Professional Documents
Culture Documents
Ilovepdf Merged
Ilovepdf Merged
7th EDITION
CHAPTER 1
MANAGING IT IN A DIGITAL WORLD
1
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall
1-1
MANAGING INFORMATION TECHNOLOGY, 7e
.
and
Part I
• Technologies available today and emerging technology trends for
hardware, software, networks and data
Part II
• Software applications to support business operations and business
intelligence, as well as e-business applications
Part III
• “Best practices” for acquiring and implementing new systems and
managing IT projects
Part IV
• Planning and managing an IS department’s resources, as well as
managing information security; social/ethical/legal issues
• By the Year 2000, the total annual cost of IT purchases was more
than half of the annual capital expenditures of businesses in
developed countries
• Integrated
- Standardization has enabled more integration
- Many “standards” are just de facto standards (Microsoft
Windows, Office, Internet Explorer)
- Many companies have benefitted from “Enterprise Systems”
investments (e.g., electronic health records in hospitals)
Enterprise Systems:
Software packages with integrated modules that pass
common business transactions across groups,
divisions, and geographic locations in “real time”
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall
1-7
RECENT INFORMATION TECHNOLOGY TRENDS
• Computer Software: Integrated, Downloadable, Social
• Downloadable
- Bit-size software programs for smart phones downloadable
from App stores
- Download speeds have increased so that even large files can
be downloaded by users
• Social
- Growth of Web 2.0 (social media) applications (such as
Facebook, LinkedIn)
- Used by companies for marketing and branding activities
- Collaboration tools connect employees across distance
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall
1-8
RECENT INFORMATION TECHNOLOGY TRENDS
Consumer high-
Wireless Internet
Introduction of the speed Internet Number of Internet
ARPANET created connections widely access common in
World Wide Web users tops 1 billion many locations
(late 1960s) available
(early 1990s) (2005) (today)
(early 2000s)
• Pros
- Flexibility
- Work-life balance
• Cons
- Feelings of being isolated
- Concerns about job promotion opportunities
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall
1-11
NEW WAYS TO WORK
• New ways for people to work using IT, continued:
• Pros
- Workers can be located anywhere
- Teams can be composed of members with specialized
skills from different business units or companies
• Cons
- Coordination across team members more difficult
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall
1-12
NEW WAYS TO WORK
• New ways for people to work using IT, continued:
• Pros
- Work may change more than when an employee of a
single organization
• Cons
- Lack of benefits
- Unpredictability in scheduling and work
• Example: IS Organization in
Support Mode
• Example: IS Organization in
Strategic Mode
• IT leaders have to work closely with the senior managers o keep the
• In many organizations, the senior IT leader is a CIO.
company’s IT resources aligned with the business goals
Chief Information Officer (CIO):
A firm’s high-level general IT manager with both technology
and business leadership experience. Together with the
organization’s executive management team the CIO ensures the
alignment of IT resources with business goals and plans for
integration of IT for strategic advantage.
