Mis 1
Mis 1
Unit I:
Introduction
To the managers, Management Information System is an implementation of the organizational
systems and procedures. To a programmer it is nothing but file structures and file processing.
However, it involves much more complexity.
The three components of MIS provide a more complete and focused definition,
where System suggests integration and holistic view, Information stands for processed data,
and Management is the ultimate user, the decision makers.
CONCEPTS: The word 'MIS' comprises of three basic elements such as:
a) Management
b) Information
c) System
Management: Management covers the planning, control, and administration of the operations of
a concern. The top management handles planning; the middle management concentrates on
controlling; and the lower management is concerned with actual administration.
Information: Information, in MIS, means the processed data that helps the management in
planning, controlling and operations. Data means all the facts arising out of the operations of the
concern. Data is processed i.e. recorded, summarized, compared and finally presented to the
management in the form of MIS report.
System: Data is processed into information with the help of a system. A system is made up of
inputs, processing, output and feedback or control.
Thus MIS means a system for processing data in order to give proper information to the
management for performing its functions.
Meaning of MIS:
MIS is the use of information technology, people, and business processes to record, store and
process data to produce information that decision makers can use to make day to day decisions.
MIS is the acronym for Management Information Systems. In a nutshell, MIS is a collection of
systems, hardware, procedures and people that all work together to process, store, and produce
information that is useful to the organization.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 2
Management Information System VI Semester BBM
Definition:
Management Information System or 'MIS' is a planned system of collecting, storing, and
disseminating data in the form of information needed to carry out the functions of management.
The MIS has been understood and described in a number of ways. It is also referred to as:
a) Information system
b) Information and decision system
c) Computer based information system
1. The MIS is defined as a system which provides information support for decision making in
the organisation.
2. MIS is an integrated system of men and machines for providing the information to support
the operations, the management and decision making functions in the organisation.
3. MIS is defined as a system based on the database to the Organisation evolved for the
purpose of providing information to the people in the Organisation.
Objectives of MIS
The goals of an MIS are to implement the organizational structure and dynamics of the enterprise
for the purpose of managing the organization in a better way and capturing the potential of the
information system for competitive advantage.
Capturing Data
in decision making from various internal and external sources of organization.
Processing Data red data is processed into information needed for planning,
organizing, coordinating, directing and controlling functionalities at strategic, tactical and
operational level. Processing data means:
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 3
Management Information System VI Semester BBM
Characteristics of MIS
Following are the characteristics of an MIS:
It should be able to process data accurately and with high speed, using various techniques
like operations research, simulation, heuristics, etc.
It should be able to collect, organize, manipulate, and update large amount of raw data of
both related and unrelated nature, coming from various internal and external sources at
different periods of time.
It should provide real time information on ongoing events without any delay.
It should support various output formats and follow latest rules and regulations in practice.
It should provide organized and relevant information for all levels of management: strategic,
operational, and tactical.
It should aim at extreme flexibility in data storage and retrieval.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 4
Management Information System VI Semester BBM
Michael Porter’s Five Forces Model is a useful tool to assist in assessing the competition in an
industry and determining the relative attractiveness of that industry. Porter states that in order to
do an industry analysis a firm must analyse five competitive forces (Baltzan & Phillips 2010, p.
17):
Michael Porter & Victor Millar have said, IT is affecting competition in three vital ways:
1. It changes the industry structure & in so doing, affecting the rules of competitions.
2. It spawns the new business, often from within the company existing operations.
3. It creates competitive advantage by giving companies new ways to outperform their
Rivals.
Threat of substitute
products
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 5
Management Information System VI Semester BBM
Information & IT, developments of new ways of doing things in a different way confers
competitive advantage on a firm.
house
The value chain is an analytical frame work to disaggregate a firm in to the different
interdependent activities that add value to its raw materials and bring the firms products or service
to the customer.
The key feature of a value chain is to examine each step of production & determine how value is
added at each step.
The second objective of value chain analysis is to examine the bigger picture in the industry.
Primary activities involve physical creation of the product, its marketing and delivery to buyers,
its support and service after sale.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 6
Management Information System VI Semester BBM
Support activities provide the input & infrastructure that allow the primary activities to take
place.
Each activity adds value; there is a cost of adding a value in every level of the chain.
Value chain enables a company to analyses where & how it can add value to reduce cost.
If the total cost of added values is less then what the values is less than, what the customer pays,
there is profit.
The concept of value chain is a useful frame work for identifying information technology
opportunities.
The value chain concept can help managers decide where and how to apply the strategic
capabilities of information system technology.
EVOLUTION OF MIS
The older version of MIS was Electronic Data Processing (EDP) systems. The main activity of
EDP was record keeping under accounting department of an organisation. One example of EDP is
the payroll software package used by any organisation.
The philosophical shift from data to information developed the concept of MIS. The main aim of
EDP was to compile a chunk of data, whereas MIS took the responsibility to process those data
and generate fine tuned information.
With the revolution in personal computing, the management could directly access the information
base instead of depending on the EDP or MIS departments. This enhanced the decision making
capabilities of management and gave birth to Decision Support Systems (DSS) pioneered by
Keen. The direct use of information base created the ‘What-if’ analysis capability with the help of
modern software packages like Spreadsheet, Word Processing and Database Management
Systems (DBMS), etc.
The spectacular growth in Artificial Intelligence and Expert Systems generated Knowledge Based
System (KBS). Combined with DSS, the expert systems could supply a superior class of MIS by
providing software packages having self-learning capabilities.
The philosophy of DSS, combined with the power of the Operation Research models together
with Management Science transformed the ‘What-if’ capability to ‘What-is-best’. This came to be
known as Model Management Systems (MMS) help the management to take the optimal decision
from several available alternatives.
The EDP targeted the lower level of management. The MIS/DSS/MMS targeted the middle level
of management. The Executive Information System (EIS) or Executive Support System (ESS)
serves the top level of management whose time value is extremely high. Here the user interface
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 7
Management Information System VI Semester BBM
must be superior such as, Natural Language Interface, Voice Processing and Response, Multi-
Media (Graphics, Sound and Video), etc.
1. A top-down approach. The well done systems analysis starts with an analysis of the
strategy and goals of the project and then proceeds to the specific.
2. A rational, objective basis for analysis. Decisions are based on carefully gathered evidence
and analyzed using a logical procedure.
3. Considers a generalized problem including the problem setting. A properly done systems
analysis always includes consideration of the problem environment including all
stakeholders.
4. Client orientation
5. Index of performance and goals/objectives
6. Importance of Alternatives –“What do you mean you didn’t consider any
alternatives?”
7. Problem decomposition
8. Normative
Analytic Sins (from Jones, Morgan D., The Thinker’s Toolkit, Three Rivers Press, 1998)
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 8
Management Information System VI Semester BBM
We often begin our analysis by formulating our conclusion. We start at the end!
Our analysis focuses on the solution that we intuitively favor. We give inadequate
attention to alternative solutions.
We tend to focus on the substance (evidence, arguments, conclusion) and not the process
of our analysis.
Most people are functionally illiterate when it comes to structuring their analysis.
We instinctively rely on and are susceptible to biases and assumptions.
We tend to stick to untrue beliefs in the face of contradictory evidence.
Simon’s Model for Decision Making- Decision-making consists of three major phases
1) Intelligence
a) Problem Identification and Definition
i. What's the problem?
ii. Why is it a problem?
iii. Whose problem is it?
2) Design
a. Problem Structuring
i. Generate alternatives
ii. Set criteria and objectives
iii. Develop models and scenarios to evaluate alternatives
iv. Solve models to evaluate alternatives
3) Choice
a. Solution
i. Determine the outcome of chosen alternatives
ii. Select “best alternative”
The system analysts and programmers, who designed and developed the MIS, were not, in the
initial stages, familiar with the managerial set-up and the role of managers in the organization. So,
they were not in a position to understand how managers solved problems in the organizations. In
order to develop a standard and structured framework for problem solving, they introduced the
systems approach to problem solving. Any manager can use the systems approach irrespective of
the type of problem. It provides a universal methodology with an inherent logic to solve any kind
of problem through a series of steps.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 9
Management Information System VI Semester BBM
Another popular model was proposed by Herbert Simon which contains four steps: intelligence,
design, choice, and review. Intelligence is the first step of this approach and refers to problem
identification and definition. Design consists of developing and evaluating the alternative
solutions. Choice is the process of selecting the best alternative and implementing it, while review
is the follow-up process after implementing the solution. Let us now understand each of the steps
involved in the systems approach.
Define the problem: The first step in this approach is to identify the problem. A problem is
considered as a constraint or hindrance to the otherwise smooth flow of activities. It can be
identified through its symptoms. A symptom is an indicator of a problem and need not be the
cause. The system analysts are required to identify such possible indications. For example, a fall
in sales is an indicator of a problem. As and when such an indication comes up, the management
has to review the possible causes for the fall and identify the real problem(s). Once a problem has
been identified, it has to be defined in clearer terms such that no ambiguity exists in
communicating the problem across the hierarchy.
Identify alternative solutions: A problem can be solved in more than one ways. It is therefore
not advisable to just think of a single solution and try to implement it. Such a decision would not
allow the manager to think of other possible alternative solutions and the advantages associated
with them. Therefore, it is recommended that multiple alternatives be developed for the problem
and the best alternative selected. In this step, such alternatives are identified and developed. The
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 10
Management Information System VI Semester BBM
solutions that have worked in the past are a good source from which to search for new
alternatives. Advice from colleagues (internal) and consultants (external) can provide fresh
insights into the problem. Many organizations use expert systems to assist them in generating
alternatives. Expert systems use the knowledge of various experts and develop solutions to
problems in the same way as an expert does.
Evaluate alternative solutions: Once the alternative solutions have been developed, they have to
be evaluated to choose the best solution. Evaluation is mainly done to see how well an alternative
fits as the right solution to the problem. Every alternative is evaluated through different analyses
like cost-benefit analysis, etc. Different criteria of each alternative are evaluated to understand
their influence in arriving at a solution to the problem.
Select the best alternative: The next step is to choose the best alternative as the solution to the
problem. To do this, different factors in each alternative are compared with other alternatives to
eliminate the less feasible alternatives. After several comparisons, the best alternative is selected.
Sometimes it so happens that none of the alternatives can serve as the solution to the problem.
Then, fresh alternatives have to be developed. Sometimes, it may happen that ‘no action' is the
best solution to the problem.
Implement the solution: The selected solution has to be implemented to solve the problem.
Sometimes, the solution has to be freshly designed in order to be implemented. For instance, if
installation of new and custom-made equipment is considered as the chosen solution, then the
equipment has to be designed accordingly and then installed. This is true for information systems
also. Changes in MIS have to be designed and redesigned to suit the organizational requirements.
Follow-up: This is the final step in this approach. The best solution can fail to produce the
expected results if put into practice in the real world. Hence, it is always recommended that the
results produced by the solution be monitored and evaluated. This is called follow-up. Follow-up
ensures that the post-implementation performance of the system is satisfactory.
Humanistic factors
The lack of information of the managers and users as they don’t know exactly what they
want and what their information needs are.
The lack of understanding of the needs of the users by designers (the lack of correct
definition of the needs and their analysis)
The lack of information of the managers and users about the collaboration method with the
designer team.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 11
Management Information System VI Semester BBM
Environmental factors
The lack of suitable consultants for designing the system and software
The lack of procedures and methodology and stages of creating the system
The lack of evaluation of environmental aspects in management information systems
The lack of suitable use of mass media to develop the culture of using computer and
information systems.
The lack of holding suitable MA training courses in the universities and the lack of suitable
education of human resources in this regard.
The lack of ratification of the suitable rules in Islamic council parliament and government
board and the considerable problem in this regard.
