CBMS4303 Management Information System - Cdec19
CBMS4303 Management Information System - Cdec19
2.3.3 Environment 49
2.3.4 Problem-solving 50
2.4 System Approach 55
2.5 Preparation Phase 56
2.6 Definition Phase 57
2.7 Solution Phase 60
Summary 62
Key Terms 63
Topic 9 Security and Social Issues Related to Information System (IS) 195
9.1 The Importance of Security 196
9.1.1 Objectives of System Safety Management 197
9.2 Security and the Internet 197
9.2.1 Security and E-commerce 199
9.3 System Security Threats 201
9.3.1 Viruses, Spyware and Adware 202
9.3.2 Insider Abuse of Internet Access 203
9.3.3 Laptop or Mobile Theft 204
9.3.4 Denial of Service (DoS) 204
9.3.5 Unauthorised Access to Information 205
9.3.6 Abuse of Wireless Networks 205
9.3.7 System Penetration 205
9.3.8 Telecom Fraud 207
9.3.9 Theft of Proprietary Information 207
9.3.10 Financial Fraud 208
9.3.11 Misuse of Public Web Applications 208
9.3.12 Website Defacement 209
9.3.13 Sabotage 209
INTRODUCTION
CBMS4303 Management Information System is one of the courses offered at Open
University Malaysia. This course is worth 3 credit hours and should be covered
over 8 to 14 weeks.
COURSE AUDIENCE
This course is offered to all learners taking the Bachelor of Information
Technology, Bachelor of Business and selected Science and Technology
programmes. The course provides learners with a firm foundation in analysing a
wide range of management information systems. This course guides learners
systematically in acquiring the analytical and design skills required in grasping
fundamental concepts of management information systems.
As an open and distance learner, you should be able to learn independently and
optimise the learning modes and environment available to you. Before you begin
this course, please ensure that you have the right course materials and understand
the course requirements as well as how the course is conducted.
STUDY SCHEDULE
It is a standard OUM practice that learners accumulate 40 study hours for every
credit hour. As such, for a three-credit hour course, you are expected to spend
120 study hours. Table 1 gives an estimation of how the 120 study hours can be
accumulated.
Study
Study Activities
Hours
COURSE SYNOPSIS
This course is divided into 10 topics. The synopsis for each topic is presented
below:
Topic 2 introduces types of models and system elements, such as the system
standard. Generally, the system standard is the performance level achieved by the
system output. Managers will ensure the system standard is fulfilled by comparing
the output system and the system standard. You will also be introduced to two
management strategies known as management through exception and critical
success factors (CSF). The system approach will also be introduced at the end of
the topic.
Topic 5 introduces you to the decision support system (DSS). In this topic, we will
discuss the decision-making process and how DSS helps managers make effective
decisions. You will recognise DSS as a system that provides communication
facilities which include information in helping consumers solve problems. You
will also learn the format or structured information that results from DSS such as
special reports and periodic report formats.
Topic 6 introduces you to the executive information system (EIS). EIS is a system
that provides the updated information, history and perhaps some anticipation
about the status and environment of the company in supporting the administrative
tasks and decision-making process of executives. You will learn how an EIS helps
managers in their daily work and the decision-making process.
Topic 7 addresses one of the branches of artificial intelligence (AI) called the expert
system (ES). The ES is also known as the knowledge-based system. An ES can be
used to solve many problems that occur in an organisation such as complex
decision-making. The ES comprises many types of expert systems based on rules,
frames or bases on fuzzy sets. In this topic, you will be exposed to the most
popular ES which is based on rules.
Learning Outcomes: This section refers to what you should achieve after you have
completely covered a topic. As you go through each topic, you should frequently
refer to these learning outcomes. By doing this, you can continuously gauge your
understanding of the topic.
Summary: You will find this component at the end of each topic. This component
helps you to recap the whole topic. By going through the summary, you should be
able to gauge your knowledge retention level. Should you find points in the
summary that you do not fully understand, it would be a good idea for you to
revisit the details in the module.
Key Terms: This component can be found at the end of each topic. You should go
through this component to remind yourself of important terms or jargon used
throughout the module. Should you find terms here that you are not able to
explain, you should look for the terms in the module.
References: The References section is where a list of relevant and useful textbooks,
journals, articles, electronic contents or sources can be found. The list can appear
in a few locations such as in the Course Guide (at the References section), at the
end of every topic or at the back of the module. You are encouraged to read or
refer to the suggested sources to obtain the additional information needed and to
enhance your overall understanding of the course.
PRIOR KNOWLEDGE
No prior knowledge is needed for this course.
ASSESSMENT METHOD
Please refer to myINSPIRE.
REFERENCES
Boddy, D., Boonstra, A., & Kennedy, G. (2005). Managing information systems: An
organisational perspective (2nd ed.). Harlow, England: Pearson.
Isenberg, D. J. (1984). How senior managers think. Harvard Business Review, 62,
80−90.
Kotter, J. (1982). What effective general managers really do. Harvard Business
Review, 60(2), 157−169.
Laudon, K., & Laudon, J. (2015). Management information systems: Managing the
digital firm (14th ed.). Upper Saddle River, NJ: Pearson.
McLeod, R., & Schell, G. (2007). Management information systems (10th ed.).
Upper Saddle River, NJ: Prentice-Hall.
Rainer, R. K., Prince, B., & Watson, H. J. (2015). Management information systems
(3rd ed.). Hoboken, N.J: Wiley.
Turban, E., Sharda, R., & Delen, D. (2010). Decision support systems and business
intelligence systems (9th ed.). Upper Saddle River, NJ: Prentice-Hall.
INTRODUCTION
Before we start, let us look at the following scenario:
Can you think of a way to make your work easier? How can you compile all the
information provided by these shops? This is where IS comes into the picture.
Since you have all the information you need (such as sales figures in an Excel
sheet), all you need is a system to process these information instead of you
processing it manually. This system is what we call information system (IS).
In this topic, we will discuss the differences between data and information and
knowledge, and the meaning of information technology (IT) and IS. This topic will
also elaborate on the importance of information management, the types of users
and their respective management and the emerging trends in IS. Let us get started!
Data and information are used together in any field. However, both have different
meanings.
Data is the basic fact or raw fact which consists of texts, diagrams, graphics,
images, and audio and video clips which are meaningless.
One example of data is the studentsÊ list which consists of name, matrix number,
gender, course and address. Can you name a few examples of data?
In other words, information is simply the data which has been processed in order
to be meaningful to the users. „Process‰ here means the operation to change the
type and content of the data. Data in the studentsÊ list can be processed to be
generated as a report or graph that shows the percentage of female students as
compared to male students who are registered in the university; or the percentage
of students according to the courses offered by the university.
Other data processing operations are arithmetic operations, data summary, time
scheduling and so on. The information processor can be the computer components,
non-computer components or a combination of both, which can convert data into
information.
Nevertheless, the definitions of data and information are different according to the
user who wants to use them. Data can be seen as information and vice versa
according to different individual opinions. For instance, a telephone bill is a group
of data that is meaningless to the president of a telecommunications company, yet
useful to the customers who want to pay the telephone bill.
Now that you are clear about data and information, let us shift our discussion to
knowledge. What is knowledge?
According to Boisot (as cited by Boddy, Boonstra & Kennedy, 2005), knowledge
builds on information that is extracted from data. Knowledge is derived from
information in the same way information is derived from data; it is a personÊs
range of information. Knowledge embodies prior understanding, experience and
learning, whereby it is validated or amended as people receive information. With
knowledge, a person would be able to identify significant patterns or trends and
get a different understanding of the information.
Let us look at Figure 1.1, which shows the relationship between data, information
and knowledge.
SELF-CHECK 1.1
Based on Laudon and Laudon (2018), Table 1.1 provides a general understanding
of IT.
We have seen the meaning of system. What about IS? Well, here is the meaning
of IS:
Besides that, IS may also support managers and staff to analyse problems, visualise
complex subjects, and invent new products and services.
(c) Analyse problems that arise due to internal or external factors based on
current and historical data information.
(d) Visualise, conceptualise and simulate any complex scenario that may directly
affect the organisation.
In this modern age, the success of a business depends on the IS. Many
organisations today use information systems to offer services with greater
satisfaction to customers, to access a wider range of information, to handle
business changes at a greater speed and to increase the productivity of workers.
Based on a number of research, an effective IS should be able to exceed customer
expectations and fulfil business needs.
(a) Input
(i) Input gathers or captures raw and unprocessed data from within the
organisation internally or from its external sources.
(ii) External sources include customers, suppliers, competitors,
government agencies and shareholders.
(iii) Technology devices used are computers, mobile phone, tablets,
scanning devices and many more. These devices will have access to the
IS application via various network mediums or the Internet.
(b) Processing
(i) Processing converts raw data input into meaningful information.
(ii) The conversion process includes classification, arrangement,
manipulation and calculation.
(iii) Processing will take place in the IS applications, database application
and storage systems. Normally, this will take place in the designated
servers in the organisations data centre.
(c) Output
(i) Output transfers the processed information to the organisationÊs
managers and staff who will use it or to the functions for which it is used.
(ii) Output also provides feedback, which is returned to the organisation in
terms of complaints that should be rectified immediately via corrective
measures or suggestions of improvement that can be used to advance
the system and the business process of the organisation in total.
However, you must remember that an IS does not only contain data and
information. There are also other elements inside the system, which are related
and in support of one another. The presence of these related elements makes
information more useful whereby it can be made available, processed, distributed,
manipulated, saved and so on. This combination gives rise to a system, which is
orderly and thus called an „information system‰.
A management information system (MIS) is the earliest form of IS that has long
been developed in business organisations with the aim of supplying information
to assist managers in carrying out various daily activities. It was set up to ensure
that the process of planning, controlling and monitoring can be implemented more
efficiently and effectively. A MIS usually includes information processing
capabilities that include collecting, processing, storing and disseminating data in
the form of information through analytical processing and conveying information
to whoever needs it whether externally or within the organisation.
ACTIVITY 1.1
Search the Internet in order to find out how a MIS is related to an
organisationÊs business. You may use the keywords such as „MIS‰ AND
„business‰ or „information system‰ AND „business operations‰.
Discuss your findings with your coursemates in the myINSPIRE forum.
SELF-CHECK 1.2
Resources are owned and prepared, so they can be used when needed. Normally,
the preparation processes involve the transformation of raw materials into usable
materials, for example, assembling a computer and training the workers. After this
process, managers will try to optimise the usage of the resources. They can reduce
the rest time of the resources to a minimum level as well as ensure the resources
are utilised at the most efficient level. Subsequently, the managers will change the
resources at a suitable time before they become obsolete or inefficient.
Thus, managers must give priority to information systems due to several factors
as shown in the following Figure 1.5.
The number of workers in the service sectors such as sales, education, health,
banking and legal firms is higher than that in the agricultural and
manufacturing sectors. These workers provide services that involve the
application of technology and information systems to create and spread
information and knowledge. Information-based services such as Web portals
(Yahoo, Google), databases (IEEE, Lexis) and e-commerce (Amazon.com) are
growing rapidly and these firms have millions of workers.
Digital firms have more flexibility when dealing with any economic changes
due to its faster responses towards the environment. With this ability, digital
firms are able to operate globally and continuously in a 24/7 mode.
