Tuesday, 7 January 2014

CHAPTER 7 : Wireless Technologies and the Modern Organization

7.1 Wireless Technologies:

Wireless devices: small enough to easily carry or wear, have sufficient computing power to
perform productive tasks and can communicate wirelessly with the Internet and other devices.
Thewireless application protocol (WAP) is the standard that enables wireless devices to
access Web-based information and services.
WAP-compliant devices contain microbrowsers, which are Internet browsers with a small file
size that can work within the confines of small screen sizes on wireless devices and the
relatively low bandwidths of wireless networks.

7.2 Wireless Computer Networks and Internet Access:
Short-range wireless networks generally have a range of 100 feet or less.
Medium-range wireless networks are the familiar wireless local area networks (WLANs).
The most common type of medium-range wireless network is Wireless Fidelity (Wi-Fi).
Wide-area wireless networks connect users to each other and to the Internet over
geographically dispersed distances.


7.3 Mobile Computing and Mobile Commerce :


Mobile computing: refers to real-time, wireless connection between a mobile device
and other computing environments, such as the Internet and an intranet.
Mobility:users carry a mobile device and can initiate a real-time contact with other systems from wherever they happen to be.
Broad reach:users can be reached instantly when they carry an open mobile device.

Mobile Computing:
*The characteristics, mobility and broad reach, create five value-added attributes that break the barriers of geography and time:

*Ubiquity

*Convenience

*Instant connectivity

*Personalization

*Localization of products and services
Intrabusiness Applications:

Accessing Information
*Mobile Portal
* Voice Portal
7.4 Pervasive Computing :

Pervasive Computing (Ubiquitous computing) is invisible“everywhere computing” that is
embedded in the objects around us – the floors, the lights, our cars, washing machine, microwave
oven, cell phones, clothes, and so on. (e.g., smart home, smart appliances)
Radio frequency identification (RFID) technology allows manufacturers to attach tags with
antennas and computer chips on goods and then track their movement through radio
signals.
Wireless sensor networks (WSNs) are networks of interconnected, battery-powered, wireless
sensors that are placed into the physical environment.

7.5 Wireless Security:
Four major threats


Rogue access point

War driving

Eavesdropping

RF (Radio frequency) jamming

CHAPTER 6: Electronic Commerce: Applications and Issues

Electronic commerce (e-commerce, EC) describes the buying, selling, transferring or exchanging of products, services or information via computer networks, including the Internet. E-business is a broader definition of EC, including buying and selling of goods and services, and also servicing customers, collaborating with partners, conducting e-learning and conducting electronic transactions within an organization. Pure versus Partial Electronic Commerce depends on the degree of digitization involved, Brick-and-mortar organizations, Virtual organizations, and Click-and-mortar organizations.
There are six types of E-Commerce, which are Business-to-consumer (B2C) the sellers are organizations and the buyers are individuals, Business-to-business (B2B): both the sellers and buyers are business organizations. B2B represents the vast majority of e-commerce.Consumer-to-consumer (C2C): an individual sells products or services to other individuals.Business-to-employee (B2E): An organization uses e-commerce internally to provide information and services to its employees. Companies allow employees to manage their benefits, take training classes electronically as well as buy discounted insurance, travel packages, and event tickets.E-Government: the use of Internet Technology in general and e-commerce in particular to deliver information about public services to citizens (called Government-to-citizen [G2C EC]), business partners and suppliers (called government-to-business [G2B EC]), Mobile Commerce (m-commerce) refers to e-commerce that is conducted in a wireless environment. For example, using a cell phone to shop over the Internet.
They are several benefits of E-Commerce, First Benefits to organizations, it Makes national and international markets more accessible, and Lowering costs of processing, distributing, and retrieving information. Second,Benefits to customers, it Access a vast number of products and services around the clock (24/7/365). Third, Benefits to Society, its ability to easily and conveniently deliver information, services and products to people in cities, rural areas and developing countries. Also, thy are Limitations of E-Commerce Technological Limitations, it lack of universally accepted security standards , insufficient telecommunications bandwidth, expensive accessibility. And Non-technological Limitations like, perception that EC is unsecure, unresolved legal issues, and lacks a critical mass of sellers and buyers

CHAPTER 5: Network Applications, Web 2.0, Distance Learning, and Telecommuting Computer





Networks to Connected computers in order to work together, are interdependent, and exchange datawith each other. Threesize Computer Networks are, Home computer network,National computer network, and Global computer network. And they are four Network Applications. First, Discovery, it allows users to browse and search data sources, in all topic areas,on the Web. It includes Search engines which are computer programs that search for specific information by key words and report the results. And Metasearch engines search several engines at once and integrate the findings of the various search engines to answer queries posted by users. Portal is a Web-based, personalized gateway to information and knowledge that providesrelevant information from different IT systems and the Internet using advanced search andindexing techniques. Commercial (public) portals offer content for diverse communities and are the most popular portals on the Internet. Affinity portals support communities such as a hobby group or a political party. Mobile portals are accessible from mobile devices. Corporate portals offer a personalized single point of access through a Web browser. Industrywide portals are for entire industries.



Second Network Applicationis Communication, it include Electronic mail (e-mail) is the largest-volume application running on the Internet, Web-based call centers (customer call center) are services that provide effective personalize customer contact as an imporant part of Web-based customer support, and Electronic chat room is a virtual meeting place where groups of regulars come to “gab”. Unified communications simplifies and integrates all forms of communications – voice, voice mail, fax, chat, e-mail, instant messaging, short message service,presence (location) services, and videoconferencing – on a common hardware, and software platform.



Third, Collaboration refers to efforts of two or more entities (individuals, teams, groups, or organizations) who work together to accomplish certain tasks. Work group refers specifically to two or more individuals who act together to perform some task. Virtual group (team) is when group members are in different locations. Virtual collaboration is the use of digital technologies that enable organizations or individuals to collaboratively plan, design, develop, manage and research products, services and innovative applications. Web 2.0 is a loose collection of information technologies and applications, and the Web sites that use them. The this is the most well-known Web 2.0 meme map, by Tim O’Reilly.He goes into more detail than Markus Angemeier.Depending on how much detail you want to go into, this figure provides any level of detail that you need.

Chapter 4: Managing Knowledge and Data


I have learned many concepts and information from this chapter. I summarized them as follow:

Difficulties in Managing Data are:
  1. Amount of data increases exponentially.
  2. Data are dispersed and collected by many individuals using various methods and devices.
  3. Data come from many sources.
  4. Data security, quality and integrity are critical.
Database management system (DBMS) provides all users with access to all the data.
It minimize: Data redundancy, isolation and inconsistency. And maximize: Data security, integrity and independence.

The data model is a diagram that represents the entities in the database and their relationships.
Database designers plan the database design in a process called entity-relationship (ER) modeling.

A database management system is a set of programs that provide users with tools to add, delete, access, and analyze data stored in one location.

Normalization is a method for analyzing and reducing a relational database to its most streamlined form for:Minimum redundancy, Maximum data integrity and Best processing performance.

A data warehouse is a repository of historical data organized by subject to supportdecision makers in the organization.

The data cube has three dimensions: customer, product, and time.

Online analytical processing (OLAP) involves the analysis of accumulated data by end users
(usually in a data warehouse).

Benefits of Data Warehousing are:
  1. End users can access data quickly and easily via Web browsers because they are located in one place.
  2. End users can conduct extensive analysis with data in ways that may not have been possible before.
  3. End users have a united view of organizational data.

A data mart is a small data warehouse, designed for the end-user needs in a strategic business unit (SBU) or a department.

Master data management is a method that organizations use in data governance.

Knowledge management is a process that helps organizations manipulates important knowledge that is part of the organization’s memory, usually in an unstructured format.

Knowledge that is contextual, relevant, and actionable.

Intellectual capital is another term often used for knowledge.

Knowledge management systems refer to the use of information technologies to systematize,enhance, and expedite intra-firm and inter-firm knowledge management.

CHAPTER 3: Information Systems: Ethics, Privacy and Information Security






Ethics is A branch of philosophy that deals with what is considered to be rightand wrong. ThreeFundamental Tenets of Ethics are, Responsibility which means that you accept the consequences of your decisions and actions, Accountability which means a determination of who is responsible for actions that were taken, and Liability which are a legal concept meaning that individuals have the right to recover the damages done to them by other individuals, organizations, or systems. The Four Categories of Ethical Issues are , Privacy Issues involve collecting, storing and disseminating information about individuals, Accuracy Issues involve the authenticity, fidelity and accuracy of information that is collected and processed, Property Issues involve the ownership and value of information, and Accessibility Issues revolve around who should have access to information and whether they should have to pay for this access.





