CSIS 2200-Midterm Note
CSIS 2200-Midterm Note
TPS focuses on data collection and processing. It is applied to structured tasks such as
record keeping, simple clerical operations, and inventory control. It is effective for cost
reduction and minimal human involvement when automated.
E.g., signing up for email, invoice recording, automated payroll system,
MIS can be used for both public and private sectors. E.g., private MIS for inventory
control provides data, public sector MIS for police department to predict the crime and
reduce crime rate.
In designing MIS, 1. clearly define the system’s objectives, 2. data must be collected and
analyzed, 3. information must be provided in a useful format for decision-making
purposes.
1.5 Major Components of information System
In addition to hardware, software, and human elements, IS includes four major components,
3.Process is generating the most useful type of information for making decisions.
Includes transaction-processing reports and model for decision analysis.
Strategic Information Systems (SISs) focus on big- picture, long-term goals, objectives, and
assist an organization or a decision maker to achieve them.
Same components as MIS (data, database, process, and information) but the type of ()
and methods of analysis different.
Key Characteristics: Goal-oriented, Involves top management, Multidisciplinary, Future-
oriented, Dynamic.
1.7 Using Information Systems and Information Technologies
1st is human element and Information is the 2nd important thing in an organization.
To manage the four Ms. of the resources (manpower, machinery, materials, and money.),
different types of information systems have been developed.
1. Overall cost leadership strategy (Deliver a similar product or service that is cheaper than
the competitors’ offerings) E.g., Walmart
A top-line strategy focuses on generating new revenue by offering new products and
services to customers or increasing revenue by selling existing products and services to
new customers.
2. Differentiation strategy (Deliver a product or service that is different from those in the
market and at a competitive price) E.g., Amazon – personalization and recommendation.
3. Focus Strategy (clearly define the target market and the audiences that the business will
serve) E.g., Apple target iPhone to consumer rather than business.
Porter created a comprehensive framework called the Five Forces Model for analyzing an
organization, its position in the marketplace, and how information systems could be used to
make the organization more competitive.
1. Buyer power is high when customers have many choices and low when customers have
few choices.
Organizations try to limit buyers’ choices by offering services. (Differentiation strategy)
2. Supplier power is high when customers have fewer options and low when customers
have more options.
3. The threat of substitute products or services is high when many alternatives to an
organization’s products and services are available.
4. The threat of new entrants into the marketplace is low when duplicating a company’s
product or service is difficult.
Organizations often use focus strategies to ensure that this threat remains low.
5. Rivalry among existing competitors is high when many competitors occupy the same
marketplace position; it is low when there are few competitors.
Chapter 2
2.1 Defining a computer.
A computer is a machine that accepts data as input, process data without human
intervention by using stored instructions, and output information. The instructions
(programs) are the step-by-step directions for performing a special task, written in a
language that a computer can understand.
A Binary code is a set of instructions used to control the computer, uses 0s or 1s, which
computer understands as on or off signals.
Number of Chips:
Dual-Core: One chip with two cores.
Multi-Processor: Multiple chips, each with one or more cores.
Resource Sharing:
Dual-Core: Cores share resources on the same chip.
Multi-Processor: Each CPU has its own dedicated resources.
Performance and Scalability:
Dual-Core: Limited by the resources on a single chip, suitable for moderate parallelism.
Multi-Processor: Can scale by adding more processors, suitable for high parallelism and
intensive computational tasks.
Component affects computer performance- Bus, Processor size and Operating system (OS).
Processor size and Operating system (OS)- 32-bit processor can run only a 32-bit OS and
use 232 (4GB) of RAM. 64-bit processors can run both 32-bit and 64-bit OS. Use (16EB,
or exabytes) of RAM.
Computers have power from three Factors – Speed, Accuracy, Storage, and retrieval
Capabilities.
2.3a Speed
Computers process data with amazing speed.
Computer speed is measured as the number of instructions performed per fractions of a second.
Millisecond: 1/1,000 of a second
Microsecond: 1/1,000,000 of a second
Nanosecond: 1/1,000,000,000 of a second
Picosecond: 1/1,000,000,000,000 of a second
2.3b Accuracy
Degree of accuracy is critical in many computer applications.
