302 Compressed
302 Compressed
Course 301
STRATEGIC ANALYSIS
COURSE CONTENTS
MODULE-V
1
SUGGESTED READINGS
2
Syllabus
Course 302
Objective
3
Database Management S ystem (DBMS), t ypes of DBMS,
concepts of entities, attributes and relations; Three levels of BDMS,
Advantages and disadvantages of DBMS; Data Models (Hierarchical,
Network and Relational), Relation of t ypes in entities and attributes;
Functional Dependencies; Normalization of Data (1 NF, 2 n d NF and
3 r d NF), Role of Data Base Administrator (DBA).
Visual Basic
BOOKS RECOMMENED
1. Murdick, Ross & Information s ystem for Modern
Clagget Management, Prentice Hall of India.
2. James A. Serm Anal ysis and Design of Information S ystem,
MC Graw Hills International.
3. V. Rajaraman Anal ysis and Design of Information
Systems, Prentice Hall of India.
4. E.M. Awad System Anal ysis and Design, Galgotia
Publications.
5. M.G. Simkin Introduction to Computer Information
System for Business S. Chand & Company.
6. James A.O. Briell Management Information S ystems, Galgotia
Publication.
4
SPECIALIZATION-1 (Three Courses)
OBJECTIVE
COURSE CONTENTS
UNIT-I
UNIT-II
UNIT-III
UNIT-IV
5
UNIT-V
Suggested Readings
6
Master of Business Administration (M.B.A.)
Objective
Course Contents
Suggested Readings
7
5. Kleppner, Otto, Advertising Procedure. Englewood Cliffs, New
Jersey, Prentice Hall, Inc., 1986.
8
Master of Business Administration (M.B.A.)
OBJECTIVE
UNIT-I
UNIT-II
UNIT-III
UNIT-IV
9
central and state governments. Institutions and organizations in
agricultural marketing.
UNIT-V
Suggested Reading
10
SPECIALIZATION-II (Three Courses)
11
independence. Existing methods of settlements and Prevention of I.D.
in India, Conclusion.
UNIT-IV
UNIT-V
BOOKS RECOMMENDED
12
Master of Business Administration (M.B.A.)
Unit-I
Unit-II
Unit-III
Unit-IV
13
Unit-V
Readings
14
Master of Business Administration (M.B.A.)
Unit-I
Unit-II
HRD & the Supervisor : The HRD Matrix, role of line managers
in HRD, Line Mangers and Appraisal Systems, Career Systems,
training s ystems, work s ystems, cultural s ystems and self-renewal
s ystem.
Unit-III
Unit-IV
Unit-V
15
References
16
UNIT I
LESSON NO. 1
MIS: CONCEPT EMERGENCE & ROLE, COMPUTERS
& MIS
1. Data:
1
2. Information:
3. Information System:
They are the s ystems that support the planning, control and
transaction processing required for the accomplishment of marketing
activities such as sales management, advertising and promotion.
According to Kotler, marketing information s ystem consists of
people, equipment and procedures to gather, sort, anal yze, evaluate
and distribute the needed, timel y, and accurate information to
marketing decision makers.
2
role of information s ystems focused on providing managerial end
users with predefined management reports that would give the
managers, the information they needed for decision-making purposes.
The management information s ystems transformed into decision
support s ystems (DSS) in the 1970s because the pre-specified
information products produced by M IS did not meet the requirements
of the managers. DSS provided managerial end users with ad hoc and
interactive support of their decision-making processes. This support
could be tailored to the unique decision making st yles of managers as
they faced the specific problems.
TOP
STRATEGIC INFORMATION MANAGE- DEC ISION
MENT
SUPPORT
SYSTEM
OPERATIONAL
MANAGEMENT MIDDLE
MANAGEMENT
MANAGEMENT
INFORMATION
SYSTEM
LOWER
MANAGEMENT
TACTICAL
TPS
INFORMATION
3
In 1980s, several new roles of information s ystems appeared. This
period saw the fast growth of personal computers and thus the
phenomenon of end user computing. The managers could collect and
process information as per their requirements themselves and did not
have to depend on the specialists of computer software. The software
packages became more user friendl y. Earlier, managers did not make
use of computerized information because they could not operate them
on their own. This period also saw the emergence of the concept of
executive information s ystems (EIS).
It may be observed that over the years, there has been a change in the
nature of information s ystems. Starting from a transactional
processing s ystem, they have transformed to decision support s ystems
and management information s ystems. This has facilitated the use of
computerized data processing for use by all the levels of management
of an organisation, as shown in figure 1.
4
out relativel y simple, but repetitive computations on a large number
of records involved, such as payroll preparation, inventory records,
sales accounting etc.
At the middle level, the managers are concerned with the information
that helps them in medium term planning. They do not require the
information on day-to-day working as the same is taken care of by the
lower management. They need information on some critical areas that
help in setting the objectives that meet the targets set by the top
management. This operational information is processed with the help
of management information s ystem.
The managers at the top level require the strategic information, which
is used for setting objectives and formulating long-term corporate
strategies. Top management requires accurate and vital information of
onl y some key areas. Generall y, the top management does not require
an y routine information on day-to-day activities. The vital, selective,
strategic information can be anal yzed through decision support
s ystems. It must be noted that this distinction of information s ystem
types is not very strict as no clear boundaries can be drawn between
them, particularl y between M IS and DSS. With time, newer packages
are being launched into the market and they have different features.
Their vendors often coin newer terminologies for them.
5
Figure 2:Classification of information s ystems (Source O'Brien pp 56)
INFORMATION
SYSTEMS
OPERATIONS MANAGEM-
SUPPORT ENT SUPPORT
SYSTEMS SYSTEMS
TPS record and process the data resulting from business, e.g
information s ystems that process sales, purchases and inventory
changes etc. The results of these databases are used to update
customer, inventory and other databases and serve as resources
for other information s ystems such as management information
s ystems, decision support s ystems etc. TPS can be batch
processing s ystems as well as real-time (or online) processing
s ystems.
6
ii) Process Control Systems
7
ii) Decision support systems
8
information s ystems and the manner in which they support majo r
functional areas of business.
a) Interactive marketing
9
targeted marketing technique enables them to service their
customers better and thus derive s long-term profitabilit y.
MARKETING
Interactive
Marketing etc.
MARKETING MARKETING
Interactive Interactive
Marketing etc. Marketing etc.
MARKETING MARKETING
Interactive Interactive
Marketing etc. Marketing etc.
10
can improve the performance of the sales teams drasticall y.
Similarl y, product managers require continuous information to
plan and control the performance of specific products and product
lines. IT enabled information s ystems have speeded up the
decision making based the information gathered from the market
place.
MARKETING
INFORMATION
SYSTEM
e) Targeted marketing
11
a firm can identify unique characteristics of a market and design
its product offering, especiall y tailored to meet the requirements of
that segment. This is possible onl y when the marketers have the
knowledge about the target markets, possible through IT enabled
s ystems.
INTERNAL INTERNAL
REPORTS REPORTS
SYSTEM SYSTEM
MARKETING MARKETING
ENVIRON- MANAGERS
MENT
INTERNAL INTERNAL
REPORTS REPORTS
SYSTEM SYSTEM
MARKETING COMMUNICATION
12
The box on the left shows the components of the marketing
environment that marketing managers must monitor. Trends in the
marketing environment are picked up and anal yzed through four
subs ystems that make up the marketing information s ystem-the
internal reports system, marketing intelligence system, marketing
research system and analytical marketing system. The information
flows to marketing managers in order to help them in their marketing
anal ysis, planning, implementation and control. Their marketing
decisions and communications then flow back to the market. Each of
the four components of MIS are explained herein:
13
material and consumables in time. This helps in continuous
production and avoids any shut down due to lack of raw material. The
finance department also needs this information because it has to plan
the flow of funds based on the cash inflows and outflows. Thus, the
inter-relatedness of various functional units of a firm is strengthened
and the firm can produce a better output as a s ystem. The order
department is designed to process them quickl y. The warehouse is set
up to send the goods out as soon as possible. And bills should go out
as soon as possible. The computer is harnessed to expedite the order-
shipping-billing cycle. Computerized s ystems enable them to email
the orders o the warehouses immediatel y.
Marketing executives receive sales reports some time after the sales
14
information s ystem should represent a balance between what managers
think they need, what managers reall y need and what is economicall y
feasible. These pitfalls lead to inefficiency in the information
s ystems. Excess of information is not desirable as it confuses the
users and they might be entangled in it. The information should be
onl y of certain critical indicators and not include every bit of minor
details. Similarl y, information should be timel y so that the managers
do not overreact or ignore the same. One of the drawbacks of the
current IT packages is that they produce excess of information, that is
too current. Managers need to comprehend them with caution in order
to attain an optimal sales response. A useful step is the appointment
of an internal marketing information systems committee, which
interviews a cross section marketing executives-product managers,
sales managers, sales representatives and so on to discover their
information needs.
While the internal reports s ystem supplies managers with results data
the marketing intelligence s ystem supplies managers with happenings
data. Kotler defines the marketing intelligence system as the set of
producers and sources used by executives to obtain their everyday
information about pertinent developments in the marketing
environment.
15
d) Formal search. A deliberate effort usuall y following a pre-
established plan, procedure or methodology to secure specific
information or information relating to a specific issue.
16
Third, the company can purchase information from the suppliers. The
suppliers have business interests with a firm and they also with that
its sales grow. The growth of a firm’s sales leads to the growth of
their suppliers’ sales also. So, the suppliers can cater to the
information needs of a firm in the form of competitor’s reports, sales
literature, circulars, advertisements etc. Even secret information on
the purchase price of the competitors can be accessed from the
suppliers. However, suppliers serving the competitors also leak the
firm’s information.
17
departments. Firms that cannot afford to have a marketing research
department can make use of marketing research companies and
consultants. They can also engage MBA students and Universities to
conduct marketing research for them. Nowdays, a lot of information is
being taken from the Internet. Depending upon their requirements,
they can hire s yndicated service research firms, custom marketing
research firms and specialt y line marketing research firms.
18
multiple-regression, discriminate anal ysis, factor anal ysis, cluster
anal ysis, conjoint anal ysis, multidimensional scaling etc. Commonl y
used marketing models are Markov-Process model, queuing model,
new-product pretest models, sales response models etc. Several
computer software such as SPSS (Statistical Package for Social
Sciences), STATISTICA, Marketing Engineering packages etc. are
available in the market. They can be employed to analyze the
information in a very convenient way. It needs to be cautioned that
these are tools for anal yzing information. The information has to be
provided to them by collecting it from the right source and in the
correct manner.
19
information to the right person in the right form. Since the flow of
information is inter-related, the s ystems perspective must be followed
to ensure smooth flow of the information across the functional areas
in an organization.
Suggested Reading
20
UNIT II
LESSON 2
DECISION MAKING AND OPERATION RESEARCH
1
Deciding and planning.
Types of Decisions :
2
as the connecting link between means and ends, on the part of
managers. On the other hand, strategic decisions aim at determining
or changing the means and ends of the enterprise. They require a
thorough study, anal ysis and reflective thinking on the part of
managers. Strategic decisions are usuall y taken by top managers,
while routine decisions are made mostl y by lower-level managers.
3
revealing situation. The rare decisions, in most cases, require a
searching anal ysis on the part of top managers.
4
policies, procedures, standards and rules. Unprogrammed decisions
are special-purpose decisions that require creativit y and a greater
amount of judgment and they include programmes, budgets and
strategies. Programmed decisions can be easil y delegated to lower
levels of the organization. But unprogrammed decisions require the
attention of superiors.
