INFO110 - Class
INFO110 - Class
Information Systems
Information Systems an organized integration of various
components designed to produce timely, integrated, relevant,
accurate and useful information, typically for some purpose suchas administration,
commerce, decision-making with the following components:
1. Hardware
2. Software
3. Data
4. Database
5. Process
6. Information
7. Human elements
Negative consequences
• May have a negative health effect for individuals
• Can expect availability
• May provide misinformation, health, education
IS capture data
Captures and stores data from the process:
• Processes generate data
• Information system captures and stores process data (transaction data)
• Capturing and storing data provides instant real-time feedback
IS monitor processes
Monitor the performance of a process
• Information system evaluates information to determine how well a process is
performed
• Evaluation occurs at two levels
• Process level
• Occurrence level
• Monitoring identifies process improvement issues
Globalization’s focus #
Friedman’s Ten Flatteners # (forces that contributed to
the “flattening of the world” which means globalization)
Market pressure
• Globalization
• Integration and interdependence on economic, social, cultural and ecological
aspects of life, made possible by rapid advances in IT
• Changes in the workforce
• Greater variations in the workforce
• Proportion of women and men changing, single parents, minorities, disabilities
• IT makes it possible to work online
• Strong customers with a lot of power
• Increased customer satisfaction and customer expectations
• Customer has more knowledge of product and services, prices, online auctions
• Handling customer relationships
Technology pressure
• Technology is changing, new is coming and things are becoming obsolete
• Information overload
• A lot of data, information and knowledge
• Difficulty making decisions
Organizational response
• Strategic systems
• Customer focus
• Satisfy orders and bulk customization
• E-business and e-commerce
Security
• Vulnerability, threats, human errors, ‘social engineering’
• Security check, assess control, communication control
What is Ethics?
From the Great Norwegian Encyclopedia
• Ethics is the doctrine of morality, the same as moral philosophy
- a doctrine that studies correct and wrong, permissible and indistinguishable, Good
and bad
• The purpose of ethics is to study how to act, and to understand the concepts we
use when evaluating actions, people acting, and outcomes of actions
• Central concepts of action that ethics apply, and study are correct and wrong,
permissible and indistinguishable, good and bad
Ethical framework
• Five widely used standards for approach
• Utilitarian (practical)
• Rights
• Justice
• Common good
• Deontology
-framework of ethics is based on the following standard for decision making:
Utilitarianism, Rights, Justice, Common Good, Deontology
Approach to ethics:
• Combining the five standards to create a framework for ethical decision-making
Privacy
• Electronic monitoring
• Personal information in databases
• Information about internet bulletin boards, newsgroups and social networks
• Privacy codes and policies
• International aspects of privacy
Personal privacy
• The right to be alone and be free from unreasonable personal interventions
Privacy
Court decisions in many countries have followed two rules:
• The right to privacy is not absolute. Privacy must be balanced against the needs of
society.
• The public's right to knowledge exceeds the individual's right to privacy.
Privacy
• Digital folder with personal data
• Profiling
• Data aggregators (dadcollectors )
• LexisNexis
• ChoicePoint
• Acxiom
Electronic monitoring
• Using technology to monitor individuals when doing daily routines
• Performed by the State, employers and others.
Examples:
• CCTV, toll stations
• Mobile apps
• Digital sensors in digital equipment (camera, passport, ...)
• Microsoft, Google, street view and more
• Drones
• Bank
Security threats #
Human error
• Higher-level employees + greater access rights = greater threat
Example
• Kevin Mitnick , world-famous hacker and former FBI most wanted person'
Software attacks
• Remote attacks requiring user action
• Viruses and worms
• Phishing attacks
• Spear phishing attacks
• Remote attacks that do not require user action
• Denial of Service attacks ( DoS)
• Distributed Denial of Service attack (DDoS)
• Attack by a programmer through the development of a system
• Trojan horse, backdoor, logical bomb
Types of malware #
Foreign software
• Advertising software and can spy and other (adware)
• Spyware
• «Keyloggers» – monitors keystrokes
• "Spam" item (spamware)
• Cookies can release information
• Cookies that send tracking cookies
Digital Certificates #
Virtual private network and tunnelling #
Analogue, Continues
Many data sources #
• Internal sources
• Company data, company documents
• Personal sources
• Personal thoughts, opinions and experiences
• External sources
• Commercial databases, public reports and business websites
• "Clickstream" data
Data governance
• An approach to managing information across the entire organization.
