IFT 121 Complete Modules
IFT 121 Complete Modules
2022/2023 SESSION
COURSE OUTLINE
MODULE ONE
1.0 Information System Definition
Information systems use information technology to collect, create, and distribute useful data.
Note that data is the most basic element of any information system.
Hardware refers to physical computer equipment, such as a computer, tablet, or printer, as well
as components like a computer monitor or keyboard.
Software refers to a program or set of programs that tell the computer to perform certain tasks.
Telecommunications networks refer to a group of two or more computer systems linked together
with communications equipment.
Traditionally the term information technology referred to the hardware, software, and
networking components of an information system, the difference is shrinking, with many using
the terms IS and IT synonymously. In Figure 1.1, we show the relationships among these IS
components.
Figure 1.1: An IS use IT to collect, create and distribute data
1.1 DATA
In order to understand how information systems (IS) work, it is important to distinguish between
raw, unformatted data and information.
Unformatted data, or simply data, are raw symbols, such as words and numbers. Data have no
meaning in and of themselves, and are of little value until processed. For example, if someone
gives you a number, 41709, the number is of no value until the context is defined, either for an
NIN number of a Post-office box number.
Knowledge: This is the ability to understand information, form opinions, and make decisions or
predictions based on the information. For example, you know that only one NIN identity number
can uniquely identify each individual, this knowledge can assist you to find out any other
information you need about any individual in the NIN system.
The other IS components are the software, hardware and telecommunication infrastructure.
Computer hardware has replaced physical files storage in filing cabinets. Also, computer
hardware provides the technologies to input and process data and output useful information;
software enables organizations to utilize the hardware to execute their business processes and
competitive strategy by providing the computer hardware with instructions on what processing
functions to perform.
Finally, the telecommunications networks allow computers to share information and services,
enabling the global collaboration, communication, and commerce as we see today.
1.2.1 People
Aside the hardware, software and telecoms equipment, another vital infrastructure is the people.
The IS field includes a vast collection of people who develop, maintain, manage, and study
information systems. These are individuals—whether they are end-users, managers, or IT
professionals—have their own set of skills, attitudes, preconceptions, and personal agendas that
determine what they are able to do and what they will elect to do as part of the IS.
Major features of IS people are their skills, interests, and motivations when designing and
implementing a new IS or when troubleshooting an existing
IS that is not performing as expected.
1.2.2 Process
The process component of an information system is defined here as the series of steps necessary
to complete a business activity.
For example, consider a Store manager. The store manager must follow the following process to
restock his inventory:
Note that any potential discrepancy between the business processes as designed by the
organization and the manner in which it is actually enacted is often the root cause of IS failure.
Hence, when designing a new IS or when confronted with IS failure, identify possible or existing
obstacles that may make it difficult for people to accurately follow the business process.
1.2.3 Organizations:
Having talked about the technology side of information systems: data, information, as well as the
people side of information systems, let us turn to the Organizations that use the IS.
The organizational structure component (or “structure” for short) refers to the organizational
design (hierarchy, decentralized, loose coupling); reporting (functional, divisional, matrix); and
relationships (communication and reward mechanisms) within the information system.
Understanding the structure component is crucial because user resistance, incentive systems, and
relationships are often silent enemies of IS success that go undetected before, and sometimes
even after, IS failure becomes apparent.
Organizations use information systems for the following reasons:
This holds true for all types of organizations you can think of, therefore the four components of
an information system are IT (infrastructure), people, processes, and structure (Organization).
For example, transaction processing systems (TPS) are used by a broad range of organizations to
efficiently process customer transactions, it also generates a tremendous amount of data that can
be used by the organization to learn about customers and product(s) trends. Large data
warehouses are then used to process and analyze the datra to provide purchase recommendations
to future customers.
TPS data also provide input into a variety of information systems within organizations, such as
decision support systems, intelligent systems, data mining and visualization systems, etc.
In the past, these IS categories were distinct within organization. Today, many organizations
have replaced standalone systems with enterprise systems that span the entire organization.
Likewise, with the Internet—and systems integration—connecting separate information systems
and data to improve business processes and decision making—it is difficult to say that any given
information system fits into only one of these categories (e.g., that a system is a management
information system only and nothing else).
In addition, many of these systems are not housed within organizations any more, but are located
“in the cloud,” and accessed via the user’s browser when needed.
