SlideShare a Scribd company logo
1 of 27
1
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
IT190-1502B-01 Introduction to IT
Information Systems
Jerrett S. Wilson
May 20th
, 2015
2
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
Table of Contents
Section 1: Information Systems Overview ............................................................................................4
Organization...................................................................................................................................4
Information Systems.......................................................................................................................5
Section 2: Information Systems Concepts.............................................................................................9
Networks........................................................................................................................................9
Local Area Networks (LAN)........................................................................................................9
Wide Area Network (WAN).........................................................................................................9
LAN vs. WAN..........................................................................................................................10
Wi-Fi and Telecommuting.............................................................................................................10
Wi-Fi........................................................................................................................................10
Telecommuting .........................................................................................................................11
What’s Best For Us?.....................................................................................................................12
Section 3: Business Information Systems ...........................................................................................13
Management Information System (MIS).........................................................................................13
Decision Support System (DSS) ....................................................................................................14
Transaction Processing System (TPS)..............................................................................................15
Artificial Intelligence (AI).............................................................................................................16
Section 4: System Development ........................................................................................................18
Customer Tracking System ............................................................................................................18
Waterfall Model........................................................................................................................19
Prototype Model........................................................................................................................19
Creating MMOM3........................................................................................................................20
Software Requirement Specifications (SRS)................................................................................20
System and Software Design......................................................................................................21
Implementation and Unit Testing................................................................................................21
Integration and System Testing ..................................................................................................21
Operation and Maintenance........................................................................................................22
Section 5: Information Systems and Society .......................................................................................23
Information System Security .........................................................................................................23
Types of Cyber Crimes..................................................................................................................23
Hacking....................................................................................................................................23
3
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
Malware ...................................................................................................................................24
Theft ........................................................................................................................................24
Phishing....................................................................................................................................25
Conclusion ...................................................................................................................................26
References.......................................................................................................................................27
4
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
Section1: InformationSystems Overview
Organization
Although, there are very many different organizations out there to choose from, I have
chosen Meathead Movers as my Target Organization. Meathead Movers began in 1997, founded
by Aaron and Evan Steed. The company began as a way for two kids in high school to buy
clothes, food, and school supplies. Being in both football and wrestling it was tough for the two
to find a part-time job that would fit their busy schedules. They started by helping their friend’s
parents move which caused a chain reaction by word of mouth. At first the fee for their services
was a mere $20.00 and pizza for the work they did. Before they could say Meathead Movers, the
idea to start a moving company had already begun.
In 1997, Meathead Movers was only just beginning. Aaron and Evan posted flyers that
they had printed in computer class. The form of communication was Aaron’s beeper which he
would respond to calls on break whenever he got a chance. Clients would have to leave a
message, wait for the call, and then schedule an available time according to Aaron and Evan’s
school and sport schedule. Once booked, the clients would then rent a moving truck and pick
both of them up and watch them get to work. So, the only network they had back then was a
beeper, telephone, and word of mouth.
5
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
From 2005 to 2015, Meathead Movers has expanded its locations along the west coast of
California. They opened several offices from Fresno, CA to Camarillo, CA, and even a storage
facility in San Luis Obispo, CA. Now having over 80 computers on their network and over 100
employees using them every day, the need for faster servers and larger bandwidths has arrived.
As Meathead Movers expanded, so did their need for information systems. Meathead
Movers has adopted several systems, such as, Customer Relationship Management (CRM),
Business to Business (B2B), and Transaction Processing System (TPS). By utilizing these three
systems, Meathead Movers has been able to grow successfully as a company, and will continue
to do so.
Information Systems
As for any small business, being able to implement a quality and effective information
system can be the difference between success and failure. However, without a properly trained
staff, any information system regardless of how great it is can cause epidemic failure. In order to
decide which information system to use, Meathead Movers has what is called a testing phase.
The testing phase is an extensive process where the company reality tests an information system
to find out the pros and cons of each system. After the testing phase is complete, all data will be
complied and company executives decide whether or not to implement an information system.
Below are just a few of the information systems that have passed the testing phase and were
implemented to become part of the company.
6
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
One information system that Meathead Movers utilizes, which is considered the most
important, is called Meathead Movers Operation Management V2.0 (MOMM2). MMOM2 is the
heart of the company when it comes to a CRM information system. The program was originally
created and designed by Co-Founder, Evan Steed, to be a basic way to track upcoming services.
However, after realizing how it could be used to serve as a not just a service tracker, but also a
CRM, Evan created a multifunctional program capable of; creating services, updating and
tracking current and future services, e-mailing clients pertinent information about their move,
automatically notifying management of service completion, tracking consumer reviews, and
providing management with a live status of day to day operations.
In order to have a successful business, there must be some sort of TPS in play. Since
Meathead Movers offers a service at a cost, they must have a way to process transactions. Due to
the wide variety of payments customers use, Meathead Movers has decided to accept all forms of
payment. Of course, this means that some forms of payment, mainly credit cards, come at a cost
to process. Also, employees must be properly trained on how to accept all forms of payment,
especially credit cards. To cut down costs, Meathead Movers uses an imprint carbon copy
machine to capture credit card payment information. Although this system works, it comes with
many issues such as; customer card information being recorded on paper, it is possible for an
employee to lose this copy opening up the client to theft or fraud, old technology compared to
other companies, payment has to be called in after copy is taken, if services completed late in the
day then payment doesn’t go through until next business day, and requires employees to carry
the machine and blank carbon copies. As the company grows larger, this is an area that will need
great improvement in order to ensure future success.
7
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
A major key factor to a successful moving company is having the right tools for the job.
Some of the tools and products required to complete a service have to be purchased, and others
can be created through proper training. This brings up a third information system called B2B,
which Meathead Movers uses to purchase products from other companies at wholesale to be
resold to clients for profit. In order to utilize a B2B system properly, Meathead Movers uses
MMOM2 to keep an accurate inventory of all supplies. When a certain product gets low in
supply, MMOM2 automatically sends an alert notification to operations to order more. From
there, an operation’s employee will submit, through MMOM2, a purchase order (PO) for
whichever product is called for. This has been extremely successful in maintaining product stock
in order to prevent customer failure.
As previously stated, without a properly trained staff there can be failure, regardless if an
information system passed the testing phase. Meathead Movers has one of the best employee
training systems used by any moving company, called Meathead University (MHU). MHU was
designed as a training tool that was easy to understand and operate by anyone. Similar to
MMOM2, MHU was designed by Evan Steed and created as an intranet site that is only
accessible by Meathead Movers employees, on Meathead Movers servers. Also known as “The
Meathead Wiki” to employees, this site contains all information vital to train employees on all
job functions. However, like MMOM2, MHU requires routine maintenance and updates in order
to maintain functionality. This maintenance is completed by the software engineering team, also
led by Evan Steed, weekly and monthly to ensure operational success.
Of course, as Meathead Movers grows as a company, technology will begin to improve
which means that the company will need to continue to evaluate how each information system is
operating. Although every information system went through an intense testing phase, every year
8
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
each information system get reviewed again and compared with new possible systems. Once
again, after all the testing is done, the data is sent up to management and decided on whether or
not the information system has proven to remain effective, or obsolete. Even though it is highly
unlikely, there is a possibility that every information system could be completely replaced at one
time.
9
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
Section2: InformationSystems Concepts
Networks
When it comes to using networks, Meathead Movers has a couple choices as far as what
they can utilize to best fit their needs. Although a network is a system of computers or other
devices that are connected to each other, how are they connected? Commonly, computers or
other devices are connected via a Local Area Network (LAN) or a Wide Area Network (WAN).
Local Area Networks (LAN)
One of the more common of the two network systems is going to be a LAN system. A
LAN can be connected through cable or wirelessly, such as Ethernet or Wi-Fi. While a user is
connected via “Wi-Fi”, it is now referred to as a Wireless Local Area Network (WLAN).
However, computers connected via an Ethernet cable can usually transfer data quicker than a
wireless connection. Unfortunately, using a LAN will limit the user’s network to a small area.
Due to the area restrictions, a LAN is commonly used in the home, schools, and even small
businesses. These restrictions are based on equipment limitations, such as length of Ethernet
cable or range of a Wi-Fi signal.
Wide Area Network (WAN)
Although a LAN is restricted by a small network area, one could still connect to other
LANs via telephone lines and radio waves. This is referred to as a WAN, which is typically used
for large businesses, online schools, and even the internet. A WAN can bridge the gap between a
company that has two or more LANs, and would like to connect together. By utilizing a WAN, a
