Chapter 7 System Development
In developing a system required an approach called systems approach. System approach is the approach used to solve the problem. This approach consists of three stages: preparation efforts, definitions and solutions. Preparation efforts are efforts to solve the problem by providing a solution that provides orientation system. In the preparation of this effort, there are several steps : see enterprise as a system, recognize and identify environmental systems in enterprise subsystems.
The second stage is the definition. Consists of two steps proceed from the system level to subsystem and system to analyze the parts of a particular sequence. The third stage is the solution consists of the following steps: identify alternative solutions, evaluate alternative solutions, choosing the best solution, implement the solution and follow up to ensure the solution is effective.
When the approach used to develop a system is called the system development life cycle (SDLC). This approach consists of five types are as follows: planning, analysis, design, implementation, and use.
There are several key terms in the development of the system including the following: Prototyping is one version of a system that gives an idea of potential bag developers and potential users how the system will function in a form that has been completed. RAD is a system similar to prototyping system that provides a fast response to user needs, but in a broader scope. Phased development of a systems approach that uses information system consisting of six stages early stages of investigation, analysis, design, initial construction, final construction, as well as the testing and installation of the system. business process re-design is a the process
Chapter 8 Information In action
In practice, information systems have a key process that determines a business organization can be run well or will lead to the failure. This is called the key to success or critical success factor CSF. In an organization that uses modern information system will have a system called the Organizational Information system.
Organization’s information system is a system that provides information on the company’s business areas consist of financial, human resources, information services, manufacturing and marketing using the data base used by the system plus the data processing that occurs from sources other data. To produce information used by managers.
One of the information systems that facilitate business activity is CRM (customer relationship management). CRM is the basis of the data entered into the model of transaction processing systems and marketing information systems. Customer relationship management can be defined as a management that governs the relationship between the company and customers so that both companies and customers will receive the maximum benefit from this relationship. This strategy realizes that foster long-term relationships with customers is a good strategy, because it maintains the existing usually cheaper than getting new customers.
Inside the store a variety of information systems, the existence of the data Warehousing. Data warehousing is a place where the data accumulated over years it will be a large volume of data. Only time lately using computer technology can help the system this large data storage.
Warehousing data system is a major part of data warehousing that inserts into the warehouse and transmit the information to the user. Data collected from the data sources and sent to the collection area before being fed into the data warehouse storage. An information delivery system will acquire data from a data storage warehouse and turn it into information to users.
Chapter 9 Security System Data
Information security is a term used to describe both the protection of computer and non-computer equipment, facilities, data, and information from misuse of the parties who are not authorized. The purpose of this system is the security of confidential information, the availability of information and the integrity of the information.
Then the information security management (ISM) is the activity of keeping the resource information remains safe. While activity to keep the company and its information resources and still function is called with business continuity management (BCM). In the information security management strategy consists of four stages. The first stage identified the threat, then identify risks, determine the latest information security policies and implement control.
Threat is a person, organization, or event mechanism, which has the potential to harm the company’s information resources. Threats can be divided into two, the first is the threat of origin is based on internal threats and external threats both intentional threat by the threat of accidents and intentional threats. Types of threats that are on there are some kinds of software: Malware, Viruses, Adware, worms, Trojan horse, and spyware.
Risk is the potential output which is not expected by information security breaches of information security threats. Information security risks can be divided into four are : the unauthorized disclosure and theft, unauthorized use, unauthorized destruction and denial of service and unauthorized modifications last.
Data security required as well in control. Control is a mechanism that is applied both to protect the company from risk and minimize the impact of such risks on the company if the risk occurs. This control is divided into three categories: engineering controls, formal control and informal control.
Chapter 10 Ethical Implications of Information Technology
Human behavior is always guided by moral ethics, and law. By understanding the ethical, moral and human law is always well behaved and does not violate the existing rules. Moral behavior is a tradition of beliefs about right and wrong. Morale is a social institution with a history and a set of rules. While ethics comes from the Greek ethos meaning character. Ethics is a set of beliefs, standards, or role model direct and pervasive to the mind of a person or the public. Law is formal regulations set by the competent authority of the government as a subject or citizen.
Culture of ethics applied in the company in several ways is through the corporate credo, ethics programs, customized corporate code of ethics. The reason why the use of the computer ethics has an important role are: flexibility logically, the transformation factors, factors not visible. Social rights on the computer using some of them: the right to privacy, property rights, right to the accuracy, and the right to have this access.
Code of ethics is a rule that must be followed and be made to regulate the behavior of its members.
Chapter 11 Decision Support System
Decision Support System is a system which is designed to assist managers in resolving specific problems. Keywords in the DSS is located in the Help. DSS made are not intended to solve the problem but to assist managers in these issues. The basic idea is that the creation of this system managers and computer to work together to confront the problems faced. The types of problems that can be solved in this program is a semi-structured problems. Computers can solve problems related to structured problems, while managers resolve unstructured problems.
When a decision support system is only used by a manager or just a certain part in the decisions is called to DSS (Decision Support System), but if the system is used to gather then called GDSs (Group Decision Support System). GDSS is a computer-based system that helps a group of people to perform a task or achieve a common goal and give the shared interface.
Chapter In Loudon: Knowledge Management
Knowledge management Refers to the set of business processes developed in an organization to create, store, transfer, and apply knowledge. Knowledge management increases the ability of the organization to learn from its environment and to incorporate knowledge into its business processes. We in the knowledge management should be able to distinguish between the data, information, knowledge and wisdom. Data a flow of events or transactions captured by an organization’s systems that, by itself, is useful for transacting but little else. To turn the data into useful information, a firm must expend resources to organize the data into categories of understanding, such as monthly, daily, regional, or store-based reports of total sales. To transform information into knowledge, a firm must expend additional resources to discover patterns, rules, and contexts where the knowledge works. Finally, wisdom is thought to be the collective and individual experience of applying knowledge to the solution of problems. Wisdom involves where, when, and how to apply knowledge.
Knowledge can be divided into two. Knowledge residing in the minds of employees that has not been documented is called tacit knowledge, whereas knowledge that has been documented is called explicit knowledge.
Dimension of knowledge is knowledge is a firm asset, Knowledge has different forms, has a location Knowledge, Knowledge is situational. Knowledge value chain is a chain of knowledge from knowledge gained through knowledge used within the company. In the knowledge value chain information system there are several activities the Knowledge acquisition, Knowledge stores, dissemination Knowledge, Knowledge application.