myMIS
myMIS
Changes in technology have enabled new ways of working and socializing; whereas
traditionally, people were bound to a stationary PC to do essential tasks, they can now
perform such tasks from almost anywhere they have a cell phone signal. Likewise,
workdays traditionally had a clear beginning and a clear end—from when you powered
your computer on to when you turned it off at night. Today, many tasks (especially more
casual tasks such as reading or sending e-mails) can be done at any time, often in small
chunks in between other tasks, such as when waiting in line at the supermarket cashier.
Example : package delivery person using global positioning system (GPS) technology
to take the best route to deliver parcels to the farmer in Iowa who uses precision
agriculture to plan the use of fertilizers to increase crop yield. In essence, (almost) every
organization can now be considered an e-business. An e-business is an organization that
uses information technologies or systems to support nearly every part of its business.
Opportunities:
2. Increased Trade: Open borders and reduced trade barriers have led to an increase
in international trade, which can boost a country's economic development and create
jobs.
Challenges:
2. Loss of Jobs: The outsourcing of jobs to countries with lower labor costs can lead to
job displacement in higher-cost countries, causing unemployment and social unrest.
7. Health Risks: The rapid movement of people and goods has also facilitated the
spread of diseases and pandemics, as witnessed with the COVID-19 pandemic.
8. Crisis Transmission: Economic crises in one part of the world can quickly spread
to other regions due to global financial interconnectedness.
Outsourcing:
The tremendous decrease in communication costs has increased outsourcing.
Outsourcing is a business practice of hiring a party outside a company to perform
services or create goods that were before performed by the company’s own employees
and staff . It is basically the moving of business processes or tasks to another company
or country.
Countries such as Russia, China, and India offer high-quality education, leading to an
ample supply of well-trained people at low cost.
Companies are choosing to outsource business activities for a variety of reasons; the
most important reasons include the following:
Often, companies located in countries such as India can provide certain services much
cheaper because of lower labor costs, or companies perform certain functions in a
different country to reduce costs or harness skilled labor
ISSUES
1. demographic changes: Changes in the structure of populations such as related
to age, birth rates, and migration. While many countries in the developed world
see rapidly aging populations, developing regions such as Africa are expected to
rapidly rise in population, fueling a massive global population growth. These
differences in demographic changes will also shift the balance of demand and
supply of the labor.
2. Urbanization: The movement of rural populations to urban areas, to a point
where 50 percent of the world’s population is now living in cities. Intensive urban
growth can lead to greater poverty with local government unable to provide
services to all people .
3. Shifts in economic power: Economic shift can be defined as a shift in
structure , policy or growth in the economy and can be considered as one of the
external factors that effect business decision making. Changes in countries’
purchasing power and control over natural resources—where established
economies are losing the inhabitants will pose major challenges. Where
established economies are losing their dominating positions in the world’s
economy, resulting in the need to resolve political struggle.
4. Resource Scarcity: It is due to availability of fossil fuels and natural resources
.Resource scarcity has both economic and environmental effect. When a god
become less , the price increases causing economic problems. It means that
demand of goods and services is greater than their availability.
5. Climate change: large-scale and long-term regional and global changes in
temperatures and weather patterns. Population growth, global trade,
consumerism, and other factors contribute to increasing waste and pollution.
6. Sustainable development: “development that meets the needs of the present
without compromising the ability of future generations to meet their own
Management Information System
needs”—will become an ever increasingly important aspect. In addition to these
societal issues, we have witnessed a number of breakthroughs and
transformations enabled by technology; these breakthroughs are disrupting
traditional business models but can also help address pressing societal issues.
For example, within just a few years, drones evolved from being primarily used by the
military to being used by farmers, aerial photographers, filmmakers, and hobbyists
alike. Self-parking systems are already available in many vehicles, self-driving cars and
trucks are being actively tested by various companies, and autonomous Caterpillar
mining trucks are already in use.