10
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
company can virtually connect and transmit data from anywhere on the planet. This can be
extremely useful for companies that have branches in all parts of the world.
LAN vs. WAN
Some of the obvious differences between a LAN and a WAN are the size capabilities.
However, another major difference is the performance capability. Hands down the quickest
connection will be a LAN, up to 30x faster, due to less distance for data to travel. Just like cars
on roads, data still has to travel when it is asked for. So, it only makes sense that a larger
network, such as a WAN, will take longer to transfer data than a smaller LAN. Another major
difference is going to be the cost between a LAN and a WAN. A LAN is usually relatively cheap
due to being easier to setup and requiring less equipment. Also, a LAN can require a lot less
advanced infrastructure to keep it running.
Wi-Fi and Telecommuting
Most employers will require their employees to work in the company building or on the
job site. However, some companies will allow their employees to work from home or another
place that may be more convenient for them. Some employees will even travel while working
and need to use wireless meansto work.These methodsof workcan be accomplishedviaaWi-Fi
connection,orthroughTelecommuting.Bothof whichare verycommonand will become more common
inthe future ascompaniesgrowandexpandwithtechnology.
Wi-Fi
As previous stated, Wi-Fi can also be described as a Wireless Local Area Network
(WLAN). This network is becoming more popular not only in the business environment but also
11
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
in the home as well. Wi-Fi allows multiple users to connect to one network, without all the
clutter of cables since it connects via radio waves to what is called a router. Although this
method may not always be the fastest connection compared to an Ethernet cable, it is still very
fast.
One issue that may arise with Wi-Fi is security. With an Ethernet cable, all your
information is going through a wired cable from computer to network. However, with Wi-Fi, a
computer now connects via radio waves to a network that anyone else, that’s looking, can see. A
way users can combat this issue is by using a Wi-Fi password in order for someone to access
your network. Although password protecting your network doesn’t 100% guarantee your safety,
it sure helps reduce the risk of someone else accessing your information that shouldn’t be.
Telecommuting
A way employers utilize a WAN, is by allowing employees to work via telecommuting.
Telecommuting is the process of working through phones, e-mail, and internet. Although not all
jobs are able to utilize telecommuting, it can be a great benefit to those that do. A reason for
telecommuting could be; if an employee that works with software decides to relocate across the
country and the company is willing to allow work to be completed via email. Projects will still be
completed, the employee will still have a job and the employer doesn’t have to hire a new
employee and start from scratch.
A major problem with telecommuting is the lack of face to face interaction. This can be a
major problem if discipline is needed to be given, due to not being able to properly instill the
seriousness of the infraction via a phone call. Also, accountability is hard to keep up with if you
12
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
don’t see the employee everyday to track if they are actually working every day or taking a few
days here and there off.
What’s Best For Us?
When Meathead Movers opened up their first branch, all that was needed was a LAN.
This system was setup in a rather small office and had 1 computer connected via cable. However,
upon opening several branches throughout California, Meathead Movers now utilizes a WAN.
They do this by renting a line from a service provider and using their network to stay connected.
This allows estimators to telecommute and go out to jobs, get all the information needed, go
home and set up all the paperwork needed for a quote, submit everything through MMOM2 for
approval, and finally an e-mail will be sent to the customer to set up a date for their services.
Although a WAN can be a lot slower than a LAN and more costly, the ability to have all
branches connected together is worth the slower network speeds and price.
13
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
Section3: Business Information Systems
Management Information System (MIS)
In order to effectively manage data, a company needs to be able to pull reports about
various aspects of the operation. The way this is done is through a type of Management
Information System (MIS). A MIS is a computerized database of information organized and
programmed in such a way that it produces regular reports on operations for every level of
management in a company (Inc., 2015). Simply put, a MIS organizes data so that a company can
analyze it, convert it into information, and then gain knowledge and improve the company.
Why would this be an important asset for a company to acquire? Here’s an example of
how Meathead Movers uses their MIS: Every week a report on employee hours is generated, this
report shows which employees are getting overtime each week and which employees are not.
Many times one employee, we will call employee A, will have an exceptional amount of
overtime compared to others. This data is analyzed by the Operation’s Supervisor (OS), which
grants information saying that employee A is working too much, now the OS has knowledge of
employee A being over worked and will reduce the number of long jobs employee A will get the
next week. This will then allow hours to be spread out more evenly, which mean less overtime is
paid, and since Meathead Movers is a very physically demanding job, it gives employee A much
needed rest to reduce work related injuries.
As previously stated, MMOM2 is a part of Meathead Movers CRM and also plays a
number of roles in the success of the company, so it is no surprise that MMOM2 is also the
companies MIS. Another way that MMOM2 is used as a MIS, is monitoring the inventory of the
company to provide accurate and up to date information on when supply is low. When inventory
14
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
of a certain items gets below 60% of maximum stock, an exception report is generated and sent
to the OS for immediate attention. Although inventory is regularly ordered on a weekly basis,
there are instances where a client will request more boxes than estimated for, this will cause an
unforeseen drop in inventory and can cause the exception report. This exception report will allow
the OS to decide whether or not a separate order needs to be placed depending on projected
supply and demand.
There are many different ways a company can fail; low customer satisfaction,
overspending, lack of inventory, negligence of poor employee performance, and ignoring
possible signs of work related injuries happening. However, one way to help reduce the
possibility of company failure is to have an effective MIS. As a growing company Meathead
Movers is continually learning and changing their MIS so that it can provide the best up to date
reports to help prevent future company failure.
DecisionSupport System (DSS)
A Decision Support System (DSS) is a lot like a MIS in the respect that it processes data
and can generate reports. However, a DSS is far more advanced than a MIS and can help analyze
the data and process it into information so that the consumer can use this information to gain
knowledge, which assists in decision making. Although a DSS doesn’t actually make the
decision, it does provide a great deal of flexibility in getting computer support for decision-
making activities (Principles of Information Systems, eBook, 2015).
For now, Meathead Movers still utilizes MMOM2 as a MIS due to the fact that it works
well for them. However, there is a possibility that with how quickly the company is expanding,
they will soon need some sort of DSS program to help with decision making. As far as a current
15
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
model of DSS, Meathead Movers still has monthly meetings to analyze reports and make
important decisions with executives. This method, although a little old fashioned, still works well
as it keeps employees involved to gain real life input as opposed to a computerized analysis.
Transaction Processing System (TPS)
Any business that provides a service or sells merchandise must have some sort of
Transaction Processing System (TPS). A TPS is a way a company can interact with a customer
or other company either by ordering, billing, employee payroll, or even order tracking (Principles
of Information Systems, eBook, 2015). Although order tracking is primarily used with certain
companies such a parcel shipping and even pizza delivery companies, it still serves as a very
important TPS for those companies success. However, a TPS is pretty much just a basic system
that doesn’t provide much support like a MIS or assist with decision making like a DSS. None
the less, without some sort of TPS, companies would not be able to provide the services needed
to be successful.
In order for a TPS to be successful, a company must first understand how to use a TPS
effectively. A TPS can take data, such as services rendered, and put it together in the form of
information on an invoice, which can then be sent to the customer who will gain knowledge of
what exactly was down and the cost of the service. This is extremely important when providing
services where a company charges by time increments and also materials cost. If Meathead
Movers were to just tell customers “You owe $500” and provide no invoice or breakdown of
cost, there would be a lot of issues. However, Meathead Movers provides a very detailed copy of
the customer order which explains the time the service was started and completed, any materials
that were used, how much time it took to travel from origin to destination, and even a break
down section which shows hourly rates and overtime rates.
16
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
Due to having a successful TPS, customers of Meathead Movers are rarely confused on
what they were charged for, and have a clear representation of what went on during the service.
This has attributed to customers having a positive experience with the company and sharing their
experience with friends and family, which ultimately leads to more business. Without an
effective TPS, a company can easily cause frustration not only to customers, but to employees as
well since the employees are the first line of communication between the customer and the
company. Even though Meathead Movers currently has an effective TPS, as they grow as a
company, there will always be room for improvement which can be said about any company.
Artificial Intelligence (AI)
Artificial Intelligence (AI) is very advanced software that allows a machine to
demonstrate some sort of intelligence. When most people think of AI, they think of scary robots
taking over the earth, or big fancy expensive computers talking with people however, AI is also
demonstrated in GPS devices, like your smart phone.
When using your smart phone or GPS devices to direct you to a location, it makes
intelligent decisions based on your current location. If you ended up making a wrong turn, your
GPS will recalculate and tell you how to get back on track. This is done by taking real time data
from your location and transmitting it through satellites to provide information on the correct
route to take, which is then converted to knowledge to the user through a turn by turn directory.
Meathead Movers doesn’t use fancy robots that move furniture for them, or talking
computers that run day to day operations all by themselves however, every driver uses some
form of GPS to guide them from the moment they leave the warehouse, to the moment they
return. Although this form of AI isn’t extraordinarily advanced, it still serves as a very important
17
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
key to company success. Without some form of GPS, crews would not arrive to services on time,
which would cause customer dissatisfaction, which would lead to bad reputation, and ultimately
cause company failure.
Another way that Meathead Movers utilizes a form of AI is through MMOM2, via
location consideration. For example; when a service is entered into the system, the zip code is
also entered into the DBMS. The reason for this, is when a crew goes out to a service in a certain
area and discovers a road that is not maintained by the city and has very low hanging trees, a
location consideration is then input for future reference, this is so that the company can dispatch
a smaller truck which will fit to better service the customer. Data entered into MOMM2 is saved
so that the system can automatically alert operations via AI, so that a smaller truck will be
dispatched from the start. Although this isn’t very advanced AI, it is still a form of intelligence
that is demonstrated by MMOM2 to assist in company success.
18
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
Section4: System Development
Customer Tracking System
As Meathead Movers continues to expand, a new and improved Customer Tracking
System will be needed in order to ensure success. Customer Tracking Systems, which can also
be referred to as Customer Relationship Management (CRM), are implemented in order to assist
companies with keeping data in a centralized system for easy accessibility. CRMs can also
perform a number of functions to help with day to day operations as well, such as; calendaring,
email management, log web traffic, sales tracking, reporting, and of course account management.
One of the greatest reasons for utilizing a CRM is the fact that it is typically all web-based via a
LAN or WAN. Why is this important though? As a company begins to grow, expand, or improve
technologically, they will need a more efficient way of handling data. For example, if a sales
representative for Meathead Movers books a job for branch A but it needs to be serviced out of