Employees in a digital firm can be based anywhere globally to support the
business objectives.
Managers will need to use IS and IT as tools to create new products or services.
With the information gathered from customer feedback, it will be easier to
provide a product that will satisfy the customers. One of the most popular
SELF-CHECK 1.3
An information system (IS) user is any individual who uses the IS for a
specific purpose, such as to access information, update data, process
information, conduct transactions and generate a report.
Users come from many categories and designations. They can either be from inside
or outside the organisation. When the IS was first introduced, the users were mainly
clerks in account departments whereby a computer was used only for accounting
applications such as payroll, inventory and billing. Information generated by the
accounting applications was then used by the organisationÊs manager.
The evolution of computer systems from the accounting information system (AIS)
to the MIS has changed the perspective of using information, from only recording
the organisationÊs transaction to assisting managers in solving organisational
problems. The MIS is able to support the information requirement of the
management.
SELF-CHECK 1.4
Table 1.2: Example of Job Scope for Various Management Levels of an Organisation
Managers at the top level are also known as executives. The executives
are the president and vice president, who establish the executive
committee which solves the organisationÊs issues.
SELF-CHECK 1.5
1. In your opinion, is there any management environment whereby
the manager needs to do all three types of planning?
2. Look at Figure 1.7 again. Briefly explain what you understand by
the needs of information in every level of management in
decision-making?
In 1914, Henri Fayol, a French theoretical management expert identified five main
functions of a manager:
(a) Planning;
(b) Organising;
(c) Staffing;
(d) Directing; and
(e) Controlling the resources effectively.
Look at Figure 1.8, which shows the influence of the respective level of
management towards the focus on implementing management functions;
management functions can provide guidance in developing an IS.
Figure 1.8: The influence of the management levels towards the focus on implementing
management functions
Now that we already know the skills and competencies required by managers how
does it fit in the different levels of management? Figure 1.10 below will show the
different levels of skills or competencies important in each management level.
Figure 1.10: Important skills required by managers from different levels of management
ACTIVITY 1.2
Computer and information literacy do not depend on each other, even though they
are related and complement each other. Some managers are information literate
but lack computer literacy. However, it would be ideal if managers acquire both
skills.
System
Description Input Processing Output Users
Type
TPS/ Computerised Transaction; Picking; listing; Detail Operation
AIS system which events merging; report; list; staff;
executes and updating summary supervisor
records the
routines or daily
transactions of the
organisation.
MIS Provides Summary Routine report; Simple Middle
management data simple model; report manager
information in the transaction; low level
supporting, high volume analysis
planning, data; simple
controlling and report
decision-making
functions by
generating special
and periodic
reports.
OAS Computer system Document; Document Document; Clerical staff
such as word schedule management; schedule
processing, schedule; mail
electronic mail communication
system and
scheduling
system that is
designed to
increase the
productivity of
staff.
Let us now look into how the different types of information systems integrate with
each other to create a complete IS solution for the organisation. Based on Laudon
and Laudon, Figure 1.11 shows how a typical MIS transforms transaction-level
data from inventory, production and accounting into MIS files that are used to
provide managers with comprehensive reports.
The three TPS supply summarised transaction data to the MIS reporting system at
the end of the time period. Managers gain access to the organisational data
through the MIS, which provides them with the appropriate reports.
SELF-CHECK 1.6
Information experts are members of the staff who are responsible for the
development and organisation of the firmÊs IS.
ACTIVITY 1.3
Are there any organisations that do not have any of the information
experts as mentioned in Subtopic 1.5.1? List the effects or disadvantages
of such a situation. Share your answers in the myINSPIRE forum.
LetÊs look further on the latest trends and technologies that have a significant
impact on MIS and the businesses (see Table 1.4).
SELF-CHECK 1.7
Data is a raw fact which is meaningless while information is the data that has
been processed into meaningful form. Knowledge is derived from information
in the same way information is derived from data.
Information technology (IT) and information system (IS) are major enabling
tools for organisations to develop new products and services, as well as
creating new business models.
The main types of information systems are the accounting information system
(AIS), management information system (MIS), office automation system
(OAS), decision support system (DSS), executive information system (EIS) and
expert system (ES).
Boddy, D., Boonstra, A., & Kennedy, G. (2005). Managing information systems: An
organisational perspective (2nd ed.). Harlow, England: Pearson.
Laudon, K. C., & Laudon, J. P. (2018). Management information systems:
Managing the digital firm (15th ed.). Upper Saddle River, NJ: Pearson.
McLeod, R. (2006). Management information systems (7th ed.). Upper Saddle
River, NJ: Prentice-Hall.
LEARNING OUTCOMES
By the end of this topic, you should be able to:
1. Explain various elements of a system;
2. Describe the four types of models and their usage in business;
3. Discuss the general model system (physical and conceptual system)
in organisations;
4. Explain the concept of problem-solving; and
5. Apply the system approach in problem-solving.
INTRODUCTION
In this topic, you will be introduced to the system concept, which is important for
modelling and problem-solving especially involving information systems. An
information system (IS) is usually derived from sets of organisational
requirements and problems that need to be rectified. The managers must have
knowledge and understanding about the whole concept of the IS.
With this knowledge, managers need to ensure the information systems are able to:
(a) Capture the right and relevant input into the IS;
(b) Perform the right processes on the data capture; and
(c) Produce relevant and significant information as output such as reports.
This topic will introduce models which can assist managers in solving problems,
namely, physical, narrative, graphical and mathematical models. You will see
more details of the general system model elements which include the physical
system and conceptual system. You will also be introduced to another system
element called standard. Generally, standard is the performance level achieved by
the system output. Managers ensure the system standard is fulfilled by comparing
the output system and standard. Actions can be taken if the output is more or less
than the standard. Let us continue with the lesson!
For a system, input resources are transformed to output resources. The control
mechanism monitors the transformation process to ensure the system achieves the
process objectives.
To understand this better, let us look at a few examples. The human body has
several systems which possess control mechanisms. Note how our respiratory
systems make us sweat in the hot weather so that our skin becomes cooler, while
our hair rises to trap more heat in the cold weather. Have you ever experienced
food poisoning before? If yes, you will remember how frequently you had to go to
the toilet, or how you vomited all day as your digestive system flushed out the
toxins in the body. The reaction occurs because the control mechanism in our body
system changes the normal transformation process.
Now, look back at Figure 2.1. In a system, the control mechanism is connected by
a feedback loop (as shown in the arrow flow). The control mechanism monitors
the systemÊs performance by comparing the feedback signal with the systemÊs
objective. If the system output achieves the objective, then the system will be in a
stable condition. In the unlikely event that the system output does not meet the
systemÊs objective, a signal is sent to the system input so that necessary action can
be taken to change the system operations.
Meanwhile, the closed-loop system has three control components, namely, control
mechanism, feedback loop (comprising input, transformation and output) and
objective, as illustrated in Figure 2.1. An example of this system is the budgetary
control system in an organisation in which during the budget presentation, the
issues are communicated through the feedback system and each expenditure is
compared with the objectives through the control mechanism.
Most of the systems that exist are open systems. An example is the election voting
system which counts voting input from voters around the country and declares
the results back to them.
You might have conducted a science experiment in the laboratory during your
school days. Was the experiment connected to any environmental elements
outside the laboratory? If the answer is no, then the system conducted in the closed
and remote laboratory is a good example of a closed system.
2.1.5 Subsystem
A system has many stages. For instance, the human body has many systems such
as the respiratory system and the digestive system, which, in turn, have many
subsystems that can be further divided to a single cell. For example, a system in a
clinic has many subsystems, which can be divided into the simplest form. A system
in a clinic may have the registration, appointment and medical treatment
subsystems for instance. Figure 2.3 shows an example of a system that has many
subsystems.
Conceptual resources are data and information. The conceptual system exists as
an idea in the managerÊs mind, graphs, papers or data statements captured on the
screen.
However, data and information which are stored in the system are the conceptual
system which reflects the physical system. Through the manufacturing conceptual
system, managers can identify the quantity of raw material used, transformation
process sequences, workers who handle the manufacturing operation, quantity
and destination of finished products on a daily, weekly or monthly basis.
SELF-CHECK 2.1
2.2 MODEL
What is a model? A model is a representation of things; like an object, a concept or
a real activity known as an entity. The model is used to represent problems, which
need to be solved in a form that is easily understood. The types of models and their
usages are explained in the next subtopic.
ACTIVITY 2.1
1. Search for a data flow diagram (DFD) and entity relationship
diagram (DFD) in the Internet. Based on the website that you
found, discuss the details on how DFD and ERD are developed for
an IS. Share your ideas in the myINSPIRE forum.
2. Based on the four types of models, develop a diagram which links
all the models. Compare the diagram with your coursemates in the
myINSPIRE forum.
SELF-CHECK 2.2
If you are a manager, which model would you prefer to use and
explain your choice.
Input resources are extracted from the environment, processed to form the output
resources and then returned to the same environment. Since interaction exists
between the organisation and its environment through physical resources, the
organisationÊs physical system can be classified as an open system.
If we look at the example of the process of producing cooking oil, we can imagine
how input resources such as palm oil are processed to be cooking oil. The palm oil
is extracted from the organisationÊs environment while the cooking oil is marketed
to the customers living within the environment.
On top of this material flow, there are other types of flow such as material flow,
personnel flow, machinery flow and monetary flow.
There are some personnel who will work until retirement, while others may
resign earlier. In both cases, the personnel will then return to their
environment.
ACTIVITY 2.2
How can a control mechanism be linked to the flow of resources to
enable progress monitoring and system development? Discuss with
your coursemates in the myINSPIRE forum.
(ii) Accurate
Information must be accurate and without errors. It is especially
important when it involves issues pertaining to salary, loans and bills.
The future forecast and performance report must also be produced
accurately by using accurate information.
(iii) On Time
Information must always be available when it is needed. Past and
latest information can help the manager decide better.
(iv) Complete
Information must be comprehensive and complete but not excessive to
the point of being irrelevant to the problem being solved.
(b) Standards
What are standards?
Every system has at least one objective. Even though objectives are stated in
general, something more specific must be determined to measure whether
the systemÊs objectives can be achieved.
Therefore, the conceptual system controls the physical system by using three
important components, which are management, information processor and
standard.
2.3.3 Environment
In the general system model, resource flows into the organisation from the
environment and will return to the environment after completing the
transformation process. The environment completes the general system model, as
shown in Figure 2.11.
2.3.4 Problem-solving
The manager will make several decisions when solving a problem. Decision-
making is an action taken following a decision or strategy that is considered to be
a better solution to the problem.
Term Definition
An outcome that has been agreed upon to plan for the next step of
Decision
action.
The IS can be used to evaluate each alternative solution. The evaluation has
to consider any constraints within and outside the organisation. They are two
types of constraints namely:
(i) Internal constraint is limited to the resources in a firm.
(ii) External constraint refers to constraints from the firmÊs environment
which limit the flow of the resources to and from the firm.
For example, a doctor will study the symptoms to know the cause of a
disease. In the same vein, managers must study the symptom of any
circumstance such as reduction in sales; the actual problem is why sales have
decreased.
