100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Samenvatting

Information Management Summary from all lectures and the book "Information Systems for Business and Beyond"

Beoordeling
-
Verkocht
2
Pagina's
80
Geüpload op
11-01-2021
Geschreven in
2020/2021

All you need to know for the pre-master course Information Management at the Tilburg University. All lectures are transcribed in text in this summary and are categorised for each week as well as all the presentation slides information. All lectures and terminologies are explained in this extensive summary. The mandatory articles are also explained in this summary, which no other summary of Information Management discusses.

Meer zien Lees minder











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Documentinformatie

Heel boek samengevat?
Ja
Geüpload op
11 januari 2021
Bestand laatst geupdate op
11 januari 2021
Aantal pagina's
80
Geschreven in
2020/2021
Type
Samenvatting

Onderwerpen

Voorbeeld van de inhoud

Table of Contents
WEEK 1: INTRODUCTION TO IS (CH. 1) ......................................................................................................... 4
QUESTION 1: WHEN STRUCTURE IS PART OF THE IS. HOW DOES IS RELATE TO ORGANIZATION? ..............................................4
QUESTION 2: WHERE IS THE INFORMATION? .................................................................................................................4
Article 1: Maes, R. (2007) An Integrative Perspective on Information Management ....................................6
Article 2: Horlacher, A. (2016) What Does a Chief Digital Officer Do? ...........................................................6
WEEK 2: HARDWARE (CH. 2) ....................................................................................................................... 7
MOORE’S LAW AND ITS IMPLICATION FOR IM................................................................................................................7
HARDWARE AND OPERATING SYSTEM ..........................................................................................................................8
THE IMPORTANCE OF “DIGITAL INFRASTRUCTURE” .........................................................................................................8
Article 3: Tilson, D. (2010) The Missing IS Research Agenda ..........................................................................8
BINARY SYSTEM .......................................................................................................................................................9
WEEK 3: SOFTWARE (CH. 3) ........................................................................................................................ 9
OPERATING SYSTEM..................................................................................................................................................9
APPLICATION SOFTWARE .........................................................................................................................................10
CLOUD COMPUTING ...............................................................................................................................................10
OPEN SOURCE .......................................................................................................................................................12
PROGRAM STRUCTURE ............................................................................................................................................12
OBJECT-ORIENTED PROGRAMMING LANGUAGE............................................................................................................12
WEEK 4: DATA AND DATABASES – DATA MANAGEMENT (CH. 4) ................................................................ 13
DATA VS. INFORMATION VS. KNOWLEDGE ...................................................................................................................13
DATABASE ARCHITECTURE ........................................................................................................................................13
THE DATA NORMALIZATION PROCESS ........................................................................................................................17
First Normal Form .........................................................................................................................................19
Second Normal Form ....................................................................................................................................20
Third Normal Form .......................................................................................................................................20
WEEK 5: DATA AND DATABASES – DATA MODELLING & BIG DATA (CH. 4) .................................................. 22
ENTITY RELATIONSHIP MODELLING ............................................................................................................................22
DATA WAREHOUSES VS OPERATIONAL SYSTEMS ..........................................................................................................25
BIG DATA..............................................................................................................................................................26
WEEK 6: COMPUTER NETWORKS (CH. 5) .................................................................................................. 27
HISTORY OF THE INTERNET .......................................................................................................................................27
SWITCHING METHODS ............................................................................................................................................27
NSF AND THE INTERNET ..........................................................................................................................................27
THE WORLDWIDE WEB ...........................................................................................................................................27
WIDE AREA NETWORK (WAN): CIRCUIT-SWITCHING VS. PACKET-SWITCHING ...................................................................28
WAN: TRANSMISSION CONTROL PROTOCOL (TCP) / INTERNET PROTOCOL (IP) ................................................................29
LOCAL AREA NETWORK (LAN): ACCESS CONTROL ........................................................................................................29
Article 4: Maier, M. (1998) Architecting Principles for Systems-of-Systems ................................................30
LATER DEVELOPMENTS ............................................................................................................................................31
WEEK 7: IT SECURITY (CH. 6) ..................................................................................................................... 32
INTRODUCTION AND THE NEED OF SECURITY (WHY?).....................................................................................................32
Why to Safeguard Customer Data? ..............................................................................................................33
Security – Is not an IT Problem .....................................................................................................................33
Article 5: Soomro, Z. (2016) Inf. Security Management Needs More Holistic Approach .............................33
Recent Developments ...................................................................................................................................35
INTERNAL THREATS .................................................................................................................................................35

