Transaction processing TPS
Serve operational managers and staff. Perform and record daily routine transactions necessary to conduct businesses. Allow managers to monitor status of operations and relations with external environment. Serve predefined, structured goals and decision making
Practical:
Performs and records the daily routine transactions necessary to conduct business
Practical:
Performs and records the daily routine transactions necessary to conduct business
Hadoop
– Enables distributed parallel processing of big data across inexpensive computers
– Key services
• Hadoop Distributed File System (HDFS): data storage
• MapReduce: breaks data into clusters for work
• Hbase: NoSQL database
– Used Yahoo, NextBio
– Key services
• Hadoop Distributed File System (HDFS): data storage
• MapReduce: breaks data into clusters for work
• Hbase: NoSQL database
– Used Yahoo, NextBio
In-memory computing
–Used in big data analysis
– Uses computers main memory (RAM) for data storage to avoid delays in retrieving data from disk storage
–Can reduce hours/days of processing to seconds
–Requires optimized hardware
– Uses computers main memory (RAM) for data storage to avoid delays in retrieving data from disk storage
–Can reduce hours/days of processing to seconds
–Requires optimized hardware
Analytic platforms
High-speed platforms using both relational and non-relational tools optimized for large datasets
Tools for consolidating, analyzing, and providing access to vast amounts of data to help users make better business decisions (4 st)
–Multidimensional data analysis (OLAP)
–Data mining
–Text mining
–Web mining
–Data mining
–Text mining
–Web mining
Online Analytical Processing (OLAP)
• Supports multidimensional data analysis
–Viewing data using multiple dimensions
–Each aspect of information (product, pricing, cost, region, time period) is different dimension
–Example: How many washers sold in the East in June compared with other regions?
• OLAP enables rapid, online answers to ad hoc queries
Practical:
OLAP supports multidimensional data analysis, enabling users to view the same data in different ways using multiple dimensions. Each aspect of information— product, pricing, cost, region, or time period—represents a different dimension. OLAP enables users to obtain online answers to ad hoc questions such as these in a fairly rapid amount of time, even when the data are stored in very large databases, such as sales figures for multiple years
–Viewing data using multiple dimensions
–Each aspect of information (product, pricing, cost, region, time period) is different dimension
–Example: How many washers sold in the East in June compared with other regions?
• OLAP enables rapid, online answers to ad hoc queries
Practical:
OLAP supports multidimensional data analysis, enabling users to view the same data in different ways using multiple dimensions. Each aspect of information— product, pricing, cost, region, or time period—represents a different dimension. OLAP enables users to obtain online answers to ad hoc questions such as these in a fairly rapid amount of time, even when the data are stored in very large databases, such as sales figures for multiple years
Data Mining, 5 types of information obtainable from Data mining
Analysis of large pools of data to find patterns and rules that can be used to guide decision making and predict future behavior.
• Finds hidden patterns, relationships in datasets –Example: customer buying patterns
• Infers rules to predict future behavior
• Types of information obtainable from data mining:
1. Associations
2. Sequences
3. Classification
4. Clustering
5. Forecasting
• Finds hidden patterns, relationships in datasets –Example: customer buying patterns
• Infers rules to predict future behavior
• Types of information obtainable from data mining:
1. Associations
2. Sequences
3. Classification
4. Clustering
5. Forecasting
Text mining
–Extracts key elements from large unstructured data sets
–Sentiment analysis software
–Sentiment analysis software
Web mining
–Discovery and analysis of useful patterns and information from web
–Web content mining
–Web structure mining
–Web usage mining
–Web content mining
–Web structure mining
–Web usage mining
Advantages of using the web for database access
– Ease of use of browser software
– Web interface requires few or no changes to database
– Inexpensive to add web interface to system
– Web interface requires few or no changes to database
– Inexpensive to add web interface to system
Three main ways that intellectual property is protected
1. Trade secret: intellectual work or product belonging to business, not in the public domain
2. Copyright: statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years
3. Patents: grants creator of invention an exclusive monopoly on ideas behind invention for 20 years
2. Copyright: statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years
3. Patents: grants creator of invention an exclusive monopoly on ideas behind invention for 20 years
Three principal sources of poor system performance
–Software bugs, errors
–Hardware or facility failures
–Poor input data quality (most common source of business system failure)
–Hardware or facility failures
–Poor input data quality (most common source of business system failure)
What Are the Components of IT Infrastructure?
