Chapter 10: Information Systems Security



  • Q10-1: What is the goal of information systems security?
    • Trade-off between security and freedom / cost and risk
    • The IS security threat/loss scenario
      • Threat - person or organization, without owner's permission or knowledge, seeking to obtain or alter data or other IS assets illegally
      • Vulnerability - opportunity for threats to obtain access to organizational or individual assets
      • Safeguard - some measure taken to block the threat from obtaining the asset > not always effective
      • Target - asset that the threat desires
    • What are the sources of threats?
      • Human errors and mistakes - employees / non-employees accidental
      • Computer crime - employees / non-employees intentional destroy
      • Natural events & disasters - fires, floods, earthquake etc.
    • What types of security loss exist?
      • Unauthorized data disclosure
        • Pretexting - when someone pretends to be someone else and deceives; e.g. they pretend to be credit card company
        • Phishing - pretexting via email to obtain unauthorized data
          • Phisher - sends an email pretending to be a legit company, requesting confidential data 
        • Spoofing - someone pretending to be someone else, e.g. pretending to be mom for phone bill
          • IP spoofing - when an intruder masquerades as another site by using another site's IP address
          • Email spoofing - synonym for phishing
        • Sniffing - intercepting computer communications; need physical connection to network if wired networks
          • Wardrivers - search for unprotected wireless networks and take computers with wireless connections through an area 
        • Hacking - stealing data such as customer lists, product inventory data, employee data, and other proprietary and confidential data by breaking into computers, servers, or networks
      • Incorrect data modification
      • Faulty service
        • Usurpation - when computer criminals invade computer system & replace legit programs with own, unauthorized ones to shut down legit apps and substitute their own processing to spy, steal, and manipulate data
      • Denial of service (DoS) - human error in following procedures or a lack of procedures
      • Loss of infrastructure 
        • Advanced Persistent Threat (APT) - when large, well-funded organizations such as governments engage in sophisticated, long-running computer hack
  • Q10-2: How big is the computer security problem?
    • We don't know full extent of financial and data losses due to computer security threats 
    • Losses due to natural disasters are enormous and impossible to compute
    • No one knows that cost of computer crime & all studies are based on surveys
    • 6 most expensive types of computer crime:
      • Denial of service
      • Malicious insiders
      • Web-based attacks
      • Malicious code
      • Phishing & Social Engineering 
      • Stolen devices
  • Q10-3: How should you respond to security threats?
    • Intrusion detection system (IDS) - computer program that sense when another computer is attempting to scan or access a computer or network
    • Brute force attack - password cracker tries every possible combination of characters 
    • Cookies - when you visit Web sites, small files are received by your browser
    • Create strong passwords / create multiple 
    • Send no valuable data via email or IM
    • Use https at trusted, reputable vendors
    • Clear browsing history, temporary files, and cookies
    • So what? Black Hat
      • Show how to exploit weaknesses in hardware, software, protocols, or systems from smartphones to ATMs
      • Serve as education forum for hackers, developers, manufactures, gov't
      • Dan Geer recommends: 
        • Mandatory reporting of security vulnerabilities
        • Make software venders liable for damage their code causes after abandoned, or users allowed to see/have source code.
        • ISP liable for harmful, inspected content
        • Right to be forgotten - appropriate and advantageous
        • End-to-End Encrypted Email
  • Q10-4: How should organizations respond to security threats?
    • Senior management created company-wide policies:
      • What sensitive data will be stored?
      • How data processed?
      • Will data be shared? 
      • Can employees / others obtain copies of data stored about them?
      • Can employees / others request changes to inaccurate data?
    • Senior management can't eliminate risk so > manages risk
  • Q10-5: How can technical safeguard protect against security threats?
