WEEK 1: INTRODUCTION TO IS (CH. 1) ......................................................................................................... 4
QUESTION 1: WHEN STRUCTURE IS PART OF THE IS. HOW DOES IS RELATE TO ORGANIZATION? ..............................................4
QUESTION 2: WHERE IS THE INFORMATION? .................................................................................................................4
Article 1: Maes, R. (2007) An Integrative Perspective on Information Management ....................................6
Article 2: Horlacher, A. (2016) What Does a Chief Digital Officer Do? ...........................................................6
WEEK 2: HARDWARE (CH. 2) ....................................................................................................................... 7
MOORE’S LAW AND ITS IMPLICATION FOR IM................................................................................................................7
HARDWARE AND OPERATING SYSTEM ..........................................................................................................................8
THE IMPORTANCE OF “DIGITAL INFRASTRUCTURE” .........................................................................................................8
Article 3: Tilson, D. (2010) The Missing IS Research Agenda ..........................................................................8
BINARY SYSTEM .......................................................................................................................................................9
WEEK 3: SOFTWARE (CH. 3) ........................................................................................................................ 9
OPERATING SYSTEM..................................................................................................................................................9
APPLICATION SOFTWARE .........................................................................................................................................10
CLOUD COMPUTING ...............................................................................................................................................10
OPEN SOURCE .......................................................................................................................................................12
PROGRAM STRUCTURE ............................................................................................................................................12
OBJECT-ORIENTED PROGRAMMING LANGUAGE............................................................................................................12
WEEK 4: DATA AND DATABASES – DATA MANAGEMENT (CH. 4) ................................................................ 13
DATA VS. INFORMATION VS. KNOWLEDGE ...................................................................................................................13
DATABASE ARCHITECTURE ........................................................................................................................................13
THE DATA NORMALIZATION PROCESS ........................................................................................................................17
First Normal Form .........................................................................................................................................19
Second Normal Form ....................................................................................................................................20
Third Normal Form .......................................................................................................................................20
WEEK 5: DATA AND DATABASES – DATA MODELLING & BIG DATA (CH. 4) .................................................. 22
ENTITY RELATIONSHIP MODELLING ............................................................................................................................22
DATA WAREHOUSES VS OPERATIONAL SYSTEMS ..........................................................................................................25
BIG DATA..............................................................................................................................................................26
WEEK 6: COMPUTER NETWORKS (CH. 5) .................................................................................................. 27
HISTORY OF THE INTERNET .......................................................................................................................................27
SWITCHING METHODS ............................................................................................................................................27
NSF AND THE INTERNET ..........................................................................................................................................27
THE WORLDWIDE WEB ...........................................................................................................................................27
WIDE AREA NETWORK (WAN): CIRCUIT-SWITCHING VS. PACKET-SWITCHING ...................................................................28
WAN: TRANSMISSION CONTROL PROTOCOL (TCP) / INTERNET PROTOCOL (IP) ................................................................29
LOCAL AREA NETWORK (LAN): ACCESS CONTROL ........................................................................................................29
Article 4: Maier, M. (1998) Architecting Principles for Systems-of-Systems ................................................30
LATER DEVELOPMENTS ............................................................................................................................................31
WEEK 7: IT SECURITY (CH. 6) ..................................................................................................................... 32
INTRODUCTION AND THE NEED OF SECURITY (WHY?).....................................................................................................32
Why to Safeguard Customer Data? ..............................................................................................................33
Security – Is not an IT Problem .....................................................................................................................33
Article 5: Soomro, Z. (2016) Inf. Security Management Needs More Holistic Approach .............................33
Recent Developments ...................................................................................................................................35
INTERNAL THREATS .................................................................................................................................................35
, EXTERNAL THREATS ................................................................................................................................................35
RESPONDING TO THREATS ........................................................................................................................................36
IT Risk Management and Security ................................................................................................................39
WEEK 8: IS STRATEGY (CH. 7) .................................................................................................................... 40
INTRODUCTION TO STRATEGIC INFORMATION SYSTEMS .................................................................................................40
