Bahan-Insisiasi-1minggu-ke2-2-Mod2-IRIS

(1)

Chapter 18

Information Resources

Information Resources

Information Systems

Information Systems

MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell


(2)

Information Resources

Information Resources

Include:

Include:

 Specialists Specialists

Systems analysts, programmers, database Systems analysts, programmers, database

administrators, network specialists, operations administrators, network specialists, operations

personnel, and others personnel, and others

 Hardware Hardware  SoftwareSoftware  UsersUsers

 DataData

 InformationInformation

Represents a large organizational


(3)

Information Specialists

Information Specialists

Most located in the information services

Most located in the information services

unit

unit

There is a trend to locate specialists

There is a trend to locate specialists

throughout the firm

throughout the firm

Actual organization chart depends on the

Actual organization chart depends on the

needs of the firm


(4)

A Functional Organization Structure

A Functional Organization Structure

for Information Services

for Information Services

Network manager Manager of computer operations Manager of systems maintenance Manager of systems administration CIO Manager of systems development Systems analyst Systems analyst Operations personnel Database administrators Network specialists Programmers Programmers


(5)

Information Resources

Information Resources

Most are located in information services

Most are located in information services

Most that are centrally located are CIO’s

Most that are centrally located are CIO’s

responsibility

responsibility

Those located in functional areas are the

Those located in functional areas are the

responsibility of the area manager


(6)

Model of an IRIS

Model of an IRIS

 Input subsystemsInput subsystems

– AISAIS

– Information resources researchInformation resources research – Information resources intelligenceInformation resources intelligence

 Output subsystemsOutput subsystems

– HardwareHardware – SoftwareSoftware

– Human resourcesHuman resources

– Data and InformationData and Information – Integrated resourceIntegrated resource


(7)

A Model of an Information Resources

A Model of an Information Resources

Information System

Information System

D at ab as e Accounting information system Information resources research subsystem Information resources intelligence subsystem Hardware subsystem Software subsystem Human resources subsystem Data and information subsystem Integrated resource subsystem In te rn al so ur ce s E nv iro nm en ta l s ou rc es Users


(8)

Information Resources

Information Resources

Research Subsystem

Research Subsystem

Describes functions involved in special

Describes functions involved in special

research projects within the firm

research projects within the firm

Performed by systems analysts interacting

Performed by systems analysts interacting

with users


(9)

Information Resources

Information Resources

Intelligence Subsystem

Intelligence Subsystem

 Describes functions involved in gathering Describes functions involved in gathering

information from elements in the firm’s information from elements in the firm’s

environment environment

– GovernmentGovernment

– SuppliersSuppliers

Labor unionsLabor unions

– Global communityGlobal community

– CustomersCustomers


(10)

CIO Responsibilities

CIO Responsibilities

 Can be top-level executive who participates on Can be top-level executive who participates on

executive and MIS steering committee

executive and MIS steering committee

 Contributes to strategic planning for firm and IS Contributes to strategic planning for firm and IS

functions

functions

 Primary source of leadership for:Primary source of leadership for:

– Achieving and maintaining information qualityAchieving and maintaining information quality – Keeping information resources secureKeeping information resources secure

Planning for contingenciesPlanning for contingencies


(11)

Achieving Quality Products

Achieving Quality Products

and Services

and Services

1) Identify IS customers

1) Identify IS customers

– MIS steering committeeMIS steering committee

– Use of a formal system works bestUse of a formal system works best

2) Define customer quality needs

2) Define customer quality needs

Product quality needsProduct quality needsService quality needsService quality needs


(12)

IS Takes Six Basic Steps in

IS Takes Six Basic Steps in

Achieving Quality Management

Achieving Quality Management

1 1 2 2 3 3 4 4 5 5 6 6

Identify IS customers

Define customer quality needs

Establish quality metrics

Define quality strategy

Implement IS quality programs

Monitor IS quality performance


(13)

Comparison of How IS and Middle-Level

Comparison of How IS and Middle-Level

Manager-Users Perceive Product Quality

Manager-Users Perceive Product Quality

Accurate 4.91 4.88 4.89

Trusts output 4.90 4.86 4.87

Works as specified 4.75 4.73 4.73

User friendly 4.50 4.75 4.68

Relevant 4.59 4.53 4.53

Fast response time 4.12 4.55 4.42 Meets all user needs 4.22 4.48 4.41

No downtime 3.96 4.25 4.16

Delivered on time 3.80 4.16 4.05

Has user documentation 4.21 3.93 4.01 Can be changed quickly 3.84 4.04 3.98 Delivered on budget 3.45 3.67 3.61 Low cost of operation 3.19 3.49 3.40 Has programmer documentation 3.74 3.23 3.39 Uses new technology 3.04 3.28 3.21

Dimension IS User Aggregate Perceived Value


(14)

Achieving Quality Products

Achieving Quality Products

and Services [cont.]

and Services [cont.]