CHAPTER 2
COMPUTER SYSTEMS
-HARDWARE
-SOFTWARE
• Hardware:
• Software:
Input:
• Device(s) needed to enter
data into the computer for it
to use in computations and
comparisons
• Terminal
Output:
• Device(s) needed to produce
results in a usable format
Video Display
Disk Drive
Microfilm
Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 2-10
BASIC COMPONENTS OF COMPUTER SYSTEMS
Memory:
• Referred to as main memory or
primary memory
• All data flows to and from
memory
• Divide into cells
- Each has a unique address
- Can only store limited amount
of data
-Byte: stores one character of data
-Word: stores two or more
characters of data
Memory
Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 2-11
BASIC COMPONENTS OF COMPUTER SYSTEMS
Memory:
Memory:
• Each memory cell is a set of circuits
• Each circuit is on or off (represented by 1 or 0)
• Each circuit corresponds to a bit (binary digit)
• Most computers – 8 bits (circuits) represents a character (byte)
• 2 common bit coding schemes used today:
- ASCII
- EBCDIC
Arithmetic/Logical Unit:
• Carries out:
- Mathematical operations
(addition, subtraction,
multiplication, division)
- Logical operations
(number comparisons)
Arithmetic/Logical Unit:
ALU Circuits
Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 2-15
BASIC COMPONENTS OF COMPUTER SYSTEMS
Computer files:
• File devices used to store vast
quantities of data
• Main memory is limited,
volatile and expensive
• Advantages:
- File devices or secondary memory
are used to store additional data that
is non-volatile
• Disadvantages:
- It has relatively slow speed
• Storage Devices:
- Magnetic tape drives, disk drives,
floppy drives
- Optical CD or DVD drives
• Types of DASD:
• Removable drives
- Floppy Drives
- Zip Drives
- Flash (keychain) Drives
Control unit:
• Controls the other five
components of the computer
system
• Used to take advantage of speed
and capacity of other
components
• List of operations, called a
program, tells the control unit
what to do
• These operations are read from
memory, interpreted, and
carried out one at a time
(stored- program concept)
Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall Table 2.1 2-21
TYPES OF COMPUTER SYSTEMS
Microcomputers:
• For personal computing
• Can generally be carried or moved by one person and only
have one keyboard and display unit
• Examples:
- Desktop PC
- Laptop or notebook
- Handheld or personal digital assistant (PDA)
- Tablet PC
Microcomputers:
Microcomputers, continued:
Midrange systems:
1. Workstations
- Microcomputers with more powerful chips than PCs
- Reduced instruction set computing (RISC) chip yielded
greater performance because it was specialized
2. Minicomputers
- Less powerful and less expensive than mainframe systems
- Used for departmental computers & office automation
Midrange Systems
Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 2-25
TYPES OF COMPUTER SYSTEMS
Midrange systems - today:
• Servers for client/server applications, Web server, etc.
- Low-end
- Essentially high-powered PCs
- Typically built on Intel Pentium, Celeron, Xeon or AMD
processors
- Often run Windows Server software
- High-end
- Powered by RISC processors or top-of-the-line Intel or
AMD processors
- Usually run Linux or some variation of UNIX
Mainframe Computers:
Supercomputers:
• “Number-crunchers” at 250K MFLOPS
• Handle problems generated by research scientists
• High-end supercomputers located in government, R&D labs,
major universities
• Cost: $1 - $100 million
• One of fastest supercomputers (IBM Blue Gene/P):
294,912 processors and can achieve speed of 1 petaflop
1. Applications software
2. Support software
- Word Processing
- Spreadsheets
- Database Management Systems
- Presentation Graphics
- Electronic Mail and Groupware
• Database
- Is a shared collection of logically related data organized to
meet organizational needs
- MS Office Example : Access
• Presentation graphics
- Used to create slide shows for business presentations
- All allow embedding of clip art, photos, graphs, and other
media
- MS Office Example: PowerPoint
• Electronic mail
• Groupware
- Incorporates e-mail and other productivity features, such as
calendaring, scheduling, and document sharing
WWW Browsers
• Used to access information (navigate) on the WWW from
computers that can access the Internet
- Hypertext-based approach (to link text and media objects to
each other)
• Pull technology: browser requests a Web page before it is
sent to client
• Push technology: data sent to client without requesting it
(such as e-mail, spam, software patches)
• Examples:
Internet Explorer (Microsoft), Firefox (Mozilla), Safari (Apple)
• Multiprocessing: work that takes place when two or more CPUs are installed
on same computer system
• Virtual Memory:
