Principles of business information systems ralph m. stair - Download the ebook in PDF with all chapt

Page 1


Principles of Business Information Systems Ralph M. Stair

Visit to download the full and correct content document: https://textbookfull.com/product/principles-of-business-information-systems-ralph-m-st air/

More products digital (pdf, epub, mobi) instant download maybe you interests ...

Principles of information systems Ralph Stair

https://textbookfull.com/product/principles-of-informationsystems-ralph-stair/

Fundamentals of Information Systems 9th Edition Ralph Stair

https://textbookfull.com/product/fundamentals-of-informationsystems-9th-edition-ralph-stair/

Business driven information systems Fifth Edition. Edition Baltzan

https://textbookfull.com/product/business-driven-informationsystems-fifth-edition-edition-baltzan/

Management Information Systems: Moving Business Forward 4th Edition R. Kelly Rainer

https://textbookfull.com/product/management-information-systemsmoving-business-forward-4th-edition-r-kelly-rainer/

Principles of Information Security 6th Edition Whitman

https://textbookfull.com/product/principles-of-informationsecurity-6th-edition-whitman/

Principles of information security Fifth Edition Mattord

https://textbookfull.com/product/principles-of-informationsecurity-fifth-edition-mattord/

New

Trends in Business Information

Systems

and Technology: Digital Innovation and Digital Business Transformation Rolf Dornberger

https://textbookfull.com/product/new-trends-in-businessinformation-systems-and-technology-digital-innovation-anddigital-business-transformation-rolf-dornberger/

Information systems what every business student needs to know 1st Edition Mallach

https://textbookfull.com/product/information-systems-what-everybusiness-student-needs-to-know-1st-edition-mallach/

Reshaping Accounting and Management Control Systems: New Opportunities from Business Information Systems 1st Edition Katia Corsi

https://textbookfull.com/product/reshaping-accounting-andmanagement-control-systems-new-opportunities-from-businessinformation-systems-1st-edition-katia-corsi/

PRINCIPLES OF BUSINESS INFORMATION SYSTEMS

THIRD EDITION

PRINCIPLES OF BUSINESS INFORMATION SYSTEMS

THIRD EDITION

�������

Publisher: Annabel Ainscow

List Manager: Abigail Coppin

Content Project Manager:

Melissa Beavis

Manufacturing Manager: Eyvett Davis

Marketing Manager: Anna Reading

Typesetter: Lumina Datamatics

Cover Design: Simon Levy Associates

Text design: Design Deluxe Ltd

Cover Image(s): istock

Printed in China by RR Donnelley

Print Number: 01 Print Year: 2017

© 2018, Cengage Learning EMEA

ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced or distributed in any form or by any means, except as permitted by U.S. copyright law, without the prior written permission of the copyright owner.

For product information and technology assistance, contact us at

For permission to use material from this text or product and for permission queries, email

A catalogue record for this book is available from the British Library.

ISBN: 978-1-4737-4841-5

Cheriton House, North Way Andover, Hampshire, SP10 5BE United Kingdom

Cengage is a leading provider of customized learning solutions with employees residing in nearly 40 diferent countries and sales in more than 125 countries around the world. Find your local representative at:

Cengage products are represented in Canada by Nelson Education, Ltd.

For your course and learning solutions, visit Purchase any of our products at your local college store or at our preferred online store

For Tahseena

Preface xiii

Approach of the Text xiii

Goals of this Text xiv

Changes to the Second Edition xvii

Structure of the Text xix

About the Authors xxi

Acknowledgements xxi

Digital Resources Page xxii

1 Overview 1

1 An Introduction to Information Systems 3

Principles 3

Learning Objectives 3

Why Learn About Information Systems? 4

What is an Information System? 4

What is a System? 4

What is Information? 6

What is an Information System? 6

The Characteristics of Valuable Information 7

Manual and Computerized Information Systems 8

Business Information Systems 12

Information Systems @ Work: Translating Shakespeare into Dothraki 12

Enterprise Systems: Transaction Processing Systems and Enterprise Resource Planning 13

MIS and DSS 16

Knowledge Management, Artificial Intelligence, Expert Systems and Virtual Reality 17

Systems Development 19

Systems Investigation and Analysis 20

Systems Design, Implementation, and Maintenance and Review 20

Information Systems in Society, Business and Industry 21

Ethical and Societal Issues: Robots on the Loose! 21

Security, Privacy and Ethical Issues in Information Systems and the Internet 22

Computer and Information Systems

Literacy 23

Information Systems in the Functional Areas of Business 24

Information Systems in Industry 24

Global Challenges in Information Systems 24

Summary 26

Self-Assessment Test 28

Review Questions 28

Discussion Questions 28

Web Exercises 28

Case One: When Online Surveys Go Awry 29

Case Two: Health Information Systems in South Africa 30

Case Three: Australian Drones Join The Postal Service 31

Notes 32

2 Information Systems in Organizations 33

Principles 33

Learning Objectives 33 Why Learn About Information Systems in Organizations? 34

An Introduction to Organizations 34

Organizational Structures 36

Organizational Change 39

Ethical and Societal Issues: Customers

Out of Pocket After Direct Transfer Error 41

Reengineering and Continuous Improvement 43

User Satisfaction and Technology

Acceptance 44

Information Systems @ Work: Neto Helps

Australian Small Businesses Get Online 45

The Applications Portfolio 46

Success Factors 47

Competitive Advantage 48

Factors That Lead Firms to Seek Competitive

Advantage 48

Evaluating IS 49

Productivity 49

Return on Investment and the Value of Information Systems 50

Careers in Information Systems 51

Operations 51

Systems Development 51

Support 52

Information Service Units 53

Typical IS Titles and Functions 53

Summary 54

Self-Assessment Test 56

Review Questions 56

Discussion Questions 56

Web Exercises 56

Case One: Cloud Computing and Social Media

Make Nail Polish Success 57

Case Two: Can You Solve It? 58

Case Three: Raining Wine from the Cloud 60

Notes 60

World Views Case: ABAZONG Training and Consulting (Pty) Ltd Helps Organizations and Users With Information Security Consultation and Training Awareness 61

2 Information Technology Concepts 63

3 Hardware: Input, Processing, Output and Storage Devices 65

Principles 65

Learning Objectives 65 Why Learn About Hardware? 66

Computer Systems: Integrating the Power of Technology 66

Hardware Components 67

Hardware Components in Action 68

Processing and Memory Devices: Power, Speed and Capacity 68

Processing Characteristics and Functions 69

Memory Characteristics and Functions 70

Multiprocessing 72

Parallel Computing 73

Secondary Storage 74

Access Methods 75

Secondary Storage Devices 75

Enterprise Storage Options 78

Input and Output Devices: The Gateway to Computer Systems 81

Characteristics and Functionality 81

Input Devices 82

Output Devices 87

Computer System Types 91

Portable Computers 93

Nonportable Single-User Computers 95

Multiple-User Computer Systems 96

Information Systems @ Work: Printers Arrive in the Operating Theatre 97

Green Computing 101

Ethical and Societal Issues: Mobile Technology Fighting Human Trafficking 103

Summary 104

Self-Assessment Test 105

Review Questions 106

Discussion Questions 106

Web Exercises 106

Case One: Moore’s Law About to Be Overturned 106

Case Two: Sen.Se is Helping to Create the Internet of Things 108

Case Three: The €30 computer 109

Notes 110

4 Software: Systems and Application Software 115

Principles 115

Learning Objectives 115

Why Learn about Systems and Application Software? 116

An Overview of Software 116

Systems Software 116

Application Software 117

Supporting Individual, Group and Organizational Goals 117

Systems Software 118

Operating Systems 118

Current Operating Systems 122

Information Systems @ Work: Privacy for Everyone, Everywhere 123

Workgroup Operating Systems 125

Enterprise Operating Systems 126

Operating Systems for Small Computers, Embedded Computers and SpecialPurpose Devices 126

Utility Programs 127

Middleware 129

Application Software 129

Overview of Application Software 129

Personal Application Software 131

Mobile Application Software 135

Workgroup Application Software 136

Enterprise Application Software 137

Application Software for Information, Decision Support and Competitive Advantage 138

Programming Languages 138

Ethical and Societal Issues: Adblockers: Salvation for Web Users Or a High-Tech Protection Racket? 139

The Evolution of Programming Languages 140

Visual, Object-Oriented and Artificial Intelligence Languages 140

Software Issues and Trends 142

Software Bugs 142

Copyrights and Licences 143

Freeware and Open-Source Software 143

Software Upgrades 145

Global Software Support 146

Summary 146

Self-Assessment Test 148

Review Questions 149

Discussion Questions 149

Web Exercises 149

Case One: Software Cuts Legal Costs 149

Case Two: Ready. Steady. Go! 151

Case Three: Software Error Dooms

Spacecraft 152

Notes 153

5 Organizing and Storing Data 157

Principles 157

Learning Objectives 157

Why Learn About Organizing Data? 158

Data Management and Data Modelling 158

Relationships Between Tables 160

Designing Relational Databases 161

Database Management Systems 165

Creating and Modifying the Database 165

Storing and Retrieving Data 166

Manipulating Data and Generating Reports 167

Database Administration 168

Selecting a Database Management System 169

Using Databases with Other Software 169

Database Applications 170

Linking Databases to the Internet 170

Big Data Applications 170

Data Warehouses 171

Ethical and Societal Issues: Three Words and a Few Symbols Cost a Business €40m 172

