site. $t uses the results to customize advertising and content to individual customers and to improve online customer service. What is a data warehouse? How can it benefit organizations?

A data warehouse is a database with archival, -uerying, and data e"ploration tools 'i.e., statistical tools( and is used for storing historical and current data of potential interest to managers throughout the organization and from e"ternal sources 'e.g. competitor sales or market share(. The data originate in many of the operational areas and are copied into the data warehouse as often as needed. The data in the warehouse are organized according to company-wide standards so that they can be used for management reporting and analysis. %ata warehouses support looking at the data of the organization through many views or directions. A data warehouse allows managers to look at products by customer, by year, by salesperson, essentially different slices of the data. 2ormal operational databases do not permit these different views. What is a hypermedia database? How does it differ from a traditional database? How is it used for the Web? Traditional databases store only homogeneous data that can be easily structured into predefined data fields and records. They are not well suited for handling other types of data such as procedures or graphics. <ypermedia databases store chunks of information in linked nodes. These nodes can contain te"t, graphics, sound, full-motion video, or e"ecutable computer programs. These databases are less structured than traditional %&) and contain a wider array of data. The nodes of a hypermedia database can be linked in any kind of relationship established by the database creator. The hypermedia database approach enables users to access topics on a *eb site in whatever order they wish. *eb sites store information as interconnected pages containing te"t, sound, video, and graphics using a hypermedia database. How can users access information from a company@s internal databases via the Web? The user uses *eb browser software on his or her client +, to access a corporate *eb site over the $nternet. The *eb browser software re-uests data from the organization4s database, using <T)9 commands to communicate with the *eb server. &ecause many back-end databases cannot interpret commands written in <T)9, the *eb server passes these re-uests for data to special middleware software that then translates <T)9 commands into E9 so that they can be processed by the %&) working with the database. The %&) receives the E9 re-uests and provides the re-uired data. The middleware transfers information from the organization4s internal database back to the *eb server for delivery in the form of a *eb page to the user. The software working between the *eb server and the %&) can be an application server, a custom program, or a series of software scripts. Why has telecommunications technology become such an important issue for managers and organizations? Telecommunications technology serves as the foundation for a digital business environment, enabling electronic commerce and the digital economy. &usinesses are using telecommunications to coordinate business processes, communicate more effectively, and facilitate relationships with suppliers, customers, and business partners.

What is a telecommunications system? What are the principal functions of all telecommunications systems? A telecommunications system is a collection of compatible hardware and software arranged to communicate information, such as te"t, graphic images, voice, or video, from one location to another. The principal functions of all telecommunications systems include the transmission of information, establishing an interface between sender and receiver, routing messages along the most efficient path, performing elementary information processing to get the right message to the right receiver, checking and editing transmitted information for errors and formats, converting messages from the speeds of one device to those of another, controlling the flow of information, routing messages, and maintaining overall network structure. 1ame and briefly describe each of the components of a telecommunications system. /igure G-1 identifies the components of a telecommunications system. The components of a telecommunications system include computers to process information. terminals and other inputBoutput devices to send or receive data. communications channels to link sending and receiving devices in networks. communications processors to provide support functions for data transmission. and communications software to control input and output activities and to manage other functions of the communications network. Distinguish between analog and digital signals. An analog signal is represented by a continuous wave that passes through a communications medium and is used primarily for voice communication. A digital signal consists of separate discrete waves and is used for data and voice communication. 1ame the different types of telecommunications transmission media and compare them in terms of speed and cost. Table G-1 summarizes typical speeds and costs for telecommunications transmission media. Typical speeds and costs for several of the transmission media are provided below. -edium 'peed "ost Twisted wire up to 166 )bps 9ow )icrowave up to 766O )bps atellite up to 766O )bps ,oa"ial cable up to 766 )bps /ibre optic up to KO Tbps <igh cable 1ame and describe the technologies used for wireless transmission. ,ommon technologies for wireless transmission include microwave transmission, communication satellites, pagers, cellular telephones, personal communication

services, smart phones, personal digital assistants, and mobile data networks. A microwave system is a high-volume, long-distance, point-to-point transmission in which high-fre-uency radio signals are transmitted through the atmosphere from one terrestrial transmission station to another. A communications satellite system transmits data using orbiting satellites that serve as relay stations for transmitting microwave signals over very long distances. A paging system is a wireless transmission technology in which the pager beeps when the user receives a message. it is used to transmit short alphanumeric messages. ,ellular phones are devices that transmit voice or data using radio waves to communicate with the radio antennas placed within ad#acent geographic areas called cells. +ersonal communication services are a wireless cellular technology that uses lower power, higher fre-uency radio waves than cellular technology and can be used with smaller size telephones. A smart phone is a wireless phone with voice, te"t, and $nternet capabilities. +ersonal digital assistants are small, pen-based, handheld computers with built-in wireless telecommunications capable of entirely digital communications transmission. )obile data networks are wireless networks that enable two-way transmission of data files cheaply and efficiently. What are optical networks? Why are they becoming important? 0ptical networks are networking technologies for high-speed transmission of data in the form of light pulses. They are becoming important because they can transmit all types of traffic 'voice, data, and video( over fibre cables and provide the massive bandwidth for new types of services and software. There is no degradation in -uality with optical networks. What is the relationship between bandwidth and a channel@s transmission capacity? &andwidth is the range of fre-uencies that can be accommodated on a particular telecommunications medium. The greater the range of fre-uencies that the telecommunications transmission medium can accommodate, the greater the medium3s telecommunications transmission capacity. 1ame and briefly describe the different kinds of communications processors. A front-end processor is a small computer 'or programmable minicomputer( dedicated to communications management. $t is attached to the main or host computer in a computer system. $t performs such special communications processing as error control, formatting, editing, controlling and routing, and speed and signal conversion. A concentrator is a programmable telecommunications computer that collects and temporarily stores messages from terminals to send in economical batches. A controller 'often a specialized minicomputer( supervises communications traffic between the ,+U and peripheral devices such as terminals and printers, managing messages from these devices and communicating them to the ,+U, and routing output from the ,+U to the appropriate peripheral device.

A multiple"er enables a single communications channel to carry data transmissions from multiple sources simultaneously. $t divides up the telecommunications channel into multiple channels so that multiple transmission devices can share the channel. A modem translates a computer3s digital signal into analog for transmission over ordinary telephone lines and translates the analog signal back into digital form for reception by a computer at the other end. 1ame and briefly describe the three principal network topologies. The three principal network topologies are star, bus, and ring. A star network consists of a central host computer connected to a number of smaller computers or terminals. All communication between points in the network must pass through the host computer. A bus network links a number of computers by a single circuit made of twisted wire, cable, or optical fibre. All messages are transmitted to the entire network and can travel in both directions along the cable. There is no need to have a host computer controlling the network. The ring network is similar to a bus network e"cept that the connecting wire, cable, or optical fibre forms a ring. %ata are passed along the ring from one computer to another, flowing in a single direction, and the network does not rely on a central host computer. Distinguish between a +2> and a ):1. A +&I utilizes the firm3s own telephone system, is based on the firm3s internal telephone network and re-uires no special wiring. A 9A2 is more general-purpose and is not tied to a telephone network, but re-uires special wiring installed by the organization. A 9A2 usually has a higher transmission capacity and is more e"pensive to install than a +&I. What are the components of a typical ):1? What are the functions of each component? Describe the technologies for wireless ):1s. 9A2 technology consists of cabling 'twisted wire, coa"ial, or fibre-optic cable( or wireless technology that links individual computer devices, network interface cards, and software to control 9A2 activities. The 9A2 network interface card specifies the data transmission rate, the size of message units, the addressing information attached to each message, and network topology. 2etwork operating systems route and manage communications on the network and coordinate network resources. *i-/i and &luetooth are two technologies for establishing wireless 9A2s. *i-/i 'also known as G67.11b, the number of the standard is meets( is a standard for high-speed wireless 9A2s that can transmit up to 11 )bps within a 166-metre area and provides a low-cost fle"ible technology for connecting work groups and providing mobile $nternet access. &luetooth is a standard for wireless personal area networks that can transmit up to M76 Abps within a 16-metre area. )ist and describe various network services. Dalue-added networks, packet switching, frame relay, asynchronous transfer mode 'AT)(, $ntegrated ervices %igital 2etwork '$ %2(, digital subscriber line '% 9(, cable modem, and T1 are ma#or network services. Table G-7 summarizes these services.