For example, the equation „Profit = Sale – Cost‰ can explain why the
organisationÊs profits increase or decrease.
Some problems are not understood by the manager and they are known as
non-structured problems. The problem of human behaviour is an example of
this type of problem.
ACTIVITY 2.3
1. In your opinion, why should the solution to a problem be planned
carefully and what are its components? Discuss with your
coursemates in the myINSPIRE forum.
2. How can a problem be identified in an organisation? Discuss
among your coursemates in the myINSPIRE online forum.
ACTIVITY 2.4
How does the system approach help to solve a problem? Discuss and
share your answer among your coursemates in the myINSPIRE forum.
This phase consists of two main steps, namely continuing from the system level to
subsystem, and analysis of parts of the system according to certain sequences.
Firstly, the manager studies the status of the organisation in the perspective
of its relationship with the environment. Among the questions studied are:
(i) Whether the organisation has a balanced relationship with its
environment or not;
(ii) Whether the flow to and from the organisationÊs environment occurs
as it should or not; and
(iii) Whether the system achieves its objective in producing products and
services for its environment or not.
Then, the manager analyses the system from the aspect of the subsystem.
Every subsystem will be studied to see whether it functions together with
other subsystems to achieve the systemÊs objective.
Briefly, this step aims to identify subsystems that are problematic so that the
problem can be addressed.
ACTIVITY 2.5
The solution phase is the last phase in the system approach. In your
opinion, what action can be taken if the solution is not found? Discuss
with your coursemates in the myINSPIRE forum.
SELF-CHECK 2.3
1. Define the following:
(a) Standard; and
(b) Problem.
There are four types of models, namely, physical, narrative, graphical and
mathematical.
The model has a standard which determines the systemÊs performance that
needs to be achieved and information processor which produces information
for the actual performance of the organisation.
Problems exist when there are differences between information from the
standard and information processor. The manager solves the problem, which
affects the organisation either in a positive or negative manner.
The system approach can be used by the manager when solving problems. The
system approach consists of three phases, namely, the preparation, definition
and solution phases. Every phase has certain steps that can be used as
guidance.
INTRODUCTION
The development of information technology (IT) facilities is closely related to the
business objectives of an organisation. This is evident from research on the
requirements of information for enhancing organisational results.
In this topic, you will also be exposed to the business strategy concepts such as
strategic management, the Porter value chain model, supply chain management,
industrial level strategy and how these concepts are related to information system
(IS). Happy reading!
Therefore, information architecture is needed and it stands for the mapping of the
information needs of an organisation, its direction, management and
implementation, both now and in the future.
Look at Figure 3.1 carefully. Can you see, in general, the effects from this
relationship on the approach for constructing information architecture and the
usage of IT in the organisation? IT planning and usage begin from the top. The use
of technology must start with an analysis of the organisational needs in the context
of the business the organisation is in. It must also support the organisationÊs
business planning and objectives.
Therefore, the process of designing IT involves current and future users, as well as
the management and planning personnel in the organisation. It is not the work of
technologists alone.
Only at the end of the process of designing information architecture would the
technology be chosen to support operational processes.
ACTIVITY 3.1
1. Visit the website for General Electric (GE) (www.ge.com) and
compare it with the website for Kodak (www.kodak.com).
Differentiate the organisational objectives of these two websites.
2. Plan an approach for developing an information architecture from
the bottom, which is by looking at the current available technology.
Then, suggest the IT development that can operate it. Following
this, compare it with the approach discussed previously.
However, the IS initially began from electronic data processing era. The usage of
mainframes at that time supported basic business needs. Nowadays, IT has
changed tremendously; thus, organisations must be able to adapt to these changes
in order to be competitive.
Based on Laudon and Laudon (2018), there have been five eras in this evolution,
each representing a different configuration of computing power and infrastructure
elements. Figure 3.2 provides an overview of these five eras.
other. All systems will produce their own sets of reports and managers are required
to make decisions based on these manual hardcopy reports that usually are not up-
to-date with real-time data. Thus, it would be difficult for the managers to
understand the whole business situation and make any strategic decision.
How can we solve this problem? It can be done by integrating all the information
systems based on a pre-defined required business process. For example, the sales
records from TPS need to reflect the financial reporting in AIS. With this, an
enterprise system will be created in the organisation.
Both these factors rely on the type of business the organisation is involved in,
whether in the form of a service offered or the production of goods, and the
companyÊs characteristics of being either local or global.
An organisation usually has a single head office that is the location for policy
making, strategic planning and company performance analysis. Going down
another level, this company may be divided into divisions that may be located in
different sites.
These divisions will then be divided further into units. In an organisation that does
not have many branches in many different places, the division may be based on
function, that is, a division or unit represents a certain function.
The smallest unit that performs the main functions of the organisation is called a
department. Normally, an organisation is divided into the following departments
(there could possibly be more departments):
(a) Accounts;
(b) Finance;
(c) Sales and marketing;
(d) Production and operation management;
(e) Human resource management; and
(f) Information systems.
SELF-CHECK 3.1
List the types of organisational structures and compare them from the
perspective of the most appropriate structure at a given time.
Level Characteristic
Organisational level An IS that is larger and more complex that can provide a
connection of information systems among organisations. This
system enables the same information to be used among
different organisations.
For example, back in 1998 the failure of IT caused the operations at the new Hong
Kong airport to be halted for several days. A similar occurrence was experienced
by the company Hershey Foods in the United States in 1999 when the failure of a
newly installed IT system caused losses and a drop in profit that amounted to more
than USD20 million during the third quarter of that year. This scenario made the
issue of IT management very critical.
(b) Ensuring that Technology can be Adapted According to Changes that Occur
Change is inevitable for advancement. Hardware technology and computer
software change relatively quickly. This change will create problems for the
user if proper management and planning are not performed. The question
that arises here is how can a person manage the IT requirements according
to the changes? The answer is that all changes in technology need to be
anticipated and planned for even earlier.
(c) Privatisation
Privatisation of IT support services wholly to external companies known as
system integrators. These companies offer services in several forms such as:
(i) Application service provider (ASP), which usually focuses on the
service needs of a company with regard to software including
databases, company resource planning and customer relations.
(ii) Business service provider (BSP), which develops Internet software that
can be bought through Web technology.
(iii) Internet service provider (ISP), that is, a company that provides a
service to connect the customers to the Internet and related services.
(iv) Wholesale service provider (WSP), which provides grouped
application packages that are distributed through the Internet.
In the next subtopic, we will discuss the aspects of how IT can be used to support
the organisationÊs business strategy.
SELF-CHECK 3.2
1. What are the two main goals of IT management?
We will now continue our discussion on the strategic management concept, the
Porter value chain model, supply chain management, industrial level strategy and
IS which cover the competitive and network economy. You must know that each
IS discussed in this module is integrated within one another. The information
systems can solve organisational problems. Effective strategic planning can
integrate information systems in an organisation.
Strategic IS changes the way a firm handles a business and transaction in depth
and in detail. Generally, there is no complete strategic system. What is available is
a few systems operating at different strategic levels whether at the business, firm
or industry levels, and these systems combine to become what is known as
strategic information systems.
ACTIVITY 3.2
Imagine that you are working in a recruitment agency. In your opinion,
do you think support staff need to know the strategic direction of the
organisation? Why? Discuss this matter in the myINSPIRE forum.
ACTIVITY 3.3
In your opinion, how can the support staff contribute their ideas and
expertise to make the organisation competitive in the market? Discuss
this matter in the myINSPIRE forum.
The value chain model can assist in increasing competitive forces by identifying
the focus point of the critical and specific influence where IT can be used effectively
to reinforce the position in the competition.
By looking at Figure 3.8, you may find that the activities can actually be categorised
as:
Businesses can develop new scopes for their markets by differentiating the focus,
that is, by identifying specific targets for each product and service so that both can
deliver the best service. A firm can offer better products and services to a specific
target compared to currently available products and services offered by the
competitors. Information systems can give a competitive advantage to firms by
producing data to enhance sales and marketing techniques.
Data can be gathered from a huge group of information resources such as credit
card transactions, purchasing data from points of sale, and demographic data from
websites. Companies can collect data internally or purchase the data from other
organisations. Through pattern assessment of customer purchasing, companies
can define a detailed image on purchasing interest, develop a relationship with
customers and prepare specific products and services.
Organisations use the CRM system to assist in managing their relationships with
customers. It provides all relevant information such as sales, marketing, customer
purchasing behaviour, customer satisfaction, after-sales services and customer
retention. This will allow organisation to coordinate all their business processes in
dealing with customers. Thus, increasing profit and creating new opportunities for
organisations to obtain more revenue.
Figure 3.10 shows the relationship between strategies at various levels of business.
This partnership enables firms to get new customers, open new opportunities for
cross-selling and product targets, as depicted in Figure 3.11.
In addition to this, partnership allows the collaborating firms to share the purchase
of hardware and software. Sometimes, traditional competitors can gain benefits
from this partnership. At the industrial level, two types of analytical models are
used:
ACTIVITY 3.4
Do you think countries need partnership blocks such as the European
Union or East Asia Economic Cooperation? Discuss this matter with
your coursemates in the myINSPIRE forum.
An enterprise may fully benefit from the Internet in its organisational connections
by using all the facilities offered by the Internet to connect all its Web pages at the
global level, while the intranet can be used to contact its subsidiary companies at
other locations. The extranet can be fully realised to form relations with its other
partners.
The use of the Internet in business has helped set up millions of new businesses
that operate at a minimal capital cost but cover the whole world. It also helps
organisations to save cost on internal and external communication. How can this
happen? It is done through several forms of creative and productive Internet use.
Figure 3.12 shows briefly the use of the Internet in businesses.
The need for information technology (IT) architecture has become the
supporting structure or platform for the implementation of an information
system (IS).
When an organisation makes the IS part of their corporate strategy, the internal
structure of the organisation also needs to change to reflect current
developments.
Managers need to restructure all organisational processes so that they can take
advantage of sophisticated IT. Such changes will bring changes to the
organisational borders (internal and external).
Suppliers and customers need to closely communicate and perhaps share the
responsibility to fulfil demands.
INTRODUCTION
In order to achieve success, an organisation needs a detailed and effective planning
process. The management plays a very important role in this process. Failure to
formulate an effective strategic plan will cause the organisation to lag behind its
competitors in the market.
In this topic, we will look at the contribution of information systems in helping the
management to conduct better and more effective planning. Information system
(IS) serves as the main tool for competing in the world of business. Redesigning an
organisation with an IS is a wise step by the management if it intends to compete
in a borderless world.
You will also learn about two important and popular information systems used in
organisations, namely, management information system (MIS) and transaction
processing system (TPS). Happy reading!
(b) The use of an IS in the organisation must be planned like how the
implementation of other complex resources are planned. An IS comprises not
only computers, but also hardware, software, telecommunications, people,
procedures and data.
(c) IT is a resource that is owned by all organisational staff, not only the IS
department.
(d) The upper management must recognise the IS as a resource to achieve
strategic goals, not merely as a support for problem-solving.
Once the management understands these points and agrees to the use of an IS for
the overall activities of the organisation, the planning of the system development
can commence.
There are several steps to ensure the success of the IS planning process. Figure 4.1
shows the steps necessary in the planning of an IS.