- Optimizes management of main memory by switching in
and out portions of programs from DASD
-- Permits multiprogramming to operate more efficiently
1950s - FORTRAN
1960s - COBOL (COmmon Business Oriented Language)
BASIC
1970s – C
• HTML
- Used to create Web pages
- Consists of special tags that tell the Web browser how to display
various elements on a Web page (e.g., bold-faced or italic text,
image location, links to other Web pages)
HTML Example
• XML
- Used to facilitate data interchange among Web applications and
Web services
- Meta language consisting of tags that identify particular data
elements
Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 2-53
EXAMPLES
XML Example
Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 2-54
SUPPORT SOFTWARE
Data Dictionary/Directory
- Repository for data definitions used by a Database
Data Warehouse
- Very large database or collection of databases for decision
support that use a DBMS optimized for analytics (including
data mining)
2. Network
• Data are arranged like cities on a highway system, often with
several paths from one piece of data to another
• Example: Computer Associates’ CA-IDMS
3. Relational
• Most common type
• Data arranged in simple tables
• Records related by storing common data in each associated
table
• Examples: Microsoft Access and SQL Server, Paradox,
DB2, and Ingres
Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 2-59
SUPPORT SOFTWARE
DBMS Architectures
4. Object- Oriented
• Data can be graphics, video, and sound as well as simpler
data types
• Attributes and methods are encapsulated in object classes,
and relationships between classes can be shown by nesting
one class within another
• Examples: Versant Object Database, Progress ObjectStore,
and Objectivity/DB
5. Object-relational
• Hybrid approach that can handle complex data types with the
simplicity of the relational model
• Examples: Oracle, IBM’s DB2 and Cloudscape, and FFE
Software’s First SQL/J
FTP
Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 2-63
KEY SOFTWARE TRENDS
Hardware firms
• Have been expanding by adding services (including acquiring
established consulting firms)
• Major players:
- US: IBM, Hewlett-Packard, Dell , Apple
- Non US : Acer, Lenovo, Toshiba, Fujitsu, Sony
Software firms
• Have been expanding by developing new products and acquiring
smaller software companies
- IBM bought Cognos; SAP bought Business Objects
- Oracle bought PeopleSoft and Salesforce.com
- Oracle also bought Sun (hardware and Java)
Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 2-65
COPYRIGHT
All rights reserved. No part of this publication may be reproduced, stored in a retrieval
system, or transmitted, in any form or by any means, electronic, mechanical,
photocopying, recording, or otherwise, without the prior written permission of the
publisher. Printed in the United States of America.
CHAPTER 3
TELECOMMUNICATIONS AND NETWORKING
NETWORKING:
The electronic linking of geographically dispersed devices
TELECOMMUNICATIONS:
Communications at a distance, including voice and data
- Also referred to as: data communications, datacom,
teleprocessing, telecom, and networking
Example: AT&T
2. Sharing of data:
• Enables retrieval of data stored on other nodes in the network
• Allows efficient transactions between businesses, their suppliers,
and their customers, based on up-to-date data
• Some businesses share many terabytes of data per day
• Sharing of data via Internet users
Client/server systems
• A type of distributed system in which the processing power is
distributed between a central server and a number of client
computers
Transfer of Data
Client Server
4. Enhanced communications:
• Telecommunication networks provide the ability to communicate
through Email, Bulletin Boards, Blogs, Instant Messaging, Wikis,
Social network sites, Videoconferencing
• Links between organizations can lead to strategic alliances
o SABRE airline reservation system
o Electronic data interchange (EDI)
5. Marketing outreach:
• Sharing data via the Internet with consumers = an important
marketing and sales channel
Table 3.1
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 3-11
ANALOG AND DIGITAL SIGNALS
• Analog Signals
A signal in which some physical property continuously varies
across time
• Digital Signals
A signal that is not a continuous function of time, but rather
a series of discrete values that represent ones and zeros
• Solutions:
• Modem (Modulator/Demodulator)
• Digital networks
• Advantages of lower error rates and higher speeds
• Simplex
Data can only travel in one direction
• Half Duplex
Data can travel in both directions, but not simultaneously
• Full Duplex
Data can travel in both directions at once
Twisted Pair
• Literally, wires that are twisted to reduce interference
