Saturday, August 6, 2016

BUS 188: Chapter 12 Outline

Matthew Mercado
08/06/16
BUS 188 (11:00am-3:00pm)
Chapter 12 Outline (2 page minimum)
Aggarwal

Chapter 12 Outline: Information Systems Development

            Though businesses processes, information systems, and applications often are a topic of confusion to many, but many people have to understand that there are key differences in each topic and that they all correlate to one another. By having the knowledge, it makes it easier to appreciate the ways processes, systems, and applications are fully developed and can help us become a team member on developmental projects. With businesses processes and information systems, there’s a certain system is follows. For example, business processes include preparing quotation, verifying availability, check customer credit, approve special terms, and finally process order. This is known as an application where it is a combination of hardware, software, and data components to accomplish a set of requirements. Every IS has at least one application because every IS includes a software components. All 3 (Business processes, IS, and applications) have different characteristics and components, the relationship of businesses processes to IS are many-to-many (one relates to another), and every IS has at least one application.

            Business Process management (or BPM) is use to create new businesses processes and to manage changes within existing processes. The only exception to this is start-ups because organizations already have processes. BPM is often used to manage the evolution of existing businesses processes from one version to an improved version. For BPMs, there is a business process management and a IS development. Business processes are a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function. Each of the words mentioned all have a distinct definition. Role is a collection of activities. Resources are people and computer applications assigned to roles. Flow is either a control flow (directs order of activities) or a data flow (movement of data amongst activities and repositories. In a nutshell, roles are like titles and they all have a distinct system on how they manage things. Processed in all need management because they constantly evolve. Process quality can improve depending on efficiency (use of resources) and effectiveness (accomplishing strategy). The only way to change a process is if it needs tuning or if problems arise. However, if a process is going along smoothly, it doesn’t hurt to try and improve on it so it can be better. Another thing to take note is technology because, as I’ve said before, technology is evolving at an alarming rate.

            Technology is the second reason to manage processes. Any new technological advancement will change the processes’ activities in a very pivotal way. Take for example Apple Inc. They have made strides in innovation and improving upon their phones, tablets, and computers. Each year, new models are introduced as well as features, enhanced resolution, having the ability to multi-task, and so on. Technology is evolving so fast to the point where creative and unique individuals are making it convenient for everyone to use because we, as humans, are constantly evolving. A third reason to challenge business processes is a change in business fundamental. A change in market, product lines, supply chains, company policies, company organization, internationalization, and business environment could modify the business process entirely. The fundamentals are the staple mark for businesses and if any of those were to somehow change, then those need to be taken into consideration.

            The blueprints for any business process are the understanding of the current process and for designing new versions of that processes. When looking at a process, you always define it, determine its requirements, design components related to the process, implement it, and finally maintain it. To be able to perform a function, the process behind it has to be successfully built and maintained so it abides by business standards. The scope of the system/process is all dependent if it’s feasible, form a requirement, and it able to be maintained. When the process is efficient and effective, it then turns into a system that, with most businesses, also tends to evolve on a daily basis to become better.

            Regarding systems, a conversion is often used to convert business activity from old systems to new. There are 4 types of conversions: pilot, phased, parallel, and plunge. Pilot installation revolves around the organization implementing the entire system on a limited portion of the business. The phased installation revolved around the new system/business process installed in phases across the organization. Parallel installation is the new system/business process that runs parallel with the old until a new system is test and becomes operational. Lastly, plunge installation is where the organization shuts off the old system and begins a new old. Structure is the key in any system and when the process/system is able to retain its structure, then its convenient for companies to evolve/improve upon it because structures change. Processes, systems, and structures will continue to evolve so long as there’s room for improvement on the part of the organization/business/company.


BUS 188: Chapter 11 Outline

Matthew Mercado
08/06/16
BUS 188 (11:00am-3:00pm)
Chapter 11 Outline (2 page minimum)
Aggarwal

Chapter 11 Outline: Information Systems Management

            In the previous chapter, we talked about how IS security is important to consider and how we can respond. However, we will be talking about the functions and organization behind the Information Systems Department. The major functions of IS systems department include: Plan the use of IS to accomplish organizational goals and strategies, manage outsourcing relationships, protect information assets, develop, operate, and maintain the organization’s computing infrastructure, and finally develop, operate, and maintain applications.