branch B due to the destination location, to save on costs, all of the data that was input for the
service will need to be available to branch B. In order for this to happen, without an effective
CRM, all of the paperwork will need to be physically taken from branch B to Branch A. Now,
this is not very effective, however with an effective CRM all of the data for the service can
instantly be available between any of the branches at anytime.
Currently, Meathead Movers is utilizing Meathead Movers Operational Management
v2.0, which does a very good job managing data and other operational tasks. However, with
future expansion and growth, the company will need a new Customer Tracking System to assist
with providing structured and centralized customer data on a web-based platform. In order to
decide on what system should be used, Meathead Movers first has to take a few things into
19
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
account: 1) What will the requirements be for the new system? 2) What kind of budget is going
to be available? 3) How much time will be needed to create the new system? 4) Do we know
everything we want out of the system, or are we unsure? These questions will be very valuable in
determining not only what system to go with but how the system will be developed. These are
several different types of ways systems are developed. We will be looking at two, which include,
the Waterfall Model and Prototype Model.
Waterfall Model
A Waterfall Model is a sequential software development process model that follows a
certain phase process. It is called a Waterfall Model because it continues to progress downward
(Techopedia, 2015). This method is often used when a company knows exactly what they need
and the requirements needed to achieve results. Waterfall Model style development is one of the
most common ways systems are developed, they are very straight forward and often less costly
than other methods. However, this method does not allow much room for adjustments or changes
as any changes later on will cause a need to start all over since each phase has to be completed in
order to move on to the next. For this reason is why companies must know exactly what they
want so that developers do not have to waste time redoing work which leads to higher cost.
Think of it as building a foundation for a 1 story house, then after it is built deciding you want to
make a skyscraper. The current foundation will never hold, thus it will need to be completely
redone and the whole project will need to start from the beginning again. Of course, this is a very
severe example!
Prototype Model
A Prototype Model is essentially a product that is not based on strict planning but acts as
an early approximation of the final product or system (Penna Sparrow, 2015). In other words, a
20
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
company states a general idea of what they want, then a software developer takes that idea and
creates a prototype, the company then gives feedback if they like it or not, and then the process is
repeated until a final product emerges. Through a prototype process, the customer is typically
more involved and doesn’t generally know the exact requirements, unlike the waterfall process.
However, using a Prototype Model can be more costly and require more time to create.
Creating MMOM3
Now that we know a couple different processes used in developing software, Meathead
Movers has decided that we know exactly what we want as far as requirements for our new
CRM. Since we know the exact requirements, we will be using the Waterfall Model process. By
using the Waterfall Model, we will be going phase by phase in a downward progression. Each
phase will be extremely important and must be completed before moving on. There will be 5
phases in creating our new software; Software Requirement Specifications (SRS), system and
software design, implementation and unit testing, integration and system testing, operation and
management.
Software Requirement Specifications (SRS)
During this phase, Meathead Movers will sit down with the developer and describe, in as
much detail as possible, the exact requirements the system will need. This phase is very
important, like the example of the foundation I described earlier, if we don’t get this correct,
there is a possibility that we will need to go back and start from the beginning. However, if done
correctly everything else should fall into place and a final product will be something to look
forward to that should meet all expectations.
21
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
System and Software Design
Once all the requirements have been stated, developers take the SRS and begin designing
the system. After the system has been designed, software and hardware can then be designed to
create a fully functioning system. Design phase takes everything from the SRS and creates a
mould of what and how the system will be. This is pretty much the walls and structure of the
house, on top of the foundation.
Implementation and Unit Testing
Now that a system and software has been designed, coding will be needed in order for the
software and system to work properly. If there are no issues and the system and software is
implemented effectively, the unit will then be tested. This is the phase that the developer will
make sure there are no defects and that everything will function properly. We can think of this as
adding in the electrical, plumbing, flooring, windows, etc. into the house and the developer
making sure it all works.
Integration and System Testing
After thorough testing done by the developer, it will then be presented to the customer for
approval. The company will then take the completed software and decide if it meets all of their
requirements. In order to decide if it meets requirements, testing will be done. After testing is
completed, a test report will be generated which will, hopefully, lead to the final phase. This can
be considered the building the walk-through or inspection done by the building management
team.
22
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
Operation and Maintenance
Since everything went well with testing and the developer has decided the software meets
all of Meathead Movers requirements, the product is then sent to Meathead Movers. Once
Meathead Movers has used the product, we will then decide if any changes needed to be made
and will send them to the developer. Let’s be honest, nobody buys a house without first doing a
walk-through. Consider this phase as making sure everything is how you want it, which
hopefully it is because if it isn’t, prepare for an uncomfortable conversation and more time and
money needed to go back and make changes!
23
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
Section5: InformationSystems andSociety
Information System Security
As important as it is to create an effective information system, protecting it is equally
important. Cyber crimes are becoming a very real thing for companies to worry about, especially
with most companies operating on networks. Although Meathead Movers is still a relatively
small company, there are still major risks to be considered. In order to properly protect against
these risks, Meathead Movers must first identify which of these risks are worth protecting
against, and which are more than likely not a threat.
Types of Cyber Crimes
Cyber crimes can range from very severe, to simply a slight annoyance. None the less, as
a business grows these crimes must be addressed as they can all have a great impact on the
company. Some of these crimes include; hacking, malware, theft, and phishing. While some of
these crimes can require little to no information needed about the company, some require a direct
connection to full information. Although there is no guarantee that cyber crime can be prevented
100%, there are ways a reducing the likelihood of an attack. The following will describe in detail
about each of the previously stated crimes and how to possibly reduce risk and even get pretty
close to preventing them from happening.
Hacking
One of the many ways a cyber crime is committed is through hacking. Hacking is the use
of a computer to gain unauthorized access to data in an information system (Vandercreek, 2015).
Hacking is generally performed by a person, known as a hacker. However, there are several
types of hackers, some good and some bad. Ethical hackers, or white hat hackers, typically don’t
24
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
want to harm a company; instead they just want to inform a company of their vulnerabilities and
how to strengthen company security. Unfortunately there is a reason that there are ethical
hackers, and that is because there are also criminal hackers. Criminal hackers, or black hat
hackers, generally want to steal information from a company, cause harm to data or files, or
attempt to just cause a scare. One way you can protect from black hat hackers is to maintain a
firewall. A firewall is pretty much a gate guard for your network, meaning anything coming
through the network is monitored for safety. Meathead Movers uses Microsoft’s firewall to
protect them from possible threats. So far Meathead Movers has yet to encounter any problems
with hackers trying to access their network, however by maintaining a firewall the company can
feel a little bit safer.
Malware
Malicious software that is installed without you adequate consent, is known as Malware
(Microsoft, 2015). Malware can be used to gain access to or damage a computer system by
forcing the user to download software. Common forms of malware include; keyloggers, viruses,
worms, and spyware. One of the easiest ways to prevent malware from being downloaded is to
train your workforce on being careful what they open or click on. Many people encounter
malware by clicking on an ad or opening an e-mail. Since humans due make mistakes, Meathead
Movers uses several methods to reduce the possibility of a malware attack such as; Microsoft
firewall, Malwarebytes, and regularly scans all information systems using Microsoft Safety
Scanner.
Theft
A major risk companies need to look out for is theft. Theft can be either physical theft or
virtual theft. Physical theft refers to the taking of company property that contains information,
25
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
such as stealing a computer or flash drive. However, virtual theft pertains to stealing company or
employee information or data via hacking, malware, viruses etc. A major issue Meathead Movers
faced with theft is physical theft. In order to adhere to vehicle insurance requirements for their
trucks, cameras had to be installed; which recorded any incidents on to a microSD card. Even
though these cameras were just to provide assistance in case of an accident, some employees
were getting in trouble for being recorded doing activities that were against company policy. Of
course, employees did not like this so they would steal the microSD cards, in an effort to prevent
getting in trouble. So to prevent this theft from happening, Meathead Movers installed lock
boxes on all cameras which required a key to open that only managers had. By implementing
previous stated security measures, Meathead Movers has been able to reduce the possibility of
virtual theft of company information and also employee data. However, Meathead Movers
recommends all employees invest in some sort of identity theft protection such as LifeLock.
Also, checking your credit report regularly will alert individuals early on of any suspicious
activity (Consumer.gov, 2015).
Phishing
Phishing is using a fraudulent e-mail, website, or phone call in order to steal money or
personal information. Most of the time users will see e-mails claiming to be companies asking
for account information to be verified. However, at Meathead Movers it was very common to
receive automated phone calls asking for banking information. Phishing for information can be
very serious because it can open a company up to multiple risks such as; identity theft, unknown
access to employee information, company bank accounts, important e-mails, and company social
media pages where slander can be posted. Some ways to prevent phishing is, of course, don’t fall
for phishing attempts. Microsoft has a great post of how to recognize phishing attempts and also
26
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
how to report them. Meathead Movers uses this reference to train employees, who have access to
information systems, on preventing phishing attempts.
Conclusion
Although there is no way to completely guarantee cyber crime will never happen to a
company, there are ways to help reduce risk. Hacking, malware, theft, and phishing are only a
few of the different types of cyber crime however, reducing the likelihood of these four types
will greatly increase the possible future success of a company. Some of the biggest ways a
company can help prevent cyber crimes is simply training their workforce to pay attention to
what content they are accessing. Also, keeping up a solid firewall, effective anti-virus software,
and regularly scanning for threats will help reduce risk.
27
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
References
Jeremy Scriven (Personal Communication, May, 2015) Quality Control Manager, Meathead
Movers, Inc.
Benjamin Spielman (Personal Communication, May, 2015) Camarillo, CA Branch Manager,
Meathead Movers, Inc.
Evan Steed (Personal Communication, May, 2015) Co-Founder, Meathead Movers, Inc.
Meathead Movers, Inc. (2015)
Retrieved from www.meatheadmovers.com/our-team/history.aspx and
www.Wiki.MeatheadMovers.com (intranet site)
Ralph Stair & George Reynolds (2011) ebook, Principles of Information Systems, 10th edition
Retrieved from http://wow.coursesmart.com/
Penna Sparrow (2013) Waterfall Model of SDLC
Retrieved from http://www.ianswer4u.com/2011/11/waterfall-
model.html#axzz3dBsEYcif
Techopedia (2015)
Retrieved from http://www.techopedia.com/
Microsoft Corporation (2013-2015) Safety & Security Center
Retrieved from https://www.microsoft.com/security/default.aspx
Vandercreek, C. (May, 2015). Chat 9 & 10
[Chat]. Retrieved from Colorado Technical University, Virtual Campus:
https://campus.ctuonline.edu

