Een overzicht van alle colleges van het vak informatiemanagement van de studie Bedrijfskunde (BA) aan de Erasmus Universiteit. In het nieuwe curriculum is het een eerste jaars vak geworden. Vroeger was het een derde jaars vak.
Table of Contents
Hoorcollege 1 M1...............................................................................................................4
Social media and digital co-creation.............................................................................................4
Filter bubbles................................................................................................................................5
Hoorcollege 3 M3...............................................................................................................6
Components.................................................................................................................................6
Bits and bytes...............................................................................................................................6
IT Hardware..................................................................................................................................7
Evolution of IT hardware (I)............................................................................................................................7
Evolution of IT hardware (II)...........................................................................................................................7
Evolution of IT hardware (III)..........................................................................................................................7
The Internet.................................................................................................................................8
IP addresses..................................................................................................................................8
Domain Name Service (DNS)........................................................................................................8
TCP/IP..........................................................................................................................................8
Cloud Computing..........................................................................................................................9
From infrastructure to Power: Net Neutrality.............................................................................10
Hoorcollege 4 M4.............................................................................................................11
Sustainable competitive advantage............................................................................................11
Operational effectiveness...........................................................................................................11
Strategic positioning (I)...............................................................................................................11
Understanding competitive advantage: The Resource-based view.............................................11
Examples of powerful resources (I).............................................................................................12
Examples of powerful resources (II)............................................................................................12
Examples of powerful resources (III)...........................................................................................12
Examples of powerful resources (IV)..........................................................................................13
Examples of powerful resources (V)...........................................................................................13
Examples of powerful resources (VI)..........................................................................................13
Examples of powerful resources (VII).........................................................................................13
Examples of powerful resources (VIII)........................................................................................13
Turning technology into powerful resources: The case of RFID (I)..............................................14
The scarcest resource in the analytics age: People.....................................................................14
Data Science...............................................................................................................................15
Lesson 1: Digital goods and the Long Tail....................................................................................15
Lesson 2: The Long-enough Tail..................................................................................................16
Lesson 3: Collaborative filtering and the data asset....................................................................16
1
,Hoorcollege 5 M5.............................................................................................................17
Business processes.....................................................................................................................17
Business Process Models............................................................................................................18
Business Process Management lifecycle (I).................................................................................18
Business process model and notation.........................................................................................19
BPMN: Events and activities.......................................................................................................19
BPMN: Branching and merging...................................................................................................20
BPMN: Exclusive decisions (I).....................................................................................................21
BPMN: Parallel execution...........................................................................................................21
BPMN: Resources.......................................................................................................................22
Hoorcollege 6 M6.............................................................................................................24
Part 1: relational databases........................................................................................................24
The relational database model.....................................................................................................................24
Part 2: SQL and Data Manipulation.............................................................................................24
Hoorcollege 7 M6.............................................................................................................26
Part 3: Normalization..................................................................................................................26
Normal Forms...............................................................................................................................................26
Summary: Effects of normalization..............................................................................................................27
Hoorcollege 8 M8.............................................................................................................28
Part 4: Data Modelling................................................................................................................28
Entity-relationship model...........................................................................................................28
Entities and attributes................................................................................................................28
Optional relationships................................................................................................................29
Sets and keys..............................................................................................................................29
The M:N-Problem.......................................................................................................................31
Hoorcollege 9 M7.............................................................................................................33
Generating and processing data.................................................................................................33
Types of TPS...............................................................................................................................33
Enterprise systems.....................................................................................................................33
Database management system...................................................................................................34
Integrating the data asset: Data warehousing............................................................................34
Business intelligence..................................................................................................................34
Online Analytical Processing (OLAP)...........................................................................................35
Data mining................................................................................................................................35
Association rules........................................................................................................................35
Big data......................................................................................................................................36
Analytics.....................................................................................................................................37
2
,Hoorcollege 10 M8...........................................................................................................40
Value sources in networks..........................................................................................................40
Platform Ecosystems..................................................................................................................41
Developments in ticketing business (2017/2018).......................................................................41
A market perspective on networks.............................................................................................42
Network effects and competition...............................................................................................42
Example 1: Desktop operating systems........................................................................................................42
Example 2: Mobile operation systems.........................................................................................................43
Example 3: Social media...............................................................................................................................43
Example 4: search engines............................................................................................................................43
Example 5: online ad revenue......................................................................................................................43
Competing when network effects matter...................................................................................43
Platforms, collaborative consumption, and servitization............................................................44
Servitization and Stan Shih’s smile curve....................................................................................44
Why newer of better services?...................................................................................................44
Hoorcollege 11 M9...........................................................................................................46
IT Security.........................................................................................................................46
Stuxnet.......................................................................................................................................46
A “target” for a hack...................................................................................................................46
Security weaknesses in organizational information systems......................................................46
Taking action as an organization.................................................................................................47
Network protection....................................................................................................................47
3
, Hoorcollege 1 M1
Social media and digital co-creation
Buzzwords:
- Web 2.0
- Social Media
- Collaborative Consumption
- Digital Co-Creation
Empower users to collaborate, create resources, and share
information
Value is not created by a firm alone, but by user through a platform
Algorithm: a procedure for solving a mathematical problem (as of finding
the greatest common divisor) in a finite number of steps that frequently
involves repetition of an operation.
Broadly: a step-by-step procedure for solving a problem or accomplishing
some end
Used for:
- Advertisements you are exposed to
- People we elect for office
- How the economy is run
Algorithmic systems are increasingly used as part of decision-making
processes, with potentially significant consequences for individuals,
organizations and societies as a whole.
Increasing concerns that many of these systems are opaque to the people
affected by their use and lack clear explanations for the decisions they
make.
This lack of transparency risks undermining meaningful scrutiny and
accountability.
- Which is a significant concern when these systems are applied as
part of decision-making processes that can have a considerable
impact on people’s human rights
- E.g. critical safety decisions in autonomous vehicles; allocation of
health and social services resources etc.
Problem:
- Social media platforms not only host this troubling content, they end
up recommending it to the people most vulnerable to it
- Platforms do more than make problematic content easily found – in
important ways they help amplify it
- Algorithmic recommendation intends to give users a personalized,
supposedly more enjoyable experience
4
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper RomeeBlom. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €6,48. Je zit daarna nergens aan vast.