Data Mining 173

Business Intelligence 174

Information Systems @ Work: The IBM Quantum Experience 175

Distributed Databases 177

Online Analytical Processing (OLAP) 178

Visual, Audio and Other Database Systems 179

Summary 180

Self-Assessment Test 181

Review Questions 181

Discussion Questions 181

Web Exercises 181

Case One: Just Tell Me My Password Already! 182

Case Two: Reading Every Book That’s Ever Been Written 183

Case Three: Life Is Short. Protect Your Data 184

Notes 185

6 Computer Networks 187

Principles 187

Learning Objectives 187

Why Learn About Computer Networks? 188

Telecommunications 188

Channel Bandwidth 189

Guided Transmission Media Types 189

Wireless Transmission Media Types 192

Telecommunications Hardware 195

Networks and Distributed Processing 197

Network Types 197

Ethical and Societal Issues: The Great British Data Grab 199

Distributed Processing 202

Client/Server Systems 203

Communications Software 204

Securing Data Transmission 206

Virtual Private Network (VPN) 207

The Internet 208

How the Internet Works 209

Internet Applications 211

The World Wide Web 212

Information Systems @ Work: Tech Firms

Plan the Highest Capacity Atlantic Data Link 214

Email 218

Telnet and FTP 219

Cloud Computing 219

Intranets and Extranets 219

Summary 220

Self-Assessment Test 223

Review Questions 223

Discussion Questions 223

Web Exercises 223

Case One: Instant Messaging Is Easier To Secure Than Email 224

Case Two: Anatomy Of A Hack 225

Case Three: Digital Cartography Gets It Wrong 226

Notes 227

World Views Case: IT Purchase Decisions –What Should You Buy? 229

3 Business Information Systems

231

7 Operational Systems 233

Principles 233

Learning Objectives 233

Why Learn About

Operational Systems? 234

Introduction 234

Enterprise Resource Planning 235

Advantages of ERP Systems 235

Disadvantages of ERP Systems 237

ERP for Small- and Medium-Sized Enterprises (SMEs) 238

Transaction Processing Systems 238

Traditional Transaction Processing Methods and Objectives 239

Transaction Processing Activities 241

Information Systems @ Work: Fast Food Chain Yonghe King Upgrades Their POS 244

Traditional Transaction Processing Applications 245

Order Processing Systems 245

Purchasing Systems 247

Accounting Systems 248

Electronic and Mobile Commerce 248

Electronic Commerce 248

Mobile Commerce 251

Ethical and Societal Issues: Tracking Staff Beyond the Workplace 251

Production and Supply Chain Management 253

Customer Relationship Management and Sales Ordering 254

Financial and Managerial Accounting 255

Hosted Software Model for Enterprise Software 256

International Issues Associated with Operational Systems 256

Different Languages and Cultures 257

Disparities in Information System

Infrastructure 257

Varying Laws and Customs Rules 257

Multiple Currencies 257

Summary 258

Self-Assessment Test 259

Review Questions 259

Discussion Questions 260

Web Exercises 260

Case One: Non-Linear Presentations 260

Case Two: When Stock Becomes a Liability 262

Case Three: Netflix Analytics Creates Content That We’ll Watch 263

Notes 264

8 Management Information and Decision Support Systems 265

Principles 265

Learning Objectives 265 Why Learn About Management

Information Systems and Decision Support Systems? 266

Decision Making and Problem Solving 266

Programmed versus Non-Programmed Decisions 267

Optimization, Satisficing and Heuristic Approaches 268

Sense and Respond 268

Big Data 269

An Overview of Management Information Systems 269

Inputs to a Management Information System 269

Outputs of a Management Information System 270

Characteristics of a Management Information System 273

Functional MIS 274

Financial Management Information Systems 275

Manufacturing Management Information Systems 277

Marketing Management Information Systems 280

Human Resource Management Information Systems 282

Geographic Information Systems 284

Decision Support Systems 284

Characteristics of a Decision Support System 285

Capabilities of a Decision Support System 286

A Comparison of a DSS and an MIS 287

Components of a Decision Support System 287

Information Systems @ Work: Non-Linear What-If Analysis in OpenOffice 288

Group Support Systems 291

Ethical and Societal Issues: Online Divorce Form Error ‘Could Have Led to Unfair Settlements’ 292

Characteristics of a GSS that Enhance Decision Making 293

Executive Support Systems 294

Capabilities of Executive Support Systems 295

Summary 296

Self-Assessment Test 298

Review Questions 298

Discussion Questions 299

Web Exercises 299

Case One: Smart Meters Capture Big Data For Energy Decisions 299

Case Two: Taking Designs into the Next

Dimension 300

Case Three: Computer Games as Decision Tools 301

Notes 303

9 Knowledge Management and Specialized Information Systems 305

Principles 305

Learning Objectives 305

Why Learn About Knowledge Management and Specialized Information Systems? 306

Knowledge Management Systems 306

Overview of Knowledge Management Systems 306

Obtaining, Storing, Sharing and Using Knowledge 307

Technology to Support Knowledge Management 308

Artificial Intelligence 309

The Nature of Intelligence 309

The Difference Between Natural and Artificial Intelligence 311

Information Systems @ Work: Playing with Atoms 312

The Major Branches of Artificial Intelligence 312

Ethical and Societal Issues: Augmented Reality’s Killer App 317

Expert Systems 318

When to Use Expert Systems 318

Components of Expert Systems 319

Virtual Reality 325

Interface Devices 325

Forms of Virtual Reality 326

Virtual Reality Applications 326

Summary 327

Self-Assessment Test 328

Review Questions 329

Discussion Questions 329

Web Exercises 329

Case One: A ‘Soft’ Octopus Robot 329

Case Two: 360° Video Makes Virtual Reality Accessible 331

Case Three: Game-Show-Winning AI Now Diagnoses Rare Diseases 332

Notes 333

10 Pervasive Computing 335

Principles 335

Learning Objectives 335

Why Learn About Pervasive Computing? 336

Introduction 336

Wireless Internet Access 337

Mobile Devices 337

Smartphone 338

Wearable Technology 339

Ethical and Societal Issues: Pay Up Or Your Data Gets It! 340

Information Systems @ Work: The Blockchain Creates Tamper-Proof Transactions 342

E-Money 343

Tangible Media 344

Personal Robotics 345

Virtual Pets 346

Computer Supported Cooperative Work 346

Videoconferencing 347

Messaging 347

Interactive Whiteboards 347

Wikis 348

MMOGs 348

Blogs and Podcasts 349

More Applications of Electronic and Mobile

Commerce 350

Retail and Wholesale 350

Manufacturing 350

Marketing 352

Investment and Finance 353

Auctions 353

Anywhere, Anytime Applications of Mobile Commerce 353

Advantages of Electronic and Mobile Commerce 354

Summary 355

Self-Assessment Test 356

Review Questions 356

Discussion Questions 357

Web Exercises 357

Case One: Someone to Share a Journey With 357

Case Two: Kids Finally Get a Real Magic Wand at Disney 358

Case Three: Let’s Play and Become Famous 359

Notes 360

World Views Case: Information Systems at Damelin, South Africa 362

4 Systems Development

11 Systems Analysis 367

Principles 367

Learning Objectives 367

Why Learn About Systems Analysis? 368

An Overview of Systems Development 368

Participants in Systems Development 368

Information Systems Planning and Aligning Organization and IS Goals 370

Establishing Objectives for Systems Development 372

Systems Development Lifecycles 374

The Traditional Systems Development Lifecycle 374

Prototyping 376

Information Systems @ Work: Open Source

Software Conquers Data Science 378

Rapid Application Development, Agile Development, Joint Application Development and Other Systems Development Approaches 379

The End-User Systems Development Lifecycle 380

Outsourcing and On-Demand Computing 380

Factors Affecting System Development

Success 381

Involvement 381

Degree of Change 382

Managing Change 382

Quality and Standards 383

Use of Project Management Tools 384

Use of Computer-Aided Software Engineering (CASE) Tools 386

Systems Investigation 387

Initiating Systems Investigation 387

Participants in Systems Investigation 388

Feasibility Analysis 388

The Systems Investigation Report 389

Ethical and Societal Issues: The Very Last Step in Systems Development 390

Systems Analysis 391

General Considerations 391

Participants in Systems Analysis 391

Data Collection and Analysis 392

Requirements Analysis 397

Critical Success Factors 397

The IS Plan 397

Screen and Report Layout 398

Requirements Analysis Tools 399

Object-Oriented Systems Analysis 399

The Systems Analysis Report 399

Summary 400

Self-Assessment Test 403

Review Questions 403

Discussion Questions 404

Web Exercises 404

Case One: Hackathon Culture 404

Case Two: Failover from Amazon 405

Case Three: The Internet of Bananas 1.0 406

Notes 408

12 Systems Design and Implementation 409

Principles 409

Learning Objectives 409

Why Learn About Systems Design and Implementation? 410

Systems Design 410

Interface Design and Controls 411

Design of System Security and Controls 412

Generating Systems Design Alternatives 415

Freezing Design Specifications 420

The Contract 420

The Design Report 420

Information Systems @ Work: Creating Computer Games Without Needing to Program 421

