detailed contents - macmillanihe.com · e-procurement systems 107 advantages and disadvantages of...

28
iv DETAILED CONTENTS List of Figures xi List of Case Studies xiv Author’s Acknowledgements xv Publisher’s Acknowledgements xvi Preface xvii Managing Information Systems in the 21st Century Videos xxii Tour of the Book xxiii Part I Enterprise Information Systems 01 1 Information Systems 02 Summary 02 Learning Outcomes 03 Key Terms 03 Information Systems 03 Information Systems and organizations 04 Supermarket case study 07 EPOS systems 07 e-Shop 11 Regional warehouse 13 Replenishment 14 Loyalty cards 15 e supermarket IS/IT infrastructure 17 Comprehension Test 18 Exercises 18 2 e IS Business Environment 20 Summary 20 Learning Outcomes 20 Key Terms 21 Business functions 21 e IS Business Model 26 Operations 27 Support functions 27 Management 29 Copyrightedmaterial - 9780230370500 Copyrightedmaterial - 9780230370500

Upload: hoangtruc

Post on 27-Apr-2018

217 views

Category:

Documents


2 download

TRANSCRIPT

iv

DETAILED CONTENTS

List of Figures xi

List of Case Studies xiv

Author’s Acknowledgements xv

Publisher’s Acknowledgements xvi

Preface xvii

Managing Information Systems in the 21st Century Videos xxii

Tour of the Book xxiii

Part I Enterprise Information Systems 01

1 Information Systems 02Summary 02Learning Outcomes 03Key Terms 03Information Systems 03Information Systems and organizations 04Supermarket case study 07

EPOS systems 07e-Shop 11Regional warehouse 13Replenishment 14Loyalty cards 15Th e supermarket IS/IT infrastructure 17

Comprehension Test 18Exercises 18

2 Th e IS Business Environment 20Summary 20Learning Outcomes 20Key Terms 21Business functions 21Th e IS Business Model 26

Operations 27Support functions 27Management 29

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

vDetailed Contents

Environment 31IS/IT infrastructure 32

Further Reading 33Comprehension Test 34Exercises 35

3 IS Organization and Management 36Summary 36

Learning Outcomes 36

Key Terms 36

Th e IS function within an organization 37

Th e IS department 38

Projects 40

Project management 42

Outsourcing 43

Further Reading 46

Comprehension Test 47

Exercises 48

Part 2 Information Systems in Business 49

4 Corporate Systems 50Summary 50

Learning Outcomes 50

Key Terms 51

Corporate systems 51

Payroll 52Payroll standing data 52Payroll calculation 54Payment and reporting 55

Order processing 57Order processing – standing data 58Process customer order 61Process replenishment order 65e-Order processing 67Order processing – management information 69Order processing – data structures 70

ERP systems 71

Further Reading 73

Comprehension Test 73

Exercises 75

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

vi Detailed Contents

5 e-Business Systems 76Summary 76Learning Outcomes 77Key Terms 77e-Commerce/e-Business 77

e-Commerce technologies 78Th e trade cycle 79

EDI systems 81EDI defi nition 81Implementing EDI 88Advantages and disadvantages of EDI 91

i-Commerce (e-Shop) 92Th e e-Shop trade cycle 93Shopbots 98m-Commerce 99Web 2.0 100Th e e-Shop as an IS 101e-Shop market changes 102

e-Markets 104Electronic markets 105Usage of e-Markets 106e-Procurement systems 107Advantages and disadvantages of e-Markets 107Future of e-Markets 108

Further Reading 109Comprehension Test 110Exercises 112

Part 3 Computer Systems 113

6 Computers and Information Technology 114Summary 114

Learning Outcomes 114

Key Terms 115

Information Technology 115

Th e development of IT 115

IT equipment 118

Technology 126

Th e IT infrastructure 130

Further Reading 130

Comprehension Test 131

Exercises 131

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

viiDetailed Contents

7 Data and Information 133Summary 133Learning Outcomes 133Key Terms 133Data in and information out 134Data capture 134

Data capture technology 135Data entry 140Human–computer interaction (HCI) 144

Management information 145Levels of decision-making 146Structured and unstructured decisions 147Management information reports 149

MIS, EIS, DSS and data-mining 156Information and operations 157Further Reading 159Comprehension Test 159Exercises 160

8 Files and Databases 163Summary 163Learning Outcomes 163Key Terms 163Data storage 164Databases 165

Data structure 166Relational databases 167Example database 169SQL 171

Data structures and processing effi ciency 172Other database paradigms 177Further Reading 179Comprehension Test 179Exercises 180

9 Networks and Computer Security 181Summary 181Learning Outcomes 181Key Terms 181Networks 182

Th e network connection 184Protocol 185Network equipment 187Example network 188Th e internet 190

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

viii Detailed Contents

Computer security 192Physical security 193Data security 193Encryption 194Access control 194Network security 195Process protection 196Malware 196Cyber warfare 198

Further Reading 199Comprehension Test 200Exercises 201

Part 4 System Analysis and Design 203

10 Th e System Development Lifecycle 204Summary 204Learning Outcomes 204Key Terms 205System development lifecycle 205Iterative lifecycles 211Methodologies 214

Structured system analysis and design 215DSDM 218Object-oriented analysis and design 220Agile development 222Socio-technical system analysis and design 223

Further Reading 225Comprehension Test 226Exercises 226

11 System Analysis and Design Toolbox 227Summary 227Learning Outcomes 227Key Terms 228System analysis and design 228User requirements and use cases 230Data fl ow diagram (DFD) 236Entity relationship diagram (ERD) 241

ERD additional features 247Sequence diagram 250Class diagram 254Other SA&D documentation 259

State diagram 259

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

ixDetailed Contents

Relational data analysis 260Jackson structures 262

Further Reading 263Comprehension Test 263Exercises 267

12 Implementing the Information Systems 272Summary 272Learning Outcomes 272Key Terms 272Implementing the Information Systems 273Project planning 273

PERT 273Gantt chart 275

Programming 276Testing 279Implementation 281

Project failures 282Maintenance 284Further Reading 286Comprehension Test 286Exercises 287

Part 5 Information Systems and Society 289

13 Computing, the Law and the Environment 290Summary 290Learning Outcomes 290Key Terms 291Computing and the law 291

Computer Misuse Act 294Data Protection Act 296

Green computing 300Environmental issues 301Environmental solutions 303

Further Reading 304Comprehension Test 304Exercises 305

14 Th e Information Society 306Summary 306Learning Outcomes 306Key Terms 307Th e Information Society 307

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

x Detailed Contents

Work in the Information Society 308Social interaction in the Information Society 310Automated systems 312e-Government 313Civil liberties 316

Th e IT profession 318Careers in IS 320Further Reading 321Comprehension Test 322Exercises 323

Glossary 324

Bibliography 354

Index 358

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

2

1 INFORMATION SYSTEMS

Summary An Information System (IS) is defi ned as a business application of the computer. Informa-tion Systems are an essential part of the infrastructure of an organization.

Organizations have a central operational function: this could be maintaining bank accounts, selling groceries or making cars. Such complex operations are supported by equally complex IS, and these are mission-critical: if the IS fails, the company has to suspend its central operations. Th e organization also has many support functions, for example marketing and accounts – these too will be making use of IS.

Th e nature of IS and the essential role of IS in the organization is examined in the fi rst part of this chapter. Th e second part of the chapter is an extended case study of the application of Information Systems in a large supermarket chain. Th e customer-facing end of the setup is the electronic point of sale (EPOS) system. Th e EPOS system not only adds up the bill but processes multibuys, card payments and loyalty cards. EPOS data then feeds into the regional warehouse and stock control functions. Th e super-market branch needs to have the required stock at the right time, and it is the stock control IS that makes it happen. Th e regional warehouse also needs to have the right amount of stock. Replenishing the warehouse is an IS function and ordering from suppliers is done automatically using electronic data interchange (EDI) links. Th e supply chain is IS-controlled throughout, ensuring just-in-time availability.