    • Technical safeguards - involve the software and hardware components of an IS; primary safeguards include: 
      • Identification and authentication 
        • Identification - username identifies the user
        • Authentication - password authenticates that user
        • Smart cards - similar to credit card, plastic card that has a microchip, which holds far more data than magnetic strip
          • Personal identification number (PIN) - required by smart cards to be authenticated 
        • Biometric authentication - uses fingerprints, facial features, and retinal scans (personal physical characteristics) to authenticate users
      • Encryption
        • Encryption - secure storage or communication by transforming clear text into coded, unintelligible text
        • Encryption algorithms - procedures for encrypting data
        • Key - encrypting data using a string a bits
          • Symmetric encryption - same key used to encode & decode 
          • Asymmetric encryption - two keys are used, 1 encode & 1 decode
            • Public key encryption - used on the Internet, special asymmetrical encryption
        • https - protocol for most secure communication over the Internet
        • Secure Sockets Later (SSL) / Transport Layer Security (TLS) - protocol for encrypting data > uses a combo of public key encryption and symmetric encryption
      • Firewalls
        • Firewalls - computing device that prevents unauthorized network access
        • Perimeter firewall - sits outside the organizational network 
        • Internal firewall - Inside organizational network 
        • Packet-filtering firewall - examines each part of the message and determines whether to let that part pass; examines source address, destination address, and other data 
      • Malware protection 
        • Malware - Viruses, spyware, and adware that is a broad category of software
        • Virus - computer program that replicates itself
        • Payload - delete programs or data OR modify data in undetected ways
        • Trojan horses - viruses that masquerade as useful programs or files
        • Worm - virus that self-propagates using Internet or other computer network 
        • Spyware - programs installed on you just computer without their knowledge or permission
        • Adware - also installed without user permission and resides in background observing user behavior
        • Ransomware -  malicious software that blocks access to system or data until money is paid to the attacker
      • Design for secure applications
      • Malware Types and Spyware/Adware Symptoms
        • Slow system startup
        • Sluggish system performance
        • Pop-up advertisements
        • Suspicious browser homepage changes
        • Suspicious changes to taskbar and other system interfaces
        • Unusual hard-disk activity
    • Design for Secure Applications
      • SQL injection attack - User enters SQL statement into a form instead of a name or other data
        • SQL code becomes part of database commands issued 
        • Improper data disclosure, data damage and loss possible
  • Q10-6: How can data safeguards protect against security threats?
    • Data safeguards - protect databases another organizational data
      • Define data policies
      • Data rights and responsibilities
      • Rights enforced by user accounts authenticated by passwords
      • Data encryption
      • Backup and recovery procedures
      • Physical Security
    • Data administration - organization-wide function in charge of developing their policies and enforcing data standards
    • Database administration - function that pertains to a particular database
    • Key escrow 
  • Q10-7: How can human safeguards protect against security threats?
    • Human safeguards - procedure components and people of information systems; for employees:
      • Position definition
      • Hiring and screening
      • Dissemination and enforcement 
      • Termination
    • Human safeguards for non-employee personnel
      • Temporary personnel, vendors, partner personnel (employees of business partners and the public > appropriate screening and security training
        • Provide accounts and passwords with least privilege and remove accounts as soon as possible
      • Hardening - taking extraordinary measures to reduce a system's vulnerability
    • Account administration
      • Account management - standards for new user accounts, modification of account permissions, removal of unneeded accounts
      • Password management - Users change passwords frequently
      • Help-desk policies - provides means of authenticating users
    • Systems procedures
      • Normal operation - Use the system to perform job tasks with security appropriate to sensitivity
      • Backup - Prepare for loss of system functionality
      • Recovery - Accomplish job tasks during failure. Know tasks to do during system recovery
    • Security monitoring 
      • Honeypots - false targets for computer criminals to attack, created by companies
  • Q10-8: How should organizations respond to security incidents?
    • Factors in incident response:
      • Have a plan in place
      • Centralized reporting
      • Specific responses > speed, preparation, and don't make problem worse
      • Practice
  • Q10-9: 2026?
    • Concern about balance of national security of data privacy
      • PRISM - intelligence program by which National Security Agency (NSA) requested and received data about Internet activities from major Internet providers
      • Privacy - freedom from being observed
      • Security - free from danger
    • APTs more common
    • Security improved on devices and at large organizations
    • Strong, local "electronic" sheriffs

Chapter 9: Business Intelligence Systems

  • Introduction
    • BI systems - IS that can produce patterns, relationships, and other information from organizational structured and unstructured data + from external, purchased data
  • Q9-1: How do organizations use business intelligence (BI) systems?
    • Business Intelligence (BI) systems - identifying patterns, relationships, and trends for use by business professionals and other knowledge workers > from information systems that process operational, social, and other data
      • Components of BI systems / data sources: operational databases, social data, purchased data, and employee knowledge
    • Business Intelligence - the patterns, trends, relationships, and predictions
    • BI application - the BI system's software component 
      • Analyze data through reporting, data mining, BigData, and knowledge management
    • How do organizations use BI? 4 Collaborative Tasks:
      • Project management, problem solving, deciding, and informing
      • Decision support systems - older term, synonym for decision-making BI systems
    • What are typical BI applications?
      • Identifying changes in purchasing patterns > important life events change what customers buy
      • BI for entertainment > classify customers (Netflix) by viewing patterns
      • Predictive policing > analyze data on past crimes, location, data, time, day of week, etc.
      • Just-in-time medical reporting > real-time data mining and reporting
  • Q9-2: What are the three primary activities in the BI process?
    • Acquire data
      • Data acquisition - obtaining, cleaning, organizing, relating, and cataloging data
    • Perform analysis
      • BI analysis - creating business intelligence
      • Reporting, data mining, BigData, knowledge management
    • Publish results 
      • Publish results - delivering business intelligence to knowledge workers who need it
      • Push publishing - without any request from user, delivers BI to users
      • Pull publishing - user is required to request BI
    • Ethics Guide: Unseen Cyberazzi
      • Data broker or aggregator acquires / purchases consumer and other data from public records, retailers, Internet cookie vendors, social media trackers, and other sources
      • Data broker enable you to view data stored about you, but difficult to learn how to request your data
  • Q9-3: How do organizations use data warehouses and data marts to acquire data?
