0% found this document useful (0 votes)
10 views

Final Review Slides

ADMS 2511 Final review

Uploaded by

sungjoon kim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Final Review Slides

ADMS 2511 Final review

Uploaded by

sungjoon kim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Review

 Session 1 (Information Systems and the Modern Organization)


 Importance of being informed users
 Information Technology jobs
 Overview of Computer Based Information Systems
 Data, Information, Knowledge
 Hardware, Software, Network, Database, Procedures
 How IT affects organizations, employees, managers and society.
 Session 2 (Types of Information Systems: Concepts, Management and Strategy)
 Org Strategy and how IT strategy aligns with it.
 Business Processes in IT – (Capture and Store Data, Monitoring Performance, executing)
 Porter’s Threats (business pressures) and Value Chain Model and how they are related to IT
 Strategies
Copyright for
Sheryl To, 2022 competitive advantage (differentiation, innovation,
1 etc)
Review
 Session 3 Ethics, Privacy, Information Security and Controls
 Ethical and Privacy Issues ( privacy, accuracy, property, accessibility). Privacy
Policies (PIPEDA)
 Information Security Threats (Intentional such ransomware, espionage or trespass
etc. VS Unintentional such as human error and social engineering)
 Information Security Controls
 Physical Controls such as gates, walls etc.
 Access and authentication controls such as passwords and biometric scans etc.
 Communication controls such as firewalls, encryption, anti-virus software
Copyright Sheryl To, 2022 2
Review
 Session 4 (Data, Information and Knowledge Management)
 Difficulties of Managing Data (data increases overtime, data coming from internal and
external sources, data degrades over time, data media rots, regulations etc.)
 Database approach (data hierarchy, fields, attributes and types of data (i.e. master data vs
transaction data)
 Advantages and disadvantages of database systems
 Big Data and characteristics (volume, velocity, variety) and issues (dirty, changes in data
streams, untrusted sources)
 Data warehouse and data marts

Copyright Sheryl To, 2022 3


Review
 Session 5 Managing Computer Hardware and Software + Cloud Computing
 Hardware (computer hierarchy, computer memory (primary (i.e. RAM) and secondary
storage (i.e.USB) device)
 Software (systems (i.e. Windows OS and application software (i.e. think about your phone
apps)
 Cloud Computing (difference between PAAS, SAAS and IAAS + risks and benefits of
cloud computing)

Copyright Sheryl To, 2022 4


Review
 Session 7 (Harnessing Telecommunications Networks, Web 2.0 and Social Computing)
 Different types of network (LAN, WAN, Enterprise network)
 Network Fundamentals (Comm. Media, network protocols such as Ethernet (for LAN) and
TCP/IP (internet), types of network processing, (i.e. client server or peer to peer computing)
 Know how data is being transmitted from one computer to another via the internet (i.e.
digital/ analogue , how TCP/IP works)
 Network applications (discovery such as search engines, communications such as email,
collaboration such as teleconferencing and video conferencing, and education such as e-
learning and distance learning)
 Web 2.0 – Social computing – tagging, blogs, RSS feeds, Wikis, Mash ups
 Benefits and risks of social commerce and its applications (such as marketing and CRM)
Copyright Sheryl To, 2022 5
Review
 Session 8 Utilizing E-business and E-Commerce; Wireless Technologies
 Types of Ecommerce – B2C, B2B, C2C, E-government, Mobile commerce, Social commerce,
Conversational Commerce
 Ecommerce business models – online direct marketing, name your own price, affiliate marketing,
memberships, online auctions (see table 7.1)
 Electronic Payment mechanisms – Echques, e-cards
 Issues with Ecommerce (cybersquatting, taxes and other fees, other legal issues
 Wireless technologies (Short range – Bluetooth, UWB,NFC, Medium Range (i.e. wifi), Wide
Range (Cellular radio Wireless Broadband)
 Wireless Transmission Media (Radio, Satellite, Microwave)
Copyright
Internet
Sheryl To,of
2022Things (RFID, sensors) 6
Review
 Session 9 Using Information Systems within the Organization
 Understand how the following systems are used within an organization
 Transaction Processing Systems
 Functional Area Information Systems
 ERP and ERP II (i.e. ERP connecting CRM and SCM)
 Types of Reports
 Routine, Exception, Key Performance Indicator

Copyright Sheryl To, 2022 7


Review
 Session 10 Customer relationship management, supply chain management and information
technology
 CRM (Operational CRM - know examples of customer touching, customer facing applications and
Analytical CRM)
 Customer Facing – Organization “faces” the customer (i.e. providing services to the customer)
 Customer Service Support, Sales Force Automation, Marketing, Campaign Management
 Customer Touching – Customer interacts/ reaches out to the organization’s services
 Search and Comparison capabilities, personalized web pages, FAQs, email and automated response
 Analytical CRM – used in providing business intelligence support by analyzing customer behaviour and
perceptions
 SCM (5 basic components – know how IT helps in plan, source, make, deliver and return).
Technologies - EDI, Extranet, Portals
 Pull vs. Push Model
Copyright I. Splettstoesser Hogeterp, 2020 8
Review
 Session 11 (The Power of Business Analytics)
 Business Analytics and examples
 Descriptive (sensitivity analysis, What-If Analysis, Goal Seeking Analysis)
 Predictive
 Prescriptive
 Presentation tools (i.e. dashboards, GIS (geographic information systems)
 Application of AI (computer vision, natural language processing, speech
recognition, intelligent agents, expert systems)

Copyright Sheryl To, 2022 9


Review
 Session 12 (Acquiring Information Systems and Applications)
 Justifying Importance of IT Planning and IT investments (i.e. NPV, business case, BE,
ROI)
 Adv and Disadv of 8 diff. strategies for IT acquisition
 SDLC stages and how IT personnel and users could be involved in each stages
 System Analysis, design, programming and testing, implementation (i.e. parallel, direct,
phased, pilot conversion)
 Alternative Methods for system development
 JAD, Agile Development, End User Development
 Tools – prototyping, object oriented, component-based.

Copyright Sheryl To, 2022 10


All the Best!
 Reminders:
 Please do not forget to do the practice final exam. I suggest the you complete the
entire exam first as if you are in the real exam scenario and then debrief your response.
 Course evaluations is open.  Please take 2 minutes to complete them. It is largely valuable
to those working with in the delivery of this course and in particular to me.  
http://courseevaluations.yorku.ca. 
 The process is entirely confidential. Instructors see no course evaluation results or
comments until AFTER they submit final grades and they NEVER see who said what.
 May your knowledge and your life prosper
 May what you studied here be useful in your future studies and career
 Thank-you for taking this course!
Copyright Sheryl To, 2022 11

You might also like