BIM Flashcards
Define Information systems:
All the software and hardware that the firm needs to achieve its business objectives.
Two perspectives:
1)Technical perspective: a set of interrelated components that collect, process, store, and distribute information to support decision-making.
2)Organisational perspective: Not only hardware and software make up IS but also its data, organisational processes and people who use them.
Ethics in Information Systems:
Ethics refers to the principles of right and wrong that individuals use to make choices to guide their behavior.
One example in IS is people tracking, which is often used for marketing without consent. Behavior patterns also can be analyzed and used for marketing purposes or discrimination in the workplace.
Trends that raise ethical issues:
1)Computing power doubles every 18 months (organizations rely on computers, thus leading to a vulnerability in case of system failure)
2)Data storage costs rapidly decline (Companies can easily hold detailed data on individuals)
3)Data analysis advances (Firms can analyze more and more data on individuals and create precise profiles based on their behavior)
4)Networking advances (access to data is increasingly enabled as moving data is less costly)
5)Mobile growth (cellphones can be traced without consent)
What is a Business process?
A collection of events, activities and decisions that lead to an outcome that brings value to organisation’s customers.
What is Business Process Management?
A body of methods, techniques and tools to discover and analyze, redesign, execute and monitor BP.
Business Process categories:
1)Order-to-cash: Starts with a customer order and ends with delivery and payment.
2)Quote-to-order: Starts with the customer requesting a price quote and ends with the customer placing an order, precedes order-to-cash.
3)Procure-to-pay: Starts with a determination that a product needs to be purchased, and ends with delivery and payment.
4)Issue-to-resolution: Starts with the customer raising an issue (defective product), and continues until both parties agree that the issue has been resolved.
5)Application-to-approval: Starts with a request for a certain privilege, and ends with approval/denial.
BPM Lifecycle:
1)Process identification: problem is posed, results in process architecture as all the processes related are analyzed.
2)Process discovery: current state of each process is documented, results in “as-is process models”.
3)Process analysis: Identify issues with this “as-is model”. Results in collection of issues.
4)Process redesign: Identify changes that would resolve the issue. Results in redesigned process.
5)Process implementation: Prepeare and perform changes required to move from as-is to to-be process.
6)Process monitoring and controlling
Repeat.
IT hardware history:
1)Mainframe era (1959), IBM introduces a range of centralized data processing systems, replacing vacuum tubes with transistors.
2)1965 minicomputers were introduced, enabling decentralized computing.
3)Personal computing era (1981) IBM introduces PC (this is not the first though). Standalone system, no connection needed.
4)Client-server era (1983) started when the client-server model distinguishes between providers and requesters.
Moore’s law:
Chip performance per dollar roughly doubles every 18 months.
Technology drivers of infrastructure evolution:
1)Moore’s law and microprocessing power
2)Law of mass digital storage (Every year the amount of data stored doubles leading to decreased costs)
3)Metcalfe’s law and network economics (The value of network increases with the increase of users)
4)Declining communication costs over the Internet and telephone networks, due to the growth of internet.
5)Standards and network effects (Compatibility of products and network communications is established, leading to economies of scale and decline in price)
Components of IT infrastructure:
1)Computer hardware platforms (IBM),
2)Operating system platforms(Microsoft Windows),
3)Enterprise software applications(SAP),
4)Data management and storage (IBM DB2),
5)Networking and telecommunications (Microsoft Windows server)
6)Internet platforms (Apache),
7)Consulting system integration services (IBM, HP).
Future of computers:
1)Quantum computing (extends the binary universe)
2)Optical computers (using photons of electrons)
3)DNA computing (using DNA molecules for highly-parallelized computing)
What is Cloud computing and its advantages:
Refers to the provision of IT resources over the Internet.
Software and hardware are replaced over the Internet.
Advantages:
1)Reduces costs as Google and Apple provide a free development environment.
2)Increases flexibility for scaling as you can add more servers when there are more visitors.
Disadvantages:
1)May lead to higher long-term costs as it costs more the added space.
2)Dependence on providers (bankruptcy, disruptions).
3)Moving legacy systems to cloud could be costly.