    • Data warehouses - facility that manages BI data of organization
      • Functions of warehouses: obtain, cleanse, organize & relate, and catalog data
      • Basic report and simple analysis not recommended for security and control reasons
      • Operational data is structured for fast and reliable transaction processing
      • Data warehouses include data purchased from outside sources
    • Data warehouse metadata database - holds metadata concerning the data
      • Note: BI users = specialists in data analysis vs. knowledge workers = nonspecialist users of BI results
    • Problems with operational data
      • Dirty data, missing values, inconsistent data, data not integrated, wrong granularity, too much data
      • Granularity - level of detail represented by the data > can be too fine or not fine enough > better to have too fine than too coarse
    • Data warehouses vs. Data marts
      • Data mart - smaller than the data warehouse, it is a data collection that addresses the needs of a particular department or functional area of the business
      • Data warehouse = distributor in a supply chain
      • Data mart = retail store in a supply chain
  • Q9-4: How do organizations use reporting applications?
    • Create meaningful information from disparate data sources & deliver information to user on time
    • Reporting application - inputting data from one or more sources using a BI application, and applying reporting operations to that data to produce business intelligence
      • Basic reporting operations: sorting, filtering, grouping, calculating, and formatting
    • RFM Analysis - used to analyze and rank customers according to their purchasing patterns, a technique readily implemented with basic reporting operations 
    • Online Analytical Processing (OLAP) - more generic than RFM, second type of reporting application that provides ability to sum, count, average, and perform other simple arithmetic operations on groups of data
      • Measure - data item of interest
      • Dimension - characteristic of a measure
      • OLAP cube - some software product show displays using three axes
      • Drill down - further divide the data into more detail
  • Q9-5: How do organizations use data mining applications?
    • Data mining - finding patterns and relationships among data for classification and prediction through the application of statistical techniques
    • Unsupervised data mining - a model or hypothesis is not created before running the analysis, instead, a data mining application is applied to the data & the results are observed
      • Analysts create a hypothesis after the analysis to explain the patterns found
      • Cluster analysis - a common unsupervised technique that identifies groups of entities that have similar characteristics
      • Market-basket analysis - technique for determining sales patterns; shows products that customers tend to buy together
        • Cross-selling - fact that customers that buy X also buy Y
        • Support - probability that two items will be purchased together
        • Confidence - conditional probability estimate
        • Lift - ratio confidence to the base probability of buying an item
    • Supervised data mining - prior to the analysis, a model is developed and statistical techniques are applied to data to estimate parameters of the model
      • Regression analysis - measure the effect of a set of variables on another variable
      • Neural networks - second type, used to predict values and make classifications such as "good prospect" / "poor prospect" customers 
    • Decision Tree - predicting a classification or a value through a hierarchical arrangement of criteria
  • Q9-6: How do organizations use BigData applications?
    • BigData - data collections characterized by huge volume, rapid velocity, and great variety
      • Are at least a petabyte in size, generated rapidly, and has structured data, free-form text, log files, graphics, audio, and video
      • MapReduce - technique for harnessing the power of thousands of computers working in parallel; BigData collection is broken into pieces
      • Hadoop - supported by the Apache Foundation, an open source program that implements MapReduce on thousands of computers
  • Q9-7: What is the role of knowledge management systems?
    • Knowledge management (KM) - creating value from intellectual capital and sharing that knowledge with employees, managers, customers, suppliers, and others who need that capital
      • Benefit organization by improving process quality and increasing team strength
    • What are expert systems?
      • Expert systems - encoding human knowledge, using rule-based systems, in the form of If / Then rules
      • Expert system shells - program that processes a set of rules
      • Drawbacks of Expert Systems:
        • Difficult and expensive to develop
          • Labor intensive
        • Difficult to maintain
          • Changes cause unpredictable outcomes
          • Constantly needs expensive changes
        • Don't live up to expectations
          • Can't duplicate diagnostic abilities of humans
    • What are content management systems?
      • Content management systems (CMS) - knowledge that is encoded in documents; information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge
      • Challenges: most are huge, content is dynamic, documents do not exist in isolation of each other, and document contents are perishable
      • CMS alternatives: in-house custom, off-the-shelf, and public search engine
    • How do hyper-socal organizations manage knowledge?
      • Hyper-social knowledge management - application of SM and related applications for management and delivery of organizational knowledge resources
      • Alternative media: 
        • Rich directory - employee directory that includes organizational structure and expertise and the standard name, email, phone, and address
    • Resistance to knowledge sharing:
      • Employees reluctant to exhibit their ignorance + competition
      • Strong management endorsement
      • Strong positive feedback
      • "Nothing wrong with praise or cash ... esp. cash"
  • Q9-8: What are the alternatives for publishing BI?