The lack of serious consideration and adequate investment in this regard.
The conceptual structure of MIS is defined as a federation of functional subsystems each of which
is divide in to four major information processing components like Transaction processing,
Operational control information system, Management control information and Strategic planning.
Organizational Functions
1 2 3 4 5 6 7
Strategic Planning
Management Control
Activities
Operational Control
d Transaction Processing
Organizational Functions:
1. Sales & Marketing
2. Production
3. Logistics
4. Personnel
5. Finance & Accounting
6. Information Processing
7. Top Management
1. Sales and Marketing Subsystem: the sales and Marketing includes al activities related to the
promotion and sales of products or services.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 13
Management Information System VI Semester BBM
Strategic Planning for the marketing function involves consideration of new markets
and new marketing strategies.
4. Personnel subsystem: includes hiring, training, record keeping, payment and termination of
personnel.
5. Finance & Accounting subsystem: Finance function covers granting of credit to customer,
collection process, cash management and financing arrangements. Accounting covers the
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 14
Management Information System VI Semester BBM
Transaction associated with finance and accounting are credit applications, sales,
billing, collection documents, payment vouchers etc.
Operational control over the function itself require daily error and exception report,
records of processing delays etc.
Managerial control level for accounting and finance utilizes information on budgeted
versus actual cost of financial resources and error rates.
Strategic planning level for accounting finance involves a long run strategy to ensure
adequate financing, a long range tax accounting policy to minimize the impact of taxes.
Typical transaction for information processing service and resources, requests fro
corrections or changes in data and programs, reports of hardware and program
performance and projects proposals.
Operational control of information processing operations requires information on the
daily schedule of jobs, error rates and equipment failures, for new projects development
it requires daily or weekly schedules.
Managerial control over information processing requires data on planned versus actual
utilization, equipment cost, overall programmer performance and progress.
Strategic planning for information system involves the organization of the function, the
overall information system plan, selection of strategic uses of information and the
general structure of the hardware and software environment.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 15
Management Information System VI Semester BBM
Top management
Strategic Level
Middle Management
Management Level
Knowledge Level
Lower Management
Operational Level
Business
Sales & Manufac Finance Accounting Human Functional Areas
Marketing turing Resourc
supported.
e
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 16
Management Information System VI Semester BBM
UNIT II
INFORMATION AND MANAGERIAL EFFECTIVENESS
Information and Managerial Effectiveness:
DATA: Data is raw facts or Observation about physical phenomena or Business Transaction.
Data is also objective measurement of the attributes (characteristics) of entities such as People,
place, things & events.
Data is used in the form of raw material & must be subjected to data manipulation or processing
to produce useful information.
INFORMATION: Information is data placed in a meaningful & useful context for end users.
Action
Importance of information:
Its form is aggregated, manipulated and organized.
Its content is analyzed and evaluated.
It is placed in proper context for a human user.
Information contains:
An element of surprise.
Reduces uncertainty.
Triggers action.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 17
Management Information System VI Semester BBM
If the information system generate information useful for managers in planning & control the
whole system is called “management information system”.
1. Manager: Manager is the key pin of a successful organisation. Well-defined objectives and
strategies are required to effectively transform inputs into outputs. Managerial effectiveness is
governed by managerial skills, competence, intelligence, knowledge, sincerity and creativity.
It is judged by not what the managers do but by how well they do. Effective managers enable
the business to grow in the dynamic environment.
2. Organisation: Managerial effectiveness is also judged by the organisation itself. Highly
innovative and creative managers may not perform well if the organisation structure does not
permit them to do so. The structure, value system, design, culture, size and the work
environment largely determine the way managers manage the organisation. A highly
bureaucratic and formal organisation structure may not have committed and effective
managers.
3. Entrepreneurship: Success cannot be ensured unless managers have the quality of
entrepreneurship. Managerial effectiveness ensures that business in future is different from
business today. It requires hard work, intelligence, creativity and innovativeness to keep the
business successful in future.
4. Environment: Business operates in the dynamic and turbulent environment with ever
changing factors (economic, political, legal, social etc.). Managers adapt the organisations
according to demands of the environment. Successful and effective managers not only
respond to environment; they also influence the environment and become market leaders in
the industry.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 18
Management Information System VI Semester BBM
Managerial effectiveness is not an end. It is a means to the end, that is, efficient attainment of
organisational goals. In order to accomplish the tasks effectively, managerial effectiveness deals
with managerial jobs, skills of managers and the organisation as a whole.
Availability of information regarding the alternatives improves the odds in favour of making a
correct decision. Information is recognised as one of the most important corporate resources. It is
a source of competitive strength as it enables the management to outmaneuver its business rivals
at critical stages.
Information security is not simply software or hardware security, and it does not stand apart from
the total organization. An organization’s policies, plans and procedures may affect security needs,
and security practices may affect those policies, plans or procedures. The important point is that a
secure system is integral to the total organization.
If a secure system is part of the total organization, then one must understand the organization, its
goals, objectives, policies and procedures. If the objectives of an organization are unclear, then
implementing new technology will not help. If procedures are not secure, then new technology
will not make them secure. Understanding the organization is the first step in planning for a
secure system.
After establishing a clear understanding of the organization’s function and how it is to complete
its objectives, the first step in planning for and developing a secure system is to identify sensitive
data. Recognize specific levels of security and that each may not be equally valuable. Identifying
sensitive data and determining their value before the fact is a most difficult task for any
organization. Unfortunately for most Management Information Systems (MIS) directors,
management will more easily recognize the true value of data after the data have been disclosed to
unauthorized individuals and are compromised.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 19
Management Information System VI Semester BBM
security increases exponentially. The problem for management is one of encouraging increased
productivity through technology while maintaining what will probably be an increasingly insecure
system.
Types of information:
Jarvelin and Repo16 (1983) proposes three categories of information, namely:
These three information categories represent three different dimensions and have different roles in
addressing a problem.
Information can be classified in a number of ways and in this chapter, you will learn two of
the most important ways to classify information.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 20
Management Information System VI Semester BBM
Classification by Characteristic
Based on Anthony's classification of Management, information used in business for decision-
making is generally categorized into three types:
Strategic Information
decisions that defines the objectives of a business and checks how well these objectives
are met. For example, acquiring a new plant, a new product, diversification of business
etc, comes under strategic information.
Tactical Information
for exercising control over business resources, like budgeting, quality control, service
level, inventory level, productivity level etc.
Operational Information
level information and is used to ensure proper conduction of specific operational tasks as
planned/intended. Various operator specific, machine specific and shift specific jobs for
quality control checks comes under this category.
Classification by Application
Planning Information
norms and specifications in an organization. This information is used in strategic, tactical,
and operation planning of any activity. Examples of such information are time standards,
design standards.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 21
Management Information System VI Semester BBM
Control Information l
business activities through feedback mechanism. This information is used for controlling
attainment, nature and utilization of important processes in a system. When such
information reflects a deviation from the established standards, the system should induce a
decision or an action leading to control.
Knowledge Information
Knowledge information is acquired through experience and learning, and collected from
archival data and research studies.
Organizational Information
environment, culture in the light of its objectives. Karl Weick's Organizational
Information Theory emphasizes that an organization reduces its equivocality or
uncertainty by collecting, managing and using these information prudently. This
information is used by everybody in the organization; examples of such information are
employee and payroll information.
Database Information
that has multiple usage and application. Such information is stored, retrieved and managed
to create databases. For example, material specification or supplier information is stored
for multiple users.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 22
Management Information System VI Semester BBM
The term “Levels of Management’ refers to a line of demarcation between various managerial
positions in an organization. The number of levels in management increases when the size of the
business and work force increases and vice versa. The level of management determines a chain of
command, the amount of authority & status enjoyed by any managerial position. The levels of
management can be classified in three broad categories:
Managers at all these levels perform different functions. The role of managers at all the three
levels is discussed by the following diagram illustrates the various levels of a typical organization.
LEVELS OF MANAGEMENT
a. Top management lays down the objectives and broad policies of the enterprise.
b. It issues necessary instructions for preparation of department budgets, procedures,
schedules etc.
c. It prepares strategic plans & policies for the enterprise.
d. It appoints the executive for middle level i.e. departmental managers.
e. It controls & coordinates the activities of all the departments.
f. It is also responsible for maintaining a contact with the outside world.
g. It provides guidance and direction.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 23
Management Information System VI Semester BBM
h. The top management is also responsible towards the shareholders for the performance of
the enterprise.
2. Middle Level of Management: The branch managers and departmental managers constitute
middle level. They are responsible to the top management for the functioning of their
department. They devote more time to organizational and directional functions. In small
organization, there is only one layer of middle level of management but in big enterprises,
there may be senior and junior middle level management. Their role can be emphasized as -
a) They execute the plans of the organization in accordance with the policies and directives
of the top management.
b) They make plans for the sub-units of the organization.
c) They participate in employment & training of lower level management.
d) They interpret and explain policies from top level management to lower level.
e) They are responsible for coordinating the activities within the division or department.
f) It also sends important reports and other important data to top level management.
g) They evaluate performance of junior managers.
h) They are also responsible for inspiring lower level managers towards better
performance.
3. Lower Level of Management: Lower level is also known as supervisory / operative level of
management. It consists of supervisors, foreman, section officers, superintendent etc.
According to R.C. Davis, “Supervisory management refers to those executives whose work
has to be largely with personal oversight and direction of operative employees”. In other
words, they are concerned with direction and controlling function of management. Their
activities include -
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 24
Management Information System VI Semester BBM
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 25
Management Information System VI Semester BBM
In a nutshell:
Step1: Origination: The main source of records used in data processing is sales orders, purchase
orders or employee time cards stored in magnetic tapes, disks and terminals.
Step 2: Input: The input of data stored on these source documents into the data processing
system. The data records stored in secondary devices is now fed into the computer for processing.
Step3: Processing: Computer and other electronic devices are used for processing data. Data
should be sorted and verified before processing. Processing involves calculation, comparison,
filtering and modification of data according to user’s requirements.
Step4: Storing: The result of processing of data must be kept for future reference. This function
is called storage.
Step5: Data Retrieving: With the introduction of information technology users will be able to
search and retrieve files records on-line with direct access devices.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 26
Management Information System VI Semester BBM
Step6: Production of documents: Copies of documents and reports are prepared as an output of
the information system.
Quality of information:
Information is a vital resource for the success of any organization. Future of an organization lies
in using and disseminating information wisely. Good quality information placed in right context
in right time tells us about opportunities and problems well in advance.
According to Wang and Strong, following are the dimensions or elements of Information
Quality:
Intrinsic
Contextual Value-Added, Timeliness, Completeness, Amount of
information
Representational
Accessibility
Various authors propose various lists of metrics for assessing the quality of information. Let
us generate a list of the most essential characteristic features for information quality:
Reliability
Timely
decisions can be made in time.
Relevant
uncertainties.
Accurate
Sufficient s can be made on its
basis.
Unambiguous
comprehensive.
Complete
Unbiased ds, it should have
integrity.
Explicit
Comparable
Reproducible
achieve a consistent result.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 27
Management Information System VI Semester BBM
Financial Information System Is a system that accumulates and analyzes financial data in order
to make good financial management decisions in running the business. Financial information
systems are the software programs that help businesses manage their money. Systems can be set
up to keep track of your banking, accounts payable and accounts receivable; to generate standard
financial reports such as a profit-and-loss statement; and to report the information in various
formats. It's important to choose a system that suits your business needs. The basic objective of
the financial information system is to meet the firm's financial obligations as they come due,
using the minimal amount of financial resources consistent with an established margin of safety.