A value-added network is a private, multipath, data-only, third-party-managed network that multiple organizations use on a subscription basis. +acket switching ma"imizes utilization of telecommunications lines by dividing up lengthy blocks of data into bundles 'of appro"imately 17G bytes each( called packets. ,ontrol information is attached to each packet rather than to each bit, increasing speed and efficiency of transmission. /rame relay is a shared network service that is faster but less reliable than packet switching. %ata are chopped into frames which are similar to packets but without the error checking. /rame relay is for organizations with reliable telecommunication lines that would not re-uire retransmission for errors. AT) technology parcels information into uniform cells, eliminating the need for protocol conversion and enabling the user to switch seamlessly between voice, data, images, and video. it also ties 9A2s and *A2s together more easily. $ntegrated ervices %igital 2etwork is an international standard for putting voice, data, and video on a single link using e"isting telephone lines. The digital subscriber line technologies provide high-capacity transmission over e"isting copper telephone lines. There are two varietiesQasynchronous digital subscriber line 'A% 9( and symmetric digital subscriber line ' % 9(. A% 9 receives at a very fast speed, up to H megabits per second, and sends at up to K;0 kilobits per second. The symmetric digital subscriber line service sends and receives at up to 8 megabits per second. ,able modems use cable TD lines to transmit data. A T1 line is a high-capacity telephone line that transmits at 1.5;; megabits per second. Distinguish between a W:1 and a 9:1. A *A2 is a private wide area telecommunications network, spanning a large geographical distance. *A2s may use a variety of media and a combination of switched and dedicated lines. *ith a *A2, the user is responsible for establishing the most efficient routing of messages, error checking, editing, developing protocols, and managing telecommunications. A DA2 is a value-added network. This is a private but shared multipath, data-only, third-party-managed network that multiple organizations use on a subscription basis. Define the following6 modem, baud, protocol, converged network, and broadband. A modem translates digital signals into analog signals and back again so that they can be transmitted through telecommunications media that handle only analog signals. &aud is a change in signal from positive to negative or vice versa that is used as a measure of transmission speed. A protocol is a set of rules and procedures that governs transmission between the components in a network. A converged network is a network with technology to enable voice and data to run over a single network. &roadband is a high-speed transmission technology and designates a communications mechanism that can transmit multiple channels of data simultaneously. 1ame and describe the telecommunications applications that can support electronic commerce and electronic business.

Telecommunications applications that support electronic commerce and business include electronic mail, groupware, voicemail, facsimile machines, digital information services, teleconferencing, videoconferencing, and electronic data interchange. !lectronic mail is the computer-to-computer e"change of messages. Croupware is a specialized form of teleconferencing and dataconferencing that allows individuals working in different locations to work together on common documents and pro#ects. Doicemail is a system that digitizes spoken messages, transmits them over a network, and stores the message for later retrieval. The system includes a range of capabilities including saving messages and routing them to other parties. /acsimile machines transmit documents containing both te"t and graphics over ordinary telephone lines using a scanner to digitize the document. Teleconferencing refers to the ability to confer with a group of people simultaneously using the telephone or electronic mail group communication software. %ataconferencing refers to teleconferencing in which two or more users are able to edit and modify data files simultaneously. Dideoconferencing is teleconferencing that includes a video portion so that the individuals can actually see each other despite their distance. %igital information services enable users to retrieve information, such as stock market data, periodicals, competitor data, legal research, and news articles, from outside the firm. %istance learning refers to education or training delivered over a distance to individuals in one or more locations. !-learning refers to instruction delivered online using the $nternet or private networks. !lectronic data interchange is the direct computer-to-computer e"change between two organizations of standard business transaction documents such as invoices or purchase orders. Why can an information system be considered a planned organizational change? An information system is a sociotechnical entity, an arrangement of both technical and social elements. $nformation systems change involves hardware and software, but in addition, it involves changes in #obs, skills, management, and organization. *hen we design a new information system, we are redesigning the organization, reordering its technical and social elements. This must be well thought out and planned in accordance with an appropriate methodology. What are the ma or categories of an information systems plan? The ma#or categories of an information systems plan can be found in the )$ in Action, )anager4s Toolkit bo". The ma#or categories include +urpose of the +lan, trategic &usiness +lan, ,urrent ystems, 2ew %evelopments, )anagement trategy, $mplementation +lan, and &udget =e-uirements. How can enterprise analysis and critical success factors be used to establish organization(wide information system requirements? &oth approaches attempt to gain a clear understanding of the organization3s long- and short-term information re-uirements. &oth use interviews of managers to gain the information needed. And both rest ultimately on the strategy of the company.

!nterprise analysis approaches the problem by looking at the entire organization in terms of organizational units, functions, processes, and data elements. This approach takes a large sample of managers and asks them how they use information, where they get the information, what their environment is like, what their ob#ectives are, how they make decisions, and what their data needs are. The data are aggregated into subunits, functions, processes, and data matrices. /rom this information, conclusions are drawn about the organization-wide information systems re-uirements. The , / approach interviews a smaller number of top managers who are asked to identify their goals and the ob#ectives essential to those goals. These critical success factors ', /s( are aggregated to develop a picture of the overall organization3s , /s. ystems that are needed to deliver these critical success factors are then developed. Describe each of the four kinds of organizational change that can be promoted with information technology. $nformation technology enables automation, rationalization, reengineering, and paradigm shifts. Automation uses the computer to speed up the performance of e"isting tasks. This approach to organizational change changes the organization less than the other three. $t may release staff to other #obs, reduce the number of employees needed, or enable the organization to process more transactions. =ationalization of procedures refers to the streamlining of standard operating procedures, eliminating obvious bottlenecks, so that automation makes operating procedures more efficient. &y making such changes, rationalization can eliminate some tasks and enable the organization to make more changes than automation, but the organization still has not made changes in the goals or strategy of the company. &usiness process reengineering refers to the radical redesign of business processes, combining steps to cut waste and eliminating repetitive, paper-intensive tasks in order to improve cost, -uality, and services, and to ma"imize the benefits of information technology. This is a more powerful type of organizational change because an organization can use it to rethink and streamline its business processes and to improve speed, service, and -uality. A paradigm shift is a radical reconceptualization of the nature of the business and the nature of the organization. The strategy of the business can be changed, and sometimes even the business the company is in. What is business process reengineering? What steps are required to make it effective? The te"tbook defines business process reengineering as the radical redesign of business processes, combining steps to cut waste and eliminate repetitive, paperintensive tasks in order to improve cost, -uality, and service, and to ma"imize the benefits of technology. &usiness process reengineering can be used to reshape how the organization carries out its business, even the nature of the business itself. The steps include developing the broad business vision and process ob#ectives, identifying the processes to be redesigned, understanding and measuring the performance of e"isting processes, understanding the opportunities for applying information technology, and developing a prototype of the new process. !"amine /igure 16-8 with the students to help them understand both the approach and the impact of business process reengineering.

What is the difference between systems analysis and systems design? What activities are involved in each? ystems analysis is the analysis of the problem that the organization is trying to solve with an information system. $t consists of defining the problem, identifying its causes, specifying solutions, and identifying the information re-uirements that must be met by a system solution. ystems design shows how the system will fulfill the information re-uirements specified in system analysis. What are information requirements? Why are they difficult to determine correctly? $nformation re-uirements involve identifying who needs what information, where, when, and how. They define the ob#ectives of the new or modified system and contain a detailed description of the functions the new system must perform. Cathering information re-uirements is perhaps the most difficult task of the systems analyst, and faulty re-uirements analysis is a leading cause of systems failure and high systems development costs. $nformation re-uirements are difficult to determine because business functions can be very comple" and poorly defined. A manual system or a routine set of inputs and outputs may not e"ist. +rocedures may vary from individual to individual, and users may disagree on how things are or should be done. %efining information re-uirements is a laborious process, re-uiring a great deal of research and often several reworks by the analyst. Why is the testing stage of systems development so important? 1ame and describe the three stages of testing for an information system. Testing is critical to the success of a system because it is the only way to ascertain whether the system will produce the right results. Three stages of information system testing are unit testing, system testing, and acceptance testing. Unit testing refers to separately testing or checking the individual programs. *ith system testing, the entire system as a whole is tested to determine whether program modules are interacting as planned. *ith acceptance testing, the system undergoes final certification by end users to ensure that it is ready for installation. What role do programming, conversion, production, and maintenance play in systems development? +rogramming translates the design specification into software, thus providing the actual instructions for the computer. +rogramming constitutes a smaller portion of the systems development cycle than design and perhaps even testing activities. ,onversion is the process of changing from the old system to the new system. +roduction is the operation of the system once it has been installed and conversion is complete. The system will be reviewed during production by both users and technical specialists to determine how well it has met its original ob#ectives and to decide whether any revisions or modifications are needed. )aintenance is modifications to hardware, software, documentation, or procedures to a production system to correct errors, meet new re-uirements, and improve processing efficiency.

What is the traditional systems development lifecycle? Describe each of its steps and its advantages and disadvantages for systems developing. The traditional systems lifecycle is a formal methodology for managing the development of systems and is still the principal methodology for medium and large pro#ects. The overall development process is partitioned into distinct stages, each of which consists of activities that must be performed to fashion and implement an information system. The stages are usually gone through se-uentially with formal >sign-off@ agreements among end users and data processing specialists to validate that each stage has been completed. Users, managers, and data processing staff have specified responsibilities in each stage. The approach is slow, e"pensive, infle"ible, and is not appropriate for many small desktop systems. The systems development lifecycle consists of systems analysis, systems design, programming, testing, conversion, and production and maintenance. ystems analysis is the phase where the problem that the organization is trying to solve is analyzed. Technical specialists identify the problem, gather information re-uirements, develop alternative solutions, and establish a pro#ect management plan. &usiness users provide information re-uirements, establish financial or operational constraints, and select the solution. %uring systems design, technical specialists model and document design specifications and select the hardware and software technologies for the solution. &usiness users approve the specifications. %uring the programming phase, technical specialists translate the design specifications into software for the computer. %uring the testing phase, technical specialists develop test plans and conduct unit, system, and acceptance tests. &usiness users provide test data and scenarios and validate test results. %uring the conversion phase, technical specialists prepare a conversion plan and supervise conversion. &usiness users evaluate the new system and decide when the new system can be put into production. %uring the production and maintenance phase, technical specialists evaluate the technical performance and perform maintenance. &usiness users use the system and evaluate its functional performance. The advantages of using this method for developing information systems include it is highly structured. it has a rigorous and formal approach to re-uirements and specifications and tight controls over the system development process. it is appropriate for developing large transaction processing and management information systems and for developing comple" technical systems. The disadvantages include it is very costly and time-consuming. it is infle"ible and discourages change even though re-uirements will change during the pro#ect due to the long time this method re-uires. it is ill-suited to decision-oriented applications which can be rather unstructured and for which re-uirements may be difficult to define. What do we mean by information system prototyping? What are its benefits and limitations? )ist and describe the steps in the prototyping process. $nformation system prototyping is an e"plicitly interactive system design methodology that develops an e"perimental model of a system as a means of determining information re-uirements. +rototyping develops an e"perimental system -uickly and ine"pensively for demonstration and evaluation so that users can better determine information re-uirements. +reliminary models of a system or important parts of the