Supermarkets’ IS provision has enabled the introduction of online shopping – the e-Shop. Supermarkets can piggy-back their e-Shop services on their existing supply

chain infrastructure in a bricks-and-clicks operation. Th e exception to this is Ocado, who compete using a pure-play e-Shop model. Th e IS provi-sion at the supermarket also encompasses the loyalty card scheme. Th is is a major source of marketing and management information. Each purchase by each loyalty card member is recorded and can be analysed for patterns that are fed back into marketing, store organization and merchandizing.

Important themes in IS include security, outsourcing and competitive advantages. Th ese

Source: Corbis

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

points are noted in this chapter and will be among the themes that will be highlighted throughout the rest of the book.

Learning outcomes Having read this chapter and completed the exercises, you should:

● Know what is meant by the term Information System ● Appreciate that large organizations are crucially dependent on their Information Systems for all aspects of their operations

● Understand that organizations have one Information System (or a small number of Information Systems) that are central to their operations

● Understand that IS is needed for support functions within the organization ● Understand the concept of linking the IS in partnering organizations, a structure known as an Inter-Organizational Information System (IOS).

Key terms Information System (IS), Inter-Organizational Information System (IOS), electronic point of sale (EPOS), e-Shop, bricks-and-clicks, supply chain, just-in-time, replenish-ment, stock control.

Information Systems

Information Systems (IS) are an essential part of the infrastructure of every business and organization. Many organizations are totally dependent on their IS – if the IS closes down, so does the organization. Consider banks. We could think of a bank as an imposing building in the high street (or as an institution where potentially risky investment decisions are made). However, the bank can also be thought of as a computer system:

Our bank accounts are, essentially, simply entries in an IS. We can access these accounts electronically via the web or using a cash machine. Payments to other accounts are simply debits from one electronic record and a match-ing credit to a second electronic record in the same, or another, IS. If we do venture into a branch then any transaction still works through the IS but with the bank clerk operating the system. The investment arm of the bank is similarly dependent on IS, since records of stocks and shares and the transac-tions concerning those fi nancial instruments are equally entries in an IS (or series of networked IS).

The bank system outlined above is complex and very expensive to create and maintain. It is essential to the operation of the business and if it fails the busi-ness (and other businesses that are linked to its systems) ceases to operate until the system is back in operation.

These massive IS in large organizations are one end of a spectrum. In the middle of the spectrum are the main systems of smaller organizations and

Information System (IS): a business appli cation of a computer.

Information Systems 3

1

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

4 Enterprise Information Systems

secondary systems and departmental systems in large organizations. At the far end of the spectrum are PC systems, possibly using packages such as Microsoft Offi ce, that can also be classifi ed as IS.

Many of these systems are networked. They may well have links to other systems and/or with customers and suppliers. The electronic integration of operations across organizations creates an Inter-Organizational Information

System (IOS). Electronic access for customers is provided by e-Commerce systems. Electronic integration along the supply chain from, for example, suppliers, to manufacturers, retailers and ultimately to the customer, is an example of networking and an IOS.

Computer networks have merged with mobile networks and customers’ access to e-Commerce systems anytime and anywhere. The smartphone is, in effect, a mobile computer and is also used to access e-Mail, the web and social networking applications.

As academics and students, we are likely to have experience of smartphone apps, small PC systems and the user interface of online systems. The study of IS includes such small systems, but it is also essential that we understand and appreciate:

● The nature and architecture of corporate IS ● How a corporate IS is essential to the operations of the organization ● The security and resilience requirements of the IS infrastructure ● How IS is designed and developed ● The impact of IS on society.

All (except the fourth) of these points are illustrated in the extended case study of supermarket IS at the end of this chapter.

Information Systems and organizations

An Information System is a broad categorization. The term does not mean quite what it would seem to imply. The defi nition we gave above was:

An Information System is a business application of the computer.

An Information System, or a Management Information System (MIS) which is the North American term, is not just about providing information but also about processing business transactions. The IS has a business transaction processing (TP) function as well as being a source of management informa-tion. The anatomy of the Information System includes:

● Data capture: The fi rst task is to get data into the IS effi ciently and accurately. Data can be sourced from within the organization, from trading partners or members of the public (often using the internet to facilitate direct data input).

● Processing: The computer programs that together make up the system. It is the job of the IS specialist to defi ne and design the processing requirement.

● Data storage: The IS has to remember; and its memory is its fi les and database. Stored data can be conceptualized as standing data, such as a fi le of custom-ers, and transaction data, such as the customer orders that are passed through the system.

Inter-Organizational Information System (IOS): Information System in separate organizations that are closely coupled and eff ectively work as a single IS.

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

Information Systems 5

● Transaction output: Business documents that are output by the system, such as an invoice.

● Management information: Analysis of the business transacted and its fi nancial implications; used to empower manage-ment in decision-making and strategy formulation.

● Information Technology (IT): The comput-ers and servers used to run the IS and host the database, the networks that link the system to the users and the desktop, laptop or mobile devices employed by those users.

● People: The IS/IT specialists who design, create and maintain the system and all the other stakeholders who interact with that IS.

The dual role of transaction processing and management information, and the elements that make up the IS, are brought out in the following examples of commonly used IS:

● Payroll: This system starts with details of employees and their rates of pay and processes these transactions, together with the employee’s payroll history, to produce bank transfers, payslips and so on. The system also provides management information on, for example, the payroll cost of staff in the various departments within the organization (see Chapter 4 for an extended study of a payroll system).

● Order processing: The main input is the customer order, which is processed, using customer and product data, to produce delivery note and invoice transactions. In addition to processing the business transactions the system can produce a wealth of management information on what is selling, who is buying and the overall sales totals for each month and year (see Chapter 4 for an extended study of an order processing system).

Most organizations have one IS (or a small number of IS) that are central to their operations. Examples of such organizations are:

● An insurance company with its policy records, renewals and claims process-ing system

● A manufacturing company with materials requirement planning (MRP) and production control systems

● A college or university with its student registration and records system.

In addition to these central systems, on which the operations of the organi-zation depend, there are a number of further systems for functions such as marketing, accounts and the customer complaints department.

The central business systems of the organization are supported by an extensive IT infrastructure. Many organizations are totally dependent on their IS and IT infrastructure – the banks, airlines, insurance companies and large multiple retailers are good examples of such dependence. The central systems

© jamdesign/Fotolia

1

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

6 Enterprise Information Systems

of these organizations are mission-critical, and in these organizations most or all employees will be interfacing with the core Information System. In the supermarket for example:

EPOS reads the barcodes, looks up the prices of the merchandise and calcu-lates the customer bill. As each item is checked through the EPOS system, the sales are totalled and that total is then taken from the store’s stock total to calculate the replenishment requirement for each product sold. The stock replenishment system then comes into operation to order a delivery from the regional warehouse to the store and, after further calculation, electronic orders are sent to the suppliers for stock to be delivered to the warehouse. Details of all transactions are stored and analysed to derive accounts, marketing and management information.

A large supermarket chain concerned with ensuring good stock availability with minimum stock holding requires a very large and sophisticated IS. The system consists of EPOS terminals and back offi ce servers in the stores, ware-house systems in the regional warehouses and, in all probability, a large data centre at a head offi ce site. The supermarket’s IS will be linked to its suppli-ers’ order processing IS, thus creating an IOS. The overall system is illustrated in Figure 1.1. It costs a large sum of money, and many years of effort will have gone into building and fi ne-tuning it. The supermarket cannot operate without the system: if, for example, the EPOS infrastructure breaks down, the store has to close its doors (and that occasionally does happen, despite the efforts of the organization to make their systems resilient). There is an extended case study of IS in supermarkets in the second part of this chapter.

EPOS

EPOS

EPOS

Server

Store

EPOS

EPOS

EPOS

Server

Store

EPOS

EPOS

EPOS

Server

Store

Datacentre

Headoffice

Server

Regionalwarehouse

Order IS

Supplier

Order IS

Supplier

Order IS

Supplier

Server

Regionalwarehouse

Figure 1.1 Supermarket chain – IT infrastructure.

Not all systems are large and a system’s operation is not necessarily critical to the organization. For example, colleges and universities have their own Information Systems, but these do not, in general, greatly impinge on the

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

Information Systems 7

day-to-day function of teaching and learning – the classes can still go ahead even if the student registration and record system is not available.