Outputs generated by the system include accounting reports, operating and capital budgets,
working capital reports, cash flow forecast, and various what - if analysis reports. The evaluation
of financial data may be performed through ratio analysis, trend evaluation, and financial
planning modeling. Financial planning and forecasting are facilitated if used in conjunction with a
DECISION SUPPORT SYSTEM (DSS)
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 28
Management Information System VI Semester BBM
Accounting Information Systems: The financial function of the enterprise consists in taking
stock of the flows of money and other assets into and out of an organization, ensuring that its
available resources are properly used and that the organization is financially fit. The components
of the accounting system include:
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 29
Management Information System VI Semester BBM
Financial information systems rely on external sources, such as on-line databases and custom
produced reports, particularly in the areas of financial forecasting and funds management. The
essential functions that financial information systems perform include:
Financial Forecasting: Financial forecasting is the process of predicting the inflows of funds into
the company and the outflows of funds from it for a long term into the future. Outflows of funds
must be balanced over the long term with the inflows. With the globalization of business, the
function of financial forecasting has become more complex, since the activities in multiple
national markets have to be consolidated, taking into consideration the vagaries of multiple
national currencies. Scenario analysis is frequently employed in order to prepare the firm for
various contingencies.
Financial forecasts are based on computerized models known as cash-flow models. They range
from rather simple spreadsheet templates to sophisticated models developed for the given industry
and customized for the firm or, in the case of large corporations to specify modeling of their
financial operations. Financial forecasting serves to identify the need for funds and their sources.
Financial Control: The primary tools of financial control are budgets. A budget specifies the
resources committed to a plan for a given project or time period. Fixed budgets are independent of
the level of activity of the unit for which the budget is drawn up. Flexible budgets commit
resources depending on the level of activity.
Spreadsheet programs are the main budgeting tools. Spreadsheets are the personal productivity
tools in use today in budget preparation.
In the systems-theoretic view, budgets serve as the standard against which managers can compare
the actual results by using information systems. Performance reports are used to monitor budgets
of various managerial levels. A performance report states the actual financial results achieved by
the unit and compares them with the planned results.
Along with budgets and performance reports, financial control employs a number of financial
ratios indicating the performance of the business unit. A widely employed financial ratio is return
on investment (ROI). ROS shows how well a business unit uses its resources. Its value is
obtained by dividing the earnings of the business unit by its total assets.
Funds Management: Financial information systems help to manage the organization's liquid
assets, such as cash or securities, for high yields with the lowest degree of loss risk. Some firms
deploy computerized systems to manage their securities portfolios and automatically generate buy
or sell orders.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 30
Management Information System VI Semester BBM
Every industry has its own departmental structure which gives rise to a different set of sub-
systems as part of the information system. Here we would consider the sub-systems of a
manufacturing system only.
Raw Material
Procurement
Quality Subsystem
Cost
Subsystem Subsystem
Maintenance
Production
& Scheduling
Subsystem
Subsystem
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 31
Management Information System VI Semester BBM
This is the commencement of the manufacturing process. Some might think of procurement as
a simple purchasing process like any other commodity but the spirit of having an all-embracing
raw material procurement sub-system is simply more than that.
Like with every system, there has to be a list of minimum specifications which every system
or subsystem has to cover. Purchasing logistics of an entity critically affect time to market
and other quality related issues. Issues like selection of suppliers, choice between local purchase
and import and delivery time taken by the supplier.
All these concerns are met and dealt with in the purchase subsystem. The complexity of the
purchase subsystem should depend on types of raw materials required, number of suppliers to
deal with and complexity of the terms of purchase agreements for long term. With higher
customer expectations, every organization wants to efficiently manage its suppliers and other
internal processes. Supply chain management spans all movement and storage of raw
materials, work-in process inventory, and finished goods from point-of-origin to point-of-
consumption. A procurement system should help in improving the supply chain of the
organization.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 32
Management Information System VI Semester BBM
It can be seen as the most critical part of the entire manufacturing sub system. Basically it
tracks the flow of the job through the entire production process.
It also records change in form of goods or transfer of goods from one place to the other.
For efficient production, the machines should be timely available. Many a times, the machine is
under repair and is not available to be used for production. Without this subsystem, there is a
possibility of customer's orders not being met on time. Certain issues that can be very important
are
This subsystem ensures the production made and end product being delivered to the customer is
conforming the quality standards set by the company. Quality covers aspects for the organization
like better quality raw materials and what is being purchased is according to organization’s
standards and improved finished goods in accordance with the customer specification
Philip Kotler: “A marketing information system is a continuing and interacting system of people,
equipment’s, and procedures to gather, sort, analyze, evaluate, and distribute the pertinent, timely,
and accurate information for use by marketing decision-makers to improve their marketing
planning, implementation, and control.” Philip Kotler gives alternative definition, such as: “A
marketing information system (MIS) consists of people, equipment’s, and procedures to gather,
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 33
Management Information System VI Semester BBM
sort, analyze, evaluate, and distribute the needed, timely, and accurate information to marketing
decision makers.”
We can say: Marketing Information System (MIS) is a permanent arrangement (system or setup)
for provision of regular availability of relevant, reliable, adequate, and timely information for
making marketing decisions.
Finally, let us define the term more comprehensively: MIS concerns with setting and
maintaining of a permanent system (network) to avail necessary information on regular basis. The
system consists of people, equipment’s, facilities, and procedures directed to gather, analyze,
evaluate, update, distribute, and preserve the information to assist marketing decision-making,
i.e., analyzing, planning, implementing, and controlling of marketing activities.
The marketing information system distributes the relevant information to the marketers who can
make the efficient decisions related to the marketing operations viz. Pricing, packaging, new
product development, distribution, media, promotion, etc.
Every marketing operation works in unison with the conditions prevailing both inside and outside
the organization, and, therefore, there are several sources ( viz. Internal, Marketing Intelligence,
Marketing Research) through which the relevant information about the market can be obtained.
1. Internal Records: The Company can collect information through its internal records
comprising of sales data, customer database, product database, financial data, operations data,
etc. The detailed explanation of the internal sources of data is given below:
The information can be collected from the documents such as invoices, transmit copies,
billing documents prepared by the firms once they receive the order for the goods and
services from the customers, dealers or the sales representatives.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 34
Management Information System VI Semester BBM
The current sales data should be maintained on a regular basis that serves as an aide to a
the Marketing Information System. The reports on current sales and the inventory levels
help the management to decide on its objectives, and the marketers can make use of this
information to design their future sales strategy.
The Companies maintain several databases such as*Customer Database- wherein the
complete information about the customer’s name, address, phone number, the frequency
of purchase, financial position, etc. is saved.
Product Database- wherein the complete information about the product’s price,
features, variants, is stored.
Salesperson database, wherein the complete information about the salesperson, his
name, address, phone number, sales target, etc. is saved.
The companies store their data in the data warehouse from where the data can be retrieved
anytime the need arises. Once the data is stored, the statistical experts mine it by applying
several computer software and techniques to convert it into meaningful information that
gives facts and figures.
2. Marketing Intelligence System: The marketing intelligence system provides the data about
the happenings in the market, i.e. data related to the marketing environment which is external
to the organization. It includes the information about the changing market trends, competitor’s
pricing strategy, change in the customer’s tastes and preferences, new products launched in
the market, promotion strategy of the competitor, etc.
In order to have an efficient marketing Information System, the companies should work
aggressively to improve the marketing intelligence system by taking the following steps:
Providing the proper training and motivating the sales force to keep a check on the market
trends, i.e. the change in the tastes and preferences of customers and give suggestions on
the improvements, if any.
Motivating the channel partners viz. Dealer, distributors, retailers who are in the actual
market to provide the relevant and necessary information about the customers and the
competitors.
The companies can also improve their marketing intelligence system by getting more and
more information about the competitors. This can be done either by purchasing the
competitor’s product, attending the trade shows, reading the competitor’s published
articles in magazines, journals, financial reports.
The companies can have an efficient marketing information system by involving the loyal
customers in the customer advisory panel who can share their experiences and give advice
to the new potential customers.
The companies can make use of the government data to improve its marketing Information
system. The data can be related to the population trends, demographic characteristics,
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 35
Management Information System VI Semester BBM
agricultural production, etc. that help an organization to plan its marketing operations
accordingly.
Also, the companies can purchase the information about the marketing environment from
the research companies who carry out the researches on all the players in the market.
The Marketing Intelligence system can be further improved by asking the customers
directly about their experience with the product or service via feedback forms that can be
filled online.
The secondary data are publicly available, but the primary data is to be collected by the
researcher through certain methods such as questionnaires, personal interviews, surveys,
seminars, etc.
A marketing research contributes a lot in the marketing information system as it provides the
factual data that has been tested several times by the researchers.
4. Marketing Decision Support System: It includes several software programs that can be used
by the marketers to analyze the data, collected so far, to take better marketing decisions.With
the use of computers, the marking managers can save the huge data in a tabular form and can
apply statistical programs to analyze the data and make the decisions in line with the findings.
Thus, the marketers need to keep a check on the marketing environment, i.e. both the internal
(within the organization) and the external (outside the organization, so that marketing policies,
procedures, strategies can be designed accordingly.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 36
Management Information System VI Semester BBM
Marketing activities are directed toward planning, promoting, and selling goods and services to
satisfy the needs of customers and the objectives of the organization.
Marketing information systems support decision making regarding the marketing mix. These
include:
1. Product
2. Price
3. Place
4. Promotion
Figure illustrates the structure of the entire marketing information system. In order to support
decision making on the marketing mix, a marketing information system draws on several sources
of data and information.
A marketing information system relies on external information to a far greater degree than other
organizational information systems. It includes two subsystems designed for boundary spanning -
bringing into the firm data and information about the marketplace.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 37
Management Information System VI Semester BBM
The objective of marketing research is to collect data on the actual customers and the potential
customers, known as prospects. The identification of the needs of the customer is a fundamental
starting point for total quality management (TQM). Electronic commerce on the WEB makes it
easy to compile statistics on actual buyer behaviour.
Marketing research software supports statistical analysis of data. It enables the firm to correlate
buyer behaviour with very detailed geographic variables, demographic variables, and
psychographic variables.
Marketing (competitive) intelligence is responsible for the gathering and interpretation of data
regarding the firm's competitors, and for the dissemination of the competitive information to the
appropriate users. Most of the competitor information comes from corporate annual reports,
media-tracking services, and from reports purchased from external providers, including on-line
database services. The Internet has become a major source of competitive intelligence.
The marketing mix subsystems support decision making regarding product introduction, pricing,
promotion (advertising and personal selling), and distribution. These decisions are integrated into
the sales forecast and marketing plans against which the ongoing sales results are compared.
1. Product subsystem
2. Place subsystem
3. Promotion subsystem
4. Price subsystem
5. Sales forecasting
Product Subsystem
The product subsystem helps to plan the introduction of new products. Continually bringing new
products to market is vital in today's competitive environment of rapid change. The product
subsystem should support balancing the degree of risk in the overall new-product portfolio, with
more aggressive competitors assuming higher degrees of risk for a potentially higher payoff.
Although decisions regarding the introduction of new products are unstructured, information
systems support this process in several ways:
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 38
Management Information System VI Semester BBM
5. Information derived from marketing intelligence and research is vital in evaluating new
product ideas.
Place Subsystem
The place subsystem assists the decision makers in making the product available to the customer
at the right place at the right time. The place subsystem helps plan the distribution channels for
the product and track their performance.
The use of information technology has dramatically increased the availability of information on
product movement in the distribution channel. Examples include:
Promotion Subsystem
The promotion subsystem is often the most elaborate in the marketing information system, since it
supports both personal selling and advertising. Media selection packages assist in selecting a mix
of avenues to persuade the potential purchaser, including direct mail, television, print media, and
the electronic media such as the Internet and the WEB in particular. The effectiveness of the
selected media mix is monitored and its composition is continually adjusted.
