Please enable JavaScript.
Coggle requires JavaScript to display documents.
Unit 9: Information Systems - Coggle Diagram
Unit 9: Information Systems
Information System Basics
types
transaction processing systems (TPS)
online processing
OLTP (online transaction processing)
management information systems
decision support systems
decision models
decision query
expert systems
support the mission
support problem solving
structured problems
semi-structured problems
unstructured problems
support decision making
operational
strategic
tactical
What Kinds of Enterprises Can An Information System Serve?
Vertical
Horizontal
Enterprise Applications
ERP
Human Resources
Financial
Manufacturing
Customer Relations
Central Database
Supply Chain
Ecommerce
Payment Gateways
B2C
B2B
C2C
B2G
Carts and Cookies
SCM (supply chain management)
CRM
loyalty programs
sales
marketing
customer support
System Analysis
Analysis Phase
Determine requirements
requirements report
study current system
Tools
PERT
WBS
Gantt Charts
DFDs
UML
use case
sequence
class
CASE software
Planning Phase
Assemble project team
justify project
cost benefit analysis
choose methodology
schedule
PERT
WBS
Gantt
project development plan
deliverable
five forces model
PIECES
Design and Implementation
Maintenance Phase
4) Fix Bugs
1) Operate Equipment
2) Make Backups
3) Help Users
5) Optimize and Revise
Quality-of-Service Metric
throughput
accuracy
downtime
capacity
user levels
response time
Implementation Phase
convert data
Cutover conversion
Direct conversion
Parallel conversion
Phased Conversion
Pilot conversion
train users
procedure handbook
document
system documentation
user documentation
test
application testing
unit testing
integration testing
system testing
create applications
obtain hardware
Design Phase
identify potential solutions
evaluate solutions
select hardware
select software
develop specifications
obtain approval
Enterprise Data
What Kinds of Disasters Put Information Systems at Risk?
natural disasters
power outages
equipment failures
human errors
software failures
acts of war
vandalism
Security Measures
disaster recovery plan
data centers
deterrents
preventives
corrective procedures
detection
What Can Consumers Do to Minimize
Know when data is being collected
Find out how data is being used
Find out what data is retained
Don't trade your privacy
Identity Theft
Risks
malware attacks
employee negligence
insider theft
device theft
system glitches
software failures
human errors