Systems Implementation 422

Acquiring Hardware from an IS Vendor 423

Acquiring Software: Make or Buy? 423

Acquiring Database and Telecommunications Systems 426

User Preparation 426

IS Personnel: Hiring and Training 426

Site Preparation 427

Data Preparation 427

Installation 427

Testing 427

Ethical and Societal Issues: Modelling a Mass Shooting 428

Start-Up 429

User Acceptance 430

Systems Operation and Maintenance 431

Reasons for Maintenance 431

Types of Maintenance 432

The Request for Maintenance Form 432

Performing Maintenance 433

The Financial Implications of Maintenance 433

The Relationship Between Maintenance and Design 433

Systems Review 434

Types of Review Procedures 434

Factors to Consider During Systems Review 435

System Performance Measurement 436

Summary 436

Self-Assessment Test 438

Review Questions 439

Discussion Questions 439

Web Exercises 439

Case One: Open Source Project Aims to Create

Artificial Life 440

Case Two: Build Your Own Robot 441

Case Three: GitHub 442

Notes 443

World Views Case: Systems Development at Damelin, South Africa 445

5 Information Systems in Business and Society

447

13 Security, Privacy and Ethical Issues in Information Systems 449

Principles 449

Learning Objectives 449

Why Learn About Security, Privacy and Ethical Issues in Information Systems? 450

Computer Waste and Mistakes 450

Preventing Computer-Related Waste and Mistakes 451

Information Systems @ Work: Admiral to Price Car Insurance Based on Facebook Posts 453

Computer Crime 454

Preventing Computer-Related Crime 460

Crime Prevention by the State 460

Crime Prevention by Organizations 461

Crime Prevention by Individuals 463

Using Intrusion Detection Software 463

Using Managed Security Service Providers (MSSPs) 464

Preventing Crime on the Internet 464

Privacy 465

Privacy and the Government 465

Privacy at Work 465

Email Privacy 465

Privacy and the Internet 466

Fairness in Information Use 467

Individual Efforts to Protect Privacy 468

The Work Environment 469

Health Concerns 469

Avoiding Health and Environmental Problems 470

Ethical and Societal Issues: Kettle Botnet Heats Up 471

Ethical Issues in Information Systems 472

Summary 473

Self-Assessment Test 474

Review Questions 475

Discussion Questions 475

Web Exercises 475

Case One: Open Access Pirates 475

Case Two: The Encryption Row Is Back 476

Case Three: On Patrol With the Love Police 478

Notes 479

World Views Case: Facebook: A Platform for Cyberbullying, and Cyber Racism or Not? 481

Answers to Self-Assessment Tests 483

Glossary 487

Index 499

Credits 505

Preface

As organizations continue to operate in an increasingly competitive and global marketplace, workers in all areas of business including accounting, finance, human resources, marketing, operations management and production must be well prepared to make the significant contributions required for success. Regardless of your future role, you will need to understand what information systems can and cannot do and be able to use them to help you accomplish your work. You will be expected to discover opportunities to use information systems and to participate in the design of solutions to business problems employing information systems. You will be challenged to identify and evaluate information systems options. To be successful, you must be able to view information systems from the perspective of business and organizational needs. For your solutions to be accepted, you must recognize and address their impact on fellow workers, customers, suppliers and other key business partners. For these reasons, a course in information systems is essential for students in today’s high-tech world.

The primary objective of Principles of Business Information Systems third edition is to provide the best information systems text and accompanying materials for the first information technology course required of all business students. We want you to learn to use information technology to ensure your personal success in your current or future job and to improve the success of your organization. Principles of Business Information Systems stands proudly at the beginning of the information systems (IS) curriculum and remains unchallenged in its position as the only IS principles text offering the basic IS concepts that every business student must learn to be successful.

This text has been written specifically for the introductory course in the IS curriculum. Principles of Business Information Systems treats the appropriate computer and IS concepts together with a strong managerial emphasis on meeting business and organizational needs.

Approach of the Text

Principles of Business Information Systems offers the traditional coverage of computer concepts, but it places the material within the context of meeting business and organizational needs. Placing IS concepts in this context and taking a general management perspective sets the text apart from general computer books thus making it appealing not only to those studying for IS degrees but also to students from other fields of study. The text isn’t overly technical, but rather deals with the role that information systems play in an organization and the key principles a manager needs to grasp to be successful. These principles of IS are brought together and presented in a way that is both understandable and relevant. In addition, this book offers an overview of the entire IS discipline, while giving students a solid foundation for further study in advanced IS courses such as programming, systems analysis and design, project management, database management, data communications, website and systems development, electronic commerce and mobile commerce applications, and decision support. As such, it serves the needs of both general business students and those who will become IS professionals.

IS Principles First, Where They Belong

Exposing students to fundamental IS principles is an advantage for students who do not later return to the discipline for advanced courses. Since most functional areas in business rely on information systems, an understanding of IS principles helps students in other course work. In addition, introducing students to the principles of IS helps future business function managers employ information systems successfully and avoid mishaps that often result in unfortunate consequences. Furthermore, presenting IS concepts at the introductory level creates interest among general business students who may later choose IS as a field of concentration.

Goals of this Text

Principles of Business Information Systems has four main goals:

1 To provide a core of IS principles with which every business student should be familiar.

2 To offer a survey of the IS discipline that will enable all business students to understand the relationship of IS courses to their curriculum as a whole.

3 To present the changing role of the IS professional.

4 To show the value of the discipline as an attractive field of specialization.

By achieving these goals, Principles of Business Information Systems will enable students to understand and use fundamental IS principles so that they can function more efficiently and effectively as workers, managers, decision makers and organizational leaders.

IS Principles

Principles of Business Information Systems, although comprehensive, cannot cover every aspect of the rapidly changing IS discipline. The authors, having recognized this, provide students with an essential core of guiding IS principles to use as they face career challenges ahead. Think of principles as basic truths or rules that remain constant regardless of the situation. As such, they provide strong guidance in the face of tough decisions. A set of IS principles is highlighted at the beginning of each chapter. The ultimate goal of Principles of Business Information Systems is to develop effective, thinking, action-oriented employees by instilling them with principles to help guide their decision making and actions.

Survey of the IS Discipline

This text not only offers the traditional coverage of computer concepts but also provides a broad framework to impart students with a solid grounding in the business uses of technology. In addition to serving general business students, this book offers an overview of the entire IS discipline and solidly prepares future IS professionals for advanced IS courses and their careers in the rapidly changing IS discipline.

Changing Role of the IS Professional

As business and the IS discipline have changed, so too has the role of the IS professional. Once considered a technical specialist, today the IS professional operates as an internal consultant to all functional areas of the organization, being knowledgeable about their needs and competent in bringing the power of IS to bear throughout the organization. The IS

professional views issues through a global perspective that encompasses the entire organization and the broader industry and business environment in which it operates.

The scope of responsibilities of an IS professional today is not confined to just his or her employer but encompasses the entire interconnected network of employees, suppliers, customers, competitors, regulatory agencies and other entities, no matter where they are located. This broad scope of responsibilities creates a new challenge: how to help an organization survive in a highly interconnected, highly competitive global environment. In accepting that challenge, the IS professional plays a pivotal role in shaping the business itself and ensuring its success. To survive, businesses must now strive for the highest level of customer satisfaction and loyalty through competitive prices and ever-improving product and service quality. The IS professional assumes the critical responsibility of determining the organization’s approach to both overall cost and quality performance and therefore plays an important role in the ongoing survival of the organization. This new duality in the role of the IS employee – a professional who exercises a specialist’s skills with a generalist’s perspective – is reflected throughout the book.

IS as a Field for Further Study

Employment of computer and IS managers is expected to grow much faster than the average for all occupations. Technological advancements will boost the employment of computer-related workers; in turn, this will boost the demand for managers to direct these workers. In addition, job openings will result from the need to replace managers who retire or move into other occupations.

A career in IS can be exciting, challenging and rewarding! It is important to show the value of the discipline as an appealing field of study and that the IS graduate is no longer a technical recluse. Today, perhaps more than ever before, the IS professional must be able to align IS and organizational goals and ensure that IS investments are justified from a business perspective. The need to draw bright and interested students into the IS discipline is part of our ongoing responsibility. Upon graduation, IS graduates at many schools are among the highest paid of all business graduates. Throughout this text, the many challenges and opportunities available to IS professionals are highlighted and emphasized.

Changes to the Third Edition

Principles of Business Information Systems is an adaptation of the popular US textbook Principles of Information Systems , now in its thirteenth edition. With a more international outlook, this book is suitable for students in the UK, Europe, the Middle East and South Africa on introductory BIS or MIS courses. The new title reflects the fact that this book has boosted its business emphasis but retained its technology focus.

Continuing to present IS concepts with a managerial emphasis, this edition retains the overall vision, framework and pedagogy that made the previous US editions so popular:

■ Principles of Business Information Systems keeps the same five-part structure, is packed with new real world examples and business cases, and highlights ethical issues throughout.

■ It is still an IS text aimed at those studying business and management.

However, in order to increase its international relevance, we have made a number of changes. The main improvements are:

■ Cases are more international in flavour, including examples from South Africa, Australia and Europe, and have a broader sector spread, reflecting a wider variety of business types (including SMEs).