Database marketing relies on the accumulation and use of extensive databases to segment
potential customers and reach them with personalized promotional information.
The role of telemarketing, marketing over the telephone, has increased. Telemarketing calls are
well supported by information technology.
Sales force automation involves equipping salespeople with portable computers tied into the
corporate information systems. This gives the salespeople instantaneous access to information and
frees them from the reporting paperwork. This increases selling time and the level of
performance. Access to corporate databases is sometimes accompanied by access to corporate
expertise; either by being able to contact the experts or by using expert systems that help specifies
the product meeting customer requirements.
Price Subsystem
Pricing decisions find a degree of support from DSSs and access to databases that contain
industry prices. These highly unstructured decisions are made in pursuit of the companies pricing
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 39
Management Information System VI Semester BBM
objectives. General strategies range from profit maximization to forgoing a part of the profit in
order to increase a market share.
Information systems provide an opportunity to finely segment customer groups, and charge
different prices depending on the combination of products and services provided, as well as the
circumstances of the sale transaction.
Sales Forecasting
Based on the planned marketing mix and outstanding orders, sales are forecast and a full
marketing plan is developed. Sale forecastingis an area where any quantitative methods
employed must be tempered with human insight and experience. The actual sales will depend to a
large degree on the dynamics of the environment.
Qualitative techniques are generally used for environmental forecasting - an attempt to predict
the social, economic, legal, and technological environment in which the company will try to
realize its plans. Sales forecasting uses numerous techniques, which include:
1. Group decision making techniques are used to elicit broad expert opinion
2. Scenario analysis in which each scenario in this process is a plausible future environment
3. Extrapolation of trends and cycles through a time-series analysis.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 40
Management Information System VI Semester BBM
A human resource information system (HRIS) supports the human resources function of an
organization with information. The name of this function reflects the recognition that people who
work in a firm are frequently its most valuable resources. The complexity of human resource
management has grown immensely over recent years, primary due to the need to conform with
new laws and regulations.
A HRIS has to ensure the appropriate degree of access to a great variety of internal stakeholders,
including:
At the heart of HRIS are its databases, which are in some cases integrated into a single human
resource database. The record of each employee in a sophisticated employee database may
contain 150 to 200 data items, including the personal data, educational history and skills,
occupational background, and the history of occupied positions, salary, and performance in the
firm. Richer multimedia databases are not assembled by some firms in order to facilitate fast
formation of compatible teams of people with complementary skills.
1. Applicant databases
2. Position inventory
3. Skills inventory
4. Benefit databases
5. External databases
The information subsystems of HRIS reflect the flow of human resources through the firm, from
planning and recruitment to termination. A sophisticated HRIS includes the following
subsystems:
To identify the human resources necessary to accomplish the long-term objectives of a firm, we
need to project the skills, knowledge, and experience of the future employees.
Based on the long-term resource plan, a recruitment plan is developed. The plan lists the currently
unfilled positions and those expected to become vacant due to turnover.
The life-cycle transitions of the firm's workforce - hiring, promotion and transfer, and termination
- have to be supported with the appropriate information system components.
Two principal external stakeholders have an abiding interest in the human resource policies of
organizations. These are:
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 42
Management Information System VI Semester BBM
Unit III
Information Systems
Defining Information Systems
Almost all programs in business require students to take a course in something called information
systems. But what exactly does that term mean? Let’s take a look at some of the more popular
definitions, first from Wikipedia and then from a couple of textbooks:
As you can see, these definitions focus on two different ways of describing information systems:
the components that make up an information system and the role that those components play in an
organization. Let’s take a look at each of these.
A system is a set of components (subsystems) that operate together to achieve certain objectives.
The objectives of a system are realized in its outputs. An information system is a system that
accepts data resources as input and processes them into information products as output.
An information system depends on the resources of people (end users and IS specialists),
hardware (machines and media), software (programs and procedures), data (data and knowledge
basis), and networks (communications media and network support) to perform input, processing,
output, storage, and control activities that convert data resources into information products.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 43
Management Information System VI Semester BBM
This information system model highlights the relationships among the components and activities
of information systems. It provides a framework that emphasizes four major concepts that can be
applied to all types of information systems:
People, hardware, software, data, and networks are the five basic resources of information
systems.
People resources include end users and IS specialists, hardware resources consist of
machines and media, software resources include both programs and procedures, data
resources can include data and knowledge bases, and network resources include
communications media and networks.
Data resources are transformed by information processing activities into a variety of
information products for end users.
Information processing consists of input, processing, output, storage, and control
activities.
1. People Resources: People are required for the operation of all information systems. These
people resources include end users and ARE specialists.
End users (also called users or clients) are people who use an information system or the
information it produces. They can be accountants, salespersons, engineers, clerks,
customers, or managers. Most of us are information system end users.
IS Specialists are people who develop and operate information systems. They include
systems analysts, programmers, computer operators, and other managerial technical, and
clerical IS personnel. Briefly, systems analysts design information systems based on the
information requirements of end uses, programmers prepare computer programs based on
the specifications of systems analysts, and computer operators operate large computer
systems.
2. Hardware Resources: The concept of Hardware resources includes all physical devices and
materials used in information processing. Specially, it includes not only machines, such as
computers and other equipment, but also all data media, that is, all tangible objects on which
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 44
Management Information System VI Semester BBM
data is recorded, from sheets of paper to magnetic disks. Example of hardware in computer-
based information systems are:
Computer systems, which consist of central processing units containing microprocessors,
and variety of interconnected peripheral devices. Examples are microcomputer systems,
midrange computer systems, and large mainframe computer systems.
Computer peripherals, which are devices such as a keyboard or electronic mouse for
input of data and commands, a video screen or printer for output of information, and
magnetic or optical disks for storage of data resources.
3. Software Resources: The concept of Software Resources includes all sets of information
processing instructions. This generic concept of software includes not only the sets of
operating instructions called programs, which direct and control computer hardware, but also
the sets of information processing instructions needed by people, called procedures.
It is important to understand that even information systems that don’t use computers have a
software resource component. This is true even for the information systems of ancient times,
or the manual and machine-supported information systems still used in the world today. They
all require software resources in the form of information processing instructions and
procedures in order to properly capture, process, and disseminate information to their users.
4. Data Resources: Data is more than the raw material of information systems. The concept of
data resources has been broadened by managers and information systems professionals. They
realize that data constitutes a valuable organization resource. Thus, you should view data as
data resources that must be managed effectively to benefit all end users in an organization.
Data can take many forms, including traditional alphanumeric data, composed of numbers and
alphabetical and other characters that describe business transactions and other events and
entities. Text data, consisting of sentences and paragraphs used in written communications;
image data, such as graphic shapes and figures; and audio data, the human voice and other
sounds, are also important forms of data.
The data resources of information systems are typically organized into:
Database that hold processed and organized data.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 45
Management Information System VI Semester BBM
Knowledge bases that hold knowledge in variety of forms such as facts, rules, and case
examples about successful business practices.
For example, data about sales transactions may be accumulated and stored in a sales database
for subsequent processing that yields daily, weekly, and monthly sales analysis reports for
management. Knowledge bases are used by knowledge management systems and expert
systems to share knowledge and give expert advice on specific subjects.
5. Network Resources: Telecommunications networks like the Internet, intranets, and extranets
have become essential to the successful operations of all types of organizations and their
computer-based information systems. Telecommunications networks consist of computers,
communications processors, and other devices interconnected by communications media and
controlled by communications software. The concept of Network resources emphasizes that
communications networks are a fundamental resource component of all information systems.
Network resources include:
Communication media, Examples include twisted pair wire, coaxial cable, fiber-optic
cable, microwave systems, and communication satellite systems.
Network Support, This generic category includes all of the people, hardware, software,
and data resources that directly support the operation and use of a communications
network. Examples include communications control software such as network operating
systems and Internet packages.
In summary, these five components together make up the five component framework, which
are the five fundamental components of an information system. First you will need the
hardware in order to start off your system. Then you must use the software in order to run you
hardware. After you have set up your hardware and loaded up the software to run it, you will
need data to input into your hardware. Once you have your data ready you will need
procedures set in play to properly store your data within the system, and last you will need
people in order to put in the data and keep the system up and running properly at all times. As
you can see, you will need every component in order to ensure that you have a functional
running information system.
Several roles played by information systems in an organisation can be identified but O’Brien
and Marakas (2008) have identified three fundamental roles played by information systems in
businesses. These are;
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 47
Management Information System VI Semester BBM
The Mainframe Era: From the late 1950s through the 1960s, computers were seen as a way to
more efficiently do calculations. These first business computers were room-sized monsters, with
several refrigerator-sized machines linked together. The primary work of these devices was to
organize and store large volumes of information that were tedious to manage by hand. Only large
businesses, universities, and government agencies could afford them, and they took a crew of
specialized personnel and specialized facilities to maintain. These devices served dozens to
hundreds of users at a time through a process called time-sharing. Typical functions included
scientific calculations and accounting, under the broader umbrella of “data processing.”
In the late 1960s, the Manufacturing Resources Planning (MRP) systems were introduced. This
software, running on a mainframe computer, gave companies the ability to manage the
manufacturing process, making it more efficient. From tracking inventory to creating bills of
materials to scheduling production, the MRP systems (and later the MRP II systems) gave more
businesses a reason to want to integrate computing into their processes. IBM became the
dominant mainframe company. Nicknamed “Big Blue,” the company became synonymous
with business computing. Continued improvement in software and the availability of cheaper
hardware eventually brought mainframe computers (and their little sibling, the minicomputer)
into most large businesses.
The PC Revolution: In 1975, the first microcomputer was announced on the cover of Popular
Mechanics: the Altair 8800. Its immediate popularity sparked the imagination of entrepreneurs
everywhere, and there were quickly dozens of companies making these “personal computers.”
Though at first just a niche product for computer hobbyists, improvements in usability and the
availability of practical software led to growing sales. The most prominent of these early personal
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 48
Management Information System VI Semester BBM
computer makers was a little company known as Apple Computer, headed by Steve Jobs and
Steve Wozniak, with the hugely successful “Apple II.” Not wanting to be left out of the
revolution, in 1981 IBM (teaming with a little company called Microsoft for their operating-
system software) hurriedly released their own version of the personal computer, simply called the
“PC.” Businesses, who had used IBM mainframes for years to run their businesses, finally had the
permission they needed to bring personal computers into their companies, and the IBM PC took
off. The IBM PC was named Time magazine’s “Man of the Year” for 1982.
Because of the IBM PC’s open architecture, it was easy for other companies to copy, or “clone”
it. During the 1980s, many new computer companies sprang up, offering less expensive versions
of the PC. This drove prices down and spurred innovation. Microsoft developed its Windows
operating system and made the PC even easier to use. Common uses for the PC during this period
included word processing, spreadsheets, and databases. These early PCs were not connected to
any sort of network; for the most part they stood alone as islands of innovation within the larger
organization.
Client-Server: In the mid-1980s, businesses began to see the need to connect their computers
together as a way to collaborate and share resources. This networking architecture was referred to
as “client-server” because users would log in to the local area network (LAN) from their PC (the
“client”) by connecting to a powerful computer called a “server,” which would then grant them
rights to different resources on the network (such as shared file areas and a printer). Software
companies began developing applications that allowed multiple users to access the same data at
the same time. This evolved into software applications for communicating, with the first real
popular use of electronic mail appearing at this time.
