CIS 301 Management Information Systems
 
This page is updated frequently.
Please visit (at least) twice a week!

Spring 2013
Teacher: Adam Reed, EE, PhD, CTT (areed2@calstatela.edu)
Sections 2, 3, and 4
Office Hours: Tuesdays and Thursdays, 2:15-4:15 PM, Room ST-616

Course Description:

The catalog description of this course includes "organizational context of computer-based information systems; common application systems; information architecture; user role in systems development; social and ethical implications." Traditionally, this course and its counterparts at other universities present a snapshot of IS technologies and their applications in the present moment, or as recently as the date of the latest revision of a textbook based on a fresh snapshot every two or three years. When the half-life of IS technology and its specific applications in this snapshot is about 3 years, by the time the students get their MBAs or other graduate or professional degrees, and are confronted with information needs in their future work, at most one-third of what was taught in the traditional course will still be useful.

Worse, traditional textbooks are often merely incomplete revisions of even older books, so that most of what they contain may be decades out-of-date by the time they are published. The faculty of the CIS Department adopted one such textbook, Kroenke/McKinney, Processes, Systems, and Information 1e, as the textbook for all CIS 301 sections. I will update this page frequently, and I'll include topics that are out-of-date in this textbook as they come to my attention.

To extend the window of usefulness of introductory courses, Prof. John Drake (then of of Eastern Michigan University) and I began working on a new approach: Instead of a snapshot of the state of information systems in the present instant, we focused on a hierarchy of concepts and principles (below) basic enough, to remain useful for the rest of your careers. These concepts and principles will remain useful regardless of where your life may take you, not only in business and management but also in any profession and any field of science, scholarship or art. You should be able to use the concepts and principles from this conceptual hierarchy to understand and use the information systems that you will encounter and need in your life, in the organizations that you may work and participate in, and in the global Human Civilization of the information age. I will try, to the extent that there is time, to merge the useful parts of the Department's assigned textbook with our new approach. When following the assigned textbook is time-consuming enough to keep me from exploring every concept and principle in the conceptual hierarchy, I hope that you will continue to explore it outside the classroom, discuss it with your study partner, and ask me questions.

Prerequisite:

CIS 100 or accepted equivalent.

Time demands:

This course requires, in addition to 4 hours of lab/lecture per week, between 8 and 16 hours per week in independent study and practice. Students with prior familiarity with information systems will need about 8 hours per week in addition to class; students without prior familiarity with information systems may need up to 16 hours per week in addition to class time. You are required to study, in depth, all the listed readings before the corresponding lecture, writing down your questions; discuss your questions with your study partner; ask questions about each concept or principle by email if possible, and during lectures; and, after each lecture and further discussion with your study partner, e-mail (from your university e-mail address @calstatela.edu) your discussion points to me at areed2@calstatela.edu, with the course-section number (e.g. CIS 301-3) and chapter number in the subject line of your e-mail, e.g. "Subject: Discussion Points for CIS 301-3 Lesson 2." Please make sure to send me your questions for each session not later than 2:00 PM on the afternoon before the class. All academic e-mail must be sent from your @calstatela.edu e-mail account.

Web Resources:

Use the page that you are now reading and all the others linked below. You are responsible for reading or viewing each resource in its entirety, unless the reference below is explicitly limited to a specific range or list of pages or parts. If anything remains unclear after you have read or viewed the resource, follow the links in the resource recursively. Then, if needed, use search engines for additional follow-up. Discuss all open issues with your study partner. If there is still anything under consideration that remains unclear after discussion with your study partner, or if your interpretations differ, please bring up the remaining issues, insights, and anything else that may be relevant, at the appropriate point in the discussion in class. You are required to understand each concept or principle in enough detail to be able to use it. Understanding all the examples and tangents in the referenced materials is not required, but it can add to your education, and all questions suggested by your readings are welcome. You may receive extra credit if you suggest (by e-mail to areed2@calstatela.edu) replacements or additions to the listed resources that are new to me, and worthy of being incorporated in future versions of this course.