5
pertinent and closely connected factors, as dictated by the
principle of the limiting or strategic factor. Of the mass of data
and information collected, facts should be screened out and
separated from beliefs, opinions or preconceived notions. The
focusing of attention on crucial factors helps the manager to spell
out facts of the case. And as a basis, facts alone provide the solid
foundation for making decisions.
6
Four criteria have been suggested by Drucker in selecting the best
solution : (a) the proportion of risk to the expected gain, (b) the
correspondence between econom y of effort and possibility of
results, (c) the timing considerations that meet the needs of the
situation, and (d) the limitation of resources.
5. Putting the decision into effect: Even the best decision may
become inoperative due to the opposition of employees. The
decision can onl y be made effective through the action of other
people. Overcome the opposition or resistance on the part of
employees, managers must make necessary preparations for
putting the decision into effect. There are three important things
relating to this preparation, viz., communication of decisions,
securing employee acceptance and the timing of decisions. An y
change involved in the decision should be made known to all
employees in clear, precise and simple language. Opportunit y
must be given beforehand to know and understand the expected
changes. After communication, the necessit y of changes should
be explained to win over their co-operation. In many enterprises,
the selection of the best course of action is made through group
decisions with the primary object of securing whole-hearted
participation from the side of subordinates. As all decisions
affect the employees and their work, they must be taken into
confidence for securing their willing support. Otherwise, the best
of decisions sabotaged in such a manner as to elude the attention
and efforts of most managers. Opportunit y time is to be
determined and favourable circumstances are to be created for
converting a decision action. Moreover, some human relation’s
factors are usuall y taken into consideration for determining
whether the entire decision is to be put into action at one time, or
it is to be introduced piecemeal. Timing considerations dictate
the choice in either way.
7
6. Following up the decision: In spite of their best endeavour,
managers cannot make infallible decision for two reasons. First,
some amount of guesswork becomes inevitable in almost every
decision. Because of the cost and time involved in anal ysing the
problem, all facts cannot be secured. Secondl y, wrong decisions
arise from the limited capacit y of the manager himself. As a
consequence, it is idle to expect that managers would be making
correct decisions in all cases. Any active and responsible
manager is bound to make some incorrect decisions along with
his frequentl y correct decisions. The fear of incorrect decision
prevents many managers from taking any decision at all.
However, as a safeguard against this incorrect decision, managers
are required to institute a s ystem of follow-up to decisions so as
to modify them at the earliest opportunity.
8
Even when decisions are made by the group, participation in
the first two stages of decision making becomes unnecessary.
Making diagnosis of the problem and its anal ysis can best be done
by individual managers, and group participation here leads to the
procrastination and delay in decision making. But developing
alternative solutions and the picking up of the best solution can be
more effectivel y done through group participation, which improves
the qualit y of decisions by securing benefits of different ideas,
suggestions and experiences. There are, however, some serious
limitations of group decisions.
9
these equations, possibilities of all alternatives are clearl y revealed.
To appl y operations research for the analysis of business problems,
the entire enterprise is looked upon as a group of related activities
with common objectives. Otherwise, the quantitative technique may
give misleading results from what is known as "sub-optimization".
The development of electronic computers has facilitated the growth
of operations research for finding out the best course of action along
with its probabilities and potentialities.
10
long-range planning, sales and marketing and inventory have seen
the greatest application of operations research.
11
managers of their task of decision making. In one phase of
decision making, viz., selection of best solution through
the evaluation of alternatives, operations research comes
into the picture. Managers have to prepare the groundwork
for the introduction of operations research through several
steps in decision making viz., diagnosis of problem,
anal ysis of problem and development of alternatives ; and
even after the selection of best solution by operations
research, managers have to put the decision into effect and
to institute a s ystem of follow-up.
12
interrelated parts, which are provided with desired information from
a common centre through the processing of primary data in various
ways.
3. Anal yse the steps in decision making along with the execution
of such decisions.
13
4. Discuss the bases for decision making. What is the pertinent
basis for quick decision making?
14
UNITE-II
LESSON-3
TRANSPORTATION MODELS AND
ASSIGNMENT MODELS
INTRODUCTION
PROBLEM STATEMENT
1
It is the case when demand is full y met from the origin. The
problem can be stated as LP problem in the following manner.
m n
Min (total cost) Z = c
i 1 j 1
ij x ij
n
Subject to x
j 1
ij = a i for i = 1, 2, 3, …………… m
x
i 1
ij b j for j = 1, 2, 3, …………… n
j = 1, 2, 3, …………… m
2
2. When the number of positive allocations in the feasible
solution is less than (rows + columns -1), the solution is said
to be degenerate. For feasibilit y criterion, m + n - 1 = number
of allocations (m = number of rows, n = number of columns in
the matrix).
1. Any two adjacent cells of the ordered set lie either in the same
row or in the same column.
2. Three or more adjacent cells in the ordered set lie in the same
row or the column. The first cell of the set must be the last in
the set.
1 2 3 4
1
2
3
4
5
3
The ordered set of cells contain the following allocated cells,
(1, 1), (1, 2), (2, 1), (2, 2), (5, 2), (2, 4), (5, 4). The loop formation
is for cells (1, 1) (1, 2) (2, 1) and (2, 2) and cells (2, 2), (2, 4), (2,
4) and (5, 2) as (2, 2) appears twice. Whereas the loop formation in
the following table satisfies all conditions.
The loop (1, 2), (1,3), (3,4), (4,1), (3,1), (3,2) and (1,2) is
feasible loop satisfying all the conditions of loop formation.
1. Every loop has an even number of cells and the least being
four.
3. Each row and column in the matrix should have onl y one plus
and minus sign. The loop must start with an empt y cell and all
other cells forming the loop must be occupied or allocated
cells.
4
Step 1. Formulate the problem and establish the transportation
matrix or table, the cells indicating the parameters value for various
combinations i.e., cost, profit, time, distance etc.
Step 4. Update the solution i.e., appl ying step 3 till optimal
feasible solution is obtained.
5
To D E F Supply
From
A 6 4 1 50
B 3 8 7 40
C 4 4 2 60
Demand 20 95 35 150
(a) If a 1 > b 1 assign b 1 , in the cell in the first column of the first
row. Then put x 1 1 = bi and proceed horizontall y to the next
column in the first row until the suppl y of this origin is
exhausted.
6
(c) If a 1 = b 1 ’ then put the value of x 1 1 equal to a 1 or b 1 and then
proceed diagonall y to the cell determined by the next column
of the next row.
Step 1. Select the lowest cost cell in the whole matrix i.e., out
of all values of rows and columns of the transportation table. In case
of a tie, select arbitraril y.
Step 5. Repeat Step 1 to 4 for the reduced cost table until all
the capacities and requirements are full y satisfied.
7
1. Consider each row of the cost matrix individuall y and find the
difference between two least cost cells in it. Then repeat the
exercise for each of the columns. Identify the column or row
with the largest value difference. In case of tie, select any one
(it is wise to select the row or column to give allocation at
minimum cost cell). Now consider the cell with the minimum
cost in the column (or row, as the case may be) and assign the
maximum units possible, considering the demand and supply
positions corresponding to that cell. Assign onl y one cell at a
time.
3. Again, find out the differences of least cost cells and proceed
in the same way. Continue until all units have been assigned.
8
feasible solution. If cost is reduced, solution is not optimal. If it
does not, then we have reached optimal solution.
Things to Remember
2. The cells used for re-allocation are given plus and minus
signs. Wherever we wish to increase the allocation, it is given
plus sign, and when we want to reduce allocation, it is given
minus sign. This would mean increase or reduction of
transportation costs.
MODI Method
9
2.........n. for ows and column respectively. The values of U i and V j
are calculated by using the relationship Cij = Ui + Vj for all i, j for
all occupied cells. To start, U i or V j can be selected as zero
arbitraril y for the allocation row/column.
10
The above mentioned procedure can best be explained by its
application to an actual problem and obtaining the optimal cost b y
the iteration process described above.
DEGENERACY
11
Assignment Model
Let c i j be the cost of assigning ith person to the jth job. The
assignment problem can be stated in the form of n x n cost matrix or
effectiveness matrix {c i j ) as shown in the Table.
0 otherwise
The assignment problem is simpl y the following LPP:
12
n n
Minimise Z cij xij
i 1 j 1
x
j 1
ij =1, for i 1 =1,2, … n
n
and x
i 1
ij = 1 for j = 1, 2, … n
13
HUNGARIAN ASSIGNMENT ALGORITHM
Theorem
Theorem
14
problem with all cost elements as non-negative by adding a suitable
large constant to the elements of the relevant row or column. Next,
we look for a feasible solution which has zero assignment cost after
adding suitable constants to the elements of various rows and
columns. Since it has been assumed that all the cost elements are
non-negative, this assignment must be optimum.
Step 2 : Find the smallest cost in each row of the cost matrix.
Subtract this smallest cost element from each element in that row.
Therefore, there will be at least one zero in each row of this new
matrix which is called the first reduced cost matrix.
(i) Examine the rows successivel y until a row with exactl y one
zeros is found. Box around the zero element as an assigned
cell and cross out all other zero in its column. Proceed in this
manner until all the rows have been examined. If there are
more than one zero in any row, then do not consider that row
and pass on to the next row.
(ii) Repeat the procedure for the columns of the reduced cost
matrix. If there is no single zero in any row or column of the
reduced matrix, then arbitraril y choose a row or column
having the minimum number of zeros. Arbitraril y, choose zero
15
in the row or column and cross the remaining zeros in that row
or column.
Repeat steps (i) and (ii) until all zeros are either assigned or
crossed out.
(i) Mark () to those rows where no assignment has been made.
(ii) Mark () to those columns which have zeros in the marked
rows.
(iii) Mark () rows (not already marked) which have assignments
in marked columns.
(v) Draw straight lines through all unmarked rows and marked
columns.
(i) Find the elements that are covered b y a line. Choose the
smallest of these elements and subtract this element from all
the uncrossed elements and add the same at the point of
intersection of the two lines.
16
(ii) Other elements crossed by the lines remain unchanged.
Example
Solution :
Step 1 :
(i) Subtract the smallest element in each row from all the
elements in that row.
(ii) Subtract the smallest element in each column from all the
elements in that column.
17
Step 3 : Mark () in row 2 as it is not having an assignment and in
columns (1 and 6) as they are columns of ticked row 2 having zero's.
18
Since the number of lines is five which is less than the number
of rows or columns, we move to the next step to get the optimal
solution.
19
Hence, the optimal assignments are:
2. Maximisation problem
20
(i) by subtracting all the elements from the highest element
of the matrix,
21
UNIT II
LESSON NO. 4
CPM, PERT NETWORK ANALYSIS
(iv) Float for each activit y, that is, the amount of time b y
which the completion of an activit y can be delayed
without delaying the total project completion.
(ij) or i-j = Activit y (i,j) with tail event i and head event j.
(EF) i j = (ES) i j + D i j
or, (EF) i j ,= E i + D i j
E j = max [E i +D i j ].
(ii) The latest finish time for activit y (i,j) is equal to the
latest event time of event j, (Lf) i j = L j
or, (LS) i j = L j –D i j
That is,
= min [LF) i j – D i j ]
j
= min [L j -D) i j ].
j
Remarks
Free float = E j – E i – D i j = (L i j – E i – D i j ) - (L j – E j )
Independent float = E j – L i - D i j
= (E j – E i - D i j ) – (L i –E j )
Critical path: Path connecting the first initial node to the very
last terminal node, of longest duration in any project network is
called the critical path.