■ The book has been brought completely up to date in terms of innovations in IT.

■ Legal and ethical issues in IT have been made more international.

■ A chapter on pervasive computing reflects the move of the computer away from the desktop to enter almost every aspect of our lives.

■ Separate information systems are still discussed in Chapters 7, 8, 9 and 10 (all of Section 3) but we recognize that many large – and some small – companies take a more integrated approach and this is covered at the start of Section 3.

Structure of the Text

Principles of Business Information Systems is organized into five parts – an overview of information systems, an introduction to information technology concepts, an examination of different classes of business information systems, a study of systems development and a focus on information systems in business and the wider society.

The content of each chapter is as follows:

Chapter 1 An Introduction to Information Systems

Chapter 1 creates a framework for the entire book. Major sections in this chapter become entire chapters in the text. This chapter describes the components of an information system and introduces major classes of business information systems. It offers an overview of systems development and outlines some major challenges that IS professionals face.

Chapter 2 Information Systems in Organizations

Chapter 2 gives an overview of business organizations and presents a foundation for the effective and efficient use of IS in a business environment. We have stressed that the traditional mission of IS is to deliver the right information to the right person at the right time. In the section on virtual organizational structure, we discuss that virtual organizational structures allow work to be separated from location and time. Work can be done anywhere, anytime. The concept of business process reengineering (BPR) is introduced and competitive advantage is examined –higher quality products, better customer service and lower costs.

Chapter 3 Hardware: Input, Processing, Output and Storage Devices

This chapter concentrates on the hardware component of a computer-based information system (CBIS) and reflects the latest equipment and computer capabilities – computer memory is explained and a variety of hardware platforms are discussed including mobile technology.

Chapter 4 Software: Systems and Application Software

You cannot come into contact with a computer without coming into contact with software. This chapter examines a wide range of software and related issues including operating systems and application software, open source and proprietary software, software for mobile devices and copyrights and licenses.

Chapter 5 Organizing and Storing Data

Databases are the heart of almost all IS. A huge amount of data is entered into computer systems every day. Chapter 5 examines database management systems and how they can help businesses. The chapter includes a brief overview of how to organize data in a database, a look at database administration and discusses how data can be used competitively by examining both data mining and business intelligence.

Chapter 6 Computer Networks

The power of information technology greatly increases when devices are linked or networked, which is the subject of this chapter. Today’s decision makers need to access data wherever it resides. They must be able to establish fast, reliable connections to exchange messages, upload and download data and software, route business transactions to processors, connect to databases and network services, and send output to printers. This chapter examines the hardware involved and examines the world’s biggest computer network, the Internet.

Chapter 7 Operational Systems

Operational systems, such as transaction processing systems, allow firms to buy and sell. Without systems to perform these functions, the firm could not operate. Organizations today are moving from a collection of non-integrated transaction processing systems to highly integrated enterprise resource planning systems to perform routine business processes and maintain records about them. These systems support a wide range of business activities associated with supply chain management and customer relationship management. This chapter examines transaction processing systems and enterprise resource planning systems.

Chapter 8 Management Information and Decision Support Systems

This chapter begins with a discussion of decision making and examines the decision-making process. Both management information systems and decision support systems are examined in detail. Their ability to help managers make better decisions is emphasized.

Chapter 9 Knowledge Management and Specialized Information Systems

A discussion of knowledge management leads onto a discussion of some of the specialpurpose systems discussed in the chapter, including expert and knowledge-based systems. The other topics discussed include robotics, vision systems, virtual reality and a variety of other special-purpose systems. We discuss embedded artificial intelligence, where artificial intelligence capabilities and applications are placed inside products and services.

Chapter 10 Pervasive Computing

The move of information systems to leave the office desktop and enter every aspect of our lives is well underway. Many businesses are exploiting this to their advantage, as are their customers. This chapter examines some of the technologies that are enabling all of this to happen. New ones are being introduced almost every month. It is important that businesses understand the potential benefits they can bring.

Chapter 11 Systems Analysis

This chapter and the next examine where information systems come from. Systems investigation and systems analysis, the first two steps of the systems development, are discussed. This chapter provides specific examples of how new or modified systems are initiated and analyzed in a number of industries. This chapter emphasizes how a project can be planned, aligned with corporate goals and rapidly developed.

Chapter 12 Systems Design and Implementation

This chapter looks at how the analysis discussed in Chapter 11 can be used to design and build IT solutions. The chapter mainly looks at developing a new system but also examines solving a problem by buying an existing IS that has already been developed.

Chapter 13 Security, Privacy and Ethical Issues in Information Systems

This last chapter looks at security, privacy and ethical issues, something that is in the background throughout the text. A wide range of non-technical issues associated with the use of IS provide both opportunities and threats to modern organizations. The issues span the full spectrum – from preventing computer waste and mistakes, to avoiding violations of privacy, to complying with laws on collecting data about customers, to monitoring employees.

About the Authors

Ralph Stair received a BS in Chemical Engineering from Purdue University, an MBA from Tulane University, and a PhD from the University of Oregon. He has taught information systems at many universities. He has published numerous articles and books, including Succeeding With Technology, Programming in BASIC and many more.

George Reynolds is an assistant professor in the Information Systems department of the College of Business at the University of Cincinnati. He received a BS in Aerospace Engineering from the University of Cincinnati and an MS in Systems Engineering from West Coast University. He taught part-time at Xavier University, the University of Cincinnati, Miami University and the College of Mount Saint Joseph while working full-time in the information systems industry, including positions at the Manned Spacecraft Center in Houston, Texas; the Jet Propulsion Lab in Pasadena, California; and Procter and Gamble in Cincinnati, Ohio.

Thomas Chesney is an associate professor of information systems at Nottingham University Business School where he studies the behaviour of networked individuals. His work has appeared in the Information Systems Journal and Decision Support Systems. Thomas has a PhD in Information Systems from Brunel University, an MSc in Informatics from Edinburgh University where his specialism was knowledge management and engineering, and a BSc in Information Management from the Queen’s University of Belfast. He is a fellow of the Higher Education Academy and a member of the Association for Information Systems.

Acknowledgements

We are indebted to the following reviewers for their perceptive feedback and expert insight on early drafts of this text and previous editions:

■ Scott Bingley, Victoria University, Australia

■ Duane Boucher, Fort Hare University, South Africa

■ Timothy Cleary, London Metropolitan University, UK

■ Amare Desta, London South Bank University, UK

■ Oyetola Emmanuel-Ebikake, Edgehill University, UK

■ Matthias Meckel, University of Central Lancashire, UK

■ Jane Nash, Rhodes University, South Africa

■ Holly Tootell, University of Wollongong, Australia

■ Indrit Troshani, University of Adelaide Business School, Australia

1

01

An Introduction to Information Systems

Principles

The value of information is directly linked to how it helps decision makers achieve organizational goals.

Computers and information systems are constantly making it possible for organizations to improve the way they conduct business.

Knowing the potential impact of information systems and having the ability to put this knowledge to work can result in a successful personal career, organizations that reach their goals and a society with a higher quality of life.

System users, business managers and information systems professionals must work together to build a successful information system.

Information systems must be applied thoughtfully and carefully so that society, business and industry can reap their enormous benefits.

Learning Objectives

■ Discuss why it is important to study and understand information systems.

■ Describe the characteristics used to evaluate the quality of data.

■ Name the components of an information system and describe several system characteristics.

■ Identify the basic types of business information systems and discuss who uses them, how they are used and what kinds of benefits they deliver.

■ Identify the major steps of the systems development process and state the goal of each.

■ Describe some of the threats to security and privacy that information systems and the Internet can pose.

■ Discuss the expanding role and benefits of information systems in business and industry.

Why Learn About Information Systems?

Information systems are used in almost every imaginable profession. Sales representatives use information systems to advertise products, communicate with customers and analyze sales trends. Managers use them to make major decisions, such as whether to build a manufacturing plant or research a cancer drug. From a small music store to huge multinational companies, businesses of all sizes could not survive without information systems to perform accounting and finance operations. Regardless of your chosen career, you will use information systems to help you achieve goals. This chapter presents an overview of information systems. The sections on hardware, software, databases, telecommunications, e-commerce and m-commerce, transaction processing and enterprise resource planning, information and decision support, special purpose systems, systems development, and ethical and societal issues are expanded to full chapters in the rest of the book. We will start by exploring the basics of information systems.

1.1 What is an Information System?

People and organizations use information every day. Many retail chains, for example, collect data from their shops to help them stock what customers want and to reduce costs. Businesses use information systems to increase revenues and reduce costs. We use automated teller machines outside banks and access information over the Internet. Information systems usually involve computers, and, together, they are constantly changing the way organizations conduct business. Today we live in an information economy. Information itself has value, and commerce often involves the exchange of information rather than tangible goods. Systems based on computers are increasingly being used to create, store and transfer information. Using information systems, investors make multimillion-euro decisions, financial institutions transfer billions of euros around the world electronically, and manufacturers order supplies and distribute goods faster than ever before. Computers and information systems will continue to change businesses and the way we live. To define an information system, we will start by examining what a system is.

system A set of elements or components that interact to accomplish goals.

What is a System?

A central concept of this book is that of a system. A system is a set of elements or components that interact to accomplish goals. The elements themselves and the relationships among them determine how the system works. Systems have inputs, processing mechanisms, outputs and feedback (see Figure 1.1).