Given that many modern-day information systems span several of these IS categories, it is still
useful to understand these categories, in order to gain insight into different approaches, goals,
features, and functions of modern information systems.
Dropping any of the IS components would not work since the components would not work in
isolation but rather they interact with one another. Therefore, the systemic effects, imply that
changes in one component (e.g., the introduction of a new software application, a process
redesign, a new organization chart, or turnover among employees) affect all other components of
the system and, if not properly managed, its outputs.
These data and information are typically accumulated, or stored, for future retrieval and use.
Figure: 1.2: Information processing in an IS
Ethical issues are practices and behavior that surround what is good (ethical) and what is bad
(unethical). Attempting to draw a distinction between good and evil, that is. Due to the rapid
pace of the IT trends and the slow pace of legislation, some formal explicit rules lag behind the
possibilities offered by new technologies.
Ethically, IS officers should focus on good practices by keeping fidelity of information and shun
unethical practices.
To protect your private information, you should always review the privacy policy of all
companies you do business with or interact with over the internet and refuse to do business with
those that do not have a clear policy or do not respect your privacy.
SELF-ASSESSMENT QUESTIONS
1. Name your two favorite mobile devices. For each device, explain how it has enhanced
your work performance.
2. Define and contrast data, information, and knowledge.
3. List and define five types of information systems used in organizations
4. Discuss the issues surrounding information privacy, and how you can protect yourself
5. Describe the difference between information systems and information technology.
6. Define the concept of systemic effects
7. List and describe the primary threats to IS security.
8. Define computer crime and list several examples of computer crime.
9. Why are insider threats particularly dangerous for organizations?
10. Define malware and give several examples Describe the process of managing IS security.
SELF-ASSESSMENT EXERCISES
1. Information systems today are _______.
A. slower than in the past
B. ubiquitous
C. utilized by only a few select individuals
D. stable and should not change
2. Whereas data are raw unformatted symbols or lists of words or numbers, information is _______.
A. data that have been organized in a form that is useful
B. accumulated knowledge
C. what you put in your computer
D. what your computer prints out for you
4. Which of the following was not discussed as a common type, or category, of information system used in
organizations?
A. transaction processing
B. decision support
C. enterprise resource planning
D. Web graphics
5. A Web site asking you for permission to send you a weekly newsletter is an example of _______.
A. opt-in
B. permissions
C. opt-out
D. data privacy
8. A company is said to have ______________ when it has gained an edge over its rivals.
A. monopoly
B. profitability
C. competitive advantage
D. computer advantage
9. Each of the following was described in this module as a source of competitive advantage except for
______________.
A. delivering superior customer service
B. achieving lower cost than rivals
C. being the subject of a hostile takeover
D. having shorter lead times in developing and testing new products
SOLUTION TO EXERCISES
1. B 2. A 3. B 4. D 5. A 6. D 7. A 8. C 9. C 10. B
MODULE TWO
The burden of managing IS facilities fall on the stakeholders such as the management staff
(Chief executive), and IS experts who meet regularly to provide guidance to the IS function.
The first step in process organizing is to identify and divide tasks or work to be done into smaller
units and avoid duplication of work.
Note that information systems and technology infrastructure work together for process
integration strategies to be realized (or feasibly implemented). The term system integration
refers to the synergy of IT-enabled information systems and databases.
Behind every BPM initiatives are information systems that enable the streamlining of business
processes. Hence, IS consultants and business analysts who have a sound understanding of the
business but who are also well versed in technology are engaged to accomplish BPM.
Thus, ERP applications access information from a central information repository. For example,
inventory information is accessible not only to inbound logistics and operations, but also to
accounting, sales, and customer service personnel.
Storing data in a single place and making it available to everyone within the organization
empowers everyone in the organization to be aware of the current state of business and to
perform their jobs better. Examples ERP systems are SAP, Globus (an enterprise-wide banking
application) and Microsoft Suite.
2.6 GREEN IS
The Environmental impact of use, disposal and emission of IT (eWaste) from IT equipment from
data centres and the desire to preserve the natural environment led to the creation of the term
“Green IT” and/or “Green IS”.
Thus, Green IT (or IS) initiatives and practices are focused on minimizing the direct impact of
IT production and use on the environment.
Note however, that Internet and World Wide Web (or web) are not the same.
The Internet is the infrastructure upon which many services are made available including the web
itself! So, the web is one of the internet services.