This networking and data sharing all stayed within the confines of each business, for the most
part. While there was sharing of electronic data between companies, this was a very specialized
function. Computers were now seen as tools to collaborate internally, within an organization. In
fact, these networks of computers were becoming so powerful that they were replacing many of
the functions previously performed by the larger mainframe computers at a fraction of the cost. It
was during this era that the first Enterprise Resource Planning (ERP) systems were developed and
run on the client-server architecture. An ERP system is a software application with a centralized
database that can be used to run a company’s entire business. With separate modules for
accounting, finance, inventory, human resources, and many, many more, ERP systems,
with Germany’s SAP leading the way, represented the state of the art in information systems
integration. We will discuss ERP systems as part of the chapter on process (chapter 9).
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 49
Management Information System VI Semester BBM
The World Wide Web and E-Commerce: First invented in 1969, the Internet was confined to
use by universities, government agencies, and researchers for many years. Its rather arcane
commands and user applications made it unsuitable for mainstream use in business. One
exception to this was the ability to expand electronic mail outside the confines of a single
organization. While the first e-mail messages on the Internet were sent in the early 1970s,
companies who wanted to expand their LAN-based e-mail started hooking up to the Internet in
the 1980s. Companies began connecting their internal networks to the Internet in order to allow
communication between their employees and employees at other companies. It was with these
early Internet connections that the computer truly began to evolve from a computational device to
a communications device.
In 1989, Tim Berners-Lee developed a simpler way for researchers to share information over the
network at CERN laboratories, a concept he called the World Wide Web.[4] This invention
became the launching point of the growth of the Internet as a way for businesses to share
information about themselves. As web browsers and Internet connections became the norm,
companies rushed to grab domain names and create websites.
In 1991, the National Science Foundation, which governed how the Internet was used, lifted
restrictions on its commercial use. The year 1994 saw the establishment of both eBay and
Amazon.com, two true pioneers in the use of the new digital marketplace. A mad rush of
investment in Internet-based businesses led to the dot-com boom through the late 1990s, and then
the dot-com bust in 2000. While much can be learned from the speculation and crazy economic
theories espoused during that bubble, one important outcome for businesses was that thousands of
miles of Internet connections were laid around the world during that time. The world became
truly “wired” heading into the new millenium, ushering in the era of globalization.
As it became more expected for companies to be connected to the Internet, the digital world also
became a more dangerous place. Computer viruses and worms, once slowly propagated through
the sharing of computer disks, could now grow with tremendous speed via the Internet. Software
written for a disconnected world found it very difficult to defend against these sorts of threats. A
whole new industry of computer and Internet security arose. We will study information security in
chapter 6.
Web 2.0: As the world recovered from the dot-com bust, the use of technology in business
continued to evolve at a frantic pace. Websites became interactive; instead of just visiting a site to
find out about a business and purchase its products, customers wanted to be able to customize
their experience and interact with the business. This new type of interactive website, where you
did not have to know how to create a web page or do any programming in order to put
information online, became known as web 2.0. Web 2.0 is exemplified by blogging, social
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 50
Management Information System VI Semester BBM
networking, and interactive comments being available on many websites. This new web-2.0
world, in which online interaction became expected, had a big impact on many businesses and
even whole industries. Some industries, such as bookstores, found themselves relegated to a niche
status. Others, such as video rental chains and travel agencies, simply began going out of business
as they were replaced by online technologies. This process of technology replacing a middleman
in a transaction is called disintermediation.
As the world became more connected, new questions arose. Should access to the Internet be
considered a right? Can I copy a song that I downloaded from the Internet? How can I keep
information that I have put on a website private? What information is acceptable to collect from
children? Technology moved so fast that policymakers did not have enough time to enact
appropriate laws, making for a Wild West–type atmosphere. Ethical issues surrounding
information systems will be covered in chapter 12.
The Post-PC World: After thirty years as the primary computing device used in most businesses,
sales of the PC are now beginning to decline as sales of tablets and smartphones are taking off.
Just as the mainframe before it, the PC will continue to play a key role in business, but will no
longer be the primary way that people interact and do business. The limited storage and
processing power of these devices is being offset by a move to “cloud” computing, which allows
for storage, sharing, and backup of information on a massive scale. This will require new rounds
of thinking and innovation on the part of businesses as technology continues to advance.
Terminals connected
Mainframe Time-sharing Custom-written
to mainframe
(1970s) (TSO) on MVS MRP software
computer.
IBM PC or
compatible.
PC Sometimes connected WordPerfect,
MS-DOS
(mid-1980s) to mainframe Lotus 1-2-3
computer via
expansion card.
Client-Server Microsoft
IBM PC “clone” on a Windows for
(late 80s to Word, Microsoft
Novell Network. Workgroups
early 90s) Excel
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 51
Management Information System VI Semester BBM
World
IBM PC “clone” Microsoft
Wide Web
connected to company Windows XP Office, Internet
(mid-90s to
intranet. Explorer
early 2000s)
Post-PC Mobile-friendly
(today and Apple iPad iOS websites, mobile
beyond) apps
In 2003, Nicholas Carr wrote an article in the Harvard Business Review that questioned this
assumption. The article, entitled “IT Doesn’t Matter,” raised the idea that information technology
has become just a commodity. Instead of viewing technology as an investment that will make a
company stand out, it should be seen as something like electricity: It should be managed to reduce
costs, ensure that it is always running, and be as risk-free as possible.
As you might imagine, this article was both hailed and scorned. Can IT bring a competitive
advantage? It sure did for Walmart (see sidebar). We will discuss this topic further in chapter 7.
Sidebar: Walmart Uses Information Systems to Become the World’s Leading Retailer
Walmart is the world’s largest retailer, earning $15.2 billion on sales of $443.9 billion in the fiscal
year that ended on January 31, 2012. Walmart currently serves over 200 million customers every
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 52
Management Information System VI Semester BBM
week, worldwide.[5] Walmart’s rise to prominence is due in no small part to their use of
information systems.
One of the keys to this success was the implementation of Retail Link, a supply-chain
management system. This system, unique when initially implemented in the mid-1980s, allowed
Walmart’s suppliers to directly access the inventory levels and sales information of their products
at any of Walmart’s more than ten thousand stores. Using Retail Link, suppliers can analyze how
well their products are selling at one or more Walmart stores, with a range of reporting options.
Further, Walmart requires the suppliers to use Retail Link to manage their own inventory levels.
If a supplier feels that their products are selling out too quickly, they can use Retail Link to
petition Walmart to raise the levels of inventory for their products. This has essentially allowed
Walmart to “hire” thousands of product managers, all of whom have a vested interest in the
products they are managing. This revolutionary approach to managing inventory has allowed
Walmart to continue to drive prices down and respond to market forces quickly.
Today, Walmart continues to innovate with information technology. Using its tremendous market
presence, any technology that Walmart requires its suppliers to implement immediately becomes
a business standard.
The first group of people we are going to look at play a role in designing, developing, and
building information systems. These people are generally very technical and have a background
in programming and mathematics. Just about everyone who works in the creation of information
systems has a minimum of a bachelor’s degree in computer science or information systems,
though that is not necessarily a requirement.
Systems Analyst: The role of the systems analyst is to straddle the divide between identifying
business needs and imagining a new or redesigned computer-based system to fulfill those needs.
This individual will work with a person, team, or department with business requirements and
identify the specific details of a system that needs to be built. Generally, this will require the
analyst to have a good understanding of the business itself , the business processes involved, and
the ability to document them well. The analyst will identify the different stakeholders in the
system and work to involve the appropriate individuals in the process.
Programmer: Programmers spend their time writing computer code in a programming language.
In the case of systems development, programmers generally attempt to fulfill the design
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 53
Management Information System VI Semester BBM
specifications given to them by a systems analyst. Many different styles of programming exist: a
programmer may work alone for long stretches of time or may work in a team with other
programmers. A programmer needs to be able to understand complex processes and also the
intricacies of one or more programming languages. Generally, a programmer is very proficient in
mathematics, as mathematical concepts underlie most programming code.
Computer Engineer: Computer engineers design the computing devices that we use every day.
There are many types of computer engineers, who work on a variety of different types of devices
and systems. Some of the more prominent engineering jobs are as follows:
Software engineer: Software engineers do not actually design devices; instead, they
create new programming languages and operating systems, working at the lowest levels of
the hardware to develop new kinds of software to run on the hardware.
Systems engineer: A systems engineer takes the components designed by other engineers
and makes them all work together. For example, to build a computer, the mother board,
processor, memory, and hard disk all have to work together. A systems engineer has
experience with many different types of hardware and software and knows how to
integrate them to create new functionality.
There are many different types of computer engineers, and often the job descriptions overlap.
While many may call themselves engineers based on a company job title, there is also a
professional designation of “professional engineer,” which has specific requirements behind it. In
the US, each state has its own set of requirements for the use of this title, as do different countries
around the world. Most often, it involves a professional licensing exam.
Another group of information-systems professionals are involved in the day-to-day operations and
administration of IT. These people must keep the systems running and up-to-date so that the rest
of the organization can make the most effective use of these resources.
Computer Operator: A computer operator is the person who keeps the large computers running.
This person’s job is to oversee the mainframe computers and data centers in organizations. Some
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 54
Management Information System VI Semester BBM
of their duties include keeping the operating systems up to date, ensuring available memory and
disk storage, and overseeing the physical environment of the computer. Since mainframe
computers increasingly have been replaced with servers, storage management systems, and other
platforms, computer operators’ jobs have grown broader and include working with these
specialized systems.
Database Administrator: A database administrator (DBA) is the person who manages the
databases for an organization. This person creates and maintains databases that are used as part of
applications or the data warehouse. The DBA also consults with systems analysts and
programmers on projects that require access to or the creation of databases.
Help-Desk/Support Analyst: Most mid-size to large organizations have their own information-
technology help desk. The help desk is the first line of support for computer users in the company.
Computer users who are having problems or need information can contact the help desk for
assistance. Many times, a help-desk worker is a junior-level employee who does not necessarily
know how to answer all of the questions that come his or her way. In these cases, help-desk
analysts work with senior-level support analysts or have a computer knowledgebase at their
disposal to help them investigate the problem at hand. The help desk is a great place to break into
working in IT because it exposes you to all of the different technologies within the company. A
successful help-desk analyst should have good people and communications skills, as well as at
least junior-level IT skills.
Trainer: A computer trainer conducts classes to teach people specific computer skills. For
example, if a new ERP system is being installed in an organization, one part of the
implementation process is to teach all of the users how to use the new system. A trainer may work
for a software company and be contracted to come in to conduct classes when needed; a trainer
may work for a company that offers regular training sessions; or a trainer may be employed full
time for an organization to handle all of their computer instruction needs. To be successful as a
trainer, you need to be able to communicate technical concepts well and also have a lot of
patience!
CIO: The CIO, or chief information officer, is the head of the information-systems function. This
person aligns the plans and operations of the information systems with the strategic goals of the
organization. This includes tasks such as budgeting, strategic planning, and personnel decisions
for the information-systems function. The CIO must also be the face of the IT department within
the organization. This involves working with senior leaders in all parts of the organization to
ensure good communication and planning.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 55
Management Information System VI Semester BBM
ERP Management: Organizations using an ERP require one or more individuals to manage these
systems. These people make sure that the ERP system is completely up to date, work to
implement any changes to the ERP that are needed, and consult with various user departments on
needed reports or data extracts.
Project Managers: Information-systems projects are notorious for going over budget and being
delivered late. In many cases, a failed IT project can spell doom for a company. A project
manager is responsible for keeping projects on time and on budget. This person works with the
stakeholders of the project to keep the team organized and communicates the status of the project
to management. A project manager does not have authority over the project team; instead, the
project manager coordinates schedules and resources in order to maximize the project outcomes.
A project manager must be a good communicator and an extremely organized person. A project
manager should also have good people skills. Many organizations require each of their project
managers to become certified as a project management professional (PMP).