system are developed rapidly for users to e"periment with. The prototype is modified and refined until it conforms precisely to what users want. $nformation re-uirements and design are determined dynamically as users interact with and evaluate the prototype. +rototyping is most valuable when re-uirements are uncertain and cannot be entirely prespecified or when the appropriate design solution is unclear. +rototyping is especially helpful for designing end-user interfaces 'screens and reports( and for determining elusive re-uirements of decision-support type applications. +rototyping can help reduce implementation costs by capturing re-uirements more accurately at an earlier point in the implementation process. $t is not so useful for a very structured, well-understood, or routine problem. $t is best suited for smaller applications oriented toward simple data manipulation. 9arge systems with comple" processing may only be able to have limited features prototyped. A prototype may be developed so rapidly that design is not well thought out or must be reworked for a production environment. The problem arises when the prototype is adopted as the production version of the system without careful analysis and validation. +rototypes are developed so rapidly that documentation and testing are glossed over. The system is so easily changed that documentation may not be kept up-to-date. The steps in prototyping include identifying the user3s basic re-uirements. developing a working prototype of the system outlined in the basic re-uirements, using the prototype, and revising and enhancing the prototype based on the users3 reaction. The third and fourth steps are repeated until users are satisfied with the prototype. What is an application software package? What are the advantages and disadvantages of developing information systems based on software packages? An application software package is a set of prewritten, precoded application software programs that are commercially available for sale or lease. +ackages range from very simple programs to very large and comple" systems, encompassing hundreds of programs. +ackages are normally used when functions are common to many companies, data processing resources, for in-house development, are in short supply, or when desktop microcomputer applications are being developed for end users. oftware packages provide several advantages1 '1( the vendor has already established most of the design that may easily consume up to 56 percent of development time. '7( programs are pre-tested, cutting down testing time and technical problems. '8( the vendor often installs or assists in the installation of the package. ';( periodic enhancement or updates are supplied by the vendor. '5( vendors also maintain a permanent support staff well-versed in the package, reducing the need for individual organizations to maintain such e"pertise in-house, and 'K( the vendor supplies documentation. The usage of software packages has several disadvantages1 '1( there are high conversion costs for systems that are sophisticated and already automated. '7( packages may re-uire e"tensive customization or reprogramming if they cannot easily meet uni-ue re-uirements, and '8( a system may not be able to perform many functions well in one package alone.

What do we mean by end(user development? What are its advantages and disadvantages? 1ame some policies and procedures for managing end(user development. !nd-user development refers to the development of information systems by end users with minimal or no assistance from professional systems analysts or programmers. This is accomplished through sophisticated :user-friendly: software tools and gives end users direct control over their own computing. Advantages include improved re-uirements determination, realizing large productivity gains when developing certain types of applications, enabling end users to take a more active role in the systems development process, many end-user systems can be used for prototyping, and some have new functions such as graphics, modelling, and ad hoc information retrieval. %isadvantages include not being suited for large transaction-oriented applications or applications with comple" updating re-uirements, standards for testing and -uality assurance may not be applied, and proliferation of uncontrolled data and private information systems. !nd-user development is suited to solving some of the backlog problem because the end users can develop their needed applications themselves. $t is suited to developing low-transaction volume systems. !nd-user development is valuable for creating systems that access data for such purposes as analysis 'including the use of graphics in that analysis( and reporting. $t can also be used for developing simple data-entry applications. +olicies and procedures to manage end-user development include the following1 The organization must establish sufficient support facilities for end-user computing1 information centers or distributed end-user computing centers. Training and support should be targeted to the specific needs of those being trained. !nd-user application development should not be allowed to be undertaken randomly but should be incorporated into the organization3s strategic plan. )anagement should develop controls over end-user computing in the following areas1 ,ost #ustification of end-user information system pro#ect. <ardware and software standards for user-developed applications. ,ompany-wide standards for microcomputers, word processing software, database management systems, graphics software, and -uery and reporting tools. Euality assurance reviews that specify whether the end-user systems must be reviewed by information systems and internal audit specialists. ,ontrol for end-user developed applications covering testing, documentation, accuracy, and completeness of input and update, backup, recovery and supervision. ,ritical applications that supply data to other important systems should be flagged and sub#ected to more rigorous standards.

What is outsourcing? 7nder what circumstances should it be used for developing information systems? 0utsourcing is the process of turning over an organization3s computer centre operations, telecommunications networks, or applications development to e"ternal vendors who provide these services. 0utsourcing is an option often considered when the cost of information systems technology has risen too high. 0utsourcing is seen as a way to control costs or to develop applications when the firm lacks its own technology resources to do this on its own. $t is seldom used for a system that is strategically important. What is the difference between ob ect(oriented software development and traditional systems development? What are the advantages of using ob ect( oriented software development in developing systems? The traditional structured methodology focuses on what the new system is intended to do and then develops the procedures and data to do it. 0b#ect-oriented development de-emphasizes system procedures and instead creates a model of a system composed of individual ob#ects that combine data and procedures. The ob#ects are independent of any specific system. These ob#ects can then be placed into any system being developed that needs to make use of the data and functions. $n addition, in traditional structured methodologies all work is done serially, with work on each phase begun only when the previous phase is completed. 0b#ect-oriented development theoretically allows simultaneous work on design and programming. These systems usually are easier to develop and more fle"ible. )oreover, any ob#ects created this way are reusable for other programs. What is rapid application development #8:D%? How can it help system developers? =A% is a process for developing systems in a very short time period by using prototyping, fourth-generation tools, and close teamwork among users and systems specialists. =A% allows the creation of working software in a very short time through ob#ects and automation of much of the code generation. Usually they depend on interfaces to databases. What are Web services? How can they help firms develop and enhance their information systems? *eb services are software components that are deliverable over the $nternet. They enable one application to communicate with another with no translation re-uired. They allow this communication and sharing of data regardless of operating system, programming language, or client device. The benefit is the ease of enabling the e"change of data and the ma#or savings that result when the traditional translations no longer have to be created or maintained. Why are computer systems more vulnerable than manual systems to destruction, fraud, error, and misuse? 1ame some of the key areas where systems are most vulnerable.

,omputer systems tend to be more vulnerable to destruction, error, and fraud than manual systems for the following reasons1 %ata is stored electronically, where it is not immediately visible or easily audited. %ata is concentrated in electronic files. !ffects of a disaster such as a hardware malfunction, power outage, or fire can be more e"tensive. An organization3s entire record-keeping system could be destroyed. There may not be a visible trail to indicate what occurred for every computer process. 0peration of automated systems re-uires specialized technical e"pertise. Unless the systems are properly protected, it may be easy for programmers and computer operators to make unauthorized changes. %ata files can be accessed and manipulated directly in online systems. %ata can be stolen, corrupted, or destroyed by hackers and computer viruses. !rrors in data can be entered. !rrors can be accidentally inserted when desired updates are installed. Today many programs can be accessed through telecommunications, and telecommunications can produce errors in data transmission. <ardware and software can fail. +urposeful and accidental problems, such as programming and data errors, can occur by personnel. $ndividuals 'or groups( can steal data, services, and e-uipment. Aey areas where systems are most vulnerable include1 hardware or software failure and errors. personnel actions. terminal access. fire or electrical hazards. user errors. theft of services, data, and e-uipment. program changes. and telecommunications problems. 1ame some features of online information systems that make them difficult to control. everal features of online information systems that make them difficult to control include the following1 There is a greater chance of unauthorized access or manipulation of data directly. Telecommunications links magnify the opportunities for unauthorized access and penetration from anywhere in the world, and there are many points at which data can be intercepted. <ardware, software, and organizational arrangements are more comple" for such systems. How can poor software and data quality affect system performance and reliability? Describe two software quality problems. oftware can fail to perform, perform erratically, or give erroneous results because of undetected bugs. A control system that fails to perform can mean medical e-uipment that fails or telephones that do not carry messages or allow access to the $nternet. A business system that fails means customers are under- or over-billed. 0r, it could

