MIS (5)
MIS (5)
Information System
CHAPTER ONE
INTRODUCTION TO MIS
Chapter objectives
After completing this chapter, students will be able to:
Explain the importance of MIS
Describe the evolution & characteristics of the information age
Define IT & career side of information technology
Management: Management is the art of getting things done through and with the people in
formally organized groups. The basic functions performed by a manager in an organization
are: Planning, Organizing, Staffing, Directing, and Controlling.
Information: Information is considered as valuable component of an organization.
Information is data that is processed and is presented in a form which assists decision maker.
1
Figure 1.1 Information Generation
System: A system is defined as a set of elements which are joined together to achieve a
common objective. The elements are interrelated and interdependent. Thus, every system is
said to be composed of subsystems. A system has one or multiple inputs, these inputs are
processed through a transformation process to convert these input(s) to output.
In other words, MIS can be defined as is a planned system of collecting, storing and
disseminating data in the form of information needed to carry out the functions of
management.
MIS is an organized method of providing past, present and projection information relating to
internal operations and externals intelligence. It supports the planning, control and
operational functions of an organization by furnishing uniform information in proper time
frame to help the process of decision-making.
2
must be obtained, processed, stored, manipulated and analyzed, distributed etc. An
organization with a well-defined information system will generally have a competitive
advantage over organization with poor MIS and no MIS.
Importance of MIS
Although there are very many reasons and importance for MIS to be practiced in
organizations, some of the major importance for MIS are mentioned below:
It Minimizes Information Overload: MIS change the larger amount of data into
summarized form and thereby avoids the confusion which may arise when
information officer are flooded with detailed facts.
MIS Encourages Decentralization: Decentralization of authority is possible when
there is a system for monitoring operations at lower levels. MIS is successfully used
for measuring performance and making necessary change in the organization plans
and procedures.
It Brings Co-ordination: MIS facilities integration of specialized activities by keeping
an organization aware of the problem and requirements of various kind of work. It
connects all decision centers in the organization.
It Makes Control Easier: MIS serves as a link between planning and control by a
system manager in an organization. It improves the ability of management system of
an organization to evaluate and improve performance. The used computers has
increased the data processing and storage capabilities and reduced the cost.
It Helps in Decision-Making: MIS is a decision support tool which stores, processes,
and provides valid information for the decision-makers at right time. It also helps
managers to evaluate the success of their decision.
Check point
1. Define MIS
_____________________________________________________________________
_____________________________________________________________________
_______________________________________________________
2. List at least three importance of MIS
_____________________________________________________________________
_____________________________________________________________________
3
_____________________________________________________________________
________
Check point
4
_____________________________________________________________________
____________
5
C. Software Resources: The concept of software resources includes all sets of
information processing instructions. This generic concept of software includes not
only the sets of operating instructions called programs, which direct and control
computer hardware, but also the sets of information processing instructions called
procedures that people need. The following are examples of software resources:
i. System Software: Such as operating system program, which controls and
supports the operations of a computer system.
ii. Application Software: are programs that direct processing for a particular
use of computers by end users. Examples are a sales analysis program, a
payroll program, and a word processing program.
iii. Procedures: are operating instructions for the people who will use an
information system. Examples are instructions for filling out a paper form or
using a software package.
D. Data Resources: Data is unorganized and raw material in an information system.
Data has been taken in any form like numerical, alphabetical or in any other form, but
the collection of data should be proper and meaningful. All the data organized and
stored as well as accessed properly by the users. Data are the lifeblood of today's
organizations and the effective and efficient management of data is considered an
integral part of organizational strategy.
Data versus Information: the word data is the plural form of datum, though data commonly
represents both singular and plural forms. Data are raw facts or observations, typically about
physical phenomena or business transactions. More specifically, data are objective
measurements of the attributes (the characteristics) of entities (such as people, places, things,
and events).
People often use the terms data and information interchangeably. However, it is better to
view data as raw material resources that are processed into finished information products.
Then, we can define information as data have been converted into meaningful and useful
context for specific end users. Thus, data are usually subjected to a value-added process (data
processing or information processing) where (1) its form is aggregated, manipulated, and
organized; (2) its content is analyzed and evaluated; and (3) it is placed in a proper context
for a human user.
E. Networking Resources: Telecommunications technologies and networks like the
Internet, intranets and extranets are essential to the successful electronic business and
commerce operations of all types of organizations and their computer-based
6
information systems. Telecommunications networks consist of computers,
communications processors, and other devices interconnected by communications
media and controlled by communications software. The concept of network
resources emphasizes that communications technologies and networks are a
fundamental resource component of all information systems. Network resources
include:
i. Communications Media: Examples include twisted-pair wire, coaxial and
fiber-optic cables; and microwave, cellular, and satellite wireless
technologies.
ii. Network Infrastructure: This generic category emphasizes that many
hardware, software, and data technologies are needed to support the
operation and use of a communications network. Examples, include
communications processors such as modems and internetwork processors,
and communications control software such as network operating systems
and Internet browser packages.
Check point
1. Dear learner, list out and briefly explain the resources that are needed in MIS.
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
-------------
2. What is the difference between data and information?
___________________________________________________________________________
___________________________________________________________________________
______
7
The technical approach to information systems emphasizes mathematically based models to
study information systems, as well as the physical technology and formal capabilities of these
systems. The disciplines that contribute to the technical approach are computer science,
management science, and operations research.
Check point
What are the main contemporary approaches in MIS? Briefly explain them.
8
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------
With organizations and their developments came the effective management and its benefits.
Team-works and participative management received more popularity. Information started to
earn importance as competition and cooperation increased.
Late 20th Century saw rapid growth in information and communication technology.
Computers went from being locked away mainframes to personal desktop machines available
to all. Computers (and their users) went from isolation to being able to communicate with one
another. If knowledge is power, now we are all empowered. Significance and dignity of the
individual are restored.
Characteristics of Information Age are many, but the most dominant are:
- Many smaller businesses offering self-employment. On the other side, increased
globalization calls for big infrastructure for efficiency.
- Control of the organization system got efficient, improved hierarchy, and better
participation.
- Large corporations regained effectiveness through proper management of
Information.
- Moved from centralization to decentralization but keeping all strengths of
centralization.
- Effective communication, effective delegation of work, effective management of
projects.
- Global markets and dynamic nature of business at fast changing information age.
9
Check point
Dear learners, How much did you know about the evolution as well as the characteristics of
the information age? Briefly explain your answer.
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------
Information technology is one of many tools managers use to cope with change. Computer
hardware is the physical equipment used for input, processing, and output activities in an
information system. It consists of the following: the computer processing unit; various input,
output, and storage devices; and physical media to link these devices together.