More Related Content

Viewers also liked

34 moduri prin care poti sa fii un coleg mai bun
34 moduri prin care poti sa fii un coleg mai bun34 moduri prin care poti sa fii un coleg mai bun
34 moduri prin care poti sa fii un coleg mai bunaptjob.ro
 
3.at the post office
3.at the post office3.at the post office
3.at the post officeSchool
 
อ.วีรบูรณ์ วิสารทสกุล
อ.วีรบูรณ์ วิสารทสกุลอ.วีรบูรณ์ วิสารทสกุล
อ.วีรบูรณ์ วิสารทสกุลYui Nawaporn
 
The Accountant & the Law rl-lb
The Accountant & the Law   rl-lbThe Accountant & the Law   rl-lb
The Accountant & the Law rl-lbarr195
 

Viewers also liked (7)

δημοτική ποίηση
δημοτική ποίησηδημοτική ποίηση
δημοτική ποίηση
 
34 moduri prin care poti sa fii un coleg mai bun
34 moduri prin care poti sa fii un coleg mai bun34 moduri prin care poti sa fii un coleg mai bun
34 moduri prin care poti sa fii un coleg mai bun
 
3.at the post office
3.at the post office3.at the post office
3.at the post office
 
Summer Movie Data
Summer Movie DataSummer Movie Data
Summer Movie Data
 
Unit 01 - LO2
Unit 01 - LO2Unit 01 - LO2
Unit 01 - LO2
 
อ.วีรบูรณ์ วิสารทสกุล
อ.วีรบูรณ์ วิสารทสกุลอ.วีรบูรณ์ วิสารทสกุล
อ.วีรบูรณ์ วิสารทสกุล
 
The Accountant & the Law rl-lb
The Accountant & the Law   rl-lbThe Accountant & the Law   rl-lb
The Accountant & the Law rl-lb
 

Similar to JerrettWilson_IT190_Final

Information-Systems-and-Technology.pptx
Information-Systems-and-Technology.pptxInformation-Systems-and-Technology.pptx
Information-Systems-and-Technology.pptxAhimsaBhardwaj
 
The survival kit for your digital transformation
The survival kit for your digital transformationThe survival kit for your digital transformation
The survival kit for your digital transformationrun_frictionless
 
Accounting Information System Essay
Accounting Information System EssayAccounting Information System Essay
Accounting Information System EssayLakeisha Jones
 
Advantages And Disadvantages Of Cyber-Crime In The Hotel
Advantages And Disadvantages Of Cyber-Crime In The HotelAdvantages And Disadvantages Of Cyber-Crime In The Hotel
Advantages And Disadvantages Of Cyber-Crime In The HotelPatty Buckley
 
Handy Guide to IT Service Implementation
Handy Guide to IT Service ImplementationHandy Guide to IT Service Implementation
Handy Guide to IT Service ImplementationOriginIT
 
Key ITSM considerations for 2016 v2
Key ITSM considerations for 2016 v2Key ITSM considerations for 2016 v2
Key ITSM considerations for 2016 v2Kevin Coppins
 
Management information system with relevance to Nepal
Management information system with relevance to NepalManagement information system with relevance to Nepal
Management information system with relevance to NepalDarshan Bhattarai
 
Essay On Implementation ERP
Essay On Implementation ERPEssay On Implementation ERP
Essay On Implementation ERPKelley Hunter
 
Lighthouse Presentation
Lighthouse PresentationLighthouse Presentation
Lighthouse PresentationHowardFalcon
 