mean that the business orders more inventory than it needs, or an automobile4s braking system may fail. )a#or -uality problems are the bugs or defects caused by incorrect design. The other problem is maintenance of old programs caused by organizational changes, system design flaws, and software comple"ity. &ugs in even mildly comple" programs can be impossible to find in testing, making them hidden bombs. ee Table 11-8 for e"amples of data -uality problems. What are controls? Distinguish between general controls and application controls. ,ontrols are the methods, policies, and procedures that ensure protection of the organization3s assets, the accuracy and reliability of its records, and operational adherence to management standards. Ceneral controls establish a framework for controlling the design, security, and use of computer programs throughout an organization. Application controls are specific controls uni-ue to each computerized application. &oth general and application controls consist of manual and automated procedures. 1ame and describe the principal general and application controls for computerized systems. i" principal general controls are mentioned in the chapter, including software controls, hardware controls, computer operations controls, data security controls, controls over the system implementation process, and administrative controls. Table 1;-; summarizes these principal general controls. oftware controls monitor the use of system software and prevent unauthorized access of software programs, system software, and computer programs. <ardware controls ensure computer physical security. ,omputer operation controls oversee the work of the computer department, ensuring that programmed procedures are consistently and correctly applied to the storage and processing of data. ,omputer operations controls include the setup of computer processing #obs, computer operations, and computer backup and recovery procedures. %ata security controls prevent unauthorized changes, destruction, or access to data. ystem implementation controls ensure that the entire systems development process is properly managed. Administrative controls are formalized standards, rules, procedures, and control disciplines. The chapter mentions three principal application controls, including input controls, processing controls, and output controls. $nput controls are procedures to check data for accuracy and completeness when they enter the system. They often include control totals, edit checks, and computer matching. +rocessing controls are the routines for establishing that data are complete and accurate during updating. ,ommon ones include control totals, computer matching, and run control totals. 0utput controls are measures that ensure that the results of computer processes are accurate, complete, and properly distributed. They often include run control totals and report distribution logs. Table 1;-5 provides e"amples of these controls. What is security? )ist and describe controls that promote security for computer hardware, computer networks, computer software, and computerized data.

ecurity refers to the policies, procedures, and technical measures that can be applied to prevent unauthorized access, alteration, theft, or physical damage to information systems. ,omputer hardware security can be promoted by storing hardware in restricted rooms where only authorized individuals can access it. pecial safeguards against fire, e"treme temperature and humidity fluctuations, and electric power disruptions can be installed. ,omputer networks must be safeguarded against unauthorized use. Terminals should be physically restricted to authorized individuals. Telecommunications lines and control units should also be physically restricted and fre-uently checked for malfunctions. Authorized users of online systems should be assigned secret passwords that are changed often. <owever, these safeguards may not be sufficient to prevent authorized users from propagating computer viruses. ,omputer software security can be promoted by program security controls to prevent unauthorized changes to programs in production systems. oftware security is also promoted by system software controls that prevent unauthorized access to system software and log all system activities. ,omputerized data can be sub#ect to data security controls. +asswords can be assigned for specific applications. %ata security software can establish security patterns to restrict access to individual files, data fields, or groups of records. 0nline systems can establish access patterns restricting users to in-uiries only or granting them full or limited update capabilities. %ata security software often features logs that record users of online or batch files. Also, data files can be physically secured in locked rooms where they are released only for authorized processing. %ata can also be secured by allowing access only through copies such as data marts. What special security measures must be taken by organizations linking to the !nternet? pecial measures must be taken because the purpose of the original design of the $nternet was to allow easy access and to make sure the $nternet is safe from any attempt to disrupt or destroy it. The organizations or individuals connected to the $nternet must take action to protect their own data and computers. /or e"ample, they must take action to block viruses from disrupting their systems or destroying their data. The networking protocol that forms the foundation of the $nternet, T,+B$+, is insecure. $f systems are not specially protected against the openness of T,+B$+, and often the openness of U2$I, systems connected to the $nternet are vulnerable to hackers and computer viruses. /irewalls and intrusion detection systems should be installed to protect networks including the $nternet. !ncryption can help protect sensitive information. 2ewer technology has also become available, including authentication, message integrity, digital signatures, digital certificates, and secure electronic transaction ' !T( systems can also add security for certain types of communication. Distinguish between fault(tolerant and high(availability computing.

/ault tolerance should be distinguished from high-availability computing. /ault-tolerant computer systems contain redundant hardware, software, and power supply components that can back the system up and keep it running to prevent system failure. ome systems simply cannot be allowed to stop, such as stock market systems or some systems in hospitals. /ault-tolerant computers contain e"tra memory chips, processors, and disk storage devices. They also can use special software routings or self-checking logic built into their circuitry to detect hardware failures and automatically switch to a backup device. <igh-availability computing, though also designed to ma"imize application and system availability, helps firms recover -uickly from a crash. /ault tolerance promises continuous availability and the elimination of recovery time altogether. <igh-availability computing environments are a minimum re-uirement for firms with heavy electronic commerce re-uirements. Describe the role of firewalls, intrusion detection systems, and encryption systems in promoting security. /irewalls prevent unauthorized users from accessing internal networks. They protect internal systems by monitoring packets for the wrong source or destination, or by offering a pro"y server with no access to the internal documents and systems, or by restricting the types of messages that get through, for e"ample, e-mail. /urther, many authentication controls have been added for *eb pages as part of firewalls. $ntrusion detection systems monitor the most vulnerable points in a network to detect and deter unauthorized intruders. These systems often also monitor events as they happen to look for security attacks in progress. ometimes they even can be programmed to shut down a particularly sensitive part of a network if it receives unauthorized traffic. !ncryption offers protection by keeping messages or packets hidden from the view of unauthorized readers. !ncryption is crucial for ensuring the success of electronic commerce between the organization and its customers, and between the organization and its vendors. Why are digital signatures and digital certificates important for electronic commerce? %igital signatures are digital codes that are attached to an electronically transmitted message. A digital signature provides a way to associate a message with the sender. /or it to be legally binding in a court, someone must be able to verify that the signature actually belongs to whoever sent the data and that the data were not altered after being >signed.@ %igital certificates are data fields used to establish the identity of the sender and to provide the receiver with the means to encode a reply. These use a trusted third party known as a certificate authority to validate a user4s identity. &oth digital signatures and digital certificates play a role in authentication. Authentication refers to the ability of each party to know that the other parties are who they claim to be. $n the past, this was often done by manual signatures. What is the function of risk assessment?

=isk assessment determines the potential fre-uency of the occurrence of a problem and the potential damage if the problem were to occur. ,ontrols can be ad#usted or added to focus on the areas of greatest risk. An organization does not want to overcontrol areas where risk is low and under-control areas where risk is high. How does -!' auditing enhance the control process? )$ auditing evaluates all of the controls for an information system and assesses their effectiveness. ,ontrol weaknesses and their probability of occurrence will be noted. The results of the audit can be used as guidelines for strengthening controls, if re-uired. Auditing the system also ensures that inputs result in predicted outputs. 1ame and describe four software quality assurance techniques. /our software -uality assurance techni-ues are systems development methodology, proper resource allocation during systems development, software metrics, and testing. An appropriate structured systems development methodology provides a framework for rigourous discipline in building a system. =esource allocation means that more of the budget should be spent on systems analysis and specification than on testing and implementation. oftware metrics use ob#ective -uantitative measures to assess the system4s performance and to identify problems. ome metrics are used in the system analysis and design phases. Testing should be conducted at every stage, including the design phase for reliability and bugs. What is structured analysis? What is the role of the data flow diagram in structured analysis? tructured analysis is a method of defining system inputs, processes, and outputs. $t offers a logical, graphic model of information flow, partitioning a system into modules that show manageable levels of detail. The data flow diagram is the primary tool of structured analysis. $t is a graphic representation of a system4s component processes and the interfaces between them. How is structured design related to structured programming? How can both promote software quality? tructured design is related to structured programming through its set of design rules and techni-ues for programmers to follow. These are used to promote program clarity and simplicity, thereby reducing the time and effort re-uired for coding, debugging, and maintenance. The main principle of structured design is that a system should be designed from the top down in hierarchical fashion and refined to greater levels of detail. The design should first consider the main function of a program or system, then break this function into subfunctions and decompose each subfunction until the lowest level of detail has been reached. The lowest level modules describe the actual processing that will occur. $f structured analysis has been performed, the structured specification document can serve as input to the design process. How does 7nified -odeling )anguage #7-)% support ob ect(oriented analysis and design?

The Unified )odeling 9anguage 'U)9( is the industry-standard language for specifying, visualizing, constructing, and documenting the artifacts of software systems. $t simplifies the comple" process of software design. U)9 helps develop models of software systems, including their structure and design, in a way that meets all of these re-uirements. U)9 is a natural fit for ob#ect-oriented languages and environments such as ,OO, Fava, and the recent ,R. Why are data quality audits and data cleansing essential? %ata -uality audits are one means of determining whether information systems contain inaccurate, incomplete, or ambiguous data. ince much of the data in automated systems are invisible, it may not be possible to audit all records in a system. <owever, auditing a sample of such records can help determine the overall data -uality of the system. %ata cleansing should also be performed to correct errors, thereby creating consistent and accurate data for company-wide use in electronic commerce and electronic business as well as data warehousing. 1ame and describe the components involved in information resource management. The components involved in $=) are1 The $ department where much of $=) takes place )anaging planning, strategy, and e"ternal relations 'vendors, etc.( )anaging systems development )anaging personnel )anaging budgets and #ustifying investment in systems All of these >managing@ components are similar to the same functions performed in other departments or functions. "ompare the role of the "!$ with that of the -!' 'teering "ommittee. The ,$0 is a senior manager responsible for strategic-level management planning and decision making regarding the information function of an organization.The )$ teering ,ommittee sets policies and priorities for the $ department, including approving budgets for ma#or pro#ects and hearing progress reports on those ma#or pro#ects. 1ame and describe the types or levels of !' planning. The three levels of $ planning are1 trategic1 These plans describe in a broad perspective the ma#or strategic information systems that support or will support the organization4s strategy. Tactical1 These plans have a shorter focus and concentrate on breaking down the strategic $ plan into more detailed plans that middle-level managers can focus on implementing. 0perational1 These plans detail how the strategic and tactical $ plans will be implemented during the coming short term, usually one year.

