An Information System is a combination of people, processes, hardware, software, and data that work together to collect, process, store, and disseminate information needed to support an organization's operations, management, and decision-making activities. It can be used for a variety of purposes, such as improving efficiency, reducing costs, enhancing communication, and providing a competitive advantage.
The types of IS are:
The difference between IT and IS is given below:
IT |
IS |
Focuses on how data is created, stored, and transmitted |
Focuses on how data is used by people and organizations |
Involves mainly technical aspects |
Involves both technical and non-technical |
|
aspects |
Requires more computer science knowledge and skills |
Requires more business knowledge and skills |
Examples: programming languages, operating systems, network protocols |
Examples: database management systems, enterprise resource planning systems, customer relationship management systems |
Three levels of security that could be implemented while building an IS are:
Security Policy and Security Method are not the same things. A Security Policy is a set of rules and guidelines that define how an organization will protect its information assets, while a Security Method is a specific approach or technique used to implement those rules and guidelines.
For example, consider an organization that wants to implement a Security Policy to protect its customer data. The Security Policy might require that all employees use strong passwords and two-factor authentication to access the customer data. The Security Method used to implement this policy might be to use a password management system that enforces strong passwords and requires two-factor authentication.
In this scenario, the Security Policy defines what needs to be done to protect the customer data, while the Security Method defines how it will be done.
Data, information, and knowledge (DIK) are related to each other in a hierarchical manner, with each concept building on the previous one. Data is the raw material that represents facts, figures, and symbols without any context or meaning. It can be in the form of numbers, words, or images. Information is derived from data by organizing, interpreting, and adding context to it. It provides a framework for understanding the data and making sense of it. Information can be thought of as organized data that has meaning and value. Knowledge is derived from information by adding experience, expertise, and in-sights to it. It is a more comprehensive and deep understanding of a subject matter. Knowledge allows us to apply information in new and unique ways, solve problems, and make decisions. The relationship between DIK can be illustrated using the following diagram:
Data –> Information –> Knowledge
In terms of domain knowledge, domain-specific data provides the basis for domain- specific information, which in turn leads to domain-specific knowledge. For example, in the field of medicine, patient data can be used to generate medical information that can be used to develop medical knowledge. Similarly, in the field of finance, financial data can be used to generate financial information, which can be used to develop financial knowledge. In terms of system knowledge, data generated by a system can be used to generate system-specific information, which can be used to develop system-specific knowledge. For example, data generated by a manufacturing process can be used to generate information about the process, which can be used to develop knowledge about how to optimize and improve the process. Similarly, data generated by a computer network can be used to generate information about the network, which can be used to develop knowledge about how to troubleshoot and maintain the network.
4. Why change management is required? What are the key principles of change management? Write briefly within the IS context.
Change management is required in order to successfully implement changes to an organization's Information System (IS). This is because changes to an IS can affect the organization's processes, people, and technology, and can lead to resistance, confusion, and errors if not managed properly. Change management is the process of planning, implementing, and monitoring changes to an IS in a structured and controlled manner.
The key principles of change management within an IS context are:
A recommender system is a type of information filtering system that provides suggestions for items that are most relevant to a particular user1. Recommender systems are widely used in e-commerce, streaming services, social media, and other domains to help users find products or content that match their preferences or needs.
One of the common methods for generating recommendations is collaborative filtering, which uses the ratings or feedback of other users who have similar tastes or interests as the target user.
Collaborative filtering can be divided into two main types: user-based and item-based.
User-based collaborative filtering finds other users who have rated items similarly to the target user, and recommends items that those users liked.
Item-based collaborative filtering finds items that have been rated similarly by other users, and recommends items that are similar to what the target user liked.
For example, suppose Alice is a movie lover who has rated some movies on a streaming service. User-based collaborative filtering would look for other users who have rated movies similarly to Alice, such as Bob and Carol. Then it would recommend movies that Bob and Carol liked but Alice has not seen yet, such as The Matrix or The Godfather.
Item-based collaborative filtering would look for movies that have been rated similarly by other users, such as Titanic and The Notebook. Then it would recommend movies that are similar to what Alice liked, such as A Star Is Born or The Fault in Our Stars.
Cloud computing is the practice of using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer1. Cloud computing offers various benefits such as faster innovation, flexible resources, and economies of scale2. Users can access cloud services on demand and pay only for what they use.
Cloud computing knowledge is becoming essential for any seasoned IS designing professional because cloud computing is transforming how information systems are developed, deployed, and maintained. Cloud computing enables IS designers to leverage existing cloud platforms and services that offer high performance, scalability, reliability, security, and cost-effectiveness. Cloud computing also allows IS designers to create innovative solutions that can meet the changing needs and expectations of users and stakeholders. Cloud computing also poses new challenges and opportunities for IS designers such as data privacy, governance, integration, migration, interoperability, etc.
Therefore, cloud computing knowledge is crucial for any IS designing professional who wants to stay updated with the latest trends and technologies in the field of information systems.
7. What is CRM? How closely is CRM associated with SCM? Why is SCM and CRM becoming important in e-commerce in comparison to regular brick-and-mortar commerce?
CRM stands for customer relationship management, which is a technology for managing all your company’s relationships and interactions with customers and potential customers.
CRM helps companies stay connected to customers, streamline processes, and improve profitability
SCM stands for supply chain management, which is the management of the flow of goods and services from raw materials to final products. SCM involves planning, coordinating, and controlling the activities of suppliers, manufacturers, distributors, retailers, and customers.
CRM and SCM are closely associated because they both aim to optimize customer satisfaction and business performance. CRM focuses on the demand side of the market, while SCM focuses on the supply side. CRM helps companies understand customer needs and preferences, while SCM helps companies deliver products and services efficiently and effectively. CRM and SCM can work together to create a seamless customer experience across the entire value chain.
CRM and SCM are becoming more important in e-commerce than in regular brick-and-mortar commerce because e-commerce involves more complex and dynamic interactions between customers and suppliers. E-commerce customers have higher expectations for personalization, convenience, speed, quality, and service than traditional customers. E-commerce suppliers have to deal with more competition, uncertainty, variability, and risk than traditional suppliers. Therefore, e-commerce requires more sophisticated CRM and SCM systems that can handle large volumes of data, support multiple channels of communication, enable real-time decision making, and facilitate collaboration among different parties.
a) Fully integrated vs Loosely integrated enterprises
Fully integrated enterprises |
Loosely integrated enterprises |
Single platform for all functions and data |
Multiple applications for different functions and data |
Consistent user interface |
Diverse user interfaces |
Common database |
Separate databases |
Unified workflow |
Disparate workflows |
b) CSF vs KPI
CSF |
KPI |
Action or condition |
Metric or measure |
Essential for achieving a goal |
Shows progress towards a goal |
Qualitative and subjective |
Quantitative and objective |
Focuses on customer’s needs |
Focuses on business’s performance |
c) Web content mining vs Web uses mining
Web Content Mining |
Web Uses Mining |
Extracts information from web document content |
Extracts information from web log records |
Discovers knowledge from web pages |
Discovers user access patterns of web pages |
Focuses on what is on the web |
Focuses on how users interact with the web |
Can be applied to any type of data |
Can be applied to any type of website |
d) MapReduce vs Hadoop System
MapReduce |
Hadoop |
Programming model for distributed processing |
Framework for distributed storage and processing |
Consists of HDFS and MapReduce |
Part of Hadoop framework |
Provides scalability, reliability, fault-tolerance |
Provides parallelism, efficiency, simplicity |
Examples: Word count, Page rank, Inverted index |
Examples: Apache Hive, Apache Spark, Apache Kafka |
a) ERP System in large organization
Enterprise Resource Planning system is a software suite that integrates and manages all the core business processes and data of an organization, including finance, human resources, supply chain management, manufacturing, customer relationship management, and more. ERP systems are
designed to provide a unified view of an organization's operations, with real-time visibility into key performance indicators and metrics.
ERP systems are particularly valuable for large organizations that have complex and diverse business processes, multiple locations, and large volumes of data. By using an ERP system, large organizations can streamline their operations, eliminate data silos, improve communication and collaboration across departments and teams, and make better-informed decisions.
However, implementing an ERP system in a large organization can be complex and challenging. It requires careful planning, coordination, and communication among all the stakeholders, as well as a significant investment in resources and training. Nonetheless, the potential benefits of an ERP system for large organizations can make the effort and cost worthwhile.
b) CIA Triangle
The CIA triangle is a well-known model in information security that consists of three fundamental elements: confidentiality, integrity, and availability. These three elements are often referred to as the CIA triad and form the basis of information security planning, implementation, and evaluation.
1. Confidentiality: Confidentiality refers to the protection of sensitive information from unauthorized access, disclosure, or use. Confidentiality is achieved through access controls, encryption, and other security measures that restrict access to information only to authorized individuals or systems.
2. Integrity: Integrity refers to the accuracy, completeness, and consistency of information over its entire life cycle. Integrity is achieved through controls that prevent unauthorized modification, deletion, or destruction of information, and ensure that information is not altered or corrupted during transmission or processing.
3. Availability: Availability refers to the accessibility and usability of information and systems by authorized users when needed. Availability is achieved through measures that prevent or mitigate system failures, outages, or other disruptions that could prevent users from accessing or using information or systems.
The CIA triangle is a useful tool for identifying and prioritizing security risks and for designing and implementing appropriate security controls. Effective security measures must balance the three elements of the CIA triangle to ensure that sensitive information is protected while remaining accessible and usable by authorized users.
c) Collective intelligence through social network
Collective intelligence refers to the ability of a group of individuals to solve complex problems, make decisions, or generate new ideas through collaboration and knowledge sharing. Social networks, such as Facebook, Twitter, and LinkedIn, can facilitate collective intelligence by connecting people with similar interests and expertise, enabling them to exchange information, opinions, and feedback.
Through social networks, individuals can participate in various forms of collective intelligence, such as crowdsourcing, collaborative filtering, and social computing. Crowdsourcing involves engaging a large group of people to perform a task or solve a problem, such as funding a project or identifying a new product feature. Collaborative filtering involves using the collective opinions and preferences of a group of users to make recommendations or predictions, such as in product or content recommendations. Social computing involves using social media and other web-based tools to collaborate, share knowledge, and solve problems.
Social networks also offer opportunities for individuals to form communities of practice, where they can share expertise, learn from each other, and collaborate on projects or initiatives. These communities can be particularly valuable in fields such as science, technology, and innovation, where complex problems require interdisciplinary and collaborative approaches.
d) Big-Data processing with MapReduce
MapReduce is a programming model and software framework used for processing large data sets in a distributed computing environment. It was developed by Google to handle massive data processing in a scalable and efficient way. MapReduce enables the processing of big data by breaking it down into smaller, manageable parts and distributing the processing of these parts across multiple machines in a cluster.
The MapReduce framework consists of two main functions: Map and Reduce. The Map function takes input data and transforms it into key-value pairs, which are then passed to the Reduce function. The Reduce function takes the output of the Map function and performs a summarization or aggregation operation on the data, producing a final output.
The key benefits of MapReduce for big-data processing include its ability to handle large volumes of data, its scalability, fault-tolerance, and its ability to handle unstructured and semi-structured data. MapReduce can be used for a wide range of big-data processing tasks, including data cleaning and preprocessing, data mining and analysis, machine learning, and natural language processing.