–Computer hardware platforms
–Operating system platforms
–Enterprise software applications
–Data management and storage
–Networking/telecommunications platforms
–Internet platforms
–Consulting system integration services
–Operating system platforms
–Enterprise software applications
–Data management and storage
–Networking/telecommunications platforms
–Internet platforms
–Consulting system integration services
Database software providers
–IBM (DB2)
– Oracle
–Microsoft (SQL Server)
–Sybase (Adaptive Server Enterprise)
– MySQL
–Apache Hadoop
– Oracle
–Microsoft (SQL Server)
–Sybase (Adaptive Server Enterprise)
– MySQL
–Apache Hadoop
Hardware, software, management services to support company websites, intranets
–Web-hosting services
– Routers
–Cabling or wireless equipment
– Routers
–Cabling or wireless equipment
The mobile digital platform
– Smartphones
– Netbooks
–Tablet computers
–Digital e-book readers (Kindle)
–Wearable devices
– Netbooks
–Tablet computers
–Digital e-book readers (Kindle)
–Wearable devices
Consumerization of IT and BYOD (bring your own device)
Forces businesses and IT departments to rethink how IT equipment and services are acquired and managed
Quantum computing
–Uses quantum physics to represent and operate on data
–Dramatic increases in computing speed
–Dramatic increases in computing speed
Virtualization
–Allows single physical resource to act as multiple resources (i.e., run multiple instances of OS)
–Reduces hardware and power expenditures
–Facilitates hardware centralization
–Software-defined storage (SDS)
–Reduces hardware and power expenditures
–Facilitates hardware centralization
–Software-defined storage (SDS)
Cloud computing
–On-demand computing services obtained over network
• Infrastructure as a service (IaaS)
• Software as a service (SaaS)
• Platform as a service (PaaS)
–Cloud can be public or private
–Allows companies to minimize IT investments –Drawbacks: Concerns of security, reliability –Hybrid cloud computing model
Practical: style of computing in which IT services are delivered on- demand and accessible via the Internet.
• Infrastructure as a service (IaaS)
• Software as a service (SaaS)
• Platform as a service (PaaS)
–Cloud can be public or private
–Allows companies to minimize IT investments –Drawbacks: Concerns of security, reliability –Hybrid cloud computing model
Practical: style of computing in which IT services are delivered on- demand and accessible via the Internet.
Green computing (Green IT)
– Practices and technologies for manufacturing, using, disposing of
computing and networking hardware
–Reducing power consumption a high priority
–Data centers
computing and networking hardware
–Reducing power consumption a high priority
–Data centers
High performance, power-saving processors
–Multicore processors
–Power-efficient microprocessors
–Power-efficient microprocessors
Competitive Forces Model for IT Infrastructure Investment
• Market demand for firm’s services
• Firm’s business strategy
• Firm’s IT strategy, infrastructure, and cost
• Information technology assessment
• Competitor firm services
• Competitor firm IT infrastructure investments
• Firm’s business strategy
• Firm’s IT strategy, infrastructure, and cost
• Information technology assessment
• Competitor firm services
• Competitor firm IT infrastructure investments
Problems with the Traditional File Environment
• Files maintained separately by different departments
• Data redundancy
• Data inconsistency
• Program-data dependence
• Lack of flexibility
• Poor security
• Lack of data sharing and availability
• Data redundancy
• Data inconsistency
• Program-data dependence
• Lack of flexibility
• Poor security
• Lack of data sharing and availability
Data redundancy
Data redundancy is the presence of duplicate data in multiple data files so that the same data are stored in more than one place or location. Data redundancy wastes storage resources and also leads to data inconsistency, where the same attribute may have different values.