1ame and describe the various roles !' personnel have in the !' department. The various roles $ personnel have in the $ department include1 ystems operators1 $ personnel who run the hardware, including loading tape and disk drives, starting and stopping computer #obs, and ensuring that backups are carried out as dictated by policy. %ata entry operators1 $ personnel who enter data in computer-readable format and are managed by database managers. 2etwork managers1 $ personnel who supervise the operations on an organization4s networks. *ebmasters1 $ personnel who supervise an organization4s *eb-based presence. +rogrammers1 $ personnel who perform the actual software coding. Analysts '&usiness and ystems(1 $ personnel who serve as the interface between the users 'and their managers and user department( and the programmers +ro#ect managers1 $ personnel who are professional pro#ect managers and manage systems development pro#ects 1ame and describe the principal capital budgeting methods used to evaluate information systems pro ects. The principal capital budgeting methods used to evaluate information systems pro#ects are1 +ayback method: )easures time re-uired to pay back the initial investment in the pro#ect. This method is good for high-risk pro#ects where useful life is difficult to know. <owever, it ignores the time value of money, cash flow after the payback period, and the disposal value and profitability of the investment. Accounting rate of return on investment '=0$(1 ,alculates the return from an investment by ad#usting the pro#ect inflows produced by the investment for depreciation. The rate of return must e-ual or e"ceed the cost of capital in the marketplace, or no one will lend the firm money. This model appro"imates the accounting income that would be earned by the pro#ect. ,ost-benefit ratio1 This simple method divides total benefits by total costs giving a ratio of benefits to costs. Any value above 1.6 is a positive ratio. The method can be used to rank several pro#ects for comparison. The ratio can be calculated using present values to account for the time value of money. 2et present value1 )oney received in the future must be discounted to be able to compare it with current money. The net present value is the amount of money an investment is worth, taking into account its cost, earnings and the time value of money. &y subtracting the cost of the pro#ect from the net present value of its benefits, one can determine one measure of profitability. +rofitability inde"1 This inde" is calculated by dividing the present value of the total cash inflow by the initial cost of the investment. The result is a profitability measure that, unlike the net present value, can be used to compare to alternative investments.

$nternal rate of return '$==(: This variation of net present value is defined as the rate of return that an investment is e"pected to return. What are the limitations of financial models for establishing the value of information systems? /inancial models assume all relevant alternatives have been e"amined, that all costs and benefits are known, and that these costs and benefits can be e"pressed in terms of money. These assumptions are rarely met in the real world. 0nly tangible benefits can be -uantified and assigned a monetary value. $ntangible benefits cannot be immediately -uantified but may lead to -uantifiable gains in the long run. These models can be selectively used to support political decisions made for organizational reasons having nothing to do with the cost and benefits of a system. /inancial models do not always e"press the risks and uncertainty of their own cost and benefit estimates. They also fail to consider the fact that costs are usually up front, while benefits tend to be back-loaded. 2o financial model can ad#ust for the fact that information technology can easily change during the course of the pro#ect. $n addition, firms can invest in capital pro#ects for many non-economic reasons that are not captured by financial models. +ro#ects may be undertaken to support strategic considerations, to meet government re-uirements, or to satisfy some non-market public demand. Describe how portfolio analysis and scoring models can be used to establish the worth of systems.
These two approaches can be used to select and evaluate information systems investments using non-financial and strategic considerations. +ortfolio analysis compares a portfolio of potential pro#ects based upon the pro#ects3 e"pected risks and benefits. +ro#ects are categorized as high or low risk and high or low benefits 'benefits are not necessarily financial(. Thus, four ratings are achieved1 high risk-high benefits, high risk-low benefits, low risk-high benefits, and low risk-low benefits. <igh benefit-low risk pro#ects are generally preferred while low benefit-high risk pro#ects are to be avoided. Use of a scoring model results in a single score for a pro#ect that can then be used to compare against other pro#ects scored the same way. ,riteria are listed and weighted, and then alternative pro#ects are rated by the criteria. coring models are meant to be relatively :ob#ective: techni-ues but involve many -ualitative #udgments. They are used most commonly to confirm, rationalize, and support decisions rather than make decisions. 0ften their greatest value is the agreement on criteria to #udge the system.

How can real options pricing models be used to help evaluate information technology investments?

Appropriate strategies, such as real options pricing models '=0+)(, can be applied to evaluate and value the information system when the benefits cannot be established in advance. =eal options pricing models apply the same techni-ues for valuing financial options to systems investments and can be useful to help managers think about the potential value of highly uncertain $T investments. =0+) allows managers to systematically take into account the volatility in the value of $T pro#ects over time, the optimal timing of the investment, and the changing cost of implementation as technology prices fall over time. The disadvantages of this model are primarily in estimating all the key variables, especially the e"pected cash flows from the underlying asset, and changes in the cost of implementation.

Have information systems enhanced productivity in businesses? Explain your answer.

+roductivity is a measure of the firm4s efficiency in converting inputs to outputs. )ore than a decade of studies has not been conclusive about the productivity of information systems, and the term >productivity parado"@ was coined to describe such findings. <owever, systems often do seem to greatly increase productivity observed by researchers.

Why do developers of new information systems need to address change management?

An information system is a sociotechnical entity, an arrangement of both technical and social elements. $nformation systems change involves hardware and software, but in addition, it involves changes in #obs, skills, management, and organization. *hen we design a new information system, we are redesigning the organization, reordering its technical and social elements. ,hange management addresses these types of changes, or more directly, the effects of the changes on the people whose #obs will change. The system not only changes the technology and the organization, it also changes people, and the pro#ect must also address this aspect if it is to succeed.

What kinds of problems provide evidence of IS failure?

An information system failure may mean that a system falls apart, but it usually means that the system does not perform as e"pected, is not operational at a specified time, or cannot be used in the way it was intended. $t often is under-utilized or not used at all. Users may have to develop parallel manual procedures to make the system work properly or rely on manual procedures entirely. The ma#or problem areas are design, data, cost, and operations.

Why is it necessary to understand the concept of implementation when managing the organi ational change surrounding a new information system?

$mplementation refers to all of the organizational activities involved in the adoption, management, and routinization of an innovation. /or $ , implementation is the entire process of introducing, building, and installing the system, and can be considered a comple" process of deliberate organizational change. There are three ma#or approaches to implementation in scholarly literature1 '1( a focus on actors and roles, suggesting that organizations should promote actors with innovative characteristics and develop organizational roles championing innovation. '7( a focus on strategies of innovation, believing that successful innovations must have support from top-down andBor bottom-up. and '8( a focus on general organizational change factors supportive of long-term routinization of innovations. 0ne of the most important determinants in system success and failure is the pattern of the implementation process. !specially critical facets of the implementation process are1 ,onflicts between the technical or machine orientation of information systems specialists and the organizational or business orientation of users. The impact of information systems on organizational structures, work groups, and behaviour. The planning and management of systems development activities. The degree of user participation in the design and development process.

What are the ma!or causes of implementation success or failure?

ystem failure can be due to e"ternal or internal factors. An organization may be faced with e"ternal, environmental pressures that it cannot meet because to do so would run counter to its inherent characteristics. <owever, many instances of system failure and negative implementation outcome are caused by factors within the organization. These factors include the role of users in the implementation process, the degree of management support for the implementation process, the level of comple"ity and risk of the implementation pro#ect, and the -uality of management of the implementation process itself.

What is the user"designer communications gap? What kinds of implementation problems can it create?

The user-designer communications gap refers to the difference in backgrounds, interests, and priorities that impede communication and problem solving among end users and information systems specialists. 0ften the ob#ectives, priorities, and language of communication between these groups are so different that they have entirely divergent goals. $f serious, the user-designer communications gap prolongs

implementation time. Users and $ specialists must spend additional time and effort trying to mutually understand one another. Users often forfeit their control over implementation to technical specialists. The result is an information system that makes sense to the technicians but does not meet users3 business re-uirements.

Why is there such a high failure rate among enterprise resource planning #E$%& and business process re"engineering #'%$& pro!ects? Why are customer relationship management and supply chain management systems often difficult to implement?

These pro#ects are very challenging, partly because they usually re-uire e"tensive organizational change. They also often replace deeply entrenched old technologies and legacy systems. )any are undermined by poor implementation and change management practices. The pro#ect must address employee concerns about the change, their fears and an"ieties, resistance by key managers, changes in #ob functions, career paths, and recruitment practices. ,=) implementation must be accompanied by a transformation of the company4s focus from a product-centric view to a customer-centric view, which means organizational culture changes. The pro#ect must cooperate closely with sales and marketing groups. upply chain management systems re-uire more cross-functional coordination, and also coordination with the business processes of other organizations.

What role do information systems play in the success or failure of mergers and ac(uisitions?