    • Characteristics of BI Publishing Alternatives
      • Static reports - BI documents that are fixed at the time of creation and do not change
      • Dynamic reports - BI documents that are updated at the time they are requested
      • Subscriptions - user requests for particular BI results on a particular schedule or in response to particular events
    • What are the two functions of a BI server?
      • BI server - purpose-built, Web server application for publishing of business intelligence
      • Management and delivery
  • Q9-9: 2026?
    • Exponentially more info about customers + better data mining techniques
    • Companies able to buy & sell purchasing habits and psyche
    • Singularity > computer systems adapt & create own software without human assistance, machines will create info for themselves
      • Will we know what machines know?

Chapter 8: Social Media Information Systems

  • Introduction 
    • Do you have a social media strategy? Will using social media affect their bottom line?
  • Q8-1: What is a social media information system (SMIS)? 
    • Social media (SM) - using IT to support the sharing of content among a network of users 
    • Communities (of practice) - groups of related people with a common interest
    • Social media information system (SMIS) - the IT that supports content sharing among network of users
    • Social Media is a convergence of disciplines: psychology, organization theory, marketing, MIS, computer science, and sociology
    • Three SMIS Roles:
      1. Social media providers - platforms such as Facebook, LinkedIn, Instagram, etc. that enable the creation of social networks (compete for attention of users for associated advertising dollars)
        • Attract & target certain demographic groups
        • Social networks - social relationships for people with common interest
      2. Users - both individuals & organizations using SM sites to build relationships
        • Organizations can be users / providers / both > hire staff to maintain SM presence, build relationships, promote products, and manage their image.
        • Internal platforms = wikis, blogs, and discussion boards
      3. Communities 
        • formed based on mutual interests > transcend geographic, familial, and organizational boundaries 
        • Most people belong to several / many different communities 
        • How the SM site relates the communities depend on its goals
          • Pure publicity = viral hook - inducement for passing communication along
    • SMIS Components
      • Hardware - mobile devices, laptops, desktops, etc. used to process SM sites
      • Software - mobile applications for variety of platforms: iOS, Android, Windows / Provider: applications, NoSQL, DBMS, analytics
      • Data
        • Content data - responses to data / data, contributed by users
        • Connection data - relationship data > like particular pages / relation to friends
      • Procedures - designed to be easy to learn & use > informal, evolving, and socially oriented
        • Organization procedures to create content, manage user responses, remove obsolete / objectionable content, and extract value 
      • People - goals and personalities influence what people do > key users, adaptive, can be irrational
  • Q8-2: How do SMIS advance organizational strategy?
    • Strategy determines value chain > business processes > information systems
    • Social media is very dynamic by nature > cannot be designed or diagrammed
    • Social Media and the Sales and Marketing Activity
      • Social CRM - dynamic, CRM process that is SM-based
      • As both organization & customers create and process content, emerge in dynamic process > each customers crafts own relationship with company
      • Relationship emerge from joint activity so customers same control as organizations
      • Organizations struggling to transition from controlled, structured, traditional CRM > wide-open, adaptive, dynamic social CRM processes
      • Risk: loss of credibility and bad PR
    • Social Media and Customer Service
      • Product users willing to help each other solve problems, without pay
      • Primary risk of peer-to-peer support = loss of control
    • Social Media and Inbound & Outbound Logistics
      • Benefits
        • Numerous solution ideas and rapid evaluation 
        • Solutions to complex SupChain problems 
        • Facilitates user created content/feedback for problem solving 
      • Risk: 
        • Loss of Privacy 
        • Open discussion of problem definitions, causes, and solution constraints
    • Social Media and Manufacturing & Operations
      • Develop supplier relationships, and operational efficiencies
      • Crowdsourcing - employing users to participate in product design or product redesign
      • Business-to-consumer (B2C) - market products to end users
      • Business-to-business (B2B) - promoting brand awareness and generating new leads to retailers
      • Risk: loss of efficiency / effectiveness
    • Socials Media and Human Resources
      • SM used for finding employees, recruiting candidates, or for candidate evaluation
      • Risk: error to form conclusions about employee & loss of credibility 
  • Q8-3: How do SMIS increase social capital?
    • Capital - resources invested for future profit; physical = factories, machines, equipment, etc.
    • Human capital - investing in human knowledge and skills for future profit
    • Social capital - investing in social relations with expectation of returns in marketplace
    • What is the value of social capital? > Relationships provide:
      • Information - about opportunities, alternatives, problems, etc. that are important to business professionals 
      • Influence - opportunity to influence decision makers 
      • Social credentials - bask in glory with whom you are related 
      • Personal reinforcement - in professional's identity, image, and position
      • Value of social capital - determined by number of relationships in social network
    • How do social networks add value to businesses?