Cloud computing services:
1) Infrastructure-as-a-service (IaaS): Builds the infrastructure of cloud-based technology. Allows users to instantly obtain or give up IT hardware resources. Offers the most customization, with firms choosing which products to install, and develop. (Amazon Web service)
2)PaaS (Platform): Helps developers build custom apps via an API that can be delivered over the cloud. (Google App engine)
3)SaaS(software): Global-based software which can be bought or sold. For example, email, calendar, office tools, etc.
Define the Internet:
A decentralized system of networks that links devices around the globe and enables data transmission among them.
Internet application transfer protocols:
1)HTTP (Hypertext transfer protocol) - for communication between web browsers and web servers
2)SMTP (Simple mail transfer protocol) - for email transmission
3)FTP(File transfer protocol) - for file transfers between clients and servers
Data objects:
physical or electronic information flowing in and out of activity. Represented by a folded paper in BPMN
Data perspective:
Indicates which information is needed to perform an activity or which artifacts are produced during an activity (BPMN cilindra sūds)
Finding resources on the Internet (components of links):
URL (uniform resource locator) - used to find resources on the internet (uniform=standardised)
HTTP(application transfer protocol)://www(Host name).nytimes(Domain name).com(top level domain)/pages/tech(path)/index.html(file)
HTML( HyperText Markup Language) is used to format websites (how web looks like).
What is IP(Internet protocol) address:
IP addresses are 32-bit numbers assigned to every device connected to the Internet, serves as a unique identifier.
IPv4 consists of 4 blocks ranging from 000 to 255. This allows 4.3 billion addresses, which was reached in 2015.
IPv6 uses 8 blocks. Adaption is slow as it is not backward compatible.
Define Domain Name service (DNS):
Serves as a phone book of the Internet. Takes domain and host as inputs and returns the IP address of the server providing the requested resource. Serious hacking issue.
What TCP (Transmission control protocol) and how it works:
Slices information that is to be sent to the source computer, IP routes these packages. TCP then at the target computer checks for completeness and reassembles packages.
Information is split and then reassembled because then only the part that has an error has to be resent not the whole file. Also, it can be sent through many routes and balanced.
What is Artificial Intelligence?
An attempt at building a computer system that thinks and acts like humans.
Grand vision: Presumes that computer systems are as smart as humans
Realistic vision: views AI as systems that take data inputs, process them, and produce outputs, while performing complex tasks, that can be too difficult for humans.
Expert systems:
Captures knowledge in a very specific domain of human expertise. They look at knowledge as a set of rules and perform limited tasks.
An example is when an engineer constructs rules from which the AI can diagnose malfunction, then the IT expert constructs
A user interface: The user’s query is received and sent to the inference engine
Inference engine: contains rules to solve the problem received.
Knowledge base: contains all the rules based on which the decisions are made.
Machine Learning:
Starts with a very large data set and enables the computer programs to learn from this data. Learns how to recognize patterns, and utilize this prior learning. An example is Facebook Ads and Netflix recommendations.
Neural Networks:
Inspired by the structure and functioning of the human brain. Their function is to find patterns and relationships in a large amount of data. The AI “learns” patterns by searching for relationships, building models for them, and correcting them continuously. Meanwhile, humans “train” by feeding data with known outputs.
For example, credit card users’ behavior is analyzed and flagged if considered unusual.
Limitations of Neural Networks and Machine Learning:
1)Both require very large datasets
2)Some patterns may require human judgment
3)Often large datasets are not available, as the decision does not have many inputs
4)It is difficult to understand how the system arrives to the solutions
5)AI has no sense for ethics
Genetic Algorithms:
The main goal of this AI is to find the optimal solution for a problem by examining a large number of solutions.
Solves optimization problems by changing variables and arriving at the best solution fast, for example, cost minimization, scheduling, and designs.
Furthermore searches for solution variables based on evolutionary processes.
Natural language processing:
This AI has the ability to understand, speak, read in natural language, and translate it. Examples are Google Translate, Siri, etc.
Useful in a limited amount of fields, however, for example, helps communicate with car’s heating system.