10
people with postgraduate degrees in computer science and related fields. A further business
administration degree can lead to jobs in more decision-making capacities.
Check point
Dear learner, define information technology and list out its career opportunities.
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------
Chapter summary
Management Information System is a sub-system of organization that gives the people in-
charge of organization by providing right information that they need to take decisions at right
time. Management information systems are not only computer systems - these systems
encompass three primary components: technology, people (individuals, groups, or
organizations), and data/information for decision making. MIS is mainly important in that it
minimizes information overload, encourages decentralization, brings co-ordination among
organizational members, makes control easier and help managers in their decision making
task.
There are five main resources that we need in MIS namely people, hardware, software, data
and networking resources.
The technical approach, the behavioural approach and the socio-technical approaches are the
three contemporary approaches in MIS.
Information Technology (IT) is the branch of engineering that deals with the use of
computers and telecommunications to retrieve, store and transmit information. It is one of
many tools managers use to cope with change. Some of the careers in Information
Technology include Software engineers, Software developers, Programmers, Systems
engineers, Information Technology consultants, Information Technology managers
11
CHAPTER TWO
Dear student, how can you define management? Take a moment and write your answer
briefly.
__________________________________________________________________________
__________________________________________________________________________
_____________________________________________________________________
12
b) “To manage is to forecast, to plan, to organize, to command, coordinate and control”
~ Henry Fayol (Father of Principles of Management).
c) “Management is knowing exactly what you want to do and then seeing that they do it
in the best and cheapest way.” ~ Frederick Winslow Taylor (Father or Scientific
Management).
d) “Management is a multipurpose organ that manages a business, manages managers
and manages worker and work.” ~ Peter Drucker.
Management is a vital aspect of the economic life of human being, which is an organized
group activity. A central directing and controlling agency is indispensable for a business
concern. The productive resources – material, labor, capital etc. are entrusted to the
organizing skill, administrative ability and enterprising initiative of the management. Thus,
management provides leadership to a business enterprise.
P– Planning: Deciding what needs to happen in the future (today, next week, next
month, next year, over the next five years, etc.) and generating plans for action.
O– Organizing: Arranging necessary resources for the work to be done, pattern of
relationships among resources, making optimum use of the resources required to enable
the successful carrying out of plans.
S– Staffing: Assessing manpower requirements, recruiting and hiring for the available
job positions.
D– Directing: Determining what needs to be done in a situation and getting people to do
it.
Co– Coordinating: Checking progress against plans and linking the courses to a
common goal.
R– Reporting: Give a spoken or written account of something that one has observed,
heard, done, or investigated.
B– Budgeting: To provide a forecast of revenues and expenditure to be met by the
organization within a specific future.
Organizations differ considerably in their activities. However, their strategies and the way in
which they seek to add value we can identify some functions which they usually have in
13
common. There may be many functions for an organization, like Production/Operations,
Marketing, Finance, Human Resource Management, Logistics, Information Technology &
Communications, etc. Some of the most common business functions in Organizations are
explained below:
A. Operations: This involves the actual production and delivery of the product or
service. In the primary sector this may mean growing the product (e.g. farming) or
extracting it (e.g. oil); in the secondary sector this involves activities such as
assembly, manufacture and construction and in the tertiary sector this involves
providing a service such as tourism, education and insurance. Operational decisions
include deciding where to produce, how to produce (e.g. what combination of
resources to use and how much to produce yourself compared to how much to buy in),
what volume and range of products to produce and what quality and cost targets to
achieve. It also involves research and development into new products and processes.
C. Finance: Organizations need to raise finance to get started and to invest into new
projects. For example, a company may raise finance by selling shares to investors or
by taking out a loan. The former involves a loss of control as the number of owners is
increased. The latter will incur interest charges as the loan will have to be repaid.
Firms also need to set financial targets and allocate money within the business; this is
known as budgeting. Budgets will be set for a given period in the future and then
compared with the actual outcomes to examine why differences occurred; this is
14
known as variance analysis. Organizations will also produce financial reports to their
investors such as balance sheets (which show what a firm owns and owes on a given
day) and the profit and loss account (which shows the revenues and profit of a
company over the last year or operation period).
Check point
The DIKW Pyramid, also known variously as the "DIKW Hierarchy", "Wisdom Hierarchy",
the "Knowledge Hierarchy", the "Information Hierarchy", and the "Knowledge Pyramid",
refers loosely to a class of models for representing purported structural and/or functional
relationships between data, information, knowledge, and wisdom.
The presentation of the relationships among data, information, knowledge, and sometimes
wisdom in a hierarchical arrangement has been part of the language of information science
15
for many years. Although it is uncertain when and by whom those relationships were first
presented, the ubiquity of the notion of a hierarchy is embedded in the use of the acronym
DIKW as a shorthand representation for the data-to-information-to-knowledge-to-wisdom
transformation.
Data: is conceived as symbols or signs, representing stimuli or signals, that are of no use
until...in a usable (that is, relevant) form. Data consists of representations of events, people,
resources, or conditions. The representations can be in a variety of forms, such as numbers,
codes, text, graphs, or pictures.
Information: is useful facts extracted from data which is used for decision-making.
Information is contained in descriptions, and is differentiated from data in that it is "useful".
Information is defined as data that are endowed with meaning and purpose. Information is a
result of processing data. It provides the recipient with some understanding, insight,
conclusion, decision, confirmation, or recommendation. The information may be a report, an
analysis, data organized in a meaningful output, a verbal response, a graph, picture, or video.
Wisdom: is the ability to increase effectiveness. Wisdom adds value, which requires the
mental function that we call judgment. The ethical and aesthetic values that this implies are
inherent to the actor and are unique and personal. We can say that wisdom is the practical
application of knowledge into problem-solving. In other words, knowledge is information
organized and processed to convey understanding, experience, accumulated learning, and
expertise. It provides the basis for action. Knowledge may be procedural (how to do
something), formal (general principles, concepts, and procedures), tacit (expertise from
experience that is somewhat hidden), and Meta knowledge (knowledge about where
knowledge is to be found).
16
Figure 2.1 DIKW Pyramid
Characteristics of Information:
17
The parameters of a good quality are difficult to determine for information. Quality of
information refers to its fitness for use, or its reliability. Following are the essential
characteristic features of information:
I) Timeliness: Timeliness means that information must reach the recipients within the
prescribed timeframes. For effective decision-making, information must reach the decision-
maker at the right time, i.e. recipients must get information when they need it. Delays destroy
the value of information. The characteristic of timeliness, to be effective, should also include
up-to-date, i.e. current information.