Emerging Roles: As technology evolves, many new roles are becoming more common as other
roles fade. For example, as we enter the age of “big data,” we are seeing the need for more data
analysts and business-intelligence specialists. Many companies are now hiring social-media
experts and mobile-technology specialists. The increased use of cloud computing and virtual-
machine technologies also is breeding demand for expertise in those areas.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 56
Management Information System VI Semester BBM
These job descriptions do not represent all possible jobs within an information-systems
organization. Larger organizations will have more specialized roles; smaller organizations may
combine some of these roles. Many of these roles may exist outside of a traditional information-
systems organization, as we will discuss below.
Working with information systems can be a rewarding career choice. Whether you want to be
involved in very technical jobs (programmer, database administrator), or you want to be involved
in working with people (systems analyst, trainer), there are many different career paths available.
Many times, those in technical jobs who want career advancement find themselves in a dilemma:
do they want to continue doing technical work, where sometimes their advancement options are
limited, or do they want to become a manager of other employees and put themselves on a
management career track? In many cases, those proficient in technical skills are not gifted with
managerial skills. Some organizations, especially those that highly value their technically skilled
employees, will create a technical track that exists in parallel to the management track so that they
can retain employees who are contributing to the organization with their technical skills.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 57
Management Information System VI Semester BBM
One tool that can be used to understand how users will adopt a new technology comes from a
1962 study by Everett Rogers. In his book, Diffusion of Innovation, Rogers studied how farmers
adopted new technologies, and he noticed that the adoption rate started slowly and then
dramatically increased once adoption hit a certain point. He identified five specific types of
technology adopters:
Innovators: Innovators are the first individuals to adopt a new technology. Innovators are
willing to take risks, are the youngest in age, have the highest social class, have great
financial liquidity, are very social, and have the closest contact with scientific sources and
interaction with other innovators. Risk tolerance has them adopting technologies that may
ultimately fail. Financial resources help absorb these failures (Rogers 1962 5th ed, p. 282).
Early adopters: The early adopters are those who adopt innovation after a technology has
been introduced and proven. These individuals have the highest degree of opinion
leadership among the other adopter categories, which means that they can influence the
opinions of the largest majority. They are typically younger in age, have higher social
status, more financial liquidity, more advanced education, and are more socially
aware than later adopters. These people are more discrete in adoption choices than
innovators, and realize judicious choice of adoption will help them maintain a central
communication position (Rogers 1962 5th ed, p. 283).
Early majority: Individuals in this category adopt an innovation after a varying degree of
time. This time of adoption is significantly longer than the innovators and early adopters.
This group tends to be slower in the adoption process, has above average social status, has
contact with early adopters, and seldom holds positions of opinion leadership in a system
(Rogers 1962 5th ed, p. 283).
Late majority: The late majority will adopt an innovation after the average member of the
society. These individuals approach an innovation with a high degree of skepticism, have
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 58
Management Information System VI Semester BBM
below average social status, very little financial liquidity, are in contact with others in the
late majority and the early majority, and show very little opinion leadership.
Laggards: Individuals in this category are the last to adopt an innovation. Unlike those in
the previous categories, individuals in this category show no opinion leadership. These
individuals typically have an aversion to change-agents and tend to be advanced in
age. Laggards typically tend to be focused on “traditions,” are likely to have the lowest
social status and the lowest financial liquidity, be oldest of all other adopters, and be in
contact with only family and close friends.
These five types of users can be translated into information-technology adopters as well, and
provide additional insight into how to implement new information systems within an
organization. For example, when rolling out a new system, IT may want to identify the innovators
and early adopters within the organization and work with them first, then leverage their adoption
to drive the rest of the implementation.
Businesses tend to have several "information systems" operating at the same time. This study note
highlights the main categories of information system and provides some examples to help you
distinguish between them.
The different types of date / information / knowledge that are processed at different levels in the
organization, we can create a five level model.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 59
Management Information System VI Semester BBM
Five level pyramid model based on the processing requirement of different levels in the organization
While there are several different versions of the pyramid model, the most common is probably a
four level model based on the people who use the systems. Basing the classification on the people
who use the information system means that many of the other characteristics such as the nature of
the task and informational requirements are taken into account more or less automatically.
Four level pyramid model based on the different levels of hierarchy in the organization
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 60
Management Information System VI Semester BBM
Definition: A Transaction Processing System is a set of information which processes the data
transaction in database system that monitors transaction programs. The system is useful when
something is sold over the internet. It allows for a time delay between when an item is being sold
to when it is actually sold. An example is that of a sporting event ticket. While the customer is
filling out their information to purchase the seat ticket; the transaction processing system is
holding the ticket so that another customer cannot also buy it. It allows for a ticket not to be sold
to two different customers.
An Information system that processes data arising from the occurrence of business
transactions. Transaction processing systems (TPS) are aimed at improving the routine
business activities on which all organizations depend.
A transaction is any event or activity that affects the organization which occur as part of
doing business, such as sales, purchases, deposit, withdrawals, refunds and payments.
Common transactions include placing orders, billing customers, hiring employees, and
depositing cheques.
The types of transactions that occur vary from organization to organization.
Transaction processing, the set of procedures for handling the transactions, often includes
the activities like calculation, storage and retrieval, classification, summarization, sorting.
Transaction processing procedures are often called standard operating procedures.
Example: The routines associated with general banking transactions typify the use of standard
operating procedures for the handling of deposits and withdraws, cashing of cheques, and other
processes.
Types of TPS:
1. Batch processing: Processes several transactions at the same time, with a time delay.
2. Real-time processing: Deals with one transaction at a time and does not have a time delay.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 61
Management Information System VI Semester BBM
Features
1. Rapid Response: The response time of a transaction processing system (TPS) is important
because a business cannot afford to have their customers waiting for long periods of time
before making a transaction.
2. Reliability: A good TPS must be very reliable because if it were to break down businesses
could lose a huge portion of revenue because customers would not be able to purchase their
products.
3. Inflexibility: The TPS must work the same way for every transaction as long as the TPS is
being used. The formality and structure should never change.
4. Controlled processing: The TPS must be able to allow authorized employees to be able to
access it at any time.
Storing and Retrieving Data: A TPS must be able to easily be accessed by authorized
employees so that information in the TPS can be retrieved. The information that goes through a
TPS must never be deleted so that there will not be any confusion of what orders have gone
through it. It is a good idea to have a back up hard drive so that older information can still be
stored, but will not slow down the server which houses the TPS.
Essentially, transaction processing systems should capture data and process it with great speed
and accuracy. After capturing and processing the data, the transaction processing system updates
organizational databases and produces a variety of information products for internal as well as
external use. Diagram illustrates a cycle in which the basic transaction processing activities take
place.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 62
Management Information System VI Semester BBM
Components of TPS:
Inputs: Source documents such as Customer orders, invoices, purchase orders, etc. serves as
Inputs to the TPS system.
Processing: Once the inputs are provided, they are further processed to get an output.
Storage: Ledgers serves as a source of storage.
Output: Any document generated is termed as output.
These were the fundamentals behind the Transaction Processing System. It is a very helpful,
reliable & secured system of processing transactions at an ease.
Data Entry: The input activity in transaction processing systems involves a data entry process. In
this process, data is captured, or collected by recording, coding, and editing activities. Then the
data may be converted to a form that can be entered into a computer system. Data entry activities
have always been a bottleneck in the use of computers for transaction processing.
a) Batch processing
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 63
Management Information System VI Semester BBM
b) Real-time processing
a) Batch Processing:
In a batch processing system, transaction data is accumulated over a period of time and processed
periodically.
Gathering source documents originated by business transactions, such as sales orders and
invoices, into group called batches.
Recording transaction data on an input medium , such as magnetic disks or magnetic tapes.
Sorting the transactions in a transaction file in the same sequence as records in a sequential
master file.
Processing transaction data and creating an updated master file and a variety of documents
(such as customer invoices or paycheques) and reports
Capturing and storing batches of transactions data at remote sites, and then transmitting it
periodically to central computers for processing. This is called remote job entry or RJE.
b) Real-time Processing:
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 64
Management Information System VI Semester BBM
Real-time processing systems process transaction data immediately after they are generated
and can provide immediate output to end users.
In full-fledged real-time processing systems, data is processed as soon as it is originated or
recorded, without waiting to accumulate batches of data.
Data is fed directly into the computer system from online terminals, without being sorted,
and it is always stored online in direct access files.
Files and databases are always up to data since they are updated as and whenever data is
originated, regardless of its frequency.
Responses to end users' inquiries are immediate, since information stored on direct access
devices can be retrieved almost instantaneously.
Real-time processing depends on telecommunication networks of online terminals and
computers.
File and database processing are the basic activities of transaction processing systems. These are
also known as file and database maintenance.
This term emphasizes that an organization's files and databases must be maintained by its
transaction processing systems so that they are always correct and up to date.
Transaction processing systems update and make changes to corporate databases, which are then
used to
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 65
Management Information System VI Semester BBM
The final stage in the transaction processing cycle is the generation of information products such
as documents and reports.
Documents produced by transaction processing systems are called transaction documents. There
are various types of documents such as
Action documents that initiate actions or transactions on the part of their recipient. For
e.g., a paycheque authorizes a bank to pay the customer.
Information documents relate, confirm or prove to their recipients that transactions have
occurred. For e.g., sales receipts, customer statements etc.
Turnaround documents say that some types of transaction documents are designed to be
read by magnetic or optical scanning equipment. Forms produced in this manner designed
to be returned to the sender. For e.g., many computer-printed invoices consist of a
turnaround portion, which is returned to the customer along with his/her payment.
Transaction processing systems also produce several types of reports and are used by managers.
Such reports provide an audit trail for transaction control purposes. For example,
Control listings, are detailed reports that describe each transaction occurring during a
period. They are also called logs. For example, a payroll register lists every paycheque
printed on a specified payday by a payroll system.
Edit reports, describe errors detecting during processing. For e.g., invalid Account
Number, missing data etc would be presented in edit reports.
Accounting statements are such reports that legally document the financial performance or
status of a business. For e.g., statements of cash flow, income statements etc.
5. Inquiry Processing:
Many transaction processing allows us to use Internet and Web browsers or database management
query languages to make inquiries and receive responses concerning the results of transaction
processing activity. Typically responses are displayed in a variety of pre specified formats or
screens. For e.g., checking balance in A/C and receive immediate response on PC.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 66
Management Information System VI Semester BBM
DSS uses the summary information, exceptions, patterns, and trends using the analytical models.
A decision support system helps in decision-making but does not necessarily give a decision
itself. The decision makers compile useful information from raw data, documents, personal
knowledge, and/or business models to identify and solve problems and make decisions.
Programmed decisions are basically automated processes, general routine work, where:
Decision support systems generally involve non-programmed decisions. Therefore, there will be
no exact report, content, or format for these systems. Reports are generated on the fly.
Attributes of a DSS
Characteristics of a DSS
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 67
Management Information System VI Semester BBM
Support for managers at various managerial levels, ranging from top executive to line
managers.
Support for individuals and groups. Less structured problems often requires the involvement
of several individuals from different departments and organization level.
Support for interdependent or sequential decisions.
Support for intelligence, design, choice, and implementation.
Support for variety of decision processes and styles.
DSSs are adaptive over time.
Benefits of DSS
Improves efficiency and speed of decision-making activities.
Increases the control, competitiveness and capability of futuristic decision-making of the
organization.
Facilitates interpersonal communication.
Encourages learning or training.
Since it is mostly used in non-programmed decisions, it reveals new approaches and sets up
new evidences for an unusual decision.
Helps automate managerial processes.
Components of a DSS
Following are the components of the Decision Support System:
Database Management System (DBMS): To solve a problem the necessary data may
come from internal or external database. In an organization, internal data are generated by a
system such as TPS and MIS. External data come from a variety of sources such as
newspapers, online data services, databases (financial, marketing, human resources).
