Supply Chain Management Systems Supply Chain
Supply Chain Management Systems Supply Chain
Supply chain
supply chain
ENTERPRISE BUSINESS SYSTEMS
Data consolidation
Data from the different touch points should be collected and
integrated into a single destination for processing.
Customer data must be managed properly to build long-term
customer relationships. This is very important because repeat
customers are the largest generators of revenue for an
organization.
Customer data may include demographic information, health
histories, marital status, work history, and educational
background
The CRM system relies on a data warehouse that makes
customer data available throughout the various functional
areas of the organization.
ENTERPRISE BUSINESS SYSTEMS
Cookies
Advantages of CRMs
Unstructured decisions
situations
ENTERPRISE BUSINESS SYSTEMS
Tactical management
Mid-level managers deal with middle level management activities
such as short-term planning, medium range plans and control.
They come up with strategies on how to achieve objectives set by the
strategic level managers
Decisions made at the tactical management level tend to be semi-
structured.
Semi structured decision scenarios have some structured components
and some unstructured components.
ENTERPRISE BUSINESS SYSTEMS
Operational management
Operating managers deal with day-to-day operations of an
organization, such as assigning employees to tasks, or placing or
purchase an order.
They come up with activities that help achieve objectives set by
strategic management
Decisions made at the operational management level tend to be
more structured.
ENTERPRISE BUSINESS SYSTEMS
Structured decisions
The decisions are made under the established situations.
They are programmable decisions and they are preplanned.
Structured decisions are made in situations which are fully
understood
Structured decisions are made on a regular basis in business
generally made for routine tasks
There are usually specific policies, procedures, or actions that can
be identified to help make the decision
ENTERPRISE BUSINESS SYSTEMS
Benefits of DSS
Improved decision making through in depth analysis of issues and
alternatives.
Ability to examine more alternatives
Ability to respond quickly to unexpected situations e.g. analyzing
impact of new legislation on profitability
Better control of the organisation
Time saving
ENTERPRISE BUSINESS SYSTEMS
Disadvantages of DSSs
Level of User-Friendliness
used
payables , Ledger
The applications that make up the system, share data across the various
departments
Reduce inventory.
Fewer errors
relationship tracking.
TRANSACTION PROCESSING SYSTEM
ENTERPRISE BUSINESS SYSTEMS
1. Payroll
2. Inventory Control
3. Order entry
4. Accounts Receivable
5. Point of sale
ENTERPRISE BUSINESS SYSTEMS
Advantages of TPS
• Paperless processes
• immediate feedback
Security
Vulnerability
Weakness of an asset or control that can be exploited by a
threat
Why systems are vulnerable
When large amounts of data are stored in electronic form,
they are vulnerable to many more kinds of threats than
when they existed in manual form.
The potential for unauthorized access, abuse, or fraud is not
limited to a single location but can occur at any access point
in the network.
Threats can stem from technical, organizational, and
environmental factors compounded by poor management
decisions
Users at the client layer can cause harm by introducing
errors or by accessing systems without authorization.
COMPUTER SECURITY
Vulnerability
Weakness of an asset or control that can be exploited by a
threat
Administrators, vendors and super user users have access to
perform transactions including own records
There are no audit trails enabled
Privileged accounts are shared and can delete or edit audit
trails
Privileged accounts use default settings and passwords
Unsupported software and hardware
Outdated security patches and antivirus
Default user names and passwords
Lack of awareness and training
COMPUTER SECURITY
Social engineering:
Internet vulnerabilities
Network open to anyone
on conversations.
E-mail may contain attachments with malicious software
Internet vulnerabilities
Employees may use email to transmit trade secrets or
Threat
Threats
Mishandling of critical or sensitive information by
authorized users
Incorrect privilege settings
Fire, flood, hurricane, windstorm or earthquake at primary
or backup facilities
Introduction of vulnerabilities into software products
Pervasive disk errors or other problems caused by aging
equipment.
COMPUTER SECURITY
Worms
Independent computer programs that copy themselves from
one computer to other computers over a network.
Worms operate on their own without attaching to other
computer program files.
Worms destroy data and programs as well as disrupt or even
halt the operation of computer networks.
Rely less on human behavior in order to spread from
computer to computer.
Worms and viruses are often spread over the internet from
files of downloaded software, attached email transmissions,
online ads, or instant messaging.
COMPUTER SECURITY
Trojan horses
Spyware
Packet sniffers
Ransomware
Ransomware works by infecting the system and
quickly encrypting the data.
Ransomware is now a multimillion business. The
underlying concept is pay or loose your critical data.
WannaCry
Distributed through spam emails and fake ads, which
trick users into downloading the virus onto their
computer
Self-propagating
Locked down the files on users’ computers, and
demanded that they pay a ransom to have their own files
unlocked.
Encrypts its victims systems using a 2048-bit RSA
Spread to more than 150 countries and infected more
than 300 000 computers
Renault’s largest factory shut down on Monday 15 May
2017. 3500 staff affected.
COMPUTER SECURITY
Spoofing
Sniffer
over network
Enables hackers to steal proprietary information such as e-
Identity theft
Phishing
Evil twins
Pharming
Click fraud
Risk assessment
Each unit making use of ICTs should have their own risk register
Security policy
impact of an outage
first
MIS Audit
personnel.
May even simulate disaster to test response of technology, IS staff,
other employees.
Lists and ranks all control weaknesses and estimates probability of
their occurrence.
Assesses financial and organizational impact of each threat
place
COMPUTER SECURITY
Firewalls
packets flowing back and forth between the trusted network and the
Internet, examining individual packets in isolation.
anomalous event.
it as well
Encryption
into cipher text that cannot be read by anyone other than the
sender and the intended receiver.
It has been described as the art and science that seeks to bring
and web pages that are designed to monitor the behaviour on the
web.
Spyware -calls out to Web sites to send banner ads and other
unsolicited material to the user, and it can also report the user’s
movements on the Internet to other computers.
SOCIAL AND ETHICAL ISSUES IN INFORMATION TECHNOLOGY
Ease of replication
Who can and will be held accountable and liable for the harm
done to individual and collective information and property
rights?
SOCIAL AND ETHICAL ISSUES IN INFORMATION TECHNOLOGY
4. System quality.
5. Quality of life.
Employment
Health Risks
Cyber bullying
Piracy
Copyrights laws