2.3c Storage and Retrieval
Storage means saving data in computer memory, and retrieval means accessing data from
memory.
Data is stored in bits.
1 bit = 0 or 1
8 bits = 1 byte = the size of a character = “a”
2.4 Computer Operation
Computers can perform three basic tasks: arithmetic operations, logical operations, and storage
and retrieval operations.
Add, subtract, multiply, divide, and raise numbers to a power (exponentiation)
Perform comparison operations by comparing two numbers.
Store massive amounts of data in very small spaces and locate a particular item quickly.
Computers and communication systems use data codes to represent and transfer data between
computers and network systems.
Network-attached storage (NAS) (Only for data storage, including hard disk, network card)
Centralized box, connect to the switch, any devices connected to NAS for storage.
“
“ Software – Application Software is directly used by the system user to perform different tasks
on the computer. E.g., Microsoft Word, Power point, Netflix
System software is a special type of software that is internally used by the computer itself to
manage and operate the various hardware components connected to the system.
Operating software is the most important software used by the computer.
It provides an interface to the user to interact with the system.
The architecture of the computer system in terms of the functional units.
Input units accept the data received from the Input devices.
Memory Unit- Memory Hierarchy
Memory unit consists of different types of memories that are used to store the data and the
program instructions during the program execution.
Computers use different types of memory such as disk memory, random access memory (RAM),
Cache memory, CPU memory registers.
Central Processing Unit- CPU (a processor, a microprocessor)
CPU provides processing power to the computer system. The main function of the CPU is to
execute the computer program.
Output Unit consists of various output devices connected to the computer system such as
displaying monitor, printer, projector,
The main function of the output unit is to present the processed data by the computer.
Binary code (Machine code, machine language)
The computer programs are written using any high-level human readable programming language
such as C language, Java, Python and CPU processor decode and excute instructions only in
machine language in binary.
Compilers translate high to low and CPU excute the instructions.
This conversion process is called the program compilation.
Storage can shown as bytes (8GB USB drive), wifi speed can shown as bits.
DNS (domain name system) is changing name to IP address.
Computer work only IP address.
Storage area network (SAN) is the used for backup of harddisks pool. Don’t include servers,
include storage hard disks only.
Mbps)
Chapter 5
Spyware is software that gathers information about users while connected to the Internet.
Some can change computer settings
Prevent by installing antivirus or antispyware software
Adware is a form of spyware that collects information about the user to determine
advertisements to display
Prevent by installing an ad-blocking feature in the Web browser
Phishing is the sending fraudulent e-mails that seem to come from legitimate sources (i.e., bank
or university)
Direct recipients to false websites that look like real thing for the purpose of capturing personal
information such as SIN, bank acc num, credit card
Pharming is like phishing but the official Web site of an organization is hijacked by altering Web
site IP address via a domain name system server.
Baiting is similar to phishing attacks but baiter gives recipient a promise (i.e., free software or
gift card)
Quid pro quo –similar to baiting but involves a hacker requesting the exchange of critical data or
login information in exchange for a service or prize.
SMiShing (SMS phishing) -technique that tricks user to download malware onto a mobile
device.
Vishing (voice or VoIP phishing) -using voice technology that tricks user into revealing
important financial or personal information to unauthorized entities.
Keystrok loggers
Keystrok loggers are software or hardware devices that monitor and record keystrokes.
Used legally by companies to track employees’ use of e-mail and the Internet.
Used maliciously to collect credit card numbers while user shops online.
Preventable by some antivirus and antispyware programs.
Computer fraud is the crime of unauthorized use of computer data for personal gain.
Computer crimes can include:
Denial-of-service attacks
Identity theft
Software piracy, infringements of intellectual property
Writing or spreading viruses, worms, Trojans and other malicious code
Sabotage
There are three important aspects of computer, network and cybersecurity: confidentiality,
integrity, availability. CIA triangle.
Another security model called McCumber Tube is a framework for evaluating information
security.
More specific than CIA.
Defines nine characteristics of information security
Includes different states in which information can exist in a system: Transmission, Storage,
Processing.
