1 Information Systems CS-507 Lecture 28. 2 Critical Success Factors (CSF). Critical Success Factor (CSF) is a business term for an element which is necessary.

Slides:



Advertisements
Similar presentations
Distributed Data Processing
Advertisements

Chapter 17 Networking Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
8.
IS Network and Telecommunications Risks
1 Pertemuan 13 Servers for E-Business Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Chapter Nine Information Technology and E-Commerce © 2007 The McGraw-Hill Companies, Inc., All Rights Reserved. McGraw-Hill/Irwin Introduction to Business.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
1 Chapter 7 IT Infrastructures Business-Driven Technology
Chapter 7: Client/Server Computing Business Data Communications, 5e.
Living in a Network-Centric World
System Analysis and Design
Business Driven Technology Unit 1
Chapter 9: Moving to Design
What Is TCP/IP? The large collection of networking protocols and services called TCP/IP denotes far more than the combination of the two key protocols.
Presented by Ramlah Hamad HRDF Certified Trainer MBA
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Internet GIS. A vast network connecting computers throughout the world Computers on the Internet are physically connected Computers on the Internet use.
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
PowerPoint Presentation by Charlie Cook Copyright © 2005 Prentice Hall, Inc. All rights reserved. Chapter 13 Information Technology for Business.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Chapter 9 Moving to Design Part 2.
Chapter 9 Elements of Systems Design
STRATEGIES INVOLVED IN REMOTE COMPUTATION
Prof. Yuan-Shyi Peter Chiu
Architecture of the R/3 System Chapter 14 C & L Chapter 8 M & W.
Transfer of data in ICT systems This section covers: Elements of a network Characteristics of a network Communication of data and use of communication.
Chapter 6 Intra-Business E-Commerce Copyright © 2003, Addison-Wesley Internal Communication Historically, paper Updating a paper procedures manual Outdated.
Critical Success Factors (CSF)
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
IT Infrastructure for Business
Data Communications and Networking CSCS 311 Lecture 2 Amjad Hussain Zahid.
ENTERPRISE COMPUTING QUIZ By: Lean F. Torida
The OSI Model and the TCP/IP Protocol Suite Outline: 1.Protocol Layers 2.OSI Model 3.TCP/IP Model 4.Addressing 1.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
1 Windows 2008 Configuring Server Roles and Services.
Presented by Yasmin Al-bobo Supervise Dr.Issam El-Bohise E-COMMERCE & Internet Law Intranet.
IT Strategic Planning.
Telecommunications, the Internet, and Wireless Technology.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
The Intranet.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
E-Tourism Nicos Rodosthenous PhD 04/04/ /4/20131Dr Nicos Rodosthenous.
Distributed Systems Unit – 1 Concepts of DS By :- Maulik V. Dhamecha Maulik V. Dhamecha (M.Tech.)
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Internet History Computer Networks.
 Distributed Database Concepts  Parallel Vs Distributed Technology  Advantages  Additional Functions  Distribution Database Design  Data Fragmentation.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Foundations of Information Systems in Business
NATIONAL IT AUTHORITY MODULE 5 PROCESS HANDLING SKILLS AND KNOWLEDGE.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
1 Balanced Scorecard Philosophy, Basics, Fundamentals, and Functions.
9 Systems Analysis and Design in a Changing World, Fifth Edition.
Virtual Private Networks (VPN)
CHAPTER 1 INTRODUCTION:
#01 Client/Server Computing
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Information Systems in Global Business Today
Seizing the Future Harvey Seegers 1.
#01 Client/Server Computing
Presentation transcript:

1 Information Systems CS-507 Lecture 28

2 Critical Success Factors (CSF). Critical Success Factor (CSF) is a business term for an element which is necessary for an organization or project to achieve its mission.

3 Critical Success Factors (CSF). Examples Safe transport of customer consignments Timely delivery of consignment Online status confirmation system to inform customers Proper packaging and handling

4 Sources of Critical Success Factors Industry CSFs – resulting from specific industry characteristics; Strategic CSFs – resulting from the chosen competitive strategy of the business e.g. quick and timely delivery may be critical to courier service business Environmental CSFs – resulting from economic or technological changes; and Temporal CSFs – resulting from internal organizational needs and changes.

5 CSF vs. Key Performance Indicator A critical success factor is not a key performance indicator or KPI. Critical Success Factors are elements that are vital for a strategy to be successful. A KPI measures the achievements.

6 CSF vs. Key Performance Indicator A CSF for improved sales may be adopting a new sales strategy through better and regularly arranged display of products in the shop windows. However, the KPI identified would be the increased/decreased Average Revenue Per Customer as a result of the strategy.

7 CSF vs. Key Performance Indicator Key Performance Indicators directly or indirectly measure the results of implementation of Critical Success Factors. KPI’s are measures that quantify objectives and enable the measurement of strategic performance.

8 AspectCentralizedDistributed ProcessingManaged at one serverOn multiple machines Computing Power Low (since processing managed at one machine) High (since more than one machines are involved) Data processing capability Depends upon the central machine Can be increased by distributing the task on multiple machines System Management Controls Integrated but limited to central server Controls integrated but distributed to the various servers SecurityHigh (Physical and Logical Controls) High (Physical and Logical controls distributed to all servers, therefore requiring high level of security management) Centralized vs. Distributed Processing Comment Draw from top to bottom row wise.

9 Web Based Environment In Web based environment, clients connect to the application through broad-band or base band/dial up connection. Application is located on the enterprise server which is accessed by the client through the internet connection. Access may be given to a single application software or the entire operating system. Web based environment can be combined with and applied to both centralized or decentralized environments to optimize the performance.

10 Web Based Diagram Remote User A Remote User B

11 Internet An interconnected system of networks that connects computers around the world via the TCP/IP protocol. Users contact Internet service providers for availability of connection which allows them to be a part of internet.

12 Intranet An intranet is a private enterprise owned communication network that uses internet protocols, network connectivity, and public telecommunication system to share organization's information or operations with its employees, and enables the employees to communicate with each other.