Title: Essay Candidate
1Essay Candidate 1
Discuss the strategies used to develop new
information systems what exactly does each
strategy entail and what are the advantages and
disadvantages of each?
2Traditional Systems Lifecycle
3SYSTEM LIFECYCLE
- CAN BE COSTLY, TIME CONSUMING
- MAY ENCOURAGE FREEZING SPECIFICATIONS EARLY IN
DEVELOPMENT - MAY NOT BE SUITABLE FOR SMALL, LESS STRUCTURED
SYSTEMS
4PROTOTYPING
- PROCESS OF BUILDING EXPERIMENTAL SYSTEM TO
DEMONSTRATE, EVALUATE APPROACH USERS REFINE
NEEDS - PROTOTYPE Preliminary working version of
information system for demonstration, evaluation
purposes - ITERATIVE PROCESS
5Prototyping
6APPLICATION SOFTWARE PACKAGES
- PREWRITTEN, PRECODED APPLICATION SOFTWARE,
COMMERCIALLY AVAILABLE FOR SALE OR LEASE - GEARED TO COMMON REQUIREMENTS
- CUSTOMIZATION Modification of software to meet
organizations needs - MUST WEIGH COSTS / BENEFITS
7SELECTED EXAMPLES OF APPLICATION PROGRAMS
- ACCOUNTS RECEIVABLE BOND STOCK MANAGEMENT
COMPUTER-AIDED DESIGN (CAD) DOCUMENT IMAGING
E- MAIL ENTERPRISE.RESOURCE PLANNING (ERP)
GROUPWARE HEALTH CARE HOTEL.MANAGEMENT
INTERNET TELEPHONE INVENTORY CONTROL JOB
COSTING LIBRARY SYSTEMS LIFE INSURANCE MAILING
LABELS MATHEMATICAL / STATISTICAL MODELING
ORDER PROCESSING PAYROLL PROCESS CONTROLTAX
ACCOUNTING WEB BROWSER WORD PROCESSING
8END-USER DEVELOPMENT
- END-USERS DEVELOP INFORMATION SYSTEM
- WITH LITTLE HELP FROM
- TECHNICAL SPECIALISTS
- USING 4th GENERATION TOOLS
9End-User Development
10END-USER DEVELOPMENT
- STRENGTHS
- IMPROVED REQUIREMENTS DETERMINATION
- INCREASED USER INVOLVEMENT SATISFACTION
- REDUCED APPLICATION BACKLOG
11END-USER DEVELOPMENT
- WEAKNESSES
- RELATIVELY INEFFICIENT
- SLOW TRANSACTION PROCESSING
- MAY CARRY HIGH COST
- LARGE FILES CAN DEGRADE PERFORMANCE
- NONPROCEDURAL APPROACH MAY HAMPER LOGIC
UPDATING REQUIREMENTS
12OUTSOURCING
- CONTRACTING
- COMPUTER CENTER OPERATIONS
- TELECOMMUNICATIONS NETWORKS
- APPLICATION DEVELOPMENT
- TO EXTERNAL VENDORS
13(No Transcript)
14Essay Candidate 2
What is Artificial Intelligence (AI)? What
exactly are Expert Systems, Neural Networks and,
Genetic Algorithms and why are they considered
artificial intelligence?
15AI Definition
Expert System def Discussion with
examples (Loan approval example and whale
identification)
16Expert System for a Loan Application
17Biological Inspiration for an Artificial Neural
Network (ANN)
18Resulting ANN Based on Hebbian Learning
19Application of ANN in Banking
20Optimized Feedforward ANN for the Guadagni and
Little Choice Model
21(No Transcript)
22Genetic Algorithm
- Step 1 - Establish even number (Z) of genetic
strings for first generation (G1) - Step 2 - Establish training data
- Step 3 - Obtain a trial output with first
observation (n1) - Step 4 - Repeat Step 3 for all observations (N)
- Step 5 - Calculate a fitness for 1st genetic
string (Possibly SSE)
23Genetic Algorithm (contd.)
- Step 6 - go to Step 2 and repeat for all other
genetic strings - Step 7 - Assign probabilities to genetic strings
of G1 of being chosen for reproduction based on
respective fitness - Step 8 - Select Z genetic strings from G1 based
on probabilities - Step 9 - Mate the genetic strings by crossing
over at a random point in the strings thereby
creating off spring (G2)
24Genetic Algorithm (contd.)
- Step 10 - Randomly insert mutations to test the
robustness of G2 - Step 11- Continue Steps 3 through 10 until an
acceptable solution is achieved (GN)
25Essay Candidate 3
What is a DSS model and how can it be used to
create value?
26Resulting Information Systems
27DECISION SUPPORT SYSTEM
- DATA MINING technology for finding relationships
in large data bases for prediction - DSS SOFTWARE SYSTEM tools for data analysis
- SENSITIVITY ANALYSIS what-if questions about
changes in model factors (p.407 definition)
28Sensitivity Analysis What if
29More DSS Applications
- Supply Chain Management
- CRM
30Essay Candidate 4
Discuss e-commerce security as it relates to
encryption and authentication.
31SECURITY AND THE INTERNET
- ENCRYPTION Coding scrambling messages to deny
unauthorized access - (U 571 Windtalkers)
- AUTHENTICATION Ability to identify another party
32Public Key Encryption
1) The first key scrambles the message so that it
cant be read, but the scrambling key may be
readily available, or public. 2) Decoding
requires a second private key, held only by the
person who created the message or its intended
recipient. 3) In practice the keys are related
at their base, or root. Thats why one key can
unlock a second keys message.
33Secure Sockets Layer (SSL)
Used widely for Internet Transactions commercial
web site can purchase private encryption key
from VeriSign for 350/year. It gives online
customers confidence that the credit card numbers
are not being stolen over the Internet. .
34Secure Sockets Layer (SSL) cont.d
VeriSign authenticates that 1) Your company is
indeed a company - Dun Bradstreet 2) Contacts
Network solutions which gives out domain names
under contract with the National Science
Foundation to authenticate company name against
URL 3) Makes two telephone contacts - one
technical and one organizational via telephone
35Digital Certificates
- 1) Uses trusted third party known as a
certificate authority (CA) to validate users
identity (Verisign Inc. is a top CA) - 23) CAs server generates an encrypted digital
certificate, plus owners public key
36Digital Certificates Cont.d
45) Recipient of an encrypted message uses CAs
public key to to decode digital certificate,
thus obtaining owners public key and
identity 6 (not shown) Using this information
the recipient can send an encrypted reply
37Class 1 Digital Certificate
Easily obtainable at www.versign.com for
15/year. Simply give your name, address, and
e-mail address. Once the e-mail address is
verified, youll get a certificate. Think of it
as a library card quality authentication.
38Class 2 Digital Certificate
Requires proof of physical address in addition to
Class 1 data. For that the company issuing the
certificate will consult a credit database -
Equifax or Experian in the case of consumers,
Dun and Bradstreet in the case of
businesses. Think of this as credit card quality
authentication.
39Class 3 Digital Certificate
To get this you must prove exactly who you are
and prove that you are responsible. Technology
not commercially feasible to offer this
presently. These are envisioned being used in the
future for things like apartment leases, loans
on-line, court documents, etc. Think of it as
drivers license quality authentication