(b) IS Mission
The management of the IS plans the mission of the IS based on the goals of
the organisation. The mission encompasses the goals to be achieved with the
use of an IS that is consistent with the goals of the organisation.
(c) IS Vision
The manager of IS outlines the vision of the IS in relation to the hardware,
software and telecommunications that can contribute to the achievement of
organisational goals. For example, the customer is allowed to access the
organisationÊs website.
(g) Budget
Organisational activity planning that suits the financial resource.
SELF-CHECK 4.1
If this goal is not achieved, and the use of the IS adds to the organisational burden,
the management should perhaps think it over.
ACTIVITY 4.1
In your opinion, what are the changes that may occur in an organisation
with the implementation of an IS. Discuss with your coursemates in the
myINSPIRE forum.
ACTIVITY 4.2
Refer to Laudon, K. C., & Laudon, J. P. (2013). Management information
systems – Managing the digital firm (13th ed.). Upper Saddle River, NJ:
Pearson at https://bit.ly/38mtGQj.
Read Chapter 3 (Information Systems, Organizations, and Strategy) and
identify the changes that information systems can bring to an organisation.
Post your answer for discussion in the myINSPIRE forum.
Level of
Category Example
Management
ES – Expert system
All three levels
Other types KMS – Knowledge management system
of management
FIS – Functional business system
Examples of the information systems that are involved are the transaction
processing system (TPS) and process control system.
It gives focus to the preparation of information and the support for managers
to make effective decisions. It assists in decision-making at the highest level of
management (strategic), middle (tactical) and also at the operations levels.
ACTIVITY 4.3
The aim of MIS is to develop a viable system to maximise the effective use of latest
data approaches to management practices. It is also aimed at assisting higher
management and managers of organisations to construct timely and accurate
information, not only to decide current and future operations, but also to identify
potential problems that need to be rectified.
With MIS, organisations save valuable time for their workforce and ultimately
save operational costs. Where in the past, business information had to be manually
processed for filing and analysis, it can now be entered immediately and easily
into a computer by a data processor, enabling faster decision-making and quicker
reflexes for the organisation as a whole. This had pretty much helped decisions
made in organisations, as effective decision-making demands accurate, timely and
relevant information. MIS cannot create business strategies by themselves but they
can assist management in understanding the effects of their strategies and help
enable effective decision-making. MIS systems can be used to convert data into
information useful for decision-making.
ACTIVITY 4.4
Can you think of a system that you are using in your learning
institution (such as registration system, learner management system)?
Can the system that you have identified be categorised as an MIS?
Discuss this matter with your coursemates in the myINSPIRE forum.
The input for MIS is information produced from internal data, which is obtained
from the results of the transaction processing system (TPS) and external data.
The output is a collection of reports that are distributed to the managers. These
reports are divided into three main categories, which are:
The system gathers all the departmental transactions into several batches,
prepares them for processing and then processes them at the end of each
operation day.
For example, a wage system collects all the information related to attendance
and the number of working hours each day within a working month. While
waiting for the end of the month to process the data, the information may
still be updated if required. When the set time arrives (such as end of the
month), the system calculates the total working hours and the wage that each
worker should receive.
For instance, when you make a booking through a tax-free channel, your
booking will be taken and entered into a computer. Even though the booking
has been entered into the computer, it may only be processed after office
hours or at the following day.
ACTIVITY 4.5
(i) The process of obtaining and collecting the data required for a complete
transaction.
(iii) The method of entering data can be implemented in various ways, such
as:
Using the keyboard.
Source data automation – It is faster and its accuracy is guaranteed
because the data collected will be scanned straight into the system
from its source. Example: Scanning using a barcode reader in a
supermarket.
(i) The process of carrying out calculation and data transformation which
are related to the business transaction.
(ii) This includes the classifying of data into certain categories, performing
calculation and storing data in a database for the next process.
(iii) Examples:
• The calculation of a studentÊs average marks in a semester will take
into account the total marks attained by the student, which are
divided by the total credit hours taken.
• A wage system that multiplies the number of working hours with
the wage per hour of each worker.
(i) The process of updating one or more databases with a new transaction.
(ii) After the database is updated, other systems can obtain and use the
data for other processes.
ACTIVITY 4.6
After learning about the characteristics and activities of the TPS in
general, can you think of the TPS examples that are usually performed?
Share your views with your coursemates in the myINSPIRE forum.
(vii) Scheduling
For example, for sending fresh vegetables from the farm to the city
centre, a system determines whether transport by train or lorry will
ensure that the vegetables will arrive fresh at their destination.
(i) Inventory
Operating like the inventory system discussed previously.
(iii) Receiving
(iii) Salary
Relating to the salary payment transaction beginning with the calculation
until the production of a report in the form of a payslip.
A summary of the main applications for traditional TPS are shown in Table 4.2.
Table 4.2: Some Subsystems that Support the Order Processing System, Purchasing
System and Accounting System
SELF-CHECK 4.2
• The organisational changes may occur with the use of information systems and
this change is normally divided into four parts, which are automation,
rationale procedure, business process restructuring and paradigm shift.
Hammer, M., & Champy, J. (1993). Reengineering the corporation: Manifesto for
business revolution. London, England: Nicholas Brealey Publishing.
Stair, R., & Reynolds, G. (2005). Principles of information systems (7th ed.). Boston,
MA: Course Technology.
INTRODUCTION
You have just learned several information system (IS) concepts such as the use of
IT in strategic planning and system concepts. The system is developed according
to information obtained from the end user. However, did you know that the
information obtained is insufficient to make decisions in solving certain specific
problems, especially problems encountered by strategic management? In this
topic, we are going to discuss the decision-making process and how the decision
support system (DSS) helps managers make effective decisions.
You will recognise DSS as a system that provides communications facilities which
include information in helping consumers solve problems. We will also learn
about the format or structured information that results from DSS such as special
reports and periodic report formats. These reports are generated from managerial
science and mathematical models. Let us continue with the lesson.
5.1 DECISION-MAKING
Before discussing the DSS, let us learn about the decision-making process. Decisions
are made to prevent problems. As a learner, decision-making is vital. You need to
decide on, for example, the courses that you need to take this semester. From the
moment you try to solve any problem, you will encounter multiple decisions. How
do you define decisions and decision-making?
Decisions are forms of actions taken to avoid or to reduce the negative effect,
or to take advantage of a situation.
Figure 5.1 shows the pyramid structure for decision-making for each of the three
levels of management:
(i) Made at the tactical management level like those made by the head of
department or divisional manager.
(ii) Has a guide for reference in order to obtain a more detailed decision
consistent with its authority that is less than the strategic management
level.
(iii) The managers are responsible for making short-term and mid-term
plans for the organisation. Some of the tasks of the managers are:
(iv) The types of problems that need to be addressed by the managers are
simpler than those to be addressed by strategic management but much
more complex than the ones to be addressed by the operations division.
(iv) The common problems encountered are structured problems that can
be solved based on specific procedures, like resolving the problem of
workers who always come late to the office.
(v) Examples of information used by managers at the operations level are
the information related to the processing of wages, detailed
information about daily transactions and information on the process of
producing a product.
SELF-CHECK 5.1
ACTIVITY 5.1
How can a manager prepare a report from all forms of reports, analyse
them and make a decision? Discuss with your coursemates in the
myINSPIRE forum.
DSS is a system based on computer interactivity. DSS helps decision makers use
data and models to solve structured, semi-structured and unstructured problems.
Why do we need to know DSS? We need to do so because in decision-making, the
person responsible for making the decision needs correct, precise and the latest
information in order to make a quality and effective decision.
Apart from that, DSS can be defined as a system that enables managers to solve
semi-structured and unstructured problems.
DSS interactivity helps decision makers use data and models to solve semi-
structured and unstructured problems.
In addition, DSS can help management analyse information from the level of lower
management onwards, including outside the organisation. It is used to manage
unstructured decisions such as „What will happen if⁄?‰ It can also use a database
management system (DBMS), question language, monetary model, electronic
spread sheets, statistical analysis, report generator or graphic software to provide
information. Figure 5.4 provides an overview of how a DSS operates.
(b) Supports the manager in the decision-making process but does not replace
the manager in making decisions.
(c) Concentrates on improving the effective (as compared to efficiency) process
of decision-making by the manager.
The three objectives stated are related to the three basic concepts of DSS; problem
structure, support decision and the effectiveness of decision. Actually, it is difficult
to find completely structured or unstructured problems because most problems
are semi-structured.
The second objective of the DSS clearly shows that a computerised system cannot
in many ways replace humans in decision-making. From this objective, we
understand that the DSS only helps decision makers handle part of the structured
problems but some parts of unstructured problems still require human intuition
and consideration for solutions.
The third objective states that efficiency and the speed of data and information
processing are not the main objectives of a DSS. The main advantage of using a
DSS is to utilise its ability to help users make good quality and effective decisions.
According to McLeod (2006), managers must not find the solutions to their
problems using output from a DSS only because finding the solution or the
decision-making can be done using mathematical models. On the other hand,
managers have their intuition and judgement to fall back on in selecting the
solutions for their problems.
ACTIVITY 5.2
If, for instance, you are given a choice of going to Phuket or Tioman for
a holiday, what are the criteria that would help you make your decision?
In your opinion, does DSS help you choose the best destination if all the
data needed is entered into the system? Discuss with your coursemates
in the myINSPIRE forum.
ACTIVITY 5.3
Observe point (g) of the DSS characteristics given earlier. Explain briefly
this characteristic by providing suitable examples. Compare your answer
with your coursemates by posting your answer on the myINSPIRE forum.
SELF-CHECK 5.2
The lowest support level in DSS Type 1 is to enable managers to obtain specific
information elements. One example is getting the total sales of one department in
one location only. If the system helps to analyse all the files, is it a DSS Type 2? A
manager who wants to create a special report using data from the entire inventory
file is one example. The example only involves one type of file which is the
inventory file.
Often, you have to obtain data and information from multiple sources, and all
kinds of files and from multiple departments. In these cases, the degree of
complexity and support in problem solution is higher. Preparing reports from
multiple types of files is an example of DSS Type 3. You should already be clear
about the need for taxonomy in understanding the DSS concept at this level.
The three types of DSS discussed earlier provide support in forming special reports
resulting from the query or questioning of a database. The other three DSS types
involve the use of a mathematical model or scientific management model in
supporting a manager in making decisions.
An example given by Alter (1976) for DSS Type 4 is the DSS model used to estimate
the effect of a solution. For example, a manager wants to know the effect of
increasing or decreasing the price of products on the monthly and yearly profits of
the company. The manager will input DSS, for example, RM25 per unit. DSS will
show the manager if the product is priced at RM25 per unit; this will lead the
organisation to obtain a profit of RM5,000 monthly.
However, you must understand that the model is not capable of explaining
whether the price of RM25 is the best option for the manager to choose. The system
can only explain what will happen to the profit if that decision is taken. In order to
provide additional support, you can add some DSS models that can analyse risks,
which can be used by the manager through the estimation of analytical
probabilities.
The DSS Type 5 suggests decisions. It gives more support to the decision maker
but the degree of complexity of the DSS increases, such as the DSS that uses the
linear algorithm model. A manager can input data about the structure of a factory
and its equipment into this DSS model. This will enable the manager to produce
the most effective decision.