      • Elements of social capital: number of relationships, strength of relationships, and resources controlled by "friends" 
    • Using social networking to increase the number of relationships
      • Influencer - your opinion may force a change in others' beliefs and behaviors
      • Express opinion by word-of-mouth to social network, SMIS allow scale of relationships
    • Using social networks to increase the strength of relationships
      • Strength of relationship - how likely the other entity (organization or person) in the relationship will do something that benefits the organization
    • Using social networks to connect to those with more resources
      • Social capital = number of relationships x relationship strength x entity resources
      • Huge network of people with few resources = less valuable than a smaller network of people with substantial resources 
      • Resources MUST be relevant
  • Q8-4: How do (some) companies earn revenue from social media?
    • Hyper-social organization - transforms interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities
    • You are the product 
      • Monetize - free product to attract users, but how do they make money from their application, service, or content?
      • Make users the product
    • Revenue Models for Social Media 
      • Advertising 
        • Pay-per-click - advertisers display ads to potential customers for free and pay only when the customer clicks 
        • Use increases value - the more people using a site, the more value it has > the more people will visit 
      • Freemium - offering users basic service for free and then charges premium for upgrades or advanced features (revenue model)
        • Ad-blocking software - filter out advertising content, rarely see internet ads
    • Does mobility reduce online ad revenue?
      • Average click-through rate of smartphones is 4.12% but just 2.39% on PC
      • Ads take up so much more space on mobile devices than on PC, sometimes accidental click
      • Paid search, display, or banner ads, mobile ads, classifieds, or digital video ads
      • Conversion rate - measures frequency that someone who clicks on ad, makes a purchase
  • Q8-5: How do organizations develop an effective SMIS? 
    • Organizations should focus strategy to: being cost leader OR differentiate their products from competition
    • Social Media Plan Development:
      1. Define your goals
        • Brand awareness, conversion rates, web site traffic, and user engagement
      2. Identify success metrics
        • Success metrics / key performance indicators (KPI) - metrics that will indicate when you have achieved your goals
        • Metrics - measurements used to track performance
      3. Identify target audience
      4. Define your value
        • Competitive analysis - identify strengths and weaknesses in competitors' use of SM > what they're doing right and wrong > use to see how you can add value
      5. Make personal connections
      6. Gather and analyze data
  • Q8-6: What is an enterprise social network (ESN)?
    • Enterprise social network (ESN) - using social media through a software platform to facilitate cooperative work of people within an organization
    • Improve communication, collaboration, knowledge sharing, problem solving, and decision making
    • Enterprise 2.0
      • Web 2.0 - dynamic, user-generated content systems
      • Enterprise 2.0 - inside companies, use of emergent social software platforms
      • SLATES - search, links, authoring, tags, extensions, and signals
      • Folksonomy - content structure emerging from processing of use tags
    • Changing communication
      • Communication channels - way of delivering messages
      • Using ESNs, employees can bypass managers and post ideas directly for CEO
      • Quickly identify internal experts to solve unforeseen problems
    • Deploying successful enterprise social networks 
      • Best practices - ensuring successful implementation of ESN through methods that have been proven to produce successful results in prior implementations
      • Strategy, sponsorship, support, and success
      • Develop strategic plan for using SM internally via same process as used for external social media use
  • Q8-7: How can organizations address SMIS security concerns?
    • Managing the risk of employee communication
      • Social media policy - develop and publicize a statement, delineating employees' rights and responsibilities 
      • Intel Corporation:
        • Disclose - be transparent, truthful, & be yourself
        • Protect - don't tell secrets, slam competition, or overshare
        • Use common sense - add value, keep it cool, and admit mistakes
    • Managing the risk of inappropriate content
      • User-generated content (UGC) - content contributed by users on your SM site
      • Problems from external sources:
        • Junk contributions 
        • Inappropriate content
        • Unfavorable reviews
        • Mutinous movements 
      • Responding to social networking problems: 
        • Leave it 
        • Respond to it
        • Delete it
      • Internal risks from social media
        • Affect ability to secure information resources / threats to info security > unintentional leak of information
        • Employees using SM could inadvertently increase corporate liability 
        • Increase SM use may lead to decreased employee productivity
  • Q8-8: 2026?
    • New mobile devices with innovative mobile-device UX, coupled with dynamic and agile IS based on cloud computing and dynamic virtualization
    • BYOD - bring your own device
    • Non routine cognitive skills more important
    • Digital is Forever >> Transmitting personal info using internet can make victim, impossible to delete, stored on numerous servers / server farms > Digital Zombie
    • Companies analyze everything you digitally say or do
    • Big Data = Big Money >> personal data illegally accessed or sold on black market
      • Legally accessed by companies and sold to others
    • Steps to mask / remove digital footprints > Clear cookies, encrypt emails, avoid using real name, VN mask internet Protocol 
    • Develop your personal brand (understand importance and value)
      • Social media presence one component of a professional brand
      • Traditional sources of personal branding like personal networks f2f relationships, important

Chapter 7: Processes, Organizations, and Information Systems

  • Q7-1: What are the basic types of processes?
