Essay Candidate

1 / 39
About This Presentation
Title:

Essay Candidate

Description:

Step 5 - Calculate a 'fitness' for 1st genetic string (Possibly SSE) Genetic Algorithm (cont'd. ... Resulting Information Systems ... – PowerPoint PPT presentation

Number of Views:35
Avg rating:3.0/5.0
Slides: 40
Provided by: kelly1

less

Transcript and Presenter's Notes

Title: Essay Candidate


1
Essay Candidate 1
Discuss the strategies used to develop new
information systems what exactly does each
strategy entail and what are the advantages and
disadvantages of each?
2
Traditional Systems Lifecycle
3
SYSTEM LIFECYCLE
  • CAN BE COSTLY, TIME CONSUMING
  • MAY ENCOURAGE FREEZING SPECIFICATIONS EARLY IN
    DEVELOPMENT
  • MAY NOT BE SUITABLE FOR SMALL, LESS STRUCTURED
    SYSTEMS

4
PROTOTYPING
  • PROCESS OF BUILDING EXPERIMENTAL SYSTEM TO
    DEMONSTRATE, EVALUATE APPROACH USERS REFINE
    NEEDS
  • PROTOTYPE Preliminary working version of
    information system for demonstration, evaluation
    purposes
  • ITERATIVE PROCESS

5
Prototyping
6
APPLICATION SOFTWARE PACKAGES
  • PREWRITTEN, PRECODED APPLICATION SOFTWARE,
    COMMERCIALLY AVAILABLE FOR SALE OR LEASE
  • GEARED TO COMMON REQUIREMENTS
  • CUSTOMIZATION Modification of software to meet
    organizations needs
  • MUST WEIGH COSTS / BENEFITS

7
SELECTED EXAMPLES OF APPLICATION PROGRAMS
  • ACCOUNTS RECEIVABLE BOND STOCK MANAGEMENT
    COMPUTER-AIDED DESIGN (CAD) DOCUMENT IMAGING
    E- MAIL ENTERPRISE.RESOURCE PLANNING (ERP)
    GROUPWARE HEALTH CARE HOTEL.MANAGEMENT
    INTERNET TELEPHONE INVENTORY CONTROL JOB
    COSTING LIBRARY SYSTEMS LIFE INSURANCE MAILING
    LABELS MATHEMATICAL / STATISTICAL MODELING
    ORDER PROCESSING PAYROLL PROCESS CONTROLTAX
    ACCOUNTING WEB BROWSER WORD PROCESSING

8
END-USER DEVELOPMENT
  • END-USERS DEVELOP INFORMATION SYSTEM
  • WITH LITTLE HELP FROM
  • TECHNICAL SPECIALISTS
  • USING 4th GENERATION TOOLS

9
End-User Development
10
END-USER DEVELOPMENT
  • STRENGTHS
  • IMPROVED REQUIREMENTS DETERMINATION
  • INCREASED USER INVOLVEMENT SATISFACTION
  • REDUCED APPLICATION BACKLOG

11
END-USER DEVELOPMENT
  • WEAKNESSES
  • RELATIVELY INEFFICIENT
  • SLOW TRANSACTION PROCESSING
  • MAY CARRY HIGH COST
  • LARGE FILES CAN DEGRADE PERFORMANCE
  • NONPROCEDURAL APPROACH MAY HAMPER LOGIC
    UPDATING REQUIREMENTS

12
OUTSOURCING
  • CONTRACTING
  • COMPUTER CENTER OPERATIONS
  • TELECOMMUNICATIONS NETWORKS
  • APPLICATION DEVELOPMENT
  • TO EXTERNAL VENDORS