The DSS Type 6, offers the most support to its user although it is difficult and
complex to develop the solution to his or her problem. An example of use of DSS
Type 6 is when an insurance company sets insurance premiums. Many company
managers let this DSS make decisions for them because they are very confident
with its capability to make good decisions.
ACTIVITY 5.4
Think of the objective of DSS with regard to its important
characteristics. How far can DSS be used to provide the best evaluation
for a certain decision? Discuss your answer in the myINSPIRE forum.
Although they have the same structure but the characteristics, concepts and
objectives of the three information systems are different from one another. As
indicated by Figure 5.5, data and information from the environment are input into
the database. A DSS database might also receive similar data and information from
the FIS and other systems and subsystems. The content of the database will then
be utilised by four subsystem software consisting of:
(i) Report writing software;
(ii) Mathematical model;
(iii) Scientific management model; and
(iv) Groupware.
Innovations in ICT have developed a new DSS concept, that is, the group decision
support system (GDSS). A team that cooperates to achieve a common objective can
use GDSS to improve communication between group members. GDSS provides an
environment conducive to and which supports the decision-making process using
a type of software called groupware.
There are other definitions used to describe the application of information systems
by a group, such as the group support system, computerised cooperative work and
electronic meeting system. Whatever the definitions used, they all can be applied
to all kinds of groups and environments.
You will agree that ICT has made the world smaller because it helps us to
communicate better, even though our friends are thousands of miles away. For
example, specialist surgeons in Europe need not be in Malaysia to perform surgery
as it can be done without moving them here. Thus, the basic theory of the
development of GDSS is to communicate well to produce better decisions.
Figure 5.7: Group size and location that characterise the GDSS environment
For each type of GDSS environment, group members can meet at the same time or
at different times. If group members meet and discuss at the same time, as in a
meeting, this is called synchronous exchange. On the other hand, meetings can
also be held at different times, such as in communicating through e-mail. This is
called asynchronous exchange.
When you look at Figure 5.7, you must be wondering what is meant by decision
room, local decision network and so on. Now, let us have a better understanding
of what they are.
The facilitator must make sure that the discussion stays on track. Have you
interacted on the Internet using Skype or Google Hangouts? If your answer
is yes, this communication takes place in a decision room, which is almost
the same except that the text that is typed is displayed on the big screen.
Other than that, any reference material for discussion can be displayed using
video, colour slides and transparencies.
There are two unique characteristics of GDSS in the decision room which are
parallel communication and anonymity.
(i) Parallel communication occurs when all participants make statements
using the computer at the same time.
(ii) Anonymity means that no participant knows who is making each
statement. Anonymity helps the participants to voice ideas and
statements without fear of being criticised by other participants. Thus,
all ideas and suggestions are evaluated based on meritocracy and not on
who suggests it.
This method is used when it is impossible to gather all members in one room
at the same time.
However, you must realise that not all group software packages are suitable to be
used in a working group. Let us refer to the outline of time or place in Figure 5.8
and you will see the technological differences in supporting a working group
according to time and place.
Other than that, every group software package will use different technology, based
on one package that supports the purpose of the working group, such as the type
of group assignments.
Working software must have at least one of the abilities or components listed;
electronic advisor, conference or an electronic meeting room, group timetable,
calendar, planning, conflict resolution, model development, video conference,
document sharing (such as screen, whiteboard and live board), voting and so on.
Actually, there are thousands of group software packages that contain elements of
Web conferencing software and you can look for information on the Web using a
search engine.
ACTIVITY 5.5
1. What a group software or groupware is? In your opinion, who
would need this kind of software and why?
2. Justify how MIS differs from transaction processing system (TPS)
and from DSS?
Share your justifications in the myINSPIRE forum.
SELF-CHECK 5.3
1. Give the four phases in making decisions as stated by Simon (1977).
2. Give the definition of DSS.
3. What is the objective of DSS?
4. Give four analysis models needed by a DSS.
5. Give the definition of GDSS.
6. What is a legislative session?
The impetus for a decision support system (DSS) is to support the manager in
making decisions effectively. DSS provides the facilities to communicate which
include information that helps them to solve problems.
There are three main objectives in developing a DSS. The first objective is to
help and provide support to the manager in the decision-making process to
solve semi-structured or unstructured problems. The second objective is to
support the manager in the process of making decisions and the last objective
is to improve the effectiveness of the decision-making process.
There are four types of basic analytical modelling activities usually needed in
a DSS. These activities are the what-if analysis, awareness analysis,
information searching analysis and optimisation analysis.
GDSS supports a group of individuals that work together to achieve one aim
by providing an interface to reach and use the shared environment.
Decision rooms provide characteristics that are very different from normal
meeting rooms because they help the members communicate via technology
and room design including its equipment. Decision rooms provide anonymity;
participants do not know who is making each statement.
DSS and GDSS are a part of the management support system technology that
help the managers make good quality decisions, but does not replace them in
making any decisions. This is because in the decision-making phase, humans
still rely on intuition or experience to come up with good ones.
DSS and GDSS are very useful and helpful to companies in making right
decisions. DSS and GDSS are important for many people with techno-savvy
lifestyles as computer mobility enables humans to use computers anywhere to
help them make decisions.
Simon, H. A. (1977). The new science of management decision (3rd revised edition;
first edition 1960). Englewood Cliffs, NJ: Prentice-Hall.
INTRODUCTION
In your opinion, what differentiates a manager of a department from a chief
executive officer (CEO) of an organisation? You might think about the aspects of
their income, personality or maybe social status. However, MartineauÊs
experiment as cited in Jin (2010) discovered otherwise. He found that the biggest
differences between the two were from the working perspective and how work
was executed. Even the type of information system (IS) a departmental manager
used is different from that used by a CEO.
A senior executive officer usually uses the executive information system (EIS). EIS
is a system that provides the latest information, history and some anticipation
about the status and environment of the company to support administration tasks
and the process of decision-making of executives. An EIS usually uses qualitative
In this topic, you will learn how an EIS helps in the managerÊs work and in making
decisions. Let us continue with the lesson.
Now by saying executives, we are not referring to lower level executives such as
sales executives or IT-support executives who execute tasks given by the
supervisors, although their contributions are very much important to an
organisation. Our focus here is on higher level executives who are involved in
decision-making such as chief executive officers, chief financial officers and chief
information officers.
Other than that, executives are different from lower-level managers in terms of
attitude. Executives are organisation-oriented, while managers are unit- or
department-oriented. Let us take for example the vice chancellor of a university and
the dean of a faculty. The vice chancellor administers and leads a university that
may contain 10 faculties, four centres and six support units, while a dean focuses
more on the tasks of leading and planning the strategy for the faculty. We will learn
about the roles of an executive after learning about the three studies done by experts
in management science – Henri Fayol, Henry Mintzberg and John Kotter.
The studies done by The Centre for Information System Research (CISR) at MIT
found that the main users of EIS are the chief executive officers (CEO), chief
financial officers (CFO) and chief operating officers (COO).
ACTIVITY 6.1
Who would you call an executive? Name one famous executive in
Malaysia and describe his or her contribution to the country. Share your
answer for discussion in the myINSPIRE forum.
SELF-CHECK 6.1
If EIS is not in place, then the computer-based IS will be as depicted in Figure 6.1.
Figure 6.1 shows that executives receive all information from the subsystem
functions like the financial information system and marketing information
system which needs to be processed. Executives still need to analyse and convert
the data into more meaningful information.
EIS, as shown in Figure 6.2, helps executives analyse and change the data into
meaningful information.
EIS will accept all data and information from the subsystem function and its
environment, then process and present it with a good interface to the executives.
Strategies Description
Researchers like Professor Daniel J. Isenberg (1984) from Harvard stated that
executives generally think about two classes of problems:
(a) First class: How to solve work problems; and
(b) Second class: How to manage big issues or general aims of an organisation.
With regard to the first class, executives concentrate more on issues concerning the
organisation and subordinate individuals to solve problems rather than think
about ways to solve them.
IsenbergÊs observation shows that executives do not always follow the correct
steps in making decisions. For example, in handling a problem, executives usually
head straight for the execution of the solution and then backtrack to the evaluation
of alternatives, which is the step prior to execution. Executives make rationale
decisions but the decisions made do not mean that decisions coming through are
correct.
Isenberg (1984) believes that executives use their intuition in every aspect of the
decision-making process. Intuition plays a major role in helping executives make
decisions. This is due to the nature of humans, where problems endured by
executives are unstructured and this includes the executivesÊ experience. This
strongly affects the process of decision making by executives.
ACTIVITY 6.2
Search for articles related to high-level executivesÊ roles in leading a
company. In your opinion, why do we need to learn and understand
how executives work? Discuss your findings in the myINSPIRE forum.
What you must observe here is that MintzbergÊs research has become the basis of
modern design information systems based on computers in the context of EIS. This
role is important in mixing virtual office applications for an executive. In simpler
terms, when you want to develop EIS, you have to create the Mintzberg research
Questions Findings
(c) What is the executiveÊs source of The organisationÊs environment such as the
information? government, universities, mass media and
others, is the main source of information but
is of low value.
On the other hand, a small portion of
information such as information given by
members of the organisation is of a very
high value to executives.
(d) What are the types of media (i) Written medium; computer reports,
used by executives to exchange memos, e-mails, journals and others
information and to constitute sixty one per cent of the
communicate? transactions received.
(ii) Two per cent of the received information is
during a function.
(iii) Twenty one per cent is from using the
telephone.
(iv) Five per cent is from scheduled meetings.
(v) Six per cent is from unscheduled meetings.
(e) How is the received (i) Thirty two per cent is used for trade and
information used by entrepreneurship.
executives? (ii) Forty two per cent is for handling problems
or disturbances.
(iii) Seventeen per cent is used as a distribution
source.
(iv) Three per cent is used for consultancy and
business.
(v) The usage of the last six per cent is
unknown.
So, what does the information above mean? How is EIS related to all this? What is
the importance of the research? There are three main findings that we need to
know:
(a) Most of the information received comes from the organisationÊs environment
but a companyÊs internal information has higher value.
(b) Most of the information received by executives is in written form but those
with the highest value are received orally.
(c) Executives receive little information from the computer.
ACTIVITY 6.3
You have been introduced to the research done by Jones and McLeod
(1987). What was the conclusion of their research? Discuss your answer
in myINSPIRE forum.
6.3.1 Definition
According to McLeod and Schell (2007), EIS is a system that provides information
to executives concerning the organisationÊs progress as a whole. In general, EIS is
defined as:
ACTIVITY 6.4
Read the definition given in the book and compare with the definition
given in this module. Post your answer on the myINSPIRE forum for
discussion.
The system is also equipped with an e-mail application which includes preparing
facilities for the executive to download data or information from the
supercomputer or certain servers. There are also EIS variations that provide
explanations on current information, competitors, or social and economic
information, both internally and externally.
There are many EIS software and applications available in the market, provided
by commercial software vendors. Usually, this software comprises office
automation, e-mail, information management, information connection and
information analysis.
The EIS data needed for input depends on the executiveÊs needs as an end user.