PERT Procedure
Step 4: Compute the earliest start, earliest finish, latest start, latest
finish and total float of each activit y.
NETWORK ANALYSIS
2. Construction of a plant
4. Launching of a space-ship
5. Over-haul of an organisation
6. Training of manpower
Activity
1 2
Fig.1
Activity
1 2
Not permitted
C:\Users\user\Desktop\MBA SLMFig.2
UPDATED\MBA 3rd sem SLM\302 15
LESSONS OF MBA 3RD SEMESTER by Dr. Sunil Gupta, Department of
Commerce\l4.doc
4. There can not be more than one activit y having the same
preceding and succeeding events. The following is NOT permitted.
Activity A
1 2 Not
Permitted
Activity B
Fig.3
1 3 5
4 6
Dummy
1 3 4 5
Fig.
5
1) Organization:
Organization means structure and order it is the arrangement of
components that helps to achieve Objectives in the design of a
business s ystem for example the hierarchical relationships
starting with the president on top and leading downward to the
workers represents the Organization structure. Such t ype of
arrangement shows a system-subs ystem relationship defines the
authorit y structure, species the formal flow of communication,
and formalities the chain of command like wise a computer
s ystem is designed around an input device, a central processing
unit, an output device and one or more storage units. When all
these units linked together they work as a whole s ystem for
producing information.
2. Interaction:
Interaction refers to the manner in which each component or
unit functions with other components of the s ystem. In an
organization, for example, purchasing must interact with
production advertising with sales and payroll with personnel.
In a computer s ystem the central processing unit must interact
with the input device to solve a problem.
3. Interdependence:
Interdependence means that parts of the organization or
computer s ystem depend on one another. They are coordinated
and linked together according to a plan one subs ystem depends
on the input of another subs ystem for proper functioning in the
output of one s ys tem is the required input fro another
subs ystem.
2
4. Integration:
Integration refers to the Completeness of the s ys tems
integration is concerned with how a s ystem is tied together.
This means that sharing physical part or location of the s ystem.
For better understand parts of the s ystem work together with the
s ystem even though each part performs a unique function.
Without the properl y integration of the system, a s ystem cannot
work properl y and cannot achieve the desired objective.
5. Central Objective:
The last characteristic of a s ystem is its central objective
objectives may be real or stated. Although a stated objective
may be the real objective, it is not good for an organization to
state one objective and operate to achieve another. The
important point is that users must know the central objective of
a s ystem for successful design of a s ystem.
Types of Systems
Systems have been classified in different ways common
classifications they all are defined below:
1) Physical or Abstract System
2) Open or Closed S ystem
3) Deterministic & Probabilistic S ystem
4) “Man-made” information s ystems
3
2. Open – Closed System:
An open s ystem continuall y interacts with its environments. It
receives inputs from and delivers output to the outside. An
information s ystem belongs to this category, since it must adapt to the
changing demands of the users. In contrast, a close s ystem is isolated
from environmental influences. In reality completel y close s ystems
are Rare.
4
instructions, Memos or reports from top management to the intended
user in the organization. In this s ystem Polices are formulated by the
Top monument and then translated into directives, rules and
regulations and transmitted to lower level management for
implementation. The output represents employee performance.
Categories of information:
There are three categories of information related to managerial level.
The First level is Strategic information, which relates to long range
planning policies that are of direct interest to upper management
information such as population growth, trends in financial investment,
and human resources changes would be of interest to top compan y
officials.
Upper
Mgt Control Information
Middle
5
day to day rules and regulations of the business. Examples are dail y
employee absence sheets, the current stock available for sale.
6
phase of the cycle. In fact, it may act as a basis for modifying earlier
steps taken. We now describe each of these steps.
Recognition of Need- What is the Problem?
One must know what the problem is before it can be solved. The
basis for a candidate system is recognition of a need for improving an
information s ystem or a procedure. For example, a supervisor may
want to investigate the s ystem flow in purchasing, or a bank president
has been getting complaints about the long lines in the drive-in. This
need leads to a preliminary survey or an initial investigation to
determine whether an alternative s ystem can solve the problem. It
entails looking into the duplication of effort, bottlenecks, inefficient
existing procedures, or whether parts of the existing s ystem would be
candidates for computerization.
If the problem is serious enough, management may want to have an
anal yst look as it. Such an assignment implies a commitment,
especiall y if the anal yst is hired from the outside. In larger
environments, where formal procedures are the norm, the anal yst’s
first task is to prepare a statement specifying the scope and objective
of the problem. He/she then reviews it with the user for accuracy. At
this stage, onl y a rough “ball park” estimate of the development cost
of the project may be reached. However, an accurate cost, of the next
phase – the – feasibilit y study can be produced.
7
Ideas fro change may also come from within the organization top
management, the user, the anal yst (Figure 1). As an organization
changes its operations or faces advances in computer technology,
someone within the organization may feel the need to update existing
applications or improve procedures. Here are some examples:
An organization acquires another organization.
A local bank branches into the suburbs.
A department spends 80 percent of its budget in one month.
Two departments are doing essentiall y the same work, and each
department head insists the other department should be
eliminated.
A request for a new from discloses the sue of bootleg
(unauthorized) forms.
8
user-oriented idea is converted to a feasibilit y study depend on
several factors:
The risk and potential returns.
Management’s bias toward the user.
Costs and the funds available for s ystem work.
Priorities of other projects in the firm.
The persuasive ability of the user.
All these factors are crucial for a prompt response to a user request
for change. A s ystems anal yst is in a unique position to detect and
even recommend change. Experience and previous involvement in the
user’s area of operations make him/her a convenient resource for
ideas. The role and status of the anal yst as a professional add
credibilit y to eh suggestions make:
9
Feasibility study:
Depending on the results of initial investigation, the survey is
expanded to a more detailed feasibilit y study. A feasibilit y study is a
test of a s ystem proposal according to its workabilit y, impact on the
organization, ability to meet user needs, and effective use of
resources. It focuses on three major questions:
10
1. What are the user’s demonstrable needs and how does a
candidate s ystem meet them?
2. What recourses are available for given candidate s ystems? Is
the problem worth solving?
3. What is the likel y impact of the candidate s ystem on the
organization? How well does it fit within the organization’s
master M IS Plan?
11
4. Recommendations and conclusions – specific recommendations
regarding the candidate s ystem, including personnel
assignments, costs, project schedules, and target dates.
After management reviews the proposal, it becomes a formal
agreement that paves the way for actual design and implementation.
This is a crucial decision point in the life cycle. Many projects die
the here, whereas the more promising one continue through
implementation. Changes in the proposal are made in writing,
depending on the complexit y, size and cost of the project. It is
simpl y common sense to verify changes before committing the project
to design.
Analysis:
Anal ysis is a detailed study of the various operations performed by a
s ystem and their relationship within and outside the s ystem. A ke y
question is “What must be done to solve the problem”? One aspect of
anal ysis is defining the boundaries of the s ystem and determining
whether or not a candidate s ystem should consider other related
s ystems. During anal ysis, data are collected on the available files,
decision points, and transactions handled by the present system.
There are some logical s ystem models and tools that are used in
anal ysis. Data flow diagrams, interviews, on-site observations, and
questionnaires are examples. The interview is a commonl y used tool
in anal ysis. It requires special skill and sensitivit y to the subjects
being interviewed. Bias in data collection and interpretation can be a
problem. Training, experience, and common-sense are required for
collection of the information needed to do the anal ysis.
Once anal ysis is completed, the anal yst has a firm understanding of
what is to be done. The next step is to decide how the problem might
be solved. Thus in s ystems deign, we move from the logical to the
physical aspects of the life cycle.
Design:
The most creative and challenging phase of the s ystem life cycle is
s ystem design. The term design describes a final s ystem and the
12
process by while it is developed. It referred to the technical
specification (analogous to the engineer’s blueprints) that will be
applied in implementing the candidate system. It also includes the
construction of programs and program testing. The key question here
is “How should the problem be solved?” The major steps in design
are shown in figures 2.
The first step is to determine how the output is to be produced and in
what format. Samples of the output (and input) are also presented.
Second, input data and master files (database) have to be designed to
meet the requirements of the proposed output. The operational
(processing) phases are handled through program construction and
testing, including a list of programs needed to meet the s ystem’s
objectives and complete documentation. Finall y, details related to
justification of the system and an estimate of the impact of the
candidate s ystem on the user and the organization are documented and
evaluated by management as a step toward implementation.
The final report prior to the implementation phase includes procedural
flowcharts, record layouts, report layouts, and a workable plan, or
implementing the candidate s ystem. Information on personnel, money,
hardware, facilities and their estimated cost must also be available. At
this point, projected costs must be close to actual costs of
implementation.
In some firms, separate groups of programmers do the programming,
whereas other firms employ anal yst-programmers who do analysis and
design as well as code programs. In this case, we assume that anal ysis
and programming are carried out by two separate persons. There are
certain functions, through that the anal yst must perform while
programs are being written. Operation procedures and documentation
must be completed. Securit y and auditing procedures must also be
developed.
Implementation
The implementation phase is less creative than s ystem design. It is
primaril y with user training, site preparation and file conversion.
When the candidate s ystem is linked to terminals or remote sites, the
13
telecommunication network and tests of the network along with the
s ystem are also included under implementation.
During the final testing, user acceptance is tested, followed by user
training. Depending on the nature of the s ystem, extensive user
training may be required. Conversion usuall y tales place at about the
same time the user is being trained on later.
14
diagnostic procedure is used to locate and correct errors in the
program. In most conversion, a parallel run is conducted where the
new s ystem runs simultaneousl y with the “old” s ystem. This method
though costl y, provides added assurance against errors in the
candidate s ystem and also gives the user staff an opportunit y to gain
experience through operation. In some cases, however, parallel
processing is not practical. For example, it is not plausible to run
parallel two online point-of-sale (POS) s ystems for a retail chain. In
an y case, after the candidate s ystem proves itself, the old s ystem is
phased out.
Post-Implementation and Maintenance
After the installation phase is completed and the user staff is adjusted
to the change created by the candidate s ystem, evaluation and
maintenance begin. Like any s ystem, there is an aging process that
requires periodic maintenance of hardware and software. If the new
information is inconsistent with the design specifications, then
changes have to be made. Hardware also requires periodic
maintenance to keep in true with design specifications. The
importance of maintenance is to continue to bring the new system to
standards.
User priorities, changes in organizational requirements, or
environmental factors also call for s ystem enhancements. To contrast
maintenance with enhancement, if a bank decided to increase its
service charges on checking account $ 3.00 to $ 4.00 for am minimum
balance of # 300, it is maintenance. However, if the same bank
decided to create a personal loan, on negative balances when
customers overdraw their account, it is enhancement. This changes
evaluation, program modifications and further testing.
Project Termination
A s ystem project may be drooped at any time prior to implementation,
although it becomes more difficult and costl y when it goes past the
design phase. Generall y project are dropped if after a review process,
it is learned that:
15
Changing objectives or requirements of the user cannot be met by the
existing design.
Benefits realized from the candidate s ystem do not justify
commitment to implementation.
There is a sudden change in the user’s budget or an increase in design
costs beyond the estimate made during the feasibilit y study.
The project greatl y exceeds the time and cost schedule.
In each case, a s ystem project may be terminated at the user’s request.
Summary:
System: S ystem means an organized relationship among
functioning units or components.
Interdependence: It means that parts of the organization or
computer s ystem depend on one another.
Analysis: It is a detailed study of the various operations
performed by a s ystem and their relationship within and outside
the s ystem.
Design : The term design describes a final s ystem and the
process by while it is developed.
