MIS (MBAG 6305) Management Information Systems
Management Information Systems (MBAG 6305)
Instructor: Khalid Abed Dahleez; HP:0598868800, Email:firstname.lastname@example.org
Consultation Hours: before and after class or by appointment
رابط خاص بالابحاث العلمية حسب الشعبة https://drive.google.com/drive/folders/1_wfsZu49AT-a66XRqA_X97AM0YSXwZ1g?usp=sharing
رابط خاص بارشادات تقييم الابحاث 0 Critiquing Research Articles
Course Description and Objectives:
This course is designed to help students in developing their knowledge & skills in selected topics related to the study of management information systems and its applications. It will also help students in developing skills for conducting research in general and MIS research in specific. MIS focuses on topics which help businesses in maximizing value tracks and help business managers in achieving excellence, maximizing corporate benefits, and improving decision making and competitiveness. In addition to the examination of core MIS content areas such as role of MIS in contemporary business environment, links to organizational strategy, merging business related technologies, business intelligence, enterprise applications, managing knowledge and projects, this course will also address the use of IS in developing research skills through using google scholar, well-established research databases, citations, plagiarism, and MIS applications. Generally, the course aims at:
1. Increase students' knowledge in selected MIS topics.
2. Develop their research and writing skills; especially how to use existed IS infrastructure in finalizing your research while maintaining quality and rigorousness of work and academic integrity.
3. Develop students' skills in presenting work and defending ideas.
4. Familiarize students with standard conventions in preparing research papers through complying with APA style.
To complete this course, you have to comply with the following rules and guidelines:
1. Attend all classes – no excuses.
2. Participate in discussions and cooperate with your instructor.
3. Prepare for the case study and participate in relevant discussions.
4. Submit all assignments – don't miss the deadline.
5. Prepare and submit your research paper – based on APA style without plagiarism.
6. Prepare and deliver a professional presentation of your research proposal.
7. Pass the final exam through demonstrating relevant knowledge.
Main text book: Laudon, K. C., & Laudon, J. P. (2016). Management information systems: managing the digital firm (Vol. 14). Pearson.
Valacich, J. S., Schneider, C., & Behl, R. (2012). Information systems today: managing in the digital world. Pearson Education.
Piccoli, G. (2012). Information Systems for Managers: Text and Cases: Text and Cases. Wiley Global Education.
Introduction to IS
Ch.1 – Rainer.et.al – Introduction to ISs Rainer.Et.al.Ch1
Ch.1 – Stair&Reynoulds6th ed– An Introduction to ISs in Organizations stair62184_0840062184_02.01_chapter01
Ch.1 – Stair&Reynoulds10th ed – An Introduction to ISs stair78292_0538478292_02.01_chapter01
Ch.1 Information Systems in Global Business Today LaudonMIS14ch01Std
Questions & Answers
Ch.2, Global E-Business and E-Commerce: Digital Markets, Digital Goods LaudonMIS14ch02Std
Google Scholar, how to search for papers, authors, ..
1st & 2nd
Process Doc Examp
Ch.3 Information Systems, Organizations, and Strategy LaudonMIS14ch03Std
Impact factor, h-index, searching for papers in famous databases: Elsevier-Science direct, Emerald, EBSCO
Ch.5 IT Infrastructure and Emerging Technologies Laudon_MIS14_ch05std
Endnote, how to cite in your research proposal
Ch.6 Foundations of Business Intelligence: Databases and Information Management Laudon_MIS14_ch06std
Idea Generation, finding your research idea
Towards an Understanding of Business Intelligence
Ch.9 Achieving Operational Excellence and Customer Intimacy: Enterprise Applications LaudonMIS14ch09std
Understanding & Detecting Plagiarism: Turnitin, Viper, http://www.plagiarismchecker.com/help-teachers.php, http://www.dustball.com/cs/plagiarism.checker/,
CH.10 E-Commerce: Digital Markets, Digital Goods LaudonMIS14ch10std
Guest Speaker – IS applications: E-government
0 The Cloud Computing A Systematic Review
Ch.11 Managing Knowledge LaudonMIS14ch11std
Guest Speaker – IS Applications: CRM
Ch.12 Enhancing Decision Making
Ch.13 Building Information Systems
Ch. 14 Managing Projects
*List of Assignments:
Effective Use of Google Scholar to search for MIS papers
· Select one of the topics given in the syllabus or similar.
· Search for related articles in Google scholar.
· Select best ten cited articles related to the foundation of the topic.
· Select ten recently-published articles (2013 – 2016).
Documentation of a business process based on the given form
LinkedIn registration, joining a group "Harvard Business Review", select your preferred discussion and report based on your understanding.