IFSM 461 Systems Analysis and Design Precision Electronic Par.docx
IFSM 461 Systems Analysis and Design   Precision Electronic Par.docxIFSM 461 Systems Analysis and Design   Precision Electronic Par.docx
IFSM 461 Systems Analysis and Design Precision Electronic Par.docxwilcockiris
 
Management information system of Toyota
Management information system of ToyotaManagement information system of Toyota
Management information system of Toyotathureinohnkyaw
 
IFSM 461 Systems Analysis and Design Precision Electronic P.docx
IFSM 461 Systems Analysis and Design Precision Electronic P.docxIFSM 461 Systems Analysis and Design Precision Electronic P.docx
IFSM 461 Systems Analysis and Design Precision Electronic P.docxflonayrton46696
 
Information Retrieval And Evaluating Its Usefulness
Information Retrieval And Evaluating Its UsefulnessInformation Retrieval And Evaluating Its Usefulness
Information Retrieval And Evaluating Its UsefulnessDiane Allen
 
IBM Business Intelligence Software
IBM Business Intelligence SoftwareIBM Business Intelligence Software
IBM Business Intelligence SoftwareIBM Business Insight
 

Similar to JerrettWilson_IT190_Final (20)

Enterprise Solutions
Enterprise SolutionsEnterprise Solutions
Enterprise Solutions
 
Information-Systems-and-Technology.pptx
Information-Systems-and-Technology.pptxInformation-Systems-and-Technology.pptx
Information-Systems-and-Technology.pptx
 
The survival kit for your digital transformation
The survival kit for your digital transformationThe survival kit for your digital transformation
The survival kit for your digital transformation
 
Accounting Information System Essay
Accounting Information System EssayAccounting Information System Essay
Accounting Information System Essay
 
Advantages And Disadvantages Of Cyber-Crime In The Hotel
Advantages And Disadvantages Of Cyber-Crime In The HotelAdvantages And Disadvantages Of Cyber-Crime In The Hotel
Advantages And Disadvantages Of Cyber-Crime In The Hotel
 
Handy Guide to IT Service Implementation
Handy Guide to IT Service ImplementationHandy Guide to IT Service Implementation
Handy Guide to IT Service Implementation
 
Company Profile Doc 1
Company Profile Doc 1Company Profile Doc 1
Company Profile Doc 1
 
Key ITSM considerations for 2016 v2
Key ITSM considerations for 2016 v2Key ITSM considerations for 2016 v2
Key ITSM considerations for 2016 v2
 
Management information system with relevance to Nepal
Management information system with relevance to NepalManagement information system with relevance to Nepal
Management information system with relevance to Nepal
 
Business analysis thinking methodology
Business analysis thinking methodologyBusiness analysis thinking methodology
Business analysis thinking methodology
 
Essay On Implementation ERP
Essay On Implementation ERPEssay On Implementation ERP
Essay On Implementation ERP
 
Lighthouse Presentation
Lighthouse PresentationLighthouse Presentation
Lighthouse Presentation
 
Blog 02.2015 - c
Blog   02.2015 - cBlog   02.2015 - c
Blog 02.2015 - c
 
CRM with MIS
CRM with MISCRM with MIS
CRM with MIS
 
IFSM 461 Systems Analysis and Design Precision Electronic Par.docx
IFSM 461 Systems Analysis and Design   Precision Electronic Par.docxIFSM 461 Systems Analysis and Design   Precision Electronic Par.docx
IFSM 461 Systems Analysis and Design Precision Electronic Par.docx
 
Management information system of Toyota
Management information system of ToyotaManagement information system of Toyota
Management information system of Toyota
 
IFSM 461 Systems Analysis and Design Precision Electronic P.docx
IFSM 461 Systems Analysis and Design Precision Electronic P.docxIFSM 461 Systems Analysis and Design Precision Electronic P.docx
IFSM 461 Systems Analysis and Design Precision Electronic P.docx
 
Dit yvol2iss26
Dit yvol2iss26Dit yvol2iss26
Dit yvol2iss26
 
Information Retrieval And Evaluating Its Usefulness
Information Retrieval And Evaluating Its UsefulnessInformation Retrieval And Evaluating Its Usefulness
Information Retrieval And Evaluating Its Usefulness
 
IBM Business Intelligence Software
IBM Business Intelligence SoftwareIBM Business Intelligence Software
IBM Business Intelligence Software
 