Supermarket case study

Supermarkets are totally reliant on their own IS and those of their partner organizations. When the IS is not operating effectively the supermarket is in trouble. If the IS fails in crucial areas, the supermarket has to close down. This section is a generic case study of the IS/IT infrastructure of a (any) supermar-ket. The study contains the following subsections:

● EPOS systems ● e-Shop ● Regional warehouse ● Replenishment ● Loyalty card.

Within the generic case study there are a number of real case studies that further illustrate the overall use of IS in the supermarkets.

EPOS systemsIn the supermarket we are left to select our own goods from the shelves. Once we have fi lled up our basket, trolley or cart we take it to the checkout. The checkout is an electronic point of sale (EPOS) system. These systems are PC-based (and you can sometimes see the Windows screen or a Windows error when they are not operational). Their basic function is to scan the barcode (see the Barcodes explanation box) on each of the products that the customer is buying. The barcode does no more than identify the product being purchased, but that identifi cation links to a wealth of information held in the EPOS system and feeds into the stock control and replenishment systems.

electronic point of sale (EPOS): a computerized shop checkout system that will typically read a barcode, look up prices, record the sale and total the customer’s bill.

Th e retail barcode is a machine readable article

number/product code (the number is printed below the barcode) authorized and issued by the Article Numbering Association (ANA). Th e standard EAN article number is 13 characters long (EAN-13) and the alternative UPC, used in the US, is 12 characters.

EAN once stood for European Article Number but is now referred to as the International Article Number (but the acronym has not been changed). UPC stands for

Explanation

Barcodes

Source: Photoalto

1

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

8 Enterprise Information Systems

Universal Product Code (but only has a one digit country code and hence has limited applicability). Th e format of the EAN-13 is:

● Country code (2 characters), e.g. 50 for the UK ● Manufacturer code (5 characters) ● Product code (5 characters) ● Check digit.

A company needing to barcode its products will apply for its own manufacturer code (within the country code it will be using). Once that is obtained it can then allocate each product its own article number. Th e check digit is a 10s complement and is used to check that the barcode has been correctly read (the EPOS system bleeps to warn of a misread or invalid barcode).

For the 10s complement check digit, each digit in the article number is multiplied by, alternatively 1 and 3 (the rightmost digit is always multiplied by 3) and the resultant products are added up. So, for the EAN product code (from a book of fi rst-class stamps):

50 ∣ 14721 ∣ 11228 ∣ 2

We get:

5�1�0�3�1�1�4�3�7�1�2�3�1�1�1�3�1�1�2�3�2�1�8�3�68.

68 modulo 10 is 8. Th e check digit is 10�8�2.

Th e barcode is calculated when the number is allocated and then checked each time the barcode is swiped.Th ere are other variants of the product barcode, such as the UPC-12 and the EAN-8. Th e ISBN book

identifi cation number is also represented as an EAN-13 barcode on a book. Th e article number system is an example of the way trade sectors have to cooperate to enable inter-organizational IS to operate eff ectively.

Barcodes are used for a number of purposes other than product identifi cation. Delivery services use barcodes to track packets, and your student card may well have a barcode representing your student number. Th e use of the barcode for data capture is further examined in Chapter 7.

Th ere are also a number of 2D (two dimensional) barcode systems. Th e 2D barcode is standard on airline boarding cards. Many smartphones can read 2D barcodes encoded to the quick response (QR) code standard. One use of these barcodes is to include them on adverts to provide a hyperlink to the company’s website.

The EPOS system holds a detailed list of information about each product. When the product is scanned the system uses this list to ensure that:

● The product name and price is displayed and printed on the receipt ● Any special offers (e.g. two for the price of one) can be calculated ● The customer’s total bill is calculated.

The EPOS system works well for standardized, pre-packaged items. The barcode is printed on the packaging when the product is made and there is no signifi cant extra cost involved. The system is less convenient for loose items, which either have to be weighed and barcoded by staff at (say) the deli counter or have to be weighed at the checkout.

The EPOS system also keeps the till total and processes card details:

● The cash taken is recorded, totalled and can be reconciled with the cash in the till at the end of a shift

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

Information Systems 9

● Card payments are processed. Card details are passed through the super-market’s network to its banking partner for authorization (which is another complex IOS)

● Loyalty cards are processed – we will look at loyalty cards in more detail later in the case study.

Finally, the EPOS system records all the products that have been sold. This data is used to calculate replenishment (restocking) requirements. The general principle is that there is a stock total for each product stocked in the branch. For each sale that is recorded through the EPOS system one item can be deducted from that stock total. When the stock total gets down to the reorder level, more stock can be ordered from the regional warehouse. We will look at restocking later in the case study.

The reliable operation of the EPOS system is crucial to the operations of the supermarket. If the EPOS system is not working the supermarket cannot open its doors. If the sales data is lost the stock control system will be put out of kilter, which will take days to correct. If the payments systems fail, people will not be able to pay without cash (and the majority of payments are made with credit or debit cards). So the EPOS system needs to be resilient (see the EPOS resilience explanation box).

Th e EPOS system consists of a number of EPOS terminals and a backoffi ce server.Th e fi rst vulnerability is improper use of the system. Staff have to log in to the system at the

beginning of each session on the checkout. Th is should ensure that only authorized staff use the checkout and that any improper practices can be traced back to the member of staff involved.

Th e EPOS system is also vulnerable to a system failure. Th e failure of one or more EPOS terminals is not necessarily an issue since a typical supermarket has a number of terminals installed. Th e failure of the server would cause problems – this can be tackled by having a backup server with duplex data and automatic switchover to the backup server should the primary server fail. Some EPOS terminals can also work in terminal offl ine mode using a terminal-based product fi le and log sales within their own memory (this would not cover card-based transactions that need to be checked over the network).

Th e EPOS system also needs to be secure against data loss. Th is is addressed by transaction logging in the terminal system and the holding of all data on the duplex servers (where installed). Providing a duplex copy of the product data on the terminal also reduces network traffi c.

Th e EPOS terminal processes card payment, and customer card data can be vulnerable whilst in the system. Visa (the credit/debit card issuer) identifi es the following as the top three security risks (Visa, 2006):

● Many EPOS systems include remote access for system maintenance and troubleshooting. Th ese can be exploited to gain unauthorized access to the EPOS system. Th e provision of a secure password (not the default) and appropriate encryption of transmissions within and to/from the system are examples of protection measures.

● Most EPOS systems consolidate payment data into a central repository that provides authorization functionality, data backup and management functionality for the system user (in our case the supermarket). Some EPOS systems keep a full copy of the card magnetic stripe (and sometimes pin/chip) data, which is unnecessary and adds to the vulnerability. An attack on the host can give access to payment-sensitive data and allow the data to be destroyed. To minimize risk the retained data must be restricted to the minimum

Explanation

EPOS resilience

1

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

10 Enterprise Information Systems

An alternative to the standard, staff-operated EPOS system is the self-service checkout. The basic principles are the same but it can save staff resources and customer queuing. An interesting feature of the self-service EPOS is that the bagging area weighs the products and cross-checks that with the weight recorded in the product database.

The product data on the EPOS system is downloaded from the systems at the supermarket’s data centre – this allows all products, prices and offers to be kept up to date in all the company’s stores. The sales data is uploaded to systems at the data centre and used for replenishment and management infor-mation. The network to the data centre will also be used to transfer payment and loyalty card data. Through these links the EPOS system becomes an integrated part of the supermarket’s IS/IT infrastructure. A supermarket EPOS network is shown diagrammatically in Figure 1.2.

required for payment processing and the host must be compliant with strict security standards (which are much greater than those applying to the stock control and management information parts of the supermarket’s system).

● Th e third risk is network security (with wireless networks being a particular area of vulnerability). Data needs to be encrypted, activity-logged and secure passwords must be used on all access points.

Th e supermarket’s IT infrastructure must be secure.

In this context security covers:

● Resilience: vital subsystems need (virtually) 100 per cent availability. Th is includes the EPOS server which can be duplexed with a provision for automatic failover. It is also vital that no EPOS data is lost; this data can also be duplexed within the system.

● Privacy: the supermarket handles customer information, including fi nancial data. Th is needs to be secured from unauthorized access (for reasons of privacy and to prevent fraudulent use).