Effective use of famous databases to search for MIS papers
Effective use of Endnote in Citations (APA style)
Select your Idea
Due date for "Assessment of MIS research paper"
Evaluation & Grading:
Students' performance in this course is evaluated through:
Attendance & Participation:
Class participation is very essential for the success of this course since students have different backgrounds from management, IT, engineering and others. Thus, students are expected to:
1. Attend all classes including other related activities.
2. Listen carefully and criticize other views constructively.
3. Asking questions and defending arguments.
4. Identify the interesting aspects of assigned case studies, answer questions, and participate in the discussion.
5. Commenting on course materials, course delivery of weekly topics, and presented proposals/projects.
6. Participate actively in the scientific day.
Assignments & Homework:
1. Submit assignments and homework before the next class (one week max).
2. Make sure to do the assignment by your own (any plagiarism leads directly to failure in the class).
3. Show professionalism and provide informative typed assignment.
4. Assessment of a MIS research paper based on the following points:
a. Significance of research questions and subject studies.
b. Originality of work
c. Appropriateness of Literature Citations
d. Appropriateness of Methodology
e. Soundness of Interpretations and conclusions
f. Relevance of Discussion
g. Soundness of Organization
h. Appropriateness of tables and figures
i. Adequacy of title and abstract
Students have two options: write a research proposal in one of the provided MIS fields or developing a sophisticated IS.
Option one: Research proposal in specific MIS topics (preferred)
Students are required to develop a complete research proposal in one of the following topics:
1. Web 2.0 applications.
2. Decision Support Systems
3. Knowledge based and Expert Systems
4. ERP (Enterprise Resource Planning)
5. Data warehouses
6. Data Mining
7. E-business and E-Commerce
8. Information Systems Security
9. Change Management and IS
10. Information Systems Management
11. Failure of Information Systems
12. Information Systems Economic Feasibility
13. Planning and implementation of Information Systems Infrastructure
14. Business Process Reengineering
15. Complementary Assets for New IT/Engineering Businesses.
Other topics are welcomed (needs approval from the instructor).
Instructions for preparing and submitting the research proposal:
1. Review the literature based on your selected topic (interest), justify your study, justify your conceptual framework, justify your selected research method, justify your data collection methods.
2. Include an appendix which shows your data collection instruments or interview questions.
3. All selected papers in literature review must come from peer-reviewed research work.
4. Prepare your proposal following APA style.
5. Your proposal should be between 15-20 pages in length (double spaced, 12-point Times New Roman font).
6. Submit printed and electronic copies of your proposal by the end of week 13.
Proposals will be evaluated based on the following criteria:
1. Importance, contribution, and relevancy to the field of MIS.
2. Originality of ideas and significance of contribution to knowledge or to societal problems.
3. Relevancy of research questions/hypotheses and conceptual framework.
4. Richness and adequacy of literature and appropriateness of literature citation.
5. Rigorousness and appropriateness of research method.
6. Professionalism shown through flow of ideas, clear writing, correct language, and conformance to APA style.
Defining IT Infrastructure
IT infrastructure consists of a set of physical devices and software applications that are required to operate the entire enterprise. But IT infrastructure is also a set of firmwide services budgeted by management and comprising both human and technical capabilities.
Evolution of IT Infrastructure
The IT infrastructure in organizations today is an outgrowth of over 50 years of evolution in computing platforms. There have been five stages in this evolution, each representing a different configuration of computing power and infrastructure elements. The five eras are general-purpose mainframe and minicomputer computing, and cloud and mobile computing.
General-Purpose Mainframe and Minicomputer Era: (1959 to Present)
The introduction of the IBM 1401 and 7090 transistorized machines in 1959 marked the beginning of widespread commercial use of mainframe computer. The mainframe era was a period of highly centralized computing under the control of professional programmers and systems operators (usually in a corporate data center), with most elements of infrastructure provided by a single vendor, the manufacturer of the hardware and the software. This pattern began to change with the introduction of minicomputers produced by Digital Equipment Corporation (DEC) in 1965. In recent years, the minicomputer has evolved into a midrange computer or midrange server and is part of a network.
Personal Computer Era: (1981 to Present)
The appearance of the IBM PC in 1981 is usually considered the beginning of the PC era because this machine was the first to be widely adopted by American businesses. The Wintel PC computer (Windows operating system software on a computer with an Intel microprocessor) became the standard desktop personal computer. Today, 95 percent of the world’s estimated 1.5 billion computers use the Wintel standard.
Client/Server Era: (1982 to Present)
In client/server computing, desktop or laptop computers called clients are networked by powerful server computers that provide the client computers with a variety of services and capabilities. Simple client/server networks can be found in small businesses, most corporations have more complex, multitiered (often called N-tier) client/server architectures in which the work of the entire network is balanced over several different levels of servers, depending on the kind of service being requested.