Model Management System: It stores and accesses models that managers use to make
decisions. Such models are used for designing manufacturing facility, analyzing the
financial health of an organization, forecasting demand of a product or service, etc.
Support Tools: Support tools like online help; pulls down menus, user interfaces, graphical
analysis, error correction mechanism, facilitates the user interactions with the system.
Classification of DSS
There are several ways to classify DSS. Hoi Apple and Whinstone classifies DSS as follows:
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 68
Management Information System VI Semester BBM
Types of DSS:
Following are some typical DSSs:
Status Inquiry System: It helps in taking operational, management level, or middle level
management decisions, for example daily schedules of jobs to machines or machines to
operators.
Data Analysis System: It needs comparative analysis and makes use of formula or an
algorithm, for example cash flow analysis, inventory analysis etc.
Information Analysis System: In this system data is analyzed and the information report is
generated. For example, sales analysis, accounts receivable systems, market analysis etc.
Accounting System: It keeps track of accounting and finance related information, for
example, final account, accounts receivables, accounts payables, etc. that keep track of the
major aspects of the business.
Model Based System: Simulation models or optimization models used for decision-making
are used infrequently and creates general guidelines for operation or management.
1. Terminal mode
2. Clerk mode
3. Subscription mode
4. Intermediary mode.
1. Terminal mode: The decision maker is the direct user of the system through on line access.
2. Clerk mode: The decision maker uses the system directly but offline, preparing input on a
coding form. The primary difference between this mode and the terminal mode is in the
technology employed (batch versus online).
3. Subscription mode: The decision maker receives reports that are generated automatically on
a regular basis. This is the typical mode of usage for management reporting systems.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 69
Management Information System VI Semester BBM
Although some data analysis systems or accounting models might be used in this way, it is not
typical for decision support systems.
4. Intermediary mode: The decision maker uses the system through intermediaries, who
perform the analysis and interpret and report the results. The decision maker does not need to
know the intermediary used the system to arrive at the requested information.
But one thing is certain that decision making is done at all level of management. Decision support
system involves the packages which help the managers to take right and timely decisions.
Decision support systems use data from the general management information system and they are
used by a manager or a decision maker for decision support. The basic characteristic of the
decision support system is that it is based on some tool, technique or model. These systems are
used sometimes for testing new alternatives, training and learning. They are also used for
sensiting the various parameters of the model.
The MIS designer has to look for all such situations and design the decision support system for
integration in the system. The management information system would become more useful if the
decision making is made person independent and executed with well designed decision support
system.
All such embedded systems cover the normal variety of decision situations. If anything outside
the considered variety crops up, decision support system will bring to the notice of the decision
makers that action is called for in the situation.
The decision support system plays a dominant role in the management information system as a
support to decision making.
These information are often external, unstructured and even uncertain. Exact scope and context of
such information is often not known beforehand.
Market intelligence
Investment intelligence
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 70
Management Information System VI Semester BBM
Technology intelligence
Following are some examples of intelligent information, which is often the source of an ESS:
External databases
Technology reports like patent records etc.
Technical reports from consultants
Market reports
Confidential information about competitors
Speculative information like market conditions
Government policies
Financial reports and information
Advantages of ESS
Disadvantage of ESS
Functions are limited
Hard to quantify benefits
Executive may encounter information overload
System may become slow
Difficult to keep current data
May lead to less reliable and insecure data
Excessive cost for small company
It supports all core business processes such as sales order processing, inventory management and
control, production and distribution planning, and finance.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 72
Management Information System VI Semester BBM
Why of ERP?
ERP is very helpful in the following areas:
Features of ERP
The following diagram illustrates the features of ERP:
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 73
Management Information System VI Semester BBM
Scope of ERP
Finance
management, budget control, costing, and enterprise control.
Logistics
management, events management, etc.
Human resource
Supply Chain ol, supplier scheduling,
planning, etc.
Work flow
responsibility to locations, position, jobs, etc.
Advantages of ERP
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 74
Management Information System VI Semester BBM
Better transparency
Disadvantage of ERP
The expert systems are the computer applications developed to solve complex problems in a
particular domain, at the level of extra-ordinary human intelligence and expertise.
High performance
Understandable
Reliable
Highly responsive
Advising
Instructing and assisting human in decision making
Demonstrating
Deriving a solution
Diagnosing
Explaining
Interpreting input
Predicting results
Justifying the conclusion
Suggesting alternative options to a problem
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 75
Management Information System VI Semester BBM
Knowledge Base
Inference Engine
User Interface
Knowledge Base
Knowledge is required to exhibit intelligence. The success of any ES majorly depends upon the
collection of highly accurate and precise knowledge.
What is Knowledge?
The data is collection of facts. The information is organized as data and facts about the task
domain. Data, information, and past experience combined together are termed as knowledge.
Factual Knowledge: It is the information widely accepted by the Knowledge Engineers and
scholars in the task domain.
Heuristic Knowledge: It is about practice, accurate judgment, one’s ability of evaluation,
and guessing.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 76
Management Information System VI Semester BBM
Knowledge representation: It is the method used to organize and formalize the knowledge in the
knowledge base. It is in the form of IF-THEN-ELSE rules.
Knowledge Acquisition: The success of any expert system majorly depends on the quality,
completeness, and accuracy of the information stored in the knowledge base.
The knowledge base is formed by readings from various experts, scholars, and the Knowledge
Engineers. The knowledge engineer is a person with the qualities of empathy, quick learning, and
case analyzing skills.
He acquires information from subject expert by recording, interviewing, and observing him at
work, etc. He then categorizes and organizes the information in a meaningful way, in the form of
IF-THEN-ELSE rules, to be used by interference machine. The knowledge engineer also monitors
the development of the ES.
Inference Engine: Use of efficient procedures and rules by the Inference Engine is essential in
deducting a correct, flawless solution.
In case of knowledge-based ES, the Inference Engine acquires and manipulates the knowledge
from the knowledge base to arrive at a particular solution.
Applies rules repeatedly to the facts, which are obtained from earlier rule application.
Adds new knowledge into the knowledge base if required.
Resolves rules conflict when multiple rules are applicable to a particular case.
Forward Chaining
Backward Chaining
Forward Chaining: It is a strategy of an expert system to answer the question, “What can happen
next?”
Here, the Inference Engine follows the chain of conditions and derivations and finally deduces the
outcome. It considers all the facts and rules, and sorts them before concluding to a solution.
This strategy is followed for working on conclusion, result, or effect. For example, prediction of
share market status as an effect of changes in interest rates.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 77
Management Information System VI Semester BBM
Backward Chaining: With this strategy, an expert system finds out the answer to the
question, “Why this happened?”
On the basis of what has already happened, the Inference Engine tries to find out which
conditions could have happened in the past for this result. This strategy is followed for finding out
cause or reason. For example, diagnosis of blood cancer in humans.
User Interface
User interface provides interaction between user of the ES and the ES itself. It is generally
Natural Language Processing so as to be used by the user who is well-versed in the task domain.
The user of the ES need not be necessarily an expert in Artificial Intelligence.
It explains how the ES has arrived at a particular recommendation. The explanation may appear in
the following forms:
The user interface makes it easy to trace the credibility of the deductions.
No technology can offer easy and complete solution. Large systems are costly, require significant
Application Description
There are several levels of ES technologies available. Expert systems technologies include:
Tools: They reduce the effort and cost involved in developing an expert system to large
extent.
Shells: A shell is nothing but an expert system without knowledge base. A shell provides
the developers with knowledge acquisition, inference engine, user interface, and
explanation faci
o Java Expert System Shell (JESS) that provides fully developed Java API for
creating an expert system.
o Vidwan, a shell developed at the National Centre for Software Technology,
Mumbai in 1993. It enables knowledge encoding in the form of IF-THEN rules.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 80
Management Information System VI Semester BBM
The knowledge engineer uses sample cases to test the prototype for any deficiencies in
performance.
End users test the prototypes of the ES.
Test and ensure the interaction of the ES with all elements of its environment,
including end users, databases, and other information systems.
Document the ES project well.
Train the user to use ES.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 81
Management Information System VI Semester BBM
Unit IV
Information System for Functional Areas and Issues
Information System for Functional Areas:
Functional Information System is based on the various business functions such as
Production, Marketing, Finance and Personnel etc. These departments or functions are known as
functional areas of business. Each functional area requires applications to perform
all information processing related to the function. The popular functional areas of the business
organization are:
Information Systems have become so developed and detailed in their short history. Society has
developed along with the Information Systems, becoming a more technologically-reliable
generation, also known as the digital firm era. Along with an increasing reliability for
Information Systems, the digital firm era has also brought about an increasing profitability,
competitiveness, and efficiency for any business of any size that uses an Information Systems.
Since the current technological generation has become so dependent upon Information Systems,
the problems threatening Information Systems also threaten the order of everyday activities that
many take for granted. The intricate role that Information Systems plays in daily activities has
been developed near to perfection, but there are many current problems such as spamming,
hacking, jamming, malicious software, sniffing, spoofing, and identity theft. These current
problems are threatening the reliability and security of Information Systems.
With these current problems threatening Information Systems, users of Information Systems have
been in the search for new techniques and new technology that will help fix the devastating
consequences. Along with new techniques and new technology fixing these problems, users of
Information Systems must also protect themselves. There are certain ways that users of
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 82
Management Information System VI Semester BBM
Information Systems can protect themselves against all of the current problems. The future of
Information Systems is somewhat unknown since it lies in the hands of the users. This
unexpectedness also means with many unexpected problems that the users will have to solve.
Information system security refers to the way the system is defended against unauthorized access,
use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
Security of the information technology used: securing the system from malicious cyber-
attacks that tend to break into the system and to access critical private information or gain
control of the internal systems.
Security of data: ensuring the integrity of data when critical issues, arise such as natural
disasters, computer/server malfunction, physical theft etc. Generally an off-site backup of
data is kept for such problems.
The Issues:
The problems which are facing information systems have either occurred through computer crime
or computer abuse. Computer crime and computer abuse is widely becoming a widespread
problem since technology can help accomplish almost any illegal or unethical task. There is a
difference between computer crime and computer abuse, though; computer crime is when a
person uses a computer to commit an illegal act, while computer abuse is when a person uses a
computer to commit an unethical but not always illegal act.
Computer crime and computer abuse has become a widespread problem since the
evolution of Information Systems. Before Information Systems were invented, data was
protected more because most information was stored only in paper files, and only in certain
departments of a business where many users would not have access to the data. With the
evolution of Information Systems, large amounts of data can be stored in electric form rather than
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 83
Management Information System VI Semester BBM
in paper files, so the data can be viewed by a larger number of users. Since more users can access
the data electronically rather than manually, the data in turn, is more susceptible to the threat of
computer crime and computer abuse.
Many businesses and individuals often feel serious effects from the following computer
crime and computer abuse problems. Often at times, the users of Information Systems depend so
heavily on the systems that a small setback will often cause huge setbacks for the business and
individual. From a few minutes to a few days, the side effects of computer crime and computer
abuse can be damaging to a business or individual who relies heavily on Information Systems to
accomplish certain everyday tasks.
The current computer crime and computer abuse problems have threatened Information
Systems due to the increased reliability of businesses and individuals on Information Systems, but
also because of an increased risk of threat due to insecure telecommunication networks. Many of
the ordinary threats to Information Systems such as hardware failure, fire, software failure,
electrical problems, personnel actions, user errors, and telecommunication problems also can lead
to easier access to large volumes of data. When the telecommunication network itself is
threatened, Information Systems of an individual or business becomes even more threatened.