• Can be shielded (STP) or unshielded (UTP), but the most
commonly used is UTP
• Medium used for public telephone networks
• Transmission speeds vary greatly
Figure 3.2
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 3-18
TRANSMISSION MEDIA
Wireless
• Not truly a transmission medium, but rather a broadcast
technology in which radio signals are sent through the air
• Cordless telephones and cellular telephones now widely used
• Wireless technologies:
• Wireless LANs
• Microwave
– Line of sight
• Satellite
– Long distances
– Line of sight
• RFID
• Bluetooth
Wireless Cards
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 3-19
TRANSMISSION MEDIA
Wireless
• Wireless LANs
- Growing in popularity
- Useful when wiring is not possible
- Slower than some wired solutions
- Allow mobile devices to connect to network
Wireless
• Microwave
- Widespread use for several decades
- Line of sight transmission
- Limited to 25-50 mile distances because of curvature of
the earth
- Expensive, but less costly than fiber optic cables
Microwave Tower
Wireless
• Satellite
• Iridium
- First major LEO project with 66 satellites
- Faced high operating costs which resulted in bankruptcy
- Mostly military subscribers
• Globalstar
- LEO project with 40 satellites that does not provide global coverage
• Teledesic
- Ambitious project with original plans to launch 840 satellites
- This was later cut to 288 satellites, then 30, and then the program
was cancelled
Wireless
• RFID
- Acronym for Radio Frequency Identification
- An old technology that became popular in business after
Wal-Mart required the use of RFID by some of its
suppliers to improve inventory and supply chain
management
Wireless
• RFID
• Two Broad Types of RFID tags:
- Active – these tags have their own power supply and can
transmit messages continuously, on request, or on a schedule
Cost over $1.00
Wireless
• Bluetooth
• Named after Danish King who united Denmark
• Short-range radio technology
• Designed to consume very little electrical power and be
produced at a low cost
• Found in a growing number of devices such as cell phones,
laptops, headsets, keyboards, mice, and home appliances
- Thousands of Bluetooth products in use today
Bluetooth Devices
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 3-26
TRANSMISSION MEDIA
Fiber Optics
• Bus
- All devices are attached to one cable
- Single-point failure
• Ring
- Similar to bus, but ends are attached
- Not susceptible to single-point failure
• Star
- All nodes are attached to central device
- Susceptible to failure of central device, but easy to
identify cable failure
• Tree
- Similar to the star, but with a hierarchical structure
• Mesh
- Devices link to multiple other devices
- A failure has little impact on the network, but costly
Figure 3.4
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 3-29
NETWORK TYPES
Six types:
Figure 3.5
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 3-31
NETWORK TYPES
o WiMAX (802.16e)
- Newest of the network types
- Similar to Wi-Fi, but operates over longer distances and at
higher speeds
3. Backbone Networks
• Connect LANs
• Key to internetworking
Figure 3.8
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 3-38
BACKBONE NETWORK DEVICES
Hardware devices for backbone (middle-distance) networks
•Hub: Simple device that forwards all messages to every device
attached to it
•Wireless Access Point: Central device that connects wireless LAN to
other networks
•Bridge: Connects two LAN segments and only forwards messages
that need to go to other segment
•Switch: A multiport bridge; connects two or more LAN segments
•Router: Connects two ore more LANs and only forwards messages
that go to the other LAN
- Switched Circuit
- Dedicated Lines
- Packet-switched
• Advantages
- Efficient use of network
- Can be high capacity
• Disadvantages
- Packets may arrive in different
order or with delay
Figure 3.9
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 3-43
NETWORK TYPES
5. The Internet
Internet Applications
6. Internet2
• Network Protocols
– An agreed-upon set of rules or
conventions governing communication
among elements of a network
– Open Systems Interconnection (OSI)
Reference Model
• Skeleton for standards developed by
International Organization for
Standardization (ISO)
• Conceptual framework to understand
how communications in networks
take place
Figure 3.11
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 3-47
NETWORKING PROTOCOLS
All rights reserved. No part of this publication may be reproduced, stored in a retrieval
system, or transmitted, in any form or by any means, electronic, mechanical,
photocopying, recording, or otherwise, without the prior written permission of the
publisher. Printed in the United States of America.
