SlideShare a Scribd company logo
1 of 21
Foundation concepts of information
systems
Instructor : Augustino Mwogosi
Room AB 205
0714696752
INTRODUCTION TO INFORMATION
SYSTEMS(IM 111)
2/15/2021
1 Augustino Jonas Mwogosi
TUNAVESHA
2/15/2021
2
Introduction
 As managers most of you will work for firms
that are intensively using information
systems you will be making large
investments in information technology.
 Successful firms are those who learn how to
use new technologies.
 Cell phones ,computers and online
conferencing over the internet have become
essential tools for business.
2/15/2021
3
Augustino Jonas Mwogosi
Perspectives of IS
 Information technology(IT) consists of all the
hardware and software that a firm needs to use in
order to achieve its business objectives.
 Information system is a set of interrelated
components that collects(or retrieve),process,
store and distribute information to support
decision making and control in an organization.
 An information system (IS) can be any organized
combination of people, hardware, software,
communications networks, data resources, and
policies and procedures that stores, retrieves,
transforms, and disseminates information in an
organization.
2/15/2021
4
Augustino Jonas Mwogosi
The Fundamental Roles of IS in
Organizations
2/15/2021
Augustino Jonas Mwogosi
5
 There are three vital roles
that information systems
can perform for a business
enterprise:
 Support of business
processes and operations.
 Support of decision making
by employees and
managers.
 Support of strategies for
competitive advantage.
Why organizations invest so much
in IS?
 Information systems are essential for conducting
day-to-day business as well as achieving
strategic business objectives.
 Business invest heavily in IS to achieve the
following strategic business objectives :
 Operational excellence
 New products, services and business models
 Customer and supplier intimacy
 Improved decision making
 Competitive advantages
 Survival
2/15/2021
6
Augustino Jonas Mwogosi
Components of Information
systems
2/15/2021
Augustino Jonas Mwogosi
7
 It is a combination of five key components
 Data
 People
 procedures
 Objects(Software ,Hardware, Telecommunication
networks etc)
Data, information and
knowledge
 Before you can understand how information
systems work, it is important to distinguish
between data and information
 Data are raw facts(i.e recorded but unformatted)
examples TUDOM201800572
 Information is processed data, that is formatted
and more useful) Example T/UDOM/2018/00572
is a registration number of one of you here.
 Knowledge is the ability to understand
information, form opinions and make decisions or
predictions based on the information. Example
You must have knowledge to be aware that only
one UDOM registration number can uniquely
identify each student 2/15/2021
8
Augustino Jonas Mwogosi
Data, information, and
knowledge.
2/15/2021
Augustino Jonas Mwogosi
9
Data, information and
knowledge
 Three activities in an information system
produce the information that organizations need
to make decisions, control operations, analyze
problems, and create new products or services.
 Input: Captures or collects raw data from within the
organization or from its external environment
 Processing: Convert raw input into a meaningful
form
 Output : Transfers processed information to the
people who will use it or to the activities for which it
will be used.
 Feedback –output that is returned to appropriate members
of the organization to help them evaluate or correct the
input stage
2/15/2021
10
Augustino Jonas Mwogosi
Data, information and
knowledge
2/15/2021
11
Augustino Jonas Mwogosi
People
2/15/2021
12
 People are the essential ingredient for the
successful operation of all information systems.
These people resources include end users and IS
specialists.
 End users (also called users or clients) are
people who use an information system or the
information it produces. They can be customers,
salespersons, engineers, clerks, accountants, or
managers and are found at all levels of an
organization. I
 IS specialists are people who develop, maintain,
manage, and study information systems.. They
include systems analysts, software developers,
system operators, and other managerial, technical,
IS Developers
2/15/2021
Augustino Jonas Mwogosi
13
 People who DEVELOP Information systems
 Systems analyst: Responsible for analyzing
business requirements and selecting information
systems that meet those needs.
 Programmer: Responsible for coding, testing,
debugging, and installing programs.
 Systems consultant : Provide IS knowledge to
external clients
IS Maintainers
2/15/2021
Augustino Jonas Mwogosi
14
 People who MAINTAIN Information systems
 IS auditor: Responsible for auditing information
systems and operating procedures for compliance
with internal and external standards
 Database administrator: Responsible for
managing database and database management
software use
 Webmaster: Responsible for managing the firm’s
Web site
IS Managers
2/15/2021
Augustino Jonas Mwogosi
15
 People who MANAGE Information systems
 IS manager :Responsible for the management of
an existing information system
 IS security manager: Responsible for managing
security measures and disaster recovery
 Chief information officer :Highest-ranking IS
manager; responsible for strategic planning and IS
use throughout the firm
People who Study IS
2/15/2021
Augustino Jonas Mwogosi
16
 People who STUDY Information systems
 Study University professor: Teach undergraduate
and graduate students; study the use of information
systems in organizations and society.
 Government scientist :Research and development
of information systems for homeland security,
intelligence, and other related applications.
IS Professional Core
Competencies
2/15/2021
Augustino Jonas Mwogosi
17
 Technical Knowledge and Skills:
 Hardware Hardware platforms, infrastructure, virtualization, peripherals
 Software Operating systems, application software, drivers
 Networking Network operating systems, cabling and network interface
cards, local area networks, wide area
 networks, wireless, Internet, security
 Business Knowledge and Skills
 Business integration, industry Business processes, functional areas of
business and their integration, industry characteristics
 Managing people and projects Planning, organizing, leading, controlling,
managing people and projects
 Social Interpersonal, group dynamics, political
 Communication Verbal, written, and technological communication and
presentation
 Systems Knowledge and Skills
 Systems integration Connectivity, compatibility, integrating subsystems
and systems
 Development methodologies Steps in systems analysis and design,
systems development life cycle, alternative development methodologies
 Critical thinking Challenging one’s and others’ assumptions and ideas
 Problem solving Information gathering
Procedures
2/15/2021
Augustino Jonas Mwogosi
18
 The actual steps and tasks that describe how
work is organized in a business are called
business processes.
 A business process is a logically related set of
activities that define how specific business tasks are
performed.
 Every business can be seen as a collection of
business processes.
 Large businesses have thousands of business
processes, some more important than others. To a
large extent, the efficiency of a business firm
depends on how well its business processes are
designed and coordinated.
 Many business processes are tied to a specific
functional area.
STAND UP LET’S DANCE
2/15/2021
19
Augustino Jonas Mwogosi
2/15/2021
20
Quiz One ( 10 Marks)
Why are information
systems so important
for running and
managing
businesses?
2/15/2021
21
Augustino Jonas Mwogosi

