100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Information Management Summary from all lectures and the book "Information Systems for Business and Beyond"

Rating
-
Sold
2
Pages
80
Uploaded on
11-01-2021
Written in
2020/2021

All you need to know for the pre-master course Information Management at the Tilburg University. All lectures are transcribed in text in this summary and are categorised for each week as well as all the presentation slides information. All lectures and terminologies are explained in this extensive summary. The mandatory articles are also explained in this summary, which no other summary of Information Management discusses.

Show more Read less
Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Institution
Study
Course

Document information

Summarized whole book?
Yes
Uploaded on
January 11, 2021
File latest updated on
January 11, 2021
Number of pages
80
Written in
2020/2021
Type
Summary

Subjects

Content preview

Table of Contents
WEEK 1: INTRODUCTION TO IS (CH. 1) ......................................................................................................... 4
QUESTION 1: WHEN STRUCTURE IS PART OF THE IS. HOW DOES IS RELATE TO ORGANIZATION? ..............................................4
QUESTION 2: WHERE IS THE INFORMATION? .................................................................................................................4
Article 1: Maes, R. (2007) An Integrative Perspective on Information Management ....................................6
Article 2: Horlacher, A. (2016) What Does a Chief Digital Officer Do? ...........................................................6
WEEK 2: HARDWARE (CH. 2) ....................................................................................................................... 7
MOORE’S LAW AND ITS IMPLICATION FOR IM................................................................................................................7
HARDWARE AND OPERATING SYSTEM ..........................................................................................................................8
THE IMPORTANCE OF “DIGITAL INFRASTRUCTURE” .........................................................................................................8
Article 3: Tilson, D. (2010) The Missing IS Research Agenda ..........................................................................8
BINARY SYSTEM .......................................................................................................................................................9
WEEK 3: SOFTWARE (CH. 3) ........................................................................................................................ 9
OPERATING SYSTEM..................................................................................................................................................9
APPLICATION SOFTWARE .........................................................................................................................................10
CLOUD COMPUTING ...............................................................................................................................................10
OPEN SOURCE .......................................................................................................................................................12
PROGRAM STRUCTURE ............................................................................................................................................12
OBJECT-ORIENTED PROGRAMMING LANGUAGE............................................................................................................12
WEEK 4: DATA AND DATABASES – DATA MANAGEMENT (CH. 4) ................................................................ 13
DATA VS. INFORMATION VS. KNOWLEDGE ...................................................................................................................13
DATABASE ARCHITECTURE ........................................................................................................................................13
THE DATA NORMALIZATION PROCESS ........................................................................................................................17
First Normal Form .........................................................................................................................................19
Second Normal Form ....................................................................................................................................20
Third Normal Form .......................................................................................................................................20
WEEK 5: DATA AND DATABASES – DATA MODELLING & BIG DATA (CH. 4) .................................................. 22
ENTITY RELATIONSHIP MODELLING ............................................................................................................................22
DATA WAREHOUSES VS OPERATIONAL SYSTEMS ..........................................................................................................25
BIG DATA..............................................................................................................................................................26
WEEK 6: COMPUTER NETWORKS (CH. 5) .................................................................................................. 27
HISTORY OF THE INTERNET .......................................................................................................................................27
SWITCHING METHODS ............................................................................................................................................27
NSF AND THE INTERNET ..........................................................................................................................................27
THE WORLDWIDE WEB ...........................................................................................................................................27
WIDE AREA NETWORK (WAN): CIRCUIT-SWITCHING VS. PACKET-SWITCHING ...................................................................28
WAN: TRANSMISSION CONTROL PROTOCOL (TCP) / INTERNET PROTOCOL (IP) ................................................................29
LOCAL AREA NETWORK (LAN): ACCESS CONTROL ........................................................................................................29
Article 4: Maier, M. (1998) Architecting Principles for Systems-of-Systems ................................................30
LATER DEVELOPMENTS ............................................................................................................................................31
WEEK 7: IT SECURITY (CH. 6) ..................................................................................................................... 32
INTRODUCTION AND THE NEED OF SECURITY (WHY?).....................................................................................................32
Why to Safeguard Customer Data? ..............................................................................................................33
Security – Is not an IT Problem .....................................................................................................................33
Article 5: Soomro, Z. (2016) Inf. Security Management Needs More Holistic Approach .............................33
Recent Developments ...................................................................................................................................35
INTERNAL THREATS .................................................................................................................................................35