Application Skills:

You are expected to become familiar with all the skills required for all the hands-on exercises in this course. Study partners should alternate hands-on work, making sure that both study partners understand each step well enough to carry it out alone. If you are not already familiar with all the required applications, I recommend taking the available (and excellent) ITC training. Unfortunately, some homework exercises may be incompatible with some versions of the Apple OS X operating system. If you are using a recent version of OS X, you may need to work on the homework assignments in one-keyboard pair programming mode with your study partner. Please remember that questions arising from your hands-on homework, and examination questions dealing with principles encountered in hands-on homework, will be a part of your grade.

Grading:

The primary grading inputs are class participation and presentation, written input (e-mailed to areed2@calstatela.edu) and the mid-term and final exam grades. I will raise to an A or A- the grade of any student from whom I learn, by way of participation, a new concept, insight, or technique. Concrete information about programs or bugs may also raise your grade somewhat, if it is useful and perceptive.

Examinations:

The mid-term (see schedule above) and final exam will use Scantron technology for multiple-choice questions. Per university regulations NO communications-capable electronic devices (cell phones, tablets, PCs, or any other) may be left turned-on during examinations. The examination of any student who has an electronic device that was not turned OFF before the examination will be TERMINATED immediately. Both examinations are open hard-copy, including your textbooks, hard-copy notes, other books and notes of your choice, and web page printouts.

Participation:

Questions from which students may benefit will be answered in class. I will not answer individual questions during breaks or after class. If you wish to discuss something during office hours, please send me e-mail at least a day in advance; if the answer to your question may be of general interest I will discuss it in class. Questions and insights during class are encouraged; if I learn something new to me from your question I may raise your grade accordingly.

Please do not distract me or your fellow students (some of us may have attention deficits) during class. Do not behave, during class, in any way that would not be acceptable in conference with the CEO (or other chief officer) of an organization in which you work, or in which you would like to work in the future.

Study Partners:

You are expected to select a study partner among your colleagues in the class (or, but only if there are an odd number of students in the class, two study partners, so that you will meet in a group of three). You will exchange telephone numbers and e-mail addresses among partners, and meet with your partner or partners for approximately 3 hours each week to review your understanding of current course content, and of all your work in this course. Please make sure to bring to class any issues that come up in reviewing matters with your study partner. If you miss any class work you are responsible for obtaining your study partner's notes and recollections, and for asking, first of your study partner and then of me, whatever questions you find necessary to fill out your understanding.

Accommodation of Students With Disabilities:

Reasonable accommodation will be provided to any student who is registered with the Office of Students with Disabilities and requests a needed accommodation.

Academic Honesty:

A student who infringes the University's policy on Academic Honesty will receive a failing grade, without regard to other aspects of performance in this course.

Schedule (Weeks:)

  1. Course Introduction. Assignment: Read, discuss with your study partner, and together work on Chapters 1 and 2, including all end-of-chapter material and application exercises.

    I postponed the textbook's opening video to Week 2. To open the course with a video of failure, as the textbook suggests, would have set an anti-productive example for your future work as enterprise managers. The people that you will work with will be far better motivated by the prospect of pride in what they are about to accomplish, than by fear of failing.

    I am showing, instead, a video of what one enterprise, TESCO, was able to accomplish with effective use of information systems:

    https://www.youtube.com/watch?v=fGaVFRzTTP4

    First: the organization, requirements, and the work expected of you in this course (per syllabus, above.)

    Then, some notes on topics whose coverage in the required textbook is out of date, or otherwise inadequate. The function of the Chief Information Officer's sub-organization has changed - it does not necessarily concern "Information Systems," but rather the provision of the information services that are needed to support the work of the larger organization. This includes:

    Additional discussion points for chapters 1 and 2:

    The first week of the course concludes with 2 videos, "A Day Made of Glass" and "A Day Made of Glass 2." These videos illustrate how Corning, an "old economy" company founded in 1851, uses its information resources to carry out a successful innovation starategy. Please keep these in mind when studying the Organizational Strategy sections of Chapter 1.

  2. Review of previous topics, discussion of questions, additional clarifications. Assignment: Complete and review any previously assigned work that you suspended because of open questions. Review all work to date in the light of class discussions. Read, discuss with your study partner, and together work on Chapter 3, including all end-of-chapter material and application exercises.

  3. Review of previous topics, discussion of questions, additional clarifications. Assignment: Complete and review any previously assigned work that you suspended because of open questions. Review all work to date in the light of class discussions. Read, discuss with your study partner, and together work on Chapter 4, including all end-of-chapter material and application exercises.

    Notes from class discussion for Chapter 3:

  4. Review of previous topics, discussion of questions, additional clarifications. Assignment: Complete and review any previously assigned work that you suspended because of open questions. Review all work to date in the light of class discussions. Read, discuss with your study partner, and together work on Chapters 5 and 6, including all end-of-chapter material and application exercises.

    Notes on class discussion of Chapter 4:

    • The textbooks' coverage of relational database management systems, and of enterprise resource planning technologies, is largely accurate. However, the work of an organization's Chief Information Officer (and of the sub-organizations that report to the CIO) no longer requires, except for legacy systems, a familiarity with the hardware and software systems involved in the provision of database and ERP to the enterprise. As of 2013, it is invariably more cost-effective to obtain database and ERP services from vendors "in the Cloud" (meaning services obtained without regard for the specifics of the systems providing those services.) Cloud service providers such as IBM, Amazon, Oracle, SAP, and others, provision cloud services, and (optionally) interfaces between their cloud services and legacy internal services, either directly or through local and industry-specific resellers.

  5. Review of previous topics, discussion of questions, additional clarifications. Assignment: Complete and review any previously assigned work that you suspended because of open questions. Review all work to date in the light of class discussions. Read, discuss with your study partner, and together work on Chapter 7, including all end-of-chapter material and application exercises.

    Notes on class discussion of Chaptes 5-6:

    • The discussion of business processes omits one of the most important insights learned in recent years: Information service development is not a separate activity, but a part of the development of business processes. The methodology of business process development should be applied to each business process as a whole. Which steps in a business process are to be automated, and how, is a detail that must not be frozen in advance. To try to develop an "Information Service" - rather than to develop a business process that might or might not use one or more information services - is a fundamental error. The textbook perpetuates this error by discussing business process development in Chapter 5, separately from its discussion of "Information System" - today, Information Service - development in Chapter 12.

    • The methodology of developing business processes (and of developing Information Services and, earlier, "Information Systems") has evolved through 3 historical stages:

      (1) Industrial engineering: Also known as "Fordism," this was the first systematic (as opposed to ad hoc) methodology of business method development. It applied the discipline of "engineering" - that is, of mathematical analysis, followed by design, implementation, deployment, and maintenance - to the improvement of business ("industrial") processes. As applied to software, this was called the "software development life-cycle" (SDLC) or, after it started to be depracated for lack of feedback from real-life testing, the "Waterfall Model." Industrial Engineering was successfully applied to manufacturing and distribution processes, and university programs in Industrial Engineering still train experts in these specialized kinds of business processes. In other business areas, "Industrial Engineering," including SDLC in software development, resulted in success less than 40% of the time. As a legacy of this phase, systematic re-development to replace ad-hoc business processes is still called "re-engineering."

      (2) Process Quality Assurance. An extension of statistical quality assurance methodologies originally developed in publis health and in agriculture, statistical methodologies for business process improvement de-emphasized systematic analysis and design, replacing them with the results of statistical testing. In place of analysis and design, business processes were to be improved "intuitively," but with statistical controls to assure that changes improved the results. Much of the terminology used in the textbook, such as "Six Sigma," meaning an improvement of six standard reviations above random, dates from this phase.

      Since automated computations are deterministic rather than random, the replacement of systematic analysis with ad-hoc "intutive" coding was accompanied, in software development methodologies, by strict enforcement of test plans. The development of an information system was considered successful if the code produced the results that were specified in the prior test plan. However, software coders found that they could easily achieve "success" by writing a quick and crude prototype before the test plan was due, and including the results produced by the prototype as test cases in the plan. When the prototype was buggy, the buggy results from the prototype were frozen into the product - it was easier to code the test plan cases into a software product than to change the test cases. Thus, defects were frozen into products to meet "Six Sigma Quality Targets." For example, a Solaris library for computing trigonometric functions was generally very exact - but gave incorrect results, for a small number of specific input values, that came from test cases in a test plan based on a quick-and-buggy prototype. And at one point, I fixed an error in the billing software for a Dimension telephone switch - and testers insisted that the defect be put back into the code, since the incorrect result had been frosen into the test plan. As more and more such frozen defects were discovered by users, the once promising "Six Sigma" methodolgy faded.