More Related Content

What's hot

Cat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsCat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsSimeon Ogao
 
Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Donald E. Hester
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to securityDhani Ahmad
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information SystemDaryl Conson
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet SecurityAna Meskovska
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack newbie2019
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident ReportCommunity IT Innovators
 
Information security
Information securityInformation security
Information securityOnkar Sule
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummiesIvo Depoorter
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.Ni
 

What's hot (20)

Cat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsCat21:Development Mangement Information Systems
Cat21:Development Mangement Information Systems
 
Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Information security
Information securityInformation security
Information security
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Data security
Data securityData security
Data security
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report
 
Information security
Information securityInformation security
Information security
 
Information security management
Information security managementInformation security management
Information security management
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummies
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 

Similar to Im 111 lecture 1

comparision between IT and Information system
comparision between IT and Information systemcomparision between IT and Information system
comparision between IT and Information systemtayyab3052
 
Three dimensions of information systems
Three dimensions of information systemsThree dimensions of information systems
Three dimensions of information systemsSuleyman Ally
 
Chapter One.pdf
Chapter One.pdfChapter One.pdf
Chapter One.pdfsoresa1
 
New Microsoft PowerPoint Presentation (2).pptx
New Microsoft PowerPoint Presentation (2).pptxNew Microsoft PowerPoint Presentation (2).pptx
New Microsoft PowerPoint Presentation (2).pptxDasariRohit2
 
Management Information System(UNIT 1).pptx
Management Information System(UNIT 1).pptxManagement Information System(UNIT 1).pptx
Management Information System(UNIT 1).pptxSURBHI SAROHA
 
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILUREINFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILURELibcorpio
 
Software Project Implementation
Software Project Implementation Software Project Implementation
Software Project Implementation Joel Okomoli
 
information system and computers
information system and computersinformation system and computers
information system and computers9535814851
 
Management Information System
Management Information SystemManagement Information System
Management Information SystemRachana Pradeep
 