• Master data management concerns all business processes and application in a
synchronized way.
• Managing core (master) data.
Big Data and Data Science
• What is "Big Data"?
• Characteristics of "Big Data"
• Handling "Big Data"
• Leveraging "Big Data"
• Using "Big Data"
• "Big Data" used in the functional areas of an organization
• Data store
• A cheap scaled-down version of a data warehouse designed for end users' needs
in a strategic business unit or individual department
• A generic data warehouse environment
Data hierarchy
Bit
Bytes
Field
Record
Table/Folder
Database
Hierarchy of data for a computer-based file #
Normalized database #
Broadband
"Broadband is a two-way communication network that can transmit
various forms of data such as text, sound, and live images and must be
able to carry new services and allow many people to use the web at
the same time." (Report No. 49, 2002-2003)
Ethernet
A system for connecting several computer systems to form a local area network, with
protocols to control the passing of information and to avoid simultaneous
transmission by two or more systems.
Ethernet belongs to one of Local Area Network(LAN), mainly responsible for the
interconnections of computers in local areas.
Ethernet Network #
• The physical setup for an Ethernet network is a wire, wire pair, or
optical fiber, called the channel
• Engineers “tap” into the channel to connect a computer:
• This allows it to send a signal or an electronic pulse or light flash onto the
channel
• All computers, including the sender, can detect the signal
https://realpars.com/ethernet/
Cables: Advantages and disadvantages
Channel Advantages Disadvantages
Twisted-pair wire Inexpensive. Slow (low bandwidth).
Widely available. Subject to interference.
Easy to work with. Easily tapped (low security)
Coaxial cable Higher bandwidth than Relatively expensive and
twisted-pair. inflexible.
Less susceptible to Easily tapped (low-to-
electromagnetic medium-security).
interference. Somewhat difficutl to work
with.
Fiber-optic cable Very high bandwidth. Difficult to work with
Relatively inexpensive. (difficult to splice)
Difficult to tap (good
security)
Network protocols
A network protocol is a defined set of rules that specify how is data transmitted on
the same network between different devices.
In general, it allows connected devices to interact with each other regales of their
structure, configuration or internal processes.
• Encryption protocols
(SSH, SCP, SSL, TLS, IPsec)
• Application protocols
(HTTP, HTTPS, FTP, SFTP, FTPS, TFTP)
• Email protocols
(SMTP, POP3, IMAP4)
Transmission Control Protocol/Internet Protocol
(TCP/IP) # (data packet defined by a transmisión
protocol)
• Manages the transmission of data packets between computers by establishing a
connection between the computers
• Sequencing the transmission of packets
• Authenticates packet transmission
• P2P (peer-to-peer) #
Computer Addresses #
IP Addresses
Each computer connected to the Internet is given a unique address called its IP
address
Internet Addressing #
• Internet Protocol (IP) address
• Coordinator: Internet Corporation for Assigned Names (ICANN)
• Norway: UNINETT
• Top-level domain (TLD)
Future
• Three factors can cause internet congestion
• Increasing number of people working online
• Rising popularity on sites like YouTube that require large amounts of
bandwidth
• High demand for HD TV delivered over the internet
• Internet version 2 (?)