            The Chief Information Officer (or CIO) is the title for the IS Department head. Some of the other titles he/she has are vice president of information services, director of information services, and director of computer services.  The CIO always reports to the CEO while sometimes-executive reports are sent to the Chief operating officer (or COO). The CIO’s IS department is in charge of technology, operations, development, and outsourcing relations. Operations department manages the computing infrastructure that includes computers, in-house server farms, network, and communications media. The development department manages the processes of creating new IS as well maintain the already existing ones. Lastly, the outsourcing relations IS department exists in organizations that have negotiated outsourcing agreements with other companies to provide equipment, applications, and other services. Another function to take into consideration is the data administration that’s sole duty is to protect data and information assets by establish data standards and data management practices and policies. This shows how in-depth the IS department and how they function in every field.

            There are a variety of IS-related jobs that are both interesting and paid well. Some of these jobs include (but not limited to): Business analysts, systems analyst, programmers, test QQ engineers, technical writers, tech support engineers, network administrator, IT consults, technical sales, IT Project manager, IT manager, database administrator, business intelligence analyst, CTOs, CIOs, and CISOs. The amount of responsibility is different for each field, but all serve a purpose with different criteria, tasks, and salary ranges. To get up to CTO, CIO, and CISO positions, workers would have to work their way up, adapt to situations/scenarios, and have a very deep and in-depth knowledge on security threats, protections, and trends.

            Outsourcing the process of hiring another organization to perform a service. This is often done to save costs, gain expertise, and to free management time. Organizations and companies often chose to outsource portions of there IS system activities. For management as said above, outsourcing is used to obtain expertise, avoid managerial problems, and free management time. For cost reduction, outsourcing can be used to obtain part-time services as well as gain economies of scale. Lastly for risk reduction, outsourcing can be used to cap financial exposure, improve equality, and reduce implementation risk. Businesses and organizations have found hundreds of ways to outsource information services and portions of information systems. Some businesses choose to outsource the acquisitions and operation of computer hardware, the development of software, and even outsource an entire system. PeopleSoft, for example, gained popularity by providing payroll function as an outsourced service.

            Where there are advantages of outsourcing, there are also risks. Some of these include loss of control, benefits outweighed by long-term (or LT) costs, and they’re not being an easy exit. The loss of control include vendor in driver’s seat, technology direction, potential loss of intellectual capital, product enhancements in wrong priority, vendor management, direction or identity changes, and finally if the CIO is superfluous. Benefits outweighing by LT costs include having a higher unit costs forever, paying for someone else’s mismanagement, outsource vendor is de facto sole source in time, and may not get what you pay for but you don’t know it. Lastly, the no easy exist include critical knowledge in minds of vendors, NOT employees and expensive and risky to change vendors. When choosing to outsource, it is quite a difficult decision because businesses are constantly thinking about ups and downs. The correct decision in outsourcing may not be clear, but only time and events will enable the company to make a decision in doing so.

            Lastly, when becoming a user of information systems, we have both rights and responsibilities with your relationship with the IS department. We have the right to computer hardware and programs, reliable network and internet connections, a secure computing environment, protection from viruses/worms/threats, contribute to requirements for new system features and functions, reliable systems development and maintenance, prompt attention to any problems or concerns, properly prioritize problem fixes and resolutions, and effective training. Our list of responsibilities includes: Learning basic computer skills, learn standard techniques and procedures for the applications we use, follow security and backup procedures, protecting your passwords, use computers and mobile devices according to employer’s computer-use policy, make no unauthorized hardware modifications, install only authorized programs, apply software patches and fixes when directed to do so, devote time to respond carefully to requests for requirements for new system features and functions, and avoid reporting trivial problems.


BUS 188: Chapter 10 Outline

Matthew Mercado
08/06/16
BUS 188 (11:00am-3:00pm)
Chapter 10 Outline (2 page minimum)
Aggarwal

Chapter 10 Outline: Information Systems Security 

            With everything nowadays being accessible via the Internet and Social Media, does this mean that the world is secure because of the openness or has become even more vulnerable than before? Security, unfortunately, has become a major issue as threats are common and there’s always a loss whenever there’s no protection guaranteed. Much like safes/vaults, it’s considered valuable and closed from the public, but eventually there’ll be those who like to sneak around and butt into other people’s business. That is why security measures have been made to safeguard whatever needs protection. Such targets like personal belongings, files, and even money are the main 3 that often is up for the taking for thieves. The important thing to do is to create a safeguard (like a wall) to prevent any sort of threat from becoming too big. This minimizes threats and creates a more secure place. A prime example is our debit/credit cards. Whenever we use them, it’s very paramount that you never give out the ID number to strangers. Without our knowledge, those strangers could have access to your cards and could buy anything without your consent. Hackers can crack codes, break through databases, or even access personal records – you do not want any of those to be jeopardized by any means.

            Security nowadays often is breached and comprised due to a variety of sources. One such source is us – humans. Whether its accidental by employees or nonemployees, mistakes do happen and sometimes it may be costly. This is due to poor exercise of judgment, misunderstood direction on applications, and or even physical accidents. For example, a physical threat is if a construction worker were to accidentally drive a forklift into a wall. Not only is his life in danger, but the expenses for the damage forklift and property would always be threatening as well. Mistakes are common amongst everyone, but there are times when those errors, accidents, and misfires that often lead to disastrous results. Another example of a security breach that is common is bank robberies. Armed robbers carrying their weapons endanger the lives of the people as well as take advantage of people’s money, trust, and above all else – security. Even being at an ATM has become scary that security guards are often placed outside the facility in case a theft were to happen. Whether its theft, hacking, hijacking, or usurping power – our security has to improve or else attacks can be just about anywhere without there being someone to stop it.

            A very serious security breach also is a person impersonating someone else in order to gain data maliciously. Credit Card theft is a example of someone using your card without your consensus and ends up purchasing items that could accumulate to debt. Thankfully, there are ways to cancel your card in case something like happens, but what if pretexting takes place? When pretending to be someone else, everyone is under the assumption that everything is going well, but in reality that person is acquiring data that he/she can use to endanger lives and blackmail. Terms like spoofing, sniffling, and phishing are common when impersonating someone or even a company in order to access data in more ways that anyone can even imagine. Say, for example, I was receiving spam from companies that want to acquire my assistances or saying that I owe them money…that is an example of pretexting. When people give into these, its easy to manipulate people into thinking that they’re in the wrong. With technology advancing every year, accessing data is the norm and that’s why people have to be very careful while on the Internet. We have to be weary that anything can happen and in doing so, changing passwords, changing usernames, and hacking backup info is enough to take countermeasures just in case.

            Even with the progression of technology, threats can be stopped. As long as there are safeguards, then bypassing them could prove to be problematic for the attacker. The tighter the safeguard, the harder it’ll be for others. When implementing safeguards, another thing to note is that they are quite expense to create and maintain. Safeguards often reduce work efficiency and make daily tasks difficult to complete. The overall objective of information security is to find a trade-off between the risk of loss and cost of safeguard implementation. In other words, you want to make sure the risks outweigh the costs. For example, web-based attacks, malicious codes, and denial of services are just a few computer crimes that breach safeguards. There’s a lot of stress and irritation when it comes to our data being accessed because it just comes to show how easy it is to have info on the Internet be jeopardized due to safeguards being torn down. There are ways to respond to these security threats and in doing so, can keep us a little safe from harm.

            As said previously above, some ways to tighten security are to do the following: Take security seriously, create stronger passwords, use multiple passwords, send no valuable data by email or IM, use https at trust vendors, remove high-valuable assets from computers, clear browsing history (these include files and cookies), regularly update antivirus software, demonstrate security concern to fellow workers, follow organizational security directives and guidelines, and lastly consider security for all business initiatives. In just following these measures, we are enduring that information security is secured and we are taking the initiative to respond when anything happens            

Monday, August 1, 2016

BUS 188: Chapter 9 Outline

Matthew Mercado
08/01/16
BUS 188 (11:00am-3:00pm)
Chapter 9 Outline (2 page minimum)
Aggarwal

Chapter 9 Outline: Business Intelligence Systems

            Businesses always have a system that oversees patterns, relationships, and trends. These patterns, relationships, and trends are referred to as Business Intelligence (or BI for short). BI has the same 5 components as IS: Hardware, Software, Procedures, and People. All of this relates back to the concept of BI systems – information systems that process operational, social, and other data to analyze patterns. The BI intelligence application relates to four components: Operational DBS, Social Data, Purchased Data, and Employee Knowledge. The BI application then converts to Knowledge workers. The analyzing of data means to report, data mine, BigData, and have knowledge management. Businesses and organizations have generate so much data nowadays that, for the most part, BI is often used to inform. Referring back to SM in the previous chapter, BI can be used to access the patterns of certain trends and interests amongst a large majority on all SM platforms. Facebook is a prime example where it can identify trends much like a newsfeed, it’s the most-talked about topic or even the most read because it relates to an even broader audience than just one.

            With BI applications, one component is to identify purchasing patterns. When overlooking, for example, retail always look at their inventory and sees the buying behaviors of their customers. They look for style, feel, and appeal. If its Summer time, there’ll be less purchases for winter clothes and usually, winter attire is put on sale. Businesses and organizations have to be able to perceive patterns in order to make profit, conduct business, and retain customer loyalty. They can’t be two steps behind nor can be two steps ahead – they have to be able to be right along with the customer. Another example is when I used to work in retail and I sold leather jackets. There was a period of time where nobody would buy any leather products because it was out of season. Those who’d come buy to purchase one were only doing so for businesses purchases or were out of town. It was up to me to convince them of its usage as well as demonstrate the style, feel, and appeal of the jacket even if they didn’t necessarily have to buy it at that moment. That’s why retail is a prime example of businesses overseeing patterns. They keep up with the times and adaptable to change when need be. Another component BI could be used for is for Entertainment purposes.

            Streaming services such as Amazon, Netflix, Youtube, & Hulu could always be used to predict, perceive, and observe patterns in what shows they watch. A library of shows isn’t enough for everyone, so all the streaming services provide recommendations based on what the user has watched previously. For example, if I watched the show Breaking Bad on Netflix, Netflix would begin recommended shows that are like or similar to the feel of Breaking Bad. The service is predicting that we, the audience, will watch that show just because it has similar vibes to what we’ve previously watched. The observation and analyzing of patterns helps Netflix dictate what to provide for us as a means to attract a new audience to that show. These streaming services have changed the way we view TV because, nowadays, no one really rents videos or even buys movies. All of the content is available via the Internet and, much like a cassette tapes, we can rewind and fast-forward at our own leisure. People even go so far as to share Netflix accounts with others and, despite it technically not being legal, people have found a loophole in sharing content amongst one another as a means to create awareness of video streaming services’ popularity.

            Business Intelligence has three primary activities: Acquire data, perform analysis, and publish the results. A common example could be taking a test. When taking a M/C test, we utilize what we’ve learned from the material and apply it on the test. Once we submit it to the teacher/instructor, he/she will test the results, create the average of how well the class did on the test, and lastly publish the results to the individual with feedback. The first step is similar to data acquisition, which is the process of obtaining, cleaning, organizing, relating, and cataloging source data. When performing an analysis on the data, it’s pretty self-explanatory – they are observing the data to see any discrepancies (mistakes/errors) of any sort. Lastly, there are two types of publishing results: Push & Pull. Push publishing is the process of delivering BI to the knowledge workers who may need it. Pull publishing is the process that requires the user to request BI results. Publication of any media can include print or online content via web servers. Another prime example is SJSU’s Canvas – assignments, lecture slides, and test results can be posted online rather than given out by hand.

            Data, which turns into information, now is accessible everywhere. From Metadata to Databases, the amount of resources pulled to picture all the data sources is limitless. BI has made it possible for businesses and organizations to oversee the data they’ve collected and observe patterns from the formatting to the assumptions and constraints. Knowledge is vast and is pooled form all sorts of sources. Facebook is a prime example of a SM giant that has collected an ocean of information. From the information they’ve collected, users create communities based on specific information (interests, hobbies, and likes) and Facebook can observe patterns based on those communities just from the information they collected. It shows how everyone is interconnected one way or another and how everything mends together to illustrate a system that has become the norm of today. 

BUS 188: Chapter 8 Outline

Matthew Mercado
08/01/16
BUS 188 (11:00am-3:00pm)
Chapter 8 Outline (2 page minimum)
Aggarwal

Chapter 8 Outline: Social Media Information Systems

            With social media being the norm of the day, it’s not unusual for it to progress or advance every year because of technology. Everything is electronic nowadays and is accessible via the Internet. Platforms such as Facebook, Instagram, and SnapChat have made trends possible and have made rapid changes in the way we communicate and perceive information whether its relevant or not. Accessibility is both a privilege and a danger because with so much information at the touch of our fingertips, there’s an issue of whether privacy has become the issue or it’s the openness of the web. The amount of users on social media has become so limitless to the point where it’s bringing it a lot of popularity across all platforms. The sharing of content ha allowed everyone around the world to communicate via interest, hobbies, and or similarities. For example, I can find people on Facebook who happen to have the same interest in TV shows, music, and videogames. There are even communities online dedicated to these interests that it’s accumulating a large number of members to communicate amongst another despite not having met. Even though it’s a community online, the communication of interest is a topic of discussion because we enjoy talking about that particular interest. This brings us to SMIS.

            Social Media Information systems (or SMIS) are the information system that supports the sharing of content amongst a network of users. As said above, Facebook, SnapChat, and Instagram are prime examples of social media platforms that a lot of users use to support the sharing of content via the Internet/application. SMIS has 3 objective units: Social media providers, users and communities. The Providers/Platforms include the ones I stated have created so much community that social relationships are growing and even the number of users exceeds that of a population of people. Users are the people – the ones behind the sharing of the content. About 73% of people using the Internet use Social Media and about 40% access Social Media (or SM for short) via mobile phones. Social media day to day is attracting more and more users, creating even larger communities, and building even more social relationships. To put into perspective the magnitude of Social Media, there are about 1,415 active users on Facebook and, to this day, continues to grow. Through Facebook, as said before, communities are created so as to communicate with others around the world. Mutual interests and familial/organizational ties are the ones that makeup a community.

            Much like Information Systems (or IS for short), SMIS is made up of the same components: hardware, software, data, procedures, and people (you). For all 5, there are social media providers (Facebook, Instagram, SnapChat, etc.) and Users and communities (You and your interests). Hardware for SM includes desktops, laptops, and mobile devices. Software includes the browsers to access the applications such as IOS, Android, and Windows. Most of the SM vendors use a database management system called NoSQI to process their data through traditional DBMS products as well. SM fits into two categories: Content and connections. Content data is data contributed by the users while Connection data is data about relationships. For example, Content Data includes content that Facebook users write on their walls, making comments, and just about anything you publish on the site. For Connection Data, the friends and family you have are included in your list of connection. If you think about really, all SM is about is the sharing of content and the creating of connections.

            Procedures in SM are often considered informal, constantly evolving, and oriented socially. The software of SM is often designed to be easy to use and learn. The concern of SM is privacy, which I said above, is a pretty big issue depending on how people use the information. The creation of content isn’t scare by any means and in fact, through its accessibility, there has to be some level of organization to ensure that the data gathered is maintained and accurate. If its not knowledge, its just facts and figures with no context. Lastly, the people have a profound influence on SM because without people, there’s nothing going for that platform. The amount of people is so high on all platforms that its very similar to filling up a stadium at a sports game...they need to be able to fill the room and more in order to profit. The people are important and to this day, nothing can be done without human intervention.

            Content is something we’ve always shared online. There are blogs, websites, and community pages that are solely dedicated to specific interests, fields, and hobbies. These are always up for discussion because that community is enthralled with the idea of giving their opinion and output on that interest. The usage of SM has created B2C relationships to market products and even now, manufacturers have begun to use SM to become leaders of specific industries, promote brand awareness, and generate new B2B lead to retailers. This only comes to show how far SM’s profound influence has had on businesses and organizations. Content sharing has become the norm and as such, connections are made on a daily basis amongst users.