4. Fundamental MIS Information Systems Presentation
4. Fundamental MIS  Information Systems Presentation4. Fundamental MIS  Information Systems Presentation
4. Fundamental MIS Information Systems PresentationMirMdAkhiruggaman
 

Similar to Im 111 lecture 1 (20)

comparision between IT and Information system
comparision between IT and Information systemcomparision between IT and Information system
comparision between IT and Information system
 
Aat paper8 oct09
Aat paper8 oct09Aat paper8 oct09
Aat paper8 oct09
 
ITMCH2.pptx
ITMCH2.pptxITMCH2.pptx
ITMCH2.pptx
 
Three dimensions of information systems
Three dimensions of information systemsThree dimensions of information systems
Three dimensions of information systems
 
Chapter One.pdf
Chapter One.pdfChapter One.pdf
Chapter One.pdf
 
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATIONHOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
 
MIS chap # 4.......
MIS chap # 4.......MIS chap # 4.......
MIS chap # 4.......
 
New Microsoft PowerPoint Presentation (2).pptx
New Microsoft PowerPoint Presentation (2).pptxNew Microsoft PowerPoint Presentation (2).pptx
New Microsoft PowerPoint Presentation (2).pptx
 
Management Information System(UNIT 1).pptx
Management Information System(UNIT 1).pptxManagement Information System(UNIT 1).pptx
Management Information System(UNIT 1).pptx
 
Is202 ch 03
Is202 ch 03Is202 ch 03
Is202 ch 03
 
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILUREINFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
 
Software Project Implementation
Software Project Implementation Software Project Implementation
Software Project Implementation
 
Cibm ch 02
Cibm ch 02Cibm ch 02
Cibm ch 02
 
Information what is it
Information what is itInformation what is it
Information what is it
 
Information systems
Information systemsInformation systems
Information systems
 
information system and computers
information system and computersinformation system and computers
information system and computers
 
Management Information System
Management Information SystemManagement Information System
Management Information System
 
Introduction to Accounting System
Introduction to Accounting SystemIntroduction to Accounting System
Introduction to Accounting System
 
ITB - UNIT 1.pdf
ITB - UNIT 1.pdfITB - UNIT 1.pdf
ITB - UNIT 1.pdf
 
4. Fundamental MIS Information Systems Presentation
4. Fundamental MIS  Information Systems Presentation4. Fundamental MIS  Information Systems Presentation
4. Fundamental MIS Information Systems Presentation
 

More from ITNet

lecture 8 b main memory
lecture 8 b main memorylecture 8 b main memory
lecture 8 b main memoryITNet
 
lecture 9.pptx
lecture 9.pptxlecture 9.pptx
lecture 9.pptxITNet
 
lecture 10.pptx
lecture 10.pptxlecture 10.pptx
lecture 10.pptxITNet
 
lecture 11.pptx
lecture 11.pptxlecture 11.pptx
lecture 11.pptxITNet
 
lecture 12.pptx
lecture 12.pptxlecture 12.pptx
lecture 12.pptxITNet
 
lecture 13.pptx
lecture 13.pptxlecture 13.pptx
lecture 13.pptxITNet
 
lecture 15.pptx
lecture 15.pptxlecture 15.pptx
lecture 15.pptxITNet
 
kandegeeee.pdf
kandegeeee.pdfkandegeeee.pdf
kandegeeee.pdfITNet
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02ITNet
 
Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01ITNet
 
Cp 111 5 week
Cp 111 5 weekCp 111 5 week
Cp 111 5 weekITNet
 
Teofilo kisanji university mbeya (TEKU) ambassador 2020
Teofilo kisanji university mbeya (TEKU) ambassador 2020Teofilo kisanji university mbeya (TEKU) ambassador 2020
Teofilo kisanji university mbeya (TEKU) ambassador 2020ITNet
 
Tn 110 lecture 8
Tn 110 lecture 8Tn 110 lecture 8
Tn 110 lecture 8ITNet
 
Tn 110 lecture 2 logic
Tn 110 lecture 2 logicTn 110 lecture 2 logic
Tn 110 lecture 2 logicITNet
 
Tn 110 lecture 1 logic
Tn 110 lecture 1 logicTn 110 lecture 1 logic
Tn 110 lecture 1 logicITNet
 
internet
internetinternet
internetITNet
 
development study perspective full
development study perspective fulldevelopment study perspective full
development study perspective fullITNet
 