Intentional computer, network, and cyber threats include the following: Viruses, Worms, Trojan
programs, logic bombs, backdoors, blended threats (e.g., a worm launched by a trojan), Rootkits,
Denial-of-service attacks, social engineering, crypto jacking.
Viruses–a self-propagating program code that is triggered by a specified time or event
−Attaches to other files continuously
−Transmitted through the network, e-mail, or message boards
Trojan Programs –contain code intended to disrupt a computer, network, or Web site
−Hidden inside a popular program
−Can erase data
−Do not replicate
Logic Bombs -Type of Trojan program used to release a virus, worm, or other destructive code
−Triggered at a certain time or by a specific event
Blended threats -Combines characteristics of viruses, worms, and malicious codes with
vulnerabilities on networks
Searches for vulnerabilities and takes advantage of them, 1. Embedding malicious codes in the
server’s HTML files, 2. Sending unauthorized e-mails from compromised servers with a worm
attachment
Rootkits –Series of software tools that enable unauthorized access to computer or network
system.
−Conceal their presence and actions
−Can remotely execute files
−Can change system configurations
Denial-of-service (DoS) attack –Flood a network or server with service requests to prevent
legitimate users’ access to the system.
TDoS (telephony denial of service) attacks -High volumes of automated calls flood a target
phone system, halting incoming and outgoing calls.
Social Engineering –Using "people skills" to trick others into revealing private information.
−Common techniques: dumpster diving, shoulder surfing, tailgating, scareware, pretexting
Use a physiological element unique to a person that cannot be stolen, lost, copied, or passed on
to others
−Some biometric devices and measures: facial recognition, fingerprints, iris analysis, signature
analysis, voice recognition
−Some applications of biometrics:
▪ATM, credit and debit cards
▪Computer login security
▪Airport security and check-in
Three main nonbiometric security measures are Callback modems, Firewalls, Intrusion detection
systems.
Callback Modems verify whether a user’s access is valid by logging the user off and calling the
user back.
−Useful when many employees work off-site and need to connect to the network from remote
locations.
Firewalls are combinations of hardware and software that act as filters between private networks
and external networks.
−Network administrator defines rules for access, and all other data transmissions are blocked.
They protect external access but not protect from internal intrusion.
−Types: Packet-filtering firewalls, Application-filtering firewalls, Proxy servers
Intrusion Detection System (IDS) protects against both external and internal access.
−Placed in front of a firewall
−Identifies attack signatures, traces patterns, and generates alarms for the network administrator
−Causes routers to terminate connections with suspicious sources
−Prevents DoS attacks
Access Controls
Designed to protect systems from unauthorized access in order to preserve data integrity
Terminal resource security: Erases the screen and signs the user off automatically after a
specified length of inactivity
−Passwords: Combinations of numbers, characters, and symbols that are entered to allow access
to a system
Password Manager -generates secure, random passwords for you and remembers them
−Can sync with other devices (e.g., tablets, smartphones) E.g., Dashlane
−Encrypts your password database
•Other techniques to replace passwords: zero login, brain password, DNA identification,
authentication tokens, and implanted microships
VPN provides a secure tunnel through the Internet for transmitting messages and data.
Transmitted data is encrypted using Layer two tunneling protocol (L2TP), Internet protocol
security (IPSec).
Advantages (Set-up costs are low), Disadvantages (Slow transmission speed, Lack of
standardization.
Public key infrastructure (PKI) enables users of a public network (Internet) to exchange data.
Secure and private
Uses a pair of keys obtained from a trusted authority: Public key, Private key
Asymmetric encryption uses two keys, public key known to everyone, Private or secret key
known only to the recipient. Longer processing time
Symmetric (secret key) encryption uses the same key is used to encrypt and decrypt the message.
−Sender and receiver must agree on the key and keep it secret
−Can be used to create digital signatures
Difficult to share the key over the Internet.
CERT was developed by the Defense Advanced Research Projects Agency (DARPA)
−Focuses on security breaches and DoS attacks
−Offers guidelines on handling and preventing attacks
−Conducts public awareness campaigns and researches Internet security vulnerabilities
Requires every person and every device that accesses a network to be secure; inside or outside
the organization.