CHAPTER 5
ENTERPRISE SYSTEMS
Inter-organizational systems:
• e-Business applications (Ch. 7)
- B2C – link businesses with end consumers
- B2B – link businesses with other businesses
- Intermediaries
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 5-2
CHAPTERS 5 AND 6
Intra-Organizational systems
Given these tradeoffs, hybrid systems that combine online data entry,
with batch processing, are very common
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 5-6
CRITICAL CONCEPTS
Production
Sales
Planning
Forecasting
Production Etc.
Scheduling
Top Management
Long-term trend
analysis
Sales System Example
Middle Management
Weekly data analysis to
track slow-moving items
and productive salespeople
Produce invoices
Distributed systems
• Refers to mode of delivery: Processing power is distributed to
multiple sites, which are linked via telecommunications
Client/server systems
• A type of distributed system where processing power is
distributed between a central server computer and a
number of client computers (usually PCs)
Client Client
Server Application
Server
Database
Server
• Desktop Virtualization:
- Implemented through a client server computing model
- Virtualized desktop environment stored on a server then on local storage
of desktop device
- All the programs, application and data are kept on the server and all
programs and applications are run on the server
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 5-13
CRITICAL CONCEPTS
Service-oriented architecture (SOA)
• Application architecture based on a collection of functions, or
services, where these services can communicate (or be connected)
with one another
• Advantages:
- Once a service is created (internally or externally) it can be used
over and over again
Web services
• Collection of technologies built around the XML standard of
communicating
• Other protocols used in web services include:
- Web Services Description Language (WSDL)
- Universal Description, Discovery, and Integration (UDDI)
- SOAP (originally Simple Object Access Protocol)
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 5-14
TRANSACTION PROCESSING SYSTEMS (TPS)
Payroll system
• System to produce
payroll checks also
contains numerous
subsystems
• Subject-oriented
- Data stored by business subject, rather than by application
- Customer, Claims vs. Order-Billing, Claims Processing
• Integrated
- Data stored once in a single integrated location
• Time-variant
- Data tagged with some element of time
- Data available for long periods of time
• Nonvolatile
- Data warehouse is “read only”: existing data is not
overwritten or updated
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 5-26
CUSTOMER RELATIONSHIP MANAGEMENT
SYSTEMS
CRM systems
• A new way to compete using IT: service-based differentiation
- Single-face-to-the-customer, no matter which channel
customer uses
CRM
e-CRM
Suites
ERP
Extensions
Ex. mySAP
Drawbacks:
• Spam and volume of e-mail received can be overwhelming
• Some use offensive words on e-mails that they would never use in face-to-
face communication
• Privacy issues due to electronic monitoring by supervisors
• However most often these drawbacks are overshadowed by the advantages
of the rapid, asynchronous communication of e-mails
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 5-33
OFFICE AUTOMATION
Video Conferencing
Groupware
• Software designed to support groups by facilitating:
- Collaboration
- Communication
- Coordination
• Also called collaboration or collaborative environment tools
• Products vary in the features they provide
Engineering systems
• Computer-aided design (CAD) – use of two and three-
dimensional computer graphics to create and modify
engineering designs
• Computer-aided engineering (CAE) – system that analyzes
functional characteristics of a design and simulates the product
performance under various conditions
• Group technology (GT) – systems that logically group parts
according to physical characteristics, machine routings, and
other machine operations
• Computer-aided process planning (CAPP) – systems that
plan the sequence of processes that produce or assemble a part
Factory operations
Robotics
• Advantages:
- Perform repetitive tasks tirelessly
- Produce consistent high-quality output
- Avoid putting humans at risk (subject to dangers such as
paint inhalation or retinal damage)
All rights reserved. No part of this publication may be reproduced, stored in a retrieval
system, or transmitted, in any form or by any means, electronic, mechanical,
photocopying, recording, or otherwise, without the prior written permission of the
publisher. Printed in the United States of America.
