SlideShare a Scribd company logo
1 of 34
Chapter 18 ,[object Object],[object Object],MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Copyright 2001 Prentice-Hall, Inc. 18-
Information Resources Include: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Represents a large organizational investment! 18-
Information Specialists ,[object Object],[object Object],[object Object],18-
A Functional Organization Structure for Information Services Network manager Manager of computer operations Manager of systems maintenance Manager of systems administration CIO Manager of systems development Systems analyst Systems analyst Operations personnel Database administrators Network specialists Programmers Programmers 18-
Information Resources ,[object Object],[object Object],[object Object],18-
Model of an IRIS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],18-
A Model of an Information Resources Information System Database Accounting information system Information resources research subsystem Information resources intelligence subsystem Hardware subsystem Software subsystem Human resources subsystem Data and information subsystem Integrated resource subsystem Internal sources Environmental sources Users 18-
Information Resources  Research Subsystem ,[object Object],[object Object],18-
Information Resources Intelligence Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],18-
CIO Responsibilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],18-
Achieving Quality Products and Services   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],18-
IS Takes Six Basic Steps in Achieving Quality Management 1 2 3 4 5 6 Identify IS customers Define customer quality needs Establish quality metrics Define quality strategy Implement IS quality programs Monitor IS quality performance 18-
Comparison of How IS and Middle-Level Manager-Users Perceive Product Quality Accurate 4.91 4.88 4.89 Trusts output 4.90 4.86 4.87 Works as specified 4.75 4.73 4.73 User friendly 4.50 4.75 4.68 Relevant 4.59 4.53 4.53 Fast response time 4.12 4.55 4.42 Meets all user needs 4.22 4.48 4.41 No downtime 3.96 4.25 4.16 Delivered on time 3.80 4.16 4.05 Has user documentation 4.21 3.93 4.01 Can be changed quickly 3.84 4.04 3.98 Delivered on budget 3.45 3.67 3.61 Low cost of operation 3.19 3.49 3.40 Has programmer documentation 3.74 3.23 3.39 Uses new technology 3.04 3.28 3.21 Dimension  IS   User   Aggregate Perceived Value 18-
Achieving Quality Products  and Services [cont.] ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],18-
See Table 18.2 Basic Competencies Expected of IS Job Applicants 1.  Concern for effectiveness  2.  Initiative 3.  Enthusiasm for work 4.  Self-confidence 5.  Concern with impact  6.  Interpersonal astuteness 7.  Conceptual thinking 8.  Analytical thinking 9.  Effective communication 10.  Flexibility 18-
Special Attention to Human Factors Ensures That Users’ Needs are Incorporated into Systems Designs 1. Planning phase 2. Analysis phase 3. Design phase 4. Implementation phase 5. Use phase Conduct a market analysis Conduct a product acceptance analysis Conduct a task analysis Conduct prototype tests Conduct operational system tests 18-
Achieving Quality Products  and Services [cont.] ,[object Object],[object Object],[object Object],[object Object],18-
Security Objectives ,[object Object],[object Object],[object Object],Current attention is focused on malicious software such as computer viruses. 18-
Integrity Availability Information Unauthorized use Unauthorized disclosure  and theft Unauthorized destruction and  denial of service Unauthorized modification Security Confidentiality Unauthorized Acts Threaten System Security Objectives 18-
Identification Authentication Authorization User Profiles Access control files Database Software library Audit log Report writer Security reports Users Access Control Functions 18-
Access Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],High-grade threats are  from sophisticated  computer criminals 18-
Contingency Planning ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],18-
Vital Records Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],18-
Cost-Reduction Strategies ,[object Object],[object Object],[object Object],[object Object],18-
Cost-Reduction Strategies [cont.] ,[object Object],[object Object],[object Object],[object Object],[object Object],18-
Cost-Reduction Strategies [cont.] ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],18-
Objectives of Outsourcing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],18-
Information Management in Three Pacific Rim Countries ,[object Object],[object Object],[object Object],[object Object],[object Object],18-
Information Management  in Three Pacific  Rim Countries [cont.] ,[object Object],[object Object],[object Object],[object Object],[object Object],18-
Proactive CIO Strategy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],18-
The Future of the CIO ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],18-
Donovan’s Four Stages of Decentralized Computing Equipment Big brother A B  Helping hand D  Network Watchdog C Decentralized Centralized Decentralized Development Decentralized Decision making Centralized 18-
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],18-
Summary [cont.] ,[object Object],[object Object],[object Object],[object Object],[object Object],18-

More Related Content

What's hot

Accelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsAccelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsPrecisely
 
Class1 Intro Is
Class1 Intro IsClass1 Intro Is
Class1 Intro IsRMS
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsjayussuryawan
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Sreekanth Narendran
 
Chapter 11 Enterprise Resource Planning System
Chapter 11 Enterprise Resource Planning SystemChapter 11 Enterprise Resource Planning System
Chapter 11 Enterprise Resource Planning SystemMuhammad Azmy
 
3 recent development
3 recent development3 recent development
3 recent developmentsakshi garg
 
marketing information system-chapter five
marketing information system-chapter five marketing information system-chapter five
marketing information system-chapter five Hailemariam Kebede
 
Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Yasir Khan
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)Muhammad Azmy
 
03.1 general control
03.1 general control03.1 general control
03.1 general controlMulyadi Yusuf
 
Management information system unit v
Management information system unit vManagement information system unit v
Management information system unit vpanibatla neeta
 
Lesson 22 Managing Information and Information Technology
Lesson 22 Managing Information and Information TechnologyLesson 22 Managing Information and Information Technology
Lesson 22 Managing Information and Information TechnologyDR. RHEA SANTILLAN
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information Systemarif prasetyo
 

What's hot (20)

Accelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsAccelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i Systems
 
Class1 Intro Is
Class1 Intro IsClass1 Intro Is
Class1 Intro Is
 
Mis unit iii
Mis  unit iiiMis  unit iii
Mis unit iii
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controls
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
 
Chapter 11 Enterprise Resource Planning System
Chapter 11 Enterprise Resource Planning SystemChapter 11 Enterprise Resource Planning System
Chapter 11 Enterprise Resource Planning System
 
3 recent development
3 recent development3 recent development
3 recent development
 
marketing information system-chapter five
marketing information system-chapter five marketing information system-chapter five
marketing information system-chapter five
 
IT General Controls
IT General ControlsIT General Controls
IT General Controls
 
Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
 
Data governance guide
Data governance guideData governance guide
Data governance guide
 
03.1 general control
03.1 general control03.1 general control
03.1 general control
 
Basics of MIS
Basics of MISBasics of MIS
Basics of MIS
 
TPS Vs MIS
TPS Vs MISTPS Vs MIS
TPS Vs MIS
 
Management information system unit v
Management information system unit vManagement information system unit v
Management information system unit v
 
3c 2 Information Systems Audit
3c   2   Information Systems Audit3c   2   Information Systems Audit
3c 2 Information Systems Audit
 
Lesson 22 Managing Information and Information Technology
Lesson 22 Managing Information and Information TechnologyLesson 22 Managing Information and Information Technology
Lesson 22 Managing Information and Information Technology
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information System
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challenges
 

Similar to Chap18

20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference Briefing20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference BriefingJesse Wilkins
 
DIGITAL TRANSFORMATION AND STRATEGY_final.pptx
DIGITAL TRANSFORMATION AND STRATEGY_final.pptxDIGITAL TRANSFORMATION AND STRATEGY_final.pptx
DIGITAL TRANSFORMATION AND STRATEGY_final.pptxGeorgeDiamandis11
 
Financial Analytics pafp 11-21-13
Financial Analytics   pafp 11-21-13Financial Analytics   pafp 11-21-13
Financial Analytics pafp 11-21-13gristak
 
SCM CRP ERP Decision Support
SCM CRP ERP Decision SupportSCM CRP ERP Decision Support
SCM CRP ERP Decision Supportankit_sharma869
 
Information Systems Audit-Related Designations
Information Systems Audit-Related DesignationsInformation Systems Audit-Related Designations
Information Systems Audit-Related DesignationsMichael Lin
 
Enterprise Resource planning unit 1 introduction
Enterprise Resource planning unit 1 introductionEnterprise Resource planning unit 1 introduction
Enterprise Resource planning unit 1 introductionGanesha Pandian
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity modelnooralmousa
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and TrendsMaclear LLC
 
Bab 1 pendahuluan 2010
Bab 1 pendahuluan 2010Bab 1 pendahuluan 2010
Bab 1 pendahuluan 2010donasiilmu
 
Enterprise resource planning unit 1 introduction
Enterprise resource planning unit 1 introductionEnterprise resource planning unit 1 introduction
Enterprise resource planning unit 1 introductionGanesha Pandian
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 
Digitalization strategy for downstream oil refineries
Digitalization strategy for downstream oil refineriesDigitalization strategy for downstream oil refineries
Digitalization strategy for downstream oil refineriesM D Agrawal
 
Chapter 1 - System Analyst.ppt
Chapter 1 - System Analyst.pptChapter 1 - System Analyst.ppt
Chapter 1 - System Analyst.pptssuser653579
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)NCTechSymposium
 
mis ch2.pptx
mis ch2.pptxmis ch2.pptx
mis ch2.pptxhabte11
 

Similar to Chap18 (20)

chap18.ppt
chap18.pptchap18.ppt
chap18.ppt
 
20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference Briefing20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference Briefing
 
DIGITAL TRANSFORMATION AND STRATEGY_final.pptx
DIGITAL TRANSFORMATION AND STRATEGY_final.pptxDIGITAL TRANSFORMATION AND STRATEGY_final.pptx
DIGITAL TRANSFORMATION AND STRATEGY_final.pptx
 
Financial Analytics pafp 11-21-13
Financial Analytics   pafp 11-21-13Financial Analytics   pafp 11-21-13
Financial Analytics pafp 11-21-13
 
SCM CRP ERP Decision Support
SCM CRP ERP Decision SupportSCM CRP ERP Decision Support
SCM CRP ERP Decision Support
 
s&r6ch02-isorg.ppt
s&r6ch02-isorg.ppts&r6ch02-isorg.ppt
s&r6ch02-isorg.ppt
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
Information Systems Audit-Related Designations
Information Systems Audit-Related DesignationsInformation Systems Audit-Related Designations
Information Systems Audit-Related Designations
 
Enterprise Resource planning unit 1 introduction
Enterprise Resource planning unit 1 introductionEnterprise Resource planning unit 1 introduction
Enterprise Resource planning unit 1 introduction
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity model
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 
Bab 1 pendahuluan 2010
Bab 1 pendahuluan 2010Bab 1 pendahuluan 2010
Bab 1 pendahuluan 2010
 
IT for mgrs2.pptx
IT for mgrs2.pptxIT for mgrs2.pptx
IT for mgrs2.pptx
 
Enterprise resource planning unit 1 introduction
Enterprise resource planning unit 1 introductionEnterprise resource planning unit 1 introduction
Enterprise resource planning unit 1 introduction
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
Digitalization strategy for downstream oil refineries
Digitalization strategy for downstream oil refineriesDigitalization strategy for downstream oil refineries
Digitalization strategy for downstream oil refineries
 
Chapter 1 - System Analyst.ppt
Chapter 1 - System Analyst.pptChapter 1 - System Analyst.ppt
Chapter 1 - System Analyst.ppt
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 
Building cbis, mis, csvtu
Building cbis, mis, csvtuBuilding cbis, mis, csvtu
Building cbis, mis, csvtu
 
mis ch2.pptx
mis ch2.pptxmis ch2.pptx
mis ch2.pptx
 

More from Fathur Rohman

Pancasila di era reformasi
Pancasila di era reformasiPancasila di era reformasi
Pancasila di era reformasiFathur Rohman
 
Materi 1 c bentuk bentuk korupsi 2010
Materi 1 c bentuk bentuk korupsi 2010Materi 1 c bentuk bentuk korupsi 2010
Materi 1 c bentuk bentuk korupsi 2010Fathur Rohman
 
Materi 2 faktor penyebab korupsi 2010
Materi 2 faktor penyebab korupsi 2010Materi 2 faktor penyebab korupsi 2010
Materi 2 faktor penyebab korupsi 2010Fathur Rohman
 
Materi 5 dampak korupsi 2010
Materi 5 dampak korupsi 2010Materi 5 dampak korupsi 2010
Materi 5 dampak korupsi 2010Fathur Rohman
 
Materi 6 a pemberantasan korupsi di indonesia dalam lintasan sejarah 2010
Materi 6 a pemberantasan korupsi di indonesia dalam lintasan sejarah 2010Materi 6 a pemberantasan korupsi di indonesia dalam lintasan sejarah 2010
Materi 6 a pemberantasan korupsi di indonesia dalam lintasan sejarah 2010Fathur Rohman
 
Materi 6 b lembaga anti_korupsii_non-pemerintah 2010
Materi 6 b  lembaga anti_korupsii_non-pemerintah 2010Materi 6 b  lembaga anti_korupsii_non-pemerintah 2010
Materi 6 b lembaga anti_korupsii_non-pemerintah 2010Fathur Rohman
 
Materi 7 nilai nilai anti-korupsi dalam agama 2010
Materi 7 nilai nilai anti-korupsi dalam agama 2010Materi 7 nilai nilai anti-korupsi dalam agama 2010
Materi 7 nilai nilai anti-korupsi dalam agama 2010Fathur Rohman
 
Materi 8 pemberantasan korupsi_negara_lain 2010_
Materi 8 pemberantasan korupsi_negara_lain 2010_Materi 8 pemberantasan korupsi_negara_lain 2010_
Materi 8 pemberantasan korupsi_negara_lain 2010_Fathur Rohman
 

More from Fathur Rohman (20)

Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Kuliah ke 1
Kuliah ke 1Kuliah ke 1
Kuliah ke 1
 
Kuliah ke 1
Kuliah ke 1Kuliah ke 1
Kuliah ke 1
 
Kuliah ke 4
Kuliah ke 4Kuliah ke 4
Kuliah ke 4
 
Kuliah ke 3
Kuliah ke 3Kuliah ke 3
Kuliah ke 3
 
Kuliah ke 2
Kuliah ke 2Kuliah ke 2
Kuliah ke 2
 
Kuliah ke 5
Kuliah ke 5Kuliah ke 5
Kuliah ke 5
 
Rpb chapter 1
Rpb   chapter 1Rpb   chapter 1
Rpb chapter 1
 
Kelahiran pancasila
Kelahiran pancasilaKelahiran pancasila
Kelahiran pancasila
 
Pancasila di era reformasi
Pancasila di era reformasiPancasila di era reformasi
Pancasila di era reformasi
 
Waralaba
WaralabaWaralaba
Waralaba
 
Materi 1 c bentuk bentuk korupsi 2010
Materi 1 c bentuk bentuk korupsi 2010Materi 1 c bentuk bentuk korupsi 2010
Materi 1 c bentuk bentuk korupsi 2010
 
Materi 2 faktor penyebab korupsi 2010
Materi 2 faktor penyebab korupsi 2010Materi 2 faktor penyebab korupsi 2010
Materi 2 faktor penyebab korupsi 2010
 
Materi 5 dampak korupsi 2010
Materi 5 dampak korupsi 2010Materi 5 dampak korupsi 2010
Materi 5 dampak korupsi 2010
 
Materi 6 a pemberantasan korupsi di indonesia dalam lintasan sejarah 2010
Materi 6 a pemberantasan korupsi di indonesia dalam lintasan sejarah 2010Materi 6 a pemberantasan korupsi di indonesia dalam lintasan sejarah 2010
Materi 6 a pemberantasan korupsi di indonesia dalam lintasan sejarah 2010
 