Self Assessment Questions
1. What is S ystem? Explain it’s Characteristics?
2. What is the difference between the following
a) Physical & Abstract System
b) Open & Closed S ystem
c) Probabilistic & Deterministic S ystem
3 What do you mean by S ystem Anal yst? Explain it’s role?
4 Explain S ystem Development Life C ycle?
5 What is the role of Feasibilit y Study in SDLC?
6 How the Business act as a s ystem? Explain?
7 What are the elements of a S ystem? Can you have a viable
System without feedback? Explain.
8 How important is the informal information s ystem in s ystem
anal ysis? Explain.
16
9 What categories of information are relevant to decision
making in business ? Relate each category to the
management level and an information s ystem.
Suggested Reading
17
UNIT III
LESSON NO. 6 & 7
STRUCTURED ANALYSIS
&
UNSTRUCTURED ANALYSIS
Structured analysis is a set of techniques and graphical tools that
allow the analyst develop a new kind of system specifications
that are easily understandable to the user analyst work primaril y
with their wits, pencil and paper. Most of them have no tools.
The traditional approach focuses on cost benefit and feasibilit y
analyses, project management, hardware and software selection,
and personnel considerations. In contrast structured analysis
considers new goals and structured tools for analysis. The new
goals specif y the following:
1. Use graphics wherever possible to help communicate
better with the user.
2. Differentiate between logical and physical systems.
3. Build a logical system model to familiarize the user with
system characteristics and interrelationships before
implementation.
2
The structured specification consists of the DFDs that show the
major decomposition on system functions and their interfaces, the
data dictionary documenting all interface flow and data stores on
the DFDs, and documentation of the intervals of DFDs in a
rigorous manner through structured English, decision trees, and
decision tables.
In summary, structured analysis has the following attributes:
1. It is graphic. The DFD, for example, presents a picture of
what is being specified and is a conceptually easy – to
understand presentation of the application.
2. The process is partitioned so that we have a clear picture of
the progression from general to specific in the system flow.
3
3. It is logical rather than physical. The elements of system
do not depend on vendor or hardware. They specif y in a
precise, concise, and highly readably manner the workings
of the system and how it hangs together.
4. It calls for a rigorous study of the user area, a commitment
that is often taken lightly ill the traditional approach to
system analysis.
5. Certain tasks that are normally carried out late in the
system development life cycle are moved to the analysis
phase. For example, user procedures are document during
analysis rather than later in implementation.
The Tools of Structured Analysis
Let’s take a look at the tools of structured analysis using a
common illustration ----the textbook publisher. Here is a
summary background:
4
1. ABC, inc. is a multimillion –dollar publisher of business
and technical textbooks, located in Homewood , Illinois.
The company is organized into division such as trader,
textbooks, accounting and sales. The organization structure
consists of a president, two senior vice – president, a
general manager of each division, shipping and receiving
supervisors and 45 sales representatives.
2. The college book division receives order from bookstores
for books at a discount that depends on the size of the
order. The clerk in charge verifies the order and authorizes
shipment though the warehouse. An invoice follows the
shipment accounting clerk processes account receivable
through the accounting department from forms tined out.
3. Business is highly seasonal; it peaks about a month before
the beginning of each school term. There is an average of
80 invoices per week, eah with an average of 8 book titles
and average value of $5000.
4. Recently, management decided to improve the availability
of textbooks by holding stock of new computer and other
high-demand text and making it possible for all bookstore
to order by calling a toll- free number as well as by the
present mail method. These means that an improved
inventory control system must be devised along with a
catalog of texts to verif y authors and determine the
availability of the books being ordered.
5. the new system of receiving order is expected to increase
the sales volume by 80 percent within the year. Although
fewer average texts per order are expected due to the use of
the toll- free number, books are now shipped more quickly
than before and delivered in time for the start of the
semester.
5
An analysis has been asked to investigate the new system and
build a logical model of the candidate system without abruptly
jumping to conclusions what will be automated and what will
remain manual.
The Data Flow Diagram (DFD)
The first step is to draw a data flow diagram (DED). The DFD
was first developed by Larry Constantine as a way of expressing
system requirements in a graphical form; this led to a modular
design.
6
Figure 4 : Data Flow Diagram (a) Basic Symbols and (b)
General Format
Note that a DFD describes what data flow (logical) rather than
how they are processed, so it does not depend on hardware;
software, data structure, or file organization. The key question
that we are trying to answer is : What major transformations must
occur for input to be correctly transformed into output?
Each process summarizes a lot of information and can be
exploded into several lower – level, detailed DFDs. This is
7
often necessary to make sure that a complete documentation of
the data flow is available for future reference.
Constructing a DFD
Several rules of thumb are used in drawing DFDs:
1. Processes should be named and numbered for easy
reference (see figure 5). Each name should be repetitive of
the process.
2. The direction of the flow is from top to bottom and from
lest to right. Data traditionally flow from the source (upper
left corner) to the destination (lower – right corner),
although they may flow back to a source. One way to
indicate this is to draw a long flow line back to the source.
An alternative way is to repeat the source symbol As a
destination. Since it is used more than once in the DFD, it
is marked with a short diagonal in the lower right corner
(see figure 6).
3. When a process is exploded into lower – level details they
are numbered.
4. The names of data stores, sources, and destinations are
written in capital letters. Process and data flow names have
the first letter of each worked capitalized.
A DFD typically shows the minimum contents of data stores.
Each data store should contain all the data elements that flow in
and out. Questionnaires can be used to provide information for a
first cut. All discrepancies, missing interfaces, redundancies,
and the like are then accounted for – often through interviews.
8
Figure 5 : Completed DFD Showing Accounts Receivable
Routine
9
reestablishing consistent definitions of various elements terms
and procedures. Finally, a Data dictionary is an important step in
building a data base. Most database management systems have a
data dictionary as a standard feature.
Description IMS CODASYL
Smallest Unit of Data Field Data item
Groups of Smallest Data Items Segment Data
Aggregate
Entity Processed at a Time Logical Record Record
Largest Grouping Data base Set
10
Figure 6 : Alternative Use of Source / Destination Symbols
11
Figure 7 : Project Data Element Form – A Sample
PROJECT DATA ELEMENT SHEET
PROJECT NAME ________________________________ DATA
____________
DATA DATA ELEMENT ELEMENT ELEMENT
ELEMENT ELEMENT PICTURE LOCATION SOURCE
DESCRIPTION ABBREVI ATION
12
Table 1 : Sample Data Definitions
Description IMS
CODASYL
13
1. Data element: The smallest unit of data that provides for no
further decomposition. For example, “date” consists of
day, months and year. They hang together for all practical
purpose.
2. Data structure: A group of data elements handled as a unit.
For example, “phone” is a data structure consisting of four
data elements ; Area code – exchange – number-extension-
for example, 804-924-3423-236. “BOOK DETAILS” is a
data structure consisting of the data elements author name,
title, ISBN (International Standard Book Number), LOCN
(Library of Congress Number), publisher’s name and
quantity.
3. Data flows and data stores : Data flows are data structures
in motion, whereas data stores are data structures at rest. A
data store is a location where data structures are
temporarily located. The three levels that make up the
hierarchy of data are shown in Figure 8.
Describing Data Elements
The description of a data element should include the name,
description, and an alias (synonym). For example :
AUTHOR – NAME - first WHISKEY - name
- middle - distiller
- last - vintage
- alias
The description should be a summary of the data element. It may
include an example. We may also want to include whether or not
the data element(s) has :
1. A different name : For example a PURCHASE ORDER may
exist as PUR.ORDER, PURCHASE ORD., or P.O. We want
to record all these in the data dictionary and include them
under the PURCHASE ORDER definition and separately
14
with entries of their own. One example is ‘P.O. alias of
PURCHASE ORDER”. Then we look up PURCHASE
ORDER to find the details. It is an index.
2. The characteristics, such as a range of values or the
frequency of use or both. A value is a code that represents
a meaning. Here we have two types of data elements;
a) Those that take a value within a range : for example,
a payroll check amount between 41 and $10,000 is
called a continuous value.
b) Those that have a specific value; for example,
departments in a firm may be coded 100 (accounting),
110 (personnel), etc. In a data dictionary, it is
described as follows:
100 means “Accounting Department”
101 means “Accounts Receivable Section”
102 means “Accounts Payable Section”
108 means “General Ledger Section”
In either type, values are codes that represent a meaning.
3. Control information such as the source, data of origin,
users, or access authorization.
4. Physical location in terms of a record, a file or database.
Describing Data Structures:
We describe any data structure by specif ying the name of each
data structure and the elements it represents, provided they are
defined elsewhere in the data dictionary. Some elements are
mandatory, whereas others are optional. To illustrate, let us take
“BOOK-DETAILS” from Figure 5. The data elements of this
data structure are as follow:
The data structure BOOK – DETAILS is made up of five
mandatory data elements and two optional ones.
15
Describing Data Flows and Data Stores:
The contents of a data flow may be described by the name(s) of
the data structure(s) that passes along it. In our earlier example,
BOOK-DETAILS expresses the content of the data flow that
leads to process 4 (see figure 5). Additionally, we may specif y
the source of the data flow, the destination, and the volume (if
any). Using the BOOK-ORDER EXAMPLE, data flows may be
described as follow:
16
Describing Processes
This step is the logical description. We want to specif y the
inputs and outputs for the process and summarize the logic of the
system. In constructing a data dictionary, the analyst should
consider the following points:
1. Each unique data flow in the DFD must have one data
dictionary entry. There is also a data dictionary entry for
each data store and process.
Figure 9 : Decision Tree – An example
17
structured English for our publisher’s, discount policy is shown
in Table 2.
We can actual make structured English more compact by using
terms defined in the data dictionary. For example, the process
ORDER may have the data element ORDER SIZE, which defines
four values :
MINIMUM : 5 or fewer copies per book title
SMALL : 6 to 19 copies
MEDIUM : 20 to 49 copies
LARGE : 50 or more copies
Using these values, the structured English in Table 2 would read
as shown in Table 3.
Table 2 : Structured English – An Example
COMPUTE DISCOUNT
Add up the number of copies per book title.
IF order is from bookstore
And-IF order is for 6 copies or more per book title
THEN: Discount is 25%
ELSE (order is for fewer than 6 copies per book title)
SO : no discount is allowed
ELSE (order is from libraries or individual customers)
So-IF order is for 50 copies or more per book title
Discount is 15%
ELSE IF order is for 20 to 49 copies per book title
Discount is 10%
ELSE IF order is for 6 to 19 copies per book title
Discount is 5%
ELSE (order is for less than 6 copies per book order)
SO no discount is allowed
18
Table 3 : Structured English – Using Data Dictionary Values
COMPUTE – DISCOUNT
Add up the number of copies per book title
IF order is from bookstore
And-IF ORDER – SIZE is Small
THEN: Discount is 25%
ELSE ORDER-SIZE is MINIMUM
SO: No discount is allowed
ELSE (order is from libraries or individual customers)
So-IF ORDER – SIZE IS LARGE
Discount is 15%
ELSE IF ORDER-SIZE is MEDIUM
Discount is 10%
ELSE IF
ORDER-SIZE is SMALL
Discount is 5%
ELSE (ORDER-SIZE IS MINIMUM)
SO: no discount is allowed
From these examples we see that when logic is written out in
English sentences using capitalization and multilevel indentation,
it is structured English. In this tool, the logic of processes of the
system is expressed by using the capitalized key words IF,
THEN, ELSE, and SO. Structures are indented to reflect the
logical hierarchy. Sentences should also be clear, concise, and
precise in working and meaning.