Whatever information needed to make decisions, as well as information deemed
necessary by the executive, should be included in the EIS.
However, sorting the data and the types of information that need to be processed
by an EIS is difficult. This is due to the development of EIS which starts with
several features that the executives are interested in. Then, it is expanded
according to the information needed by the managers using it. Subsequently, the
format and type of information in EIS will become outdated and divert from
strategic planning.
SELF-CHECK 6.2
Give examples of other systems that produce output, yet become the
input of EIS.
SELF-CHECK 6.3
1. Define an EIS.
2. What is the output of EIS?
3. Sketch the EIS model, including its important components and the
data flow.
Research shows that the information needs for executives are more
organisation-oriented.
EIS is capable of creating a new information source that can help the company
improve its performance and at the same time provide excellent services to its
employees and customers.
Isenberg, D. J. (1984). How senior managers think. Harvard Business Review, 62,
80–90.
Kotter, J. (1982). What effective general managers really do. Harvard Business
Review, 60(2), 157–169.
McLeod, R., & Schell, G. (2007). Management information systems (10th ed.).
Upper Saddle River, NJ: Prentice-Hall.
LEARNING OUTCOMES
By the end of this topic, you should be able to:
1. Describe what an expert system (ES) is and its applications;
2. Explain the steps involved in producing rules and information
gathering;
3. Discuss ES architecture and development;
4. Describe the main characteristics of an ES; and
5. Explain the advantages and disadvantages of an ES.
INTRODUCTION
In this topic, you will learn about one of the branches of artificial intelligence (AI),
which is the expert system (ES). The ES is also known as the knowledge-based
system. The ES comprises many types of systems based on rules, frames and fuzzy
sets. In this topic, you will also be exposed to the most popular ES, the system
based on rules. Are you ready? Let us get going.
An expert is a person that has the expertise and knowledge of his or her
specialised field.
ACTIVITY 7.1
Currently, the ES is a popular topic in the field of management
information system (MIS). In your own words, explain what an ES is.
Share your answer for discussion in the myINSPIRE forum.
Damages Yes No
ACTIVITY 7.2
Has your car ever broken down? Think about how an ES can help you
in that situation. Discuss this with your coursemates in the
myINSPIRE forum.
7.1.2 Application of ES
ES is widely used in all types of fields and sectors like medicine, engineering,
education, marketing, tax planning and more. We will study several other
applications in the financial, production and military sectors. Examples of
applications in the banking and financial sector and production industries are
discussed in the proceeding sections.
Problem-
solving Example of Expert System (ES) Application
Paradigm
Prediction Providing reasons on the cause and effect of a certain decision based
on situation.
Selection Identifying the best selection from all alternatives and probabilities.
SELF-CHECK 7.1
Differentiate between human expertise and the ES. You may use the
following table:
Geography
Security
Malfunctions
Cost
ACTIVITY 7.3
From Figure 7.3, you can see the basic components of an ES, which are:
(a) Knowledge acquisition facility;
(b) Knowledge base;
(c) Inference engine; and
(d) Explanation facility.
The expert information that has been acquired will be used to develop and expand
the base knowledge. The source of knowledge stated here includes experts,
journals, the Internet, online databases or research reports and experiments.
On the other hand, it stores concepts and dedicated procedures that need to be
done in order to solve a problem. There are several different methods of storing
knowledge in a database. Some of the methods are predicate calculus, semantic
network, script and mainframe.
Rules Creation
Rules are divided into two operators:
(a) IF, called before (a premise or condition); and
(b) THEN, it is called effect (conclusions or actions).
In general, rules can have a few conditions by relating each condition to the
keywords AND, OR or a combination (AND and OR). On the contrary, it is better
to avoid combining both in one rule.
See the following example that shows how a few conditions are related to AND.
IF<condition 1>
AND<condition 2>
AND<condition n>
THEN<action>
The next example shows how a few conditions are related to AND and OR.
IF<condition 1>
AND<condition 2>
OR<condition 3>
THEN <action>
Representation Rules
Relationship IF „tank‰ is empty
THEN car cannot start
Suggestions IF monsoon season
AND cloudy sky
AND weather station predicts rain
THEN you are advised to bring an umbrella
Instructions IF car cannot start
AND „tank‰ is empty
THEN put petrol in the tank
Strategy IF car cannot start
AND „tank‰ is empty
THEN put petrol in the tank
Step 1 is done
IF Step 1 is done
AND tank is full
THEN check the car battery
Step 2 is done
Heuristics IF fluid spills
AND pH of the spill < 6
AND smells acidic or sour
THEN the spills is an acetic acid
There are two strategies used by the inference engine when making decisions or
conclusions. These strategies are forward and backward chaining.
The strategy of forward chaining can obtain a decision and produce more
information with fewer questions compared to backward chaining. Thus, it is
always used for large scale and complex ES.
However, the weakness in this approach is the long duration taken for processing.
Certain ES developed employs a combination of both the strategies of chaining,
which is called mixed chaining.
ACTIVITY 7.4
SELF-CHECK 7.2
1. Is the inference engine reasoning process the same as your
reasoning process? Which will you use to solve a problem? Can
both processes be used?
2. Write down the differences between the human problem-solving
architecture and the ES.
For example,
An expert will act based on what he or she can conclude from the answers, whereas
ES responds to the question of WHY by displaying the rules it is executing.
For example:
The ES responds by stepping back to the rules that the system uses to achieve
the decision. Stepping back to the rules is how the ES does the reasoning.
However, a language that was more similar to the human language made
communication more natural. Now, certain ES provides graphical user interface
like menus and graphics in the Windows environment.
(f) Flexible
Due to the large amount of knowledge possessed by an ES, it is important for
the ES to have an efficient mechanism to administer the compilation of the
existing knowledge in it.
For example,
Table 7.4 shows the differences between conventional system and ES.
Program does not make errors (only The ES program may make a mistake.
programming error).
Usually it will not explain why the data Explanation is part of an ES component.
needs to be input or how the decision is
achieved.
System is operational only when fully An ES can operate with a small number of
developed. rules.
Needs complete and full information. Can operate with sufficient or insufficient
information.
Easily operated with quantitative data. Easily operated with qualitative data.
SELF-CHECK 7.3
(c) User
The user is one who uses the ES when it has been fully developed. He or she
will help during the knowledge acquiring process by explaining the
problems to the knowledge engineer.
(i) LISP
All ES developed in the early days used LISP, or tools written using the
LISP language.
(ii) PROLOG
The ongoing research of artificial intelligence has given birth to the
programming language PROLOG. PROLOG is the acronym for
„Programming in Logic‰. A program using PROLOG can be assumed
to be a knowledge database that stores facts and rules.
(b) ES Shell
An ES shell is a program used to develop an ES. The ES shell executes three
main functions:
(i) Helps the programmer to build a knowledge database by permitting
the developer to input knowledge in the knowledge representation
structure.
How can we model the rules for ES? Figure 7.5 shows an example of rules in an ES
for a simple credit-granting ES extracted from Laudon and Laudon (2018).
ACTIVITY 7.5
In your opinion, can the methodology used in developing a conventional
system be applied in developing an ES? Share your opinion with your
coursemates in the myINSPIRE forum.
(a) Consistency
One of the advantages of an ES is that the results given are consistent. This
might be due to the fact that there are no distracting elements such as fatigue
and emotions as experienced by humans.
ACTIVITY 7.6
The ES also has its weaknesses and flaws. In your opinion, do these
weaknesses influence the quality of an ES? Discuss this issue with your
coursemates in the myINSPIRE forum.
SELF-CHECK 7.4
3. Define knowledge.
An expert system (ES) is a system that mimics the human capability to think
and reason for decision making.
Feigenbaum, E. A., & McCorduck, P. (1983). The fifth generation. Reading Mass.
Addison-Wesley.
Turban, E., Sharda, R., & Delen, D. (2010). Decision support systems and business
intelligence systems (9th ed.). Upper Saddle River, NJ: Prentice-Hall.
INTRODUCTION
In the beginning, functional information systems were developed specially for
carrying out specific functions such as a separate system for the accounts,
marketing and finance departments. These systems were not related to one
another. Thus, information management was not effective in some cases that
required a solution from several system functions.
Characteristic of Functional
Example
Information System
Even though this system focuses on An accounting information system (AIS) can be
certain activities, it can be integrated integrated with the marketing information
with other functional information system to facilitate transactions and the tasks
systems to form a single system that between those two departments.
is useful for the organisation.
Functional information systems can Attendance records, overtime claim records and
interface with others to form a salary records from different subsystems can be
complete IS for the organisation. This integrated to calculate the amount to be paid to
is the result of the integration of the employees for the previous month.
subsystems.
This IS can also interface with the The marketing information system can obtain
surroundings. feedback from the user or the client through
online feedback facilities (like feedback forms in
websites).
A clear picture about the examples of functional information systems can be seen
in Figure 8.1.
As can be seen from Figure 8.1, there are five core functions, namely, finance,
accounting, marketing, manufacturing (production) and human resource in an
organisation. Some of the finance and accounting functions have already been
discussed in transaction processing system (TPS) earlier; as such, this topic will
focus on marketing, manufacturing and human resource related information
system.
Thus, with the rapid development of IT, gathering marketing transaction data can
be done fast. The gathered data is used to prepare marketing information in the
form of:
(a) Periodic report: Prepared according to the period. For example, monthly
reports for sales analysis according to product.
(b) Special report: Prepared when something unexpected occurs. The marketing
information prepared by the AIS in the form of a sales analysis.
Sales managers must plan, monitor and help increase the performance of sales staff
who market the organisationÊs products. That is why most organisations have
computer-based AIS to generate sales analysis reports that analyse sales by
products, customers, types of customers, sales person, sales area and others. These
reports help the marketing manager to monitor the sales performance of products
and sales staff. At the same time, it helps marketing managers to prepare
programmes that would improve sales for the organisation.
If an organisation does not have a good AIS, it cannot provide good information
to help managers solve the marketing problems.
SELF-CHECK 8.1
In 1966, Professor Philip Kotler (McLeod, 1998) identified three types of marketing
information related to the collection and processing of marketing information as
displayed in Figure 8.2.
Kotler states that difficult decisions in marketing activities such as lowering prices,
increasing advertisement expenditure or identifying sales area can be done
through initial evaluation and subsequent evaluation by scientifically analysing
the data obtained.
The output subsystem will use the stored data to produce information related to
product marketing, promotion, venue and product pricing. The output subsystem
consists of the product subsystem, venue subsystem, promotional subsystem,
pricing subsystem and mixed-integration subsystem. All these subsystems will be
Copyright © Open University Malaysia (OUM)
TOPIC 8 FUNCTIONAL INFORMATION SYSTEMS 181
discussed in the following subtopics. Data stored in the database can be shared by
other functional fields and is not limited to the marketing unit only. The marketing
information system model is shown in Figure 8.3.
ACTIVITY 8.1
Using all four marketing elements (product, promotion, venue and price),
sketch a diagram showing the relationship between each element. Share
your answer for discussion in the myINSPIRE forum.
(a) The production scheduling system needs four files to prepare the master
production schedule – the customerÊs order file, sales forecast file, finished
product inventory file, and production capacity file. The main production
schedule plans the future production by considering the lead-time factor and
the production time.