Database management system (DBMS)
– Interfaces between applications and physical data files
– Separates logical and physical views of data
– Solves problems of traditional file environment
• Controls redundancy
• Eliminates inconsistency
• Uncouples programs and data
• Enables organization to centrally manage data and data security
– Separates logical and physical views of data
– Solves problems of traditional file environment
• Controls redundancy
• Eliminates inconsistency
• Uncouples programs and data
• Enables organization to centrally manage data and data security
Non-relational databases: “NoSQL”
–More flexible data model
–Data sets stored across distributed machines
–Easier to scale
–Handle large volumes of unstructured and structured data
–Data sets stored across distributed machines
–Easier to scale
–Handle large volumes of unstructured and structured data
Databases in the cloud
–Appeal to start-ups, smaller businesses
–Amazon Relational Database Service, Microsoft SQL Azure
–Private clouds
–Amazon Relational Database Service, Microsoft SQL Azure
–Private clouds
Big data
Massive sets of unstructured/semi-structured data from web traffic,
social media, sensors, and so on
Practical:
Data sets with volumes so huge they are beyond the ability of typical relational DBMS to capture and analyse.
social media, sensors, and so on
Practical:
Data sets with volumes so huge they are beyond the ability of typical relational DBMS to capture and analyse.
Challenge of Big Data
• Volumes too great for typical DBMS –Petabytes, exabytes of data
• Can reveal more patterns, relationships and anomalies
• Requires new tools and technologies to manage and analyze
• Can reveal more patterns, relationships and anomalies
• Requires new tools and technologies to manage and analyze
Business Intelligence Infrastructure
Array of tools for obtaining information from separate systems and from big data
- is a contemporary term for data and software tools for organizing, analyzing, and providing access to data to help managers and other enterprise users make more informed decisions.
Using data analysis tools and applications to help business make more informed decisions. Actually, one can see BI as the transformation on raw data into a meaningful form that can be used for business purposes.
- is a contemporary term for data and software tools for organizing, analyzing, and providing access to data to help managers and other enterprise users make more informed decisions.
Using data analysis tools and applications to help business make more informed decisions. Actually, one can see BI as the transformation on raw data into a meaningful form that can be used for business purposes.
Data warehouse
–Stores current and historical data from many core operational
transaction systems
– Consolidates and standardizes information for use across enterprise, but data cannot be altered
–Provides analysis and reporting tools
transaction systems
– Consolidates and standardizes information for use across enterprise, but data cannot be altered
–Provides analysis and reporting tools
Data marts
– Subset of data warehouse
– Typically focus on single subject or line of business
is a subset of a
data warehouse in which a summarized or highly focused portion of the organization’s data is placed in a separate database for a specific population of users.
– Typically focus on single subject or line of business
is a subset of a
data warehouse in which a summarized or highly focused portion of the organization’s data is placed in a separate database for a specific population of users.
Web beacons (web bugs)
Tiny software programs invisibly embedded in e-mail messages and Web pages that are designed to monitor the behavior of the user visiting a Web site or sending e-mail.
– Tiny graphics embedded in e-mails and web pages
– Monitor who is reading e-mail message or visiting site
– Tiny graphics embedded in e-mails and web pages
– Monitor who is reading e-mail message or visiting site
Spyware
technology that aids in gathering information about a person or organization without their knowledge (e.g. banner ads)
– Surreptitiously installed on user’s computer
– May transmit user’s keystrokes or display unwanted ads
– Surreptitiously installed on user’s computer
– May transmit user’s keystrokes or display unwanted ads
Techical solutions (ethical and social issues in IS)
–E-mail encryption
–Anonymity tools
–Anti-spyware tools
–Anonymity tools
–Anti-spyware tools
Intellectual property
– Intangible property of any kind created by individuals or corporations
Information system raise new ethical problems, why?