II) Accuracy: Information should be accurate. It means that information should be free from
mistakes, errors &, it should be clear. Accuracy also means that the information is free from
bias. Wrong information given to management would result in wrong decisions. As
managers’ decisions are based on the information supplied in MIS reports, all managers need
accurate information.
III) Relevance: Information is said to be relevant if it answers especially for the recipient
what, why, where, when, who and why? In other words, the MIS should serve reports to
managers which are useful and the information helps them to make decisions.
IV) Adequacy: Adequacy means information must be sufficient in quantity, i.e. MIS must
provide reports containing information which is required in the processes of decision-making.
The report should not give inadequate or for that matter, more than adequate information,
which may create a difficult situation for the decision-maker. Whereas inadequacy of
information leads to crises, information overload results in chaos.
V) Completeness: The information which is given to a manager must be complete and
should meet all his/her needs. Incomplete information may result in wrong decisions and thus
may prove costly to the organization.
VI) Explicitness: A report is said to be of good quality if it does not require further analysis
by the recipients for decision making.
VII) Impartiality: Impartial information contains no bias and has been collected without any
distorted view of the situation.
Check point
18
2. Briefly explain the steps to reach the stage of wisdom.
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
__________
3. What are the essential characteristic features of information?
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
_________
A. Planning: To plan properly, a business needs to know what resources it has (e.g.
cash, people, machinery and equipment, property, customers). It also needs
information about the markets in which it operates and the actions of competitors. At
the planning stage, information is important as a key ingredient in decision-making.
Hence, information regarding external environment and internal environment are
essential at planning stage.
B. Executing: Executing is the stage where the plans are being implemented at
organizations. Even during the phase of execution, managers require information
about the operational environment to make sure that the process of implementation is
taking place in the right path. Moreover, information is essential at this stage to assess
the effects of execution.
19
I. Strategic information: used to help plan the objectives of the business as a
whole and to measure how well those objectives are being achieved.
II. Tactical Information: this is used to decide how the resources of the business
should be employed.
III. Operational Information: this information is used to make sure that specific
operational tasks are carried out as planned/intended (i.e., things are done
properly).
When it comes to the sources of information, we can broadly classify various sources of
information into Primary Sources and Secondary Sources. Although, neither of them is
superior to each other, depending on decision-making situations importance varies on them.
A. Primary Sources: are the original materials that the decision-maker has gathered
specifically for the purpose of solving the particular problem. This includes
information collected through surveys, observations, questionnaires, experiments,
opinion polls, etc.
B. Secondary Sources: are that information gathered by the decision-maker from
already existing sources. They are not specifically gathered for his existing problem,
but reused by the decision-maker from other sources such as magazines, newspapers,
reports, archives, databases, etc.
Check point
20
specific area of the business. Business systems help organizations function on a daily basis
and in the long term. Some of the most common Business Systems are as below:
A. Decision Support System (DSS): Also known as executive support systems, this
type of business system enables higher management and executives to make long-
term strategic decisions on the direction of the business. This type of system is
flexible as it is not required for the daily operation of the business and only applies to
particular situations. It collects, analyzes and sums up key internal and external data
that is then used in the business by senior executives when developing their strategic
plans.
e-Business or Electronic Business is a term used to describe businesses run on the Internet,
or utilizing Internet technologies to improve the productivity or profitability of a business. In
a more general sense, the term may be used to describe any form of electronic business - that
21
is to say, any business which utilizes a computer. This usage is somewhat archaic, however,
and in most contexts e-business refers exclusively to Internet businesses.
In addition to buying and selling products, e-business may also handle other traditional
business aspects. The use of electronic chat as a form of technical and customer support is an
excellent example of this. An e-business which uses chat to supplement its traditional phone
support finds a system which saves incredible amounts of time while providing opportunities
unavailable through traditional support. By using virtual computer systems, for example,
technical support operators can remotely access a customer's computer and assist them in
correcting a problem. And with the download of a small program, all pertinent information
about the hardware and software specifications for a user's computer may be relayed to the
support operator directly, without having to walk a customer through personally collecting
the data.
Using e-mail and private websites as a method for dispensing internal memos and white
sheets is another use of the Internet by e-business. Rather than producing time-intensive and
costly physical copies for each employee, a central server or e-mail list can serve as an
efficient method for distributing necessary information.
In the past few years, virtually all businesses have become, to some degree or another, an e-
business. The pervasiveness of Internet technology, readily available solutions, and the
repeatedly demonstrated benefits of electronic technology have made e-business the obvious
path. This trend continues with new technologies, such as Internet-enabled cell phones and
22
Personal Digital Assistant (PDA), and the trend of e-business saturation will most likely
continue for some time.
Check point
23
Chapter summary
Management is the process of getting a work done effectively by using limited resources. In
another word it employs the functions of planning, organizing, staffing, directing, co-
coordinating, reporting and budgeting function in order to achieve group and organizational
goals.
Operations, Finance, Marketing and Human Resource Management (HRM) are the most
common business functions in Organizations. DIKW is a pyramid composed of four
variables namely Data, Information, and Knowledge and at the top of the pyramid there is
Wisdom. The DIKW pyramid shows how the raw data will become precious wisdom.
In order to be quality information any information must fulfil timeliness, accuracy, relevance,
completeness, explicitness, and impartiality characteristics. Organizations and managers need
information for their planning, executing, reporting, resource appraisal and decision making
tasks. Moreover they can get such kind of information either from the primary or secondary
sources.
A business system, also known as a business information system, is a structure put in place
within an organization with the purpose of improving effectiveness and efficiency. There are
many kinds of business systems within an organization, but the most common Business
Systems are Decision Support System (DSS), Management Information System (MIS),
Knowledge Management System (KMS) and Transaction Processing System (TPS). DSS is
mainly used by top management bodies to make strategic and long term decisions whereas
the MIS is mainly utilized in the middle and lower levels of management. On the other hand
KMS is mainly used in organizations in which employees create new knowledge and
expertise that will be shared by their colleagues. The fourth business system, TPS is used to
facilitate and process the day to day routine transaction of the business. An Electronic
24
Business or e-Business is a term used to describe businesses run on the Internet, or utilizing
Internet technologies to improve the productivity or profitability of a business. In a more
general sense, the term may be used to describe any form of electronic business - that is to
say, any business which utilizes a computer. However, and in most contexts e-business refers
exclusively to Internet businesses. By selling products and services online, an e-business is
able to reach a much wider consumer base than any traditional brick-and-mortar store could
ever hope for. This function of e-business is referred to as e-commerce, and the terms are
occasionally used interchangeably.
CHAPTER THREE
INFORMATION TECHNOLOGY
Chapter objectives
Dear learners, define Information Technology (IT) before you look at the definition given below.
________________________________________________________________
____________________________________________________________
3.1 Introduction
Information Technology (IT) is the branch of engineering that deals with the use of computer and
telecommunication to handle data, information, and processes. IT plays a vital role in the lives of
people. Every field of human activity, may it be his/her daily life, official life, everything is now
influenced under the cover of information technology. Business process under the IT revolution which
is transforming the way we do the business. Basic business operations like decision making, customer
service, marketing strategies, human resource management, etc are being reformed with the use of
information technology.
Information technology can be defined in various ways, but is broadly considered to encompass the
use of computers and telecommunications equipment to store, retrieve, transmit and manipulate data.
In a business context, the Information Technology Association of America has defined information
technology (IT) as "the study, design, development, application, implementation, support or
management of computer-based information systems."
25
Businesses use IT in four ways. These are to support:
1. Information-processing tasks,
2. Decision-making tasks,
3. Shared information through decentralized computing, and
4. Innovation.
First and foremost, businesses are using IT to support basic information-processing tasks. These tasks
range from computing and printing payroll checks, to creating presentations, to setting up web sites
from which customers can order products. The following are the 5 C's of information-processing
tasks:
26
CD-ROM
DVD
Communicating information Sending information Telecommunications
to other people or technologies:
another location Modem
Satellite
Digital pager
When businesses use IT to process information such as payroll or sales order, we refer to it as online
transaction processing. Online Transaction Processing (OLTP) involves gathering input
information, processing that information, and updating existing information to reflect the gathered
processed information. Businesses also use IT to support decision-making tasks, what we call online
analytical processing. Online Analytical Processing (OLAP) is the manipulation of information to
support decision making.
OLAP can range from performing simple queries on a database to determine which customers have
overdue accounts to employing sophisticated artificial intelligence tools such as neural networks and
genetic algorithms to solve a complex problem or take advantage of an opportunity. So, we say that
OLTP supports efficiency (doing things the right way-the cheapest, the fastest, and so on) while
OLAP supports effectiveness (doing the right things or making the right decisions).
4. Supporting Innovation
IT tools not only support information-processing tasks, decision-making tasks, and shared information
through decentralized computing, they also enable innovation. Consider FedEx-the first package
freight company to offer package of delivery software that its customers can use to electronically
request package pickup and check the status of packages during delivery. All the other major package
27
delivery services were forced to quickly develop similar software or risk losing their customer base to
a company that provided a more innovative and efficient way to handle information– processing tasks
related to delivering packages.
Information Technology is made up of nine (9) major functions, namely; Capture, Verifying,
Processing/Manipulation, Storage, Retrieval, Data Update, Reproducing, Transmit /Communication,
and Generation.
Capture: The process of compiling detailed records of activities. This could be by recording
of data from an event or occurrence, in some form such as sales slips, personnel forms,
purchase orders, meters, course registration forms, etc.
Verifying: Is the operation for checking or validating of data to ensure it was captured and
recorded correctly.
Classifying: Is the operation for placing data elements into specific categories such as size,
type, customer, etc.
Calculating: This entails the arithmetic and/or logical manipulation of data e.g. computations
to derive employee’s pay, customer’s bills etc.
Summarizing: Reducing data in logical sense. For example the school principal may only be
interested in the total amount of the development levies collected out of the total school fees.
Storage: This entails placing data onto some storage media such as magnetic disk, etc where
it can be retrieved when needed.
Retrieval: This entails searching out and gaining access to specific data elements from the
medium where it was stored for further processing or for transmission to another user.
28
Transmission/Communication: The computer process of distributing information over a
communications network. This entails transfer of data from one place to another example data
can be transferred from a device to a user in form of a report or a display on the screen of a
computer controlled terminal.
Generation: The process of organizing information into a useful form, whether as numbers,
text, sound, or visual image
Information technology is all around us, improving our lives especially in areas such as:
• Media
– Print (Newspaper, Magazines, Posters and Billboard).
– Electronic (Television, Radio and Internet).
29
• Education, training, entertainment, shipping, paperwork, money and investments,
agriculture, taxation and accounting, health and medicine, manufacturing, journalism,
energy, and sports.
Computer: An electronic system that can be instructed to accept data as an input, process it
and gives a result as an output, and in turn stores the data for retrieval in the long run is a
computer. Computer is an electronic device operating under the control of instructions stored
in its memory. That is, a computer is a device that:
Computer System: The computer system is made up of two component parts (Hardware and
Software). These components integrate and interrelate. They do this independently by
interacting together to perform the basic operations of the computer system. A system is a set
of components that interact to accomplish a purpose.
Single-User System (Personal Computer): An IT system used by only one person.
A system that stands alone and is not interconnected with other companies or shared
by other people.
Multi-user System: A communication system in which more than one user share
hardware, programs, information, people, and procedures.
To share a computer
To share hardware
To share software
To share information
To share communications
Check point?
1. Define IT
___________________________________________________________________________
__________________________________________________________________________
30
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
_________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________
Well!
The hardware component is the physical component of a computer system, i.e., those parts of
the computer that can be touched, felt and seen physically. More or less, the hardware
component consists of a combination of different devices which play specific roles in the
operation of the computer system. A computer has 5 basic hardware components: the input
devices, output devices, primary storage, the mother board, and secondary storage.
a) Input devices: accept data from outside the computer and convert it into an electronic
form that the computer can understand. The data that it accepts is input data. For
example, to compute employee payment in a business, the input data would include the
employees’ names, pay rates, and hours worked. Common input devices are Keyboard,
Mouse, Scanner, Camera, Touch Screen, etc.
31
Figure 3.2 The Input Device
b) Output devices: perform the opposite of input devices. They convert data from
electronic form inside the computer to a form that can be used outside the computer. This
converted data is the output data or information. For example, the output from payroll
computation would include pay cheques, with employees’ names and pay. An output
device would produce this data in a form understandable to the user. Common output
devices are screens, monitors, printers, etc. Most computers have several input and
output devices attached at one time. For example, a multiple user computer may have
many keyboards & screens as well as several printers. A PC usually has two input
devices (a keyboard & a mouse) and two output devices (a screen & a printer).
32
Figure 3.3 The Output Device
c) Primary Storage: also called internal storage, is the “memory” of the computer. Primary
Storage/Primary Memory/Main Memory/Internal Memory: Storage within the computer
itself. Primary memory holds data only temporarily, as the computer executes instructions.