13
(No Transcript)
14
Essay Candidate 2
What is Artificial Intelligence (AI)? What
exactly are Expert Systems, Neural Networks and,
Genetic Algorithms and why are they considered
artificial intelligence?
15
AI Definition
Expert System def Discussion with
examples (Loan approval example and whale
identification)
16
Expert System for a Loan Application
17
Biological Inspiration for an Artificial Neural
Network (ANN)
18
Resulting ANN Based on Hebbian Learning
19
Application of ANN in Banking
20
Optimized Feedforward ANN for the Guadagni and
Little Choice Model
21
(No Transcript)
22
Genetic Algorithm
  • Step 1 - Establish even number (Z) of genetic
    strings for first generation (G1)
  • Step 2 - Establish training data
  • Step 3 - Obtain a trial output with first
    observation (n1)
  • Step 4 - Repeat Step 3 for all observations (N)
  • Step 5 - Calculate a fitness for 1st genetic
    string (Possibly SSE)

23
Genetic Algorithm (contd.)
  • Step 6 - go to Step 2 and repeat for all other
    genetic strings
  • Step 7 - Assign probabilities to genetic strings
    of G1 of being chosen for reproduction based on
    respective fitness
  • Step 8 - Select Z genetic strings from G1 based
    on probabilities
  • Step 9 - Mate the genetic strings by crossing
    over at a random point in the strings thereby
    creating off spring (G2)

24
Genetic Algorithm (contd.)
  • Step 10 - Randomly insert mutations to test the
    robustness of G2
  • Step 11- Continue Steps 3 through 10 until an
    acceptable solution is achieved (GN)

25
Essay Candidate 3
What is a DSS model and how can it be used to
create value?
26
Resulting Information Systems
27
DECISION SUPPORT SYSTEM
  • DATA MINING technology for finding relationships
    in large data bases for prediction
  • DSS SOFTWARE SYSTEM tools for data analysis
  • SENSITIVITY ANALYSIS what-if questions about
    changes in model factors (p.407 definition)

28
Sensitivity Analysis What if
29
More DSS Applications
  • Supply Chain Management
  • CRM

30
Essay Candidate 4
Discuss e-commerce security as it relates to
encryption and authentication.
31
SECURITY AND THE INTERNET
  • ENCRYPTION Coding scrambling messages to deny
    unauthorized access
  • (U 571 Windtalkers)
  • AUTHENTICATION Ability to identify another party

32
Public Key Encryption
1) The first key scrambles the message so that it
cant be read, but the scrambling key may be
readily available, or public. 2) Decoding
requires a second private key, held only by the
person who created the message or its intended
recipient. 3) In practice the keys are related
at their base, or root. Thats why one key can
unlock a second keys message.
33
Secure Sockets Layer (SSL)
Used widely for Internet Transactions commercial
web site can purchase private encryption key
from VeriSign for 350/year. It gives online
customers confidence that the credit card numbers
are not being stolen over the Internet. .
34
Secure Sockets Layer (SSL) cont.d
VeriSign authenticates that 1) Your company is
indeed a company - Dun Bradstreet 2) Contacts
Network solutions which gives out domain names
under contract with the National Science
Foundation to authenticate company name against
URL 3) Makes two telephone contacts - one
technical and one organizational via telephone
35
Digital Certificates
  • 1) Uses trusted third party known as a
    certificate authority (CA) to validate users
    identity (Verisign Inc. is a top CA)
  • 23) CAs server generates an encrypted digital
    certificate, plus owners public key

36
Digital Certificates Cont.d
45) Recipient of an encrypted message uses CAs
public key to to decode digital certificate,
thus obtaining owners public key and
identity 6 (not shown) Using this information
the recipient can send an encrypted reply
37
Class 1 Digital Certificate
Easily obtainable at www.versign.com for
15/year. Simply give your name, address, and
e-mail address. Once the e-mail address is
verified, youll get a certificate. Think of it
as a library card quality authentication.
38
Class 2 Digital Certificate
Requires proof of physical address in addition to
Class 1 data. For that the company issuing the
certificate will consult a credit database -
Equifax or Experian in the case of consumers,
Dun and Bradstreet in the case of
businesses. Think of this as credit card quality
authentication.
39
Class 3 Digital Certificate
To get this you must prove exactly who you are
and prove that you are responsible. Technology
not commercially feasible to offer this
presently. These are envisioned being used in the
future for things like apartment leases, loans
on-line, court documents, etc. Think of it as
drivers license quality authentication
Write a Comment
User Comments (0)