A system processes the input to create the output. For example, consider an automatic car wash. Tangible inputs for the process are a dirty car, water and various cleaning ingredients. Time, energy, skill and knowledge also serve as inputs to the system because they are needed to operate it.

Figure 1.1 Components of a System A system’s four components consist of input, processing, output and feedback.

The processing mechanisms consist of first selecting which cleaning option you want (wash only, wash with wax, wash with wax and hand dry, etc.) and communicating that to the operator of the car wash. Liquid sprayers shoot clear water, liquid soap or car wax depending on where your car is

in the process and which options you selected. The output is a clean car. As in all systems, independent elements or components (the liquid sprayer, foaming brush and air dryer) interact to create a clean car. A feedback mechanism is your assessment of how clean the car is.

System performance can be measured in various ways. Efficiency is a measure of what is produced divided by what is consumed. For example, the efficiency of a motor is the energy produced (in terms of work done) divided by the energy consumed (in terms of electricity or fuel). Some motors have an efficiency of 50 per cent or less because of the energy lost to friction and heat generation.

Effectiveness is a measure of the extent to which a system achieves its goals. It can be computed by dividing the goals actually achieved by the total of the stated goals. For example, a company might want to achieve a net profit of €100 million for the year with a new information system. Actual profits, however, might only be €85 million for the year. In this case, the effectiveness is 85 per cent (85/100 = 85 per cent).

efficiency A measure of what is produced divided by what is consumed.

effectiveness A measure of the extent to which a system achieves its goals; it can be computed by dividing the goals actually achieved by the total of the stated goals.

Evaluating system performance also calls for using performance standards. A system performance standard is a specific objective of the system. For example, a system performance standard for a marketing campaign might be to have each sales representative sell €100 000 of a certain type of product each year (see Figure 1.2a). A system performance standard for a manufacturing process might be to provide no more than 1 per cent defective parts (see Figure 1.2b). After standards are

system performance standard

A specific objective of the system.

Figure 1.2 System Performance Standards

(a) Sales broken down by sales person

(b) Percentage of defective parts

Salesperson
Adams Brown Davis Thomas

established, system performance is measured and compared with the standard. Variances from the standard are determinants of system performance.

What is Information?

Information is one of those concepts that we all seem intuitively able to grasp, but find tricky to define. In the 1940s, mathematician Claude Shannon defined it as: information is that which reduces uncertainty. Shannon was working on the technical problems involved in sending messages over communication networks, and his concept of information is actually quite different from what we in business information systems mean by ‘information’. Nevertheless, we can use his definition as a starting point. Imagine you are unsure of what today’s weather will be like. Getting out of bed you open the curtains to see that the sun is shining. You now know a bit more about what’s it’s going to be like: your uncertainty about the weather has been reduced. Therefore looking out the window gave you information. When you turn on your radio and hear a detailed weather report, your uncertainty has been reduced further. When you look at the temperature gauge in your car, again your uncertainty has gone down. According to Shannon’s definition, each of these events has therefore given you information.

However his definition does not really capture what we would think of when we consider the information in, say, a management report. Therefore we simply define information as a collection of facts. These facts can take many forms. The temperature gauge in the car gives information in the form of a number. The radio gives audio information. Looking out of the window gives visual information. Other forms of information include text, images and video clips.

Another term that is closely related to information is ‘data’. It’s not intuitive but a philosopher might define data as ‘variation’. To explain this: a blank page contains no data, but as soon as there is a mark on the page, that is, as soon as there is variation in the blankness, then data exist. Again this doesn’t really capture what we mean by data in the context of business information systems. The traditional information systems view is that the input to an information system is data, and the output from the system is information. This means therefore that the difference between them is to do with how much processing has been done: unprocessed facts are data, processed facts are information. Unfortunately, however, this distinction is of little practical use. Therefore we will simply use the terms ‘information’ and ‘data’ interchangeably and define them as a collection of facts which can come in a variety of formats. (Incidentally, strictly speaking, the term data is plural, so we would say ‘data are used’ rather than ‘data is used’. H owever this is often not adhered to and we won’t worry too much about it here.)

What is an Information System?

Now that we have defined the terms ‘system’ and ‘information’, we can define an information system: an information system (IS) is a set of interrelated components that collect, manipulate, store and disseminate information and provide a feedback mechanism to meet an objective. It is the feedback mechanism that helps organizations achieve their goals, such as increasing profits or improving customer service.

In information systems, input is the activity of gathering and capturing data. In producing paycheques, for example, the number of hours every employee works must be collected before the cheques can be calculated or printed. In a university grading system, instructors must submit student grades before a summary of grades for the semester can be compiled and sent to the students. Processing means converting or transforming this input into useful outputs. Processing can involve making calculations, comparing data and taking alternative actions, and storing information system (IS) A set of interrelated components that collect, manipulate, store and disseminate information and provide a feedback mechanism to meet an objective. input The activity of gathering and capturing data. processing Converting or transforming input into useful outputs. Copyright 2018 Cengage Learning. All Rights

Another random document with no related content on Scribd:

accompanied Mr Cavendish on his late expedition through Somaliland to Lake Rudolph. He was a tall, sinewy, well-set-up man with clean-cut, regular features, extremely intelligent, thoroughly trustworthy, honourable, polite, and hospitable—a man whom it was really a pleasure to meet. He was about thirty years of age.

Ismail Robli was a short stout man with a shifty eye, and decidedly prognathous jaws, very plausible, and, when he had an object in view, very hospitable; but he hid a craven spirit under a show of bluster and bullying. Noor Adam was a little slim man, with narrow eyes and ferret-like features. He was reported to have shot some of his porters on his journey across West Kenia, for attempted desertion. He somehow provoked an instinctive feeling of dislike, and we never got on with him. His two partners, Bhotan and Abdallah Arahalli, were much of the same kidney. All three were Ogaden Somalis, a tribe who have not the best of reputations. There were sundry other lesser lights who are not of sufficient importance to deserve notice.

When they came into camp we received them with due ceremony, and asking them to be seated, interchanged greetings in the Mohammedan manner. For a moment the air resounded with such remarks as “Sabal Kheir” (God bless you), “Salaam Aliekoum” (Peace be on you), and “Aliekoum Salaam” (And on you peace), mingled with the Swahili “Uhali ghani? Habari ghani?” (How are you? What news?), till etiquette was satisfied. We then got to business, and discussed the Embe affair in all its bearings. El Hakim crossquestioned Noor Adam and some of his men very severely, but could find no discrepancy in their various accounts. We discussed the matter very fully, and finally, for the good and sufficient reasons I have already enumerated, we determined to punish the Wa’Embe in co-operation with the Somalis. We instructed them to provide thirtyfive men carrying Snider rifles, while we undertook to supply twentyfive men similarly armed, which, with ourselves, made up a strong force of sixty-three men, a number we considered amply sufficient for the purpose in hand. We despatched a nephew of N’Dominuki’s to Embe as a spy, to find out a good road and the position of the villages, etc., and he started the same evening.

On the following day we held another “shaurie” with the Somalis to discuss the modus operandi of our projected expedition. N’Dominuki’s nephew had been instructed to return from Embe within two days, and we decided to start on the afternoon of the next day—by which time, bar accidents, he would have returned—and march immediately on receiving his report. We intended to start just before dusk, pass through M’thara in the darkness, and be over the Embe border unperceived at midnight. A short rest and a dash on the Wa’Embe at dawn would complete the operation. It was a good plan, and would have answered admirably but for one of those little accidents that make “the best-laid schemes o’ mice and men gang aft agley.” As will be seen, it suited the enemy admirably.

Embe on this side (the west) consists of a range of steep mountains, where it rains nearly all the year round. It has, therefore, a very moist climate and fertile soil, and its steep slopes and deep valleys are covered with dense jungle interspersed with banana plantations, making it a very nasty country to fight in, especially against natives who know every inch of the ground and every turn of the paths. We did not tell N’Dominuki of our plans—a very grave oversight that nearly cost us our lives and those of the whole expedition.

On the following morning, as we really could not stand the wind any longer, we shifted our camp to the inside of the forest, and while we were about it we fortified it as well as we were able by felling thorn trees, etc. We were much more sheltered in this new position, though, to be sure, it was rather damp. This wind had a nasty cold nip with it night and morning, which was the reverse of agreeable.

When we had our camp satisfactorily settled, we made our simple preparations for the expedition to Embe. We took one tent with us in case we were away more than a day or two. A loaf of bread and a hind quarter of boiled mutton were also included; and, of course, a plentiful supply of ammunition. The men had thirty rounds of Snider cartridges each, which was all we could spare. The Somalis’ men had fifty rounds each, and they, in addition, had a reserve chest of six hundred rounds for emergencies.

At 5 p.m. we started. The natives in our immediate vicinity had, with their usual unerring instinct in such matters, smelt a row, and about fifty of them turned up armed with spears and shields. We did not want them, but could not very well turn them away, and at the last moment it occurred to us that they might prove useful as scouts, and we therefore allowed them to remain. When our force had assembled, it made quite an imposing array with the sixty men with rifles and the fifty others with spears. Altogether, we commanded upwards of a hundred men, and had no doubt but that we should teach the Wa’Embe a severe lesson.