Primary or main memory is always connected to the processor. In a computer it is usually in
the same box as the processor. When you type instructions on the keyboard of your computer,
they are put into the main memory. There are two parts of the main memory:
o Random Access Memory (RAM).
o Read Only Memory (ROM), and
Random-Access Memory (RAM): Memory that permits data or information to be
written into or read from memory only as long as the computer is turned on. It is the
memory used to store instructions and data needed by the Central Processing Unit
(CPU).
Read-Only Memory (ROM): A type of storage that offers random access to memory
and can hold data and information after the electric current to the computer has been
turned off.
33
An input device converts input data into electronic form and sends the data to the primary
storage, where the data is stored. It is a volatile storage, i.e., when if the power to the
computer is turned off, all data in the primary storage will be lost. Example, RAM (random
access memory).
d) The motherboard: The motherboard is the main component inside the computer. It is a large
rectangular board with integrated circuitry that connects the other parts of the computer including the
CPU, the RAM, the disk drives (CD, DVD, hard disk, or any others) as well as any peripherals
connected via the ports or the expansion slots.
The Central Processing Unit (CPU): the CPU, also called the processor, carries instructions in the
program. The CPU or processor is the computer hardware that executes program instructions and
performs the computer’s processing actions. The CPU is known to be the brain and the computational
unit of the System Unit (SU). It performs the following major functions:
– Coordinating the activities of all units or devices associated with the computer system.
– Accepting and executing instructions to cause the computer system unit to perform
tasks.
It contains electronic circuits that perform arithmetic (e.g., hrs*pay rate) and logical
operations (e.g., how much income tax each employee should pay). Data is brought from the
primary storage to the CPU, where it is processed by these circuits, and the results of
processing are sent back to the primary storage. The CPU also contains electronic circuits
that that control the other parts of the computer. These circuits perform their functions by
following the instructions in the program, which the computer stores in the primary storage.
34
Figure 3.4 The Motherboard
e) Secondary storage: also called auxiliary storage, which stores data not currently being
processed by the computer and programs not currently being performed. Its function differs
from that of the primary storage, which stores the data and instructions that are currently
processed by the computer. For example, if the computer is currently doing payroll
processing, it stores the employee data and the payroll computation program in the primary
storage. The computer stores other data and programs that are not currently being used in the
secondary storage and brings them into the primary storage when needed. Secondary storage
is permanent storage. Common types of secondary storage are magnetic disk (hard disk,
floppy disk, flash disk) and optical disk (CD-ROM). Secondary storage and input & output
device are often called peripheral equipment because they are located outside the central part
of the computer, that is the CPU and the primary storage.
Check point?
35
1. mention and briefly explain about components of the computer hardware
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
____________
Computer software, or just software, is a collection of computer programs and related data that
provides the instructions for telling a computer what to do and how to do it. Software refers to one or
more computer programs and data held in the storage of the computer. In other words, software is a
set of programs, procedures, algorithms and its documentation concerned with the operation of a data
processing system. Program software performs the function of the program it implements, either by
directly providing instructions to the digital electronics or by serving as input to another piece of
software. The term was coined to contrast to the old term hardware (meaning physical devices). In
contrast to hardware, software "cannot be touched". Anything that can be stored electronically is
software.
36
runs the computer. Examples of the operating system include Windows XP, Windows 2000, Linux,
Mac OC, and Unix. These provide different processes through which we operate and work on our
computer systems. The software directs the computer to perform very specific tasks such as creating a
financial spreadsheet/statement/model, preparing a slide presentation, or writing a document on a
word processing program.
The distinction between software and hardware is sometimes confusing because they are so integrally
linked. Clearly, when you purchase a program, you are buying software. But to buy the software, you
need to buy the disk (hardware) on which the software is recorded. Computer software is typically
classified into three major types of programs:
I. Systems Software: Programs that manage and support the resources and operations of a computer
system as it performs various information processing tasks. These programs can be classified as:
a) System Management Programs: programs that manage the hardware, software, and data
resources of the computer system during its execution of the various information processing jobs of
users. The most important system management programs are operating systems.
b) System Support Programs: programs that support the operation and management of a computer
system by providing a variety of support services. Major support programs are system utilities.
c) System Development Programs: programs that help users develop information system programs
and procedures and prepare user programs for computer processing. Major development programs are
language translators, programming tools, and CASE (Computer- Aided Software Engineering).
II. Applications Software: Programs that direct the performance of a particular use, or application of
computers that meet the information processing needs of end users. Application software can be
classified as:
a) General purpose application programs: are programs that perform common information
processing jobs for end users. For example, word processing programs, spreadsheet programs,
database management programs, and graphics programs.
37
III. IT Procedures: Are operating instructions for the people who will use an information system.
Examples are instructions for filling out a paper form. A procedure is a step-by-step process or a set of
instructions for accomplishing specific results. Procedures include the strategies, policies, methods,
and rules for using the computer-based information systems.
The four types of procedures are: Operations, Backup and Recovery, Security, Development.
a) Operations Procedure: A procedure that describes how a computer system or application
is used, how often it can be used, who is authorized to use it, and where the results of
processing should go.
b) Backup Procedure: A procedure that describes how and when to make extra copies of
information or software to protect against losses.
c) Recovery Procedure: An action taken when information or software must be restored.
d) Security Procedure: A procedure designed to safeguard data centres, communications
networks, computers, and other IT components from accidental intrusion or intentional
damage.
e) Security Software: Software that is designed to protect systems and data.
f) Development Procedure: A procedure that explains how IT professionals should describe
user needs and develop applications to meet those needs.
Check point?
1. What is computer software?
_____________________________________________________________
____________________________________________________________
2. List out and briefly explain the three major types of computer software.
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_________
38
3.4 People: The Most Important Element; and Procedures
Dear students, how much do you think human beings are important in IT?
________________________________________________________________
________________________________________________________________
___________________________________________
The single most important resource in an organization is not technology, but it is people. Technology
is a tool that can help an organization produce and manage information more efficiently. In the end,
the most important thing to an organization is what its people decide to do with the information.
Therefore, it is important that you become a technology-literate knowledge worker. A technology-
literate knowledge worker is a person who knows how and when to apply technology. You cannot
apply technology to any given process and expect that process instantly efficient and effective. There
is a need of people resources to operate and organize all Management Information System. These
people resources have two categories:
iii. End User: End user is the client of a Management Information System. The people who
use an information system or produced information. In this category we include all kind
of a worker or employee of an organization or library users as an end users.
iv. Information System Specialists: It is second category of people resource. Specialists are
those people who developed and operate a system; we can include systems analysts,
system operators and software developers in this category.
Where there is importance for people as resources, there is also importance for procedures to practice
technology in the right manner to score right solutions. If people act as the proprietors of MIS,
procedures are the bounding norms of an MIS.
Check point?
__________________________________________________________________________________
_____________________________________________________________
39
_______________________________________________________________
_______________________________________________________________
_____
The second type of information is Diagnostic Information, This information portrays “what is
wrong” condition, where “what is wrong” is measured as the disparity between “what is” and “what
ought to be.” This assessment of how things are versus how they should be (a fact-value conflict) is
probably our most common management problem. Diagnostic information has two major uses. It can
first be used to define problems that develop in the business. Are production levels too low? Is the
rate earned on investment too low? These types of question cannot be answered with descriptive
information alone (such as with financial and production records). A manager may often be well
supplied with facts about his/her business, yet be unable to recognize this type of problem. The
manager must provide norms or standards which, when compared with the facts for a particular
business, will reveal an area of concern. Once a problem has been identified, a manager may choose
an appropriate course of action for dealing with the problem (including doing nothing). Corrective
measures may be taken so as to better achieve the manager’s goals. Several pitfalls are involved for
managers in obtaining diagnostic information. Adequate, reliable, descriptive information must be
available along with appropriate norms or standards for particular business situations. Information is
inadequate for problem solving if it does not fully describe both “what is” and “what ought to be.”
As description is concerned with “what is” and diagnostics with”what is wrong,” prediction is
concerned with “what if...?” Predictive Information is generated from an analysis of possible future
events and is exceedingly valuable with “desirable” outcomes. With predictive information, one either
defines problems or avoids problems in advance. Prediction also assists in analysis. When a problem
is recognized, a manager will analyze the situation and specify at least one alternative (including
doing nothing) to deal with it. Predictive information is needed by managers to reduce the risk and
40
uncertainty concerning technology, prices, climate, institutions, and human relationships affecting the
business. Such information is vital in formulating production plans and examining related financial
impacts. Predictive information takes many forms. What are the expected prices next year? What
yields are anticipated? How much capital will be required to upgrade production technologies? What
would be the difference in expected returns in switching from a livestock farm to a cropping farm?
Management has long used various budgeting techniques, simulation models, and other tools to
evaluate expected changes in the business.
Without detracting from the importance of problem identification and analysis in management, the
crux of management tasks is decision making. For every problem a manager faces, there is a “right”
course of action. However, the rightness of a decision can seldom, if ever, be measured in absolute
terms. The choice is conditionally right, depending upon a farm manager’s knowledge, assumptions,
and conditions he/she wishes to impose on the decision. Prescriptive Information is directed toward
answering the “what should be done” question. Provision of this information requires the utilization
of the predictive information. Predictive information by itself is not adequate for decision making. An
evaluation of the predicted outcomes together with the goals and values of the manager provides that
basis for making a decision. For example, suppose that a manager is considering a new changing
marketing alternative. The new alternative being considered has higher “predicted” returns but also
has higher risks and requires more management monitoring. The decision as to whether to change
plans depends upon the managers evaluation of the worth of additional income versus the
commitment of additional time and higher risk. Thus, the goals and values of a farm manager will
ultimately enter into any decision.
41
Figure 3.5 Types of Information
Characteristics of Information
Quality information has 3 basic dimensions:
Time dimension
Content dimension
Form dimension
42
1. Time Dimension
A. Timeliness: Information should be provided when it's needed.
This means that information must reach the recipients within the prescribed timeframes. For
effective decision-making, information must reach the decision-maker at the right time, i.e.,
recipients must get information when they need it. A delay destroys the value of information.
The characteristic of timeliness, to be effective, should also include up-to-date, i.e. current
information.
No older than the time period of the action it supports.
43
organization. Decision makers need complete and pertinent information in a summarized
form. Reports should be designed to eliminate clutter and voluminous detail, thereby
avoiding "information overload."
All information essential to a decision or task is present
D. Conciseness: Only the information that is needed should be provided.
E. Scope: Information can have a broad or narrow scope, or an internal or external focus.
F. Performance: Information can reveal performance by measuring activities accomplished,
progress made, or resources accumulated.
3. Form Dimension
A. Clarity: Information should be provided in a form that is easy to understand.
B. Detail: Information can be provided in detail or summary form.
C. Order: Information can be arranged in predetermined sequence.
D. Presentation: Information can be presented in narrative, numeric, graphic, or other forms.
E. Media: Information can be provided in the form of printed paper documents, video
displays, or other media.
Check point
1. Dear student, Mention and briefly explain the four types of information?
________________________________________________________________
________________________________________________________________
________________________________________________________________
_________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
________________________________________________________________
44
3.6 Communication Technologies
Dear learner, what do you mean by telecommunication?
__________________________________________________________________________________
____________________________________________
Telecommunication is the exchange of information in any form (voice, data, text, images, audio, and
video) over networks. Early telecommunications networks did not use computers to route traffic and,
as such, were much slower than today's computer-based networks. Major trends occurring in the field
of telecommunications have a significant impact on management decisions in this area. You should
thus be aware of major trends in telecommunications industries, technologies, and applications that
significantly increase the decision alternatives confronting business managers and professionals.
Technology trends- Toward extensive use of Internet, digital fiber-optic, and wireless technologies to
create high-speed local and global internet works for voice, data, images, audio, and video
communications.
Application trends- Toward the pervasive use of the Internet, enterprise intranets, and inter
organizational extranets to support electronic business and commerce, enterprise collaboration, and
strategic advantage in local and global markets.
45
Terminals, such as networked personal computers, network computers, or
information appliances. Any input/output device that uses telecommunications
networks to transmit or receive data is a terminal, including telephones and the
various computer terminals.
Telecommunications processors, which support data transmission and reception
between terminals and computers. These devices, such as modems, switches, and
routers, perform a variety of control and support functions in a telecommunications
network. For example, they convert data from digital to analog and back, code and
decode data, and control the speed, accuracy, and efficiency of the communications
flow between computers and terminals in a network.
46
midrange computer serving as a front-end processor, while a microcomputer may act
as a network server in a small network.
Telecommunications control software consists of programs that control
telecommunications activities and manage the functions of telecommunications
networks. Examples include network management programs of all kinds, such as
telecommunications monitors for mainframe host computers, network operating
systems for network servers, and Web browsers for microcomputers.
1. Wide Area Networks: Telecommunications networks covering a large geographic area are
called remote network, long distance networks, or more popularly Wide Area Networks
(WANs). Networks that cover a large city or metropolitan area (Metropolitan Area Networks
MANs) can also be included in this category. Such large networks have become a necessity
for carrying out the day-to-day activities of many business and government organizations and
their end users. Thus, WANs are used by manufacturing firms, banks, transportation
companies, and government agencies to transmit and receive information among their
47
employee, customers, suppliers, and other organizations across cities, regions, countries, or
the world. Internet is world’s largest WAN.