    • Transforming inputs into outputs = network of activities that generate value > business process
      • Organization is one big problem > need to break down into smaller problems = processes for each
      • Human processes / machine-assisted processes / machine processes
    • How do structured processes differ from dynamic processes?
      • Structured processes - stable, almost fixed activities/data flows > day-to-day operations & standardized/formally defined processes 
        • Support operational and structured managerial decisions/activities
        • Customer returns, payroll, etc.
      • Dynamic processes - less structured and often creative > adaptive processes that are flexible/informal and involve less structured/strategic managerial decisions and activities
        • Support strategic and less structured/specific managerial decision/activities
        • Opening a new store, collaboration, social networking, etc.
    • How do processes vary by organizational scope? (three levels, the wider = the more challenging)
      1. Workgroup processes - allowing workgroups to fulfill goals, purpose, and charter of particular department/group
        • Sales & marketing / operations / manufacturing / accounting / HR / customer service, etc. departments // e.g. midterm, final, blog, etc. processes
        • Workgroup information system - one or more processes support
        • Functional information system - two or more different IS to support department processes; e.g. operations management system / general ledger
          • Functional application - program component of FIS
      2. Enterprise processes - support activities across an organization in multiple departments 
        • e.g. processes spanning across SJSU
        • Enterprise information system - support 1+ EP
      3. Inter-enterprise processes - support 2 or more independent organizations
        • e.g. when companies made special website for gov't companies
        • Inter-enterprise information system - support 1+ IEP
  • Q7-2: How can information systems improve process quality?
    • Two dimensions of process quality: 
      1. Process efficiency - ratio measure of process outputs to inputs (correctly)
      2. Process effectiveness - measures success / how well achieved strategy of the organization (doing right things)
    • How can processes be improved?
      • Change the process structure - reorganizing the process
      • Change process resources - change allocation of resources (IS & humans)
      • Change BOTH process structure & resources
    • How can information systems improve process quality?
      • Performing (entirety of) an activity
      • Augmenting a human performing an activity
      • Controlling data quality process flow
  • Q7-3: How do information systems eliminate the problems of information silos?
    • Information silo - when there is an isolation of data in separated info systems
    • What are the problems of information silos?
      • Data duplication / disjointed processes / increased expense / limited info / lack of integrated info / isolated decisions > inefficiencies
      • Data integrity problem - when data is inconsistent or duplicated
    • How do organizations solve the problems of information silos?
      • Revise applications to use database < integrate data into single database
  • Q7-4: How do CRM, ERP, and EAI support enterprise processes?
    • The need for business process engineering
      • Business process reengineering (BPR) - taking advantage of new information systems by designing new business processes/altering existing ones
        • e.g. engineering student changed everything & start all over
      • Integrated data & enterprise systems offered potential substantial improvements in process quality (difficult, slow, & expensive)
    • Emergence of enterprise application solutions
      • Inherent processes - procedures for the usage of software products that are predesigned
    • Customer Relationship Management (CRM) - managing all interactions with customer from lead generation to customer service through a database, suite of applications, and inherent processes (customer-centric organization)
      • Customer life cycle - four phases: marketing (attract) > customer acquisition (sell) > relationship management (support and resell) > and loss/churn (categorize)
      • CRM database = relationship management apps + customer support apps + sales apps + lead management apps
    • Enterprise resource planning (ERP) - consolidating business operations - through a database, modules (ERP application programs), and inherent processes - into single, consistent, computing platform
      • ERP System - ERP technology-based information system
      • e.g. SJSU's Oracle > mysjsu.edu managing everything
    • Enterprise application integration (EAI) - providing layers of software that connect applications together to integrate existing systems through a suite of software applications
      • Enables organizations to use existing apps while eliminating serious problems of isolated systems
  • Q7-5: What are the elements of an ERP system?
    • Five components of ERP solution:
      1. Hardware
      2. ERP application programs
        • Applications that integrate: supply chain / manufacturing / CRM / HR / accounting
      3. ERP databases, their two types of program code:
        • Trigger - when certain conditions arise, this computer program stored within database will run and keep database consistent
        • Stored procedure - enforce business rules through a computer program stored in the database
      4. Business process procedures
        • Process blueprints - ERP solution's defined inherent processes
      5. Training and Consulting
        • Train the trainer - vendors train the organization's employees (super users) to reduce expenses since they become in-house trainers
    • Industry-specific solutions - starter kits for specific industries ERP vendors provide to reduce the work of customizing ERP apps to a particular customer
    • Which companies are the major ERP vendors?
      • Microsoft Dynamics / Sage / Infor / Oracle / SAP
  • Q7-6: What are the challenges of implementing and upgrading enterprise information systems?