Gender issues in developement
Gender issues in developementGender issues in developement
Gender issues in developementITNet
 
Religion
ReligionReligion
ReligionITNet
 
Development studies 103 conflict and peace studies
Development studies 103 conflict and peace studiesDevelopment studies 103 conflict and peace studies
Development studies 103 conflict and peace studiesITNet
 

More from ITNet (20)

lecture 8 b main memory
lecture 8 b main memorylecture 8 b main memory
lecture 8 b main memory
 
lecture 9.pptx
lecture 9.pptxlecture 9.pptx
lecture 9.pptx
 
lecture 10.pptx
lecture 10.pptxlecture 10.pptx
lecture 10.pptx
 
lecture 11.pptx
lecture 11.pptxlecture 11.pptx
lecture 11.pptx
 
lecture 12.pptx
lecture 12.pptxlecture 12.pptx
lecture 12.pptx
 
lecture 13.pptx
lecture 13.pptxlecture 13.pptx
lecture 13.pptx
 
lecture 15.pptx
lecture 15.pptxlecture 15.pptx
lecture 15.pptx
 
kandegeeee.pdf
kandegeeee.pdfkandegeeee.pdf
kandegeeee.pdf
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
 
Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01
 
Cp 111 5 week
Cp 111 5 weekCp 111 5 week
Cp 111 5 week
 
Teofilo kisanji university mbeya (TEKU) ambassador 2020
Teofilo kisanji university mbeya (TEKU) ambassador 2020Teofilo kisanji university mbeya (TEKU) ambassador 2020
Teofilo kisanji university mbeya (TEKU) ambassador 2020
 
Tn 110 lecture 8
Tn 110 lecture 8Tn 110 lecture 8
Tn 110 lecture 8
 
Tn 110 lecture 2 logic
Tn 110 lecture 2 logicTn 110 lecture 2 logic
Tn 110 lecture 2 logic
 
Tn 110 lecture 1 logic
Tn 110 lecture 1 logicTn 110 lecture 1 logic
Tn 110 lecture 1 logic
 
internet
internetinternet
internet
 
development study perspective full
development study perspective fulldevelopment study perspective full
development study perspective full
 
Gender issues in developement
Gender issues in developementGender issues in developement
Gender issues in developement
 
Religion
ReligionReligion
Religion
 
Development studies 103 conflict and peace studies
Development studies 103 conflict and peace studiesDevelopment studies 103 conflict and peace studies
Development studies 103 conflict and peace studies
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Im 111 lecture 1

  • 1. Foundation concepts of information systems Instructor : Augustino Mwogosi Room AB 205 0714696752 INTRODUCTION TO INFORMATION SYSTEMS(IM 111) 2/15/2021 1 Augustino Jonas Mwogosi
  • 3. Introduction  As managers most of you will work for firms that are intensively using information systems you will be making large investments in information technology.  Successful firms are those who learn how to use new technologies.  Cell phones ,computers and online conferencing over the internet have become essential tools for business. 2/15/2021 3 Augustino Jonas Mwogosi
  • 4. Perspectives of IS  Information technology(IT) consists of all the hardware and software that a firm needs to use in order to achieve its business objectives.  Information system is a set of interrelated components that collects(or retrieve),process, store and distribute information to support decision making and control in an organization.  An information system (IS) can be any organized combination of people, hardware, software, communications networks, data resources, and policies and procedures that stores, retrieves, transforms, and disseminates information in an organization. 2/15/2021 4 Augustino Jonas Mwogosi
  • 5. The Fundamental Roles of IS in Organizations 2/15/2021 Augustino Jonas Mwogosi 5  There are three vital roles that information systems can perform for a business enterprise:  Support of business processes and operations.  Support of decision making by employees and managers.  Support of strategies for competitive advantage.
  • 6. Why organizations invest so much in IS?  Information systems are essential for conducting day-to-day business as well as achieving strategic business objectives.  Business invest heavily in IS to achieve the following strategic business objectives :  Operational excellence  New products, services and business models  Customer and supplier intimacy  Improved decision making  Competitive advantages  Survival 2/15/2021 6 Augustino Jonas Mwogosi
  • 7. Components of Information systems 2/15/2021 Augustino Jonas Mwogosi 7  It is a combination of five key components  Data  People  procedures  Objects(Software ,Hardware, Telecommunication networks etc)
  • 8. Data, information and knowledge  Before you can understand how information systems work, it is important to distinguish between data and information  Data are raw facts(i.e recorded but unformatted) examples TUDOM201800572  Information is processed data, that is formatted and more useful) Example T/UDOM/2018/00572 is a registration number of one of you here.  Knowledge is the ability to understand information, form opinions and make decisions or predictions based on the information. Example You must have knowledge to be aware that only one UDOM registration number can uniquely identify each student 2/15/2021 8 Augustino Jonas Mwogosi
  • 10. Data, information and knowledge  Three activities in an information system produce the information that organizations need to make decisions, control operations, analyze problems, and create new products or services.  Input: Captures or collects raw data from within the organization or from its external environment  Processing: Convert raw input into a meaningful form  Output : Transfers processed information to the people who will use it or to the activities for which it will be used.  Feedback –output that is returned to appropriate members of the organization to help them evaluate or correct the input stage 2/15/2021 10 Augustino Jonas Mwogosi
  • 12. People 2/15/2021 12  People are the essential ingredient for the successful operation of all information systems. These people resources include end users and IS specialists.  End users (also called users or clients) are people who use an information system or the information it produces. They can be customers, salespersons, engineers, clerks, accountants, or managers and are found at all levels of an organization. I  IS specialists are people who develop, maintain, manage, and study information systems.. They include systems analysts, software developers, system operators, and other managerial, technical,
  • 13. IS Developers 2/15/2021 Augustino Jonas Mwogosi 13  People who DEVELOP Information systems  Systems analyst: Responsible for analyzing business requirements and selecting information systems that meet those needs.  Programmer: Responsible for coding, testing, debugging, and installing programs.  Systems consultant : Provide IS knowledge to external clients
  • 14. IS Maintainers 2/15/2021 Augustino Jonas Mwogosi 14  People who MAINTAIN Information systems  IS auditor: Responsible for auditing information systems and operating procedures for compliance with internal and external standards  Database administrator: Responsible for managing database and database management software use  Webmaster: Responsible for managing the firm’s Web site
  • 15. IS Managers 2/15/2021 Augustino Jonas Mwogosi 15  People who MANAGE Information systems  IS manager :Responsible for the management of an existing information system  IS security manager: Responsible for managing security measures and disaster recovery  Chief information officer :Highest-ranking IS manager; responsible for strategic planning and IS use throughout the firm
  • 16. People who Study IS 2/15/2021 Augustino Jonas Mwogosi 16  People who STUDY Information systems  Study University professor: Teach undergraduate and graduate students; study the use of information systems in organizations and society.  Government scientist :Research and development of information systems for homeland security, intelligence, and other related applications.
  • 17. IS Professional Core Competencies 2/15/2021 Augustino Jonas Mwogosi 17  Technical Knowledge and Skills:  Hardware Hardware platforms, infrastructure, virtualization, peripherals  Software Operating systems, application software, drivers  Networking Network operating systems, cabling and network interface cards, local area networks, wide area  networks, wireless, Internet, security  Business Knowledge and Skills  Business integration, industry Business processes, functional areas of business and their integration, industry characteristics  Managing people and projects Planning, organizing, leading, controlling, managing people and projects  Social Interpersonal, group dynamics, political  Communication Verbal, written, and technological communication and presentation  Systems Knowledge and Skills  Systems integration Connectivity, compatibility, integrating subsystems and systems  Development methodologies Steps in systems analysis and design, systems development life cycle, alternative development methodologies  Critical thinking Challenging one’s and others’ assumptions and ideas  Problem solving Information gathering
  • 18. Procedures 2/15/2021 Augustino Jonas Mwogosi 18  The actual steps and tasks that describe how work is organized in a business are called business processes.  A business process is a logically related set of activities that define how specific business tasks are performed.  Every business can be seen as a collection of business processes.  Large businesses have thousands of business processes, some more important than others. To a large extent, the efficiency of a business firm depends on how well its business processes are designed and coordinated.  Many business processes are tied to a specific functional area.
  • 19. STAND UP LET’S DANCE 2/15/2021 19 Augustino Jonas Mwogosi
  • 21. Quiz One ( 10 Marks) Why are information systems so important for running and managing businesses? 2/15/2021 21 Augustino Jonas Mwogosi