Thursday, October 29, 2009

Chapter 9: Managerial Support Systems

Section 9.1

1. Describe the decision-making process proposed by Simon.























Simon (1997) described the process as composed of three major phrases: intelligence, design, and choice. A fourth phrase, implementation, was added later.

2. Why do managers need IT support?

It is difficult to make good decisions without valid and relevant information. Information is vital for each phase and activity in the decision-making process.

3. Describe the decision matrix.


The three primary classes of problem structure and the three broad categories of the nature of decisions can be combined in a decision support matrix that consists of nine cells. Lower-level managers usually perform the structured and operational control-oriented tasks (cells 1, 2 and 4). The tasks in cells 3, 5, and 7 are usually the responsibility of middle managers and professional staff. Finally, tasks in cells 6, 8 and 9 are generally the responsibility of senior executives.

Section 9.2 -

1. Describe the capabilities of data mining.



Data mining derives its name from searching for valuable business information in a large database, data warehouse, or data mart. Data mining can perform two basic operations: predicting trends and behaviors and identifying previously unknown patterns. Regarding the first operation, data mining automates the process of finding predictive information in large databases. Data mining can also identify previously hidden patterns in a single step.

Section 9.3 -

1. What are some of the capabilities of digital dashboards?



- Drill-down: ability to go to details, at several levels; can be done by a series of menus or by direct queries.
- Critical success factors (CFSs): the factors most critical for the success of business. These can be organizational, industry, departmental, etc.
- Key performance indicators (KPIs): The specific measures of CSFs.
- Status access: the latest data available on KPI or some other metric, ideally in real time.
- Trend analysis: short, medium, and long-term trend of KPIs or metrics, which are projected using forecasting methods.
- Ad-hoc analysis: analyses made any time, upon demands and with any desired factors and relationships.
- Exception reporting: reports that highlight deviations larger than certain thresholds. Reports may include only deviations.

Chapter 8: Transaction Processing Systems


1. What is a Transactional Processing and the role of TP systems. State the key objective of TP/TPSs.

Transaction processing (TPSs) monitor, collect, store, and process data generated from all business transactions. These data are inputs to the organization’s database. TPSs have to handle high volume and large variations in volume efficiently, avoid errors and downtime, record results accurately and securely, and maintain privacy and security. The backbone of most information systems applications is the transaction processing system.

Section 8.2 -

1. What is a functional area information system? List its major characteristics.

Functional area information systems (FAISs) provide information mainly to lower and middle-level managers in the functional areas. They use this information to help them plan, organize, and control operations. The information is provided in a variety of reports (routine, ad hoc and exception) and provide information to managers regardless of their functional areas. Routine reports are produced at scheduled intervals. Ad-hoc reports also can include requests for drill-down reports, key-indicator reports and comparative reports. And exception reports include information that falls outside certain threshold standards.

2. How does an FAIS support management by exception? How does it support on-demand reports?

Exception reports include information that falls outside certain threshold standards. Ti implement management by exception, management first creates performance standards. The company then sets up systems to monitor performance, compare actual performance to the standards, and identify predefined exceptions. Managers are alerted to the exceptions via exception reports.
On-demand reports, which are non-routine reports are supported in these ways and through these types:
- Drill-down reports show a greater level of detail. For example, a manager might examine sales by region and decide to “drill down to more detail” to look at sales by store and then by salesperson.



- Key-indicator reports summarize the performance of critical activities. For example, a chief financial officer might want to monitor cash flow and cash on hand.

- Comparative reports compare. For example, the performances of different business units or time periods.



Section 8.3

1. Define ERP and describe its functionalities.

Enterprise resource planning (ERP) systems integrate the planning, management, and use of all of an organization’s resources. The major objectives of ERP systems are to tightly integrate the functional areas of the organization and to enable information to flow seamlessly across the functional areas. ERP systems provide the information necessary to control the business processes of the organization. ERP software includes a set of interdependent software modules, linked to a common database, that provide support for the internal business processes in the following functional areas: finance and accounting, sales and marketing, manufacturing and production, and human resources.

2. List some drawbacks of ERP software.

ERP systems can be extremely complex, expensive, and time consuming to implement. Companies may also need to change existing business processes to fit the predefined business processes of the software. Finally, companies must purchase the entire software package even if they require only a few of the modules.

Section 8.5

1. Define a supply chain and supply chain management (SCM).

A supply chain refers to the flow of materials, information, money and services from raw material suppliers, through factories and warehouses to the end customers. A supply chain also includes the organizations and processes that create and deliver products, information, and services to end customers.