N’Dominuki’s nephew had not returned, and we concluded that he had been discovered and killed, and were consequently rather nonplussed for the lack of a guide. At the last moment a Masai warrior came forward and volunteered to guide us. On the Somalis saying that he was known to them, we accepted his services. Soon after we started, N’Dominuki’s nephew unexpectedly returned and joined us, and he and the Masai took the head of the column. Darkness had fallen as we marched through M’thara, the road continually ascending. The path at last grew extremely difficult, and on several occasions El Hakim expressed doubt as to whether we were going right. However, we were now committed to whatever the Fates had in store for us; it was impossible to withdraw.

Onward we stumbled in the darkness, now up steep hillsides, and anon down deep and gloomy valleys clothed in thick jungle where the deep booming note of a mountain torrent growled hoarsely from somewhere out of the pitchy blackness below. Soon the path became so narrow that we could advance only in Indian file, which weakened us considerably, as our fighting line was thereby stretched out for some two hundred yards, being consequently out of our immediate control, while the jungle, meeting overhead, blotted out what little light the stars provided. It was impossible, on account of the denseness of the vegetation, to place men out on our flanks, and in addition we were counting on taking the Wa’Embe by surprise, and so did not wish to make too much noise. At 10 p.m. we were well within the Embe border, and we then looked for a place to rest awhile and prepare for our rush at dawn. We could not find a suitable

spot, however, and eventually decided to halt on the path. A drizzling rain came on, which did not improve matters. One of our men found a place a little distance from and below the path, that did not slope at such an acute angle as the rest of the landscape, and we as noiselessly as possible pitched the tent. El Hakim, George, and I partook of a frugal meal, but we were without water, and naturally we felt ever so much thirstier than we would otherwise have done. We placed sentries, Jamah Mahomet doing the same where he had halted on the path. We three Wasungu then dropped off to sleep.

Somewhere about midnight we awoke with a start, reaching for our rifles as the sound of a shot floated down to us from where Jamah Mahomet’s sentries were posted. It was followed by a second, and then a third. Then all was silent again, except for the subdued hum of suddenly wakened men. On sending for explanations, we found that some Wa’Embe, coming down the path, had stumbled right on to the sentries, and were instantly fired upon. All hope of a surprise was thus abolished, but on consultation we decided that if we started an hour or so earlier, possibly 3 a.m., we might take the enemy at a disadvantage. Accordingly, at that time we once more set out.

It was dark as Erebus. As we noiselessly formed up on the path, a sort of half sense of impending disaster seemed to have fallen on the men. We did our best to dissipate it, and apparently succeeded. The Masai guide and N’Dominuki’s nephew led the way; next came four of the Somalis as advance-guard; then Jamah Mahomet, who was wearing a waterproof coat over his khaki costume; finally George, El Hakim, and myself. A few yards farther on we found a spear in the path, probably dropped by one of the Wa’Embe in their flight, when fired at by the sentries. If possible, the path grew worse as we advanced, and presently we reached a deep ravine with a swift torrent roaring and tumbling at the bottom. It was spanned by a single tree-trunk, which served as a bridge. Beyond the ravine the path sloped upwards with many twists and turns. On each side the jungle prevented anything being seen more than a yard or two away.

We advanced slowly and cautiously in the order described, when a shot rang out almost under our feet; another followed; and then a

volley from the advance-guard showed that something serious was toward. A terrific howl and the long repeated U-u-u-i (the A’kikuyu war-cry) showed us that we were very skilfully ambushed, and the realization was not pleasant. The firing at once became general all along the line. It was a very fierce fusillade while it lasted; the reports of the rifles and the cheers of our men, mingled with the war-cries of the enemy, sounding weird and ghastly in the dense blackness of the early morning (it was then 4 a.m.).

For a few moments pandemonium reigned supreme. Neither El Hakim nor I could see a single native. George, though only a yard or so away, was hidden from us, both by the darkness and by a turn in the path. El Hakim clutched my arm and dragged me into a sitting position on the ground as the whirring, hissing rush and plaintive whine of bullets in unpleasant proximity to our ears warned us that we were in considerable danger of being shot by our own men. Owing to the serpentine winding of the path, they were firing towards every point of the compass, and we were therefore much safer on the ground. In a few moments the war-cries of the enemy died away as suddenly as they came, and the spiteful crackle of the rifles lessened a little. As soon as we were able to make ourselves heard, we gave the order “Cease fire,” and endeavoured to find out what damage had been done. I called to George, and, to my great relief, he answered me.

El Hakim and I then advanced, and turned the corner. We could then dimly discern George amid the gloom. He came towards us saying that Jamah Mahomet was wounded, and was lying on the path a yard or so away. Hastening to the spot, we saw Jamah stretched upon the ground, moaning pitifully He had a great spear driven right through him. A native had concealed himself in a pit dug on the side of the path and lain in wait, letting both the guides and the advance-guard go past him in the hope of bagging one of the Wasungu. In the darkness he mistook Jamah Mahomet’s tall form, clad in European clothes, for George, and as Jamah passed he thrust upwards with all his strength. Jamah instantly fell. George, who was only a yard behind, saw the thrust, and, raising his rifle, he

shot the native through the stomach, but did not drop him This was the shot which gave us the first alarm.

El Hakim made a hasty examination of the stricken man, and pronounced the wound fatal. The broad spear-blade, over two feet in length, had entered the right side just below the ribs, and, passing through the body, emerged just under the left arm, protruding several inches. Jamah was semi-conscious, and apparently in great pain. Grouped round him, on the alert, were the four Somalis who formed the advance-guard. As El Hakim concluded his examination, Ismail Robli, Noor Adam, and others of the Somalis, came up. When they learnt what had happened to Jamah, such a wail of grief and dismay went up as I hope never to hear again. Ismail behaved like one demented. He wept and cried upon “Allah” in the most frenzied accents.

As we were crowded together in the path over the dying Jamah, N’Dominuki’s nephew crept out of the bush, and, with shaking limbs and horror-stricken countenance, approached El Hakim, attempting to say something which his trembling lips refused to utter. The other guide had disappeared. El Hakim seized him, and was trying to understand what he was saying, when Ismail Robli caught sight of the palsied wretch. His face changed instantly from an appearance of pious supplication to one of demoniacal fury, and, crying “This man is a false guide; he has caused Jamah’s death,” placed his rifle, a ·577 express, against the other’s side, and, before I could raise a hand to interfere, pulled both triggers, literally blowing the poor wretch to pieces.

It was a hideous and revolting exhibition of savage ferocity. Ismail did not even put the rifle to his shoulder—we were too crowded for that—he simply pushed the barrels past me and fired from his hip. The murdered man collapsed in a writhing, moaning heap on the ground. Ismail turned away and reloaded his rifle.

It was no time for recrimination, as at the report of Ismail’s rifle, a fresh burst of firing broke from our men in the rear, which we instantly quelled. It was a dastardly act on Ismail’s part, even though at the time he was almost frenzied with grief at Jamah’s injury, as we

had no reason to believe that the unfortunate guide had played us false. As we found out afterwards, the real culprit was the Masai volunteer, who, it appeared, was a native of Embe, who had been sent for the purpose of betraying us. At the same time, N’Dominuki’s nephew had neglected to warn us, or point out that we were going by a bad road. A great deal remained to be explained, but his untimely end put further explanation out of his power for ever.

However, there we were in the dark, stuck on a path eighteen inches wide, with a wounded man and no guides. The question now was how to get out without further loss. We called a council of war, first posting the Somali advance-guide a few yards up the path. We decided to wait till daylight, as we could not move while Jamah was living, and he was too far gone to be carried. It was a ghastly wait. After the firing and shouting, the silence could almost be felt; it seemed absolutely deathlike. We strained our ears to the utmost at the slightest rustle of a leaf, as, for all we knew, the bush might be swarming with natives waiting their opportunity for a rush.

A curious sight we should have presented to a spectator. The Somalis, led by Ismail, were grouped, praying, round the dying Jamah, who was sinking fast and moaning softly at intervals. El Hakim, revolver in hand, stood bolt upright, and intensely on the alert, his face showing faintly white through the gloom. Beside him stood George, drumming with his fingers on his rifle—a habit of his— softly humming an air from “Cavalleria Rusticana.” Crouched down on the path were the men, motionless as bronze statues, conversing in low whispers now and then, while they strained their eyes in the endeavour to pierce the surrounding bush. A yard or so away lay the dead body of N’Dominuki’s nephew; his dirty cotton waist-cloth smouldering where it had caught fire from the explosion of Ismail’s rifle, nearly choking us with the smell of singed flesh and the pungent odour of burning cloth. We tried several times to put out the cloth, but we had no water, and it was in vain we attempted to smother it; so it smouldered all night, and uncommonly unpleasant we found it.

We were parched with thirst, having had no water since the previous afternoon. Once in a while the flash of a sentry’s rifle would momentarily light up the surrounding jungle, and the sharp report

stabbed the silence. I laid down on the path and slept—fighting sometimes affects me that way—and woke up at dawn, just as Jamah died. We were exceedingly sorry, as he was one of the best of his race we ever had to do with. At the first glimmer of daylight we dug a grave on the side of the path, and he was buried with all the ordinances proclaimed by Mohammedan law that were possible under the circumstances. Prayers and lamentations in Arabic resounded on all sides from the deceased’s assembled compatriots.