(ii) Net requirements are the items that need to be purchased to achieve
the main production schedule. The following are the required
formulas:
(d) Order production system uses the order schedule that has been planned as
input and prints the order production report of which a copy is given to the
procurement department and the shop floor manager.
ACTIVITY 8.2
The components or items are pulled back to the next production process as soon
as it is ready. The raw material inventory arrives just-in-time to be used by the
factory, whereas the process inventory is completed by a process as soon as it
needs to be used by the next process.
This approach has less or no stored stocks. The JIT system minimises inventory cost
by producing items in small quantities. The suitable lot size for a JIT system is 1. This
lot size is the number of items to be produced at one time. It needs good time
planning and cooperation from the suppliers.
In forwarding one item to the next production process, when a worker is ready to
receive the next item, he or she will signal the worker before him or her to send
the item. Kanban (in Japanese) is like a card or light. The JIT approach does not
stress on the use of computers.
SELF-CHECK 8.2
The main activity of the human resource management is shown in Figure 8.7,
which describes staff resource flow in an organisation.
SELF-CHECK 8.3
The database for the human resource information system consists of both staff and
non-staff data. Staff data refers to the storing of data on the organisationÊs staff.
Meanwhile, non-staff data is the storage of data obtained from the organisationÊs
environment such as the government, labour union, recruitment agencies and
others.
ACTIVITY 8.3
Discuss and share your answers to the following questions in the
myINSPIRE forum:
(a) If you are an employee in an organisation, have you ever
wondered why all your personal information is needed by the
organisation? Is the information stored based on a model that you
have learnt about or the organisation is using a model of its own?
(b) How can you relate the management information system to
human resource management?
Inheritance study Done with the aim to identify eligible staff candidates to
fill a position in the organisation.
Example: The chief financial officer (CFO) is retiring.
Who is qualified to replace him?
Task analysis and To study each task in a field to identify its task scope.
evaluation
Identify the knowledge and expertise needed by certain
tasks offered in the organisation.
SELF-CHECK 8.4
Organisation
Description
Environment
SELF-CHECK 8.5
ACTIVITY 8.4
Read articles related to workforce planning. List the consequences of not
managing the workforce planning properly. Post your finding for
discussion in the myINSPIRE forum.
ACTIVITY 8.5
If you are an employee in an organisation, you might have heard of
employees being given compensation for certain matters. Have you ever
wondered how such compensation is evaluated and what is the
justification for giving that compensation? Discuss this matter in the
myINSPIRE forum.
SELF-CHECK 8.6
INTRODUCTION
Information system (IS) plays a critical role in businesses, government functions
and daily life. It can be used for the progress of a business but like other
technologies, it can also be abused to do harm or commit crimes upon individuals
and organisations. Therefore, organisations need to consider special steps to
protect their information systems.
This topic will explain how far information systems can be controlled and
protected so that they can perform the tasks accordingly. We will also look at the
social impact and ethical issues that result from the implementation of the IS.
Happy reading!
Organisations that depend heavily on computers will suffer great financial losses
or business malfunctions when their computer systems crash or fail to perform the
required tasks. The longer the systems are inoperable, the worse the damage is
done to the organisation. There are also some businesses which would fail if the
computer system cannot be used for a few days.
What are the resources that need to be controlled or managed from the perspective
of their safety? The resources that need to be protected include:
(a) Raw data;
(b) Information;
(c) Computer hardware;
(d) Peripheral devices that are connected with the computer;
(e) The IT used; and
(f) Support software that is used in the IT unit, like operating technology.
Let us look at how we can manage IT safety. Firstly, from the basic concepts and
then from the steps that need to be performed practically today that form the safety
control of IT.
(a) Confidentiality
This is for ensuring that data or information is not exposed to others who
are not supposed to see it. The executive information system (EIS),
company accounting system and human resource management system are
among the systems that are critical to the organisation and need to be
protected in this regard.
(b) Integrity
This is for ensuring that the information stored can be trusted and that the
data as well as the program that manages it is always accurate or functions
like it is supposed to. In other words, it represents the actual technology
capability for each time when access is made.
(c) Availability
This is for ensuring that the technology, data and service in this system can be
accessed at all times when they are required by anyone who is allowed access.
ACTIVITY 9.1
Imagine that you are an employee in an organisation. Why would your
personal information be needed by the organisation? Is the
information kept according to the model you are studying? If not, do
you think the organisation uses its own model? Discuss this matter in
the myINSPIRE forum.
lead to an adverse effect to the organisation. When the Internet becomes part of
the corporate network, the organisationÊs IS is exposed to actions by external
parties at any time.
A firewall is generally located between the internal LAN and WAN, and external
networks like the Internet. A firewall protects the organisationÊs internal network
access by acting as a gatekeeper which studies every userÊs qualification before
they can access the network. A firewall will identify the name, IP address,
application and other traffic features. It checks this information based on the access
regulations which have been programmed into the system by the network
administrator. As you can see in Figure 8.1, a firewall blocks illegal communication
into or out of the network, allowing the organisation to enforce security policies
on the traffic flow between the network and the Internet.
(a) Proxy
Proxy stops data which starts from outside the organisation at the firewall,
checks the data and discontinues the proxy to other parts of the firewall. If
the external user wants to communicate with an internal user, the external
user will first „talk‰ to the application proxy and the application proxy will
communicate with the internal computers. The internal user will also talk
through proxy to the external computer. As the real order does not go
through the firewall, the proxy is considered to be safer than real checks.
However, they need to do a lot of work and can use a lot of system resources
which makes for unsatisfactory network access.
The Cisco system firewall product is an example of a firewall which can stop, but
cannot overall prevent network entrance from the outside, and should be seen as
one of the elements in the overall security plan.
To handle the Internet security issues, organisational procedures and policy scope
must be broad, responsible to users and aware of the need for security training.
ACTIVITY 9.2
Find out other details on the functions and usage of a firewall. Discuss
your findings in the myINSPIRE forum.
To be readable, the order must be decrypted with a suitable key. There are several
encryption standards in existence, including data encryption standard (DES)
which is used by the US government, RSA (data security RSA), SSL (secured socket
layer) and S-HTTP (secured-hypertext transportation protocol). SSL and S-HTTP
are used for traffic-based Web.
There are many alternatives for encryption; however, public key encryption is
popular. Public key encryption uses two different keys, one for public and another
one for private. The keys are related mathematically, so that data encrypted with
one key only can be decrypted with the other key. To send and receive orders, the
communicating parties must first prepare a pair of public and private keys that are
different.
The public key is kept in the directory, while the private key is kept in a secret
place. The sender will encrypt the order with the public key of the receiver. When
the order is received, the recipient will use the private key to decrypt it.
Encryption is useful for protecting orders on the Internet and other public
networks which are less secure than private networks. Encryption helps to protect
the sent payment data such as credit card details, enquiries which require address
verification and order integrity. Verification refers to the ability of one party to
know the other party present. In the non-electronic world, we use signatures.
Banking through mail has prevented the use of signatures on cheques given to
customers through a protected private network, where the source requesting for
payment is recorded and can be proven. Order integrity is the capability to ensure
orders sent arrive without being copied or amended.
Computer security experts are still finding ways involving encryption to establish
digital signatures which are agreed upon and verified. A digital signature is a
digital code which is attached to an order sent electronically and used to verify the
orderÊs content. It provides a method of linking the order with the sender,
performing a similar function as a written signature.
ACTIVITY 9.3
There are many online banking websites that use encryption or digital
certification. Why are these two needed especially in online banking
websites? Discuss in the myINSPIRE forum the difference between
encryption and digital certification.
System security threats refer to the act or incident that can and will affect the
integrity of an IS, which in turn, affects the reliability and privacy of business
data.
Most organisations are dependent on computer systems to function, and thus must
deal with system security threats. Small enterprises, however, are often
understaffed for carrying out IT functions as well as maintaining the system
security.
Hence, to protect their IS and ensure business continuity, all organisations must
designate an individual or a group with the responsibilities for system security.
Outsourcing system security functions may be a less expensive alternative for
small organisations.
(a) Viruses
A computer virus is a software code that can multiply and propagate itself.
A virus can spread into another computer via e-mail, through the
downloading of files from the Internet or the opening of a contaminated file.
It is almost impossible to completely protect a network computer from virus
attacks.
(b) Spyware
Spyware is a computer program that secretly gathers the userÊs personal
information and relays it to third parties, such as advertisers. Common
functionalities of spyware include monitoring keystrokes, scanning files,
snooping on other applications such as chat programs or word processors,
installing other spyware programs, reading cookies, changing the default
homepage on the Web browser, and consistently relaying information to the
spyware home base. Unknowing users often install spyware as the result of
visiting a website, clicking on a disguised pop-up window or downloading
a file from the Internet.
(c) Adware
Adware is a program that can display advertisements such as pop-up
windows or advertising banners on Web pages. A growing number of
software developers offer free trials for their software until users pay to
register. Free-trial users view sponsored advertisements while the software
The following suggestions can help minimise the chance of theft when outside the
office:
(a) Never leave a notebook or PDA unattended, including in a car or hotel room.
(b) Install a physical protection device such as a lock and cable or an alarm.
(c) Put the notebook in a non-descript bag or case.
(d) Install stealth-tracking software.
(e) If a notebook is stolen, automatic logins make it easy for a thief to access
sensitive information. Password protection does not deter a theft, but it does
make it more difficult for thieves to use the stored information. Biometric
security, such as the fingerprint readers, is even better.
(f) Back up data regularly, or install a desktop, notebook or PDA sync program.
A massive DDoS attack can paralyse a network system and bring down giant
websites. Unfortunately, any computer system can be a hackerÊs target as long as
it is connected to the Internet. DoS attacks can result in significant server downtime
and financial loss for many organisations, but the controls to mitigate the risk are
very technical. Organisations should evaluate their potential exposure to DoS
attacks and determine the extent of control or protection they can afford.
SELF-CHECK 9.1
One option to prevent an attack is to use one of several encryption standards that
can be built into wireless network devices. One example is the wired equivalent
privacy (WEP) encryption that can be effective at stopping amateur snoopers, but
it is not sophisticated enough to foil determined hackers. Consequently, any
sensitive information transmitted over the wireless networks should be encrypted
at the data level as if it were being sent over a public network.
(d) IP Spoofing
A technique used to gain unauthorised access to computers, whereby
hackers send messages to a computer with a deceived IP address as if it were
coming from a trusted host.
(f) Tunnelling
A method for circumventing a firewall by hiding a message that would be
rejected by the firewall inside another acceptable message.
Access privilege and data encryption are good preventive controls against data
theft by unauthorised employees who steal for personal gain. The access controls
include traditional passwords, smart-card security and more sophisticated
biometric security devices. Organisations can implement some appropriate
controls, including limiting access to proprietary information to authorised
employees, controlling access where proprietary information is available and
conducting background checks on employees who can have access to proprietary
information. There will, however, always be some risk that authorised
employees will misuse data they have access to in the course of their work.
Organisations can also work with an experienced intellectual property attorney,
and require employees to sign non-compete and non-disclosure agreements as a
precautionary measure.