MOBILE
The term "MOBILE mega trend" likely refers to the significant and ongoing trends
related to mobile technology and its impact on various aspects of our lives. Mobile
technology has been rapidly evolving over the years, and it continues to shape the way
we communicate, work, play, and conduct business. In most developed countries the
vast majority of adults have mobile phones and people have their reach 24/7 . For
organizations , this increase in mobility has wide range of implications from increased
collaboration to ability to manage business in real time –at any time , from anywhere –
to changes in the way new customers can be reached. Here are some key aspects of the
mobile mega trend:
Management Information System
1. Smartphones: Smartphones have become ubiquitous, with billions of people
worldwide owning these powerful handheld devices. They have transformed the
way we access information, communicate, and perform various tasks.
2. Mobile Apps: The proliferation of mobile apps has created new opportunities
for businesses and individuals alike. App stores offer a wide range of applications
for entertainment, productivity, health, and more.
5. Bring Your Own Device ( BYOD): Today employees are using their own
devices for work related purposes or are using software they are used to in work
place. They use mobile devices for various purposes including customer
relationship management, checking emails or visiting social sites.
SOCIAL MEDIA
A second megatrend, as you have undoubtedly noticed, is social media. The rise of
social media is largely based on the network effect—referring to the notion that the value
of a network increases with the number of other users.
• Over 4.6 billion (and growing) Facebook users share status updates or pictures
with friends and family
• Companies harness the power of the crowd by using social media to get people to
participate in innovation and other activities
• Organizations use social media to encourage employee collaboration
INTERNET OF THINGS
The "Internet of Things" (IOT) represents a transformative mega trend that has been
shaping various industries and aspects of daily life. IOT refers to the network of
interconnected physical devices and objects, such as sensors, appliances, vehicles, and
industrial machines, that can collect and exchange data over the internet.
CLOUD COMPUTING
The fourth megatrend is cloud computing. Whereas traditionally each user would
install a number of different applications for various tasks—from creating documents to
listening to music—as well as store documents, pictures, and other data on his or her
computer, web technologies enable using the Internet as the platform for applications
and data. Now, much of the functionality previously offered by applications installed on
each individual computer is offered by applications “in the cloud,” accessed via a web
browser. Increasingly, not only the applications but also the data reside in the cloud, to
be accessed at any time from anywhere
• Web technologies enable using the Internet as the platform for
applications and data
• Applications that use to be installed on individual computers are
increasingly kept in the cloud e.g., Gmail, Google Docs, Google Calendar
• Can enabled advanced analytics of massive amounts of Big Data
Simply put, cloud computing is the delivery of computing services—including servers,
storage, databases, networking, software, analytics, and intelligence—over the internet
(“the cloud”) to offer faster innovation/
BIG DATA
Big Data is a collection of data that is huge in volume, yet growing exponentially with
time. It is a data with so large size and complexity that none of traditional data
management tools can store it or process it efficiently. Big data is also a data but with
huge size. Big Data are typically described as extremely large and complex datasets,
which are characterized as being of high volume, variety (i.e., many different types of
data), and velocity (i.e., the data are being collected and analyzed at ever-increasing
rates). Following the old adage that information is power, organizations are
continuously seeking to get the right information to make the best business decisions.
Yet organizations are generating and collecting ever more data from internal and
external sources. The rise of social media has further increased the amount of
unstructured data available to organizations; for example, people frequently voice their
thoughts about products or companies on blogs or social networks. In addition, the
Internet of Things, allowing for connecting devices and sensors to the Internet, further
contributes to the growth of data available to organizations and individuals. With
decreasing costs for capturing and storing data, data are now not only ubiquitous but
also cheap.
EXAMPLES:
The New York Stock Exchange is an example of Big Data
that generates about one terabyte of new trade data per day.
The statistic shows that 500+terabytes of new data get ingested into the
databases of social media site Facebook, every day. This data is mainly
Management Information System
generated in terms of photo and video uploads, message exchanges,
putting comments etc.
A single Jet engine can generate 10+terabytes of data in 30
minutes of flight time. With many thousand flights per day, generation of
data reaches up to many Petabytes.
Information system is an integrated system that helps the management with relative
information needed to run their business effectively and efficiently.
DATA:
Unformatted data, or simply data, are raw symbols, such as characters and numbers.
Data have no meaning in and of themselves and are of little value until processed .
For example, if we asked you what 465889727 meant or stood for, you could not tell
us (Figure 1.13). However, if we presented the same data as 465-88-9727 and told you it
Management Information System
was located in a certain database, a key consideration of assessing whether data are
reliable for making decisions is data quality, consisting of completeness, accuracy,
timeliness, validity, and consistency.
