Escolar Documentos
Profissional Documentos
Cultura Documentos
1-2
Study Questions
Q1: Why is Introduction to MIS the most important class in the business
school?
Q2: What is MIS?
Q3: How can you use the five-component model?
1-3
Moores Law
The number of transistors per square inch on an integrated
chip doubles every 18 months.
1-4
1-5
Some Consequences
Google+
Vine
Pandora
LinkedIn
Pintrest
Zulily
Twitter
Tableau
1-6
1-7
1-8
1-9
1-10
1-11
1-12
1-13
1-14
1-15
1-16
1-17
1-18
1-19
Achieving Strategies
Information systems exist to help people achieve
business strategies.
What is the purpose of our Facebook page?
What is it going to do for us?
What is our policy for employees contributions?
What should we do about critical customer reviews?
Are the costs of maintaining the page sufficiently offset by
the benefits?
1-20
1-21
1-22
1-23
1-24
1-25
1-26
Products
Methods
Inventions
Standards
1-27
1-28
Where Is Information?
Graph is not, itself, information.
Graph is data you and others perceive, use to
conceive information.
Ability to conceive information from data determined by
cognitive skills.
People perceive different information from same data.
1-29
1-30
1-31
1-32
Immanuel Kant
Categorical imperative
One should behave only in a way that one would
want the behavior to be a universal law.
Are you willing to publish your behavior to the
world?
1-33
Duty
Necessity to act in accordance with categorical
imperative.
Perfect duty - behavior must always be met. (Not lying)
Imperfect duty - a action praiseworthy, but not required.
Giving to charity; developing your business skills and
abilities.
1-34
1-35
Q7: 2025?
Huge networks of computers to process image data in real
time. What does that mean for privacy? Where are
business opportunities?
Computers-in-a-product
Will people still go to work?
Will people be employees of organizations?
Will classrooms be needed?
1-36
1-37
Strong Passwords
10+ characters.
Does not contain your user name, real name, or company
name.
Does not contain a complete dictionary word in any language.
Different from previous passwords used.
Contains both upper- and lowercase letters, numbers, and
special characters (such as ! @; #
$ % ^; &; * ( ) _ +; =; { } | [ ] \ : ; <; >;? , . /)
Copyright 2016 Pearson Education, Inc.
1-38
1-39
Active Review
Q1: Why is Introduction to MIS the most important class in the business
school?
Q2: What is MIS?
Q3: How can you use the five-component model?
Q4: Why is the difference between information technology and
information systems important?
Q5: What is information?
Q6: What are necessary data characteristics?
Q7: 2025?
1-40
1-41
1-42
How They Do It
Buyers identify goods to be sold, negotiate with vendors.
Photographs sample items in-house, write ad copy.
Group items for three-day sales events.
After event closes, zulily orders items from vendor, receives,
packages, and ships to customers. (maintains no inventory).
Vulnerable to vendors errors and mistakes.
1-43
Use of Technology
Internet, mobile technology compatibility.
Developed a proprietary technology platform to handle.
enormous spikes in web processing demand.
Extensive data collection and analytics capabilities.
1-44
Growth-Management Problems
To support continued growth, we must effectively integrate,
develop and motivate a large number of new employees, while
maintaining our corporate culture. In particular, we intend to
continue to make substantial investments to expand our
merchandising and technology personnel.
http://www.sec.gov/Archives/edgar/data/1478484/000144530514000741/zu-12292013x10k.htm
1-45
1-46
1-47