There being now no signs of the enemy, El Hakim, George, and I were for continuing the advance and pulling the fat out of the fire somehow, but Ismail and the other Somalis would not hear of it. They said that the enemy were now fully prepared for us, and instanced the numerous freshly dug pits that had been found on each side of the path when digging Jamah’s grave. Another argument they employed was that our respective camps were almost entirely unprotected, and it was more than likely that the Wa’M’thara or the Wa’Chanjai would attack and loot them in our absence, more especially as they (the Somalis) had a large number of cattle, which are particularly tempting to a native. In addition, we were now entirely without guides, while the path ahead seemed worse than ever.

We saw the force of this reasoning, and common prudence directed that, for the present at any rate, we must abandon the attack; which decision, though gall and wormwood to we Englishmen, we were reluctantly compelled to admit was the wisest possible under the circumstances. We made up our minds, however, that we would return under more favourable auspices, and wipe out the disgrace of our defeat, for defeat it was, and so with that understanding we acquiesced in the retreat, and gave the necessary orders to retire.

It was with very mixed feelings that we travelled back over the difficult path we had trodden a few hours before with such confidence. We found out afterwards that our sudden retreat disconcerted the Wa’Embe, who were massed in force further along the path at a place where they had dug a large number of pits, in which they had kindly placed sharpened spikes for our reception.

At eight o’clock we were met on the road by an M’thara man named Koromo, who handed us a jar of honey as a present. When we got within a mile or two of our camp large numbers of fully armed natives slunk past us, going towards Chanjai. They were coming from the direction of our camp. Hurrying on with sinking hearts, we soon arrived at the camp, and to our great relief found all safe, though Jumbi was full of some report or other about armed natives who had been round the camp during the night. We said he could tell us about it afterwards, as at present we wished to eat. It was then one o’clock in the afternoon, so we set to and made a hearty meal, and afterwards retired to our blankets and slept the sleep of the just until dinner-time.

FOOTNOTES:

[3] “Through Jungle and Desert,” by William Astor Chanler, A M (Harv ), F R G S , pp 168-177

[4] “Elephant Hunting in East Equatorial Africa,” by Arthur H. Neumann, pp. 42, 43.

CHAPTER VI.

OUR MOVEMENTS IN M’THARA AND MUNITHU.

Attempt of the Wa’M’thara to loot our camp “Shauri” with Ismail

The Somalis accuse N’Dominuki of treachery He vindicates himself That wicked little boy! Explanation of the Embe reverse Somalis lose heart Attacked by ants El Hakim’s visit to Munithu Robbery of his goods by the Wa’Gnainu I join him

We endeavour to recover the stolen property from the Wa’Gnainu The result

Ismail’s apprehensions for the safety of our respective camps seemed to have been well founded. Jumbi, whom we had left in charge of our boma, reported that on the evening of our departure for Embe he had noticed that large numbers of armed natives were concealed in the surrounding bush. He unostentatiously put the camp in as good a state of defence as possible, and kept his few men moving about inside the boma to give an appearance of numbers. He then noticed that the long grass in the clearing was also crowded with concealed warriors, to the number of several hundred. Presently some of them showed themselves. He shouted to them, asking what they wanted. They answered by inquiring if the “Wasungu” were in camp. He, with ready wit, shouted back that one of the Wasungu had gone away somewhere, but the other two were in camp. Did they wish to see them? They apparently did not, and he saw no more of them, though they still remained within easy distance; and consequently he passed a very anxious night. Our unexpected return next morning disconcerted the warriors, who hastily retreated. They were the fighting men we had passed on our way back. Jumbi said they were Wa’M’thara, which, if true, was a very serious matter.

The men in charge of the Somalis’ camp made a similar report. Without doubt the natives’ plan was to wait till news arrived of our defeat and massacre in Embe, and then to rush and loot the camps,

after spearing the few defenders. These preparations seemed to indicate a deep-laid plan on the part of some one, and some one, also, who was sure of success.

Ismail Robli, with several of the other Somalis, came into our camp in the afternoon showing every sign of terror, which they endeavoured, unsuccessfully, to conceal. They asked for a “shaurie,” and when we granted their request, they came out with a ridiculous story of treachery on the part of N’Dominuki. They declared he was a traitor, ignoring the fact, which we pointed out to them, that N’Dominuki had been kept in ignorance of our plans. They further stated that he was even now preparing to attack us at the head of the Wa’M’thara, reinforced by a strong body of Wa’Embe. We refused point-blank to believe a word of it. On questioning them as to their source of information, they said that a man from Chanjei, who had come into their camp to sell food, had told them. We were disgusted with their credulity, and said as much. El Hakim told them that he had known N’Dominuki for years as the most trustworthy of natives, and so had other Englishmen before him, and he would not believe that he had turned traitor, on the more than doubtful word of a casual native, whom nobody knew, and who was of no consequence or position.

Ismail was obstinate. He persisted in his assertion that N’Dominuki was a traitor, and instanced the armed Wa’M’thara who had concealed themselves round about our camps the night before, as proof of his words. We were a little troubled, as, though we would not for a moment believe N’Dominuki to be the traitor, we did not know what his people might do without his knowledge, or in spite of him. At all events, the presence of armed men round our camp needed explanation. As we did not quite understand matters, we sent for N’Dominuki, asking him to come to our camp, as we wished particularly to see him. Our messenger returned in the course of the day with a message to the effect that N’Dominuki was suffering from fever, and was unable to come. We sent up again, with some medicine, asking him to come if possible. He again returned an answer that he was ill, but would come to-morrow.

His non-appearance seemed proof positive to Ismail and his following that N’Dominuki was actively hostile. They were, in consequence, in a perfectly frantic state. Of course, had N’Dominuki turned traitor we should have been in a very bad fix, though it was only what could have been expected after the double reverse in Embe. However, we were very loth to believe it of him in the absence of direct and conclusive evidence.

Ismail returned to his own camp, but visited us an hour or so later with a fresh budget of news to the effect that N’Dominuki had received the Embe chief in his house, and had killed a sheep in his honour. Once more we sent to N’Dominuki, this time detailing the charges alleged against him, and saying that, although we did not believe them, we should be obliged if he would visit us as soon as possible. He sent back to say that he would come to-morrow without fail.

All these conflicting accounts caused us considerable anxiety. As for the Somalis, they were in a most pitiable state; that is, it would have been pitiable had it not been so thoroughly contemptible. They appeared panic-stricken, and worked with feverish energy in strengthening their boma, felling huge trees and cutting thorn bush till long after sundown. We ourselves did not neglect obvious precautions, and strengthened our boma a little, more especially for the purpose of reassuring our men, amongst whom the Somalis’ stories had created something like alarm. We then sent a peremptory message to the Somali camp, warning them that if their frightened sentries, through a false alarm or any such cause, fired in the direction of our camp, we should not hesitate to return the fire with interest. This message had the effect of calming their nerves a little.

Next morning they again came over to our camp, still with the same old tale of N’Dominuki’s treachery. These repeated allegations against N’Dominuki caused us to suspect some ulterior motive. Still another urgent message was sent to N’Dominuki, and this time he sent back word that he was coming with his people, bringing food. He arrived an hour or so after the message, and sending for Ismail and the other Somalis, we held a big “shaurie.”

First we asked N’Dominuki why he had not appeared in answer to our frequent messages the day before. He replied that he and his people had fled to the hills with all their cattle and goods, under the impression that we were going to attack them!

We inquired who gave him that idea, and he said that a boy from the Somali camp had told him so.

Then we began to see daylight. We inquired where the boy was. N’Dominuki replied that as far as he knew he was still in the Somali camp, so we ordered Ismail to produce him. In a few minutes he was delivered, bound, at our feet. A cross-examination of the Somalis elicited the fact that the boy had deserted from their camp, taking with him one of their sheep. On being again questioned, N’Dominuki stated that the boy had come to him for shelter. He had told the boy that he would not allow him to stop there, but would send him back to his masters, but the artful little boy said, “I have done it for your sake, N’Dominuki. I wished to warn you that the Wasungu and the Wa’Somali are about to attack you.” N’Dominuki believed him, and fled forthwith.

In a little while the boy, not liking the life with the natives, and yearning for the flesh-pots of the camp, returned to the Somalis, after having concocted a satisfactory explanation of his absence. He made out to the Somalis that he had gone as a spy on N’Dominuki, who was an “el moruo torono” (a wicked old man), as he had heard that he was hostile to his dear masters, and that at great risk and personal inconvenience he had carried out his plan successfully. He then solemnly warned them that N’Dominuki was preparing to attack them. He counted on the gravity of his announcement averting any unpleasant inquiries about the stolen sheep—a ruse which was completely successful.

Now we had got hold of the truth. Small boys will be small boys all the world over, whether white or black, and this little untutored specimen of his genus had kept a hundred and fifty armed men, in two camps, in a state of intense anxiety for two days, and had driven a tribe with all its cattle and goods in mortal terror into the hills for the same period, in order to cover his impish escapade. He was treated

in the same way as from time immemorial other small boys have been—for equally reprehensible escapades, and forthwith received the thrashing he so richly deserved.