INFORMATION:
Data can be formatted, organized, or processed to
be useful; they are transformed into information,
which can be defined as a representation of reality,
and can help to answer questions about who, what,
where, and when.
In the previous example, 465-88-9727 was used to
represent and identify an individual person. A list of
all the transactions at a bank’s ATMs over the
course of a month would be fairly useless data.
However, a table that divided ATM users into two categories, bank customers and non-
bank customers, and compared the two groups’ use of the machine—their purpose for
using the ATMs and the times and days on which they use them—would be incredibly
useful information. A bank manager could use this information to create marketing
mailings to attract new customers. Without information systems, it would be difficult to
transform raw data into useful information.
KNOWLEDGE:
In order to actually use information, knowledge is needed. Knowledge is the ability to
understand information, form opinions, and make decisions or predictions based on the
information. For example, you must have knowledge to be aware that only one Social
Security number can uniquely identify each individual . Knowledge is a body of
governing procedures, such as guidelines or rules, that are used to organize or
manipulate data to make them suitable for a given task.
Ever since the dawn of humankind, there was a need to transform data into useful
information for people, and people have invented various calculating devices, such as
the abacus or the slide rule. Before the introduction of the first computers (which
worked on a mechanical basis using punch cards), almost all business and government
information systems consisted of file folders, filing cabinets, and document repositories.
Computer hardware has replaced these physical artifacts, providing the technologies
to input and process data and output useful information; today, hardware includes not
only “traditional” computer components but a variety of other input and output devices,
including sensors, cameras, actuators, and the like.
TABLE 1.2: Some IS Management Job Titles and Brief Job Descriptions
Management Information System
Sony introduced the PlayStation Network in 2006 to accompany its successful PlayStation
game consoles. In 2010, Sony added a service named PlayStation Plus, offering subscription-
based premium services. In the war of the game consoles, PlayStation Plus was regarded as a
way for Sony to get ahead of the competition from Microsoft’s Xbox and Nintendo’s Wii.
However, since its inception, the PlayStation Network has been plagued with all-too-frequent
system outages. Most notably, in 2011, a system outage following a malicious attack lasted 23
days. On Christmas Day 2014, a denial-of-service caused the PlayStation Network to be
unavailable, ruining the holidays for many users. In 2016, the first outage happened only a
few days into the new year, with further outages following just a few weeks later.
Built to help achieve competitive advantage, the PlayStation Network continues to
be Sony’s Achilles heel.
Case in Point: An Information System That Works: FedEx
FedEx, a US$47.5 billion family of companies (2016 data), is the world’s largest express
transportation company, delivering millions of packages and millions of pounds of freight to
220 countries and territories each business day. FedEx uses extensive, interconnected
information systems to coordinate more than 340,000 employees, hundreds of aircraft,
and more than 100,000 ground vehicles worldwide. To improve its services and sustain
a competitive advantage, FedEx continuously updates and fine-tunes its systems
For example, FedEx.com has more than 50 million unique visitors per month and more than
50 million tracking requests per day, and FedEx strives to provide the most accurate tracking
information to each visitor. its destination, each package typically travels through at least one
sorting facility, where it is routed to its intermediate and final destinations.
Old-school IS personnel believed that they owned and controlled the computing
resources, that they knew better than users did, and that they should tell users what they
could and could not do with the computing resources; in addition, early IS departments
typically had huge project backlogs, and IS personnel would often deliver systems that
were over budget, were completed much too late, were difficult to use, and did not
always work well. The increasing pervasiveness of technology in businesses and societies
has led to a shifting mindset about information systems within organizations. Many
organizations, for example, have realized that some of the best ideas for solving business
problems come from the employees using the system; as a result, personnel within many
IS units have taken on more of a consulting relationship with their users, helping the
users solve problems, implement ideas, and be more productive. IS personnel are
increasingly reaching out to their internal customers and proactively seek their input
and needs rather than waiting for customers to come in with systems complaints. They
modify the systems at a moment’s notice just to meet customer needs quickly and
effectively. They celebrate the customers’ new systems ideas rather than putting up
roadblocks and giving reasons that the new ideas cannot or will not work. They
fundamentally believe that the customers own the technology and the information and
that the technology and information are there for the customers, not for the systems
personnel. They create help desks, hotlines, information centers, and training centers to
Management Information System
support customers. These service-oriented IS units structure the IS function so that it
can better serve the customer.