, EXTERNAL THREATS ................................................................................................................................................35
RESPONDING TO THREATS ........................................................................................................................................36
IT Risk Management and Security ................................................................................................................39
WEEK 8: IS STRATEGY (CH. 7) .................................................................................................................... 40
INTRODUCTION TO STRATEGIC INFORMATION SYSTEMS .................................................................................................40
PRODUCTIVITY PARADOX .........................................................................................................................................41
MINICASE: DOMINO’S SMARTWATCH ORDERING .........................................................................................................41
OVERVIEW OF MODELS TO IDENTIFY SIS......................................................................................................................41
Industry Analysis -Porter’s Five Forces .........................................................................................................42
Value Chain Analysis (Porter) .......................................................................................................................42
Customer Service Life Cycle Analysis ............................................................................................................43
Virtual Value Chain: Value Matrix ................................................................................................................44
IT-DEPENDENT STRATEGIC INITIATIVES – THREE CLASSES ...............................................................................................45
Customer Data Strategies.............................................................................................................................45
“IT DOESN’T MATTER” (NICHOLAS CARR, 2003) .........................................................................................................46
SUSTAINABLE ADVANTAGE .......................................................................................................................................46
Not all initiatives are equal...........................................................................................................................46
Response lag .................................................................................................................................................46
Four Barriers to Erosion ................................................................................................................................47
WEEK 9: PROCESSES AND PEOPLE (CH. 8, 9) DRIVERS:................................................................................ 49
BUSINESS PROCESS MANAGEMENT (BPM) – CH. 8 .....................................................................................................49
BPM and WFM (vd Aalst, 2003) ...................................................................................................................49
Business Process Management System (BPMS) ...........................................................................................50
The History of BPMS – Industry ....................................................................................................................50
The History of BPMS – Science......................................................................................................................50
BPM Goals ....................................................................................................................................................51
Business Process Re-engineering (BPR) Heuristics – Hammer, Champy ......................................................51
Business Process – the core of BPM..............................................................................................................51
Business Process (BP) – Four Perspectives....................................................................................................52
Action/Workflow Approach ..........................................................................................................................53
Background ...................................................................................................................................................53
Article 6: Melao, N. (2000) A Conceptual Framework for Understanding Business Process........................53
Article 7: Dietz, J. (2006) The Deep Structure of Business Processes ............................................................54
PEOPLE – CH. 9 .....................................................................................................................................................54
IT in the organization....................................................................................................................................57
WEEK 10: SYSTEM DEVELOPMENT (CH. 10) ............................................................................................... 57
IS DEVELOPMENT – SUCCESS OR FAILURE? ..................................................................................................................57
IS DEVELOPMENT – HOW HARD CAN IT BE? ................................................................................................................57
IS DEVELOPMENT – OVERVIEW .................................................................................................................................57
IS DEVELOPMENT – MAKE OR BUY DECISION ..............................................................................................................58
IS DEVELOPMENT – MAKE AND BUY ..........................................................................................................................58
SYSTEMS DEVELOPMENT LIFE CYCLE (SDLC) ...............................................................................................................59
PRINCIPAL PHASES OF THE SDLC ...............................................................................................................................59
THE DEFINITION PHASE ...........................................................................................................................................59
THE BUILD PHASE ...................................................................................................................................................60
THE IMPLEMENTATION PHASE ..................................................................................................................................61
ADVANTAGES OF SLDC APPROACH............................................................................................................................62
PROTOTYPING........................................................................................................................................................63
AGILE DEVELOPMENT ..............................................................................................................................................63
DEVOPS ................................................................................................................................................................64
OUTSOURCED DEVELOPMENT ...................................................................................................................................64
PURCHASING OFF-THE-SHELF SOFTWARE ...................................................................................................................64
END-USER DEVELOPMENT .......................................................................................................................................65
THE BENEFITS OF END-USER DEVELOPMENT ...............................................................................................................65