PRODUCTIVITY PARADOX .........................................................................................................................................41
MINICASE: DOMINO’S SMARTWATCH ORDERING .........................................................................................................41
OVERVIEW OF MODELS TO IDENTIFY SIS......................................................................................................................41
Industry Analysis -Porter’s Five Forces .........................................................................................................42
Value Chain Analysis (Porter) .......................................................................................................................42
Customer Service Life Cycle Analysis ............................................................................................................43
Virtual Value Chain: Value Matrix ................................................................................................................44
IT-DEPENDENT STRATEGIC INITIATIVES – THREE CLASSES ...............................................................................................45
Customer Data Strategies.............................................................................................................................45
“IT DOESN’T MATTER” (NICHOLAS CARR, 2003) .........................................................................................................46
SUSTAINABLE ADVANTAGE .......................................................................................................................................46
Not all initiatives are equal...........................................................................................................................46
Response lag .................................................................................................................................................46
Four Barriers to Erosion ................................................................................................................................47
WEEK 9: PROCESSES AND PEOPLE (CH. 8, 9) DRIVERS:................................................................................ 49
BUSINESS PROCESS MANAGEMENT (BPM) – CH. 8 .....................................................................................................49
BPM and WFM (vd Aalst, 2003) ...................................................................................................................49
Business Process Management System (BPMS) ...........................................................................................50
The History of BPMS – Industry ....................................................................................................................50
The History of BPMS – Science......................................................................................................................50
BPM Goals ....................................................................................................................................................51
Business Process Re-engineering (BPR) Heuristics – Hammer, Champy ......................................................51
Business Process – the core of BPM..............................................................................................................51
Business Process (BP) – Four Perspectives....................................................................................................52
Action/Workflow Approach ..........................................................................................................................53
Background ...................................................................................................................................................53
Article 6: Melao, N. (2000) A Conceptual Framework for Understanding Business Process........................53
Article 7: Dietz, J. (2006) The Deep Structure of Business Processes ............................................................54
PEOPLE – CH. 9 .....................................................................................................................................................54
IT in the organization....................................................................................................................................57
WEEK 10: SYSTEM DEVELOPMENT (CH. 10) ............................................................................................... 57
IS DEVELOPMENT – SUCCESS OR FAILURE? ..................................................................................................................57
IS DEVELOPMENT – HOW HARD CAN IT BE? ................................................................................................................57
IS DEVELOPMENT – OVERVIEW .................................................................................................................................57
IS DEVELOPMENT – MAKE OR BUY DECISION ..............................................................................................................58
IS DEVELOPMENT – MAKE AND BUY ..........................................................................................................................58
SYSTEMS DEVELOPMENT LIFE CYCLE (SDLC) ...............................................................................................................59
PRINCIPAL PHASES OF THE SDLC ...............................................................................................................................59
THE DEFINITION PHASE ...........................................................................................................................................59
THE BUILD PHASE ...................................................................................................................................................60
THE IMPLEMENTATION PHASE ..................................................................................................................................61
ADVANTAGES OF SLDC APPROACH............................................................................................................................62
PROTOTYPING........................................................................................................................................................63
AGILE DEVELOPMENT ..............................................................................................................................................63
DEVOPS ................................................................................................................................................................64
OUTSOURCED DEVELOPMENT ...................................................................................................................................64
PURCHASING OFF-THE-SHELF SOFTWARE ...................................................................................................................64
END-USER DEVELOPMENT .......................................................................................................................................65
THE BENEFITS OF END-USER DEVELOPMENT ...............................................................................................................65
, THE RISKS OF END-USER DEVELOPMENT ....................................................................................................................65