A ma#or reason for merger and ac-uisition failures is the difficulty in integrating the information systems of the different companies. ,ombining the different systems usually re-uires considerable organizational change and comple" system pro#ects to manage the change. Unless the integration of the systems is successful, the e"pected benefits of the merger or ac-uisition will not be achieved.

What dimensions influence the level of risk in each systems development pro!ect?

+ro#ect size, pro#ect structure, and e"perience with technology are three dimensions influencing the level of risk in a systems development pro#ect. The larger the pro#ect 'dollars spent, the size of the implementation staff, the time allocated, and the number of organizational units affected(, the greater the risk. The larger the pro#ect, the higher the failure rate. <ighly-structured pro#ects usually have clear and straightforward re-uirements, and users know e"actly what is needed. The less e"perience the pro#ect team has with the hardware andBor software, the higher the risk of pro#ect failure. What pro ect management techniques can be used to control pro ect risk? !"ternal integration tools, internal integration tools, and formal planning and control tools are three pro#ect management techni-ues that can be used to control pro#ect risk.

!"ternal integration tools help to solidify the relationship between implementation activities and end users at all organizational levels. These tools are most useful for pro#ects that are not well-structured and which re-uire heavy user involvement and commitment. $nternal integration tools promote cohesion and unity within the implementation team. They are most useful for pro#ects with high technical comple"ity. /ormal planning and control tools help structure and se-uence tasks and monitor progress towards goals. They are most valuable for managing pro#ects that are large andBor well-structured. What strategies can be used to overcome user resistance to systems development pro ects?
!nd-user resistance to $ pro#ects can be overcome by the following strategies1

A :people-oriented: strategy to focus on ways of overcoming resistance stemming from factors inherent to individuals or groups. $t can consist of education, coercion through edicts or policies, persuasion, or building commitment through user participation. A :system-oriented: strategy to focus on overcoming resistance stemming from factors inherent in system design. This strategy might include user participation in system design, a design that is highly sensitive to human factors, package modifications to conform to organizational procedures, and user education. A strategy to counter the conflict of people and system factors that consists of restructuring the user-designer relationship, encouraging user participation, and attempting to fi" organizational problems before introducing new systems. What organizational considerations should be addressed by information system design? $nformation system design must consider careful planning and orchestration of organizational change. ,hanges in #ob functions, organizational structure, power relationships, procedures, and behaviour will have to be addressed. Technical solutions must be developed around an appropriate :social design: for an information system. All information systems should support the organization4s strategy and mission. What is a decision(support system #D''%? How does it differ from a management information system #-!'%? A% assists management decision making by combining data, sophisticated analytical models, and user-friendly software into a single, powerful system that can support semistructured or unstructured decision making. These systems help end users utilize data and models to discuss and decide semistructured and unstructured problems, but they do not solve the problems for the user. Cenerally speaking, )$ provide routine, prespecified, and formatted reports based on data e"tracted and summarized from the firm3s T+ . These reports provide information on the firm3s performance and are used to help monitor and control the business. $n contrast, % provide capabilities for addressing nonroutine decisions and user control. % emphasize change, fle"ibility, and rapid response and place a greater emphasis on models, assumptions, ad hoc -ueries, and display graphics. Additionally, )$ primarily

address structured problems, while % unstructured problems.

focus more on supporting semistructured and

How can a D'' support unstructured or semistructured decision making? Unstructured problems are novel and non-routine and have no predefined algorithms or solutions. % help design and evaluate alternatives and monitor the adoption or implementation process. % combine data with models to produce various alternative scenarios for making choices. $n large organizations, decision making is inherently a group process, and % can be designed to facilitate group decision making by providing tools, procedures, and technologies to help people working on decisions as a group. What is the difference between a data(driven D'' and a model(driven D''? ,ive e&amples. A data-driven % is a system that supports decision making by allowing users to e"tract and analyze useful information that was previously buried in large databases. 0ften T+ data are collected in data warehouses. )ultidimensional analysis and datamining tools can then analyze the data. *< mith +9, is an e"ample of a datadriven % . A model-driven % is primarily a stand-alone system that has a model at its heart, perhaps a mathematical or spreadsheet representation of such a model. The emphasis is on the model, scenarios, and what-if sensitivity, such as linear programming. This chapter provides several e"amples of model-driven % , including systems used by <&, and ,ontinental Airlines. What are the three basic components of a D''? 2riefly describe each. The three basic components of a % include a % database, % software system, and % user interface. The % database is a collection of current or historical data from a number of applications or groups, organized for easy access by a range of applications. The % database may be a small database residing on a +, or it may be a massive data warehouse that is continuously updated by ma#or organizational T+ . The % software system is a collection of software tools used for data analysis, including a collection of mathematical and analytical models, 09A+ tools, and datamining tools. Darious kinds of models may be in the model base, including libraries of statistical, optimization, sensitivity analysis, and forecasting models. The % user interface permits easy interaction between users and the % software tools. How can D'' help firms with supply chain management and customer relationship management? upply chain decisions involve determining >who, what, when, and where@ from purchasing and transporting materials and parts through manufacturing products and distributing and delivering those products to customers. % can help managers e"amine this comple" chain comprehensively and search among a huge number of alternatives for the combinations that are most efficient and cost-effective. The prime

management goal might be to reduce overall costs while increasing the speed and accuracy of filling customer orders. % for customer relationship management use datamining to guide decisions about pricing, customer retention, market share, and new revenue streams. These systems typically consolidate customer information from a variety of systems into massive data warehouses and use various analytical tools to slice the data into tiny segments for one-to-one marketing. What is a geographic information system #,!'%? How does it use data visualization technology? How can it support decision making? Ceographic information systems 'C$ ( are a special category of % that use data visualization technology to analyze and display data for planning and decision making in the form of digitized maps. The software can assemble, store, manipulate, and display geographically referenced information, tying data to points, lines, and areas on a map. C$ can thus be used to support decisions that re-uire knowledge about the geographic distribution of people or other resources in scientific research, resource management, and development planning. /or e"ample, C$ might be used to help state and local governments calculate emergency response times to natural disasters or to help banks identify the best locations for installing new branches or AT) terminals. C$ tools have become affordable even for small businesses and some can be used on the *eb. What is a customer decision(support system? How can the !nternet be used for this purpose? A customer decision-support system ',% ( supports the decision-making process of the organization4s e"isting and potential customers. The data can come from both internal and e"ternal sources, including enterprise systems and the *eb. The *eb and $nternet can provide online access to various database and information pools along with software for data analysis. What is a group decision(support system #,D''%? How does it differ from a D''? A C% is an interactive computer-based system that facilitates the solution of unstructured problems by a set of decision makers working together as a group. C% have been developed in response to the growing concern over the -uality and effectiveness of meetings. $n general, % focus on individual decision making while C% support decision making by a group. What underlying problems in group decision making have led to the development of ,D''? The underlying problems of group decision making that have led to the development of C% are the e"plosion of decision-maker meetings, the growing length of these meetings, and the increased number of attendees at these meetings. Describe the three elements of a ,D''.

<ardware, software tools, and people are the three C% elements. <ardware includes the conference facility itself 'room, tables, chairs( that is laid out to support group collaboration. $t also includes electronic hardware such as electronic display boards as well as audiovisual, computer, and networking e-uipment. oftware tools include electronic -uestionnaires, electronic brainstorming tools, idea organizers, -uestionnaire tools, tools for voting or setting priorities, stakeholder identification and analysis tools, policy formation tools, and group dictionaries. +eople include the participants, a trained facilitator, and the staff to support the hardware and software. 1ame five ,D'' software tools. Although many tools e"ist, the list provided in the te"tbook includes electronic -uestionnaires, electronic brainstorming tools, idea organizers, -uestionnaire tools, tools for voting or setting priorities, stakeholder identification and analysis tools, policy formation tools, and group dictionaries. How can ,D'' facilitate group decision making? C% enable more people to attend and participate in a meeting, and at the same time the C% can increase meeting productivity. This increase in productivity is realized because the attendees can contribute simultaneously. A C% can guarantee anonymity, follow structured methods for organizing and evaluating ideas, preserve the results of meetings, and can increase the number of ideas generated and the -uality of decisions while producing the desired results in fewer meetings. A C% can support idea generation, comple" problem analysis, and large groups. Define and describe the capabilities of an e&ecutive support system #/''%. !"ecutive support systems '! ( help managers make unstructured and semistructured decisions. ! focus on the information needs of senior management and combine data from both internal and e"ternal sources. The ! creates a generalized computing and communications environment that can be focused on and applied to a changing array of problems. The ! can help senior e"ecutives monitor organizational performance, track activities of competitors, spot problems, identify opportunities, and forecast trends. How can the !nternet and enterprise systems provide capabilities for e&ecutive support systems? There are several ways that the $nternet and *eb technology can enhance such a system. /irst, the *eb interface is a well-known and understood interface, making it easier to learn and use and less costly to create. econdly, the *eb is an important source of e"ternal data and information. !nterprise systems eliminate the problem of data being unavailable or available in different formats, or having to access hundreds or even thousands of incompatible systems. !nterprise systems allow data to be gathered from a company-wide perspective so that it can be more easily analyzed by senior management. What are the benefits of /''? How do these systems enhance managerial decision making?