    • Collaborative management 
      • Enterprise systems have no clear boss, the groups that manage are slow and expensive
    • Requirement gaps 
      • Organizations purchase licenses that already have specific functions and features, but never a perfect fit for the specific organization > gaps between organization's requirements & application's capabilities
    • Transition problems 
      • Difficult, require careful planning and substantial training + inevitable problems
    • Employee resistance
      • Self-efficacy - person's belief in themselves for being successful at his or her job
    • New technology
  • Q7-7: How do inter-enterprise IS solve the problems of enterprise silos?
    • Distributed systems - distributing applications processing across multiple computing devices
  • Q7-8: 2026?
    • Hybrid model - ERP customers store most of their data on cloud servers managed by cloud vendors + sensitive data on servers they manage themselves

Chapter 6: The Cloud


  •  Introduction
    • Data communications, Internet tech, and cloud-based services > the cloud
    • Cloud trend (everything moving there) / data mining (big data - lots of jobs) / socializing (everywhere with everything) / everything connects to web (IoT) / business intelligence
    • HITS - human intelligence tasks > computers can't do it / CAPTCHA
  • Q6-1: Why is the cloud the future for most organizations?
    • What is the cloud?
      • Cloud - over the Internet, elastic leasing of pooled computer resources
        • on demand & scalable 
      • Elastic - leased computing resources could be increased/decreased dynamically, programmatically, in short span of time; organizations only pay for the resources they use // 
        • Automatically adjusts for unpredictable demand & limits financial risks / based on need > grow
          • share resources with others / store files elsewhere / all kinds of info and files 
        • e.g. Netflix views all day long, spike in the evening > contracted with cloud vendors to add servers to keep response time below 0.5 seconds > cloud vendor will keep increasing its servers to maintain 0.5 response time > as demand falls, it will release excess servers and reallocate them at the end
          • dynamically allocate capacities to resize itself
      • Pooled - different organizations use the same physical hardware, but share that hardware through virtualization
        • Cloud vendors allocate virtual machines to physical hardware as customers needs increase / decrease
        • Economies of scale > avg. cost decreases as size operation increases
      • Over the Internet - cloud vendor may provision servers all over the world, nearly instantaneously > requesting and receiving services over the Internet
    • Why is the cloud preferred to in-house hosting?
      • POSITIVE:
        • Cloud - small capital requirements / speedy development / superior flexibility and adaptability to growing or fluctuating demand / known cost structure / possibly best-of-breed security or disaster preparedness / no obsolescence / industry-wide economies of scale, hence cheaper
        • In-house - control of data location / in-depth visibility of security and disaster preparedness
      • NEGATIVE: 
        • Cloud - dependency on vendor / loss of control over data location / little visibility into true security and disaster preparedness capabilities
        • In-house - significant capital required / significant development required / annual maintenance cost / ongoing support costs / staff and train personnel / increased management requirements / difficult (impossible?) to accommodate fluctuating demand / cost uncertainties / obsolescence 
    • Why now?
      • Cloud-based hosting is advantageous for three reasons:
        1. processors, data communication, and data storage so cheap, nearly free; to and from data processor 
        2. Virtualization > enables near instantaneous creation of a new virtual machine
        3. Internet-based standards enable cloud-hosting vendors to provide processing capabilities in flexible yet standardized ways
    • When does the cloud not make sense?
      • When law or industry requires the organization to have physical possession or control over their data
  • Q6-2: What network technology supports the cloud?
    • Network - computers that communicate with each other wirelessly or through transmission lines; four basic types:
      • Personal area network (PAN) - single person, devices are connected around; most within 10 meters
      • Local area network (LAN) - single physical site/geographic location, computers are connected at; range from 2 to several hundred computers & located within a half-mile or so of each other
      • Wide area network (WAN) - two or more separated sites computers are connected to; different geographic locations
      • The internet - networks or networks; send email address/access website; private = internets
      • Intranet - organization's exclusive, privately used Internet
      • Protocol - communication organization rules and data structures
    • What are the components of a LAN?