LANs allow end users in a work group to communicate electronically; share hardware,
software, and data resources. For example, a project team of end users whose microcomputer
workstations are interconnected by a LAN can send each other electronic mail messages and
share the use of laser printers and hard magnetic disk units, copies of electronic spreadsheets
or word processing documents, and project databases. LANs have thus become a more
popular alternative for end user and work group computing than the use of terminals
connected to larger computers.
Allow end users
Ø To communicate electronically
Ø To share hardware
Ø To share software
48
Figure 3.9 Local Area Networks
4. Network Computing: The growing reliance on the computer hardware, software, and data
resources of the Internet, intranets, extranets, and other networks has emphasized that for many users,
49
"The network is the computer." This network computing or network-centric view networks as the
central computing resource of any computing environment.
Network computers and other thin clients provide a browser-based user interface for processing
small application programs called applets. Thin clients include network computers, Net PCs, and
other low-cost network devices or information appliances. Application and database servers provide
the operating system, application software, applets, databases, and database management software
needed by the end user in the network. Network computing is sometimes called a three-thin
client/server model, since it consists of thin clients, application servers, and database servers.
Network Topologies
In networking, the term topology refers to the layout of connected devices on a network. Topology is
the geometric arrangement of a computer system. The three basic network topologies are the bus, star,
and ring. Each topology has its advantages and disadvantages: usually related to cost, complexity,
reliability and traffic "bottlenecks".
50
A. Star Topology: The star topology is widely used structure for data communications systems.
All devices connect to a central device, called hub.
All data transferred from one computer to another passes through hub.
Collisions are prevented by the central device.
If one connection with the hub goes down the rest can continue.
The hub should be highly reliable.
More centralized.
Less reliable: heavy dependence on the central device. If it fails, the others are cut off from
each other.
A star network has a central connection point - like a hub or switch. While it takes more
cable, the benefit is that if a cable fails, only one node will be brought down. All traffic
emanates from the hub of the star. The central site is in control of all the nodes attached to it.
The central hub is usually a fast, self-contained computer and is responsible for routing all
traffic to other nodes. The main advantage of a star network is that one malfunctioning node
does not affect the rest of the network. However, this type of network can be prone to
bottleneck and failure problems at the central site.
B. Ring Topology
Cable forms closed ring, or loop, with all computers and devices arranged along ring.
Data travels from device to device around entire ring, in one direction.
No central server.
More decentralized.
Messages flow in only one direction.
51
æ No danger of collisions.
C. Bus Topology
This arrangement is common in local area networks. The main drawback of this topology stems
from the fact that usually only one communications channel exists to service the whole network.
If this channel fails then the whole network may fail.
52
Figure 3.13 Bus Topology
Many devices connect to a single cable "backbone". If the backbone is broken, the entire
segment fails. Bus topologies are relatively easy to install and don't require much cabling
compared to the alternatives.
Telecommunications Processors
A computer cannot communicate over a channel by itself; it needs special communications
processors between it and the channel. The two communications processors are:
A. Channel-Interface Devices: a channel cannot be plugged directly into a computer; a
channel interface device is needed to provide the connection between the computer
53
and the channel. When a computer is connected to an analog channel, a modem is
needed provide the connection.
Computers transmit data using digital signals. To send data over an analog channel, the
digital signal from the computer must be converted to an analog form for transmission, a
process called modulation. The analog data when it reaches the other end of the channel,
must be converted to digital form, which is called demodulation. Modulation and
demodulation are performed by a modem, which stands for modulator-demodulator. There
must be a modem at each end of the channel-one to modulate the signal the other to
demodulate it.
Telecommunications Software
Software is a vital component of all telecommunications networks. Telecommunications and
network management software may reside in PCs, servers, mainframes, and communications
processors like multiplexes and routers. These programs are used by network servers and
other computers in a network to manage network performance. Network management
programs perform such functions as automatically checking client PCs for input/output
54
activity, assigning priorities to data communications requests from clients and terminals, and
detecting and correcting transmission errors and other network problems. Besides, it Provide
the capabilities for computers to communicate using communications processors and
channels.
Sends data a computer to a communications processors, which provide special
[processing of the data before sending it over the channel].
It also sends data for a computer from communications processors after the data has
been received from a channel and processed by the processors.
Example, network operating system that provides communications capabilities over
a network.
Check point
1. Define communication networks.
___________________________________________________________________________
______________________________________________________
2. Mention and briefly explain about the components and types of communication
networks?
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
______________
3. What is the difference between telecommunications software and processors? Explain
briefly.__________________________________________________________________
________________________________________________________________________
________________________________________________________________________
_________
4. Mention and differentiate the three types of network topologies
__________________________________________________________________________________
__________________________________________________________________________________
______________________________________________________________________
55
3.7 Database Management (DBM)
Information is becoming as important as a business resource as money, material, and people. Even
though a company compiles millions of pieces of data doesn‘t mean it can produce information that
its employees, suppliers, and customers can use. Businesses are realizing the competitive advantage
they can gain by compiling useful information, not just data.
A more rigorous definition of a database is a collection of data organized to serve many applications
efficiently by centralizing the data and controlling redundant data. Rather than storing data in separate
files for each application, data are stored so as to appear to users as being stored in only one location.
A single database serves multiple applications. For example, instead of a corporation storing
employee data in separate information systems and separate files for personnel, payroll, and benefits,
the corporation could create a single common human resources database.
• Telephone books
• Online bookstores
• Road maps
A database is a single organized collection of structured data, stored with minimum duplication of
data items so as to provide a consistent controlled pool of data. It is a collection of information
organized in such a way that a computer program can quickly select desired pieces of data. It is a
good program to use to manage list that are entirely numbers, such as addresses and phone numbers,
inventories and membership rosters.
56
o A largely varying size (from a personal list of addresses to the National Register of
Persons).
o A scope or content of varying breadth (from a personal list of addresses to a
multimedia encyclopaedia).
o A physical organization of varying complexity (from a manual personal list, managed
with simple files, to huge multi-user databases with geographically distributed data
and access).
o Logically-coordinated objectives, data is defined once for a community of users, and
accessed by various applications with specific needs.
You can think of a database as an electronic filing system. Traditional databases are organized by
fields, records, and files. A field is a single piece of information; a record is one complete set of
fields; and a file is a collection of records. For example, a telephone book is analogous to a file. It
contains a list of records, each of which consists of three fields: name, address, and telephone number.
57
– Data Item: A specific detail of an individual entity that is stored in a database.