CHAPTER 6
MANAGERIAL SUPPORT SYSTEMS
Inter-organizational systems:
• e-Business applications (Ch. 7)
- B2C – link businesses with end consumers
- B2B – link businesses with other businesses
- Intermediaries
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 6-2
MANAGERIAL SUPPORT SYSTEMS
3. Dialog management:
facilitate user interface to the
DSS
• Decision techniques:
– Decision trees
– Linear and logistic regression
– Association rules for finding patterns
– Clustering for market segmentation
– Rule induction
– Statistical extraction of if-then rules
– Nearest neighbor
– Genetic algorithms
• Product example:
Group Systems (Purchased by IBM)
Group Systems
GIS Vendors
ESRI
MapInfo
Tactician
Intergraph
• Operational improvements
- Faster and better dissemination of knowledge
- Efficient processes
- Change management processes
- Knowledge reuse
• Market improvements
- Increased sales
- Lower cost of products and services
- Customer satisfaction
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 6-26
KNOWLEDGE MANAGEMENT SYSTEMS
Expert Systems
• Captures the expertise of humans for a particular domain in a
computer program
• Knowledge Engineer:
- A specially trained systems analyst who works closely with one
or more experts in the area of study
- Learns from experts how they make decisions
- Loads decision information from experts (“rules”) into module
called knowledge base
• How it works:
1. Program given set of data
2. Program analyzes data, works out correlations, selects variables to
create patterns
3. Pattern used to predict outcomes, then results compared to known
results
4. Program changes pattern by adjusting variable weights or variables
themselves
5. Repeats process over and over to adjust pattern
6. When no further adjustment identified, ready to be used to make
predictions for future cases
Virtual Reality
Example Uses of VR
Training U.S. Army to train tank crews
Amoco for training its drivers
Duracell for training factory workers on using new
equipment
Design Design of automobiles
Walk-throughs of air conditioning/ furnace units
Marketing Interactive 3-D images of products (used on the Web)
Virtual tours used by real estate companies or resort
hotels
All rights reserved. No part of this publication may be reproduced, stored in a retrieval
system, or transmitted, in any form or by any means, electronic, mechanical,
photocopying, recording, or otherwise, without the prior written permission of the
publisher. Printed in the United States of America.
Josimovski Sa{o
Definicija na IT
informacija + avtomatika
delovna informatika - disciplina za proektirawe, dizajnirawe i
implementirawe na delovni informaciski sistemi
informaciskite tehnologii pretstavuvaat sistemi, vo koi, vrz osnova
na podatocite na organizaciite i na pretprijatijata i na nivnata okolina,