      (3) Spiral Development. In spiral development, a business process, or an information service supporting a business process, is developed with successive cycles of analysis, specification, design, implementation, and testing. Systematic analysis, specification and design assure a documented (the specification is often in the form of user documentation,) rationally understandable (and thus maintainable) process. However, the analyses, specifications and designs are never "frozen" or final. If the results of the testing phase show that some aspects of the analyses, specifications, design or implementation need to be changed, they are changed in the next cycle of the spiral.

      In spiral development, the target business process is first decomposed into a core functionality, and a set of additional feature sets that can be added to the core functionality, one feature set at a time. The process development team works through several "minor cycles" of the development spiral with a single tester. When the development of the core functionality, or of an add-on feature set, after several minor cycles has been completely successful when tested by the single tester, it is tested again with a whole organization (or, in the case of an externally marketed process, product or service, with several testers or organizations.) A successful test with the "targeted customers," internal or external, completes a "major cycle" of the development spiral.

      The tester who works with the development team is delegated to the development team by the organization for which the business process is being developed. Experienced development teams sometimes have a trained observer - often a social anthropologist - whose role, in addition to observations that provide an empirical foundation for analyses, includes identifying a prospective tester for delegation to the development team. Ideally, the delegated tester is a "resource person" (sometimes informally called a "shaman") whom co-workers have been observed consulting about business process problems. Through helping others, the "resource person" becomes familiar with the many business process contingencies that may arise in a real business process. When a process that includes a service or product is being developed for external sale, the tester is often an expert in the targeted business. In the development of consumer services, the best tester may be a cognitive or social psychologist.

    • Although the "hands-on" exercises for Chapters 6-8 involve the default interfaces of the various SAP services, these default interfaces are very wasteful of valuable (remember the loading factor) employee time, and are almost never used in any business that can buy or develop more specialized, time-saving employee-facing interfaces for their SAP or other information services. Because they are simple, these specialized employee-facing interfaces, usually in-browser applications for stationary workers and mobile device applications for mobile workers, can be readily used without special knowledge or skills. For example, an employee taking an inventory of specialized machinery does not need to learn to identify each machine. It is enough to be able to snap a smartphone picture of its label or bar code.

      Because just 4 businesses - SAP, IBM, Oracle and Amazon - account for most of the ERP services used by North American business, most resources can be tracked with interfaces to ERP systems of an enterprise's suppliers and customers. This minimizes the costs of data entry, and the risk of errors. The default interfaces are not used, except as an emergency option in case of network or service downtime.

  6. Midterm Exam (on Lessons 1-5 above)

  7. Review of previous topics, discussion of questions, additional clarifications. Assignment: Complete and review any previously assigned work that you suspended because of open questions. Review all work to date in the light of class discussions. Read, discuss with your study partner, and together work on Chapter 8, including all end-of-chapter material and application exercises.

    Chapter 7 class discussion: Follow-up on information service integration between the business and its suppliers (see note for Chapter 6 above.)

  8. Review of previous topics, discussion of questions, additional clarifications. Assignment: Complete and review any previously assigned work that you suspended because of open questions. Review all work to date in the light of class discussions. Read, discuss with your study partner, and together work on Chapters 9 and 10, including all end-of-chapter material and application exercises.

    Chapter 8 class discussion: Follow-up on information service integration between the business and its customers (see note for Chapter 6 above.)

    • Customer-facing interfaces to information services (the "e-commerce" web sites and mobile apps) are normally procured through turn-key contracts, where the information-service provider does everything but "turn on the key." Amazon is the largest supplier of customer-facing e-commerce interfaces under turn-key contracts. An innovative or highly specialized business may need to develop its own customer-facing interfaces, as part of new business process development. As of 2013, this is normally done with the spiral-development methodology discussed above.

  9. Review of previous topics, discussion of questions, additional clarifications. Assignment: Complete and review any previously assigned work that you suspended because of open questions. Review all work to date in the light of class discussions. Read, discuss with your study partner, and together work on Chapters 11 and 12, including all end-of-chapter material and application exercises.

