Bahan-Insisiasi-1minggu-ke2-2-Mod2-IRIS
Chapter 18
Information Resources
Information Resources
Information Systems
Information Systems
MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell
(2)
Information Resources
Information Resources
Include:
Include:
Specialists Specialists– Systems analysts, programmers, database Systems analysts, programmers, database
administrators, network specialists, operations administrators, network specialists, operations
personnel, and others personnel, and others
Hardware Hardware SoftwareSoftware UsersUsers
DataData
InformationInformation
Represents a large organizational
(3)
Information Specialists
Information Specialists
Most located in the information services
Most located in the information services
unit
unit
There is a trend to locate specialists
There is a trend to locate specialists
throughout the firm
throughout the firm
Actual organization chart depends on the
Actual organization chart depends on the
needs of the firm
(4)
A Functional Organization Structure
A Functional Organization Structure
for Information Services
for Information Services
Network manager Manager of computer operations Manager of systems maintenance Manager of systems administration CIO Manager of systems development Systems analyst Systems analyst Operations personnel Database administrators Network specialists Programmers Programmers
(5)
Information Resources
Information Resources
Most are located in information services
Most are located in information services
Most that are centrally located are CIO’s
Most that are centrally located are CIO’s
responsibility
responsibility
Those located in functional areas are the
Those located in functional areas are the
responsibility of the area manager
(6)
Model of an IRIS
Model of an IRIS
Input subsystemsInput subsystems– AISAIS
– Information resources researchInformation resources research – Information resources intelligenceInformation resources intelligence
Output subsystemsOutput subsystems
– HardwareHardware – SoftwareSoftware
– Human resourcesHuman resources
– Data and InformationData and Information – Integrated resourceIntegrated resource
(7)
A Model of an Information Resources
A Model of an Information Resources
Information System
Information System
D at ab as e Accounting information system Information resources research subsystem Information resources intelligence subsystem Hardware subsystem Software subsystem Human resources subsystem Data and information subsystem Integrated resource subsystem In te rn al so ur ce s E nv iro nm en ta l s ou rc es Users(8)
Information Resources
Information Resources
Research Subsystem
Research Subsystem
Describes functions involved in special
Describes functions involved in special
research projects within the firm
research projects within the firm
Performed by systems analysts interacting
Performed by systems analysts interacting
with users
(9)
Information Resources
Information Resources
Intelligence Subsystem
Intelligence Subsystem
Describes functions involved in gathering Describes functions involved in gathering
information from elements in the firm’s information from elements in the firm’s
environment environment
– GovernmentGovernment
– SuppliersSuppliers
– Labor unionsLabor unions
– Global communityGlobal community
– CustomersCustomers
(10)
CIO Responsibilities
CIO Responsibilities
Can be top-level executive who participates on Can be top-level executive who participates on
executive and MIS steering committee
executive and MIS steering committee
Contributes to strategic planning for firm and IS Contributes to strategic planning for firm and IS
functions
functions
Primary source of leadership for:Primary source of leadership for:
– Achieving and maintaining information qualityAchieving and maintaining information quality – Keeping information resources secureKeeping information resources secure
– Planning for contingenciesPlanning for contingencies
(11)
Achieving Quality Products
Achieving Quality Products
and Services
and Services
1) Identify IS customers
1) Identify IS customers
– MIS steering committeeMIS steering committee
– Use of a formal system works bestUse of a formal system works best
2) Define customer quality needs
2) Define customer quality needs
– Product quality needsProduct quality needs – Service quality needsService quality needs
(12)
IS Takes Six Basic Steps in
IS Takes Six Basic Steps in
Achieving Quality Management
Achieving Quality Management
1 1 2 2 3 3 4 4 5 5 6 6
Identify IS customers
Define customer quality needs
Establish quality metrics
Define quality strategy
Implement IS quality programs
Monitor IS quality performance
(13)
Comparison of How IS and Middle-Level
Comparison of How IS and Middle-Level
Manager-Users Perceive Product Quality
Manager-Users Perceive Product Quality
Accurate 4.91 4.88 4.89
Trusts output 4.90 4.86 4.87
Works as specified 4.75 4.73 4.73
User friendly 4.50 4.75 4.68
Relevant 4.59 4.53 4.53
Fast response time 4.12 4.55 4.42 Meets all user needs 4.22 4.48 4.41
No downtime 3.96 4.25 4.16
Delivered on time 3.80 4.16 4.05
Has user documentation 4.21 3.93 4.01 Can be changed quickly 3.84 4.04 3.98 Delivered on budget 3.45 3.67 3.61 Low cost of operation 3.19 3.49 3.40 Has programmer documentation 3.74 3.23 3.39 Uses new technology 3.04 3.28 3.21
Dimension IS User Aggregate Perceived Value
(14)
Achieving Quality Products
Achieving Quality Products
and Services [cont.]
and Services [cont.]
3) Establish quality metrics
3) Establish quality metrics – Information Information productproduct quality quality
– Information Information serviceservice quality quality
4) Define the IS quality strategy
4) Define the IS quality strategy – Recruiting and trainingRecruiting and training
– User-oriented systems development User-oriented systems development
» Market analysisMarket analysis
» Product acceptance analysisProduct acceptance analysis » Task analysisTask analysis
» Prototype testsPrototype tests
(15)
Basic Competencies Expected
Basic Competencies Expected
of IS Job Applicants
of IS Job Applicants
1. Concern for effectiveness 2. Initiative
3. Enthusiasm for work 4. Self-confidence
5. Concern with impact
6. Interpersonal astuteness 7. Conceptual thinking
8. Analytical thinking
9. Effective communication 10. Flexibility
(16)
Special Attention to Human Factors
Special Attention to Human Factors
Ensures That Users’ Needs are
Ensures That Users’ Needs are
Incorporated
Incorporated
into Systems Designs
into Systems Designs
1.Planning phase 2. Analysis phase 3. Design phase 4. Implementation phase 5. Use phase Conduct a market analysis
Conduct a product acceptance analysis Conduct a task analysis Conduct Conduct operational system tests
(17)
Achieving Quality Products
Achieving Quality Products
and Services [cont.]
and Services [cont.]
5) Implement IS quality programs 5) Implement IS quality programs
– Implementation varies with firmImplementation varies with firm
6) Monitor IS quality 6) Monitor IS quality
(18)
Security Objectives
Security Objectives
Confidentiality
Confidentiality
Availability
Availability
Integrity
Integrity
Current attention is focused on malicious software such as
(19)
Integrity Integrity Availability Availability Information Information Unauthorized Unauthorized useuse Unauthorized Unauthorized disclosure disclosure and theft and theft Unauthorized Unauthorized destruction and destruction and Unauthorized Unauthorized modification modification Security Security ConfidentialityConfidentiality
Unauthorized Acts Threaten System Security Unauthorized Acts Threaten System Security
Objectives Objectives
(20)
Identification Authentication
Authorization User
Profiles
Access control
files
Database Software library
Audit log Report
writer Security
reports
Users
(21)
Access Control
Access Control
Identification
Identification
– What you know (password) or What you know (password) or – Where you are (terminal location)Where you are (terminal location)
Authentication
Authentication
– What you have (badge)What you have (badge)
Authorization
Authorization
– Level of useLevel of use
High-grade threats are from sophisticated
(22)
Contingency Planning
Contingency Planning
Emergency planEmergency plan Backup planBackup plan
– RedundancyRedundancy – DiversityDiversity – MobilityMobility
» Reciprocal agreementReciprocal agreement » Hot siteHot site
» Cold siteCold site » Empty shellEmpty shell
(23)
Vital Records Plan
Vital Records Plan
Electronic vaultingElectronic vaulting
– Day end backup of files electronicallyDay end backup of files electronically
Remote journalingRemote journaling
– Transmission of transaction data as the transactions Transmission of transaction data as the transactions
occur
occur
– Used to update remote database in batch form laterUsed to update remote database in batch form later
Database shadowingDatabase shadowing
– Involves updating of duplicate database at remote site Involves updating of duplicate database at remote site
as transaction occur
(24)
Cost-Reduction Strategies
Cost-Reduction Strategies
Consolidation
Consolidation
– Reduces number of separate locations for Reduces number of separate locations for information resources
information resources
– Easiest to achieve in terms of information Easiest to achieve in terms of information resources
resources
(25)
Cost-Reduction Strategies
Cost-Reduction Strategies
[cont.]
[cont.]
Downsizing
Downsizing
– Migrating to smaller platformsMigrating to smaller platforms – Advantage of cost reductionAdvantage of cost reduction
– Advantage of increased productivity with PCs Advantage of increased productivity with PCs located in user areas
located in user areas – Risk of lost securityRisk of lost security
(26)
Cost-Reduction Strategies
Cost-Reduction Strategies
[cont.]
[cont.]
Outsourcing
Outsourcing
– Data entry and simple processing (editing, Data entry and simple processing (editing, formatting)
formatting)
– Contract programmingContract programming
– Facilities management (FM)Facilities management (FM) – Systems integration (SI)Systems integration (SI)
– Support for maintenance, service, or disaster Support for maintenance, service, or disaster recovery
(27)
Objectives of Outsourcing
Objectives of Outsourcing
Manage costs better
Manage costs better
Reduce
Reduce
Contain
Contain
Predict
Predict
Obtain relief from systems maintenance so as
Obtain relief from systems maintenance so as
to concentrate on new system development
to concentrate on new system development
Acquire needed expertise
Acquire needed expertise
(28)
Information Management
Information Management
in Three Pacific Rim
in Three Pacific Rim
Countries
Countries
Countries were U.S., Korea, and Mexico
Countries were U.S., Korea, and Mexico
Centralization versus decentralization
Centralization versus decentralization
– Most firms were centralizedMost firms were centralized
CIO participation in strategic business
CIO participation in strategic business
planning
planning
– CIO has a long way to go before achieving CIO has a long way to go before achieving status as a top-level executive
(29)
Information Management
Information Management
in Three Pacific
in Three Pacific
Rim Countries [cont.]
Rim Countries [cont.]
Information systems planning
Information systems planning
– Most firms have IS planMost firms have IS plan
– CIO is primarily responsibleCIO is primarily responsible
Sharing information resources with users
Sharing information resources with users
– In general, CIOs support end-user computing In general, CIOs support end-user computing trends
(30)
Proactive CIO Strategy
Proactive CIO Strategy
1) CIO must emphasize quality management of the 1) CIO must emphasize quality management of the
IS resource IS resource
2) Achieve strong user ties 2) Achieve strong user ties
3) Strengthen executive ties 3) Strengthen executive ties
4) Assemble an IS management team 4) Assemble an IS management team
5) Assemble staff competent in leading-edge 5) Assemble staff competent in leading-edge
technologies
technologies andand methodologies methodologies 6) Build an IRIS
(31)
The Future of the CIO
The Future of the CIO
Business computing is moving from centralized to Business computing is moving from centralized to
decentralized computing in terms of:
decentralized computing in terms of: – EquipmentEquipment
– DevelopmentDevelopment – Decision makingDecision making
CIO RolesCIO Roles
– Big brotherBig brother – Helping handHelping hand – WatchdogWatchdog – NetworkerNetworker
(32)
Equipment
Big brother
A
B Helping hand
D Network Watchdog C Decentralized Centralized Decentralized D ev el op m en t Decentralized Decis
ion m
aking
Centralized
Donovan’s Four Stages of Decentralized
Donovan’s Four Stages of Decentralized
Computing
(33)
Summary
Summary
Information resources located in IS are the
Information resources located in IS are the
responsibility of the CIO
responsibility of the CIO
IRIS is used to manage information resources
IRIS is used to manage information resources
within an organization
within an organization
CIO must:
CIO must:
– Promote quality information products and servicesPromote quality information products and services – Ensure security of ISEnsure security of IS
(34)
Summary [cont.]
Summary [cont.]
IS cost cutting considerations
IS cost cutting considerations
– ConsolidationConsolidation – DownsizingDownsizing – OutsourcingOutsourcing
(1)
Information Management
Information Management
in Three Pacific
in Three Pacific
Rim Countries [cont.]
Rim Countries [cont.]
Information systems planning
Information systems planning
– Most firms have IS planMost firms have IS plan
– CIO is primarily responsibleCIO is primarily responsible
Sharing information resources with users
Sharing information resources with users
– In general, CIOs support end-user computing In general, CIOs support end-user computing
trends
(2)
Proactive CIO Strategy
Proactive CIO Strategy
1) CIO must emphasize quality management of the 1) CIO must emphasize quality management of the
IS resource IS resource
2) Achieve strong user ties 2) Achieve strong user ties
3) Strengthen executive ties 3) Strengthen executive ties
4) Assemble an IS management team 4) Assemble an IS management team
5) Assemble staff competent in leading-edge 5) Assemble staff competent in leading-edge
technologies
technologies andand methodologies methodologies 6) Build an IRIS
(3)
The Future of the CIO
The Future of the CIO
Business computing is moving from centralized to Business computing is moving from centralized to decentralized computing in terms of:
decentralized computing in terms of: – EquipmentEquipment
– DevelopmentDevelopment – Decision makingDecision making
CIO RolesCIO Roles
– Big brotherBig brother – Helping handHelping hand – WatchdogWatchdog – NetworkerNetworker
(4)
Equipment Big brother
A
B Helping hand
D Network Watchdog C Decentralized Centralized Decentralized D ev el op m en t Decentralized Decis
ion m aking
Centralized
Donovan’s Four Stages of Decentralized
Donovan’s Four Stages of Decentralized
Computing
(5)
Summary
Summary
Information resources located in IS are the
Information resources located in IS are the
responsibility of the CIO
responsibility of the CIO
IRIS is used to manage information resources
IRIS is used to manage information resources
within an organization
within an organization
CIO must:
CIO must:
– Promote quality information products and servicesPromote quality information products and services – Ensure security of ISEnsure security of IS
(6)
Summary [cont.]
Summary [cont.]
IS cost cutting considerations
IS cost cutting considerations
– ConsolidationConsolidation – DownsizingDownsizing – OutsourcingOutsourcing