Importance of Data Dictionary
Data dictionary is an important tools for structured analysis as it
offers following advantages –
1) It is a valuable reference for designing the system. It is
used to build the database and write programs during design
phase.
19
2) It assists in communicating meaning of different elements.
Terms and procedures.
3) It facilitates analysis in determining additions and changes
in the system.
4) It helps the analyst to record the details of each element
and data structure.
5) It is used to locate errors in the system descriptions.
6) It is used a useful reference document curing
implementation of the system.
3.4 Decision Tables:
A major drawback of a decision tree is the lack of information in
this format to tell us what other combinations of conditions to
test. This is where the decision table is useful. The decision
table is a table to contingencies for defining a problem and the
actions to be taken. It is a single representation of the
relationship between conditions and actions. Figure 10 shows a
decision table that represents our discount policy (Table 2 and
Table 3).
A decision table consists of two parts: stub and entry. The stub
part is divided into an upper quadrant called the condition stub
and a lower quadrant called the action stub. The entry part is also
divided into an upper quadrant, called the condition entry and a
lower quadrant called the action entry. The four elements and
their definitions are summarized in Table 3.
20
Figure : Decision Table – Discount Policy
Condition Stub
Condition Entry
1 2 3 4
5 6
Customer if Bookstore Y Y N N N N
LIF Order size 6 copies or Y N N N N N
more? Y T Y Y
(Condition) Customer Librarian or Y N N N
individual? Y N N
Order size 50 copies or Y N
more?
Order size 20-49 copies?
Order size 6 – 19 copies?
Allow 25% discount X
THEN Allow 15% discount X
(action) Allow 10% discount X
Allow 5% discount X
No discount allowed X X
Action Stub
Action Entry
21
Table 3. Elements and Definitions in a decision Table
Elements Location Definition
Condition Stub Upper Left Sets forth in question form
Quadrant condition that may exist.
Action Stub Lower left Outlines in narrative from
Quadrant the action to be taken to
meet each condition.
Condition Entry Upper right Provides answer to
Quadrant question asked in the
conditions stub quadrant.
Action Entry Lower Left Indicates the appropriate
Quadrant action resulting from the
answer to the conditions in
the condition entry
quadrant.
22
1. A decision should be given a name, shown in the top left of
the table.
2. The logic of the decision table is independent of the
sequence in which the condition rules are written, but the
action takes place in the order in which the events occur.
3. Standarized language must be used consistently.
4. Duplication of terms or meanings should be eliminated,
where possible.
3.5 Structured English:
Structured English uses narrative statements to describe a
procedure. It uses three basis types of statements –
a) Sequence Structures:
They include a set of instructions that are carried out one
after another and do not depend on any condition. Thus,
for sequence structures instructions are written in the order,
or sequence in which they are to be performed.
b) Decision Structures :
Decision structures are also known as Selection structures,
is used for making decisions. They include one on more
sets of instructions that are carried out depending upon one
or more conditions. Decision structures are used for
selecting the proper path out of two or more alternative
paths in the program logic. They generally use the phrase
IF THEN ELSE to carry out different actions.
c) Iteration Structures:
They include a set of instructions that are repeated until a
particular condition occurs. They are used where one or
more instructions may be executed several times depending
on some condition. They generally use the phrase DO
WHILE… ENDDO to repeat a set of instructions.
The examples of these three types of statements are given below
23
Sequential Decision Structure: Iteration Structure:
Structures :
Accept employee If Basic_Pay<= 1000 Ans = “Y”
code HRA = 500 Do while Ans = “Y”
Accept employee Else Accept employee
name If Basic_Pay<=3000 code
Accept other details HRA = 1000 Accept employee
store data Else name
HRA = 1500 Accept other details
End if Display
End if “Continue(Y/N)?”
Accept Ans
End do
24
provide functional details, and it is not acceptable to many
non-technical users.
3. Structured English is best used when the problem requires
sequences of actions with decisions.
4. Decision trees are used to verif y logic and in problems that
involve a few complex decisions resulting in a limited
number of actions.
5. Decision trees and decision tables are best suited for
dealing with complex branching routines such as
calculating discounts or sales commissions or inventory
control procedures.
Given the pros and cons of structured tools, the analyst should be
trained in the use of various tools for analysis and design.
He/she should use decision tables and structured English to get to
the heart of complex problems. A decision table is perhaps the
most useful toll for communicating problem details to the user.
The major contribution of structured analysis to the system
development life cycle is producing a definable and measurable
document – the structured specification. Other benefits include
increased user involvement, improved communication between
user and designer, reduction of total personnel time, and fewer
“kinks” during detailed design and implementation. The onl y
drawback is increased analyst and user time in the process.
Overall the benefits outweigh the drawbacks, which make
structured analysis tools viable alternatives in system
development.
1.
Suggested Readings
25
Course Technology; 4 edition (February 16, 2006Publisher:
John Wiley & Sons; 3 edition (October 14, 2005)
26
UNIT – III
LESSON NO. - 8
INPUT/OUTPUT FORM DESIGN
INPUT DESIGN
Input Data
1
Source Documents
1. 19 September 1935
3. 9/19/35
2
Input Media and Devices
Source data are input into the s ystem in a variet y of ways. The
following media and devices are suitable for operation:
3
Automatic tag reading is the ideal way to collect unit inventory
information fast, accuratel y, and economicall y.
7. Cathode ray tube (CRT) screens are used for online data
entry CRT screen display 20, 40, or 80 characters simultaneousl y on
a television like screen. They show as many as 24 lines of data.
4
There are three major approaches for entering data into the
computer menus, formatted forms, and prompts.
User : A1260
User : Inventory
User : Y
5
Most s ystems edit the data entered by the user. For example, if
the password exceeds Maximum number of digits or if the password
is illegal, the s ystem respond with a message like UNAUTHORIZED
ENTRY or I EGAL NUMBER The user has three chances to enter the
correct code, after which the s ystem locks up. In banks automated
teller machines (ATMs), if the customer entered his/her code wrong
three times, the s ystem retains the card and displays a message on
the screen that the user should check with an officer during banking
hours.
The prompt method also allows the user to key questions that
determine the next response of the s ystem. In our example INPUT
DATA Y/N. if the response is Y, the s ystem might display a record
format entering data. Otherwise, it might automaticall y go back to
the menu l different set of options. This method along with the menu
and temp designed to improve the efficiency and accuracy of online
data entry.
Many online data entry devices are CRT screens that provide
instant visual verification of input data and a means of prompting
the operator. The operator can make any changes desired before the
data go to the s ystem for processing. A CRT screen is actuall y a
display station that has a buffer (memory) for storing data. A
common size display is 24 rows of 80 characters each or 1,920
character.
6
There are two approaches to designing data on CRT screens
manual and software utilit y methods. The manual method uses a
work sheet much like a print layout chart. The menu or data to be
displayed are blocked out in the areas reserved on the chart and then
they are incorporated into the s ystem to formalize data entry. For
example, we use dBASE II software commands (explained in Chapter
11) to display a menu on the screen. The first command in the partial
program is interpreted by the s ystem as follows: “Go to row 10 and
column 10 on the screen and display (SAY) the statement t yped
between quotes.” The same applies to the next three commands. The
command “WAIT TO A” tells the s ystem to keep the menu on the
screen until the operator t ypes the option next to the word
“WAITING”.
OUTPUT DESIGN
7
compatibilit y of the device with the s ystem, response time
requirements, expected print qualit y, and number of copies needed.
The following media devices are available for providing computer
based output:
1. MICR readers
5. Graph plotters
6. Audio response
8
qualit y of the output and, in turn, the success or failure) of the
s ystem. For example, the following shows editing output for a
student birth date:
FORMS DESIGN
What is a Form
9
Classification of Forms
Cla s s Cha ra ct e ri st i c s E xa mp le s
Me mo r y 1. Rep r es e nt s h is to r ica l d a ta B o nd r e gi st er
2. Dat a ge ne r a y u sed fo r r ef er e nc e I n ve n to r y r eco r d
3. Sta tio n ar y a nd r e ma i ns in o ne p l ace , u s ua ll y i n J o ur na l s hee t
a fi le
P ur c ha s e r eco r d S to c k
Ser ve s as co nt r o l o n cer tai n d et ai ls
4. led ger
10
Requirements of Forms Design
5. Ease of data entry. If used for data entry, the form should
have field positions indicated under each column of data (see Figure
10-9) and should have some indication of where decimal points are
(use broken vertical lines).
11
6. Size and arrangement. The form must be easil y stored and
filed. It should provide for signatures. Important items must be in a
prominent location on the form.
12
then thrown away. It is the most cost effective (also the
messiest method for multipart forms.
Types of Forms
Flat Forms
Unit-Set/Snapout Forms
These forms have an original copy and several copies with one
time carbon paper interleaved between them. The set is glued into a
13
unit (thus, unit set) for eas y handling. The carbon paper is approx-
imatel y 3/8 inch shorter than the copies. The copies are perforated at
the glue margin for tearing out, although the carbon is not
perforated. Because of the perforation and the shorter carbon, the
forms can be easil y snapped out (thus, the name snapout form) after
completion.
14
carbon interleaved forms. Considering the labor savings of the NCR
process, however, cost may be we justified in the long run.
Layout Considerations
Have you ever filled out a form where you had to “jump
around”? Many forms have this design weakness. The solution is
simple: List all the items that must go on the form and classify them
into logical groupings. All other items are listed under a general
classification. For example, in a purchase order, several items fall
into a group ca ed shipping instructions. They include SHIP TO,
SHIP FROM, and SHIP VTA.
15
After the items are classified into a logical sequence by group,
the next consideration is placing the data groups in appropriate areas
(zones). To summarize:
16
Box Design
Each Ea Weight wt
Spacing Requirements
17
A commonl y used standard, called 3/5 spacing. The 3 refers to
the number of lines per vertical inch, while the 5 refers to the
number of characters that fit in one horizontal inch. This approach it
related to spacing for clerks 18 characters per inch or cpi), workers
(5 and printers (10/12 cpi).
Form Instructions
18
Description : Give title of each part.
Paper Selection
First White
Second Yellow
Third Pink
Fourth Blue
19
Paper weight is based on a ream of 500 sheets that are 17 by
22 inches it ramges from 4 pounds to 220 pounds. Cutting the 500
arts into quarters results in the standard size of a t ypewriter page 8½
by 11 inches.
Cost Considerations
20
1. Using standard size and weight paper.
Forms Control
5. How will one handle reorders? Who will initiate them? In what
way?
21
8. Where and how should the form be stored?
Review Questions
22
UNIT III
LESSON NO. 9
TESTING
1
validation phase generall y produces changes in the software to deal
with errors and failures that are uncovered.
Then a set of user sites is selected that puts the s ystem into
use on a live basis. These beta test sites use the s ystem in day- to -
day activities; they process live transactions and produce normal
s ystem output. The system is live in very sense of the word, except
that the users are aware they are using a s ystem that can fail. But the
transactions that are entered and the persons using the s ystem are
real.
Continued use may produce additional failure and the need for still
more change.
Certification
2
certain organization. That responsibilit y remains with the
organization and its team of anal ysts.
Testing Plans
Code Testing
3
indicate whether the code meets its specifications nor does it
determine whether all aspects are even implemented. Code testing
also does not check the range of data that the program will accept,
even though, when software failures secure in actual use, it is
frequentl y because users submitted data outside expected ranges.
Specification Testing
Levels of Test
4
Systems are not designed as entire s ystems nor are they tested
as single s ystems. The anal yst must perform both unit and
integration testing.