    Class discussion preview for chapters 9 and 10:

    • Of the two current models of collaboration on projects, the committee/team model and the ownership/delegation model, the textbook only discusses the committee/team model. This is unfortunate, because the ownership/delegation model, pioneered by Linus Torvalds, has been in use since 1991; it has proven faster and sounder for most projects, and is now dominant.

      The historical comparison between these two models of collaboration begins in 1983, when Richard Stallman's GNU Project began the development of open-source, GNU-Public-License replacement packages for the components of prior UNIX systems. Most GNU modules were developed by individuals, with little need for formal collaboration. The exception was the kernel (the core component) of the operating system: because the kernel was complex, and required interfaces with many other modules, it required wide-ranging collaboration. This collaboration was (and at GNU still is) carried out using the traditional committee/team model.

      The first attempt to build a GNU kernel began in 1983, and ended in 1986 when the GNU kernel committee/team discussions on the architecture of the GNU kernel stalled in deadlock. According to Wikipedia, in 1987 Richard Stallman proposed to use the Mach microkernel developed at Carnegie Mellon University. Work on this was delayed for three years due to uncertainty over whether CMU would release the Mach code under a suitable license. The GNU kernel team re-started the committee/team collaborative effort in 1990, under project name "Hurd."

      In 1991, Finnish computer science student Linus Torvalds decided to develop an alternative (later GPL-licensed) kernel, using a spiral development methodology and a novel ("ownership/delegation") model of collaboration. In the ownership/delegation model, decisions are made by an invididual who is said to "own" the project. The "owner" may delegate responsibility for components of the project to others, but still has the authority to make final decisions in case of disagreement among the collaborators, and to revoke delegations. In projects governed by GPL, the source code of all components is publicly available. In case of disagreement with the owner, other collaborators are free to "fork" the project under GPL, but this is rare (the best known instance is the "forking" of LibreOffice from the OpenOffice project.)

      Linus Torvalds' kernel project, now called Linux, completed the first major cycle of spiral development and released a kernel with core functionality in less than 6 months. The first complete, stable version of the Linux kernel was released in 1994, just 3 years after the start of development.

      In contrast, the development of the GNU Hurd kernel, started in 1990 (before Linus Torvalds started the development of Linux in 1991) frequently stalled while disagreements among team members were being resolved in committee meetings. The development of the core functionality of Hurd took until 2002 (12 years, compared with 6 months for Linux.) A stable version of GNU Hurd is not available as of 2013, 23 years after the start of the Hurd committee/team collaboration.

      Soon after the release of the first stable version of Linux in 1993, the use of Linus Torvalds' ownership/delegation model of collaboration spread to collaborative development of business processes, as well as information systems and information services. Collaboration features supporting the ownership/delegation model are available for e-mail (list services,) web (automatic indexing,) Wikis, and content-sharing services (most recently Dropbox.) In contrast, the committee/team model of collaboration is now rarely used, except in government agencies and in very conservative enterprises.

    • Social media services are evolving rapidly. Social media service enterprises are highly competitive, and often pursue a strategy of "claiming" a population of users with a specific cognitive style, by providing a user interface suited to the cognitive style of this population. For example, I find Facebook's user interface to be very well-suited to my own cognitive style, but I know several brilliant intellectuals who find that they cannot use Facebook effectively. On the other hand, I find the user interfaces of Google Groups, LinkedIn, and Twitter uncongenial, but each has enthusiastic devotees.

      In the longer term, the effects of individual differences in cognitve style are aggravated by by the forming and "overlearning" of idiosyncratic habits based on different user interface styles. The automatic carrying-over of habits learned in an incompatible environment (in psychology this is called "proactive interference") can be anti-productive and even destructive.

      We know, from the history of other information services (such as web search services) that information service providers eventually learn to provide ways to customize one's user interface, to accomodate (or at least not interfere with) one's individual cognitive style and overlearned habits. Today, however, we are still months (perhaps even years) before "social media" services follow suit. In the meantime, an organization whose people have diverse cognitve sytles and varied overlearned habits - as is almost always the case - would be prudent not to require the use of any one specific social media service, until the user interfaces of social media services become adequately customizable. In the meantime, collaboration can be supported with mailing lists, wikis, automatically indexed web sites, and content-sharing services.