A user should never give out their credit card numbers, PINs or any personal
information in response to unsolicited e-mail. Instead of clicking a link in a
suspicious e-mail, call the office or use a URL that is legitimate to verify an e-mail
that claims to be from a bank or financial institution. When submitting sensitive
financial and personal information over the Internet, make sure the server uses the
secure sockets layer protocol (the URL should be https:// instead of the typical
http://).
9.3.13 Sabotage
System security crimes are committed by insiders as much as by outsiders. Some
of the controls discussed above can provide protection against the sabotage
committed by outsiders, but no organisation is immune from an employee abusing
its trust. When it comes to security, organisations often pay attention only to the
parameter of the organisation, and not the inside. Sabotage by insiders is often
orchestrated when employees know their termination is coming.
In some cases, disgruntled employees are still able to gain access after being
terminated. Another potential threat of unauthorised use is when employees quit
or are terminated but there is no coordination between the personnel department
and the computer centre.
Sometimes, employees still have system access and an e-mail account after they
have left an organisation. It is also not unusual that employees know the user IDs
and passwords of their colleagues. In order to prevent sabotage by insiders, the
organisation should promptly deny access to terminated staff.
Even though computer usage has reduced the number of jobs, it has also
contributed new positions related to the use of computer systems, such as chief
information officer and other related positions.
In brief, it can be said that the introduction of computers has removed the positions
which entailed repetitious tasks and added job titles that require more skills and
intellect. These new positions are filled by people known as knowledge workers.
Owing to todayÊs advanced technology, a user surfing the Internet and entering a
website may have his or her personal information captured without his or her
consent. Private user information that is stored in institutional computer systems
like credit information and family details face the threat of the information being
exposed or wrongly used. From another perspective, there are certain institutions
that monitor the use of computers by their workers without the workers being aware
of it.
SELF-CHECK 9.2
ACTIVITY 9.4
IT has caused a decrease in the number of jobs with the introduction of
automation. Think of an opposite argument, that is, how does the
introduction of the Internet reduce unemployment? Discuss this issue
with your coursemates on myINSPIRE forum.
For example, a type of information considered immoral in one culture may not be
considered as such in another culture. In another scenario, the use of certain types
of software that can monitor the use of IT by users who are connected to the
Internet may compromise their private information. Should the right to monitor
be given to the authorities and to what extent should they be allowed to do so?
This polemic has opened up debate on the societyÊs value systems, resulting in the
need for organisations to have a code of ethics in the use of IT.
SELF-CHECK 9.3
ACTIVITY 9.5
The trend in the development of IT has given rise to several questions
regarding ethical issues. Relate how this IT trend can give rise to those
issues. Discuss and give examples in the myINSPIRE forum.
The financial loss from these security breaches can be significant. In addition,
system security breaches often taint a companyÊs image and may compromise
a companyÊs compliance with applicable laws and regulations.
The use of IT also leads to the basic issue of the code of IT ethics that must be
adhered to by every employees in an organisation.
INTRODUCTION
Information technology (IT) is widely used in organisations, but does the use of IT
guarantee higher returns? The answer depends on whether the use of IT has clear
goals because a comprehensive planning will guarantee positive results.
In this topic, we will look at the development of an information system (IS) using
the system development life cycle (SDLC), which is very popular. We will also
discuss one of the main standards used in IS, which is the capability maturity
model (CMM). The aim of using these standards is to ensure the quality of the
system developed, particularly so that the software complies with software
development requirements.
In this topic, we will also look at the important aspects in implementing IT, starting
with the introduction to the problems that may arise, the sources of these
problems, and how to measure the success of the implementation. Then, we will
discuss the steps of the implementation of a planned IT project to ensure that
maximum returns are achieved. Are you ready? Let us get started.
Let us now discuss each stage in the system development life cycle.
10.1.1 Investigation
An important task in this phase is the initial studies to identify whether the system
that will be developed is actually suitable and can fulfil user requirements. They
will identify the resource needs, cost, benefits that will be obtained and success
factors of the system to be developed.
10.1.2 Analysis
The analysis phase will only be performed after an agreement to develop a new
system is achieved in the investigation phase. In this phase, a study is conducted
to understand the business problems that the organisation plans to solve using
an IS.
SELF-CHECK 10.1
10.1.3 Design
Designing is the next step after the problem analysis. The main function of this
phase is to clarify how the system can execute the task of solving the problem.
System design is divided into two parts, namely:
After the design specifications are agreed upon by all parties involved and an
agreement is signed, no further changes are permitted.
10.1.4 Programming
Once a suitable design has been identified, programming will be carried out to
translate the system design specification prepared by the system analyst into a
programming code. The selection of a suitable programming language is made
according to the requirements of the system.
SELF-CHECK 10.2
10.1.5 Testing
The testing phase is performed to identify if there are any mistakes (errors) in the
programming that has been developed. There are two types of errors, which are:
10.1.6 Implementation
If the testing phase occurs without problems, this means that the system is ready
to be used. The next step is to make the required preparation to deploy this new
system. In other words, this is the process of changing the old system to the new
system.
10.1.7 Maintenance
This new system that is in operation will be reviewed after a certain period. This
is to ensure that the user objectives are still being met. The process of maintenance
needs to be performed to ensure that there are no major problems during the
lifetime of that system. Maintenance is carried out by re-testing the program and
modifying the system so that it is in line with the changes that occur in the
organisation or business. This process is made without adding to the functions of
the system.
There are also maintenance procedures that have to be added to the system
functions. This process is performed by adding new features without disrupting
the overall operation of the system.
The model helps organisations identify the main practices needed to enhance the
maturity of the processes.
The CMM was developed by the Software Engineering Institute (SEI), University
of Carnegie Mellon in Pittsburgh. The model gave schematic pictorial classification
of software development based on the capability of the organisations. The model
comprises five maturity levels which differ from one software development
organisation to another.
The CMM has been the de facto standard in evaluating and rectifying software
development processes. The model helps in establishing a modelling method and
evaluating the maturity of software development processes in organisations.
The CMM has four intended functions to help organisations improve their
software process capabilities:
(a) Identify improvements;
(b) Identify risks in selecting contractors;
(c) Implement a process improvement program; and
(d) Guide the definition and development of the software process.
The model describes the principles and practices contained within and which
serves to help organisations strengthen the maturity of software development
processes from start until completion.
Each maturity level provides a layer in the foundation for continuous process
improvement. Each key process area comprises a set of goals that, when satisfied,
stabilise an important component of the software process. Achieving each level of
the maturity model institutionalises a different component in the software process,
resulting in an overall increase in the process capability of the organisation.
ACTIVITY 10.1
Search for online resources related to the CMM and find more details
regarding each level of CMM. Compile your answer and compare it
with your coursemates in the myINSPIRE forum.
Not all information systems built are successful in achieving their goals. Research
has shown that many developed information systems do not fulfil the needs of an
organisation. The point to learn from this is that the development and
management of the system must be made with a clear understanding and based
on the consideration of the experience of previous implementations.
Nevertheless, the views of the end user still have to be clarified with regard
to the scope because the end user has only limited knowledge about the
whole organisation. He or she may know about the processes that are closely
related to his or her work, but is less familiar with the overall problems faced
by the organisation. Another advantage of involving the end user is his or
her readiness in accepting change. If he or she is involved from the early
stages, at least he or she will be aware of the changes that will take place and
will be able to take steps to prepare for these changes.
the customers or users are more inclined towards solving business problems
which would facilitate their work in the organisation. This communication
gap can cause the specifications requested by the users to be omitted from
the system that is to be built.
Sometimes the project being implemented is very big and takes a long time to
complete. The continuous involvement of users would affect their daily work.
On the other hand, failure often results when the system that is being
developed is abandoned because management has not given it their support
– because they are not ready to invest in it. Without this commitment, the
management will not be able to benefit from the IS that can enhance the
organisationÊs business processes.
What are the factors that can determine the level of risk and complexity of an
IS development project? According to researchers in this field, there are three
main dimensions that influence the level of risk of an IS development project.
They are:
(a) Project size;
(b) Project structure; and
(c) Level of technical experience of system developers.
Mistakes often occur in estimating the level and size of projects because of
the lack of experience or incomplete studies done on the matter.
ACTIVITY 10.2
1. What may happen if the user is not involved at the early stage of
the system development process? In your view, is this a serious
problem?
2. Have you come across any IS development projects in your
country that have been abandoned? If yes, could you identify what
was the cause? If no, then what would be the possible causes of an
IS project being abandoned?
(iii) The user does not give full cooperation to the project team. The team
fails to collect the actual information about the problems that need to
be solved because information is lacking.
SELF-CHECK 10.3
There are situations where the developed systems are not used as planned. How
do these happen? They occur because the system produced is not user-friendly or
the data obtained is not reliable.
A system is said to be a failure when the design fails to fulfil the needs of the
organisation or fails to enhance the achievements of the organisation. Even though
the system is able to produce the required output, the output or information may
not be produced within the given time frame, or it is not in the form required.
Furthermore, a system may have all the features as expected, but lacks user-
friendly interface. This would mean that the system is difficult to use, slow and the
validity of the data entry is difficult to confirm.
A system also fails when data-related problems received by the system as input
crop up. If the data is inaccurate or inconsistent, wrong, ambiguous or cannot be
accessed, then we can conclude that the system has failed. In some situations, the
profit gained from using the system does not justify the high cost that has been
invested in it. Besides that, system failure can surface as a result of operational
problems, such as the system always breaks down and does not run smoothly,
causes delays in production and generates a slow feedback.
ACTIVITY 10.3
SELF-CHECK 10.4
Some of the strategies include the use of the correct project management
techniques adapted according to the project to be implemented. In general, we can
categorise these project management techniques into three types as indicated in
Figure 10.5.
One important strategy is to ensure that there is a high level of user acceptance of
the system. Many studies have been conducted on the attitudes of people in
general towards accepting any changes. The management should not be tight
fisted in paying the estimated cost to address this issue. Activities like training for
the user, user education, improving the quality of the user interface and
encouraging the involvement of the user can all be undertaken to „tame‰ the user.
It will be more beneficial if the designers can produce an IS that can integrate the
technical expertise while considering the needs of the organisation and those of
the workers.
The system development life cycle (SDLC) is divided into seven main phases,
namely, investigation, analysis, design, programming, testing, implementation
and maintenance.
At the end of each phase, the result that is obtained will help in the following
phase. The SDLC will continue to turn in line with the lifetime of a system.
The capability maturity model (CMM), which consists of five levels – initial,
repeatable, defined, managed and optimising – is used to evaluate the maturity
of the software development process in organisations.
The system is successful when there is high level of usage; the users are
satisfied with the system; there is positive attitude towards the functions of the
system; the achievement of the system objectives; and the financial returns that
are obtained as a result of using the system.
The success and failure of information systems depend on the role of the user
in the implementation process, the support and commitment from the
management, the level of complexity and project risks, and the quality of
management in implementation process.
Copyright © Open University Malaysia (OUM)
234 TOPIC 10 DEVELOPMENT AND QUALITY ISSUES RELATED
TO INFORMATION SYSTEM (IS)
Each phase in the process of developing the IS has its own list of mistakes.
Thus, there is a need to reduce or eliminate these mistakes, by using the project
management techniques.
OR
Thank you.