At first level, a Web server will serve a Web page to a client in response to a request for service. Application server software handles all application operations between a user and an organization’s back-end business systems. Novell NetWare was the leading technology for client/server networking at the beginning of the client/server era. Today, Microsoft is the market leader with its Windows operating systems.
Enterprise Computing Era: (1992 to Present)
In the early 1990s, firms turned to networking standards and software tools that could integrate disparate networks and applications throughout the firm into an enterprise-wide infrastructure. The enterprise infrastructure also requires software to link disparate applications and enable data to flow freely among different parts of the business, such as enterprise applications.
Cloud and Mobile Computing Era: (2000 to Present)
The growing bandwidth power of the Internet has pushed the client/server model one step further, towards what is called the “Cloud Computing Model,” refers to a model of computing that provides access to a shared pool of computing resources over a network, often the Internet.
Technology Drivers of Infrastructure EvolutionMoore’s Law and Microprocessing Power
The first microprocessor chip was introduced in 1959, the number of components on a chip with the smallest manufacturing costs per component (generally transistors) had doubled each year. This assertion became the foundation of Moore’s Law. This law would later be interpreted in multiple ways. There are at least three variations of Moore’s Law, none of which Moore ever stated: (1) the power of microprocessors doubles every 18 months (2) computing power doubles every 18 months; and (3) the price of computing falls by half every 18 months.
Nanotechnology uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit.
Fig. Examples of Nanotubes
The Law of Mass Digital Storage
A second technology driver of IT infrastructure change is the Law of Mass Digital Storage. The world produces as much as 5 exabytes of unique information per year. The amount of digital information is roughly doubling every year. Fortunately, the cost of storing digital information is falling at an exponential rate of 100 percent a year.
Metcalfe’s Law and Network Economics
Robert Metcalfe – inventor of Ethernet local area network technology – claimed in 1970 that the value or power of a network grows exponentially as a function of the number of network members. Demand for information technology has been driven by the social and business value of digital networks, which rapidly multiply the number of actual and potential links among network members.
Declining Communications Costs and the Internet
A fourth technology driver transforming IT infrastructure is the rapid decline in the costs of communication and the exponential growth in the size of Internet. As communication costs fall toward a very small number and approach 0, utilization of communication and computing facilities explodes.
Operating System Platforms
At the client level, 90 percent of PCs use some form of Microsoft Windows operating system to manage the resources and activities of the computer. Google’s Chrome OS provides a lightweight operating system for cloud computing using netbooks. Android is a mobile operating system developed by Android, Inc. and later the Open Handset Alliance as a flexible, upgradeable mobile device platform. Multitouch interface, where users use their fingers to manipulate objects on the screen.
Enterprise Software Applications
The largest providers of enterprise application software are SAP and Oracle (which acquired PeopleSoft). Microsoft is attempting to move into the lower ends of this market by focusing on small and medium-sized businesses that have not yet implemented enterprise applications.
Data Management and Storage
Enterprise database management software is responsible for organizing and managing the firm’s data so that they can be efficiently accessed and used. The leading database software providers are IBM (DB2), Oracle, Microsoft (SQL server), and Sybase (Adaptive Server Enterprise), which supply more than 90 percent of the U.S. database software marketplace. Storage area networks (SANS) connect multiple storage devices on a separate high-speed network dedicated to storage.
Contemporary Hardware Platform Trends
The exploding power of computer hardware and networking technology has dramatically changed how businesses organize their computing power, putting more of this power on networks and mobile handheld devices.
The Emerging Mobile Digital Platform
Cell phones and smartphones such as the BlackBerry and iPhone have taken on many functions of handheld computers, including transmission of data, surfing the Web, transmitting email and instant messages, displaying digital content and exchanging data with internal corporate systems. The new mobile platform also includes small low-cost lightweight subnotebooks called netbooks optimized for wireless communication and Internet access, with core computing functions such as word processing; tablet computers such as the iPad; and digital e-book readers such as Amazon’s Kindle with some Web access capabilities.
Grid computing involves connecting geographically remote computers into a single network to create a virtual supercomputer by combining the computational power of all computers on the grid. Grid computing requires software programs to control and allocate resources on the grid.
Virtualization is the process of presenting a set of computing resources (such as computing power or data storage) so that they can all be accessed in ways that are not restricted by physical configuration or geographic location.
Business Benefits of Virtualization
By providing the ability to host multiple systems on a single physical machine, virtualization helps organizations increase equipment utilization rates, conserving data center space and energy usage. Most servers run at just 15-20 percent of capacity, and virtualization can boost server utilization rates to 70 percent or higher. Higher utilization rates translate into fewer computers required to process the same amount of work.