•Main principles:
−Every person or device must be verified
−Least-privilege access
−Microsegmentation
−Multifactor authentication (MFA)
13.Ensure fire protection systems and alarms are up to date, and test them regularly
14.Check environmental factors
15.Use physical security measures
16.Install firewalls and IDS
17.Before recycle or donate, wipe data
18.Implement zero trust security
Business continuity planning outlines procedures for keeping an organization operational in the
event of a natural disaster or network attack.
•Tasks to prepare for and restore data:
−Back up files
−Periodically review security and fire standards for facilities
−Periodically review information from CERT
−Train staff members
−Test plan with trial data
Chapter 4
Privacy Issue
Two relatively new ethical issues related to the social media are fake news and deepfakes.
Fake News is a story or hoax to intentionally misinform or deceive people.
Cheap fakes are manipulation of events created with cheap software that is readily available on
the web and then modified using photoshop and distributed through the Web.
Misinformation – The person spreading the information doesn’t know it is false.
Disinformation- is false information that is knowingly distributed.
Deepfakes –fake videos or audio recordings that look and sound just like the real thing.
Information about people is stored on various databases. Example: top three credit companies
have almost everyone in US: Experian, Equifax, TransUnion
The most common way to index and link databases is by using Social Security numbers.
Federal laws regulate the collection and use of information on people and corporations.
1970 Fair Credit Reporting Act
Acceptable use policy is a set of rules specifying legal and ethical use of a system and
consequences of noncompliance.
Accountability refers to issues involving both the user’s and the organization’s responsibilities
and liabilities. Holding everyone responsible for their actions.
Nonrepudiation is basically a method for binding all the parties to a contract.
a user cannot deny the validity of their actions or transactions conducted over the internet E.g.,
digital signatures
GDPR covers a series of laws that protect European Union (EU) citizens’ personal data,
including genetic data, health records, racial or ethnic origin, religious beliefs.
Privacy concern
Spam -unsolicited e-mail sent for advertising purposes
Usually, spam is sent in bulk using automated mailing software and many spammers sell their
address lists.
For this reason, the volume of Spam email can raise to unmanageable level and clogging user
mail, preventing access own email.
•Users' information can be combined with other information and technologies to produce new
information. E.g., A person financial profile can be created by a person’ employment
information.
Two commonly used data collection techniques are cookies and log files.
Cookies are small text files with unique ID tags that are embedded in a Web browser and saved
on the user’s hard drive.
Used for welcoming new and returning users
Used to remember information for ordering
Helps Web sites customize pages for users
Many people install cookie manager, and they can disable existing cookies and future cookies in
user’s hard drive.
1.Social media networking ethics -open and fair access to all users
Authenticity –members are trustworthy and sincere
Transparency –members are honest and open with no hidden agenda
Communication –members are open to knowing other members and communicate openly.
3.Business media networking ethics -open and fair access to all users that includes the
following types of networks:
Utilitarian networking –is a true utility, truthful, and is not wasting its users’ time.
Emotional networking –able to empathize with being ethical in all situations; emotion has no role
Virtuous networking –all parties will act in good faith
Digital citizenship means using information technology safely, ethically, and responsibility.
7 principles to good digital citizenship:
1. Online etiquette
2. Privacy protection
3. Know how to stay safe online
4. “Dos and don’ts” of information technology
5. Protecting and respecting intellectual property
6. Understanding one’s digital footprint
7. Healthy usage patterns
Censorship
Two types of information on the Web are public and private information.
Intellectual Property
Patent Benefits
1. Generates revenue through licensing.
2. Attracts funding for further research and development.
3. Keeps competitors from entering certain market segments.
1980 revisions to the Copyright Act of 1976 (Liability for unauthorized duplication and use of
copyrighted programs)
Laws covering legal issues related to information technologies in the U.S.
1. Telecommunications Act of 1996
2. Communications Decency Act (CDA)
3. Laws against spamming
Cybersquatting (domain squatting) which is registering, selling, or using a domain name to profit
from someone else’s trademark.