Portals
• Commercial portal
• Affinity portal ("extended family")
• Enterprise portal
• Industrial portal
dyndevice.com
INFO110: e-business and e-commerce # (digital
business)
https://
www.campaignmonitor.com/resources/knowledge-base/what-
are-the-various-types-of-ecommerce-retail-models/
Degree of digitization
• Brick-and-mortar (physical) organizations
• Virtual (electronic) organizations
• Click-and-mortar/ clicks and bricks (physical and electronic) organizations
Types of e-commerce #
• Business-to-consumer (B2C)
• Business-to-business (B2B)
• Consumer-to-consumer (C2C)
• Business-to-employee (B2E)
• E-management (government) with people (G2C), businesses (G2B)
• Mobile commerce (M-commerce)
• Social trade
• Conversational trade (calls, messages, chatbots)
E-commerce:
1. ‘The process of purchasing, selling, transmitting or exchanging products, services or
information via computer networks, including the Internet.’ This is definition of:
https://www.helsinkitimes.fi/business/17093-what-are-finland-s-most-popular-online-payment-
solutions.html
E-credit cards transactions #
Limitations
• Lack of generally accepted security standards
• In less developed countries, telecommunications bandwidth is often inadequate and
internet access is expensive
• Perceptions that e-commerce is unsafe
• Unresolved legal questions
• Missing a critical mass of buyers and sellers
Business-to-Consumer (B2C) #
• Online stores and shopping centers
• Uses catalogues for product selection
• Portals
• Online service providers
• Distribution, online banks, stock trading, job posting, travel agency, online
advertising
• E-retail
https://wearefram.com/blog/differentiate-b2c-vs-b2b-ecommerce/
Virtual mall with products from many vendors #
Marketing methods #
• Banner
• "Pop-up" ads (ad)
• "Pop-under" ads
• Spamming
unsolicited usually commercial messages (such as emails, text messages, or
Internet postings) sent to a large number of recipients or posted in a large number of
places
• Marketing with permission
• Viral marketing
Business-to-Business (B2B) (I)
• Seller-side marketplaces
• Auctions
• Online catalogs
• Third-party auction locations
• Buyer-side marketplaces
• Acquisitions
• Purchases
• Reverse auction
• E-acquisitions
• Group drive
https://hbr.org/2000/05/e-hubs-the-new-b2b-marketplaces
M-commerce # (e-commerce 10% grown from 2018-
2021)
• According to Statista, in 2017 online sales reached $2.304 trillion and 58.9%
($1.357 trillion) were done on mobile devices.*
• E-commerce sales was expected to reach $4.848 trillion by 2021, and m-
commerce is expected to account for 73.3% ($3.556 trillion) of these.*
* https://www.nop-templates.com/e-commerce-explained-with-history-and-examples
Model [Wikipedia]
A model is an informative representation of an object, person, or system. The term
originally denoted the plans of a building in late 16th-century English and derived via
French and Italian ultimately from Latin modulus, a measure.
Models can be divided into physical models (e.g. a successful pupil as a role model
for others in the school) and abstract models (e.g. mathematical expressions
describing behavioral patterns). Modelling business processes are base don results
from both on findings of business analyst and/or from evento logs
Wireless devices
Three major benefits for users
• Small enough to carry or carry lightly
• Sufficient computing power to perform productive tasks
• Communicate wirelessly with the Internet and other devices
• Biometric apps
• Cloud storage
• Short Message Service (SMS)
• Instant messaging
• Text messages
• Music player
• VCR
• Internet access with full-featured browser
• QWERTY keyboard
Microwave [Wikipedia] #
Microwave is a line-of-sight*
wireless communication technology that uses high frequency beams of radio
waves to provide high speed wireless connections that can send and receive voice,
video, and data between two locations, which can be from just a few feet or meters to
several miles or kilometers apart.
Radio [Wikipedia] #
Telecommunication by means of radio waves.
• Radio communication requires the use of both transmitting and receiving
equipment. The transmitting equipment, which includes a radio transmitter and a
transmitting antenna, is installed at the point from which messages are transmitted.
• Communication by means of radio waves, such as by radio facsimile,
radiotelegraph, radiotelephone, and radioteletypewriter.
• Characteristics:
Satellites stationary relative to a point on Earth
Few satellites needed for global coverage
Transmission delay (approx. 0.25 seconds)
Most expensive to build and shoot up
Longest turnaround time (many years)
Geostationary Earth Orbit (GEO)
Advantages
• Provides Internet services to distant areas of earth; two main applications:
– Observation of weather conditions
– Global telecommunication coverage
Disadvantages
• Propagation delay
• Disturbed by the environment
– The polar regions are not covered by the satellites in the geostationary orbit.
– The path length is quite large that results in delay.
– At such a high altitude, satellite installation is quite costly.
• Characteristics:
Satellites move relative to a point on Earth
Moderate number needed for global coverage
Requires medium-strength transmitters
Negligible transmission delay
Cheaper to build and shoot up
Moderate turnover time (6-12 years)
• Characteristics:
• Satellites can also take advantage of consistent lighting of the surface below:
– Sun-synchronous LEO orbits at an altitude of about 800 km and near-polar
inclination.
• The Chinese Tiangong space station was launched in April of 2021 and currently
orbits between about 340 kilometers and 450 kilometers.
https://upload.wikimedia.org/wikipedia/commons/b/b4/
Comparison_satellite_navigation_orbits.svg
Wireless computer networks and Internet access #
• Short haul
• Medium range
• Wide range
https://www.rohm.com/electronics-basics/wireless/short-range-wireless-communication
https://www.rohm.com/electronics-basics/wireless/short-range-wireless-communication
• Wi-Fi signals do not carry as far as cellular signals (up to several kilometers), or
satellite signals (up to thousands of kilometers).