Privacy is the right to be left alone and to be free of unreasonable personal intrusions. Court decisions have followed two rules, First, The right of privacy is not absolute.Your privacy must be balanced against the needs of society. Second, The public’s right to know is superior to the individual’s right of privacy. Personal Information in Databases. Information about individuals is being kept in many databases: banks, utilities co., govt. agencies, …etc.; the most visible locations are credit-reporting agencies. Equifax, TransUnion, and Experian are the three best known credit reporting agencies. Social Networking Sites often include electronic discussions such as chat rooms. These sites appear on the Internet, within corporate intranets, and on blogs.A blog(Weblog) is an informal, personal journal that is frequently updated and intended for general public reading. Social Networking Sites Can Cause You Problems.Anyone can post derogatory information about you anonymously. The second article shows students how information they (or others) post to social networking sites can impact their lives, in particular, their job search.This information may take the form of text, images, etc.


Many Factors Increasing the Threats to Information Security, International organized crime turning to cybercrime, Downstream liability, Increased employee use of unmanaged devices, and Lack of management support. Downstream liability occurs when Company A’s systems are attacked and taken over by the perpetrator.Company A’s systems are then used to attack Company B.Company A could be sued successfully by Company B, if Company A cannot prove that it exercised due diligence in securing its systems.Due diligence means that a company takes all necessary security precautions, as judged by commonly accepted best practices.Unmanaged devices are those outside the control of the IT department.Examples include devices in hotel business centers, customer computers, computers in restaurants such as McDonalds, Paneras, Starbucks, etc. Lack of management support takes many forms: insufficient funding, technological obsolescence, and lack of attention.

CHAPTER 2: Information Systems and the Modern Organization

Computer-based information systems (CBIS) use computer technology to perform some or all of their tasks and are composed of Hardware which is a device such as a processor, monitor, keyboard or printer, Software which is a program or collection of programs that enable hardware to process data, Database which is a collection of related files or tables containing data, Network which is a connecting system (wireline or wireless) that permits different computers to share resources, Procedures which are the set of instructions about how to combine the above components in order to process information and generate the desired output, and People which are those individuals who use the hardware and software, interface with it, or uses its output. There are two types of Information Systems, Information Systems Inside Your Organization and Information Technology Outside Your Organization. An application program is a computer program designed to support a specific task, a business process or another application program. Breadth of Support of Information Systems is Functional area information systems support particular functional areas in an organization, Enterprise resource planning systems tightly integrate the functional area information systems via a common database, Transaction processing systems support the monitoring, collection, storage, and processing of data from the organization’s basic business transactions, and Interorganizational information systems connect two or more organizations, Examples are supply chain management systems and electronic commerce systems.
Competitive Advantage: An advantage over competitors in some measure such as cost, quality, or speed, leads to control of a market and to larger-than average profits.Strategic Information Systems (SIS) provide a competitive advantage by helping an organization to implement its strategic goals and to increase its performance and productivity. Porter’s Competitive Forces Model, The best-known framework for analyzing competitiveness is Michael Porter’s competitive forces model (Porter, 1985). It is model is used to develop strategies to increase their competitive edge. Threat of entry of new competitors is high when it is easy to enter a market and low when significant barriers to entry exist. A barrier to entry is a product or service feature that customers expect from organizations in a certain industry. For most organizations, the Internet increases the threat that new competitors will enter a market.

CHAPTER 1:The Modern Organization Functioning in a Global Environment



A business process is a collection of related activities that produce a product or a service of value to the organization, its business partners, and/or its customers. A process has inputs and outputs and its activities can be measured. A management technique that includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes called Business process management.
Information Systems, Concepts and Definitions: one of the primary goals of information system is to economically process data into information and knowledge. Data Item is elementary description of things, events, activities and transactions that are recorded, classified and stored but are not organized to convey any specific meaning. Information is data organized so that they have meaning and value to the recipient. Knowledge is data and/or information organized and processed to convey understanding, experience, accumulated learning and expertise as they apply to a current problem or activity. Business Pressure is the business environment is the combination of social, legal, economic, physical, and political factors that affect business activities. Significant changes in any of this factor are likely to create business pressure on the organization. The three types of business pressures faced are, market, technology, and societal pressures.
Why Are Information Systems Important to us? Information systems and Information technologies are integral to our lives. Information systems offer career opportunities. Information systems are used by all functional areas in an organization.

Monday, 6 January 2014

THIS IS BAISCALLY INFORMATION ABOUT INFORMATION SYSTEM