Chapter 18 Information Resources Information Systems MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Copyright 2001 Prentice-Hall,

Slides:



Advertisements
Similar presentations
Alter – Information Systems 4th e d. © 2002 Prentice Hall 1 Moving Towards E-Business As Usual.
Advertisements

Cost Management ACCOUNTING AND CONTROL
Chapter 1: The Database Environment
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Relational Database and Data Modeling
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Exit a Customer Chapter 8. Exit a Customer 8-2 Objectives Perform exit summary process consisting of the following steps: Review service records Close.
Create an Application Title 1A - Adult Chapter 3.
Modern Systems Analyst and as a Project Manager
1 Implementing Internet Web Sites in Counseling and Career Development James P. Sampson, Jr. Florida State University Copyright 2003 by James P. Sampson,
© SafeNet Confidential and Proprietary Administering SafeNet StorageSecure Smart Card Module 3: Lesson 5 SafeNet StorageSecure Storage Security Course.
1 CIFTlab1.2 Software for Clinical Diagnostic Laboratories 1.
Information Systems Today: Managing in the Digital World
Creating and Capturing Customer Value
Chapter 1 Introduction to the Computer-Based Information System
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
Chapter 2 Using Information Technology for Competitive Advantage Copyright 2001, Prentice-Hall, Inc. MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod,
Chapter 17 Marketing Information Systems MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Copyright 2001 Prentice-Hall, Inc
Chapter 4 Computer Use in an International Marketplace
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CHAPTER 8 INFORMATION IN ACTION
MANAGEMENT RICHARD L. DAFT.
By CA. Pankaj Deshpande B.Com, FCA, D.I.S.A. (ICA) 1.
© Paradigm Publishing Inc Chapter 10 Information Systems.
Chapter 10: The Traditional Approach to Design
Analyzing Genes and Genomes
Systems Analysis and Design in a Changing World, Fifth Edition
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Essential Cell Biology
James A. Senn’s Information Technology, 3rd Edition
Database Administration
© Prentice Hall CHAPTER 15 Managing the IS Function.
Intracellular Compartments and Transport
PSSA Preparation.
Dealing with Competition
Essential Cell Biology
Organization Theory and Health Services Management
Immunobiology: The Immune System in Health & Disease Sixth Edition
Chapter 13 Preparing The Systems Proposal Systems Analysis and Design Kendall and Kendall Fifth Edition.
Copyright © 2002 by The McGraw-Hill Companies, Inc. All rights reserved Chapter The Future of Training and Development.
Energy Generation in Mitochondria and Chlorplasts
16-1©2005 Prentice Hall 13 Organizational Design and Structure Chapter 13 Organizational Design and Structure.
Management Information Systems, 10/e
Implementing Strategy in Companies That Compete in a Single Industry
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 1 Management Information Systems, 10/e Raymond McLeod Jr.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 1 Management Information Systems, 10/e Raymond McLeod Jr.
Appendix E Human Resources Information Systems MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Copyright 2001 Prentice-Hall, Inc.
1 Pertemuan 16 Pengelolaan Sumber Daya Informasi Matakuliah: M0084/Sistem Informasi dalam Manajemen Tahun: 2005 Versi: 1/1.
CHAPTER 2 INFORMATION SYSTEMS FOR COMPETITIVE ADVANTAGE
Final Coverage Topic 4: INFORMATION RESOURCES and INFORMATION SYSTEMS By Dr. Faustino Reyes.
System Users and Developers
Chapter 2 Using Information Technology for Competitive Advantage
Chapter 1 Introduction to the Computer-Based Information System
Chapter 18 Information Resources Information Systems
Chapter 1 Introduction to the Computer-Based Information System
Chapter 2 Using Information Technology for Competitive Advantage
Management Information Systems, 10/e
Chapter 1 Introduction to the Computer-Based Information System
Chapter 2 Using Information Technology for Competitive Advantage
Chapter 2 Using Information Technology for Competitive Advantage
Chapter 1 Introduction to the Computer-Based Information System
Presentation transcript:

Chapter 18 Information Resources Information Systems MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Copyright 2001 Prentice-Hall, Inc. 18-1

Information Resources Include: n Specialists –Systems analysts, programmers, database administrators, network specialists, operations personnel, and others n Hardware n Software n Users n Data n Information Represents a large organizational investment! 18-2

Information Specialists n Most located in the information services unit n There is a trend to locate specialists throughout the firm n Actual organization chart depends on the needs of the firm 18-3

A Functional Organization Structure for Information Services Network manager Manager of computer operations Manager of systems maintenance Manager of systems administration CIO Manager of systems development Systems analyst Systems analyst Operations personnel Database administrators Network specialists Programmers 18-4

Information Resources n Most are located in information services n Most that are centrally located are CIO’s responsibility n Those located in functional areas are the responsibility of the area manager 18-5

Model of an IRIS n Input subsystems –AIS –Information resources research –Information resources intelligence n Output subsystems –Hardware –Software –Human resources –Data and Information –Integrated resource 18-6

A Model of an Information Resources Information System Database Accounting information system Information resources research subsystem Information resources intelligence subsystem Hardware subsystem Software subsystem Human resources subsystem Data and information subsystem Integrated resource subsystem Internal sources Environmental sources Users 18-7

Information Resources Research Subsystem n Describes functions involved in special research projects within the firm n Performed by systems analysts interacting with users 18-8