Unit Testing
In unit testing the anal yst test the programs making up a
s ystem. (For this reason unit testing is sometimes called program
testing.) The software units in a s ystem are the modules and routines
that are assembled and integrated to perform a specific function. In
a large s ystem, many modules at different levels are needed.
The test cases needed for unit testing should exercise each
condition and option. For example, test cases are needed to
determine how the system handles attempts to check-in guests who
do and do not have reservations, as well as those instances involving
changing the name on the reservation when a person other than the
one listed arrives. Also needed are test cases for the checkout
situations of paying the exact amount of the bill, onl y part of the
bill, and more than the amount shown. Even checking out without
making any payment at all must be included in a test case.
If the module receives input or generates output, test cases are also
needed to test the range of values expected, including both valid and
invalid data. What will happen in the hotel checkout example if a
guest wishes to make a payment of Rs. 1, 00,000 for an upcoming
5
convention? Are the payments and printing modules designed to
handle this amount? Testing for this question quickl y detects
existing errors.
Integration testing
6
Integration testing does not test the software but rather the
integration of each module in the s ystem. It also tests to find
discrepancies between the s ystem and its original objective current
specifications and systems documentation. The primary concern is
the compatibilit y of individual modules. Anal ysts are trying to find
areas where modules have been designed with different
specifications for data length, t ype, and data element name. For
example, one module may expect the data item for customer
identification number to be a numeric field, while other modules
expect it to be a character data item. The s ystem itself may not
report this as an error, but the output may show unexpected results.
If a record created and stored in one module, using the identification
number as a numeric field, is later sought on retrieval with the
expectation that it will be a character field, the field will not be
recognized and the message required recorded not received will be
displayed.
Integration testing must also verify that the file sizes are
adequate and that indices have been built properl y. Sorting and
rendering procedures assumed to the present into lower-level
modules must be tested at the s ystems need to that they in fact exist
and achieve the results modules expect.
There are other tests that are in special category, since they do
not form on the normal coming of the s ystem. Six tests are essential.
7
sing out during lunch periods and at the end of the day, so testing is
looking at real situations.
2. Storage Testing
8
large files of the size the s ystem will have during a t ypical run or to
prepare a report.
4. Recovery Testing
Anal ysts must always assume that the s ys tem will fail and data
will be damaged or lost. Even though plans and procedures are
written to cover these situations, they also must be tested. By
creating a failure or data loss event where the users are forced to
reload and recover forma backup copy, anal ysts can readil y
determine whether recovery procedures are adequate. The best-
designed plans usually are adjusted or augmented after this test.
5. Procedure Testing
9
needed but also where they are wrong, that is, where actions
suggested· in the documentation do not match those that must
actuall y be taken to make the s ystem.
10
questions. It is difficult to forget the s ystem that was damaged
because a user hanged on the terminal when data were submitted and
accepted by the s ystem without displaying a response. But, following
the godliness above, the anal ysts can avoid those situations.
There are two very different sources of test data, live and
artificial. Both have district advantage and disadvantages for the
tester.
Live test data are those that are actuall y extracted from
organization files. After a s ystem partially constructed, programmers
or anal ysts often ask users to key in a set of data from their normal
activities. For example, in a general ledge accounting s ystem, they
may ask someone from the accounting staff to enter the chart of
account numbers and a set of account balances, along with
transactions affecting those accounts. Then the s ystem person uses
this data as a way to partiall y test the s ystem. In other instances,
programmers or analysts extract a set of live data from the files and
have them entered themselves.
Artificial test data are created solel y for test purposes, since
they can be generated to test all combinations of formats and values.
In other words, the artificial data, which can quickl y be prepared b y
11
a data-generating utilit y program in the information s ystems
department, make possible the testing of all logic and control paths
through the program.
Testing Libraries
Test libraries are not just for initial testing. As the s ystem
evolves and programs are modified and maintained, they must be
requested. The testing library should be maintained throughout the
life of the s ystem so that, as each change is made, reliable data are
again available to test the s ystem.
System Controls
12
A s ystem design introduces new control elements and changes
the control procedures. New controls in the form of relational
comparison are designed to defect and check errors that rise form the
use of the s ystem. In a manual s ystem, internal control depends on
human judgment, personal care and division of labor. In a computer
based s ystem the number of persons involved is considerabl y
reduced. In designing a new s ystem the designer should specify the
location of error control points and evaluate them on the basis of
error frequency, cost and timing of error detection. By identifying
points where potentials errors may occur, designers can create
control procedures for handling errors immediatel y.
Processing controls
13
5. Sequence check verifies that data records are in sequence prior
to processing. Duplicate records needs to be checked.
Audit Trails
For the audit trail to show its impact a detailed file of the
transactions need to be maintained. During evaluation of a s ystem
following steps should be considered.
14
2. Examine budget costs to the whether s ys tem testing in within
the limits.
15
UNIT III
LESSON NO. 10
IMPLEMENTATION AND MAINTENANCE
Putting a new s ystem into operation is usuall y complicated b y
the fact that there is an older s ystem already in operation. The
anal yst has to deal with changing from something familiar to
something new and different, while also attending to the mechanics
of implementation. Sicne the concern for simultaneous conversion
and implementation is usual. New s ystem brings in new equipment.
It may represent a change from manual to automated operation or a
change in the level of available machine capacit y. During
implementation, planning plays a decisive factor in determing the
ultimate success or failure of s ystem. Due attention should be paid
to:
1
3. Preparing for New Equipment:
Training
2
s ystem in various capacities helps or hinders, and may even prevent,
the successful implementation of an information s ystem. Those
whose will be associated with or affected by the s ystem must know
in detail what their roles will be how they can use the s ystem, and
what the s ystem will or will not do. Both s ystems operators and
users need training.
3
important both to enable users to plan work activities and to identif y
s ystems that run longer or shorter than expected a sign that typicall y
indicates problem with the run.
User Training
Training methods
4
program as part of their services, in some cases, there is a charge,
but in many instances training is free. For example, IBM offers
complimentary two and three-day courses to purchasers of many of
their minicomputers and mainframe computers. The courses, offsite
by experienced trainers and sales personnel, over all aspects of using
the equipment, from how to turn it on and off, to the storage and
removal of data, to handling malfunctions. This training is hands-on,
so the participants actuall y use the s ystem in the prescient of the
trainers. if questions arise, they can quickl y be answered. Since the
s ystem is intended for training, there is generall y no rush to get
training out of the way so that the productive use of the s ystem can
start. Training conducted at the organization’s location might be
rushed, a danger that installation personnel must guard against.
In-house Training
5
involve more personnel in the twining program than is possible
travel is required.
Conversion
Conversion Methods
6
methods may be more beneficial. In general, s ystem conversion
should be accomplished as quickl y as possible. Long conversion
periods increase the possible frustration and users.
Parallel Systems
7
Methods of System Conversion
8
Direct Cutover
The direct method converts form the old to the new s ystem a
abruptl y, sometimes over a weekend or even overnight. The old
s ystem is used until a planned conversion day, when it is replaced b y
the new s ystem. There are no parallel activities. It the anal yst must
make the change and wants to ensue that the new s ystem full y
replaces the old one so that users do not rel y on the previous
methods, direct cutover will accomplish this goal. Ps ychologicall y,
it forces all users to make the new s ys tem work; they do not have
any other method to fall back on.
9
was once halted because of difficulties, they may not be full y
confident that the s ystem will be relaible, even if anal ysts tell them
that the problems have been corrected. The time it takes to redo
work that was stopped because of the conversion can be both length y
and costl y, and time lost can never be recaptured.
Pilot Approach
10
are piloting a new system and that changed can be made to improve
the s ystem.
Long phase – in periods create difficulties for anal ysts, whether the
conversions go well or not. If the s ystem is working well, early users
will communicate their enthusiasm to other personnel who are
waiting for implementation. In fact, enthusiasm may reach such a
11
high level that when a group of users foes finall y receive the system,
there is a letdown. In the clinic example, for instance, the medical
staff may exaggerate the time savings that accrue from not having to
search for medical records or manuall y prepare insurance claims,
activities that will be handled by the new s ystem. Latter, when
conversion occurs, the staff finds out that the s ystem does not do the
processing instantl y. The disappointment is understandable.
Conversion Plan
3. List all new documents and procedures that go into use during
conversion.
12
The conversion plan should anticipate possible problems and ways to
deal with them. Among the most frequentl y occurring problem are
missing documents, mixed data formats between current and new
files, errors in data translation, missing data or lost files, and
situations that were overlooked during s ystems development. The
conversion manager must guar against the omission of steps in the
conversion. A checklist will prevent missed steps. Personnel
absences must also be expected and adequate fallback plans
specified.
Operating Plan:
13
UNIT III
LESSON NO. 11
IMPLEMENTATION AND CONTROL OF PROJECT
Hardware Selection
Gone are the days when a user calls IBM to order a 360
s ystem, which in itself included hardware, software & support.
Today, selecting a system is a serious and time concurring activit y.
Unfortunatel y, many s ystems are still selected based on vendor
reputation onl y or other subjective factors. Instead the factors,
which are to be considered, should be determining equipment size,
capacit y needs, financial considerations and acquisition method.
1
capacit y is frequently the determining factor. Relevant features to
consider include the following:
2
properl y. Trade newspapers and magazines provide regular
distribution of information about hardware and software
requirements. In addition, subscription services offer information on
operating, specifications. These services, which cost several hundred
dollars yearl y, provide monthl y updates (generall y using a loose-leaf
binder format) and telephone assistance for computer operation, as
well as user comments.
3
HARDWARE SOFTWARE
Comparison of Benchmarks
4
Plug – Compatible Equipment
Financial Factors
5
characteristics and plans of the organization at the time of the
acquisition is made. No one option is always better than the other.
Rental
6
Lease
Purchase
7
frequentl y costs the least, especiall y in light of the tax advantages
that can some - times be gained.
3. The cost of the equipment can be depreciated over time; this also
lowers the taxable income and therefore the income taxes paid.
8
income taxes thus do not receive tax benefits from computer
purchase.
Maintenance Source
9
purchaser has the option acquiring maintenance from various
sources.
Terms
10
required. The labor and parts form is the most common t ype of
contract of large s ystems.
The anal yst should also consider how maintenance costs would
change. Large manufactures have established policies of adjusting
their maintenance charges on an annual or semiannual basis and
frequentl y will not change these policies for any customer. Other
suppliers and service companies offer open-ended contracts that
allow the adjustment of charges at any time with 90 day notice.
Frequentl y, anal ysts negotiating service with these companies will
seek a cap on maintenance; that is, they will seek agreement, in
writing, that the maintenance costs will not increase by any more
than a stated maximum amount during a specific period, such as a
calendar year. This t ype of protection ensures that the supplier
cannot take advantage on the user is totally dependent on the service
agency. Most service companies are very reputable, but good
business practice dictates that adequate protection always is sought
in contracting for services.
11
Repair service is often provided onl y during normal working
hours. If an organization wishes evening service or around-the-clock
coverage, it is usually available for an extra charge, say, from 10
percent to 50 percent additional cost.
12
The use of service bureaus is very common in accounting and
payroll applications. Of the firms that want automatic data
processing services in these areas but that do not want to purchase
equipment or hire systems personnel will contract with a service
bureau. However, as computer costs continue to drop and high-
qualit y commercial software is available the reliance of some firms
on service bureaus may change.
Vendor Selection
13
4. Universities 9. Consultants
Software Selection
14
1. The package may not meet user requirements adequatel y.
Reliability
15
failure is based largel y of random failures, software reliability is
based on predestined errors.
3. Are there errors a user can make that will ring down the
s ystem?