THE SPREAD OF TECHNOLOGY IN ORGANIZATIONS.
Another phenomenon that shows how integral and vital information systems and their
proper management have become to organizations is the extent to which the technology
is firmly integrated and entrenched within the various business units (such as
accounting, sales, and marketing). In many organizations today, you will find that the
builders and managers of a particular information system or subsystem spend most of
their time out in the business unit, along with the users of that particular system. Many
times, these systems personnel are permanently placed—with an office, desk, phone,
and PC—in the business unit along with the users. In addition, it is not uncommon for
systems personnel to have formal education, training, and work experience in
information systems as well as in the functional area that the system supports, such as
finance. It is becoming increasingly more difficult to separate the technology from the
business or the systems staff from the other people in the organization systems are
managed is important to you, no matter what career option you pursue. As information
systems are used more broadly throughout organizations, IS personnel often have dual-
reporting relationships—reporting both to the central IS group and to the business
function they serve. Therefore, at least some need for centralized IS planning,
deployment, and management continues—particularly with respect to achieving
economies of scale in systems acquisition and development and in optimizing systems
integration, enterprise networking, and the like. Even in organizations that are
decentralizing technology and related decisions, a need to coordinate technology and
related decisions across the firm still persist.
IS Ethics :
A broad range of ethical issues have emerged through the use and proliferation of
computers. Especially with the rise of companies such as Google, which generate
tremendous profits by collecting, analyzing, and using their customers’ data, and the
emergence of social networks such as Facebook, many people fear negative impacts such
as social decay, increased consumerism, or loss of privacy. Computer ethics is used to
describe moral issues and standards of conduct as they pertain to the use of information
systems. In 1986, Richard O. Mason wrote a classic and very insightful article on the
issues central to this debate—information privacy, accuracy, property, and accessibility
(aka “PAPA”). These issues focus on what information an individual should have to
reveal to others in the workplace or through online transactions, ensuring the
authenticity and fidelity of information, who owns information about individuals and
how that information can be sold and exchanged, and what information a person or
organization has the right to obtain about others and how this information can be
accessed and used. With the societal changes brought about by information systems, the
Management Information System
issues surrounding privacy have moved to the forefront of public concern; in addition,
the ease of digitally duplicating and sharing information has raised not only privacy
concerns but also issues related to intellectual property. Next, we examine these issues.
INFORMATION PROPERTY ON THE WEB. It happens to all of us. Nearly every day in our
physical or virtual mailboxes, we receive unwanted solicitations from credit card
companies, department stores, magazines, or charitable organizations. Many of these
items are never opened. We ask the same question over and over again: “How did I get
on another mailing list?” Our names, addresses, and other personal data were most likely
sold from one company to another for use in mass mailings. Who owns the computerized
data about people—the data that are stored in thousands of databases by retailers, credit
card companies, and marketing research companies? The answer is the company that
maintains the database of customers or subscribers legally owns the data and is free to
sell them. Your name, address, and other data are all legally kept in a company database
to be used for the company’s future mailings and solicitations, and the company can sell
its customer list or parts of it to other companies who want to send similar mailings.
Companies collect data from credit card purchases (by using a credit card, you indirectly
allow this) or from surveys and questionnaires you fill out when applying for a card. They
also collect data when you fill in a survey at a bar, restaurant, supermarket, or the mall
about the quality of the service or product preferences. By providing these data, you
implicitly agree that the data can be used as the company wishes (within legal limits, of
course). Although more and more people are concerned about their privacy settings on
Management Information System
social networks such as Facebook, there are things that you may not be able to control.
For example, if one of your friends (or even a stranger) posts a photo of you on
Facebook, it will be there for many others to view, whether you like it or not. By the time
you realize it, most of your friends, coworkers, and family members may have already
seen it. Sometimes, you may forget who’s following your activities at the various social
networking sites, and you may tell people things you never wanted them to know. As
these examples show, there are many more threats to your privacy than you may have
thought.
HOW TO MAINTAIN YOUR PRIVACY ONLINE.