Cloud computing is which firms and individuals obtain computer processing, storage, software, and other services as a pool of virtualized resources over a network, primarily the Internet. These resources are made available to users, based on their needs, irrespective of their physical location or the location of the users themselves. The U.S. National Institute of Standards and Technology (NIST) defines cloud computing as having the following essential characteristics
On-demand self-service – individual can obtain computing capabilities such as server time or network storage on their own.
Ubiquitous network access – individuals can use standard network and Internet devices, including mobile platforms, to access cloud resources.
Location independent resource pooling – Computing resources are pooled to serve multiple users, with different virtual resources dynamically assigned according to user demand. The user generally does not know where the computing resources are located.
Rapid elasticity – computing resources can be rapidly provisioned, increased, or decreased to meet changing user demand.
Measured service – charges for cloud resources are based on amount of resources actually used.
Green computing or green IT refers to practices and technologies for designing, manufacturing, using, and disposing of computers, servers, and associated devices such as monitors, printers, storage devices and networking and communications systems to minimize impact on the environment.
Autonomic computing is an industry-wide effort to develop systems that can configure themselves, optimize and tune themselves, heal themselves when broken, and protect themselves from outside intruders and self-destruction.
Contemporary Software Platform Trends
Linux and Open Source Software
Open source software is software produced by a community of several hundred thousand programmer around the world. It is by definition not restricted to any specific system or hardware technology, although most open source software is currently based on a Linux or Unix operating system.
Perhaps the most well known open source software is Linux, an operating system related to Unix. The rise of open source software, particularly Linux and the applications it supports, has profound implications for corporate software platforms: cost reduction, reliability and resilience, and integration, because Linux works on all the major hardware platforms from mainframes to servers to clients.
Software for the Web: Java and Ajax
Web Services and Service-Oriented Architecture
Web services refer to a set of loosely coupled software components that exchange information with each other using universal Web communication standards and languages. The foundation technology for Web services is XML (Extensible Markup Language), developed in 1996 by the World Wide Web Consortium as a more powerful and flexible markeup language than hyper text marke up language (HTML) for Web pages. HTML is a page description language for specifying how text, graphics, video, and sound are placed on a Web page document. A service oriented architecture (SOA) is set of self-contained services that communicate with each other to create a working software application.
Dealing with Platform and Infrastructure Change
As firms grow, they often quickly outgrow their infrastructure. As firms shrink, they can get stuck with excessive infrastructure purchased in better times. It is up to business management to determine acceptable levels of computer response time and availability for the firm’s mission-critical systems to maintain the level of business performance they expect.
Management and Governance
A long-standing issue among information system managers and CEOs has been the question of who will control and manage the firm’s IT infrastructure. Each organization will need to arrive at answer based on its own needs.
Making Wise Infrastructure Investments
IT infrastructure is a major investment for the firm. If too much is spent on infrastructure, it lies and constitutes a drag on firm financial performance. If too little is spent, important business services cannot be delivered and the firm’s competitors will outperform the under-investing firm. Cloud computing may be a low-cost way to increase scalability and flexibility, but firms should evaluate this option carefully in light of security requirements and impact on business processes and work flows.
Competitive Forces Model for IT Infrastructure Investment
Market demand for your firm’s services – make an inventory of the services you currently provide to customers, suppliers, and employees.
Your firm’s business strategy – analyze your firm’s five-year business strategy and try to assess what new services and capabilities will be required to achieve strategic goals.
Your firm’s IT strategy, infrastructure, and cost – Examine your firm’s information technology plans for the next five years and assess its alignment with the firm’s business plans.
Information technology assessment – is your firm behind the technology curve or at the bleeding edge of information technology? Both situations are to be avoided.
Competitor firm services – try to assess what technology services competitors’ offer to customers, suppliers, and employees.
Competitor firm IT infrastructure investments – benchmark your expenditures for IT infrastructure against your competitors. Many companies are quite public about their innovative expenditures on IT.
IT infrastructure consists of a set of physical devices and software applications that are required to operate the entire enterprise. But IT infrastructure is also a set of firm wide services budgeted by management and comprising both human and technical capabilities. The IT infrastructure in organizations today is an outgrowth of over 50 years of evolution in computing platforms. There have been five stages in this evolution, each representing a different configuration of computing power and infrastructure elements. The five eras are general-purpose mainframe and minicomputer computing, and cloud and mobile computing; General-Purpose Mainframe and Minicomputer Era: (1959 to Present), Personal Computer Era: (1981 to Present), Client/Server Era: (1982 to Present), Enterprise Computing Era: (1992 to Present), and Cloud and Mobile Computing Era: (2000 to Present). Major challenges include dealing with platform and infrastructure change, infrastructure management and governance, and making wise infrastructure investments. Solution guidelines include using a competitive forces model to determine how much to spend on IT infrastructure and where to make strategic infrastructure investments, and establishing the total cost of ownership (TCO) of information technology assets.