Crimes in the form of electronic vandalism using virus codes, causing computer systems to
crash, or deny service on a Web site, unauthorized access, information modification. Aside from
hackers, others disasters that can happen to information systems are accidents caused by natural
disasters, fire outbreak, inexperienced users, or mistakes, caused maliciously or intentionally by
crackers.
1. Assessing risks
2. Developing a security strategy
3. Implementing controls and training
4. Monitoring security
In addition, organizations should continuously watch for emerging threats, vulnerabilities and so
as to update risk assessments and strategies, and implement additional controls.
SELF-ASSESSMENT QUESTIONS
1. What is an enterprise system (ES)?
2. Explain how enterprise application integration (EAI) works
3. Define the following terms: business intelligence, business intelligence infrastructure,
data warehouse, data mart, OLAP, and data mining
4. How do an organization’s resources and capabilities result in a competitive advantage?
5. What are core business processes?
6. What are the core components of an ERP system?
7. How do applications support organizational business processes?
8. For which purposes are data stored in organizations?
9. What are the major types of networks?
10. What is the World Wide Web, and what is its relationship to the Internet?
SELF-ASSESSMENT EXERCISES
1. ______________ is using technology as a way to help complete a task within an organization faster and, perhaps,
more cheaply.
A. Automating
B. Learning
C. Strategizing
D. Processing
2. What is the process of choosing, matching, executing, and assessing innovative technologies called?
A. environmental scanning
B. disruptive innovation cycle
C. strategic planning
D. none of the above
3. ______________ are information systems that allow companies to integrate information and support operations
on a company-wide basis.
A. Customer relationship management systems
B. Enterprise systems
C. Wide area networks
D. Interorganizational systems
4. All of the following are true about legacy systems Except ______________.
A. they are standalone systems
B. they are older software systems
C. they are ERP systems
D. they may be difficult to integrate into other Systems
5. Information systems that focus on supporting functional areas, business processes, and decision making within
an organization are referred to as ______________.
A. legacy systems
B. enterprise-wide information systems
C. interorganizational systems
D. internally focused systems
8. What is the common rule for deciding if an information system faces a security risk?
A. Only desktop computers are at risk.
B. Only network servers are at risk.
C. All systems connected to networks are vulnerable
to security violations.
D. Networks have nothing to do with computer security.
9. Those individuals who break into computer systems with the intention of doing damage or committing
a crime are usually called ______________.
A. hackers
B. crackers
C. computer geniuses
D. computer operatives
10. Which of the following does not pose a threat to electronic information?
A. unauthorized access
B. jailbreaking one’s mobile phone
C. unauthorized information modification
D. all of the above can compromise information
SOLUTION TO EXERCISES
1.A 2.B 3.B 4.C 5.D 6.A 7.B 8.C 9.B 10.D
MODULE THREE
The main components of a BI infrastructure are data warehouses, data marts, query and reporting
tools, online analytical processing (OLAP), and data mining.
A typical cloud computing provider adopts a utility billing model, whereby the user only pays for
the usage of the service on an as-needed basis, and pay only for what is actually used. Cloud
computing thus helps to transform IT infrastructure costs from a capital expenditure to an
operational expenditure Cloud computing is differentiated along three main delivery modes: the
application (SaaS), the platform (PaaS), and the infrastructure (IaaS) (aaS means “as a
service”).
Microsoft Access is an example of a popular DBMS for personal computers. It allows individuals or small
groups to create and manage relatively small databases. In the DBMS, the individual database is a
collection of related attributes about entities. An entity is something you collect data about, such as people, students
or classes.
Typically, a DBMS can manage hundreds or even thousands of records (or tables)
simultaneously by linking the tables as part of a single system. A DBMS gives a database
administrator the tools to manage the data (e.g., protect the data through authentication, schedule
backups).The database can therefore be shared among multiple applications, and users. Since
every client is running the only copy of the application and database rather than separate
instances, any update is immediately and automatically propagated to all users
SELF-ASSESSMENT QUESTIONS
1. Describe how cloud computing can improve your personal productivity.
2. Describe the difference between information systems and information technology.
3. What are the principal challenges associated with information systems ethics?
4. Define and provide an example of each of the different types of intrusion threats.
5. What is an enterprise system (ES)?
SELF-ASSESSMENT EXERCISES
3-21. The ability to adapt to increases or decreases in demand for processing or storage is referred to as
______________.
A. adaptability
B. flexibility
C. scalability
D. agility
3-23. For the most flexibility in the use of computing resources, companies choose a (n) ______________
provider.