, EXTERNAL THREATS ................................................................................................................................................35
RESPONDING TO THREATS ........................................................................................................................................36
IT Risk Management and Security ................................................................................................................39
WEEK 8: IS STRATEGY (CH. 7) .................................................................................................................... 40
INTRODUCTION TO STRATEGIC INFORMATION SYSTEMS .................................................................................................40
PRODUCTIVITY PARADOX .........................................................................................................................................41
MINICASE: DOMINO’S SMARTWATCH ORDERING .........................................................................................................41
OVERVIEW OF MODELS TO IDENTIFY SIS......................................................................................................................41
Industry Analysis -Porter’s Five Forces .........................................................................................................42
Value Chain Analysis (Porter) .......................................................................................................................42
Customer Service Life Cycle Analysis ............................................................................................................43
Virtual Value Chain: Value Matrix ................................................................................................................44
IT-DEPENDENT STRATEGIC INITIATIVES – THREE CLASSES ...............................................................................................45
Customer Data Strategies.............................................................................................................................45
“IT DOESN’T MATTER” (NICHOLAS CARR, 2003) .........................................................................................................46
SUSTAINABLE ADVANTAGE .......................................................................................................................................46
Not all initiatives are equal...........................................................................................................................46
Response lag .................................................................................................................................................46
Four Barriers to Erosion ................................................................................................................................47
WEEK 9: PROCESSES AND PEOPLE (CH. 8, 9) DRIVERS:................................................................................ 49
BUSINESS PROCESS MANAGEMENT (BPM) – CH. 8 .....................................................................................................49
BPM and WFM (vd Aalst, 2003) ...................................................................................................................49
Business Process Management System (BPMS) ...........................................................................................50
The History of BPMS – Industry ....................................................................................................................50
The History of BPMS – Science......................................................................................................................50
BPM Goals ....................................................................................................................................................51
Business Process Re-engineering (BPR) Heuristics – Hammer, Champy ......................................................51
Business Process – the core of BPM..............................................................................................................51
Business Process (BP) – Four Perspectives....................................................................................................52
Action/Workflow Approach ..........................................................................................................................53
Background ...................................................................................................................................................53
Article 6: Melao, N. (2000) A Conceptual Framework for Understanding Business Process........................53
Article 7: Dietz, J. (2006) The Deep Structure of Business Processes ............................................................54
PEOPLE – CH. 9 .....................................................................................................................................................54
IT in the organization....................................................................................................................................57
WEEK 10: SYSTEM DEVELOPMENT (CH. 10) ............................................................................................... 57
IS DEVELOPMENT – SUCCESS OR FAILURE? ..................................................................................................................57
IS DEVELOPMENT – HOW HARD CAN IT BE? ................................................................................................................57
IS DEVELOPMENT – OVERVIEW .................................................................................................................................57
IS DEVELOPMENT – MAKE OR BUY DECISION ..............................................................................................................58
IS DEVELOPMENT – MAKE AND BUY ..........................................................................................................................58
SYSTEMS DEVELOPMENT LIFE CYCLE (SDLC) ...............................................................................................................59
PRINCIPAL PHASES OF THE SDLC ...............................................................................................................................59
THE DEFINITION PHASE ...........................................................................................................................................59
THE BUILD PHASE ...................................................................................................................................................60
THE IMPLEMENTATION PHASE ..................................................................................................................................61
ADVANTAGES OF SLDC APPROACH............................................................................................................................62
PROTOTYPING........................................................................................................................................................63
AGILE DEVELOPMENT ..............................................................................................................................................63
DEVOPS ................................................................................................................................................................64
OUTSOURCED DEVELOPMENT ...................................................................................................................................64
PURCHASING OFF-THE-SHELF SOFTWARE ...................................................................................................................64
END-USER DEVELOPMENT .......................................................................................................................................65
THE BENEFITS OF END-USER DEVELOPMENT ...............................................................................................................65

