Week06 MidtermReview BS 2024F
Week06 MidtermReview BS 2024F
Information Systems
Mid-term Review
Chapters 1 ~ 5, 12
Time, Location, and Format
Chapter 1 to 5, Chapter 12
Multiple Choice: 30 questions, 1.5 marks each, 45 marks in total.
True or False: 5 questions, 1 mark each, 5 marks in total
Short answer questions: 5 questions, 50 marks in total
Chapter 1: Introduction to Information Systems
Informed Users
Who is an informed user?
An informed user is a person knowledgeable about IS and IT.
In general, informed users obtain greater value from whichever
technologies they use.
Consist of
Hardware
IT
Software Components
Databases
Networks
Non-IT
Procedures Components
People
Chapter 1: Introduction to Information Systems
IT Components
Hardware consists of devices such as the processor, monitor,
keyboard, and printer. Together, these devices accept, process, and
display data and information.
Software is a program or collection of programs that enables the
hardware to process data.
A database is a collection of related files or tables containing data.
A network is a connecting system (wireline or wireless) that
enables multiple computers to share resources.
Procedures are the instructions for combining these components
to process information and generate the desired output
People use the hardware and software, interface with it, or utilize
its output
Chapter 1: Introduction to Information Systems
IT Components
IT components form the
information technology platform.
IT personnel use these components
(IT platform) to develop information
systems, oversee security and risk,
and manage data.
These activities cumulatively are
called information technology
services.
The IT components plus IT services
compose the organization’s
information technology
infrastructure.
At the top of the pyramid are the
various organizational information
systems.
Chapter 1: Introduction to Information Systems
Different Types of IS
Each Functional Area
Information System (FAIS)
(also known as a departmental
information system) supports a
particular functional area within
the organization:
Human resources (HR)
Accounting
Finance
Marketing
Production/operations
Chapter 1: Introduction to Information Systems
Different Types of IS
Two information systems support
the entire organization:
Market pressures
Globalization
Changing nature of the workforce
Powerful customers
Technology Pressures
Technological innovation and obsolescence
Information overload
Chapter 2: Organizational Strategy, Competitive
Advantage, and Information Systems
Business Pressures
Societal/political/legal pressures
Social responsibility
Some corporations and individuals are willing to spend time and money
to address various social problems. These efforts are known as
organizational social responsibility or individual social responsibility.
E.g., Green IT, Digital Divide
Compliance with government regulations
Utilitarian approach: An ethical action is the one that provides the most good or
does the least harm.
Rights approach: An ethical action is the one that best protects and respects the
moral rights of the affected parties.
Moral rights can include the rights to make one’s own choices about what kind of
life to lead, to be told the truth, to not to be injured, and to enjoy a degree of
privacy
Fairness approach: Ethical actions treat all human beings equally, or, if unequally,
then fairly, based on some defensible standard.
Common good approach: Respect and compassion for all others is the basis for
ethical actions. It emphasizes the common conditions that are important to the
welfare of everyone
Deontology approach: The morality of an action is based on whether that action
itself is right or wrong under a series of rules, rather than based on the consequences
of that action.
Chapter 3: Ethics and Privacy
Tenets of Ethics
Fundamental tenets of ethics include:
Responsibility means that you accept the consequences of your
decisions and actions.
Accountability refers to determining who is responsible for
actions that were taken.
Liability is a legal concept that gives individuals the right to
recover the damages done to them by other individuals,
organizations, or systems.
2. Alien software
Alien software is clandestine software that is installed on your
computer through duplicitous methods. It typically is not as
malicious as viruses, worms, or Trojan horses, but it does use up
valuable system resources. It can also enable other parties to track
your Web surfing habits and other personal behaviours.
Adware, spyware, spamware, cookies
Chapter 4: Information Security and Controls
Deliberate threats
1. Supervisory control and data acquisition (SCADA) attacks
Attacking large-scale distributed measurement and control system
SCADA systems are used to monitor or to control chemical, physical, and
transport processes such as those used in oil refineries, water and
sewage treatment plants, electrical generators, and nuclear power plants
in August 2017, there was a SCADA attack on a petrochemical plant in
Saudi Arabia. Security experts determined that the attack was
intended to cause an explosion.
Risk Analysis
assessing the value of each asset being protected
estimating the probability that each asset will be compromised
comparing the probable costs of the asset’s being compromised
with the costs of protecting that asset
Chapter 4: Information Security and Controls
Risk
Risk Mitigation
Risk acceptance: Accept the potential risk, continue
operating with no controls, and absorb any damages that
occur
Risk limitation: Limit the risk by implementing controls that
minimize the impact of the threat
Risk transference: Transfer the risk by using other means to
compensate for the loss, such as by purchasing insurance
Chapter 4: Information Security and Controls
Control Evaluation
The organization identifies security deficiencies and calculates
the costs of implementing adequate control measures to
compare against the value of those control measures.
If the costs of implementing a control are greater than the value
of the asset being protected, the control is not cost effective
Chapter 4: Information Security and Controls
Categories of Controls
Control environment (Most Important)
The control environment encompasses management attitudes
toward controls, as evidenced by management actions, as
well as by stated policies and procedures that address ethical
issues and the quality of supervision.
General controls
General controls apply to more than one functional area.
Physical controls, access controls, and communications
controls
Application controls
Controls specific to one application, such as payroll, are
application controls.
Chapter 4: Information Security and Controls
Access Control
Data rot: Problems with the media on which the data are stored
Temperature, humidity, and exposure to light can cause
physical problems with storage media and thus make it
difficult to access the data.
Finding the machines needed to access the data could be
difficult.
Chapter 5: Data and Knowledge Management
Timeliness: It is the time lag between actual event time vs. the
event captured in a system to make it available for use.
ASAP
Validity: Data validity describes the closeness of data value to
predetermined values or a calculation.
A liquor shop cannot have a customer who is less than 19
years old.
Chapter 5: Data and Knowledge Management
Knowledge and knowledge management
Knowledge management (KM) is a process that helps organizations
manipulate important knowledge that makes up part of the
organization’s memory, usually in an unstructured format.
Explicit knowledge deals with more objective, rational, and technical
knowledge.
Codified and documented in a form that can be distributed to others
or transformed into a process or a strategy.
E.g., an organization’s policies, procedural guides, reports, products,
strategies, goals, core competencies, and IT infrastructure of the
enterprise
Tacit knowledge is the cumulative store of subjective or experiential
learning.
Generally imprecise and costly to transfer
Highly personal, difficult to formalize or codify
E.g., an organization’s experiences, insights, expertise, know-how,
trade secrets, skill sets, understanding, learning, and culture.
Chapter 12: Data Analytics