JerrettWilson_IT190_Final

  • 1. 1 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment IT190-1502B-01 Introduction to IT Information Systems Jerrett S. Wilson May 20th , 2015
  • 2. 2 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment Table of Contents Section 1: Information Systems Overview ............................................................................................4 Organization...................................................................................................................................4 Information Systems.......................................................................................................................5 Section 2: Information Systems Concepts.............................................................................................9 Networks........................................................................................................................................9 Local Area Networks (LAN)........................................................................................................9 Wide Area Network (WAN).........................................................................................................9 LAN vs. WAN..........................................................................................................................10 Wi-Fi and Telecommuting.............................................................................................................10 Wi-Fi........................................................................................................................................10 Telecommuting .........................................................................................................................11 What’s Best For Us?.....................................................................................................................12 Section 3: Business Information Systems ...........................................................................................13 Management Information System (MIS).........................................................................................13 Decision Support System (DSS) ....................................................................................................14 Transaction Processing System (TPS)..............................................................................................15 Artificial Intelligence (AI).............................................................................................................16 Section 4: System Development ........................................................................................................18 Customer Tracking System ............................................................................................................18 Waterfall Model........................................................................................................................19 Prototype Model........................................................................................................................19 Creating MMOM3........................................................................................................................20 Software Requirement Specifications (SRS)................................................................................20 System and Software Design......................................................................................................21 Implementation and Unit Testing................................................................................................21 Integration and System Testing ..................................................................................................21 Operation and Maintenance........................................................................................................22 Section 5: Information Systems and Society .......................................................................................23 Information System Security .........................................................................................................23 Types of Cyber Crimes..................................................................................................................23 Hacking....................................................................................................................................23
  • 3. 3 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment Malware ...................................................................................................................................24 Theft ........................................................................................................................................24 Phishing....................................................................................................................................25 Conclusion ...................................................................................................................................26 References.......................................................................................................................................27
  • 4. 4 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment Section1: InformationSystems Overview Organization Although, there are very many different organizations out there to choose from, I have chosen Meathead Movers as my Target Organization. Meathead Movers began in 1997, founded by Aaron and Evan Steed. The company began as a way for two kids in high school to buy clothes, food, and school supplies. Being in both football and wrestling it was tough for the two to find a part-time job that would fit their busy schedules. They started by helping their friend’s parents move which caused a chain reaction by word of mouth. At first the fee for their services was a mere $20.00 and pizza for the work they did. Before they could say Meathead Movers, the idea to start a moving company had already begun. In 1997, Meathead Movers was only just beginning. Aaron and Evan posted flyers that they had printed in computer class. The form of communication was Aaron’s beeper which he would respond to calls on break whenever he got a chance. Clients would have to leave a message, wait for the call, and then schedule an available time according to Aaron and Evan’s school and sport schedule. Once booked, the clients would then rent a moving truck and pick both of them up and watch them get to work. So, the only network they had back then was a beeper, telephone, and word of mouth.
  • 5. 5 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment From 2005 to 2015, Meathead Movers has expanded its locations along the west coast of California. They opened several offices from Fresno, CA to Camarillo, CA, and even a storage facility in San Luis Obispo, CA. Now having over 80 computers on their network and over 100 employees using them every day, the need for faster servers and larger bandwidths has arrived. As Meathead Movers expanded, so did their need for information systems. Meathead Movers has adopted several systems, such as, Customer Relationship Management (CRM), Business to Business (B2B), and Transaction Processing System (TPS). By utilizing these three systems, Meathead Movers has been able to grow successfully as a company, and will continue to do so. Information Systems As for any small business, being able to implement a quality and effective information system can be the difference between success and failure. However, without a properly trained staff, any information system regardless of how great it is can cause epidemic failure. In order to decide which information system to use, Meathead Movers has what is called a testing phase. The testing phase is an extensive process where the company reality tests an information system to find out the pros and cons of each system. After the testing phase is complete, all data will be complied and company executives decide whether or not to implement an information system. Below are just a few of the information systems that have passed the testing phase and were implemented to become part of the company.
  • 6. 6 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment One information system that Meathead Movers utilizes, which is considered the most important, is called Meathead Movers Operation Management V2.0 (MOMM2). MMOM2 is the heart of the company when it comes to a CRM information system. The program was originally created and designed by Co-Founder, Evan Steed, to be a basic way to track upcoming services. However, after realizing how it could be used to serve as a not just a service tracker, but also a CRM, Evan created a multifunctional program capable of; creating services, updating and tracking current and future services, e-mailing clients pertinent information about their move, automatically notifying management of service completion, tracking consumer reviews, and providing management with a live status of day to day operations. In order to have a successful business, there must be some sort of TPS in play. Since Meathead Movers offers a service at a cost, they must have a way to process transactions. Due to the wide variety of payments customers use, Meathead Movers has decided to accept all forms of payment. Of course, this means that some forms of payment, mainly credit cards, come at a cost to process. Also, employees must be properly trained on how to accept all forms of payment, especially credit cards. To cut down costs, Meathead Movers uses an imprint carbon copy machine to capture credit card payment information. Although this system works, it comes with many issues such as; customer card information being recorded on paper, it is possible for an employee to lose this copy opening up the client to theft or fraud, old technology compared to other companies, payment has to be called in after copy is taken, if services completed late in the day then payment doesn’t go through until next business day, and requires employees to carry the machine and blank carbon copies. As the company grows larger, this is an area that will need great improvement in order to ensure future success.
  • 7. 7 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment A major key factor to a successful moving company is having the right tools for the job. Some of the tools and products required to complete a service have to be purchased, and others can be created through proper training. This brings up a third information system called B2B, which Meathead Movers uses to purchase products from other companies at wholesale to be resold to clients for profit. In order to utilize a B2B system properly, Meathead Movers uses MMOM2 to keep an accurate inventory of all supplies. When a certain product gets low in supply, MMOM2 automatically sends an alert notification to operations to order more. From there, an operation’s employee will submit, through MMOM2, a purchase order (PO) for whichever product is called for. This has been extremely successful in maintaining product stock in order to prevent customer failure. As previously stated, without a properly trained staff there can be failure, regardless if an information system passed the testing phase. Meathead Movers has one of the best employee training systems used by any moving company, called Meathead University (MHU). MHU was designed as a training tool that was easy to understand and operate by anyone. Similar to MMOM2, MHU was designed by Evan Steed and created as an intranet site that is only accessible by Meathead Movers employees, on Meathead Movers servers. Also known as “The Meathead Wiki” to employees, this site contains all information vital to train employees on all job functions. However, like MMOM2, MHU requires routine maintenance and updates in order to maintain functionality. This maintenance is completed by the software engineering team, also led by Evan Steed, weekly and monthly to ensure operational success. Of course, as Meathead Movers grows as a company, technology will begin to improve which means that the company will need to continue to evaluate how each information system is operating. Although every information system went through an intense testing phase, every year
  • 8. 8 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment each information system get reviewed again and compared with new possible systems. Once again, after all the testing is done, the data is sent up to management and decided on whether or not the information system has proven to remain effective, or obsolete. Even though it is highly unlikely, there is a possibility that every information system could be completely replaced at one time.
  • 9. 9 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment Section2: InformationSystems Concepts Networks When it comes to using networks, Meathead Movers has a couple choices as far as what they can utilize to best fit their needs. Although a network is a system of computers or other devices that are connected to each other, how are they connected? Commonly, computers or other devices are connected via a Local Area Network (LAN) or a Wide Area Network (WAN). Local Area Networks (LAN) One of the more common of the two network systems is going to be a LAN system. A LAN can be connected through cable or wirelessly, such as Ethernet or Wi-Fi. While a user is connected via “Wi-Fi”, it is now referred to as a Wireless Local Area Network (WLAN). However, computers connected via an Ethernet cable can usually transfer data quicker than a wireless connection. Unfortunately, using a LAN will limit the user’s network to a small area. Due to the area restrictions, a LAN is commonly used in the home, schools, and even small businesses. These restrictions are based on equipment limitations, such as length of Ethernet cable or range of a Wi-Fi signal. Wide Area Network (WAN) Although a LAN is restricted by a small network area, one could still connect to other LANs via telephone lines and radio waves. This is referred to as a WAN, which is typically used for large businesses, online schools, and even the internet. A WAN can bridge the gap between a company that has two or more LANs, and would like to connect together. By utilizing a WAN, a