, THE RISKS OF END-USER DEVELOPMENT ....................................................................................................................65
THE RECAP ............................................................................................................................................................66
QUALITY TRIANGLE DILEMMA ...................................................................................................................................66
WEEK 11: GLOBALIZATION & ETHICS (CH. 11, 12) ....................................................................................... 66
GLOBALIZATION – CH. 11 ........................................................................................................................................66
GLOBAL FIRM – ADVANTAGES ..................................................................................................................................67
GLOBAL FIRM - CHALLENGES ....................................................................................................................................67
DIGITAL DIVIDE ......................................................................................................................................................67
ETHICAL AND LEGAL IMPLICATIONS OF IS – CH. 12 .......................................................................................................67
COPYRIGHT ...........................................................................................................................................................68
PATENTS ...............................................................................................................................................................68
PRIVACY ...............................................................................................................................................................68
US: FAIR INFORMATION PRACTICE PRINCIPLES.............................................................................................................68
IMPORTANT ETHICAL PRINCIPLES ...............................................................................................................................69
ETHICAL ANALYSIS – PROCESS IN MAKING A GOOD ETHICAL DECISION ...............................................................................69
CASE E-HEALTH .....................................................................................................................................................70
Article 8: Stahl (2014) From Computer Ethics to Responsible Research and Innovation in ICT ...................70
WEEK 12: FUTURE TRENDS (CH. 13)........................................................................................................... 71
WHAT IS ARTIFICIAL INTELLIGENCE (AI) ......................................................................................................................71
A BRIEF HISTORY OF AI – THE BIRTH OF ARTIFICIAL INTELLIGENCE 1950 ..........................................................................72
Heuristics ......................................................................................................................................................72
A BRIEF HISTORY OF AI – THE GOLDEN YEARS 1956-1974 ...........................................................................................73
A BRIEF HISTORY OF AI – THE FIRST AI WINTER 1974-1980 ........................................................................................74
A BRIEF HISTORY OF AI – THE BOOM 1980-1987 ......................................................................................................74
A BRIEF HISTORY OF AI – THE SECOND AI WINTER 1987-1993 ....................................................................................75
A BRIEF HISTORY OF AI – ARTIFICIAL INTELLIGENCE 1993 - PRESENT...............................................................................75
ARTIFICIAL NEURAL NETWORKS (ANN) APPROACH ......................................................................................................76
MACHINE LEARNING APPROACH ...............................................................................................................................76
AI PROBLEMS AND APPLICATIONS TODAY ...................................................................................................................76
FUTURE TRENDS FOR 2021 ACCORDING TO GARTNER ............................................................................... 77
HYPERAUTOMATION ...............................................................................................................................................77
MULTIEXPERIENCE ..................................................................................................................................................77
DEMOCRATIZATION.................................................................................................................................................77
HUMAN AUGMENTATION ........................................................................................................................................78
TRANSPARENCY AND TRACEABILITY ............................................................................................................................78
THE EMPOWERED EDGE ..........................................................................................................................................78
THE DISTRIBUTED CLOUD.........................................................................................................................................78
AUTONOMOUS THINGS ...........................................................................................................................................79
PRACTICAL BLOCKCHAIN ..........................................................................................................................................79
AI SECURITY ..........................................................................................................................................................79

, Week 1: Introduction to IS (Ch. 1)
An Information System (IS) is the study of complementary networks of hardware and software that people and
organizations use to collect filter, process, create, and distribute data.

Piccoli’s components of an IS:




Social System vs Technical System.
Components: Structure (Social), Technology (Technical), People (Social), Process (Technical)
• Automation: Technology and Process (speed up, reduce costs, reduce error)
• Information: Technology, Process and People (interpret data, better informed)
• Transformation: Technology, Process, People and Structure (change structure of
org.)

Question 1: When structure is part of the IS. How does IS relate to organization?
According to Mark S. Silver it can be categorized between two viewpoints:
IS-Centered View of an Information System
• Hardware, Software, Data, People and Procedure

Managerial View of an Information System
• Business Process, People, Information Systems

Information System is a socio-technological system, it is covers one of the aspects that
covers a wide range of components.

Question 2: Where is the information?
One approach: Language/Action Perspective (LAP)
It focuses the IS that people are communicating with each other.
What is communicating? Communication is more than just data/information flow! A
computer as a data processing system, it cannot act like people do when they communicate.
• Focuses on what people do when communicating (how to do things with words)
€5,49
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
kevinbozh

Maak kennis met de verkoper

Seller avatar
kevinbozh Tilburg University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2
Lid sinds
4 jaar
Aantal volgers
2
Documenten
1
Laatst verkocht
4 jaar geleden

0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen