4. A Functional Organization Structure for Information Services Network manager Manager of computer operations Manager of systems maintenance Manager of systems administration CIO Manager of systems development Systems analyst Systems analyst Operations personnel Database administrators Network specialists Programmers Programmers 18-
5.
6.
7. A Model of an Information Resources Information System Database Accounting information system Information resources research subsystem Information resources intelligence subsystem Hardware subsystem Software subsystem Human resources subsystem Data and information subsystem Integrated resource subsystem Internal sources Environmental sources Users 18-
8.
9.
10.
11.
12. IS Takes Six Basic Steps in Achieving Quality Management 1 2 3 4 5 6 Identify IS customers Define customer quality needs Establish quality metrics Define quality strategy Implement IS quality programs Monitor IS quality performance 18-
13. Comparison of How IS and Middle-Level Manager-Users Perceive Product Quality Accurate 4.91 4.88 4.89 Trusts output 4.90 4.86 4.87 Works as specified 4.75 4.73 4.73 User friendly 4.50 4.75 4.68 Relevant 4.59 4.53 4.53 Fast response time 4.12 4.55 4.42 Meets all user needs 4.22 4.48 4.41 No downtime 3.96 4.25 4.16 Delivered on time 3.80 4.16 4.05 Has user documentation 4.21 3.93 4.01 Can be changed quickly 3.84 4.04 3.98 Delivered on budget 3.45 3.67 3.61 Low cost of operation 3.19 3.49 3.40 Has programmer documentation 3.74 3.23 3.39 Uses new technology 3.04 3.28 3.21 Dimension IS User Aggregate Perceived Value 18-
14.
15. See Table 18.2 Basic Competencies Expected of IS Job Applicants 1. Concern for effectiveness 2. Initiative 3. Enthusiasm for work 4. Self-confidence 5. Concern with impact 6. Interpersonal astuteness 7. Conceptual thinking 8. Analytical thinking 9. Effective communication 10. Flexibility 18-
16. Special Attention to Human Factors Ensures That Users’ Needs are Incorporated into Systems Designs 1. Planning phase 2. Analysis phase 3. Design phase 4. Implementation phase 5. Use phase Conduct a market analysis Conduct a product acceptance analysis Conduct a task analysis Conduct prototype tests Conduct operational system tests 18-
17.
18.
19. Integrity Availability Information Unauthorized use Unauthorized disclosure and theft Unauthorized destruction and denial of service Unauthorized modification Security Confidentiality Unauthorized Acts Threaten System Security Objectives 18-
20. Identification Authentication Authorization User Profiles Access control files Database Software library Audit log Report writer Security reports Users Access Control Functions 18-
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32. Donovan’s Four Stages of Decentralized Computing Equipment Big brother A B Helping hand D Network Watchdog C Decentralized Centralized Decentralized Development Decentralized Decision making Centralized 18-