Lecture 1 - DOC314
Lecture 1 - DOC314
2. Dodge, M. and Stinson, C., (2011) Excel 2010 Inside-out. India: PHI Learning.
3. Dodge, M. and Stinson, C., (2011). Excel 2010 inside out. India: Prentice
Hall.
4. Frye, D., (2010). Microsoft excel plain and simple. India: Prentice Hall.
5. Norton, P., (2006). Introduction to Computers. New Delhi: Tata McGraw Hill.
Internet Resources
● Microsoft, (2013). Office 2010 User resources. [Online]. Available from:
http://www.microsoft.com.
● Microsoft, (2013). Windows: Introduction to computers. [Online]. Available
from: http://windows.microsoft.com/en-us/windows-vista/introduction-to-
computers
Common rules in the lecture hall
▪ Students must attend the lecture/tutorial as per the assigned batch (batch 1 or batch 2) and
respective tutorial group. You cannot change the group or attend another group without
approval from the Level Coordinator.
▪ Students should be allowed to use electronic devices (laptops, mobile phones, etc.) unless
the lecturer assigns a task using electronic device. Students need to pay attention to the
lecturer / whiteboard during the lecture.
▪ Students should be seated 5 minutes before the lecture/tutorial is started. The
classroom/lab doors will be closed, and students are not allowed to interrupt the lecturer
after the session starts.
▪ Students who are not concentrating on the lecture/tutorial and disturb the class, will be sent
out of the classroom.
▪ Forging signatures is an offense. If found, disciplinary action will be taken.
▪ Students should maintain a Google Drive folder with notes and answers in each week
Information Systems (I)
LECTURE 1
What is an Information System?
Defining Information Systems
▪“Information systems are combinations of hardware, software, and
telecommunications networks that people build and use to collect, create, and
distribute useful data, typically in organizational settings.”
▪Take data and turn it into information, and then transform that into
organizational knowledge.
Information Systems Security and
Control
Why do you put a password to your Facebook account?
Information Systems Security and
Control
▪Information systems security is responsible for the integrity and safety of system
resources and activities.
▪Information systems are vulnerable to several threats and require strict controls, such
as continuing countermeasures and regular audits to ensure that the system remains
secure.
▪https://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-
hacks/
Information Systems Audit
▪The effectiveness of an information system’s controls is evaluated through an
information systems audit.
▪Virtual organizations have emerged that do not rely on physical offices and
standard organizational charts.