In general, companies operating in the online world are not required by law to respect
your privacy. In other words, a vendor can track what pages you look at, what products
you examine in detail, which products you choose to buy, what method of payment you
choose to use, and where you have the product delivered. After collecting all those data,
unscrupulous vendors can sell them to others, resulting in more direct mail advertising,
electronic spam in your e-mail inbox, or calls from telemarketers. When surveyed about
concerns related to Internet use, most consumers list issues of information privacy as a
top concern. As a result, governments have pressured businesses to post their privacy
policies on their websites.
widely accepted fair information practices include:
■ Notice/Awareness. Providing information about what data are gathered, what the
data are used for, who will have access to the data, whether provision of the data is
required or voluntary, and how confidentiality will be ensured. Such information is
typically contained in data privacy statements on a website.
■ Choice/Consent. Providing options about what will be done with the data (e.g.,
subscription to mailing lists after a purchase). Typically, consumers are given a choice to
opt in (i.e., signal agreement to the collection/further use of the data, e.g., by checking a
box) or opt out (i.e., signal that data cannot be collected/used in other ways).
■ Access/Participation. Providing customers with means to access data collected
about them, check for accuracy, and request correction of inaccuracies.
■ Integrity/Security. Ensuring integrity of the data (e.g., by using only reputable
sources of data) as well as implementing controls against unauthorized access,
disclosure, or destruction of data (we will discuss these controls in Chapter 10, “Securing
Information Systems”).
■ Enforcement/Redress. Providing means to enforce these practices, and/or for
customers to receive remedies, for example, through self-regulation or appropriate laws
and regulations. Unfortunately, while data privacy statements provide information
about, for example, how data will be used, they often do not protect the privacy of
consumers.
To protect yourself, you should always review the privacy policy of all companies you do
business with and refuse to do business with those that do not have a clear policy or do
not respect your privacy.
2. Intellectual Property :Another set of ethical issues centers around intellectual property
(IP) (i.e., creations of the mind that have commercial value) and the ability to easily
download, copy (and potentially modify), and share or distribute digital information. For
example, back in the days of analog music, it was all but impossible to create a copy of a
Management Information System
song without sacrificing quality. Nowadays, you can almost effortlessly copy your friend’s
entire digital music library without any quality loss (Figure 1.21); with just a little more
effort, you can share it with your friends or even strangers using peer-to-peer networks.
Alternatively, you may come across a great photograph or article on the web and share it
on Facebook or Instagram without asking for permission from the creator. Similarly,
your school may have licensing agreements with certain vendors, allowing you to install
and use certain software while you are a student; yet you may never uninstall the
software after graduating, or you may lend the software to some friend or family member
for personal use. In other cases, you may not be able to afford certain programs and
download a pirated version from the web. In many non-Western societies, using
someone else’s work is considered praise for the creator . Using another’s work without
purchase or attribution has significant legal and ethical ramifications.
3. The Need for a Code of Ethical Conduct : Not only has the Internet age found
governments playing catch-up to pass legislation pertaining to computer crime, privacy,
and security, but it has also created an ethical conundrum. For instance, the technology
exists to rearrange and otherwise change photographs, but is the practice ethical? If you
can use a computer at your school or workplace for professional purposes but “steal”
computer time to do personal business, is this ethical? Is it ethical for companies to
compile information about your shopping habits, credit history, and other aspects of
your life for the purpose of selling such data to others? Should guidelines be in place to
dictate how businesses and others use information and computers? If so, what should
the guidelines include, and who should write them? Many businesses have devised
guidelines for the ethical use of information technology and computer systems; similarly,
most universities and many public school systems have written guidelines for students,
faculty, and employees about the ethical use of computers. Most organization and school
guidelines encourage all system users to act responsibly, ethically, and legally when
using computers and to follow accepted rules of online etiquette as well as federal and
state laws. RESPONSIBLE COMPUTER USE.
The guidelines prohibit the following:
■ Using a computer to harm others
■ Interfering with other people’s computer work
■ Snooping in other people’s files
■ Using a computer to steal
■ Using a computer to bear false witness
■ Copying or using proprietary software without paying for it
■ Using other people’s computer resources without authorization or compensation
■ Appropriating other people’s intellectual output .