      • Small office or home office (SOHO) - less than a dozen computers/printers; wired & wireless connections (printer vs. laptop/phone)
      • IEEE 802.3 protocol (Ethernet) - wired LAN connection use; specifies characteristics of hardware > which signals are carried by which wires & how are messages packaged and processed 
        • 10/100/1000 Ethernet - 802.3 specification + allow transmission rate of 10/100/1000 mbps (megabits per second) 
        • Communication measured in bits; while memory size is bytes
        • K = 1,000 / M = 1,000,000 / G = 1,000,000,000
        • 100 Mbps = 100 x 1,000,000 = 100,000,000 bits per second
      • IEEE 802.11 protocol - used by wireless LAN connections
        • Several versions, most current = IEEE 802.11ac
        • Allows speeds up to 1.3 Gbps; few could take advantage of full speed
      • Bluetooth - PAN connection made through this wireless protocol
        • Replaces cables & transmits data over short distances
        • e.g. bluetooth mouse connecting to computer through bluetooth
    • Connecting your LAN to the Internet
      • Connecting SOHO LAN & devices to Internet = WAN, you are connecting to service provider
      • Internet service provider (ISP) - provides legit internet address; gateway to the Internet (communications from computer passed on to Internet & process reverse back to you); also pays for the Internet
      • Digital subscriber line (DSL) - operated on same voice telephone lines, but doesn't interfere with VT service (WAN connection)
      • Cable Line - transmitting high-speed data through cable tv lines; installed in each neighborhood served & no interference with TV signals
      • WAN Wireless - e.g. Kindle uses Sprint wireless network for data connections; LAN wireless (50 Mbps) >>> WAN wireless (1-3 Mbps)
  • Q6-3: How does the cloud work?
    • An Internet Example - Minneapolis > LAN > ISP > Cloud (The Internet, 4+ Networks) < ISP < Hotel LAN < New Zealand Hotel
      • Hop - one network to another movement
    • Carriers and Net Neutrality 
      • Packet (message) > moves across Internet through carriers (networks owned by large telecommunication providers)
      • Peering agreements - not paying access fees when carriers are freely exchanging access amongst themselves
      • Net neutrality - all data is treated equally
    • Internet Addressing 
      • IP address - Internet address, identifying a particular device with a number 
      • Public IP addresses - public Internet, identifying particular device
        • ICANN (Internet Corporation for Assigned Names and Numbers) - public agency that controls the assignment of unique, worldwide, public IP addresses / names to IP addresses
        • Two formats of IP Addresses: 
          • IPv4 - four-decimal notation (165.193.123.253)
          • IPv6 - longer format (http://165.193.140.14)
          • Domain name - unique, worldwide name assigned to a public IP address
          • URL (Uniform Resource Locator) - internet address (http:// or ftp://)
      • Private IP addresses - private network, usually LAN, identifying particular device; e.g. coffee shop > private IP > gets to LAN > private IP to public IP address > sends traffic out to public Internet 
    • Processing on a web server
      • Three-tier architecture:
        • User tier - devices that have browsers requesting and processing webpages; e.g. computers, phones, etc. > web browsers
        • Server tier - computers processing applications and running Web servers
        • Database tier - computers running DBMS > processes request to retrieve and store data
      • Web page - html coded document
      • Web servers - manages traffic (sending & receiving web pages to and from clients) + program run on server-tier computers
      • Commerce server - database > manage shopping cart > coordinate checkout process 
    • Service-Oriented Architecture (SOA) - all interactions are formal, standardized services among computing devices
    • Protocols supporting web services
      • TCP/IP Protocol Architecture - has five layers, and each layer defines one or more protocols
      • Internet Protocols: http, https, smtp, and ftp
        • Hypertext transfer protocol (http) - used by web servers and browsers
        • Https - secure version of http; transmit/send sensitive data safely; e.g. credit card numbers 
        • Simple Mail Transfer Protocol (smtp) - email transmissions
        • File Transfer Protocol (ftp) - moving/transmit files; over Internet > from cloud servers to computer
      • Web service and cloud protocols
        • WSDL, SOAP, XML, and JSON
  • Q6-4: How do organizations use the cloud?
    • Cloud services from cloud vendors
      • Software as a service (SaaS) - operating system + application programs + hardware infrastructure provided by an organization
      • Platform as a service (PaaS) - vendors use cloud hosting to provide computers with operating system + DBMS (maybe)
      • Infrastructure as a service (IaaS) - data storage or bare server computer cloud hosting; most basic 
    • Content Delivery Network (CDN) - storing and making user data in geographical locations available on demand, through hardware and software
      • Store and deliver content / minimizes latency
      • Benefits: decreased loadtime / origin server reduced load / reliability increase / DOS attack protection / mobile users get reduced delivery costs / "pay-as-you-go"
  • Q6-6: How can organizations use cloud services securely?
    • Virtual Private Networks (VPNs) - the appearance creation of private, secure connections through the Internet
      • A Typical VPN
        • Tunnel - secure connection; public or shared network between VPN client and VPN server = private, virtual pathway
        • VPN server > tunnel > VPN client
        • Protect messages by encrypting/coding 
    • Private cloud - organization owns and operates this cloud for own benefit
    • Virtual private cloud - secure access to highly-restricted subset of a public cloud
  • Q6-7: 2026?
    • Cloud services cheaper, faster, easier to use, more secure
    • Fewer organizations own their own computing infrastructure
    • Individuals, small businesses, large organizations obtain elastic resources at very low cost
    • Net neutrality enabled 
      • All users and content providers treated equally > no "fast" or "slow" lanes
      • ISPs not allowed to block/slow competitor's content / can't charge additional fees or taxes to heavy internet users