lu|eto gi oblikuvaat informaciite za potrebite na delovnoto
odlu~uvawe so koristewe na soodvetni tehni~ki sredstva
glavna zada~a na informaciskite tehnologii e da ja obezbedi
organizacijata so strategiska i konkurentska prednost u~estvuvaj}i i
pomagaj}i vo re{avaweto na delovnite problemi, da ja zgolemi
produktivnosta i efikasnosta, da go podobri kvalitetot na uslugite kon
potro{uva~ite i da ovozmo`i delovna reorganizacija
IKT kako dominantni faktori na delovnoto rabotewe vo noviot
milenium: informaciite i znaeweto kako strategiski resurs
IT vo sovremenoto op{testvo
Op{testva i ekonomii koi baziraat na znaewe
Informaciite i znaeweto se va`en strategiski resurs na pretprijatijata
Informaciskoto op{testvo mo`e da go definirame kako op{testvo
koe uspe{no gi upotrebuva informaciskite i komunikaciskite
tehnologii za ostvaruvawe i kreirawe na cela niza novi, informaciski
vtemeleni proizvodi, odnosno stoki i uslugi
Osnovna dvi`e~ka sila na op{testvoto i ekonomijata bazirana na
znaewe e rapidniot razvoj i primenata na informaciskite i
komunikaciskite tehnologii (IKT)
Informatizacija - te`i{te na ekonomskite aktivnosti i na tehnolo{kite
promeni vo industriskoto op{testvo e proizvodstvoto i proda`bata na
industriski stoki od materijalna priroda, a vo informaciskoto
op{testvo, toa se obrabotkata, proizvodstvoto i proda`bata na
informaciski bazirani stoki i uslugi
INFORMACISKA REVOLUCIJA -
ISTORISKI PERSPEKTIVI
Хаити 2,27
Албанија 3,89
Романија 3,9
Македонија 3,91
Хрватска 4,22
Словенија 4,58
САД 5,56
Финска 5,81
Шведска 5,94
0 1 2 3 4 5 6 7
Premin na Evropa i Republika Makedonija vo
informacisko i op{testvo bazirano na znaewe
Josimovski Sa{o
Eksponencijalen rast na …
Vr ednosen si nxi r
…
Bi zni s-podpr oces
… Bi zni s-podpr oces
…
Akt i vnost Akt i vnost
… Akt i vnost
…
Par t ner i
F i nansi i
Smet kovodst vo
Pr oces A
Pr et pr i j at i e
Pr oi zvodst vo
^ ove~ki
Pr oces B
r esur si
Procesi – funkcionalni oblasti
Pot r o{ uva~i
K-ki na digitalnata ekonomija (1/2)
Globalni elektronski pazari kade se sretnuvaat globalni
potro{uva~i, dobavuva~i i partneri;
Masovno koristewe na digitalnite sistemi;
Koristewe na transakcii vo realno vreme pri {to poradi
digitalizacijata na proizvodite i uslugite biznis procesite
se izvr{uvaat mnogu pobrzo;
Informaciska preoptovarenost, poradi {to na zna~ewe
dobivaat inteligentnite sistemi za prebaruvawe na
informaciite;
Digitalizacija na proizvodite i uslugite;
K-ki na digitalnata ekonomija (2/2)
Pojava na novi i podobreni biznis modeli i procesi koi
davaat mo`nosti za pojava na novi kompanii i industrii;
Porast na digitalnite i internet-bazirani inovacii, koi
sozdavaat visoka stapka na zastarenost na proizvodi i
tehnologii;
Inovativni sistemi za izmama;
Potpolna ili parcijalna digitalizacija na pretprijatijata.