We gently chided N’Dominuki for believing “that little vulgar boy,” and asked him why he had not come into camp and found out the truth for himself. He was afraid, he said, that we should bind him and kill him at our leisure! El Hakim represented that it was very unkind to think that of him, who was such an old and proved friend. N’Dominuki’s only reply was “The boy told me so!” That is a savage all over! They believe the first story that comes to hand, even against their better judgment. In N’Dominuki’s case, although his experience of white men had always been of the best and pleasantest, he had met them late in life, and had never quite lost the savage’s innate distrust of strangers.

We dismissed the crestfallen Somalis, and advised them to give less credence to casual reports in future. They seemed very sulky, and were, we were beginning to believe, rather sorry that N’Dominuki had successfully vindicated himself.

From that old savage we afterwards gathered a great deal of information, which threw considerable light on the recent events in Embe. It was now shown beyond the shadow of a doubt that the Masai volunteer guide was an Embe native who, while spying round, had seized the opportunity offered him of serving us to our disadvantage. The Somalis were greatly to blame for saying that they knew him. So they did, but in the hurry of the moment they had neglected to tell us that they had merely seen him knocking about their camp for a day or two.

When we passed through M’thara in the darkness we were observed by some of the Wa’M’thara, who were friendly to the Wa’Embe, and who immediately sent off a runner with the news of our advance, thus giving the enemy time to skilfully prepare the nice little trap into which we all walked. Our escape throughout was due more to good luck than good management, as the party who ambushed us and killed Jamah Mahomet were only an advanced post of the Wa’Embe, the main body being posted a mile further on,

where they had dug numbers of pits in the path, in which they, with great forethought, had placed sharp-pointed stakes. It was their intention to attack us when we were floundering about in these pits.

We had sadly underrated the skill and courage of the enemy, and altogether had had a very narrow escape from irretrievable disaster. If we had underestimated their capabilities, however, they had also paid us the same compliment. The terrific fire which instantly greeted their first onslaught must have surprised them greatly. It certainly daunted them, and probably considerably disarranged their plans, preventing them from bringing their main body up and surrounding us. Before they had formed any fresh plan we had made good our retreat, which, in the light of subsequent knowledge, proved to be a wise, if somewhat humiliating step.

N’Dominuki said we should have told him of our plans. He only heard of our intention to attack Embe after we had passed his village, and it was then too late to warn us. He offered, if we wished to renew the attack, to personally guide us into Embe by a much better path, with open country on either side; the road we had followed being the very worst one we could have chosen. His proffered assistance was gladly accepted, and we communicated with the Somalis, expecting they would jump at this opportunity of avenging the death of their leader. To our intense surprise, they did nothing of the kind, but replied that they only wished to buy food peaceably, and go their way northward. We were simply astounded, and could not at first believe that Somalis, above all people, could be so craven-spirited; besides, a successful punitive expedition had now become a vital necessity if we were to preserve the lives of our party, and render the country safe for those travellers who might come after us.

Already there were ominous mutterings among the surrounding tribes, begotten of our reverse in Embe, but we could not get Ismail to see the matter in the same light, argue as we would. Jamah’s death seemed to have thoroughly discouraged him. We reasoned, we begged, but to no purpose. George and I went over to his camp in the evening in order to make a final effort to rouse a little spirit in him. George has a wonderful knowledge of Arabic, and he used it

then with vigour and fluency I also possess a rudimentary knowledge of vituperation in that language, and employed it to the utmost; but in vain. We argued, threatened, cajoled, and insulted, but could get no response, beyond the statement from Ismail that he was a man of peace, and wished to go his way and trade. I pointed out to him with some emphasis that it was not because he was a “man of peace” that he did not fall in with our views, as I had had ocular demonstration of the fact that he was the very reverse when he felt inclined. The reason, I told him, that he did not wish to avenge the blood of Jamah, which was crying aloud for vengeance, was a cowardly fear of a few naked savages, who were not even Mohammedans. I called Allah to witness that he was a traitor to his blood and his religion, and that Jamah, from among the “houris” in Paradise would look down and curse him for “an unclean dog without religion.”[5] He smiled a sickly smile, and repeated that he was a peaceful trader, not a man of war. I then spat upon the ground to show my utter contempt for him, and left him.

The following day we bought a large quantity of food from N’Dominuki’s people, and packed it in loads in preparation for our march to the Waso Nyiro. In the afternoon Koromo, the man who met us with the honey when we were returning from Embe, came into camp with N’Dominuki and requested the honour of bloodbrotherhood with El Hakim, and that interesting though disgusting ceremony was accordingly performed. That night George and I had a very disagreeable experience. We and the puppy had gone to our tent for a good night’s sleep after the worry and trouble of the last three days. The pup was very restless, and ran whining about the tent in a most annoying manner. At first we thought it was only his “cussedness,” and scolded him well; but he got worse instead of better, and finally rolled frantically on the ground, yelping most dismally. Suddenly George said “D——n!” in a loud voice, and sprang up from his bed, which was on the ground, and after a little searching pulled a black insect from some part of his anatomy. He at once examined his blankets, and found that they were literally covered with tiny black ants, which, in spite of their small size, bit most ferociously. I also turned out and found the ground under my

bed was a seething black mass of ants, which instantly attacked the unprotected portions of my person with an earnestness and attention to business which, under other circumstances, would have commanded my highest admiration. Mine was a camp-bed standing a foot off the ground, and consequently there were comparatively few on my blankets. We turned our attention to the agonized puppy, and found that the poor little brute was black underneath with the tiny pests, who had bitten into his flesh and held on like limpets. We brushed him free and put him out of harm’s way, swept out the floor of the tent, getting innumerable bites on our naked feet and legs in the process, and sent for some ashes, with which we liberally sprinkled the ground, and also spread them in a circle round the tent, which to some extent mitigated the nuisance. I did not suffer so much, as my bed, as already explained, was some inches above the ground, and consequently George, who slept on a heap of rushes, bore the brunt of the attack. I was aroused several times during the night by a muttered exclamation from the darkness on his side of the tent, followed by the slap which signalled the hurried exit of another of our tiny enemies from this world of woe. We found in the morning that we had not been the only sufferers. Round all the men’s tents a broad band of ashes testified to the defensive measures they had been compelled to adopt. The cry of “siafu” (ants) in camp is at all times a signal for instant action. Red-hot ashes are hastily gathered and sprinkled in the path of the advancing horde, and the greatest excitement prevails till the foe is finally vanquished. I was compelled to shift our tent during the day to another spot some distance away. By first beating down the earth into a hard concrete-like floor and then strewing it with ashes, we hoped to prevent a recurrence of the attack of the previous night, an arrangement we found to answer admirably.

ELDERS OF M’THARA.

DIRITO AND VISELI (on the right) AND TWO FOLLOWERS. (See page 132.)

The same day the Somalis left M’thara for Chanjai, where they desired to purchase food. They promised that on their return in four days’ time they would accompany us on another expedition into Embe—a result I should have attributed to my eloquence of the night before had we not been perfectly aware of the unreliability of their promises. El Hakim, however, decided to wait on the off-chance of their returning, and resolved to fill in a day or two by a journey back to Munithu to collect food, and also to try to get news as to how far our Embe reverse had affected native feeling towards us in those districts. He took eight men with rifles with him. I amused myself all the morning trying to make toffee from native honey and butter. The resulting compound, though palatable enough, could not be induced to harden, so we were compelled to devour it with a spoon. George

gave in at midday to a nasty touch of fever I administered a couple of phenacetin tabloids, and sweated him well, which towards evening reduced his temperature. Next morning he was decidedly better, and together we made a tour of inspection round the camp. We saw a peculiar striped rat in the boma, which we nicknamed the zebra rat. It was mouse-coloured with black stripes, but as we had not a trap we could not secure a specimen. At midday George was down again with the fever, and I dosed him once more. At 12.30 two men came back from El Hakim with a note for me. He asked for some fresh bread and a bottle of milk, also for six more men with rifles. It seemed that the Wa’G’nainu, the people of a district west of Munithu, on hearing of our Embe reverse, had come down and looted some of the trade goods which El Hakim had left in Bei-Munithu’s charge, and that he intended to try to recover them. He also asked for my company if I could leave camp. As George was so queer I did not feel justified in leaving him, but on his assurance that he was quite able to look after himself while I was away, I decided to go.

I took no baggage or blankets, and with six men and four donkeys, which were required to bring back the balance of El Hakim’s goods still remaining with Bei-Munithu, started at one o’clock, intending to try to reach Munithu the same evening, though it had taken the safari two days to reach M’thara from Munithu on the outward journey. At sundown, after a toilsome and seemingly interminable march, my party and I arrived at El Hakim’s camp outside Bei-Munithu’s village, where El Hakim, pleased at our rapid journey, forthwith ministered to my material wants in the way of towels, soap, and supper After our meal he summoned Bei-Munithu, and bade him recapitulate for my benefit the story of the pillaged goods. Briefly it amounted to this: A large party of the Wa’G’nainu had come on a friendly visit to BeiMunithu. During their sojourn with him a report came to hand that the Wasungu had been driven out of Embe with great loss, and one of them had been killed. The news caused some excitement, and, as was only natural, the assembled natives discussed in what way the Wasungu’s supposed misfortunes could be turned to profitable account. It was already well known that Bei-Munithu had one of his huts filled from floor to roof with the trade goods and equipment of the chief Wasungu, and it did not require much persuasion to induce

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.