● Financial control: the supermarket handles a lot of money, which has to be accounted for. Th e EPOS logon and till procedures provide an audit trail for till receipts.

Th emes

Security

EPOS

EPOS server Data centre

EPOS

EPOSFigure 1.2 Supermarket EPOS network.

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

Information Systems 11

e-ShopAn alternative to shopping at the supermarket is to buy groceries through the e-Shop online. Most UK supermarkets have added e-Commerce to their conventional retail operations by adopting the bricks-and-clicks model. Tesco is the market leader, with the neat catch phrase You shop, we drop. Also in the market are Sainsbury’s, Asda and Waitrose, with Morrisons predicted to join soon – out of the big six, that would leave just The Co-operative without an e-Shop, and since The Co-operative mainly operates in the convenience market sector, that may be the right choice for them. The other online supermarket is Ocado, which is pure-play – they operate from a purpose-built warehouse without any conventional retail operations: see the Ocado/Tesco case study.

bricks-and-clicks: a retail organization that sells through a conventional store (bricks) and an e-Shop (clicks).

e-Shop: an online shop – the website of an internet e-Commerce business.

Ocado e-Shop. Ocado was founded in 2000 and made its fi rst commercial deliveries in January 2002. Th e Ocado Group website (Ocado, 2011) states: Ocado

is the only dedicated online supermarket in the UK and the largest dedicated online supermarket by turnover in the world. Ocado off ers delivery of grocery products to customers centrally picked from a single, state-of-the-art, highly automated warehouse (the customer fulfi lment centre or CFC). Ocado sells more than 21,000 diff erent products, the majority of which are sourced through Waitrose, the leading quality UK supermarket.

Th e CFC is located in Hatfi eld. Th e single CFC is the hub of a hub-and-spoke network – there are currently some seven spokes. All orders are picked at the hub and then bulk delivered to the spoke depots – the home delivery vans are based in the spoke depots. Th e model is distinct from Ocado’s bricks-and-clicks competitors, which use branches for their fulfi lment. Th e CFC is, in many ways, equivalent to the conventional supermarket’s regional warehouse, where goods-in are direct from the suppliers but goods-out are the customer order as opposed to replenishment of a retail branch, hence cutting out one step in the supply chain. Th e concentration of all e-fulfi lment in one dedicated warehouse allows the extensive use of IT and automation (which would not be possible in a retail branch – Ocado claim that the setup is unique and the development of the facility requires a large, in-house IT team). A second CFC was opened in Tamworth at the end of 2012 (Wood, 2010) – the location is close to Hatfi eld, which probably refl ects Ocado’s (and Waitrose’s, its main supplier) concentration in the southern half of the UK.

Ocado started life as a private company but was fl oated in 2010. Since its fl oatation the share price has had a bumpy ride as investors evaluate its ability to compete with its larger bricks-and-clicks competitors. Concerns have included discounting from Tesco and increased online competition from Waitrose (Ocado’s primary supplier). Ocado made its fi rst quarterly profi t (a very small profi t) in 2011, but has yet to achieve a profi t over a full 12-month period.

Tesco e-Shop. Tesco dates itself back to 1919 when Jack Cohen fi rst opened his market stall in the East End of London. Tesco fi rst used the self-service model in 1956 and the label superstore in 1968 (Tesco, 2011). Tesco is the largest supermarket in the UK by some margin – its market share is just over 30% against just over 16% taken by Asda and Sainsbury’s (2011 fi gures).

Th e grocery e-Shop tesco.com was launched in 2000 and Tesco Direct, selling a very large range of non-grocery goods, was launched in 2006 (Tesco, 2011). For Tesco (and

Case study

Ocado/Tesco

1

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

358358

acceptance test 42, 209, 213, 280, 324access control 134, 193, 194–195, 324

password 195user-id 195

accounting 21, 23, 28, 59accumulator 324

see also registeractivity level 23

operations 23support functions 23

actor 231, 324ad hoc reports 153, 157, 324aggregation 324agile manifesto 222, 324agile software development 214, 218,

222–223, 324airfreight 302airline booking systems 77, 104, 106,

107algorithm 128, 174, 175, 194, 324alpha test 280, 324Amadeus 106Amazon 26, 69, 77, 94, 97, 100, 191,

324American Airlines (AA) 109analogue 184, 324analysis report 149–151, 154, 324Ancient History Library case study

246, 257AND gate 127, 324ANSI-X12 83, 93, 324Anthony’s triangle 146, 324

operational level 147, 149strategic level 146tactical level 146

Anti-Counterfeiting Trade Agreement (ACTA) 293

anti-virus software 196app 99, 101, 324Apple 116, 325application 121, 123, 124, 284, 325

bespoke 44package 42, 208, 276

application generator 165, 205, 208, 212, 215, 276, 325

application service provider (ASP) 124, 325

application software 115, 121, 284, 325

Arab Spring 318archive 57, 164, 325Ariba 106, 325arithmetic logic unit (ALU) 128, 325ARPAnet 190, 191, 325array processor 119, 325Article Numbering Association

(ANA) 7, 325artifi cial intelligence (AI) 325Asda 11, 16, 85Aspire 46association 325

class diagram 254entity relationship diagram

242–247use case diagram 231

Association for Computing Machinery (ACM) 319

attribute 325class diagram 254–257computer-aided software

engineering (CASE) 215entity relationship diagram 166,

242–248object-oriented system analysis

and design (OO-SA&D) 220

relational data analysis 260–261relational database 167–171

audit trail 10, 89, 90, 325authoritarian government 318automated system 312–313, 325automated teller machine (ATM) 27,

285, 325automatic recording device 135, 138,

325

Baby 115, 325Bachman diagram 177–178, 326backdoor 197, 326backoffi ce 326

e-Shop 13, 93, 101, 102, 195supermarket 6, 9, 12

backorder 59, 60, 63, 67, 70, 142, 152backup 9, 45, 70, 120, 194, 196, 285,

298, 327BACS 52, 55, 326Ballantine, Matt 311bandwidth 140, 182, 185, 187, 189,

326bank 119, 294, 312

e-Commerce 53, 93, 96example Information System 3operations 27

barcode 6, 7–8, 326data capture 135–136QR code 8, 94order processing 58, 64, 68, 69

base two 126–127, 326see also binary

basket 80, 95, 101, 326batch process 65, 172, 173benchmarking 326best practice 72, 326beta test 280, 324Betsy and the band case study 268Bezos, Jeff 97big bang implementation 209, 281,

326Big Brother 316, 326binary 126–127, 128, 184, 326biometric 137, 326BlackBerry service failure 285, 312black box test 280, 326blackmail 295block 173, 174, 175, 176, 177, 326bluetooth 185, 327bot 327

see also shopbotbotnet 197, 327bottom-up 43, 260, 327bricks-and-clicks 11, 12, 94, 97, 98,

327bricks-and-mortar 98, 327Brighton and Sussex University

Hospitals NHS Trust 300

INDEX

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

359Index 359

British Computer Society (BCS) 319see also Chartered Institute for IT

brought forward 55, 56, 327browser 93, 102, 122, 124, 142, 191,

327bureau 52, 81, 327business 3, 4, 21, 23, 25, 30, 37, 78,

327business analyst 38, 206, 320,

321, 327business environment 24, 29, 31–32,

327Business in Context Model (Needle)

23–24, 341business model

Business in Context Model (Needle) 23–24, 341

Information System (IS) Business Model (Th e) 26–33, 310

Porter’s Generic Value Chain 21–22, 343

business process re-engineering (BPR) 103, 327

business structure 30business study 327business system options 216,

217, 327business-to-business (b2b) 31, 327

electronic commerce (e-Commerce) 77–80, 191

electronic market (e-Market) 106e-Shop 93, 96

business-to-consumer (b2c) 31, 77, 78, 80, 93, 191, 327

byte 127, 187, 327

C 277, 327call centre 138, 309, 327Capgemini 46cardinality 242, 247, 328carry forward 55, 228cart 7, 13, 96, 328CATWOE 225, 328central processor unit (CPU) 119,