IT gi podr`uvaat slednite celi:
podobruvawe na produktivnosta,
namaluvawe na tro{ocite,
podobruvawe na odlu~uvaweto,
podobruvawe na odnosite so potro{uva~ite i
razvivawe na novi strate{ki aplikacii
Mo`nosti na IT
izvr{uvawe na obemni numeri~ki presmetki so golema brzina,
obezbeduvawe na brza i evtina komunikacija vo ramkite na
organizacijata i nadvor od nea,
skladirawe na golemi koli~ini na informacii,
ovozmo`uvawe na brz i eftin pristap kon golemi koli~ini na informacii
na razli~ni lokacii,
olesnuvawe na rabotata vo te{ki uslovi, avtomatizirawe na biznis
procesi,
olesnuvawe na globalnata trgovija,
koristewe na aplikacii od bilo koe mesto i pokvalitetno i poeftino
izvr{uvawe na biznis procesite
ENTERPRISE ARCHITECTURE
Organizacija
Informaciski tehnologii
Delovni pritisoci
pazarnite pritisoci
tehnolo{kite pritisoci
op{testveni pritisoci
Odgovori na organizaciite
Post oe~ka
del ovna Post oe~ki I KT
pr akt i k a
Mi si ja
Cel i
St r at egi ja
Del ov ni Tehnol o{ k i
Pl anov i
pot r ebi , pot r ebi ,
okol nost i i okol nost i i
r i zi c i r i zi c i
Per f omansi
Moni t or i ng
Nov i u~esni ci
Post oe~ki r i v al i vo
i ndust r i jat a
Na{ a
Dobavuva~i kompani ja Dobavuva~i
Dr ugi
kompani i
Supst i t ut i
Pr i mar ni Akt i vnost i za
akt i vnost i poddr { ka
Vl ezna l ogi st i ka
Nabav ki
Oper ac i i Tehni ol ogi i
^ ove~ki r esur si
I zl ezna l ogi st i k a
Mar k et i ng i
Admi ni st r at i vna i nf r ast r ukt ur a
pr od a` ba
Post -pr od a` ni
usl ugi
Porterov model na vrednosen sinxir
si nxi r
Vr ednosen
MANAGING INFORMATION TECHNOLOGY
7th EDITION
CHAPTER 9/10/14/15
SDLC Waterfall
Figure 9.1
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 9-4
SYSTEMS DEVELOPMENT LIFE CYCLE
Definition Phase
Technical
Operational
Economic
Technical Feasibility
• Based on:
- Knowledge of current and emerging technological
solutions
- IT expertise of in-house personnel
- Anticipated infrastructure needed to both develop and
support the proposed system
Operational Feasibility
• Primary responsibility of the business manager
• Entails assessing the degree to which a proposed system
addresses the business issues that gave rise to the idea for
a new information system
Economic Feasibility
• Business managers and IS analysts work together to
prepare a cost/benefit analysis
• IS analyst responsible for establishing the
developmental costs for the project
Feasibility analysis
Requirements Definition
Requirements Definition
AGILE Manifesto
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 9-16
THE MAKE-OR-BUY DECISION
.
Why?
Make Buy
Fig 10.1
Trojan Horse: a security-breaking program that is introduced into a computer and serves as a way for
an intruder to re-enter the computer in the future. Like the huge wooden horse used by the Greeks to
trick the Trojans into opening their city gates to let in the horse, it may be disguised as something
innocent such as an electronic greeting card, screen saver or game.
Logic Bomb: a program introduced into a computer that is designed to take action at a certain time or
when a specific event occurs.
Denial of Service Attack: a large number of computers on the Internet simultaneously send repeated
messages to a target computer, resulting in the computer being overloaded or the communications lines
are jammed so that legitimate users cannot obtain access.
• Phishing
The solicitation of sensitive personal information from users,
commonly in the form of email and instant messages
• Spoofing
The use of a fraudulent Web site that mimics a legitimate one; often
used in conjunction with phishing
Layer #2: Intrusion detection systems (IDS) Pros: solutions provide deep security
Network Vulnerability management systems not easy to breach and regular
(LAN/WAN) Network access control monitoring
User control/Authentication Cons: IDS tend to report false
alarms; some solutions better for
specific network devices rather than
network as a whole
Layer #3: Host IDS Pros: solutions provide good
Host Security Host Anti-Virus operational protection at device level
(individual computer, server, Cons: time-consuming to deploy as
router, etc.) are fine-tuned for individual devices
Layer #4: Public Key Interface (PKI) Pros: encryption provides robust
Application RSA security
Access Control/Authentication Cons: overhead results in slower
system response
Level #5: Encryption Pros: solutions provide good security
Data Cons: Dependent on good
organizational policies and good
execution by data steward
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall Figure 14.2 14-27
SOCIAL, ETHICAL AND LEGAL ISSUES
APEC attempt to
ban bribes
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 15-32
EXAMPLE: CODE OF ETHICS
• Privacy
• Identity Theft