Functionality
16
Capacity
Flexibility
Usability
Security
Performance
17
The language in which a package is written and the operating
s ystem are additional performance considerations. If we plan to
modify or extend a package, it is easier if it is written in a
language that is commonl y known to programmers. Likewise, if
the package run only under a disk operation s ystem and the
installation is under a full operation s ystem, then either the
package will have to be upgraded to the larger operating system
or the s ystem downgraded to handle the package as is. In either
case, the change could be costl y and counterproductive.
Minimal costs
2. Delivery schedule.
Performance Evaluation
18
5. Uptime. What is the ‘uptime’ record of the s ystem? What
maintenance schedule is required?
19
UNIT IV
LESSON NO. 12
INTEGRATED COMPUTERS TO INFORMATION
SYSTEM AND DBMS
Modularization
1
two or more application areas. Modules may be used onl y, once
or they may be used several times during the processing of an
application. Breaking up of a problem into smaller manageable
parts is certainl y beneficial.
2
Modular s ystems design is best viewed as one aspect of a broader
planning issue, but it is not a required step in the design process.
The anal yst, based upon the in-depth understanding of problem,
specifies the level of modularization.
3
File Design
1. Sequential Organization
4
the s ystem changes the customer’s cit y of residence as specified in
the transaction file (on floppy disk) and corrects it in the master file.
A “C,” in the record number specifies “replace”; and “A” “add”; and
a “D” “delete.”
2. Indexed-Sequential Organization
5
for the index. It also takes longer to search the index for data access
or retrieval.
Chaining
Data for our flight reservation s ystem has a separate index area
and a data location area. The index area any contain flight number
and a pointer to the record present in the data location area. The data
location area may have record numbers along with all the details of
the flight such as the flight number, flight description, and flight
departure time. These are all defined as keys, and a separate index is
maintained for each. In the data location area, flight information is
in no particular sequence. Assume that a passenger needs
information about the “Delhi flight”. The Data Base Management
System (DBMS) then reads the single-level index sequentially until
6
to finds the key value for the Delhi flight. This value may have two
records associated with it. The DBMS essentiall y tells the agent the
departing time of the flight. Looking at inverted-list organization
differentl y, suppose the passenger requests information’s on a Delhi
flight that departs at 8:15. The DBMS first searches the flight
description index for the value of the “Delhi flight”. It finds both the
records. Next it searches the flight departure index for these values.
It finds that one of them departs at 10:10, but the other departs at
8:15. The later record in the data location area is displayed for
follow-up.
It can be seen that inverted lists are best for application that
request specific data on multiple keys. They are ideal for static files
because additions and deletions cause expensive pointer updating.
4. Direct-Access organization
7
reference. Another way of locating a record is by the number of
bytes it is from the beginning of the file (see Figure 1). Unlike
relative addressing, if the file is move, pointers need not be update,
because the relative location of the record remains the same
regardless of the file location.
8
FIGURE 2
FILE ORGANIZATION METHODS- A SUMMARY
9
Objectives of Data Base
10
5. Accuracy and integrity: The accuracy of a database ensures
that data qualit y and content remain constant. Integrity
controls detect data inaccuracies where they occur.
2. The DBMS refers to the data model, which describes the view
in a language called the data definition language (DDL). The
DBMS uses DDL to determine how data must be structured to
produce the user’s view.
11
3. The DBMS requests the input/output control s ystem (IOCS) to
retrieve the information from physical storage as specified b y
the application program. The output is the sales report.
To summarize,
12
accessed, or related to other data in storage. Four views of data
exist: three logical and one physical. The logical views are the
user’s view, the programmer’s view and the overall logical view,
called a schema.
The schema is the view that helps the DBMS to decide what
data in storage it should act upon as requested by the application
program. An examle of a schema is the arrival and departure display
at an airport. Scheduled flights and flight numbers (schema) remain
the same, but the actual departure and arrival times may vary. The
user’s view might be a particular flight arriving or departing at a
scheduled time. How the flight actuall y takes off or lands is of little
concern to the user. The latter view is of subschema. It is a
programmer’s (pilot’s) view. Many subschemas can be derived from
one schema, just as different pilots visualize views of a landing
approach, although (it is hoped) arrive at the scheduled time
indicating on the CRT screen display (schema)
Data Structure
Types of Relationships
13
A one-to-one (1:1) relationship is an association between two
entities. For example, in our culture, a husband is allowed on wife
(at a time) and vice versa, and an employee has one social securit y
number.
Hierarchical Structuring
For example, a parent can have many children (1: M), whereas
a child can have onl y one parent. Elements at the ends of the
branches with no children are called leaves. Trees are normall y
drawn upside down, with the root at the top and the leaves at the
bottom.
14
a firm dealing in sale of spare parts being manufactured by more
than one company. Thus, we would have a non-hierarchical
structure, which complicates programming or the DBMS description.
The problem is resolved by using network structure.
Network structuring
Relationship Structuring
15
A relational DBMS has several features:
16
A key is a unique identifier of the entit y. In our example, the
key 11306801 is a unique identifier of Jim Arnold. Sex, age and
height are not identifiers, since they are not unique. They are non-
key identifiers.
Normalization
17
UNIT – V
LESSON NO. : 13
SOCIAL ASPECTS OF COMPUTERIZATION AND
COMPUTER VIRUSES
1
radio, information technology can be used to achieve social progress,
but it can also be used to commit crimes and threaten cherished social
values. The development of information technology will produce
benefits for many, and costs for others. When using information
s ystems, it is essential to ask, what is the ethical and sociall y
responsible course of action?
Social Issues
Ethical Issues
Information
Technology
and Systems
Individual
Society
System
Accountability Quality
and Control
Policy
Q UA L I TY FO R LI FE
Fig u re 1 T he r el at io ns hip b et wee n et h ica l, s o cia l, a nd p o li t ical is s ue s i n a n
in f o r ma tio n so ci et y. T h e i ntr o d uc tio n o f ne w i n fo r ma t io n te c h no lo g y ha s a r ip p le
ef f ec t, r a i si n g ne w et h i cal, so cia l, a nd p o li tic a l i s s ue s t hat mu s t b e d e alt wi t h o n
th e i nd i v id ua l, so c ia l, and p o li ti cal l e ve ls . T hese i s s ue s h a ve f iv e mo r al
d i me n sio n s: i n fo r ma tio n r i g h ts a nd o b li ga tio n s, p r o p er t y r i g ht s a nd o b li ga tio n s,
s ys te m q ual it y, q ua li t y o f li f e, a nd acco u n tab il i t y a nd co n tr o l.
2
A Model for Thinking About Ethical, Social, and Political Issues
3
■ Information rights and obligations: What information rights do
individuals and organizations possess with respect to information
about themselves? What can they protect? What obligations do
individuals and organizations have concerning this information?
4
Standards for ensuring the accuracy and reliabilit y of information
s ystems are not universall y accepted or enforced.
Advances in data anal ysis techniques for large pools of data are
a third technological trend that heightens ethical concerns, because
they enable companies to find out much detailed personal information
about individuals. With contemporary information s ystems technology,
companies can assemble and combine the m yriad pieces of information
stored on you by computers much more easil y than in the past. Think of
all the ways you generate computer information about yourself—credit
card purchases, telephone calls, magazine subscriptions, video rentals,
mail-order purchases, banking records, and local, state, and federal
government records (including court and police records). Put together
and mined properl y, this information could reveal not onl y your credit
information but also your driving habits, your tastes, your associations,
and your political interests.
5
Table 1
Trend Impact
Data anal ysis advances Companies can anal yze vast quantities of data
gathered on individuals to develop detailed
profiles of individual behavior
6
Last, advances in networking, including the Internet, promise to
reduce greatl y the costs of moving and accessing large quantities of
data, and open the possibilit y of mining large pools of data remotel y
using small desktop machines, permitting an invasion of privacy on a
scale and precision heretofore unimaginable.
7
understood and there is an abilit y to appeal to higher authorities to
ensure that the laws are applied correctl y.
COMPUTER VIRUSES
Many people use the term loosel y to cover any sort of program
that tries to hide its (malicious) function and tries to spread onto as
many computers as possible. Viruses are very dangerous. They are
spreading faster than they are being stopped, and even the least
harmful of viruses could be fatal. For example, a virus that stops a
computer and displays a message, in the context of a hospital life-
support computer, could be fatal. Even the creator of a virus cannot
stop it once it is "in the wild".
8
Type of Computer Viruses
Generall y, there are two t ypes of viruses. The first t ype consists
of the file infectors, which attach themselves to ordinary program files.
These usuall y infect arbitrary .COM and/or .EXE programs, though
some can infect any program for which execution is requested, such as
.SYS, .OVL, .PRG, & .MNU files. File infectors can be either direct
action or resident. A direct action virus selects one or more other
programs to infect each time the program that contains it is executed.
A resident virus hides itself somewhere in memory the first time an
infected program is executed, and thereafter infects other programs
when they are executed (as in the case of the Jerusalem 185 virus) or
when certain other conditions are fulfilled. The Vienna virus is an
example of a direct-action virus. Most other viruses are resident. The
second category is system or boot-record infectors: those viruses that
infect executable code found in certain s ystem areas on a disk, which
are not ordinary files. On DOS s ystems, there are ordinary boot-sector
viruses, which infect onl y the DOS boot sector, and MBR viruses
which infect the Master Boot Record on fixed disks and the DOS boot
sector on diskettes. Examples include Brain, Stoned, Empire, Azusa,
and Michelangelo. Such viruses are always resident viruses. Finall y, a
few viruses are able to infect both (the Tequila virus is one example).
These are often called "multi-partite" viruses, though there has been
criticism of this name; another name is "boot-and-file" virus.
Stealth virus
9
b y programs to read files or physical blocks from storage media, and
forging the results of such s ystem functions so that programs which try
to read these areas see the original uninfected form of the file instead
of the actual infected form. Thus the viral modifications go undetected
b y anti-viral programs. However, in order to do this, the virus must be
resident in memory when the anti-viral program is executed.
Polymorphic virus
10
Sparse infector
Companion virus
Armored virus
Macro virus
11
Virus hoax
This virus set a benchmark the world over when it was first
noticed on 26th March 1999. It was the fastest spreading virus. The
Melissa virus is an automatic spamming virus. Its action includes
infecting Microsoft Word's normal.dot global template, which basicall y
implies that all new documents created by the user would get infected.
After that, each time that an infected document is accessed the virus
will disable Microsoft Word's macro warning feature so that it is
allowed to be activated.
12
time of the day. What caused the maximum harm was that the volume
of traffic, due to the numerous e-mail attachments being sent, was more
than could be borne by most servers around the world.
ExploreZip
Chernobyl
The virus wipes the first megabyte of data from the hard disk of
a personal computer thus making the rest of the files of no use. In
addition to this it also deletes the data on the computer's Basic Input-
Output S ystem (BIOS) chip so that the computer cannot function till a
new chip is fitted or the data on the old one is restored. Fortunatel y
onl y those BlOSes, which can be changed or updated, face a threat
from this virus.
VBS_LOVELETTER
13
undergraduate. In May 2000, this deadl y virus beat the Melissa virus
hollow - it became the world's most prevalent virus. It struck one in
every five personal computers in the world. When the virus was
brought under check the true magnitude of the losses was
incomprehensible. Losses incurred during this virus attack were pegged
at US $ 10 billion, he original VBS_LOVELETTER utilized the
addresses in Microsoft Outlook and e-mailed tself to those addresses.
The e-mail which was sent out had "ILOVEYOU" in its subject line.