127, 328chartered engineer 319Chartered Institute for IT (BCS) 319,

320, 328associate member (AMBCS) 319chartered engineer (Ceng) 319

chartered IT professional (CITP) 319

fellow (FBCS) 319member (MBCS) 319

Checkland, Peter 223, 328checksum 186, 328chief information offi cer (CIO) 38,

315, 328chip 23, 116, 120, 127, 129, 135,

136–137, 328CICS 123, 328citizen-to-government (c2g) 315,

316, 328civil liberties 296, 316–318, 328civil monetary penalties (CMP) 299,

300class 251, 254, 255, 259, 328class diagram 221, 254–259, 328

computer-aided software engineering (CASE) 215

conventions used for an entity relationship diagram (ERD) 242, 247

from a sequence diagram 250method 251, 254, 255, 257, 340

click and collect 97, 328clickthrough 94, 95, 99, 328client 93, 118, 122, 124, 130, 141, 172,

328client-server system 93, 118, 122–123,

141, 185, 279, 328client side script 101, 141, 328climate change 303, 304cloud computing 117, 120, 124–126,

164, 183, 328coaxial cable 184Cobol 129, 277, 329Codd, Edgar 167, 329code of conduct 319, 329Colossus 115, 329communications technology

115, 183Community Earth System Model

(CESM) 304competitive advantage 16, 38, 61, 92,

206, 276, 329outsource 44, 45, 52

compiler 129, 215, 329composition 248, 329computer 115–117, 118–120, 329

computer-aided design (CAD) 27, 28, 329

computer-aided manufacture (CAM) 27, 329

computer-aided software engineering (CASE) 215, 329

computer breakdown 193computer cluster technology 119computer equipment lifecycle

301–303build 302design 301recycle 303ship 302use 302

Computer help desk case study 270Computer Misuse Act 294–296, 329computer security 188, 192–199,

329confi gure to order 104contact-less smart card 137context diagram 236, 237–238, 241

329contract 291, 292, 329

Data Protection Act (DPA) 298, 299

outsource 40, 44–46contract employment 321control systems 138, 199, 280, 312,

313control unit 128, 129, 329conventional fi le 165, 175, 329conventional machine 116, 329cookie 101, 330copper wire 184, 330copyright 292, 293, 330

wars 293Copyright, Designs and Patents Act

292corporate culture 30corporate database 165, 330council tax 299, 313Covisint 106Creese, Jos 315Crest system 284crime prevention 299critical path 274, 330CSNet 191, 330customer not present protocol 96,

330

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

360 Index360

customer relationship management system (CRM) 28, 330

cyber warfare 198–199, 330Estonia 198Iran Nuclear Industry 199

C# 277, 320, 330C++ 122, 220, 277, 330

data analysis 169, 260, 262, 330database (DB) 4, 42, 118, 122, 142,

165–166, 330computer-aided software

engineering (CASE) 215computer security 195, 197electronic data interchange

89, 92entity relationship diagram (ERD)

241e-Shop 95, 101, 102extensible mark-up language

(XML) 86management information 146,

151, 157order processing 60, 70–72other database paradigms 177–178paradigms 167, 177–178process effi ciency 172–177, 282relational database 167–172supermarket case study 10, 13,

15, 16update log 194, 330

database administrator 321database designer 42, 330database management system

(DBMS) 70, 117, 165, 167, 169, 172, 174, 175, 177, 330

data capture 4, 8, 42, 134–145, 281, 330

technology 135–140, 330data centre 6, 10, 14, 124, 196, 285,

300, 302data controller 297, 330data cutover 42, 281, 330data dictionary 215, 330data enquiries 156data entry 68, 91, 116, 134, 135,

140–143data fl ow diagram (DFD) 51, 53, 58,

59, 62, 66, 217, 236–241, 331datafl ow 237, 330

datastore 51, 165, 236, 237, 238, 331

external 51, 237, 334Level-1 236Level-2 236process 51, 237, 344

data logging 70data mining 156–157, 331data modelling 242, 331data processing system 331Data Protection Act (DPA) 57, 206,

296–300, 317, 331data security 45, 70, 192, 193–194,

331data structure 57, 70, 166–167,

172–177, 195, 262, 331data subject 297, 298, 331data warehouse 15, 157, 164, 331DB2 167, 331decision-making 30, 146–149, 157,

298decision support system (DSS) 31,

157, 331delivery slot 13, 97, 102Dell 45, 104, 302

Computer Equipment Lifecycle 301

denial of service (DoS) attack 196, 197, 198, 331

departmental system, Department of Computing Library case study 130, 235

desktop 28, 30, 37, 118, 182, 187, 192, 193, 284, 302, 331

support 29, 44packages 72, 125, 165, 277, 307

despatch note 65, 331development team 187, 209, 331

see also project teamDevlin, Stephen 26digital 126, 128, 138, 184, 186, 292,

331digital divide 316digital exclusion 316, 331digital signature 90, 196, 331Directgov 314, 331directory 123, 331disaster recovery operator 196discounted cash fl ow analysis 206,

331

distance education / learning 182, 191, 332

distributed denial of service (DDoS) attack 197, 332

distributed system 14, 172, 332distribution depot 12, 13, 14

see also regional warehousedivisional structure 30document management system

(DMS) 138, 332dongle 189, 332driverless trains 312drop down menu 143, 332DSDM (dynamic system

development methodology) 218–219, 222, 332

deployment 219engineering 219, 333exploration 219, 334feasibility 218foundation 219

Dunnhumby 16Duplex 9, 10, 70, 196, 313, 332Dutch fl ower markets 108DVLA (Driver and Vehicle Licensing

Agency) 313–314, 317

eBay 78, 99, 100, 103, 332EBCDIC 127, 332e-Book 24, 25, 103economy 23, 24, 31, 146EDIFACT 81, 83–85, 90, 92, 332eff ect correspondence diagram (ECD)

218, 332e-Fulfi lment 11, 12, 97, 332e-Learning 40, 182electronic business (e-Business) 78,

100, 332electronic cash (e-Cash) 95, 96, 332electronic commerce (e-Commerce)

4, 77–80, 191, 332Data Protection Act 299electronic contract 291electronic data interchange (EDI)

81–92electronic government 313electronic market (e-Market)

104–109e-Shop 92–104order processing 67–69

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

361Index 361

supermarket case study 11, 12electronic contract 291, 332electronic data interchange (EDI) 15,

77, 79, 81–92, 332agreed message standard 81,

83–86, 332data capture 135, 139defi nition 81–82electronic contract 291electronic means 82, 87–88interchange agreement 89–90, 332network 87–88, 183, 188, 180one computer system to another

82, 85order 82order processing 67–68security 90software 88–89structured data 81, 82XML messaging 85–86, 334

electronic funds transfer (EFT) 55, 81, 333

electronic government (e-Government) 313–316, 333

electronic information service 155–156

electronic market (e-Market) 77, 79, 104–109, 333

electronic point of sale (EPOS) 6, 7–10, 14, 117, 333

e-Mail 92, 130, 182, 191, 197, 285, 333embedded IT systems 303, 307, 312EMI Music 26, 98empowerment 309, 333encapsulation 220, 255, 333encryption 9, 90, 96, 101, 194, 333end user support 310, 320, 321energy effi ciency 300, 301, 302, 303enhance prototype 212ENIAC 115, 333enterprise resource planning system

(ERP) 39, 40, 71–72, 276, 283 333

resilience 9–10enterprise system 130, 333entity 167, 169, 217, 242, 245, 247,

248, 333entity life history (ELH) 218, 262, 333entity relationship diagram (ERD) 51,

70, 166, 241–250, 262, 333

aggregation 248cardinality 242composition 248entity 242generalization 247part-of 249pig’s ear 249–250relationship 242, 243, 248, 249

envelope 88, 186, 333environment (business) 23, 24, 29,

31–32, 310environment (natural) 300, 303e-Petition 315e-Procurement 107Equality Act 158e-Reader 103e-Shop 25, 60, 77, 79, 80, 92–104, 291,

333see also internet e-Commerce

(i-Commerce)after-sales 98app 99as an IS 101–102backoffi ce 102basket 95, 101checkout 101clickthrough 94delivery 97–98login 101market changes 102–103order 62, 95–96order processing 67–69payment 95product database 60, 95registration 101search 94–95security 70, 101 194, 195social media 94supermarket case study 11–13,

17, 23trade cycle 80, 93–98

estimating 42, 282, 333ethernet 187, 188, 333European Article Number (EAN) 7–8,

9, 58, 82, 136, 333European Convention on Human

Rights 297European Model Electronic Data

Interchange (EDI) Agreement (EU-IA) 89

evolutionary prototyping lifecycle 211–214, 218, 222, 334

exception report 151–152, 334exchange of value 80, 96Executive Information System (EIS)

31, 157, 334extend 233, 334extensible mark-up language (XML)

85–86, 88, 123, 334extensible stylesheet language

transforming (XSLT) 86, 334external 51, 237, 334extract fi le 334extranet 192, 334extreme programming (XP) 223, 334

Facebook 94, 100, 191, 302, 334agile software development 223Information Society 310–311see also case study on page xxi

failover 10, 196, 334fail-safe 313fall back strategy 282, 334fault-tolerant 313feasibility report 206, 211, 216, 334feasibility study 43, 205–207, 211,

216, 218–219, 334ferric oxide 334fi bre optic 184, 334fi le 121, 164, 334fi le sharing 103, 296, 334fi nance 21, 28, 33

and accounting 28fi ngerprint checking 137, 195fi rewall 107, 188, 195, 334fi rm’s infrastructure 22fi rst-generation computer 115–116,

334fi rst-level support 284fi rst mover advantage 16, 334fi rst normal form (1NF) 260, 261, 335Five-a-side football case study 267foreign key 168–169, 175, 245, 261,

335forgery 294Fortran 335fourth-generation language (4GL)

153, 208, 212, 335Fraud Act 294functional analyst 321

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

362 Index362

functional decomposition 236, 335functional language 172, 335functional specialism 30

Galileo 106Gantt chart 43, 275–276, 335gap analysis 29generalization 220, 233, 247–248,

255, 335general ledger 33, 70, 72, 335General Medical Council 318global distribution systems (GDS)

106, 109, 335globalization 31, 308, 335global warming 300, 301, 335go live 42, 219, 283, 335goods-in 11, 13, 67, 69, 335goods-out 11, 64, 67, 69, 335Google 78, 119, 124, 310, 316, 335go to 129, 262, 336governmental organizations 32government-to-citizen (g2c) 313, 315,

336graphical presentation (of

management information) 154, 157

graphical techniques 228graphical user interface 117, 121green computing 300–304, 336Green Movement (Iran) 318

hacker 195, 336hacking 96, 101, 198, 294–296, 336

aggravated hacking 295half adder 128Hall, Richard 125Hampshire County Council 314, 315hand held device 13, 64, 69, 135, 139,

140, 336hard disk 118, 120, 164, 193, 336hash random 174, 336heap 336help desk 38, 39, 284, 336

management 321system 28, 336

Her Majesty’s Revenue and Customs (HRMC) 46, 52, 53, 56, 81

hierarchical database 177, 336high level (programming) language

129, 277, 336

High Peak Bicycles case study 228Hippocratic Oath 318Hollerith, Herman 115, 336hosting 44, 336hot standby 70, 196, 313HSBC 312hub 187, 336hub and spoke 11, 336human computer interaction (HCI)

144–145, 336human resources (HR) 21, 22, 23, 24,

25, 28Human Rights Act 297hyper text mark-up language (HTML)

86, 99, 336

IBM 109, 119, 120, 122, 167, 177, 336

IBM PC 117, 336ICL 336Identity Document Act 294identity theft 294, 337IDMS 177implementation 42, 209, 219,

281–284, 337strategy 282, 337

inbound logistics 21, 22, 337include 232, 234, 337index 175, 337index sequential 175, 176–177, 337Information and Communications

Technology (ICT) 115, 183, 337information commissioner 297, 337information overload 158information revolution 308, 337Information Society 191, 307–311,

337Information System (IS) 3–7, 51, 101,

134, 337centralization 29decentralization 29department 38–40, 337function 37–42implementation 273infrastructure 32–33outsourcing 29, 43–46, 52strategy 30support functions 28system development lifecycle

(SDLC) 205

Information System (IS) Business Model (Th e) 26–33, 37, 130, 147, 310

Information Technology (IT) 5, 32, 115–130, 165, 337

information worker 158inheritance 220, 247, 255, 337

see also generalizationinitial prototype 212, 219, 337innovation 21, 23, 28in-source 39, 45, 52, 337integrated circuit 116, 337integration test 337intellectual property 292–293intellectual property rights (IPR) 292,

337interface design 140, 144, 145, 158,

337interface object 251–252, 338international article number 7international standard book number

(ISBN) 8, 92internet 118, 120, 130, 182, 183,

190–192, 338electronic commerce 77e-Shop 92–93Information Society 307protocol 186–187

internet e-Commerce (i-Commerce) 77, 79, 80, 92–104, 338

see also e-Shopinternet protocol (IP) 186–187, 338internet service provider (ISP) 120,

122, 293, 338Inter-Organizational Information

System (IOS) 4, 6, 85, 105, 338

interpreter 129, 215, 338interviews 207intranet 107, 130, 182, 192, 195, 338iteration 212, 213, 222, 252, 262iterative lifecycle 211–214, 222, 338

Jackson structures 218, 262–263, 338JANET 40, 191, 338Java 122, 277, 278, 338Joe Lyons 115join (relational algebra) 171, 338just-in-time (JIT) 13, 15, 27, 61, 78,

104, 338

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

363Index 363

key target report 152, 338knowledge work 308, 309, 338

labour market 24, 31laptop 117, 118, 139, 192, 193, 338legacy systems 72, 123, 338Leo 1 115, 338liberal democracy 318liberal economic theory 104Libra system 284lifeline 251, 338LinkedIn 310, 339link test 209, 280, 339Linux 118, 121, 339local area network (LAN) 118, 120,

183, 185, 187, 188, 189, 339logical data structure (LDS) 217, 242,

339logical design 207, 216, 217, 339logic circuit 127, 339logic gate 115, 127–128, 339

AND gate 127, 324NOT gate 128, 341OR gate 127, 342

login 101, 339lower CASE 215, 339loyalty card 9, 15–16, 136, 317

machine code 129, 277, 339Macmillan 24, 25–26magnetic core memory 116, 339magnetic disc 339

see also hard diskmagnetic ink character recognition

(MICR) 138, 339magnetic strip 135, 136, 339mailbox 87, 88, 191, 339mainframe 38, 109, 116, 117, 119, 122,

164, 339main memory 121, 128, 164, 339maintenance 44, 209, 210, 284–285,

339malware 193, 195, 196–198, 199, 295,

296, 339backdoor 197, 326botnet 197, 327denial of service attack (DoS) 197,

331distributed denial of service attack

(DDoS) 197, 332

payload 197, 343spyware 197, 348SQL injection attack 197trojan horse 197, 351virus 197, 352worm 197, 353zombie computer 197, 353

management 146–149, 282, 339Information Systems (IS) Business

Model (Th e) 26, 29–31, 33Information Systems department

38Needle’s Business in Context

Model 24outsource 44project failure 282

management information 5, 134, 145–158, 339

order processing 65, 69–70payroll 56, 57reports 149–156

Management Information System (MIS) 4, 10, 31, 157, 339

Managing Information Systems in the 21st Century 26, 98, 125, 311, 315

Manchester Metropolitan University (MMU) 39

Manifesto for Agile Software Development 222

manufacture 27, 91, 104, 302, 308marketing 16, 22, 23, 24, 25, 28mark sensing 135, 137, 339massively parallel 119, 339materials and requirement planning

system (MRP) 5, 27, 82, 165, 339menu 143, 144, 340message 79, 85, 122, 185, 186, 251,

340message log 88, 194, 340meta-language 85, 86meta tag 94, 340meter reading 139method 340

class diagram 254–259sequence diagram 250–252see also methodology

methodology 205, 211, 214–226, 259, 340

phases 214

philosophy 214techniques 214tools 214

microblog 191, 311, 340micro chip 135, 136, 340micro computer 116, 340Microsoft

Access 167, 169, 172, 208, 215, 276, 324

C# 278, 330dot.net 277, 332Excel 154Offi ce 4, 72, 145, 340Project 276SQL Server 167Visual Basic 278, 352Visual Studio 215, 352Windows 117, 118, 119, 121, 198,