THE RECAP ............................................................................................................................................................66
QUALITY TRIANGLE DILEMMA ...................................................................................................................................66
WEEK 11: GLOBALIZATION & ETHICS (CH. 11, 12) ....................................................................................... 66
GLOBALIZATION – CH. 11 ........................................................................................................................................66
GLOBAL FIRM – ADVANTAGES ..................................................................................................................................67
GLOBAL FIRM - CHALLENGES ....................................................................................................................................67
DIGITAL DIVIDE ......................................................................................................................................................67
ETHICAL AND LEGAL IMPLICATIONS OF IS – CH. 12 .......................................................................................................67
COPYRIGHT ...........................................................................................................................................................68
PATENTS ...............................................................................................................................................................68
PRIVACY ...............................................................................................................................................................68
US: FAIR INFORMATION PRACTICE PRINCIPLES.............................................................................................................68
IMPORTANT ETHICAL PRINCIPLES ...............................................................................................................................69
ETHICAL ANALYSIS – PROCESS IN MAKING A GOOD ETHICAL DECISION ...............................................................................69
CASE E-HEALTH .....................................................................................................................................................70
Article 8: Stahl (2014) From Computer Ethics to Responsible Research and Innovation in ICT ...................70
WEEK 12: FUTURE TRENDS (CH. 13)........................................................................................................... 71
WHAT IS ARTIFICIAL INTELLIGENCE (AI) ......................................................................................................................71
A BRIEF HISTORY OF AI – THE BIRTH OF ARTIFICIAL INTELLIGENCE 1950 ..........................................................................72
Heuristics ......................................................................................................................................................72
A BRIEF HISTORY OF AI – THE GOLDEN YEARS 1956-1974 ...........................................................................................73
A BRIEF HISTORY OF AI – THE FIRST AI WINTER 1974-1980 ........................................................................................74
A BRIEF HISTORY OF AI – THE BOOM 1980-1987 ......................................................................................................74
A BRIEF HISTORY OF AI – THE SECOND AI WINTER 1987-1993 ....................................................................................75
A BRIEF HISTORY OF AI – ARTIFICIAL INTELLIGENCE 1993 - PRESENT...............................................................................75
ARTIFICIAL NEURAL NETWORKS (ANN) APPROACH ......................................................................................................76
MACHINE LEARNING APPROACH ...............................................................................................................................76
AI PROBLEMS AND APPLICATIONS TODAY ...................................................................................................................76
FUTURE TRENDS FOR 2021 ACCORDING TO GARTNER ............................................................................... 77
HYPERAUTOMATION ...............................................................................................................................................77
MULTIEXPERIENCE ..................................................................................................................................................77
DEMOCRATIZATION.................................................................................................................................................77
HUMAN AUGMENTATION ........................................................................................................................................78
TRANSPARENCY AND TRACEABILITY ............................................................................................................................78
THE EMPOWERED EDGE ..........................................................................................................................................78
THE DISTRIBUTED CLOUD.........................................................................................................................................78
AUTONOMOUS THINGS ...........................................................................................................................................79
PRACTICAL BLOCKCHAIN ..........................................................................................................................................79
AI SECURITY ..........................................................................................................................................................79
, Week 1: Introduction to IS (Ch. 1)
An Information System (IS) is the study of complementary networks of hardware and software that people and
organizations use to collect filter, process, create, and distribute data.
Piccoli’s components of an IS:
Social System vs Technical System.
Components: Structure (Social), Technology (Technical), People (Social), Process (Technical)
• Automation: Technology and Process (speed up, reduce costs, reduce error)
• Information: Technology, Process and People (interpret data, better informed)
• Transformation: Technology, Process, People and Structure (change structure of
org.)
Question 1: When structure is part of the IS. How does IS relate to organization?
According to Mark S. Silver it can be categorized between two viewpoints:
IS-Centered View of an Information System
• Hardware, Software, Data, People and Procedure
Managerial View of an Information System
• Business Process, People, Information Systems
Information System is a socio-technological system, it is covers one of the aspects that
covers a wide range of components.
Question 2: Where is the information?
One approach: Language/Action Perspective (LAP)
It focuses the IS that people are communicating with each other.
What is communicating? Communication is more than just data/information flow! A
computer as a data processing system, it cannot act like people do when they communicate.
• Focuses on what people do when communicating (how to do things with words)