Introduction to Information Systems

Introduction to Information Systems

Chapter 7 Discussion Questions

Why there is a strong trend toward cross-functional integrated enterprise system in the business use of information technology? Cross-functional enterprise system is a group of people with different functional expertise working towards a common goal. It can be the people from finance, marketing, operations and human resources. Typically, it includes people from all levels of an organization.

Cross-functional enterprise systems often function as self-directed enterprise system responding to broad, but not specific directives. Cross functional enterprise systems include Enterprise resource planning (ERP), Customer Relationship management (CRM) and supply chain management (SCM). Enterprise Resource Planning (ERP) is an integrated computer-based system used to manage internal and external resources, including financial resources, materials, and human resources.

Its purpose is to facilitate the flow of information between all business functions inside the boundaries of the organization and manage the connections to outside stakeholders. Built on a centralized database and normally utilizing a common computing platform, ERP systems consolidate all business operations into a uniform and enterprise-wide system environment. Customer relationship management (CRM) is an information industry term for methodologies, software, and usually Internet capabilities that help an enterprise manage customer relationships in an organized way.

For example, an enterprise might build a database about its customers that described relationships in sufficient detail so that management, salespeople, people providing service, and perhaps the customer directly could access information, match customer needs with product plans and offerings, remind customers of service requirements, know what other products a customer had purchased, and so forth.

Supply chain management (SCM) is the combination of art and science that goes into improving the way your company finds the raw components it needs to make a product or service and deliver it to customers. Many companies today are using Cross-functional enterprise systems because these companies view cross-functional enterprise system as a strategic way to use IT to share information resources and improve the efficiency and effectiveness of business processes, as well as to develop strategic relationships with customers, suppliers, and business partners.

Textbook Pg 260 http://searchcrm. techtarget. com/definition/CRM 6. How could sales force automation affect salesperson productivity, marketing management, and competitive advantage? Abbreviated SFA, sales force automation is a technique of using software to automate the business tasks of sales, including order processing, contact management, information sharing, inventory monitoring and control, order tracking, customer management, sales forecast analysis and employee performance evaluation.

It improves productivity by saving time otherwise spent on manual creation of records, reports, and presentations; it increases communications and accessibility to information to support sales activities; and it may help in planning sales tactics. Increasingly, computers and networks are providing the basis for sales force automation. In many companies, the sales force is being outfitted with notebook computers that connect them to Web browsers, and sales contact management software that connect them to marketing websites on the Internet, extranets, and their company intranets.

Sales force automation has resulted in increasing the personal productivity of salespeople, dramatically speed up the capture and analysis of sales data from the field to marketing managers at company headquarters, allows marketing and sales management to improve the delivery of information and the support they provide to their salespeople. Many companies view sales force automation as a way to gain a strategic advantage in sales productivity and marketing responsiveness. The best example is Baker Tanks, a nationwide leader in rentals of industrial containment and transfer equipment.

Before baker Tanks invested in and implemented sales force automation, they were recording all sales data on paper. It was tedious for the company to improve productivity and respond to its client in time. Baker Tanks moved from paper-based system to a Web-based system, Sales people were equipped with PDAs with instant access to companies Customer database. By implementing sales force automation the Baker Tanks achieved the main objective of communicating better with their customers and increased productivity and profitability.

Chapter 11 Discussion Question

What are your major concerns about computer crime and privacy on the internet? What can you do about it? Explain. Computer crime is a growing threat to society by the criminal or irresponsible actions of computer individuals who are taking advantage of the widespread use and vulnerability of computers and the Internet and other networks. It thus presents a major challenge to the ethical use of information technologies.

E-computer crime poses serious threats to the integrity, safety, and survival of most e-business systems, and thus makes the development of effective security methods a top priority. The Association of Information Technology professionals (ATIP) defines computer crime as including: The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources. The unauthorized release of information The unauthorized copying of software

Denying an end user access to his or her own hardware, software, data, or network resources Using or conspiring to use computer or network resources to illegally obtain information or tangible property Individuals must express their concern to government and concerned party. So that proper action can be taken in this regard. The Internet offers very little privacy to any individual. It is a communications platform with minimum control. As it currently stands, companies can legally place cookies on your computer when you visit their websites.

With these cookies they know your website behavior and the places you have visited on the Web. This information can be used in a number of ways – to monitor and target you with unwanted product offerings, or even sold to third party vendors. Individuals must exercise caution when giving out any type of personal or sensitive information. They can also ask their ISP providers to not give out information about them. Certainly sensitive information such as credit card numbers, e-mail address, mailing address, and bank account numbers and so on should only be given out to secure sites.

Textbook 5. What is disaster recovery? How could it be implemented at your school or work? Disaster recovery is a method for ensuring that an organization recovers from natural and human caused disasters that affect its computer-based operations. Disaster recovery plans are developed to help prevent the loss of information. Disaster recovery plans specify who will participate in disaster recovery and their duties, the hardware and software that will be used, and the priority of applications that will be processed.

Disaster recovery could be implemented at Saginaw Valley State University by first drafting a disaster recovery plan and conducting a thorough risk analysis of university’s computer systems. This could be done by the IT services department. Anything that could possibly cause a system outage is a threat, from relatively common threats like virus attacks and accidental data deletions to more rare natural threats like floods and fires. Determine which of your threats are the most likely to occur and prioritize them. Rank each of them and rate the risks as low, medium, or high.

The list should also contain solutions and the cost of implementation. The information should be passed along from IT services to management. A plan should be drafted and developed. The plan must include the allocation of work during the disaster. Roles and responsibility should be assigned in advance. For example, who is responsible for getting the disaster plan in motion. Plenty of tests should be run before implementing the plan into the system. After tests are run and the plan begins to look promising, It should then be passed along to all employees.

Haven’t found the essay you want?