  • 10. 10 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment company can virtually connect and transmit data from anywhere on the planet. This can be extremely useful for companies that have branches in all parts of the world. LAN vs. WAN Some of the obvious differences between a LAN and a WAN are the size capabilities. However, another major difference is the performance capability. Hands down the quickest connection will be a LAN, up to 30x faster, due to less distance for data to travel. Just like cars on roads, data still has to travel when it is asked for. So, it only makes sense that a larger network, such as a WAN, will take longer to transfer data than a smaller LAN. Another major difference is going to be the cost between a LAN and a WAN. A LAN is usually relatively cheap due to being easier to setup and requiring less equipment. Also, a LAN can require a lot less advanced infrastructure to keep it running. Wi-Fi and Telecommuting Most employers will require their employees to work in the company building or on the job site. However, some companies will allow their employees to work from home or another place that may be more convenient for them. Some employees will even travel while working and need to use wireless meansto work.These methodsof workcan be accomplishedviaaWi-Fi connection,orthroughTelecommuting.Bothof whichare verycommonand will become more common inthe future ascompaniesgrowandexpandwithtechnology. Wi-Fi As previous stated, Wi-Fi can also be described as a Wireless Local Area Network (WLAN). This network is becoming more popular not only in the business environment but also
  • 11. 11 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment in the home as well. Wi-Fi allows multiple users to connect to one network, without all the clutter of cables since it connects via radio waves to what is called a router. Although this method may not always be the fastest connection compared to an Ethernet cable, it is still very fast. One issue that may arise with Wi-Fi is security. With an Ethernet cable, all your information is going through a wired cable from computer to network. However, with Wi-Fi, a computer now connects via radio waves to a network that anyone else, that’s looking, can see. A way users can combat this issue is by using a Wi-Fi password in order for someone to access your network. Although password protecting your network doesn’t 100% guarantee your safety, it sure helps reduce the risk of someone else accessing your information that shouldn’t be. Telecommuting A way employers utilize a WAN, is by allowing employees to work via telecommuting. Telecommuting is the process of working through phones, e-mail, and internet. Although not all jobs are able to utilize telecommuting, it can be a great benefit to those that do. A reason for telecommuting could be; if an employee that works with software decides to relocate across the country and the company is willing to allow work to be completed via email. Projects will still be completed, the employee will still have a job and the employer doesn’t have to hire a new employee and start from scratch. A major problem with telecommuting is the lack of face to face interaction. This can be a major problem if discipline is needed to be given, due to not being able to properly instill the seriousness of the infraction via a phone call. Also, accountability is hard to keep up with if you
  • 12. 12 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment don’t see the employee everyday to track if they are actually working every day or taking a few days here and there off. What’s Best For Us? When Meathead Movers opened up their first branch, all that was needed was a LAN. This system was setup in a rather small office and had 1 computer connected via cable. However, upon opening several branches throughout California, Meathead Movers now utilizes a WAN. They do this by renting a line from a service provider and using their network to stay connected. This allows estimators to telecommute and go out to jobs, get all the information needed, go home and set up all the paperwork needed for a quote, submit everything through MMOM2 for approval, and finally an e-mail will be sent to the customer to set up a date for their services. Although a WAN can be a lot slower than a LAN and more costly, the ability to have all branches connected together is worth the slower network speeds and price.
  • 13. 13 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment Section3: Business Information Systems Management Information System (MIS) In order to effectively manage data, a company needs to be able to pull reports about various aspects of the operation. The way this is done is through a type of Management Information System (MIS). A MIS is a computerized database of information organized and programmed in such a way that it produces regular reports on operations for every level of management in a company (Inc., 2015). Simply put, a MIS organizes data so that a company can analyze it, convert it into information, and then gain knowledge and improve the company. Why would this be an important asset for a company to acquire? Here’s an example of how Meathead Movers uses their MIS: Every week a report on employee hours is generated, this report shows which employees are getting overtime each week and which employees are not. Many times one employee, we will call employee A, will have an exceptional amount of overtime compared to others. This data is analyzed by the Operation’s Supervisor (OS), which grants information saying that employee A is working too much, now the OS has knowledge of employee A being over worked and will reduce the number of long jobs employee A will get the next week. This will then allow hours to be spread out more evenly, which mean less overtime is paid, and since Meathead Movers is a very physically demanding job, it gives employee A much needed rest to reduce work related injuries. As previously stated, MMOM2 is a part of Meathead Movers CRM and also plays a number of roles in the success of the company, so it is no surprise that MMOM2 is also the companies MIS. Another way that MMOM2 is used as a MIS, is monitoring the inventory of the company to provide accurate and up to date information on when supply is low. When inventory
  • 14. 14 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment of a certain items gets below 60% of maximum stock, an exception report is generated and sent to the OS for immediate attention. Although inventory is regularly ordered on a weekly basis, there are instances where a client will request more boxes than estimated for, this will cause an unforeseen drop in inventory and can cause the exception report. This exception report will allow the OS to decide whether or not a separate order needs to be placed depending on projected supply and demand. There are many different ways a company can fail; low customer satisfaction, overspending, lack of inventory, negligence of poor employee performance, and ignoring possible signs of work related injuries happening. However, one way to help reduce the possibility of company failure is to have an effective MIS. As a growing company Meathead Movers is continually learning and changing their MIS so that it can provide the best up to date reports to help prevent future company failure. DecisionSupport System (DSS) A Decision Support System (DSS) is a lot like a MIS in the respect that it processes data and can generate reports. However, a DSS is far more advanced than a MIS and can help analyze the data and process it into information so that the consumer can use this information to gain knowledge, which assists in decision making. Although a DSS doesn’t actually make the decision, it does provide a great deal of flexibility in getting computer support for decision- making activities (Principles of Information Systems, eBook, 2015). For now, Meathead Movers still utilizes MMOM2 as a MIS due to the fact that it works well for them. However, there is a possibility that with how quickly the company is expanding, they will soon need some sort of DSS program to help with decision making. As far as a current
  • 15. 15 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment model of DSS, Meathead Movers still has monthly meetings to analyze reports and make important decisions with executives. This method, although a little old fashioned, still works well as it keeps employees involved to gain real life input as opposed to a computerized analysis. Transaction Processing System (TPS) Any business that provides a service or sells merchandise must have some sort of Transaction Processing System (TPS). A TPS is a way a company can interact with a customer or other company either by ordering, billing, employee payroll, or even order tracking (Principles of Information Systems, eBook, 2015). Although order tracking is primarily used with certain companies such a parcel shipping and even pizza delivery companies, it still serves as a very important TPS for those companies success. However, a TPS is pretty much just a basic system that doesn’t provide much support like a MIS or assist with decision making like a DSS. None the less, without some sort of TPS, companies would not be able to provide the services needed to be successful. In order for a TPS to be successful, a company must first understand how to use a TPS effectively. A TPS can take data, such as services rendered, and put it together in the form of information on an invoice, which can then be sent to the customer who will gain knowledge of what exactly was down and the cost of the service. This is extremely important when providing services where a company charges by time increments and also materials cost. If Meathead Movers were to just tell customers “You owe $500” and provide no invoice or breakdown of cost, there would be a lot of issues. However, Meathead Movers provides a very detailed copy of the customer order which explains the time the service was started and completed, any materials that were used, how much time it took to travel from origin to destination, and even a break down section which shows hourly rates and overtime rates.
  • 16. 16 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment Due to having a successful TPS, customers of Meathead Movers are rarely confused on what they were charged for, and have a clear representation of what went on during the service. This has attributed to customers having a positive experience with the company and sharing their experience with friends and family, which ultimately leads to more business. Without an effective TPS, a company can easily cause frustration not only to customers, but to employees as well since the employees are the first line of communication between the customer and the company. Even though Meathead Movers currently has an effective TPS, as they grow as a company, there will always be room for improvement which can be said about any company. Artificial Intelligence (AI) Artificial Intelligence (AI) is very advanced software that allows a machine to demonstrate some sort of intelligence. When most people think of AI, they think of scary robots taking over the earth, or big fancy expensive computers talking with people however, AI is also demonstrated in GPS devices, like your smart phone. When using your smart phone or GPS devices to direct you to a location, it makes intelligent decisions based on your current location. If you ended up making a wrong turn, your GPS will recalculate and tell you how to get back on track. This is done by taking real time data from your location and transmitting it through satellites to provide information on the correct route to take, which is then converted to knowledge to the user through a turn by turn directory. Meathead Movers doesn’t use fancy robots that move furniture for them, or talking computers that run day to day operations all by themselves however, every driver uses some form of GPS to guide them from the moment they leave the warehouse, to the moment they return. Although this form of AI isn’t extraordinarily advanced, it still serves as a very important
  • 17. 17 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment key to company success. Without some form of GPS, crews would not arrive to services on time, which would cause customer dissatisfaction, which would lead to bad reputation, and ultimately cause company failure. Another way that Meathead Movers utilizes a form of AI is through MMOM2, via location consideration. For example; when a service is entered into the system, the zip code is also entered into the DBMS. The reason for this, is when a crew goes out to a service in a certain area and discovers a road that is not maintained by the city and has very low hanging trees, a location consideration is then input for future reference, this is so that the company can dispatch a smaller truck which will fit to better service the customer. Data entered into MOMM2 is saved so that the system can automatically alert operations via AI, so that a smaller truck will be dispatched from the start. Although this isn’t very advanced AI, it is still a form of intelligence that is demonstrated by MMOM2 to assist in company success.
  • 18. 18 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment Section4: System Development Customer Tracking System As Meathead Movers continues to expand, a new and improved Customer Tracking System will be needed in order to ensure success. Customer Tracking Systems, which can also be referred to as Customer Relationship Management (CRM), are implemented in order to assist companies with keeping data in a centralized system for easy accessibility. CRMs can also perform a number of functions to help with day to day operations as well, such as; calendaring, email management, log web traffic, sales tracking, reporting, and of course account management. One of the greatest reasons for utilizing a CRM is the fact that it is typically all web-based via a LAN or WAN. Why is this important though? As a company begins to grow, expand, or improve technologically, they will need a more efficient way of handling data. For example, if a sales representative for Meathead Movers books a job for branch A but it needs to be serviced out of branch B due to the destination location, to save on costs, all of the data that was input for the service will need to be available to branch B. In order for this to happen, without an effective CRM, all of the paperwork will need to be physically taken from branch B to Branch A. Now, this is not very effective, however with an effective CRM all of the data for the service can instantly be available between any of the branches at anytime. Currently, Meathead Movers is utilizing Meathead Movers Operational Management v2.0, which does a very good job managing data and other operational tasks. However, with future expansion and growth, the company will need a new Customer Tracking System to assist with providing structured and centralized customer data on a web-based platform. In order to decide on what system should be used, Meathead Movers first has to take a few things into