353Word 164, 353

microwave 185, 340millennium bug 72, 210, 340milliondollarhomepage 95, 340mini computer 116, 340Minitel 77, 340mission-critical 6, 52, 119, 122, 285,

340mission statement 30, 340mobile e-Commerce (m-Commerce)

79, 99, 340mobile network 4, 118, 182, 183mobile telephone (mobile) 79, 155,

185, 316, 340modelling language 220, 221, 340module 208, 341module test 208, 209, 279, 341Mosaic 191, 341Motion Picture Association of

America (MPAA) 293multiplexor 188, 341multiprocessing 121, 341multiprocessor 119, 121multiprogramming 122, 341multitasking 121, 173, 341multithreading 121, 341music industry 103MySQL 167, 341

NAND gate 128, 341national lottery 135, 137

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

364 Index364

national security 299NatWest 312Needle’s Business in Context Model

23–24, 341Net North West 40network 4, 118, 120–121, 182–192,

341bridge 120, 188, 327connection 184–185, 341electronic data interchange (EDI)

87–88equipment 184, 187–188fi rewall 188, 195, 334hub 187, 336interface card 187, 341multiplexor 188protocol 120, 184, 185–187, 351router 188, 347security 195–196, 341switch 187, 349

network administrator 320network database 174, 177–178,

341network eff ect 310, 341new PAYE system (NPS) 46NHS Electronic Patient Record

Project 283Nielsen’s Book Data 92non-repudiation 90, 341NOR gate 128NOT gate 127, 128number system 126

object 178, 220, 250, 254, 255, 341encapsulation 220, 255, 333generalization 220, 233, 247–248,

255, 335polymorphism 220, 255, 343

object oriented (OO) 341object oriented (OO) database 178,

341object oriented (OO) programming

220, 277object oriented system analysis and

design (OO SA&D) 220–221, 250, 254, 342

observation 207Ocado 11, 12Odette 83, 342offi ce systems 130

off shore 45, 308, 310, 342on the fl y 60, 95, 101, 342operating system 115, 117, 118, 121,

164, 197, 342operations 5, 342

business model 21, 23, 24, 26, 27Information System department

38system development lifecycle

(SDLC) 209, 213optical character recognition (OCR)

137, 342Oracle 167, 172, 342order processing 5, 51, 57–71, 85, 166,

342allocate stock 63backorder 63cross docking 67customer data 60customer order 61–65data structures 70–71despatch 64–65electronic invoice 68electronic orders 67–69management information 69–70order entry 142picking 63process payment 65product data 58replenishment calculation 60, 66replenishment order 65–67standing data 58–61stocktake 61supplier data 61warehouse organization 63

organization 3, 21, 26, 27–33, 37–40, 50, 342

organizational level 24OR gate 127, 342Orwell, George 316OS X 117, 118, 121, 342outsource 29, 32, 43–46, 125, 196,

308, 342agreement 44Aspire contract 46contract termination 45Her Majesty’s Revenue and

Customs (HRMC) 46Information Systems department

39–40

payroll 52publishing 24–29security 45Tesco Clubcard 16UK government 45

overfl ow 174, 177

packaging 302packet-switching 302, 342Palgrave Macmillan 24, 25–26paperless trading 81, 342parallel running 209, 282, 342participatory software development

343participatory web 100password 96, 192, 195, 294, 296, 298,

343patent 292, 343PAYE 46, 81payload 197, 199, 343PayPal 95, 343payroll system 5, 51, 52–57, 343

calculation 54outsource 39, 44, 52payment 55payslip 55security 57standing data 52tax and NI 56, 81

performance criteria 44personal computer (PC) 116, 118,

182, 343personal data 95, 294,

civil liberties 316–318Data Protection Act 296–300security 57, 101

personal messaging 191personal privacy 296phishing 96, 343physical design 343, 216, 217

see also technical designphysical security 192, 193, 343picking list 13, 14, 63, 64, 73, 343Piercy, Richard 98pipeline 343pirate download 103, 293Pizza IT case study 240Plan (machine code) 343poll tax 299polymorphism 220, 255, 343

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

365Index 365

Porter’s Generic Value Chain 21–22, 32, 57, 58, 343

Porter, Michael E. 343post and forward 87, 343postbox 87, 88power consumption 302price comparison websites 99, 123primary key 168–169, 245, 261, 343primary suppliers 22, 23primary supplies 28, 82, 343primary validation 63, 141, 344privacy 10, 45, 90, 192, 296, 297problem requirement list 217, 344problem situation 223, 224, 344procedural language 172, 344process 51, 237, 344processor 116–121, 127–129, 172,

344process privacy 45procurement 22, 28, 33, 107Prodigy 77, 244professional society 318, 319, 344program 344program and unit test 43, 208, 279,

344program development environment

(PDE) 215program evaluation and review

technique (PERT) 43, 273, 344programmer 42, 320, 320, 344programming 129, 205, 208, 220,

276–279, 344programming language 129, 220, 277,

344program team leader 344progress monitoring 43, 213, 273,

275, 344project (relational algebra) 171project 37, 40–42, 205, 344

estimating 42failures 282–284management 42–43, 273, 344plan 43, 273, 275, 282, 344planning 273–276team 38, 40, 42, 205, 211, 214, 276,

344Project management case study

269project manager 40, 41, 42, 72, 275,

320, 321, 344

Protect Intellectual Property Act (PIPA) 293

protocol 88, 121, 184, 185–187, 188, 190, 344

protocol independence 87prototype 212, 219, 344prototype lifecycle 211–214, 218,

222, 345public private key 345publishing 24, 25, 92, 103punched card 115, 116, 135, 345punched card system 115, 116, 345pure-play 11, 27, 98, 345

QR code 8, 94, 345quality assurance 345questionnaires 207quick and dirty 211, 345quick response 13, 61, 91, 104, 345

radio 137, 140, 185, 345radio button 143, 345radio frequency identifi cation device

(RFID) 137, 345RAID (redundant array of

independent disks) 120, 164, 345

rail travel information 155–156random access 173, 174, 345rapid application development

(RAD) 214, 218, 219, 222, 345Rational Rose 215, 345rational unifi ed process (RUP) 221,

345RBS 312record 172–177, 345Recording Industry Association of

America (RIAA) 293recycle 300–303, 346regional warehouse 13–14register (CPU memory) 129, 130, 346register (join) 12, 297, 299, 346registration 101, 141, 346relational algebra 171, 346relational data analysis (RDA) 167,

218, 260–262, 346fi rst normal form (1NF) 260, 261,

335second normal form (2NF) 260,

261, 347

third normal form (TNF) 167, 260, 261, 350

un-normalized form (UNF) 260, 261, 352

relational database 167–172, 346relationship 346

entity relationship diagram 166–167, 241–250

network database 177relational database 168–169,

171–172renewable energy 303repetitive strain injury (RSI) 145replacement cycle 303replenishment 6, 346

order 65–67 346order processing 57, 58, 60,

65–67supermarket case study 7, 9, 13,

14–15replenishment system 13, 14–15,

65–67, 85, 87, 346repository 72, 215, 346representative government 315request for change 285, 346requirement analysis 207, 216, 217,

346requirement specifi cation 346Research In Motion (RIM) 285resilience 9–10, 119, 124, 164, 187,

313, 346restrict (relational algebra) 171, 346rich picture 224, 346roll-over 101, 346root defi nition 225, 346rotational delay 172, 346royalty payment 103, 292, 293

Sabre 106, 109safety critical system 313, 347Sainsbury’s 11, 12, 15, 16salami-slicing 294Sale of Goods Act 292SAP 39, 72, 321, 347satellite 13, 185, 347scanner 135, 138, 347Scrum 223, 347search engine 94, 293, 347search engine optimization (SEO)

94, 347

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

366 Index366

secondary storage 118, 120, 134, 164, 172, 347

secondary suppliers 22secondary supplies 107, 347secondary validation 63, 141, 347second-generation computer 116,