Although ! benefits are not easily measured, several benefits are mentioned in the chapter. ! increase fle"ibility, provide the ability to analyze, compare and highlight trends, monitor performance, improve management performance, and increase management3s span of control. ! fle"ibility allows e"ecutives to shape the problems, using the system as an e"tension of their own thinking. ! offer e"ecutives the ability to analyze -uickly and to compare and highlight trends, freeing up e"ecutives and their staff for more creative analysis and decision making. ! can, and do, change the workings of organizations. !"ecutives are better able to monitor activities below them, allowing them to push decision making further down in the organization while e"panding the e"ecutive4s span of control. What is knowledge management? )ist and briefly describe the information systems that support it and the kind of information technology #!*% infrastructure it requires. Anowledge management is the set of processes developed in an organization to create, gather, store, maintain, and disseminate the firm3s knowledge. The ma#or information systems that support knowledge management are office systems, knowledge work systems, group collaboration systems, and artificial intelligence systems. 0ffice systems are systems designed to increase the productivity of information workers in the office. !"amples of office systems include word processing, desktop publishing, imaging and *eb publishing, electronic calendars, and desktop database. Anowledge work systems are information systems that aid knowledge workers in the creation and integration of new knowledge in the organization. !"amples of knowledge work systems include ,A%, virtual reality, and investment workstations. Croup collaboration systems facilitate communication, collaboration, and coordination. !"amples of group collaboration systems include groupware, teamware, and intranets. Artificial intelligence is the development of systems that behave as humans. !"amples of artificial intelligence systems include e"pert systems, neural nets, fuzzy logic, genetic algorithms, and intelligent agents. 2atural language, robotics, perceptive systems, e"pert systems, and intelligent machines are artificial intelligence initiatives.

How does knowledge management promote organizational learning? How do knowledge management systems support knowledge networks, knowledge repositories, and communities of practice? Anowledge management promotes organizational learning as it defines and codifies the organization4s knowledge base. Anowledge management enables the organization to learn from its environment and incorporate this new knowledge into its business processes. 2ew 0+s can be created that reflect recent e"periences within the organization. Anowledge management systems enable the creation and support of knowledge networks, knowledge repositories, and communities of practice. Anowledge networks enable people to be linked, so that e"perts in a given area can be easily identified and share tacit knowledge. Anowledge management streamlines the workflow and provides tools for creating a knowledge repository. A knowledge repository is a collection of internal and e"ternal knowledge stored in a single location for more efficient management and utilization by the organization. A community of practice is an informal group of people who may live or work in many different locations but who share a common professional interest. Describe the roles of the office in organizations. What are the ma or activities that take place in offices? 0ffices are where data reside and where most knowledge work takes place. 0ffices coordinate the flow of information throughout the entire organization. 0ffices coordinate the work of local professionals and information workers, coordinate work in the organization across levels and functions, and couple the organization to the e"ternal environment. The ma#or activities of an office are managing documents, scheduling for individuals and groups, communicating with individuals and groups, and managing data about individuals and groups. What are the principal types of information systems that support information worker activities in the office? Croup collaboration systems, office systems, artificial intelligence systems, and knowledge work systems are types of information systems that support information worker activities in the office. /or this -uestion, students should also mention that a variety of office systems are available to support office activity. Table 1;-1 identifies several types of office systems. What are the generic requirements of knowledge work systems? Why? Anowledge work systems provide knowledge workers with the specialized tools they need. They must have ade-uate computing power to handle the specialized tasks and comple" calculations, provide easy access to e"ternal databases to support research, and present a user-friendly interface. These systems reflect the special needs of knowledge workers. $n this day and age, knowledge work is critical to most organizations, and in some organizations knowledge work systems produce strategic advantage or the knowledge that enables their company to keep up with others who are trying for strategic advantages.

Describe how the following systems support knowledge work6 computer(aided design #":D%, virtual reality, and investment workstations. ,A% systems automate the creation and revision of designs using computers and sophisticated graphics software. &y using ,A%, a business benefits in many ways, including the production of more sophisticated and functional designs, reducing the time re-uired to produce designs, reducing e"pensive engineering changes, preparing fewer prototypes, and facilitating the tooling and manufacturing process. Dirtual reality systems have visualization, rendering, and simulation capabilities. Dirtual reality systems use interactive graphics software to create computer-generated simulations that are so close to reality that users believe they are participating in a :real: world. The users actually feel immersed in the computer-generated world. Dirtual reality is providing educational, scientific, and business benefits. $nvestment workstations are computer systems that access and manipulate massive amounts of financial data to manage financial trades and portfolio management. $n addition to massive amounts of data, financial data are produced so -uickly that specialized, very powerful systems are necessary to keep up with the rapid speed of finance and financial changes today. How does groupware support information work? Describe its capabilities and !nternet and intranet capabilities for collaborative work. Croupware supports the electronic communication, collaboration, and coordination of group work. Croupware enables group members to electronically schedule meetings, hold meetings, communicate, collaborate, share document preparation, and share knowledge and work information. $nternet tools are available to support e-mail, newsgroup discussions, group scheduling, *eb publishing, and point-to-point conferencing. *eb conferencing tools are available to facilitate online meetings, conferences, and presentations. Croups can use teamware to support group communication, collaboration, and coordination via an intranet. Teamware is similar to groupware but does not provide as powerful application development capabilities. Additionally, intranets provide the foundation for enterprise knowledge environments. these knowledge environments can then serve as knowledge maps. To facilitate the navigation of its knowledge resources, a company can use an enterprise information portal. What is artificial intelligence? Why is it of interest to business? Artificial intelligence is commonly defined as the effort to develop computer-based systems 'hardware and software( that behave as humans. These systems would be able to learn natural languages, accomplish coordinated physical tasks 'robotics(, and develop and utilize a perceptual apparatus that informs their physical behaviour and language 'visual and oral perception systems(, and emulate human e"pertise and decision making 'e"pert systems(. These systems would also e"hibit logic, reasoning, intuition, and common sense. Artificial intelligence can help businesses store information in an active form as organizational memory, create a mechanism that is not sub#ect to human feelings, eliminate routine and unsatisfying #obs held by people, and enhance the organization3s knowledge base by generating solutions to specific, massive, comple" problems.

What is the difference between artificial intelligence and natural or human intelligence? Artificial intelligence is an effort to fashion computer systems that behave like human beings. A$ systems would have the ability to learn natural languages, accomplish coordinated physical tasks, utilize comple" visual and oral perceptual systems, and use comple" logic, reasoning, and intuition. To date, the A$ systems that have been developed do not e"hibit all of the -ualities of human intelligence, and in no way can be considered very intelligent. A$ systems are based on human e"pertise, but they can use only very limited reasoning patterns and perform very limited tasks. A$ systems also cannot learn on their own and must be programmed by a human to follow certain rules or produce certain solutions. 2onetheless, useful, even valuable A$ systems have been developed. <uman intelligence is definitely comple" and broader than computer intelligence. <uman beings can develop associations, use metaphors and analogies, and impose a conceptual apparatus on the surrounding world all on their own. Define an e&pert system and describe how it can help organizations use their knowledge assets. An e"pert system is a knowledge-intensive computer program that captures the e"pertise of a human in limited domains of knowledge. !"pert systems can capture the knowledge of skilled workers and in the form of a set of rules, adding to an organization3s knowledge. An e"pert system assists in decision making, can e"plain the reasoning behind a recommended answer, and makes an e"pert3s knowledge more readily available to more employees within the organization. Define and describe the role of the following in e&pert systems6 rule base, :! shell, and inference engine. A rule base is the collection of knowledge in an A$ system that is represented in the form of $/-T<!2 rules. An inference engine will either search the rule base to arrive at a conclusion or will start with a hypothesis and work backwards. An A$ shell is a userfriendly programming environment that is used to develop e"pert systems. A$ shells can -uickly generate user-interface screens, capture the knowledge base, and manage the strategies for searching the rule base. The inference engine is the software that embodies the strategy used to search through the rule base. the inference engine can be forward or backward chaining. What is case(based reasoning? How does it differ from an e&pert system? ,ase-based reasoning ',&=( uses descriptions of past e"periences of human specialists, representing them as >cases@ and storing them in a database for later retrieval when the user encounters a new case with similar parameters. The system searches for stored cases similar to the new one, locates the closest fit, and offers the solution to the old case for use with the new case. $f the new case fits the solution, it is added to the case database. $f not, the case will be added with a new solution or e"planations as to why the solution did not work. ,&= differs from e"pert systems in that it captures the knowledge of the organization rather than a single e"pert, and the knowledge is captured as cases rather than if-then rules. Also, e"pert systems work by applying $/-T<!2-!9 ! rules against a knowledge base whereas ,&= represents