Pakistani Brain
The Brain, the first virus known to have spread all over the
world, was a boot sector virus. This implies that it would take the
s ystem commands, those that help in starting the computer, from their
designated space (sector) on the hard disk and put them in the next
unused space (sector). Then, it would mark the space where the s ystem
commands now reside as bad sectors. This way, it would become
impossible to boot (start) the computer. Moreover, it would continue to
14
take up all the unused space in the computer's disk and mark it as
corrupted sectors.
All the strains of the Brain virus carried the name of the
program, the author and often their address in the boot sector of the
virus-infected disk. The other known versions of this virus include
Ashar or Ashar-Shoe viruses, which are very common in Malaysia.
Stoned-Marijuana
Jerusalem
The Jerusalem virus a.k.a. "Israeli" and "Friday the 13th" has
several versions including the Jerusalem-B virus. It starts by infecting
the .COM and .EXE files in a computer. After existing or being
resident in a computer for half an hour, it slows down the s ystem
processes by a factor of ten. On a pre-set date, Friday the 13th, the
Jerusalem virus deletes all the infected files from the user's computer.
Apart from the damage that it does, the other strain of the Jerusalem
virus, Jerusalem-B, also shows a "black window" in the center of the
screen at regular intervals.
Cascade
15
machines with colour monitors. This virus is also called "Falling
Letters" or "1701". It initiall y appeared as a Trojan horse in the form
of a program designed to turn off the Num-Lock light on the user's
keyboard. In fact, what it actuall y did was to make the characters on
the screen drop in a heap to the bottom of the screen. What is special
about this virus is that it utilizes an encryption algorithm to evade
detection. Now, variants of this virus occur as a memory resident
.COM virus.
Michelangelo
This virus was entitled after the very famous Italian Renaissance
artist Michelangelo Buonarroti. It gets activated every year on the
artist's birthday - 6th March. The person responsible for giving the
name was the researcher not the writer of the virus.
16
UNIT – V
LESSON NO. : 14
The first recorded cyber crime took place in the year 1820 That
is not surprising considering the fact that the abacus, which is thought
to be the earliest form of a computer, has been around since 3500 B.C.
in India, Japan and China. The era of modern computers, however,
began with the anal ytical engine of Charles Babbage.
Email bombing
1
or mail servers (in case of a company or an email service provider)
crashing. In one case, a foreigner who had been residing in Shimla,
India for almost thirty years wanted to avail of a scheme introduced b y
the Shimla Housing Board to buy land at lower rates. When he made an
application it was rejected on the grounds that the 169 schemes was
available onl y for citizens of India. He decided to take his revenge.
Consequentl y he sent thousands of mails to the Shimla Housing Board
and repeatedl y kept sending e-mails till their servers crashed.
Data diddling
Salami attacks
2
name of Ziegler. The amount being withdrawn from each of the
accounts in the bank was so insignificant that neither any of the
account holders nor the bank officials noticed the fault.
In May 2000, this deadl y virus beat the Melissa virus hollow and
it became the world's most prevalent virus. It struck one in every five
3
personal computers in the world. When the virus was brought under
check the true magnitude of the losses was incomprehensible. Losses
incurred during this virus attack were pegged at US $ 10 billion.
Since the initial outbreak over thirt y variants of the virus have
been developed many of them following the original by just a few
weeks. In addition, the Love Bug also uses the Internet Relay Chat
(IRC) for its propagation. It e-mails itself to users in the same channel
as the infected user. Unlike the Melissa virus this virus does have a
destructive effect. Whereas the Melissa, once installed, merel y inserts
some text into the affected documents at a particular instant during the
day, VBS_LOVELETTER first selects certain files and then inserts its
own code in lieu of the original data contained in the file. This way it
creates ever-increasing versions of itself. Probabl y the world's most
famous worm was the Internet worm let loose on the Internet by Robert
Morris sometime in 1988. The Internet was, then, still in its developing
years and this worm, which affected thousands of computers, almost
brought its development to a complete halt. It took a team of experts
almost three days to get rid of the worm and in the meantime many of
the computers had to be disconnected from the network.
Logic bombs
4
be termed logic bombs because they lie dormant all through the year
and become active onl y on a particular date (like the Chernobyl virus).
Trojan attacks
5
carried a report about the inadequacy of the New Delhi Police in
handling cyber crimes. The Commissioner of Police, Delhi then took
the case into his own hands and the police under his directions raided
and arrested the net cafe owner under the charge of theft as defined b y
the Indian Penal Code. The net cafe owner spent several weeks locked
up in Tihar jail before being granted bail.
Web jacking
6
Physically damaging a computer system
1. Email spoofing
3. Email bombing
5. Defamatory emails
6. Email frauds
Email spoofing
ii. email address(es) of the person(s) who will receive a copy of the
email (referred to as CC for carbon copy)
iii. email address(es) of the person(s) who will receive a copy of the
email (referred to as CC for carbon copy, but whose identities
7
will not be known to the other recipients of the e-mail (known as
BCC for blind carbon copy)
v. Message
Message
8
such an email (if they are using a registered copy of the McAffee anti-
virus software) and would download the attachment, which actuall y
could be a Trojan or a virus itself.
Email bombing
Threatening emails
9
In a recent case, Poorva received an e-mail message from
someone who called him or herself 'your friend'. The attachment with
the e-mail contained morphed pornographic photographs of Poorva.
The mail message said that if Poorva were not to pay Rs. 10,000 at a
specified place every month, the photographs would be uploaded to the
Net and then a copy sent to her fiance. Scared, Poorva at first complied
with the wishes of the blackmailer and paid the first Rs. 10, 000. Next
month, she knew she would have to approach her parents. Then,
trusting the reasonableness of her fiance she told him the truth.
Together they approached the police. Investigation turned up the
culprit - Poorva's supposed friend who wanted that Poorva and her
fiance should break up so that she would get her chance with him.
Defamatory emails
Email Frauds
10
a website in the name of the Euro Lottery Company, announced n it
that he had won the Euro Lottery and uploaded it on to the Internet. He
then approached the Income Tax authorities in India and procured a
clearance certificate from them for receiving the lottery amount. In
order to let people know about the lottery, he approached man y
newspapers and magazines.
Computer's Vulnerability
11
difficult, but walking out of a secure location with a CD ROM
containing a lakh of pages would be much simpler.
Ease of access
Complexity
Human error
People who guard confidential papers with their lives would not
think twice about using simple passwords. Most people don't realize
the securit y implications and ramifications of a simple 'guessable'
password.
12
Information Rights'. Privacy and Freedom in the Internet Age
13
and the record keeper—usuall y a business or government agency—
requires information
14
(i) Enumerated in List II of the Seventh Schedule to the
Constitution;
(ii) relating to any State law enacted under List III of the
Seventh Schedule to the Constitution, the State
Government and in any other case, the Central
Government;
(f) "as ymmetric crypto s ystem" means a s ys tem of a secure key pair
consisting of a private key for creating a digital signature and a
public key to verify the digital signature;
(g) "Certifying Authority" means a person who has been granted a
licence to issue a Digital Signature Certificate under section 24;
(h) "certification practice statement" means a statement issued by a
Certifying Authorit y to specify the practices that the Certifying
Authorit y employs in issuing Digital Signature Certificates;
(i) "computer" means any electronic magnetic, optical or other high-
speed data processing device or s ystem which performs logical,
arithmetic, and memory functions by manipulations of electronic,
magnetic or optical impulses, and includes all input, output,
processing, storage, computer software, or communication
facilities which are connected or related to the computer in a
computer s ystem or computer network; S EC I]
(j) "computer network" means the interconnection of one or more
computers through—
(i) the use of satellite, microwave, terrestrial line or other
communication media; and
(ii) terminals or a complex consisting of two or more
interconnected computers whether or not the
interconnection is continuousl y maintained;
(k) "computer resource" means computer, computer s ystem,
computer network, data,computer data base or software;
(I) "computer s ystem" means a device or collection of devices,
including input and output support devices and excluding
calculators which are not programmable and capable of being
15
used in conjunction with external files, which contain computer
programmes, electronic instructions, input data and output data,
that performs logic, arithmetic, data storage and retrieval,
communication control and other functions;
(m) "Controller" means the Controller of Certifying Authorities
appointed under sub-section (1) of section 17;
(n) "C yber Appellate Tribunal" means the C yber Regulations
Appellate Tribunal established under sub-section (1) of section
48;
(o) "data" means a representation of information, knowledge, facts,
concepts or instructions which are being prepared or have been
prepared in a formalised manner, and is intended to be
processed, is being processed or has been processed in a
computer s ystem or computer network, and may be in any form
(including computer printouts magnetic or optical storage media,
punched cards, punched tapes) or stored internall y in the memory
of the computer;
(p) "digital signature" means authentication of any electronic record
by a subscriber by means of an electronic method or procedure in
accordance with the provisions of section 3;
(q) "Digital Signature Certificate" means a Digital Signature
Certificate issued under subsection (4) of section 35;
(r) "electronic form" with reference to information means an y
information generated, sent, received or stored in media,
magnetic, optical, computer memory, micro film, computer
generated micro fiche or similar device;
(s) "Electronic Gazette" means the Official Gazette published in the
electronic form;
(t) "electronic record" means data, record or data generated, image
or sound stored, received or sent in an electronic form or micro
film or computer generated micro fiche;
16
(u) "function", in relation to a computer, includes logic, control
arithmetical process, deletion, storage and retrieval and
communication or telecommunication from or within a computer;
(v) "information" includes data, text, images, sound, voice, codes,
computer programmes, software and databases or micro film or
computer generated micro fiche:
(w) "intermediary" with respect to any particular electronic message
means any person who on behalf of another person receives,
stores or transmits that message or provides any service with
respect to that message;
(x) "key pair", in an as ymmetric crypto s ystem, means a private key
and its mathematicall y related public key, which are so related
that the public key can verify a digital signature created by the
private key;
(y) "law" includes any Act of Parliament or of a State Legislature,
Ordinances promulgated by the President or a Governor, as the
case may be. Regulations made by the President under article
240, Bills enacted as President's Act under sub-clause (a) of
clause (1) of article 357 of the Constitution and includes rules,
regulations, bye-laws and orders issued or made thereunder;
(z) "licence" means a licence granted to a Certifying Authorit y
under section 24;
(za) "originator" means a person who sends, generates, stores or
transmits any electronic message or causes any electronic
message to be sent, generated, stored or transmitted to any other
person but does not include an intermediary;
(zb) "prescribed" means prescribed by rules made under this Act;
(zc) "private key" means the key of a key pair used to create a digital
signature;
(zd) “public key" means the key of a key pair used to verify a digital
signature and listed in the Digital Signature Certificate;
(ze) "secure s ystem" means computer hardware, software, and
procedure that—
17
(a) are reasonabl y secure from unauthorised access and misuse;
(b) provide a reasonable level of reliabilit y and correct operation;
(c) are reasonabl y suited to performing the intended functions; and
(d) adhere to generall y accepted securit y procedures;
(zf) "securit y procedure" means the security procedure prescribed
under section 16 by the Central Government;
(zg) "subscriber" means a person in whose name the Digital Signature
Certificate is issued;
(zh) "verify" in relation to a digital signature, electronic record or
public key, with its grammatical variations and cognate
expressions means to determine whether—
(a) the initial electronic record was affixed with the digital
signature by the use of private key corresponding to the
public key of the subscriber;
(b) the initial electronic record is retained intact or has been
altered since such electronic record was so affixed with
the digital signature.
SELF ASSESSMENT QUESTIONS
1. Write notes on
a) C yber Crimes
b) Salient features of IT Act, 2000.
18