Materi 6 b lembaga anti_korupsii_non-pemerintah 2010
Materi 6 b  lembaga anti_korupsii_non-pemerintah 2010Materi 6 b  lembaga anti_korupsii_non-pemerintah 2010
Materi 6 b lembaga anti_korupsii_non-pemerintah 2010
 
Materi 7 nilai nilai anti-korupsi dalam agama 2010
Materi 7 nilai nilai anti-korupsi dalam agama 2010Materi 7 nilai nilai anti-korupsi dalam agama 2010
Materi 7 nilai nilai anti-korupsi dalam agama 2010
 
Materi 8 pemberantasan korupsi_negara_lain 2010_
Materi 8 pemberantasan korupsi_negara_lain 2010_Materi 8 pemberantasan korupsi_negara_lain 2010_
Materi 8 pemberantasan korupsi_negara_lain 2010_
 

Recently uploaded

APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 

Recently uploaded (20)

APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 

Chap18

  • 1.
  • 2.
  • 3.
  • 4. A Functional Organization Structure for Information Services Network manager Manager of computer operations Manager of systems maintenance Manager of systems administration CIO Manager of systems development Systems analyst Systems analyst Operations personnel Database administrators Network specialists Programmers Programmers 18-
  • 5.
  • 6.
  • 7. A Model of an Information Resources Information System Database Accounting information system Information resources research subsystem Information resources intelligence subsystem Hardware subsystem Software subsystem Human resources subsystem Data and information subsystem Integrated resource subsystem Internal sources Environmental sources Users 18-
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. IS Takes Six Basic Steps in Achieving Quality Management 1 2 3 4 5 6 Identify IS customers Define customer quality needs Establish quality metrics Define quality strategy Implement IS quality programs Monitor IS quality performance 18-
  • 13. Comparison of How IS and Middle-Level Manager-Users Perceive Product Quality Accurate 4.91 4.88 4.89 Trusts output 4.90 4.86 4.87 Works as specified 4.75 4.73 4.73 User friendly 4.50 4.75 4.68 Relevant 4.59 4.53 4.53 Fast response time 4.12 4.55 4.42 Meets all user needs 4.22 4.48 4.41 No downtime 3.96 4.25 4.16 Delivered on time 3.80 4.16 4.05 Has user documentation 4.21 3.93 4.01 Can be changed quickly 3.84 4.04 3.98 Delivered on budget 3.45 3.67 3.61 Low cost of operation 3.19 3.49 3.40 Has programmer documentation 3.74 3.23 3.39 Uses new technology 3.04 3.28 3.21 Dimension IS User Aggregate Perceived Value 18-
  • 14.
  • 15. See Table 18.2 Basic Competencies Expected of IS Job Applicants 1. Concern for effectiveness 2. Initiative 3. Enthusiasm for work 4. Self-confidence 5. Concern with impact 6. Interpersonal astuteness 7. Conceptual thinking 8. Analytical thinking 9. Effective communication 10. Flexibility 18-
  • 16. Special Attention to Human Factors Ensures That Users’ Needs are Incorporated into Systems Designs 1. Planning phase 2. Analysis phase 3. Design phase 4. Implementation phase 5. Use phase Conduct a market analysis Conduct a product acceptance analysis Conduct a task analysis Conduct prototype tests Conduct operational system tests 18-
  • 17.
  • 18.
  • 19. Integrity Availability Information Unauthorized use Unauthorized disclosure and theft Unauthorized destruction and denial of service Unauthorized modification Security Confidentiality Unauthorized Acts Threaten System Security Objectives 18-
  • 20. Identification Authentication Authorization User Profiles Access control files Database Software library Audit log Report writer Security reports Users Access Control Functions 18-
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. Donovan’s Four Stages of Decentralized Computing Equipment Big brother A B Helping hand D Network Watchdog C Decentralized Centralized Decentralized Development Decentralized Decision making Centralized 18-
  • 33.
  • 34.

Editor's Notes

  1. 1
  2. 9
  3. 16
  4. 17
  5. 19
  6. 20
  7. 21
  8. 22
  9. 23
  10. 24
  11. 24
  12. 26
  13. 31