Supply chain management’s (SCM) function is to plan, organize, and optimize the supply chain’s activities. The goal of SCM systems is to reduce friction along the supply chain. Friction can involve increased time, costs, and inventories as well as decreased satisfaction.



2. List the major components of supply chains.

The supply chain involves three segments or components:
1. Upstream: where sourcing or procurement from external suppliers occurs (orders, information, payments, returns)
2. Internal, where packaging, assembly, or manufacturing takes place.
3. Downstream, where distribution takes place, frequently by external distributors (products, services, information)


3. What is the bullwhip effect?

The bullwhip effect refers to erratic shifts in orders up and down the supply chain. Basically, customer demand variables can become magnified when they are viewed through the eyes of managers at each link in the supply chain.

Section 8.6

1. Define EDI and list its major benefits and limitations

Electronic Data Interchange (EDI) is a communication standard that enables business partners to exchange routine documents, such as purchasing orders, electronically. EDI formats these documents according to agreed-upon standards and then transmits messages using a converter, called a translator.

Benefits
- Minimizes data entry errors because each entry is checked by the computer.
- The length of the message can be shorter, and the messages are secured.
- Reduces cycle time.
- Increases productivity.
- Enhances customer service.
- Minimizes paper usage and storage.

Limitations
- Implementing an EDI system involves a significant initial investment.
- The ongoing operating costs also are high, due to the use of expensive, private VANs.
- The traditional EDI system is inflexible.
- Many EDI standards are in use today. As a result, one company might have to use several standards in order to communicate with different business partners.

Chapter 4: Database Management Systems









1. What are some of the difficulties in managing data?

- The amount of data increases exponentially with time. Much historical data must be kept for a long time, and new data are added rapidly. For example, sports data.
- Data are scattered throughout organisations and are collected by many individuals using various methods and devices. Data are frequently stored in numerous servers and locations and in different computing systems, databases, formats, and human and computer languages.
- New sources of data, such as blogs, podcasts, videocasts, and RFID tags and other wireless sensors are constantly being developed. Examples of unstructured data are, digital images, digital video, voice packets, and musical notes in an MP3 file.
- data decays overtime. For example, customers move to new addresses or change their names




2. What are the various sources for data?

Data sources can be internal, personal, clickstream (from your company’s Web transactions), and external (particularly the Internet). Internal data are usually located in corporate databases and are usually accessible via organization’s intranet. IS users create personal data by documenting their own expertise. These data can reside on the user’s PC, or they can be placed on corporate databases or on corporate knowledge bases. Sources of external data range from commercial databases to sensors and satellites. Government reports constitute a major source of external data. Many thousands of databases all over the world are accessible through the Internet.




3. What is a primary key and a secondary key?


A primary key is the identifier field or attribute that uniquely identifies a record. For example, a student record in a U.S. college would probably use the Social Security number as its primary key. A secondary key is and identifier field or attribute that has some identifying information, but typically does not identify the file with complete accuracy. For example, the student’s major might be a secondary key if a user wanted to find all students in a particular major field of study. It should not be the primary key, however, because many students can have the same major.






4. What is an entity and a relationship?

An entity is a person, place, thing or event (such as a customer, an employee, or a product) about which information’s maintained.

5. What are the advantages and disadvantages of relational databases?


Advantages:
- Based on the concept of two-dimensional tables.
- Not always a big table (called a flat file), that contains all of the records and attributes.
- Usually designed with a number of related tables. Each of these tables contains records, listed in rows, and attributes, listed in columns.
- Allows users great flexibility in the variety of queries they can make.

Disadvantages:
- Large-scale databases can be composed of many interrelated tables.
- The overall design can be complex
- Therefore have slow search and access times.



6. What is knowledge management?

Knowledge management (KM) is a process that helps organizations manipulate important knowledge that is part of the organization’s memory, usually in an unstructured format. For an organization to be successful, knowledge, as a form of capital, must exist in a format that can be exchanged among persons. In addition, it must be able to grow.





7. What is the difference between tacit knowledge and explicit knowledge?


Tacit knowledge is the cumulative store of subjective or experiential learning. In an organization, tacit knowledge consists of an organization experiences, insights, expertise, know-how, trade secrets, skill sets, understanding, and learning. It also includes the organizational culture, which reflects the past and present experiences of the organization’s people and processes, as well as the prevailing values. Tacit knowledge is generally slow, imprecise, and costly to transfer. It is also highly personal.

Explicit knowledge deals with more objective, rational, and technical knowledge. In an organization, explicit knowledge consists of the policies, procedural guides, reports, products, strategies, goals, core competencies of the enterprise and the IT infrastructure. In other words, explicit knowledge is the knowledge that has been codified in a form and can be distributed to others or transformed into a process or strategy.

Friday, September 25, 2009

Chapter 7: Wireless, Mobile Computing and Mobile Commerce

1. Identify common wireless devices and their application to business



 The Blackberry 8800
 The Treo 750
 The Motorola Q
 The Helio Ocean
 The Apple iPhone
 The Sony Mylo

Individuals are finding it convenient and productive to use wireless devoices for several reasons. First, they can make productive use of time that was formerly wasted. Second, because they can take these devices with them, their work locations are becoming much more flexible. Third, wireless technology enables them to allocate their working time around personal and professional obligations.

2. Describe the various types and general characteristics of wireless transmission media/technologies - microwave, satellite, infrared and radio waves.


Microwave: are widely used for high-volume, long-distance, line of sight communication. Microwave transmissions are susceptible to environmental interference during severe weather such as heavy rain or snowstorms. Although long distance microwave data communications systems are still widely used, they are being replaced by satellite communications systems.

Satellite: transmission systems make use of communication satellites. Currently there are three types of satellites around the earth: geostationary (GEO), medium earth orbit (MEO), and low earth orbit (LEO). The higher a satellite orbits, the larger its footprint. Thus, middle-earth-orbit satellites have a smaller footprint than geostationary satellites, and low-earth-orbit satellites have the smallest footprints of all.



Radio: transmission uses radio-wave frequencies to send data directly between transmitters and receivers. Radio waves travel easily through normal office walls in addition, radio devices are fairly inexpensive and easy to install. Finally, radio waves can transmit data at high speeds. For these reasons, radio increasingly is being used to connect computers to both peripheral equipment and local area networks.
Infrared: light is red light that is not commonly visible to human eyes. Common applications of infrared light are remote control units for televisions, VCR’s, DVD’s and CD players. Infrared transmitters are used for short-distance connections between computers and peripheral equipment and local area networks.




3. What is Bluetooth/how is it used?

Bluetooth is an industry specification used to create small personal area networks. Bluetooth can link up to eight devices within a 10 meter area using low power, radio-based communication. It can transmit up to 2.1 Mbps. Bluetooth has low power consumption and its use of Omni directional radio waves. This means that it a person does not need to point one Bluetooth device at another for connection to occur.




4. What are WLAN's, Wi-Fi, WWAN's, 3G?


Wireless Local Area Network (WLAN) is a computer network in a limited geographical area that uses wireless transmission for communication.
Wireless Fidelity (WI-FI) is a set of standards for wireless local area networks based on the IEEE 802.11 standard.
Wide-Area Network (WAN) is a network, generally provided by common carriers, that covers a wide geographic area.
Third generation (3G) uses digital signals and can transmit voice and data up to 384 Kbps when the device is moving at a walking pace, 128 Kbps when moving in a car, and up to 2 Mbps when the device is in a fixed location. 3G supports video, Web browsing, and instant messaging.





5. What are the drivers of mobile computing and mobile commerce


Mobile commerce

 Widespread availability of mobile devices
 No need for a PC
 The “cell phone culture”
 Declining prices
 Bandwidth improvement

Mobile computing

Mobility which is based on the fact that users carry a mobile device with them and can initiate a real-tie contact with other systems from wherever they happen to be.
Broad reach which refers to the fact that users carry an open mobile device, they can be reached instantly.

6. Explain the nature of RFID

Radio Frequency Identification (RFID) technology allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals. Most RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions. The second is an antenna for receiving and transmitting the signal. Today, RFID is used in enterprise supply chain management to improve the efficiency of inventory tracking and management.

Wednesday, September 23, 2009

Chapter 6: E-Business and E-Commerce



1. Define e-commerce and distinguish it from e-business.

Electronic Commerce describes the process of buying, selling, transferring or exchanging products, services or information via computer networks, including the internet. E-business is a somewhat broader concept. In addition to the buying and selling of goods and services, e-business also refers to servicing customers, collaborating with business partners, and performing electronic transactions within an organization.

2. Distinguish among B2C, B2B, C2C and B2E electronic commerce.

Business-to-consumer (B2C): in B2C, the sellers are organizations and the buyers are individuals.
Business-to-business (B2B): in B2B transactions, both the sellers and the buyers are business organizations.
Consumer-to-consumer (C2C): in C2C, an individual sells products or services to other individuals.
Business-to-employee (B2E): in B2E, an organization uses EC internally to provide information and services to its employees.