knowledge as a series of cases. *ith case-based reasoning, the knowledge base is continuously updated by users. Describe three problems of e&pert systems. !"pert systems are limited to certain problems, working successfully only with problems of classification that have few alternative outcomes. $n addition, the outcomes must be known in advance. ince some e"pert systems are comple", their maintenance costs can e-ual their development costs in a few years. The knowledge base is fragile and brittle because these systems rely upon $/-T<!2 representation. uch representation e"ists primarily in te"tbooks and cannot be used for deep causal models or temporal trends. !"pert systems cannot represent knowledge that is essentially intuitive. !"pert systems have no ability to learn over time. Therefore, keeping the e"pert systems up-to-date in fast-moving fields such as medicine and computer sciences is a critical problem. Describe a neural network. .or what kinds of tasks would a neural networkbe appropriate? 2eural networks are usually physical devices 'although they can be simulated with software( that emulate the physiology of animal brains. The resistors in the circuits are variable and can be used to :teach: the network. *hen the network makes a mistake, i.e., chooses the wrong pathway through the network and arrives at a false conclusion, resistance can be raised on some circuits, forcing other neurons to fire. Used after a false conclusion, intervention teaches the machine the correct response. $f this learning process continues for thousands of cycles, the machine :learns: the correct response. The simple neurons or switches are highly interconnected and operate in parallel so they can all work simultaneously on parts of a problem. 2eural networks are very different from e"pert systems where human e"pertise has to be modelled with rules and frames. $n neural networks, the physical machine emulates a human brain and can be taught from e"perience. An e"pert system is highly specific to a given problem and cannot be retrained. 2eural networks do not model human intelligence or aim to solve specific problems. $nstead of putting human e"pertise into programs, neural network designers put intelligence into the hardware in the form of a generalized capacity to learn. 2eural networks can solve entire classes of problems. The neural network can be easily modified. 2eural networks, therefore, promise a substantial savings in development cost and time. They allow much greater generality and more closely appro"imate what we consider intelligence. They have proven especially useful for visual pattern recognition problems. The students should be able to relate to +apnet and the system used by D$ A. Define and describe fuzzy logic. .or what kinds of applications is it suited? /uzzy logic is a rule-based A$ technology that tolerates imprecision, even using that imprecision to solve problems we could not solve before. /uzzy logic creates rules that use appro"imate or sub#ective values and incomplete or ambiguous data. /uzzy logic represents more closely the way people actually think than traditional $/-T<!2 rules. /or e"ample, if we all agree that 176 degrees is hot and -;6 degrees is cold, then is M5 degrees hot, warm, comfortable, or cool? The answer is fuzzy at best and cannot be

programmed in an $/-T<!2 manner. Also, discuss with the students the fuzzy logic system used by endai to control acceleration so it will operate more smoothly and save the subway company e"penses. What are genetic algorithms? How can they help organizations solve problems? .or what kinds of problems are they suited? Cenetic algorithms 'adaptive computation( are a variety of problem-solving methods that are conceptually based on the method that living organisms use to adapt to their environment S the process of evolution. Cenetic algorithms control the generation, variation, adaptation, and selection of possible problem solutions using genetically based processes. As solutions alter and combine, the worst ones are discarded, and the better ones survive to go on and produce even better solutions. Cenetic algorithms are particularly suited to the areas of optimization, product design, and the monitoring of industrial systems. 0rganizations can use genetic algorithms to minimize costs and ma"imize profits and schedule and use resources efficiently. Cenetic algorithms are ideal when problems are dynamic and comple" and involve hundreds of variables or formulas. /or e"ample, Ceneral !lectric used a genetic algorithm to help them design a #et turbine aircraft engine that re-uired the use of about 166 variables and 56 constraint e-uations. The te"t provides other e"amples. What are intelligent agents? How can they be used to benefit businesses? $ntelligent agents are software programs that use a built-in or learned knowledge base to carry out specific, repetitive tasks for an individual user, business process, or software application. &y watching the user of a program or system, an intelligent agent may customize the software system to meet the user4s needs, reducing software support costs. $ntelligent agents can be used as wizards to help users do or learn how to perform a given task. $ntelligent agents can be used to carry out >smart@ searches of the database, data warehouse, or the $nternet, reducing search costs and avoiding the problems of misdirected searches. What are the five ma or factors to consider when building an international information systems portfolio? The five ma#or factors are the need to1 Understand the global business environment in which your firm is operating. ,onsider a corporate strategy for competing in that environment. ,onsider how to structure your organization to pursue the strategy. ,onsider management and business processes in implementing the strategy. %evelop an appropriate technology platform. Describe the five general cultural factors leading toward growth in global business and the four specific business factors. Describe the interconnection among these factors. The five general cultural factors are global communication and transportation technologies, development of global culture, emergence of global social norms, political stability, and global knowledge base. Clobal communication and transportation

technologies reference the fact that a global village has been created in which global communications of all kinds are no more difficult and not much more e"pensive than domestic communications. The development of a global culture has created shared values and beliefs around the world. The emergence of global social norms references the fact that proper attire, proper consumption, good and bad government, and other norms are more and more shared. $n reference to political stability, the world is living through the longest period of world political stability in the modern age. $n reference to the global knowledge base, educational, scientific, and industrial knowledge and skills are no longer centered in 2orth America, !urope, and Fapan, but have spread to 9atin American, ,hina, outhern Asia, and !astern !urope. The specific business factors are global markets, global production and operations, global coordination, global workforce, and global economies of scale. Clobal markets reference the fact that patterns of consumption of goods are becoming similar around the world. Clobal production and operations refer to the fact that far-flung production facilities can now be coordinated at central head-uarters thousands of miles away. Clobal coordination means the coordination of business factors has e"panded beyond production to include all ma#or business functions, such as accounting, marketing, sales, and human resources systems development. Clobal workforce means that we can locate our business activities based on workforce availability. Clobal economies of scale means that production can now be concentrated where it can be best accomplished. lower cost factors of production can be e"ploited wherever they emerge. These factors are interrelated. The spread of global communications has led to the emergence of a global culture and global social norms. This, in turn, has led to the development of global markets. !merging global technologies make possible the transportation of raw materials and finished products throughout the world and have given businesses the ability to act globally. Clobal production and coordination and the ability of businesses to make use of global economies of scale all depend upon the emergence of sophisticated global communications. The e"istence of global markets has been one of the factors making global production and operations attractive. What is meant by a global culture? A global culture is a shared culture in which people around the world share such cultural artifacts as news programs and movies. These, in turn, result in the emergence of shared social norms in such areas as proper attire, proper consumption, and values concerning good and bad government. What are the ma or challenges to the development of global systems? The general challenges are cultural particularism, social e"pectations, and political laws. pecific challenges include standards, reliability, speed, and personnel. Table 15-7 provides e"amples of each challenge. Why have firms not planned for the development of international systems? /or some companies, the competition has not been powerful enough yet to drive them to plan for the development of international systems. 0ther companies lack the global

strategy needed for such development, or they have inherited a patchwork of international systems built with outdated technologies and standards. Describe the four main strategies for global business and organizational structure. The four main strategies for global business and organizational structure are domestic e"porter, multinational, franchiser, and transnational. The domestic e"porter is characterized by heavy centralization of corporate activities in the home country of origin. +roduction, sales, marketing, finance, and other such functions are set up to optimize resources in the home country. /oreign marketing is totally reliant on the domestic home base. A multinational company concentrates financial management and control in a central home base but decentralizes production, sales, and marketing to suit local market conditions. /ranchisers create, design, and finance the product in the home country, but rely on foreign personnel for further production, marketing, and human resources. 0ften, the product must be produced locally because it is perishable. The transnational organization is a stateless, truly globally managed firm. $t has no single national head-uarters but instead has many regional head-uarters and perhaps a world head-uarters. 2early all of the value-added activities are managed from a global perspective without reference to national borders. Describe the four different system configurations that can be used to support different global strategies. The four different system configurations are centralized, duplicated, decentralized, and networked. ,entralized systems reference systems development and operations that occur totally at the domestic home base. *ith duplicated systems, systems development occurs totally at the home base, but operations are handed over to autonomous units in foreign locations. *ith decentralized systems, each foreign unit designs its own, totally uni-ue solutions and systems. *ith networked systems, systems development and operations occur in an integrated and coordinated fashion across all units. What are the ma or management issues in developing international systems? The ma#or management issues in developing international systems are listed in Table 15-;. These issues include agreeing on common user re-uirements, introducing changes in business processes, coordinating applications development, coordinating software releases, and encouraging local users to support global systems. What are the three principles to follow when organizing the firm for global business? Three principles to follow when organizing the firm for global business are1 1( organize value-adding activities along lines of comparative advantage. 7( develop and operate systems units at each level of corporate activity. and 8( and establish at world head-uarters a single office responsible for development of international systems, a global chief information officer ',$0( position.

What are the three steps of a management strategy for developing and implementing global systems? The three steps are divide, con-uer, and appease. /irst, define the core business process and then identify the core systems to coordinate centrally. econd, choose an approach. Third, make the benefits clear. What is meant by cooptation, and how can it be used in building global systems? ,ooptation is defined as bringing the opposition into the process of designing and implementing the solution without giving up control over the direction and nature of the change. The idea is to find a way whereby local units in transnational companies are brought into the process of building transnational core systems by becoming part of the process rather than by being brought in through raw power. 0ne cooptation approach is to permit each country unit to develop one transnational application first in its home territory, and then throughout the world. Another approach is to develop systems based upon e"isting centers of e"cellence. The centers of e"cellence perform the initial identification and specification of the business process, define the information re-uirements, perform the business and systems analysis, and accomplish all design and testing. This approach uses a phased rollout strategy. Describe the main technical issues facing global systems. <ardware, global software, and telecommunications are the main technical issues. <ardware issues arise because the firm needs to standardize the computer hardware platform when there is so much variation from operating unit to operating unit and country to country. /inding applications that are user friendly in an international environment and that truly enhance productivity is a critical software challenge. )aking data flow seamlessly across networks shaped by disparate national standards is a ma#or telecommunications challenge. Describe three new technologies that can help firms develop global systems. % 9, satellite systems, digital cell phones, personal communication services, D+2 , and the $nternet are several technologies. tudents will identify others.

Вам также может понравиться