347second-level support 284second normal form (2NF) 260, 261,

347secure socket layer (SSL) 96, 194, 347security 4, 45, 57, 70, 188, 192–198,

298, 314data security 164, 165electronic commerce

(e-Commerce) 90, 96, 101electronic point of sale system

(EPOS) 9–10sensitive personal data 297sequence diagram 102, 221, 250–253,

254, 347classes 251control object 252guard 252interface object 251iteration 252lifeline 251message 251self call 253

serial access 174, 175, 347serial fi le 174, 347serious crime 295server 9, 93, 101, 117, 119, 122, 141,

194, 347server farm 117, 119, 302, 347server side script 95, 101, 122, 172,

348service oriented architecture (SOA)

123, 348session variable 101, 348shipping 302shopbot 98–99, 348silicon chip 116, 127, 348simultaneous exchange of value 80,

96Sizewell B 312sizing 172, 173, 177, 282, 348Skype 187smart card 136, 137smart grid 140, 348

smart home 307smart meter 140, 303, 348smartphone 8, 30, 99, 136, 139, 285,

348smartphone app 12, 28, 101,

156, 348social and cultural factors 24, 31social media 28, 94, 311, 348social networking system 79, 100,

191, 310, 311, 318, 348sociotechnical SA&D 223–225, 348soft systems methodology (SSM)

223–225, 348software 42, 115, 121, 164, 292, 313,

348agile software development

222–223computer-aided software

engineering 215electronic data interchange (EDI)

88–90enterprise resource planning (ERP)

71–72, 283e-Shop 101–102malware 196–197programming 129–130, 276–279prototype 213, 214software as a service (SaaS) 124

software as a service (SaaS) 124, 348software developer 320, 348software engineering 220, 313speech recognition 135, 138, 183,

348spreadsheet 154, 182spyware 197, 348SQL injection attack 197, 348

see also structured query language (SQL)

staged implementation 281standard general mark-up language

(SGML) 86, 348standby generator 196, 313, 348standing data 4, 164, 169, 348

order processing 58–61payroll 52–54

state and politics 24, 31state diagram 259–260, 348statutory duty 319stock control 14, 57, 60, 85, 349stock control system 349

electronic data interchange (EDI) 82, 85, 88

order processing 57, 61supermarket case study 7, 9, 13

Stop Online Piracy Act (SOPA) 293strategic management 21, 24strategic planning 29strategy 29, 30, 44, 146, 147, 349structural level 23, 24structured decisions 147–149, 349structured query language (SQL) 153,

168, 171–172, 197, 349join 171, 338project 171, 344restrict 171, 346

structured system analysis and design (SSADM) 215–218, 236, 262, 349

business system options 216, 217, 327

defi nition of requirements 216, 217

feasibility 216, 334logical design 216, 217, 339physical design 216, 217, 343requirements analysis 216, 217, 339technical system options 216, 217,

350Stuxnet 199, 312subtype 247, 248, 349supercomputer 117, 119–120, 122,

301, 304, 349Jaguar 304K 120Sequoia 120

supermarket 6, 7–17, 23, 58, 81, 85, 317

IS/IT infrastructure 17supply chain 14, 23

supertype 247, 349supply chain 4, 61, 349

business models 22, 23, 24, 27order processing 65, 85supermarket case study 11, 13,

14–15supply chain logistics 13, 349Supply of Goods and Services Act

292support functions 21, 23, 27–29, 349system administrator 320

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

367Index 367

system analysis and design (SA&D) 205, 207, 215, 220, 223, 228, 349

system analyst 41, 42, 206, 215, 320, 349

system and acceptance test 42, 43, 209

system development lifecycle (SDLC) 43, 205–211, 349

system software 115, 121, 164, 277, 349

system test 213, 279, 349system tester 41, 320, 349

tablet 117, 139, 182, 192, 349tabulator 116, 349tag record 174, 176, 177, 349Taylorism 309, 349technical design 207, 350technical system options 216, 217,

350technology 115, 126–130, 184, 307

business models 22, 24, 31data capture 135–140network 184–188

telecommunications 118, 183, 184, 185, 350

Teleordering 92teleworker 188, 189, 191, 309, 350temporary employment 321Tesco 11

Clubcard 15–16e-Shop 11–12

testing 42, 208, 209, 213, 279–281, 350

test prototype 212–213, 350Tew, Alex 95text fi le 350theft 294thick client 122, 350thin client 122, 350third-generation computer 116, 350third-level support 285third normal form (TNF) 167, 260,

261, 350timebox 222, 223time independence 87time-sharing 350toolbox approach 221, 230top-down 260, 350touch screen 350

TP monitor 122, 70, 350Tradacom 83, 92, 351trade cycle 79–80, 81, 85, 94–98, 106,

107 351electronic data interchange (EDI)

81, 85electronic market (e-market) 106,

107e-Shop 93–98

trading partner 31, 78, 79, 351electronic data interchange (EDI)

81, 85, 87, 89network 182, 188order processing 68

trading partner database 89training 209, 281transaction 3, 4, 5, 351

data entry 141, 142, 143electronic commerce

(e-Commerce) 78, 79, 80electronic data interchange (EDI)

81, 90e-Shop 96, 99, 102human-computer interaction

(HCI) 144order processing 70payroll 52

transaction data 4, 118, 164, 351transaction processing (TP) system

70, 122, 145, 156, 351Transfer of Undertakings (Protection

of Employment) Regulations 45, 351

transistor 116, 117, 127, 351transistor equivalent 116, 127, 351transmission control protocol (TCP)

186, 351transmission control protocol/

internet protocol (TCP/IP) 121, 183, 186, 187, 191, 351

transmission protocol 90, 185–187, 351

Tripadvisor 100trojan horse (trojan) 197, 351trolley 7, 95, 351trusted third party 90, 351truth table 127, 128, 351tuple 351twisted pair 184Twitter 100, 191, 311, 351

UK court service 284unauthorized access 9, 10, 194, 195,

197, 294unifi ed modelling language (UML)

220–221, 351class diagram 254computer-aided software

engineering (CASE) 215entity relationship diagram (ERD)

(using UML conventions) 242, 247, 248

sequence diagram 250state diagram 259use case diagram 231

unit test 42, 209, 351universal product code (UPC) 7–8,

351university 27, 30, 38, 39, 296UNIX 119, 121, 210, 277, 351un-normalized form (UNF) 260, 261,

352unstructured decision 147–149,

351update log 194upper CASE 215, 352usability 56, 145, 158use case 221, 230–236, 250, 352

actor 231, 324association 231, 325extend 233, 334description 234, 352diagram 230, 250, 352generalization 233, 335include 232, 337

user-id 195, 352user interface 143, 144, 145, 352user requirements 42, 212, 283

data fl ow diagram 238DSDM (dynamic system design

methodology) 219object oriented system analysis

and design (OO-SA&D) 221

structured system analysis and design (SSADM) 217

use case 230utility program 121, 352

vacuum tube 115, 352validation 53, 63, 88, 101, 141, 352

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500

368 Index368

value added data service (VADS) 87–88, 190, 352

value added network (VAN) 87, 352

value chain 21–22, 23, 32, 58valve 115, 127valve machine 117, 352vector processor 119, 352Venn diagram 79, 352videotext 352virtual learning environment (VLE)

40, 122, 308, 352virtual market place 106virtual organization 32, 352virtual servers 303virus 196, 197, 198, 352V model 280voice-over IP (VoIP) 187voice recognition 138, 352

volume test 213, 352Volvo UK 72Von Neumann architecture 128–129,

352vortal 106, 108

Waitrose 11, 13Waste Electrical and Electronic

Equipment (WEEE) Directive 303

waterfall lifecycle 43, 205–211, 213, 214, 215, 352

weather forecasting 120web-scraping 98, 353web services 99, 123–124, 353Web 2.0 79, 100–101, 353white box test 280, 353wide area network (WAN) 120, 183,

185, 187, 189, 353

Wikipedia 100, 293, 353wikis 100, 353Wild: types of production 24wiring board 116wizard 172, 215, 353workstation 117, 145, 353Worldspan 106World Wide Web (WWW) 191, 353World Wide Web Consortium (W3C)

86, 158, 353worm 197, 199, 312, 353

XOR gate 128, 353

year 2000 bug 72, 210, 353YouTube 100

zombie computer 197, 353Zuse 115, 353

Copyrightedmaterial - 9780230370500

Copyrightedmaterial - 9780230370500