  • 19. 19 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment account: 1) What will the requirements be for the new system? 2) What kind of budget is going to be available? 3) How much time will be needed to create the new system? 4) Do we know everything we want out of the system, or are we unsure? These questions will be very valuable in determining not only what system to go with but how the system will be developed. These are several different types of ways systems are developed. We will be looking at two, which include, the Waterfall Model and Prototype Model. Waterfall Model A Waterfall Model is a sequential software development process model that follows a certain phase process. It is called a Waterfall Model because it continues to progress downward (Techopedia, 2015). This method is often used when a company knows exactly what they need and the requirements needed to achieve results. Waterfall Model style development is one of the most common ways systems are developed, they are very straight forward and often less costly than other methods. However, this method does not allow much room for adjustments or changes as any changes later on will cause a need to start all over since each phase has to be completed in order to move on to the next. For this reason is why companies must know exactly what they want so that developers do not have to waste time redoing work which leads to higher cost. Think of it as building a foundation for a 1 story house, then after it is built deciding you want to make a skyscraper. The current foundation will never hold, thus it will need to be completely redone and the whole project will need to start from the beginning again. Of course, this is a very severe example! Prototype Model A Prototype Model is essentially a product that is not based on strict planning but acts as an early approximation of the final product or system (Penna Sparrow, 2015). In other words, a
  • 20. 20 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment company states a general idea of what they want, then a software developer takes that idea and creates a prototype, the company then gives feedback if they like it or not, and then the process is repeated until a final product emerges. Through a prototype process, the customer is typically more involved and doesn’t generally know the exact requirements, unlike the waterfall process. However, using a Prototype Model can be more costly and require more time to create. Creating MMOM3 Now that we know a couple different processes used in developing software, Meathead Movers has decided that we know exactly what we want as far as requirements for our new CRM. Since we know the exact requirements, we will be using the Waterfall Model process. By using the Waterfall Model, we will be going phase by phase in a downward progression. Each phase will be extremely important and must be completed before moving on. There will be 5 phases in creating our new software; Software Requirement Specifications (SRS), system and software design, implementation and unit testing, integration and system testing, operation and management. Software Requirement Specifications (SRS) During this phase, Meathead Movers will sit down with the developer and describe, in as much detail as possible, the exact requirements the system will need. This phase is very important, like the example of the foundation I described earlier, if we don’t get this correct, there is a possibility that we will need to go back and start from the beginning. However, if done correctly everything else should fall into place and a final product will be something to look forward to that should meet all expectations.
  • 21. 21 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment System and Software Design Once all the requirements have been stated, developers take the SRS and begin designing the system. After the system has been designed, software and hardware can then be designed to create a fully functioning system. Design phase takes everything from the SRS and creates a mould of what and how the system will be. This is pretty much the walls and structure of the house, on top of the foundation. Implementation and Unit Testing Now that a system and software has been designed, coding will be needed in order for the software and system to work properly. If there are no issues and the system and software is implemented effectively, the unit will then be tested. This is the phase that the developer will make sure there are no defects and that everything will function properly. We can think of this as adding in the electrical, plumbing, flooring, windows, etc. into the house and the developer making sure it all works. Integration and System Testing After thorough testing done by the developer, it will then be presented to the customer for approval. The company will then take the completed software and decide if it meets all of their requirements. In order to decide if it meets requirements, testing will be done. After testing is completed, a test report will be generated which will, hopefully, lead to the final phase. This can be considered the building the walk-through or inspection done by the building management team.
  • 22. 22 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment Operation and Maintenance Since everything went well with testing and the developer has decided the software meets all of Meathead Movers requirements, the product is then sent to Meathead Movers. Once Meathead Movers has used the product, we will then decide if any changes needed to be made and will send them to the developer. Let’s be honest, nobody buys a house without first doing a walk-through. Consider this phase as making sure everything is how you want it, which hopefully it is because if it isn’t, prepare for an uncomfortable conversation and more time and money needed to go back and make changes!
  • 23. 23 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment Section5: InformationSystems andSociety Information System Security As important as it is to create an effective information system, protecting it is equally important. Cyber crimes are becoming a very real thing for companies to worry about, especially with most companies operating on networks. Although Meathead Movers is still a relatively small company, there are still major risks to be considered. In order to properly protect against these risks, Meathead Movers must first identify which of these risks are worth protecting against, and which are more than likely not a threat. Types of Cyber Crimes Cyber crimes can range from very severe, to simply a slight annoyance. None the less, as a business grows these crimes must be addressed as they can all have a great impact on the company. Some of these crimes include; hacking, malware, theft, and phishing. While some of these crimes can require little to no information needed about the company, some require a direct connection to full information. Although there is no guarantee that cyber crime can be prevented 100%, there are ways a reducing the likelihood of an attack. The following will describe in detail about each of the previously stated crimes and how to possibly reduce risk and even get pretty close to preventing them from happening. Hacking One of the many ways a cyber crime is committed is through hacking. Hacking is the use of a computer to gain unauthorized access to data in an information system (Vandercreek, 2015). Hacking is generally performed by a person, known as a hacker. However, there are several types of hackers, some good and some bad. Ethical hackers, or white hat hackers, typically don’t
  • 24. 24 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment want to harm a company; instead they just want to inform a company of their vulnerabilities and how to strengthen company security. Unfortunately there is a reason that there are ethical hackers, and that is because there are also criminal hackers. Criminal hackers, or black hat hackers, generally want to steal information from a company, cause harm to data or files, or attempt to just cause a scare. One way you can protect from black hat hackers is to maintain a firewall. A firewall is pretty much a gate guard for your network, meaning anything coming through the network is monitored for safety. Meathead Movers uses Microsoft’s firewall to protect them from possible threats. So far Meathead Movers has yet to encounter any problems with hackers trying to access their network, however by maintaining a firewall the company can feel a little bit safer. Malware Malicious software that is installed without you adequate consent, is known as Malware (Microsoft, 2015). Malware can be used to gain access to or damage a computer system by forcing the user to download software. Common forms of malware include; keyloggers, viruses, worms, and spyware. One of the easiest ways to prevent malware from being downloaded is to train your workforce on being careful what they open or click on. Many people encounter malware by clicking on an ad or opening an e-mail. Since humans due make mistakes, Meathead Movers uses several methods to reduce the possibility of a malware attack such as; Microsoft firewall, Malwarebytes, and regularly scans all information systems using Microsoft Safety Scanner. Theft A major risk companies need to look out for is theft. Theft can be either physical theft or virtual theft. Physical theft refers to the taking of company property that contains information,
  • 25. 25 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment such as stealing a computer or flash drive. However, virtual theft pertains to stealing company or employee information or data via hacking, malware, viruses etc. A major issue Meathead Movers faced with theft is physical theft. In order to adhere to vehicle insurance requirements for their trucks, cameras had to be installed; which recorded any incidents on to a microSD card. Even though these cameras were just to provide assistance in case of an accident, some employees were getting in trouble for being recorded doing activities that were against company policy. Of course, employees did not like this so they would steal the microSD cards, in an effort to prevent getting in trouble. So to prevent this theft from happening, Meathead Movers installed lock boxes on all cameras which required a key to open that only managers had. By implementing previous stated security measures, Meathead Movers has been able to reduce the possibility of virtual theft of company information and also employee data. However, Meathead Movers recommends all employees invest in some sort of identity theft protection such as LifeLock. Also, checking your credit report regularly will alert individuals early on of any suspicious activity (Consumer.gov, 2015). Phishing Phishing is using a fraudulent e-mail, website, or phone call in order to steal money or personal information. Most of the time users will see e-mails claiming to be companies asking for account information to be verified. However, at Meathead Movers it was very common to receive automated phone calls asking for banking information. Phishing for information can be very serious because it can open a company up to multiple risks such as; identity theft, unknown access to employee information, company bank accounts, important e-mails, and company social media pages where slander can be posted. Some ways to prevent phishing is, of course, don’t fall for phishing attempts. Microsoft has a great post of how to recognize phishing attempts and also
  • 26. 26 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment how to report them. Meathead Movers uses this reference to train employees, who have access to information systems, on preventing phishing attempts. Conclusion Although there is no way to completely guarantee cyber crime will never happen to a company, there are ways to help reduce risk. Hacking, malware, theft, and phishing are only a few of the different types of cyber crime however, reducing the likelihood of these four types will greatly increase the possible future success of a company. Some of the biggest ways a company can help prevent cyber crimes is simply training their workforce to pay attention to what content they are accessing. Also, keeping up a solid firewall, effective anti-virus software, and regularly scanning for threats will help reduce risk.
  • 27. 27 RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment References Jeremy Scriven (Personal Communication, May, 2015) Quality Control Manager, Meathead Movers, Inc. Benjamin Spielman (Personal Communication, May, 2015) Camarillo, CA Branch Manager, Meathead Movers, Inc. Evan Steed (Personal Communication, May, 2015) Co-Founder, Meathead Movers, Inc. Meathead Movers, Inc. (2015) Retrieved from www.meatheadmovers.com/our-team/history.aspx and www.Wiki.MeatheadMovers.com (intranet site) Ralph Stair & George Reynolds (2011) ebook, Principles of Information Systems, 10th edition Retrieved from http://wow.coursesmart.com/ Penna Sparrow (2013) Waterfall Model of SDLC Retrieved from http://www.ianswer4u.com/2011/11/waterfall- model.html#axzz3dBsEYcif Techopedia (2015) Retrieved from http://www.techopedia.com/ Microsoft Corporation (2013-2015) Safety & Security Center Retrieved from https://www.microsoft.com/security/default.aspx Vandercreek, C. (May, 2015). Chat 9 & 10 [Chat]. Retrieved from Colorado Technical University, Virtual Campus: https://campus.ctuonline.edu