3) Establish quality metrics

3) Establish quality metrics – Information Information productproduct quality quality

– Information Information serviceservice quality quality

4) Define the IS quality strategy

4) Define the IS quality strategy – Recruiting and trainingRecruiting and training

– User-oriented systems development User-oriented systems development

» Market analysisMarket analysis

» Product acceptance analysisProduct acceptance analysis » Task analysisTask analysis

» Prototype testsPrototype tests


(15)

Basic Competencies Expected

Basic Competencies Expected

of IS Job Applicants

of IS Job Applicants

1. Concern for effectiveness 2. Initiative

3. Enthusiasm for work 4. Self-confidence

5. Concern with impact

6. Interpersonal astuteness 7. Conceptual thinking

8. Analytical thinking

9. Effective communication 10. Flexibility


(16)

Special Attention to Human Factors

Special Attention to Human Factors

Ensures That Users’ Needs are

Ensures That Users’ Needs are

Incorporated

Incorporated

into Systems Designs

into Systems Designs

1.

Planning phase 2. Analysis phase 3. Design phase 4. Implementation phase 5. Use phase Conduct a market analysis

Conduct a product acceptance analysis Conduct a task analysis Conduct Conduct operational system tests


(17)

Achieving Quality Products

Achieving Quality Products

and Services [cont.]

and Services [cont.]

5) Implement IS quality programs 5) Implement IS quality programs

– Implementation varies with firmImplementation varies with firm

6) Monitor IS quality 6) Monitor IS quality


(18)

Security Objectives

Security Objectives

Confidentiality

Confidentiality

Availability

Availability

Integrity

Integrity

Current attention is focused on malicious software such as


(19)

Integrity Integrity Availability Availability Information Information Unauthorized Unauthorized useuse Unauthorized Unauthorized disclosure disclosure and theft and theft Unauthorized Unauthorized destruction and destruction and Unauthorized Unauthorized modification modification Security Security ConfidentialityConfidentiality

Unauthorized Acts Threaten System Security Unauthorized Acts Threaten System Security

Objectives Objectives


(20)

Identification Authentication

Authorization User

Profiles

Access control

files

Database Software library

Audit log Report

writer Security

reports

Users


(21)

Access Control

Access Control

Identification

Identification

– What you know (password) or What you know (password) or – Where you are (terminal location)Where you are (terminal location)

Authentication

Authentication

– What you have (badge)What you have (badge)

Authorization

Authorization

Level of useLevel of use

High-grade threats are from sophisticated


(22)

Contingency Planning

Contingency Planning

 Emergency planEmergency plan

 Backup planBackup plan

– RedundancyRedundancyDiversityDiversity – MobilityMobility

» Reciprocal agreementReciprocal agreement » Hot siteHot site

» Cold siteCold site » Empty shellEmpty shell


(23)

Vital Records Plan

Vital Records Plan

 Electronic vaultingElectronic vaulting

Day end backup of files electronicallyDay end backup of files electronically

 Remote journalingRemote journaling

Transmission of transaction data as the transactions Transmission of transaction data as the transactions

occur

occur

Used to update remote database in batch form laterUsed to update remote database in batch form later

 Database shadowingDatabase shadowing

Involves updating of duplicate database at remote site Involves updating of duplicate database at remote site

as transaction occur


(24)

Cost-Reduction Strategies

Cost-Reduction Strategies

Consolidation

Consolidation

– Reduces number of separate locations for Reduces number of separate locations for information resources

information resources

Easiest to achieve in terms of information Easiest to achieve in terms of information resources

resources


(25)

Cost-Reduction Strategies

Cost-Reduction Strategies

[cont.]

[cont.]

Downsizing

Downsizing

– Migrating to smaller platformsMigrating to smaller platforms – Advantage of cost reductionAdvantage of cost reduction

Advantage of increased productivity with PCs Advantage of increased productivity with PCs located in user areas

located in user areas – Risk of lost securityRisk of lost security


(26)

Cost-Reduction Strategies

Cost-Reduction Strategies

[cont.]

[cont.]

Outsourcing

Outsourcing

– Data entry and simple processing (editing, Data entry and simple processing (editing, formatting)

formatting)

Contract programmingContract programming

Facilities management (FM)Facilities management (FM)Systems integration (SI)Systems integration (SI)

Support for maintenance, service, or disaster Support for maintenance, service, or disaster recovery


(27)

Objectives of Outsourcing

Objectives of Outsourcing

Manage costs better

Manage costs better

Reduce

Reduce

Contain

Contain

Predict

Predict

Obtain relief from systems maintenance so as

Obtain relief from systems maintenance so as

to concentrate on new system development

to concentrate on new system development

Acquire needed expertise

Acquire needed expertise


(28)

Information Management

Information Management

in Three Pacific Rim

in Three Pacific Rim

Countries

Countries

Countries were U.S., Korea, and Mexico

Countries were U.S., Korea, and Mexico

Centralization versus decentralization

Centralization versus decentralization

Most firms were centralizedMost firms were centralized

CIO participation in strategic business

CIO participation in strategic business

planning

planning

CIO has a long way to go before achieving CIO has a long way to go before achieving status as a top-level executive


(29)

Information Management

Information Management

in Three Pacific

in Three Pacific

Rim Countries [cont.]