Information Resources Intelligence Subsystem n Describes functions involved in gathering information from elements in the firm’s environment –Government –Suppliers –Labor unions –Global community –Customers –Competitors 18-9

CIO Responsibilities n Can be top-level executive who participates on executive and MIS steering committee n Contributes to strategic planning for firm and IS functions n Primary source of leadership for: –Achieving and maintaining information quality –Keeping information resources secure –Planning for contingencies –Keeping information costs under control 18-10

Achieving Quality Products and Services 1) Identify IS customers –MIS steering committee –Use of a formal system works best 2) Define customer quality needs –Product quality needs –Service quality needs 18-11

IS Takes Six Basic Steps in Achieving Quality Management Identify IS customers Define customer quality needs Establish quality metrics Define quality strategy Implement IS quality programs Monitor IS quality performance 18-12

Comparison of How IS and Middle-Level Manager-Users Perceive Product Quality Accurate Trusts output Works as specified User friendly Relevant Fast response time Meets all user needs No downtime Delivered on time Has user documentation Can be changed quickly Delivered on budget Low cost of operation Has programmer documentation Uses new technology Dimension IS User Aggregate Perceived Value 18-13

Achieving Quality Products and Services [cont.] 3) Establish quality metrics –Information product quality –Information service quality 4) Define the IS quality strategy –Recruiting and training –User-oriented systems development »Market analysis »Product acceptance analysis »Task analysis »Prototype tests »Operational Systems tests 18-14

See Table 18.2 Basic Competencies Expected of IS Job Applicants 1. Concern for effectiveness 2. Initiative 3. Enthusiasm for work 4. Self-confidence 5. Concern with impact 6. Interpersonal astuteness 7. Conceptual thinking 8. Analytical thinking 9. Effective communication 10. Flexibility 18-15

Special Attention to Human Factors Ensures That Users’ Needs are Incorporated into Systems Designs 1. Planning phase 2. Analysis phase 3. Design phase 4. Implementation phase 5. Use phase Conduct a market analysis Conduct a product acceptance analysis Conduct a task analysis Conduct prototype tests Conduct operational system tests 18-16

Achieving Quality Products and Services [cont.] 5) Implement IS quality programs –Implementation varies with firm 6) Monitor IS quality –Performance of IS specialists and the unit 18-17

Security Objectives n Confidentiality n Availability n Integrity Current attention is focused on malicious software such as computer viruses

Integrity Availability Information Unauthorized use use Unauthorizeddisclosure and theft Unauthorized destruction and denial of service UnauthorizedmodificationSecurity Confidentiality Confidentiality Unauthorized Acts Threaten System Security Objectives 18-19

Identification Authentication Authorization User Profiles Access control files Database Software library Audit log Report writer Security reports Users Access Control Functions 18-20

Access Control n Identification –What you know (password) or –Where you are (terminal location) n Authentication –What you have (badge) n Authorization –Level of use High-grade threats are from sophisticated computer criminals 18-21

Contingency Planning n Emergency plan n Backup plan –Redundancy –Diversity –Mobility »Reciprocal agreement »Hot site »Cold site »Empty shell 18-22

Vital Records Plan n Electronic vaulting –Day end backup of files electronically n Remote journaling –Transmission of transaction data as the transactions occur –Used to update remote database in batch form later n Database shadowing –Involves updating of duplicate database at remote site as transaction occur 18-23

Cost-Reduction Strategies n Consolidation –Reduces number of separate locations for information resources –Easiest to achieve in terms of information resources –More difficult by end-user computing needs 18-24

Cost-Reduction Strategies [cont.] n Downsizing –Migrating to smaller platforms –Advantage of cost reduction –Advantage of increased productivity with PCs located in user areas –Risk of lost security 18-25

Cost-Reduction Strategies [cont.] n Outsourcing –Data entry and simple processing (editing, formatting) –Contract programming –Facilities management (FM) –Systems integration (SI) –Support for maintenance, service, or disaster recovery 18-26

Objectives of Outsourcing n Manage costs better n Reduce n Contain n Predict n Obtain relief from systems maintenance so as to concentrate on new system development n Acquire needed expertise 18-27

Information Management in Three Pacific Rim Countries n Countries were U.S., Korea, and Mexico n Centralization versus decentralization –Most firms were centralized n CIO participation in strategic business planning –CIO has a long way to go before achieving status as a top-level executive 18-28

Information Management in Three Pacific Rim Countries [cont.] n Information systems planning –Most firms have IS plan –CIO is primarily responsible n Sharing information resources with users –In general, CIOs support end-user computing trends 18-29

Proactive CIO Strategy 1) CIO must emphasize quality management of the IS resource 2) Achieve strong user ties 3) Strengthen executive ties 4) Assemble an IS management team 5) Assemble staff competent in leading-edge technologies and methodologies 6) Build an IRIS 18-30

The Future of the CIO n Business computing is moving from centralized to decentralized computing in terms of: –Equipment –Development –Decision making n CIO Roles –Big brother –Helping hand –Watchdog –Networker 18-31

Equipment Big brother A B Helping hand D Network Watchdog C Decentralized Centralized Decentralized Development Decentralized Decision making Centralized Donovan’s Four Stages of Decentralized Computing 18-32

Summary n Information resources located in IS are the responsibility of the CIO n IRIS is used to manage information resources within an organization n CIO must: –Promote quality information products and services –Ensure security of IS –Prepare for disasters 18-33

Summary [cont.] n IS cost cutting considerations –Consolidation –Downsizing –Outsourcing n CIO can be proactive 18-34