A. utility computing
B. software as a service
C. platform as a service
D. infrastructure as a service
1-21. Being _______, or knowing how to use the computer as a device to gather, store, organize, and process
information, can open up myriad sources of information.
A. technology literate
B. digitally divided
C. computer literate
D. computer illiterate
MODULE FOUR
Definition The definition phase of the SDLC is concerned with clearly identifying the features of
the proposed information system by liaising with the IS end-users.
Build The build phase of the SDLC is the most technical, and this is when software developers
designed and developed the application software according to the system requirements.
Implementation Once the software has been developed and tested, the project team needs to
ensure that it is properly integrated with the other components of the information system.
Risk mitigation is the process of matching the appropriate response to the security threats an
organization had identified. Risk mitigation allows an organization to devise the optimal strategy
to neutralize the effects of the set of security risks (or threats) it had identified.
Once an organization had identified some risks (or threats), the organization has three
mitigation strategies to respond to the risks. The strategies are: Risk acceptance, Risk reduction,
and Risk transference.
Risk acceptance. This strategy means not investing in countermeasures and not reducing the
security risk. The organization is aware of the risks and it is ready to bear the risks.
Risk reduction. This strategy involves taking measures to mitigate the identified risks (or
threats).
Risk transference. This strategy consists of passing a portion (or all) of the Identified risks to a
third party (e.g. buying insurance policy).
External risks are those risks inflicted by the outsiders on the organization’s information
systems. Examples are virus threats, external intrusion into IS, backdoor and security weakness,
etc.
SELF-ASSESSMENT QUESTIONS
1. What are the four phases of the systems development life cycle (SDLC)?
2. What are the three major components/tasks of the systems design phase of the SDLC?
3. List and describe the primary threats to IS security.
4. Define malware and give several examples.
5. Describe the process of managing IS security.
SELF-ASSESSMENT EXERCISES
1. Which of the following is not one of the four phases of the systems development life cycle?
A. systems analysis
B. systems implementation
C. systems design
D. systems resource acquisition
3. Which of the following is the correct order of phases in the systems development life cycle?
A. analysis, planning, design, implementation
B. analysis, design, planning, implementation
C. planning, analysis, design, implementation
D. design, analysis, planning, implementation
5. ______________ is the process of encoding messages before they enter the network or
airwaves, then decoding them at the receiving end of the transmission so that recipients can read
or hear them.
A. encryption
B. biometrics
C. authentication
D. disaster recovery
6. Which of the following is the process of determining the true, accurate identity of a user of an
information
system?
A. audit
B. authentication
C. firewall
D. virtual private network
7. Limiting access to electronic information usually involves ______________.
A. something you have
B. something you know
C. something you are
D. all of the above
REFERENCES
1. HBR Analytic Service. (2014). Driving digital transformation: New skills for leaders, new
role for the CIO. Boston, MA: Harvard Business School Press.
2. Hilbert, M., & Lopez P. (2011, April 1). The world’s technological capacity to store,
communicate, and compute information. Science, 60–65.
3. HBR Analytic Service. (2012). Innovation from efficiency: Unlocking the value in IT systems.
Boston, MA: Harvard Business School Press.
4. Hofstede, G., Hofstede, G. J., & Minkov, M. (2010). Cultures and organizations: Software of
the mind. Revised and expanded ed. New York, NY: McGraw-Hill.
5. Birst, S. J. (2014, August 21). The battle of business intelligence: Data discovery vs.
traditional BI. Wired. Retrieved from
http://www.wired.com/insights/2014/08/battle-business-intelligence-datadiscovery-
vs-traditional-bi/
6. Chen, H., Chiang, R. H. L., and Storey, V. C. (2012). Business intelligence and analytics:
From big data to big impact. MIS Quarterly, 36(4), 1165–1188.
7. Smith, H. J., Dinev, T., and Xu, H. (2011). Information privacy research: An interdisciplinary
review. MIS Quarterly, 35(4), 989–1015.
8. Morey, T., Forbath, T. “Theo,” and Schoop, A. (2015, May). Customer Data: Designing for
Transparency and Trust, Harvard Business Review. Retrieved
from https://hbr.org/2015/05/customer-data-designing-for-transparency-andtrust.
SOLUTION TO EXERCISES
1. D 2. A 3. C 4. B 5. A 6. B 7. D 8. C 9. D 10. C