, THE RISKS OF END-USER DEVELOPMENT ....................................................................................................................65
THE RECAP ............................................................................................................................................................66
QUALITY TRIANGLE DILEMMA ...................................................................................................................................66
WEEK 11: GLOBALIZATION & ETHICS (CH. 11, 12) ....................................................................................... 66
GLOBALIZATION – CH. 11 ........................................................................................................................................66
GLOBAL FIRM – ADVANTAGES ..................................................................................................................................67
GLOBAL FIRM - CHALLENGES ....................................................................................................................................67
DIGITAL DIVIDE ......................................................................................................................................................67
ETHICAL AND LEGAL IMPLICATIONS OF IS – CH. 12 .......................................................................................................67
COPYRIGHT ...........................................................................................................................................................68
PATENTS ...............................................................................................................................................................68
PRIVACY ...............................................................................................................................................................68
US: FAIR INFORMATION PRACTICE PRINCIPLES.............................................................................................................68
IMPORTANT ETHICAL PRINCIPLES ...............................................................................................................................69
ETHICAL ANALYSIS – PROCESS IN MAKING A GOOD ETHICAL DECISION ...............................................................................69
CASE E-HEALTH .....................................................................................................................................................70
Article 8: Stahl (2014) From Computer Ethics to Responsible Research and Innovation in ICT ...................70
WEEK 12: FUTURE TRENDS (CH. 13)........................................................................................................... 71
WHAT IS ARTIFICIAL INTELLIGENCE (AI) ......................................................................................................................71
A BRIEF HISTORY OF AI – THE BIRTH OF ARTIFICIAL INTELLIGENCE 1950 ..........................................................................72
Heuristics ......................................................................................................................................................72
A BRIEF HISTORY OF AI – THE GOLDEN YEARS 1956-1974 ...........................................................................................73
A BRIEF HISTORY OF AI – THE FIRST AI WINTER 1974-1980 ........................................................................................74
A BRIEF HISTORY OF AI – THE BOOM 1980-1987 ......................................................................................................74
A BRIEF HISTORY OF AI – THE SECOND AI WINTER 1987-1993 ....................................................................................75
A BRIEF HISTORY OF AI – ARTIFICIAL INTELLIGENCE 1993 - PRESENT...............................................................................75
ARTIFICIAL NEURAL NETWORKS (ANN) APPROACH ......................................................................................................76
MACHINE LEARNING APPROACH ...............................................................................................................................76
AI PROBLEMS AND APPLICATIONS TODAY ...................................................................................................................76
FUTURE TRENDS FOR 2021 ACCORDING TO GARTNER ............................................................................... 77
HYPERAUTOMATION ...............................................................................................................................................77
MULTIEXPERIENCE ..................................................................................................................................................77
DEMOCRATIZATION.................................................................................................................................................77
HUMAN AUGMENTATION ........................................................................................................................................78
TRANSPARENCY AND TRACEABILITY ............................................................................................................................78
THE EMPOWERED EDGE ..........................................................................................................................................78
THE DISTRIBUTED CLOUD.........................................................................................................................................78
AUTONOMOUS THINGS ...........................................................................................................................................79
PRACTICAL BLOCKCHAIN ..........................................................................................................................................79
AI SECURITY ..........................................................................................................................................................79

, Week 1: Introduction to IS (Ch. 1)
An Information System (IS) is the study of complementary networks of hardware and software that people and
organizations use to collect filter, process, create, and distribute data.

Piccoli’s components of an IS:




Social System vs Technical System.
Components: Structure (Social), Technology (Technical), People (Social), Process (Technical)
• Automation: Technology and Process (speed up, reduce costs, reduce error)
• Information: Technology, Process and People (interpret data, better informed)
• Transformation: Technology, Process, People and Structure (change structure of
org.)

Question 1: When structure is part of the IS. How does IS relate to organization?
According to Mark S. Silver it can be categorized between two viewpoints:
IS-Centered View of an Information System
• Hardware, Software, Data, People and Procedure

Managerial View of an Information System
• Business Process, People, Information Systems

Information System is a socio-technological system, it is covers one of the aspects that
covers a wide range of components.

Question 2: Where is the information?
One approach: Language/Action Perspective (LAP)
It focuses the IS that people are communicating with each other.
What is communicating? Communication is more than just data/information flow! A
computer as a data processing system, it cannot act like people do when they communicate.
• Focuses on what people do when communicating (how to do things with words)
R112,03
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
kevinbozh

Get to know the seller

Seller avatar
kevinbozh Tilburg University
Follow You need to be logged in order to follow users or courses
Sold
2
Member since
4 year
Number of followers
2
Documents
1
Last sold
4 year ago

0,0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions