1 / 24

Major Topic: Types of IS

Major Topic: Types of IS. DSS, MIS, EIS TPS, PCS ECS We’ve seen really good examples of MIS, ECS, and DSS in lab. Major Topic: IS components vs system components. IS components People Data Process Software Hardware. System Components Input Output Processing Feedback Control.

courtney
Download Presentation

Major Topic: Types of IS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Major Topic: Types of IS • DSS, MIS, EIS • TPS, PCS • ECS • We’ve seen really good examples of MIS, ECS, and DSS in lab.

  2. Major Topic: IS components vs system components IS components • People • Data • Process • Software • Hardware System Components • Input • Output • Processing • Feedback • Control

  3. Major Topic: Attributes of Information GIS Lab: Family Watchdog Website General Goal: Keep children away from risk • Specific Usage: • Look up specific people, i.e., soccer coach, Religious Ed. Teacher, neighbors. • Look at surrounding areas for possible dangerous areas. • Is the bus stop safe? Is the walk to Walmart safe?

  4. My Top Three (parent perspective) • Complete – A parent would be very upset if the system was missing the sex offenders in their neighborhood. If the data is incomplete, the system has very little value • Timely – Similar to complete, if the data only gets updated once a year, a sex offender could move next door and they system may report it for a long time. • Accurate – What if an address is entered incorrectly? Sex offender could be next door but the inaccurate system reports them on a different street.

  5. Why it is important to identify stakeholders from the start:Different Perspective Police Office / Investigator Perspective • General Goal: To find suspects and reduce incidents • Specific Usage: • Look for known offenders near an area where there was an incident • Look for problem areas to patrol, i.e., sex offenders near playgrounds, schools, bus stops, etc.

  6. Police Officer’s Top Three • Complete – The map may have sex offenders but not playgrounds, bus stops, schools, etc., which means you can’t identify problem areas so easily • Timely – Sex offenders may move often to avoid scrutiny. An officer needs to know about this movement ASAP. • Reliable – You don’t want the system going down in the middle of an investigation. For parents, who might access the system occasionally, reliability is less of a concern, but for an officer it may be quite important

  7. Bottom Choices Parent Perspective: • Thecost of the data is less of a concern for parents because the value is so high, so economy is simply a low priority. • However, the organization that provides the system has to worry about cost, or they may not be able to provide the system in the future. • The flexibility of the data is not a concern since parents are unlikely to need the data for other purposes. • Whereas, a police officer may want to combine the sex offender map with other crime maps.

  8. Bottom Choices Police Office Perspective • Simplicity might not be a factor, since a police officer may get the training to use a very complex GIS crime mapping systems. • Simplicity is more important for novice users • A police officer may be able to better determine what information is relevant vs. irrelevant. They probably want complete information even though some of it may seem irrelevant.

  9. Argument about Security Answer depending on how you define secure. • Secure (top secret): • A tip on the whereabouts of a fugitive is more valuable if the cops can keep it a secret • If the media reports it, the criminal might flee before the cops arrive. • Secure (authorized control): • The information could be publicly accessible, but only authorities can edit and control it

  10. Argument about Security Secure (top secret): Least Important • The more information shared, the more awareness there will be about dangerous sex offenders. This system should NOT be a secret. Secure (authorized control): Most Important • If the sex offenders could edit the information, the system breaks down completely. • PARIS, France (CNN) -- A French judge has issued an arrest warrant for U.S. cyclist Floyd Landis for allegedly hacking into the computer system of the French anti-doping agency's laboratory

  11. Major Topic: Data InformationExcel Lab • 1333333 • 453333 • 97067 • 201600 • 15929 • 928972 • 306667 • 1880764

  12. Simplicity • Formatting and labeling data is one way to transform data to information • Labels add context and explanation • Formatting add Simplicity, • i.e., easier to understand and interpret • [Sidoti Example]

  13. Convention Center Data  Information

  14. Input  Processing  Output • Input: Raw Data • Output: Information (report, chart, graph, map) • Processes: (always verbs) • Processing examples from Excel Lab? • Lookups (automation) • Sorting • Averaging (simplification) • Subtotaling (simplification, more relevant)

  15. Major Topic: Role of IS in collaborationCMC Lab • Synchronous vs. Asynchronous • Communication vs. Collaboration • Other benefits • Work flow • Task Management • Calendaring • Document/Content Management

  16. Last Major Topic:IS for Competitive Advantage • 5 Forces (Porter’s) • 5 Strategies (role of Information Systems in these strategies).

  17. Tough Topic: Feedback • Two definitions: • Feedback as part of a system • Feedback in collaboration, i.e., feedback + iteration

  18. System Feedback (GE Centricity Case) • The GE Centricity case was filled with examples of feedback. • Patients seen per hour • Number of errors • Number of malpractice lawsuits • A hospital can operate without the above information • but you need to know these things if your goal is to improve operations or cut costs • Output examples • Hospital Bill • Prescription • Patient Test Results • Feedback is information that tells you how the system or a enterprise is doing.

  19. System Feedback • Paper-based systems can often produce good output • Bills • Receipts • Reports, etc • But, they don’t produce feedback as efficiently • In fact, previous to Centricity, the hospital might not have been even aware of performance measures. • Previous to using Centricity, calculating… • Prescription error rate • Patients seen per hour • ….Was a time consuming process • In processing input and producing output, feedback can often be generated at almost zero cost. Kroenke principle

  20. Feedback in Collaboration • Examples: • Team member points out an error (improve accuracy) • Team member suggests a more efficient process (improve economy) • Team members vote on what they think is the best (more perspective) • Similar to system feedback, the information provided leads to improvement

  21. Feedback in Systems (automated) vsin Humans (collaboration) Systemic view • Automating a process • InputProcessingOutput • opportunity to gather information about that process to help improve it. • Gathering this information is often the driving motivation behind the automation Human view • More people (eyes and ideas) equals more • opportunity to catch errors • potential to discover better solutions • Creating these opportunities and potentials is the driving force behind collaboration

  22. Central Lesson to Learn • Why do we collaborate? • It is not more efficient • Takes effort • Takes time • But, the human feedback generated can create better outcomes overall. • Why do we use information systems? • Sometimes it is more efficient, but not always • Using an IS takes effort • Takes time • But, the systemic feedback generated can create better overall outcomes

  23. IPOF and 5 components: Everything comes together • #1 Consider a system: Blackboard, iTunes, Centricity. • Or, consider software used to achieve a goal • Google Doc • Spreadsheet • MapInfo • #2 What is the goal of the system? Or, why are you using the software? • #3 Who are the stakeholders • (benefit if the system works, get hurt if the system fails) • #4 Identify the • hardware • software • processes or procedures • stored data • people • Steps 1-4 will help you define the system boundaries and identify correct IPOF.

  24. IPOF and 5 components: Everything comes together IPOF • I: What data is inputted into this system? Often becomes the stored data. • O: What information comes out of the system? The stored data with more value. • Input  Output • P: How does this transformation take place (processing)? • F: What are the ways the system can tell us how it is doing (feedback); • Feedback is almost always connected with the goal.

More Related