Typosquatting (URL hijacking) relies on typographical errors made by Web users Typing
goggle.com instead of google.com
•Information technologies directly affect the nature of jobsTelecommuting (or virtual work)
allows people to work from home
“Job deskilling” –skilled labor is eliminated with high technology
“Job upgrading” –i.e., clerical work use word processing software
One skilled person can now do multiple jobs
Green computing
Green computing is computing that promotes a sustainable environment and consumes the
least amount of energy.
Green Computing involves the design, manufacture, use, and disposal of information
technology devices.
Promotes a sustainable environment; help to combat global warming
Requires the cooperation of private and public sectors
Data hierarchy –Structure and organization of data, which involves fields, records, and
files.
Database management system (DBMS) is software for creating, storing, maintaining, and
accessing database files.
In the past, data was stored in a a series of files called “flat files” because they were not arranged
in a hierarchy and there was no relationship among them.
Internal data is stored in the organization’s internal databases and can be used by
functional information systems. Examples: transactions, sales, personnel records
In database, files are accessed by using a sequential, random or indexed sequential method.
Physical view involves how data is stored on and retrieved from storage media. E.g.,
Hard disks or magnetic tapes
o There is only one physical view.
Logical view involves how information appears for users and how it can be organized
and retrieved. E.g., marketing manager wanna view the related marketing data while
finance manager view for related also.
o Depending on the user, there can be more than one logical view.
Data models determine how data is created, represented, organized, and maintained.
Network model
Similar to hierarchical model but organized differently Each record can have multiple
The relational model uses a two-dimensional table of rows and columns of data. Rows
are records (aka tuples) and columns are fields (aka attributes).
Data dictionary store definitions. E.g., field name, field data types, default value,
Validation rule.
The primary key uniquely identifies every record. Example, SIN No., Student ID No.
Foreign Key – A key from the child table that links to the primary key of the parent table.
Used to establish the relationship between tables.
Components of a DBMS
3.Data manipulation- Used to add, delete, modify and retrieve records. Query language like
structured query language (SQL).
4. Application generation – Used to create designs elements of the application. E.g., create a
menu system of the application.
5. Data administration – Used for backup and recovery, security and change management. Used
to determine permissions to create, read, update, and delete. (CRUD)
A data driven website act as an interface to a database, retrieve data and allow users to enter data
in the database.
Improve access to information
Reduce support and overhead needed to maintain static Websites
Give users more current information from a variety of data sources
Distributed Database
Distributed Database Management System (DDBMS) stores data on multiple servers throughout
an organization.
Several advantages Design better reflects the firm’s structure
Local data storage reduces response time
Minimizes effects of computer failure
Not limited by data’s physical location
Advantages
Supports more complex data management.
Handles storing and manipulating all types of multimedia as well as numbers and
characters.
Input- A variety of data sources provide the input for a data warehouse to perform analyses and
generate reports.
These sources can include:
1. External data sources, databases, and transaction files
2. Enterprise resource planning (ERP) systems
3. Customer relationship management (CRM) systems
ETL- extraction, transformation, loading (ETL) are the processes used in a data warehouse.
1. Extracting data from outside sources
2. Transform data to fit operational needs
3. Loading into the end target (database or data warehouse)
Data Mart
A data mart is a smaller version of the data warehouse. Data mart is used for specific user group
of an organization. E.g., data mart for marketing department
Advantages over data warehouses - Faster access to data due to their smaller size.
Improved response time for users
Disadvantages over data warehouses- Limited scope, Difficulty consolidating
information.
Data Lakes
Data Lake gathers and stores data in its original format in a central location. Collected data can
be structured as well as unstructured. Suitable for big data analytics and machine learning
applications.
Business Analytics
Uses data and statistical methods
Gains insight into the data
Provides decision makers with information to act on
Methods
1. Descriptive -Review past events, analyze data, provide a report
2. Predictive -Prepare decision makers for future events
3. Prescriptive -Shows likely outcome of each decision
Database Marketing
Uses an organization's database of customers and potential customers to promote products or
services
•Transforms marketing into a proactive process
•Successful task examples:Calculating customer lifetime value (CLTV)
Recency, frequency, and monetary analysis (RFM)
Customer communications
Analytical software