3. List some benefits and limitations of e-commerce.

E-commerce benefits organizations by making national and international markets more accessible and by lowering the costs of processing, distributing and retrieving information. Customers benefit by being able to access a vast number of products and services, around the clock. The major benefit to society is the ability to easily and conveniently deliver information, services, and products to people in cities, rural areas and developing countries.



Section 6.2 - E-business and E-commerce

1. What are spamming, permission marketing and viral marketing?

Spamming is the indiscriminate distribution of electronic ads without the permission of the receiver. Permission marketing asks consumers to give their permission to voluntarily accept online advertising and e-mail. Viral marketing refers to online “word-of-mouth” marketing. The idea behind viral marketing is to have people forward messages to friends, suggesting that they “check this out”

Section 6.4 - E-business and E-commerce

1. What are micropayments?


Micropayments are small payments of a few dollars or less. However, they have additional functions.

2. What is Multichanneling?


Multichannelling is a process through which a company integrates its online and offline channels.

Section 6.5 – E-business and E-commerce




1. List some ethical and major legal issues in EC.

There is increasing fraud and unethical behavior on the internet, including invasion of privacy by sellers and misuse of domain names. The value of domain names, taxation of online business, and how to handle legal issues in a multicounty environment are major legal concerns. Protection of customers, sellers, and intellectual property is also important.

Chapter 5: Network Applications


1. Describe the underlying technologies, applications and types of Web sites that comprise Web 2.0.

Web 2.0 is a loose collection of information technologies and applications, and of the Web sites that use them. Information technologies and applications used by Web 2.0 sites include XML, JAX, tagging blogs, wikis, Really Simple Syndication, podcasting, and video casting.
AJAX is a Web development technique that allows portions of Web pages to reload with fresh data instead of requiring the entire Web page to reload.
Tagging is a keyword or term that describes a piece of information.
Blogs and Blogging a weblog is a personal Web site, open to the public, in which the site creator expresses his or her feelings or opinions.
Wikis is a Web site on which anyone can post material and make changes to other material.
Really Simple Syndication allows users to receive the information they want, when they want it, without having to surf thousands of Web sites.
Podcasts and Videocasts: a podcast is a digital audio file that is distributed over the Web using RSS for playback on portable media players or personal computers. A videocast is the same as a podcast, except that it is digital video file.

2. Describe the function of Web services.

Web services are applications, delivered over the Internet that users can select and combine through almost any device, from personal computers to mobile phones. Web services perform a wide variety of tasks, from automating business processes to integrating components of an enterprise wide system to streamlining online buying and selling.

3. Describe how you see Social Networking being used in Business.

Telecommunicating is one way of social networking used in businesses and organizations. It consists of a group of highly prized workers who fulfill their work requirements from anywhere and at anytime. Social networking also occurs during video conferences and sending emails as a way of communication with employees and co-workers instead of organizing meetings in the managers office every time a conflict comes up.

Tuesday, September 22, 2009

Tech Guide 4: Basics of Telecommunications and Networks


1. Describe the basic telecommunications system?

A telecommunication system consists of hardware and software that transmit information from one location to another. These systems can transmit text, data, graphics, voice, documents, or full-motion video information with two basic types of signals, analog and digital. The major components of a telecommunications system include the following: devices, communications processors, and communications channels and media.

2. Compare and contrast the main wired communications channels? (Ethernet & Fibre Optic)




3. What are the main business reasons for using networks?

First, networked computer systems enable organizations to be more flexible so that they can adapt to rapidly changing business conditions. Second, networks enable companies to share hardware, computer applications, and data across the organization and among organizations. Third, networks make it possible for geographically dispersed employees and workgroups to share documents, ideas, and creative insights. This sharing encourages teamwork, innovation, and more efficient and defective interactions. Finally, networks are a critical link between businesses and their customers.

4. What is the difference between LANs and WANs?


LAN (Local Area Network) connects two or more devices in a limited geographical region, usually within the same building, so that every device on the network can communicate with every other device. WAN (Wide-Area Networks) are networks that cover large geographic areas and typically connect multiple LANs.




5. What is a network protocol?

A network protocol is a set of rules and procedures governing transmission across a network.

6. Describe TCP/IP protocol.

The Transmission Protocol/Internet Protocol (TCP/IP) is the protocol of the internet. TCP/IP uses a suite of protocols, the main ones being the Transmission Control Protocol (TCP) and the Internet Protocol (IP). The TCP performs three basic functions: 1) it manages the movement of packets between computers by establishing a connection between the computers, 2) it sequences the transfer of packets, and 3) it acknowledges the packets that have been transmitted. The Internet Protocol (IP) is responsible for disassembling, delivering, and reassembling the data during transmission.