  10. Final review of the course, including all previous topics, discussion of questions, additional clarifications.

Conceptual Hierarchy:

To use information resources effectively, you should be familiar with the essential concepts of their use. The indentation of concept and principle links corresponds to their places in a conceptual hierarchy. Because many concepts have multiple inheritance, this hierarchy is convenient but not unique. When you find yourself needing to know more, during or after this course, use the links below first. As with all other components of this course, please share the links that you follow, and discuss them, with your study partner; remaining questions should be e-mailed to me.

  1. Communication Language Natural Lexeme Syntax Parsing Parse Tree Semantics Artificial Machine Code Source Code Protocol Semiotics Symbol Act
  2. Measurement Comparison Number Integer Base (section "In numeral systems") Modular Arithmetic (top section only) Ratio Real Precision Floating Point Vector Categorization (also called "nominal measurement") Data Information (sections whose titles start with "As...") Knowledge Visualization
  3. Logic (Top and "Nature of Logic") Induction (First 3 paragraphs) Concept (except appendixes) Measurement-Omission (included above) Deduction Syllogism (Top two sections) Operation (Top two sections) Not (Top 3 sections) And (Top 3 sections) Or (Top 3 sections) Exclusive Or (Top 3 sections,) XOR Devices (Top two sections) Gate Circuit (included above) Filp-Flop (Top section) Half-Adder [top (S) is an XOR gate] Adder
  4. Production (Entries 1 and 4) Individual Ethics ("Life, Purpose, and Happiness," p. 22) Rationality (Second entry) Honesty (Entry 4) Values (Second entry) Creation Accumulate, Accumulation Storage Management Self-management (First meaning) Process Flowchart Action Decision Decision Support System Resource (Top section only) Planning Optimization Linear Programming (Top 3 sections) PERT Chart (Top 4 sections) Enterprise Resource Planning (Top 6 sections)
  5. Society (Review p. 22; top half of p. 23) Rights (included above) Life (top entry) Liberty (third entry) Property (fourth entry) Physical (included above) Intellectual Secrets Patents Copyrights Trademarks Privacy Social Ethics (included in "Society," above) Mutuality (included in "Society," above) Harmony of Interests (rest of p.23 and top 2/3 of p.24) Justice (top section) Trade Contract Transaction Accounting Double Entry Bookkeeping Transaction Processing Market Competition Auction Pricing Customer Relationship Management Supply Chain Cooperation (top entry only) Contractual Organizations Enterprise Proprietary Partnership Corporation Cooperative Institution Membership Trust License Open-Source, GPL Informal Collaboration Crime (see also) Theft Extortion Destruction Denial of Service Fraud (see also) Impersonation Man in the Middle Countermeasures, aka Security Data Integrity Checksum/Digest Firewall Cryptography Symmetrical Public-Key Session Digital Signature Infrastructure Certificate Steganography Authentication Password/Passphrase Biometrics Audit Trail/Logging Ownership Trust Access Control Government (top 2 entries only) Law Legislation (top section only) Precedent Regulation Enforcement
  6. Automation Pre-Computational (included above) Codex Printing Weaving Factories Railways Telegraphy Computing History Logic Gate Technology Software Machine Language Assembly Language Compiler Interpreter Applications Stand-Alone (linked section only) Operating System Pipeline Bulding Blocks Artificial Intelligence Pattern Recognition Transforms Normalization Genetic Algorithms Neural Networks Expert Systems Applications of Artificial Intelligence Agents Pen/speech input Conversational interfaces Simulation Data mining Web Search
  7. Contextuality System Component Interface Modularity (First two sections) Stack Emergence Ship of Theseus (UNIX) Design Principle Reuse Programming Languages Procedural Function Recursion Object-Oriented Attribute Method Inheritance Multiple Inheritance Interface Information Hiding Access Snippets Libraries Processes Integrated Development Environments Platform Database Application Programming Interface Operating System Application Architecture Stand-Alone Host-Terminal Client-Server Peer-to-peer,Cloud World-Wide Web Modeling Ontology Object-Orientation (see Object-Oriented, above) UML Multi-Contextuality Ubiquity
  8. Integration Inter-process Protocol Standards Human-Computer Physical Screen Resolution Color Touch Keyboard Pointer Mouse Trackball Touch pad Joystick Command Graphical Dashboard Affordance Information Technology Architecture Infrastructure Network Service Enterprise