One of the current computer crime and abuse problems threatening the future of Information
Systems is spamming. According to Laundon, spamming can be defined as “the practice of
sending unsolicited e-mail and other electronic communication.” Spamming has become such a
threatening problem with information systems because it is one of the cheapest and easiest
methods to abuse a computer system. The spammers who send out all of these e-mails are only
charged a few cents to send out the unsolicited e-mails to users who have not requested the
information. There are laws prohibiting the use of spamming to abuse a computer system, but
spammers rarely get punished since the laws are hardly enforced.
The next problem facing information systems is hacking. Hacking is when an illegal user
tries to access private information that they are not entitled to access. This illegal access is done
either by using Trojan horses, logic bombs, and many other types of software that can very easily
be hidden. Sometimes the hackers will even go as far crashing an entire network. According to
Laundon, “hackers flood a network server or Web server with many thousands of false
communications or requests in order to crash the network.” The repercussions from the attack of
hackers can do serious harm to a business.
Jamming is also another computer crime and abuse problem that is threatening to
information systems. It is not one of the most common, but it is one of the easiest to accomplish.
The illegal purpose behind jamming is to find a way to tie up the lines to a computer is the central
brain behind a website. Once the lines are tied up, then legitimate visitors can access the site,
therefore, the lines are “jammed” with illegal users.
Malicious software is the most common form of computer crime against Information
Systems. This computer crime occurs when computer viruses are sent through a means, usually
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 84
Management Information System VI Semester BBM
the Internet, and these computer viruses “infect” the computer, often disabling programs or maybe
even causing the computer to “crash,” become inoperable. Once the computer virus is implanted
into a computer’s hard drive, it can be spread very easily, causing even more widespread damage.
Some of the effects of computer viruses or malicious software are destroying programs, data,
“crashing” a computer’s operating system, clogging memory, etc. Again, if a business or
individual receives a computer virus on their computer, the damage can be small to devastating.
Malicious software has become the most common form of computer crime because there
are so many new computer viruses being spread. According to Laundon, “many thousands of
viruses are known to exist, with two hundred or more new viruses each month.” Some examples
of damaging computer viruses are “Monkey”, “Chernobyl”, and “Code Red”. The computer virus
known as “Monkey” does not let the Windows operating system run, thus causing the hard drive
disk to look like it is not working properly. “Chernobyl” is the nickname for a computer virus
that infects a computer’s files, and this computer virus ruins a computer’s hard drive and ROM
BIOS, which is the basic input/output system of a computer. “Code Red” is another computer
virus that slows down the Internet and other computer processes. This computer virus is often
spread as a “worm” as an attachment to an email, and then it hooks itself onto other computers
once the email is sent, thus creating a very damaging chain-reaction.
Two more computer crime and computer abuse problems that pose a threat to Information
Systems security are “sniffing” and “spoofing.” “Sniffing” is a computer abuse problem which
can let unauthorized users access private information about an individual because a piece of
software can be used to cross the lines between an Internet user and a web site so the “sniffer” can
intercept sensitive data. “Spoofing” is somewhat like “sniffing,” but “spoofing” involves the
“spoofer” making a false web site geared to collect personal information from an Internet user to
use it in criminal or unethical acts. The side effects of “sniffing” and “spoofing” are an increased
risk of unsuspecting Internet users losing personal information. Once the personal information is
collected, such as credit card numbers, social security numbers, birthdates, etc., the unsuspecting
user is faced with a serious threat of misuse of that information, often resulting in horrible
consequences.
Identity theft, a common computer crime, is the most common side effect of “sniffing”
and “spoofing” and often times, the most horrible of all the computer crime and computer abuse
problems. With an insecure Information System, identity theft often arises as a serious computer
crime. Identity theft occurs, according to the Federal Trade Commission, “when someone
possesses or uses [a person’s] name, address, Social Security number, bank or credit card account
number, or other identifying information without [a person’s] knowledge with the intent to
commit fraud or other crimes.”
Identity theft can occur through a variety of low-technological and highly technological
methods. Identity theft occurs through most businesses and organizations when illegal users gain
access to stolen electronical records stolen from an employer. Identity theft vandals can also gain
unauthorized access to records through bribery of an employer or someone in the business which
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 85
Management Information System VI Semester BBM
has legal access to the records. Conning is also another way that illegal users can find
information in a business or organization. The most common form of unauthorized access to
computer is through hacking into an Information System of a business or organization. Once the
information is illegally accessed, the results can be very harmful for the victim.
Threat can be anything that can take advantage of a vulnerability to breach security and
negatively alter, erase, harm object or objects of interest.
Software attacks mean attack by Viruses, Worms, and Trojan Horses etc. Many users believe that
malware, virus, worms, bots are all same things. But they are not same, only similarity is that they
all are malicious software that behaves differently.
1. Infection Methods
2. Malware Actions
1. Virus: They have the ability to replicate themselves by hooking them to the program on
the host computer like songs, videos etc and then they travel all over the Internet. Ther
Creeper Virus was first detected on ARPANET. Examples include File Virus, Macro
Virus, Boot Sector Virus, Stealth Virus etc.
2. Worms: Worms are also self replicating in nature but they don’t hook themselves to the
program on host computer. Biggest difference between virus and worms is that worms are
network aware. They can easily travel from one computer to another if network is
available and on the target machine they will not do much harm, they will for example
consume hard disk space thus slowing down the computer.
3. Trojan: The Concept of Trojan is completely different from the viruses and worms. The
name Trojan derived from the ‘Trojan Horse’ tale in Greek mythology, which explains
how the Greeks were able to enter the fortified city of Troy by hiding their soldiers in a
big wooden horse given to the Trojans as a gift. The Trojans were very fond of horses and
trusted the gift blindly. In the night, the soldiers emerged and attacked the city from the
inside.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 86
Management Information System VI Semester BBM
Their purpose is to conceal themselves inside the software that seem legitimate and when
that software is executed they will do their task of either stealing information or any other
purpose for which they are designed.
They often provide backdoor gateway for malicious programs or malevolent users to enter
your system and steal your valuable data without your knowledge and permission.
Examples include FTP Trojans, Proxy Trojans, Remote Access Trojans etc.
4. Bots: can be seen as advanced form of worms. They are automated processes that are
designed to interact over the internet without the need of human interaction. They can be
good or bad. Malicious bot can infect one host and after infecting will create connection to
the central server which will provide commands to all infected hosts attached to that
network called Botnet.
1. Adware: Adware is not exactly malicious but they do breach privacy of the users. They
display ads on computer’s desktop or inside individual programs. They come attached
with free to use software, thus main source of revenue for such developers. They monitor
your interests and display relevant ads. An attacker can embed malicious code inside the
software and adware can monitor your system activities and can even compromise your
machine.
3. Ransomware: It is type of malware that will either encrypt your files or will lock your
computer making it inaccessible either partially or wholly. Then a screen will be displayed
asking for money i.e. ransom in exchange.
4. Scareware: It masquerades as a tool to help fix your system but when the software is
executed it will infect your system or completely destroy it. The software will display a
message to frighten you and force to take some action like pay them to fix your system.
5. Rootkits: are designed to gain root access or we can say administrative privileges in the
user system. Once gained the root access, the exploiter can do anything from stealing
private files to private data.
6. Zombies: They work similar to Spyware. Infection mechanism is same but they don’t spy
and steal information rather they wait for the command from hackers.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 87
Management Information System VI Semester BBM
These are the old generation attacks that continue these days also with advancement every year.
Apart from these there are many other threats. Below is the brief description of these new
generation threats.
Technology with weak security: With the advancement in technology, with every
passing day a new gadget is being released in the market. But very few are fully secured
and follows Information Security principles. Since the market is very competitive Security
factor is compromised to make device more up to date. This leads to theft of data/
information from the devices
Social media attacks: In this cyber criminals identify and infect a cluster of websites that
persons of a particular organisation visit, to steal information.
Mobile Malware: There is a saying when there is a connectivity to Internet there will be
danger to Security. Same goes to Mobile phones where gaming applications are designed
to lure customer to download the game and unintentionally they will install malware or
virus in the device.
Outdated Security Software: With new threats emerging everyday, updation in security
software is a pre requisite to have a fully secured environment.
Corporate data on personal devices: These days every organization follows a rule
BYOD. BYOD means Bring your own device like Laptops, Tablets to the workplace.
Clearly BYOD pose a serious threat to security of data but due to productivity issues
organizations are arguing to adopt this.
Social Engineering: is the art of manipulating people so that they give up their
confidential information like bank account details, password etc. These criminals can trick
you into giving your private and confidential information or they will gain your trust to get
access to your computer to install a malicious software- that will give them control of your
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 88
Management Information System VI Semester BBM
computer. For example email or message from your friend, that was probably not sent by
your friend. Criminal can access your friends device and then by accessing the contact list
he can send infected email and message to all contacts. Since the message/ email is from a
known person recipient will definitely check the link or attachment in the message, thus
unintentionally infecting the computer.
Vulnerability:
Vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to
attack. Vulnerability may also refer to any type of weakness in a computer system itself, in a set
of procedures, or in anything that leaves information security exposed to a threat.
A computer vulnerability is a cybersecurity term that refers to a defect in a system that can leave
it open to attack. This vulnerability could also refer to any type of weakness present in a computer
itself, in a set of procedures, or in anything that allows information security to be exposed to a
threat.
It is possible for network personnel and computer users to protect computers from vulnerabilities
by regularly updating software security patches. These patches are capable of solving flaws or
security holes found in the initial release. Network personnel and computer users should also stay
informed about current vulnerabilities in the software they use and look out for ways to protect
against them.
Bugs
Weak passwords
Software that is already infected with virus
Missing data encryption
OS command injection
SQL injection
Buffer overflow
Missing authorization
Use of broken algorithms
URL redirection to untrusted sites
Path traversal
Missing authentication for critical function
Unrestricted upload of dangerous file types
Dependence on untrusted inputs in a security decision
Cross-site scripting and forgery
Download of codes without integrity checks
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 89
Management Information System VI Semester BBM
The harm of computer system vulnerability can be presented in several aspects, for example, the
disclosure of confidential data, and widespread of Internet virus and hacker intrusion, which can
cause great harm to enterprises and individual users by bringing about major economic loss. With
the steady improvement of the degree of information, very severe computer system vulnerabilities
can become a threat to national security in the aspects of economy, politics, and military.
Computer security vulnerability can harm five kinds of system securities that include:
Reliability, confidentiality, entirety, usability, and undeniableness.
Reliability: This refers to reducing incorrect false alarm in the operation of a computer
system and enhancing the efficiency of a computer system.
Confidentiality: This refers to protecting users’ information from disclosure and getting
by unauthorized third party.
Entirety: This system security requires that information or programs should not be
forged, tampered, deleted or inserted deliberately in the process of storing, operation and
communication. In other words, information or programs cannot be lost or destroyed.
Usability: This ensures that users can enjoy the services offered by computers and
information networks.
Undeniableness: This security refers to guaranteeing information actors to be responsible
for their behavior.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 90
Management Information System VI Semester BBM
Host Intrusion Protection System (HIPS): Monitors vital operating system activities to
guarantee protection against malware intrusion.
Containment with auto-sandboxing: All unrecognized applications and processes are
auto-sandboxed to run in a restricted environment.
File Lookup Services (FLS): Cloud-based instant analysis of strange files that checks file
reputation against Comodo’s master whitelist and blacklists.
Viruscope (Behavior Analysis): Behavior of all processes are monitored for potential
harmful action.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 91
Management Information System VI Semester BBM
victim's already authenticated browser. Targets include web applications like social media,
in browser email clients, online banking, and web interfaces for network devices.
MANOHAR S (MBA ,M.Sc, DSE,HDCA, BEd), Asst. Professor in Dept, of Commerce SIDDASHREE FIRST GRADE COLLEGE, NITTUR. Page 92