Pervasive Computing
• Pervasive: invisible, ‘everywhere computing’ – embedded in object around us
• Example: smart homes #
Customer Experience #
• Advertising
• Social advertising
• Viral marketing
IdeaStorm: a platform for sharing ideas between
customers and Dell
The four-level pyramid from 1980s was a pyramid of systems that reflected the
hierarchy of the organization #
System development is done in several stages
[Wikipedia] #
• Problem recognition and specification
• Information gathering
• Requirements specification for the new system
• System design
• System construction
• System implementation
• Review and maintenance.
AGILE DEVELOPMENT #
Carried out iteratively
Each stage done to assure best possible quality.
Development is divided in several stages
Stages can be repeated
Expert Systems #
Database Management System (DBMS) #
ERP II system #
Operations Management:
Management. These modules manage the various aspects of production planning and
execution such as demand forecasting, procurement, inventory management, materials
purchasing, shipping, production planning, production scheduling, materials requirements
planning, quality control, distribution, transportation, and plant and equipment maintenance.
Businesses Intelligence. These modules collect information used throughout the organization,
organize it, and apply analytical tolos to assist managers with decisión making.
Basic ERP modules #
• Financial management
• Operations and management
• Management of human resources
Disadvantages
• Since ERP is based on best practices, companies may need to change their
methods to achieve their business goals
• ERP systems can be complex, expensive, and time-consuming to implement
Strategic IT plan
• Must meet three main objectives
• Must be adapted to the organization's strategic plan
• Must provide an IT architecture that seamlessly connects users, applications and
databases
• Must distribute IS development resources efficiently among competing projects so
that projects can be completed on time and within budget and still have the
necessary functionality
• IT plan steering committee
• Study feasibility
– Technical feasibility
– Economic feasibility
– Conductibility
Minimalism
• Focuses on ’high value’ activities.
• Discourages activities that do not directly produce
functionality.
KANBAN (agile system development method) #
Software Applications #
#
Cloud Computing Often Occurs on Virtualized Servers #
IF lung capacity is high AND X-ray results are positive AND patient has fever AND
patient has coughing THEN surgery is necessary.
IF tumor has spread OR contraindications to surgery exist
THEN surgery cannot be performed.
Ten generic categories of expert systems #
Challenges involved with expert systems
• Transferring domain expertise from human experts to the expert system can be
difficult because people cannot always explain how they know what they know.
Often, they are not aware of their complete reasoning process.
• Even if the domain experts can explain their entire reasoning process, automating
that process may not be possible.
The process might be either too complex or too vague, or it might require too many
rules.
• In some contexts, there is a potential liability from the use of expert systems. What
happens if a business decision driven by an expert system harms someone
financially?
Neural Networks #
• A neural network is a system of programs and data structures that simulates the
underlying functions of the biological brain.
• A neural network usually involves many processors operating in parallel, each with
its own small sphere of knowledge and access to data in its local memory.
• Typically, a neural network is initially “trained” or fed large amounts of data and
rules about data relationships.
Genetic Algorithms #
Methods for solving both constrained and unconstrained optimization problems
based on a natural selection process that mimics biological evolution.
Crossover:
Combining portions of good outcomes in the hope of creating an even better
outcome.
Mutation: Randomly trying combinations and evaluating the success (or failure) of
an outcome.
Intelligent Agents #
• An intelligent agent is a software program that assists users, or acts on users’
behalf, in performing repetitive computer-related tasks.
• Intelligent agents often use expert systems and fuzzy logic behind the scenes to
create their seemingly intelligent behavior.
• Example: The information agents for Amazon.com display lists of books and other
products that customers might like, based on past purchases.
Agents #
Model-based agent # (intelligent agent)
• It works by finding a rule whose condition matches the current situation.
• It can handle partially observable environments.
• Updating the state requires information about how the world evolves independently
from the agent and how the agent actions affect the world.
Robots [Wikipedia]
• A robot is a machine— especially one programmable by a computer—capable of
carrying out a complex series of actions automatically.
• A robot can be guided by an external control device, or thecontrol may be
embedded within. Robots may be constructed to evoke human form, but most robots
are task-performing machines, designed with an emphasis on stark functionality,
rather than expressive aesthetics.
ARU IRU