They create opportunities for:
–Intense social change, threatening existing distributions of power, money, rights, and obligations
–New kinds of crime
–Intense social change, threatening existing distributions of power, money, rights, and obligations
–New kinds of crime
Five Moral Dimensions of the Information Age
• Information rights and obligations
• Property rights and obligations
• Accountability and control
• System quality
• Quality of life
• Property rights and obligations
• Accountability and control
• System quality
• Quality of life
Key Technology Trends that Raise Ethical Issues
• Computing power doubles every 18 months
• Data storage costs rapidly decline
• Data analysis advances
• Networking advances
• Mobile device growth impact
• Data storage costs rapidly decline
• Data analysis advances
• Networking advances
• Mobile device growth impact
Profiling
Combining data from multiple sources to create dossiers of detailed
information on individuals
information on individuals
Nonobvious relationship awareness (NORA)
Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists
Responsibility, Accountability, Liability, Due to process
• Responsibility
– Accepting the potential costs, duties, and obligations for decisions
• Accountability
–Mechanisms for identifying responsible parties
• Liability
– Permits individuals (and firms) to recover damages done to them
• Due process
–Laws are well-known and understood, with an ability to appeal to higher authorities
– Accepting the potential costs, duties, and obligations for decisions
• Accountability
–Mechanisms for identifying responsible parties
• Liability
– Permits individuals (and firms) to recover damages done to them
• Due process
–Laws are well-known and understood, with an ability to appeal to higher authorities
Five-step process for ethical analysis
1. Identify and clearly describe the facts.
2. Define the conflict or dilemma and identify the higher-order values involved.
3. Identify the stakeholders.
4. Identify the options that you can reasonably take.
5. Identify the potential consequences of your options.
2. Define the conflict or dilemma and identify the higher-order values involved.
3. Identify the stakeholders.
4. Identify the options that you can reasonably take.
5. Identify the potential consequences of your options.
Cookies
Tiny file deposited on a computer hard drive when an individual visits certain Web sites. Used to identify the visitor and track visits to the Web site.
– Identify browser and track visits to site
– Super cookies (Flash cookies)
– Identify browser and track visits to site
– Super cookies (Flash cookies)
6 steps in evaluating software tools
1. Identify your firm´s collaboration challenges
2. Identify what kinds of solutions are available
3. Analyze available products cost and benefits
4. Evaluate security risks
5. Consult user for implementation and training issues
6. Evaluate product vendors
2. Identify what kinds of solutions are available
3. Analyze available products cost and benefits
4. Evaluate security risks
5. Consult user for implementation and training issues
6. Evaluate product vendors
Decision support systems DSS
Serve middle management. Support non routine decision making. May use external information as well TPS/MIS data. Model driven DSS. Data driven DSS
Practical:
Combine data and sophisticated analytical models or data analysis tools to support semi structured and unstructured decision making
Practical:
Combine data and sophisticated analytical models or data analysis tools to support semi structured and unstructured decision making
Executive support systems ESS
Support senior management. Adresses nonroutine dessinions. Incorporate data about external events (new tax laws or competitors) as well as summarized information from internal MIS and DSS. Ex. digital dashboard with real-time view of firm´s financial performance
Practical:
Help senior management address non-routine decisions requiring judgment, evaluation and insight because there is no agreed-on procedure for arriving at a solution
Practical:
Help senior management address non-routine decisions requiring judgment, evaluation and insight because there is no agreed-on procedure for arriving at a solution
Enterprise Applications
Systems for linking the enterprise. Span functional areas. Execute business processes across the firm. Include all levels of management. Four major applications (Enterprise systems, SCM, CRM, knowledge management systems). Collect data from different firm functions and store data in single central data repository. Resolve problems of fragmented data
Enterprise systems (also known as enterprise resource planning (ERP)
are used to bridge the communication gap between all departments and all users of information within a company. Enterprise systems truly allow a company to use information as a vital resource and enhance the bottom line.
Supply chain management SCM
Manage firm´s relationships with.
Share information about:
- Orders, production, inventory levels, delivery of products and services
Goal:
- Right amount of products to destination with least amount of and lower cost
Practical:
These systems help supply chain members to share information about orders, production, inventory levels, and delivery of products and services so they can turn the supply process more efficient.
Share information about:
- Orders, production, inventory levels, delivery of products and services
Goal:
- Right amount of products to destination with least amount of and lower cost
Practical:
These systems help supply chain members to share information about orders, production, inventory levels, and delivery of products and services so they can turn the supply process more efficient.
Customer Relationship Management CRM
Provide information to coordinate all of the business processes that deal with customers: Sales, marketing, customer service.
Helps firm identify, attract, and retain most profitable customer
Helps firm identify, attract, and retain most profitable customer
Knowledge management systems KMS
- Supports processes for capturing and applying knowledge and expertise (how to create, produce and deliver products, services)
- Collect internal knowledge and experience within firm and make it available to employees
- Link to external sources of knowledge
Practical:
These systems collect all relevant knowledge in the firm, and make it available to improve business processes and management decisions.
- Collect internal knowledge and experience within firm and make it available to employees
- Link to external sources of knowledge
Practical:
These systems collect all relevant knowledge in the firm, and make it available to improve business processes and management decisions.
Extranets
- Company websites accessible externally only to vendors and suppliers
- Often used to coordinate supply chain
- Often used to coordinate supply chain
Management Information Systems MIS
Serve middle management. Provide reports on firm´s current performance, based on data from TPS. Provide answers to routine questions with predefined procedure for answering them. Typically have little analytic capability
Practical:
Provides reports on organizational performance to help middle management monitor and control the business
Practical:
Provides reports on organizational performance to help middle management monitor and control the business
Models of informed consent
An opt-out model permits the collection of personal information until the consumer specifically requests that the data cannot be collected.
An opt-in model prohibits businesses from collecting any personal information unless the consumer specifically takes action to approve information collection and use
An opt-in model prohibits businesses from collecting any personal information unless the consumer specifically takes action to approve information collection and use
Search engine optimization - SEO
Businesses utilize search engine optimization (SEO) to improve their website’s organic listings on SERPs. Process of getting traffic from organic/natural search results on search engine without paying the search engine service.
- Reputation or popularity; Relevance; User satisfaction (Bounce Rates, CTR, etc)
- Reputation or popularity; Relevance; User satisfaction (Bounce Rates, CTR, etc)
SEM
A collection of online marketing strategies and tactics that promote brands by increasing their visibility in search engine results pages (SERPs) through optimization and advertising.
• Pay-per-click(PPC)
• SEO
• Pay-per-click(PPC)
• SEO
Pay-per-click advertising (PPC)
Pay-per-click advertising: advertisers pay the SE based on how many people click on the ads. (Google AdWords)
• Keywords & Bid pricing
• Geographic location & time of day
• Landing pages
• Keywords & Bid pricing
• Geographic location & time of day
• Landing pages
Malicious Software
1. Computer Virus
2. Worms
3. Trojan Horses
4. SQL Injection attacks
5. Spyware
2. Worms
3. Trojan Horses
4. SQL Injection attacks
5. Spyware
Computer Virus
SW program that is attached to other programs/files in order to be executed. They spread from computer to computer when human take actions (usually without their permission)
Worms
Independent computer programs that copy themselves from one computer to the other, not requiring human intervention.
Trojan Horses
SW program that appears to be benign but then does something other than expected. It is often a way for viruses or other malicious code to be introduced into a computer system.
SQL Injection attacks
Taking advantage of vulnerabilities in poorly coded web application software to introduce malware into a company’s systems and networks
Spyware
These programs install themselves on a computer to monitor user web surfing activities and serve up advertising
Computer crimes 6st
1. Spoofing
2. Sniffing
3. Denial-of-Service attacks
4. Identity theft
5. Click fraud
6. Global threats
2. Sniffing
3. Denial-of-Service attacks
4. Identity theft
5. Click fraud
6. Global threats
Spoofing
Using fake e-mail addresses or masquerading as someone else. May also involve redirecting a customer to a fake Web site to collect information.
Sniffing
Type of eavesdropping program that monitors information traveling over a network. Allows hackers to steal proprietary information from anywhere on a network
DoS attacks
Flooding a network server or Web server with many thousands of false communications or requests for services to crash the network
Identity Theft
A crime in which an imposter obtains key pieces of personal information to impersonate someone else
Click Fraus
Occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase
Global Threats
Internet vulnerabilities have also turned individuals and even entire nation states into easy targets for politically-motivated hacking to conduct sabotage and espionage
Upstream supply chain
Firm’s suppliers, suppliers’ suppliers, processes for managing relationships with them
Downstream supply chain
Organizations and processes responsible for
delivering products to customers
delivering products to customers
Enterprise resource planning (ERP) systems
• Suite of integrated software modules and a common central database
• Collects data from many divisions of firm for use in nearly all of firm’s internal business activities
• Information entered in one process is immediately available for other processes
• Collects data from many divisions of firm for use in nearly all of firm’s internal business activities
• Information entered in one process is immediately available for other processes
Just-in-time strategy
– Components arrive as they are needed
– Finished goods shipped after leaving assembly line
– Finished goods shipped after leaving assembly line
Bullwhip effect
Information about product demand gets distorted as it passes from one entity to next across supply chain
Supply chain planning systems
–Model existing supply chain
–Enable demand planning
–Optimize sourcing, manufacturing plans –Establish inventory levels
–Identify transportation modes
–Enable demand planning
–Optimize sourcing, manufacturing plans –Establish inventory levels
–Identify transportation modes
Supply chain execution systems
Manage flow of products through distribution centers and warehouses
Global supply chain issues
–Greater geographical distances, time differences
–Participants from different countries
–Participants from different countries
Push-based model (build-to-stock)
– Earlier SCM systems
– Schedules based on best guesses of demand
– Schedules based on best guesses of demand
Pull-based model (demand-driven)
– Web-based
– Customer orders trigger events in supply
chain
– Customer orders trigger events in supply
chain
Customer relationship management (CRM)
– Knowing the customer
– In large businesses, too many customers and
too many ways customers interact with firm
– In large businesses, too many customers and
too many ways customers interact with firm
CRM systems
– Capture and integrate customer data from all
over the organization
– Consolidate and analyze customer data
– Distribute customer information to various systems and customer touch points across enterprise
– Provide single enterprise view of customers
over the organization
– Consolidate and analyze customer data
– Distribute customer information to various systems and customer touch points across enterprise
– Provide single enterprise view of customers
Partner relationship management (PRM)
• Integrating lead generation, pricing, promotions, order configurations, and availability
• Tools to assess partners’ performances
• Tools to assess partners’ performances
Employee relationship management (ERM)
• Setting objectives, employee performance management, performance- based compensation, employee training
CRM packages typically include tools for:
– Sales force automation (SFA)
• Sales prospect and contact information
• Sales quote generation capabilities
– Customer service
• Assigning and managing customer service
requests
• Web-based self-service capabilities
– Marketing
• Capturing prospect and customer data, scheduling and tracking direct-marketing mailings or e-mail
• Cross-selling
• Sales prospect and contact information
• Sales quote generation capabilities
– Customer service
• Assigning and managing customer service
requests
• Web-based self-service capabilities
– Marketing
• Capturing prospect and customer data, scheduling and tracking direct-marketing mailings or e-mail
• Cross-selling
Operational CRM
– Customer-facing applications
– Sales force automation
Call center and customer service support
– Marketing automation
– Sales force automation
Call center and customer service support
– Marketing automation
Analytical CRM
– Based on data warehouses populated by operational CRM systems and customer touch points
– Analyzes customer data (OLAP, data mining, etc.)
• Customer lifetime value (CLTV)
– Analyzes customer data (OLAP, data mining, etc.)
• Customer lifetime value (CLTV)
Business value of CRM systems
– Increased customer satisfaction
– Reduced direct-marketing costs
– More effective marketing
– Lower costs for customer acquisition/retention – Increased sales revenue
– Reduced direct-marketing costs
– More effective marketing
– Lower costs for customer acquisition/retention – Increased sales revenue
Churn rate
– Number of customers who stop using or purchasing products or services from a
company
– Indicator of growth or decline of firm’s customer base
company
– Indicator of growth or decline of firm’s customer base
Disadvantages with CRM systems
• Highly expensive to purchase and implement enterprise applications
• Technology changes
• Business process changes
• Organizational learning, changes
• Switching costs, dependence on software vendors
• Data standardization, management, cleansing
• Technology changes
• Business process changes
• Organizational learning, changes
• Switching costs, dependence on software vendors
• Data standardization, management, cleansing
Social CRM
– Incorporating social networking technologies
– Company social networks
– Monitor social media activity; social media analytics
– Manage social and web-based campaigns
– Company social networks
– Monitor social media activity; social media analytics
– Manage social and web-based campaigns
Kartensatzinfo:
Autor: CoboCards-User
Oberthema: Jölgalen
Thema: Jölgalen
Veröffentlicht: 29.11.2018
Schlagwörter Karten:
Alle Karten (97)
keine Schlagwörter