Rim Countries [cont.]

Information systems planning

Information systems planning

– Most firms have IS planMost firms have IS plan

– CIO is primarily responsibleCIO is primarily responsible

Sharing information resources with users

Sharing information resources with users

In general, CIOs support end-user computing In general, CIOs support end-user computing trends


(30)

Proactive CIO Strategy

Proactive CIO Strategy

1) CIO must emphasize quality management of the 1) CIO must emphasize quality management of the

IS resource IS resource

2) Achieve strong user ties 2) Achieve strong user ties

3) Strengthen executive ties 3) Strengthen executive ties

4) Assemble an IS management team 4) Assemble an IS management team

5) Assemble staff competent in leading-edge 5) Assemble staff competent in leading-edge

technologies

technologies andand methodologies methodologies 6) Build an IRIS


(31)

The Future of the CIO

The Future of the CIO

 Business computing is moving from centralized to Business computing is moving from centralized to

decentralized computing in terms of:

decentralized computing in terms of: – EquipmentEquipment

– DevelopmentDevelopment – Decision makingDecision making

 CIO RolesCIO Roles

– Big brotherBig brother – Helping handHelping hand – WatchdogWatchdog – NetworkerNetworker


(32)

Equipment

Big brother

A

B Helping hand

D Network Watchdog C Decentralized Centralized Decentralized D ev el op m en t Decentralized Decis

ion m

aking

Centralized

Donovan’s Four Stages of Decentralized

Donovan’s Four Stages of Decentralized

Computing


(33)

Summary

Summary

Information resources located in IS are the

Information resources located in IS are the

responsibility of the CIO

responsibility of the CIO

IRIS is used to manage information resources

IRIS is used to manage information resources

within an organization

within an organization

CIO must:

CIO must:

Promote quality information products and servicesPromote quality information products and services – Ensure security of ISEnsure security of IS


(34)

Summary [cont.]

Summary [cont.]

IS cost cutting considerations

IS cost cutting considerations

– ConsolidationConsolidation – DownsizingDownsizing – OutsourcingOutsourcing


(1)

Information Management

Information Management

in Three Pacific

in Three Pacific

Rim Countries [cont.]

Rim Countries [cont.]

Information systems planning

Information systems planning

– Most firms have IS planMost firms have IS plan

– CIO is primarily responsibleCIO is primarily responsible

Sharing information resources with users

Sharing information resources with users

In general, CIOs support end-user computing In general, CIOs support end-user computing

trends


(2)

Proactive CIO Strategy

Proactive CIO Strategy

1) CIO must emphasize quality management of the 1) CIO must emphasize quality management of the

IS resource IS resource

2) Achieve strong user ties 2) Achieve strong user ties

3) Strengthen executive ties 3) Strengthen executive ties

4) Assemble an IS management team 4) Assemble an IS management team

5) Assemble staff competent in leading-edge 5) Assemble staff competent in leading-edge

technologies

technologies andand methodologies methodologies 6) Build an IRIS


(3)

The Future of the CIO

The Future of the CIO

 Business computing is moving from centralized to Business computing is moving from centralized to decentralized computing in terms of:

decentralized computing in terms of: – EquipmentEquipment

– DevelopmentDevelopment – Decision makingDecision making

 CIO RolesCIO Roles

– Big brotherBig brother – Helping handHelping hand – WatchdogWatchdog – NetworkerNetworker


(4)

Equipment Big brother

A

B Helping hand

D Network Watchdog C Decentralized Centralized Decentralized D ev el op m en t Decentralized Decis

ion m aking

Centralized

Donovan’s Four Stages of Decentralized

Donovan’s Four Stages of Decentralized

Computing


(5)

Summary

Summary

Information resources located in IS are the

Information resources located in IS are the

responsibility of the CIO

responsibility of the CIO

IRIS is used to manage information resources

IRIS is used to manage information resources

within an organization

within an organization

CIO must:

CIO must:

Promote quality information products and servicesPromote quality information products and services – Ensure security of ISEnsure security of IS


(6)

Summary [cont.]

Summary [cont.]

IS cost cutting considerations

IS cost cutting considerations

– ConsolidationConsolidation – DownsizingDownsizing – OutsourcingOutsourcing