– Primary Key: In a database, a designated field used to distinguish one record from another.
– Relational Database: A database in which the data are structured in a table format
consisting of rows and columns.
– Relation/File: The table in a database that describes an entity.
– Tuples: The rows of a relation. Also called records.
– Fields: The column of a relation. Also called attributes.
Student Database
Course
File
Student_ID Course Date Grade
Bit 0
58
One of the most traditional manual processes with which most of us are familiar is the management of
information in a file cabinet. Normally, folders are sorted within drawers in a file cabinet. Information
is stored in individual folders in each drawer. There might even be a sequence of file cabinets, or
several rooms full of file cabinets. In order to find a record on an individual, you might have to go to
the right room, and then to the right cabinet, to the right drawer, then to the right folder. Whether a
manual process or a database is utilized, organization is the key to managing information.
• Interviewing an employee.
• Balancing a checkbook.
As you can probably deduct on your own, many of the manual processes mentioned can be fully
automated. Some manual processes will always require manual intervention. A database is useful in
automating as much work as possible to enhance manual processes.
A database might exist to minimize or eliminate the amount of paper shuffling. For instance, imagine
that you work in the human resources department for a company and that you are responsible for
59
hundreds of resumes. The traditional method for storing resumes is in a file cabinet. The resumes are
probably alphabetized by the individual’s last name, which makes a resume easy to find if you are
searching by name. What if you wanted to find all resumes for individuals who had a certain skill?
With a manual filing system, you would find yourself reading every resume looking for the desired
skill, which might take hours. If resume information was stored in a database, you could quickly
search for individuals with a particular skill, which might only take seconds.
Suppose you decide to create a database for your newspaper delivery business. In order to succeed,
you need to keep accurate, useful information for each of your customers. You set up a database to
maintain the information. For each customer, you create a record. Within each record you have the
following fields: Customer first name, customer last name, street address, city, state, zip, ID, and date
last paid. Smith, Jones, and Brooks are the records within a file you decide to call paper delivery. The
entities then are Smith, Jones, and Brooks, the people about whom you are maintaining information.
The attributes are customer‘s name (first and last), address (street, city, state, zip code), ID, and date
last paid. This is a very simplistic example of a database, but it should help you understand the
terminology.
The key to establishing an effective, efficient database is to involve the entire organization as much as
possible, even if everyone will not immediately be connected to it or use it. Perhaps they won't be a
part of it in the beginning, but they very well could be later on. Database management systems make
it easy, fast, and efficient to relate pieces of data together to compile useful information.
You've heard the old saying, "Don't put all your eggs in one basket." When it comes to data, just the
opposite is true. You want to put all your corporate data in one system that will serve the organization
as a whole. Doing so makes it easier, cheaper and more efficient to use the data across the entire
organization. It makes it easier to use in applications and makes it available through many different
delivery methods. To access information from a database, you need a database management system.
60
A DBMS program helps organizations use their integrated collections of data records and files known
as databases. It allows different user application programs to easily access the same database. For
example, a DBMS makes it easy for an employee database to be accessed by payroll, employee
benefits, and other human resource programs. A DBMS also simplifies the process of retrieving
information from databases in the form of displays and reports. Instead of having to write computers
programs to extract information, end users can ask simple questions in a query language.
o Manage the storage of data, safely for long periods of time, on some storage medium
controlled by the DBMS.
o Manipulate a database, with efficient user interfaces to query the database to retrieve
specific data, update the database to reflect changes in the world, generate reports
from the data.
o Manage database usage: users with their access rights, performance optimization,
sharing of data among several users, security from accidents or unauthorized use.
o Monitor and analyze database usage.
DBMS have similarities with operating systems: both manage memory, process
scheduling, I/O, communication.
In addition, DBMSs implement many data-management functions.
Other name for DBMS: database system, database manager.
DBMSs typically do not use the file system of the operating system of the machine
where they are installed. Instead, they define their own richer file organizations and
access methods.
Table 3.2 the difference between DBMS and the traditional file processing systems
61
DBMS File Processing Systems
Data redundancy & Reduced by ensuring physical Data is often duplicated causing higher
piece of data is storage and access cost, poor data integrity,
Inconsistency
and data inconsistency
available to all programs
Accessing data Allow flexible access to data Allow pre-determined access to data (i.e.,
(e.g., using queries for data complied programs); application programs
retrievals) are dependent on file formats
Integrity
A DBMS can reduce data redundancy and inconsistency by minimizing isolated files in which the
same data are repeated. The DBMS may not enable the organization to eliminate data redundancy
entirely, but it can help control redundancy. Even if the organization maintains some redundant data,
using a DBMS eliminates data inconsistency because the DBMS can help the organization ensure that
every occurrence of redundant data has the same values. The DBMS uncouples programs and data,
enabling data to stand on their own. Access and availability of information can be increased and
program development and maintenance costs can be reduced because users and programmers can
perform ad hoc queries of data in the database. The DBMS enables the organization to centrally
manage data, their use, and security.
Types of Databases
62
Both spreadsheets and databases can be used to handle the same information, but each is
optimized to handle a different type of data most efficiently. The larger the number of
records, the more important the differences are. Some popular databases include MS Access,
dBase, FoxPro, Paradox, Approach, MySQL, and Oracle. Contemporary DBMS use different
database models to keep track of entities, attributes, and relationships. Each model has certain
processing advantages and certain business advantages.
Relational DBMS
The most popular type of DBMS today for PCs as well as for larger computers and mainframes is the
relational DBMS. The relational data model represents all data in the database as simple two-
dimensional tables called relations. Tables may be referred to as files. Information in more than one
file can be easily extracted and combined. Figure 3.16 shows a supplier table and a part table. In each
table the rows represent unique records and the columns represent fields, or the attributes that describe
the entities. The correct term for a row in a relation is tuple. Often a user needs information from a
number of relations to produce a report. Here is the strength of the relational model: It can relate data
in any one file or table to data in another file or table as long as both tables share a common data
element.
Each table is a relation, each row is a tuple representing a record, and each column is an attribute
representing a field. These relations can easily be combined and extracted to access data and produce
63
reports, provided that any two share a common data element. In this example, the PART and
SUPPLIER files share the data element Supplier_Number.
To demonstrate, suppose we wanted to find in the relational database in Figure 3.16 the names and
addresses of suppliers who could provide us with part number 137 or part number 152. We would
need information from two tables: the supplier table and the part table. Note that these two files have a
shared data element: Supplier_Number.
Data in each table are broken down into fields. A field, or column, contains a single attribute for an
entity. A group of fields is stored in a record or tuple (the technical term for record). Each record
requires a key field, or unique identifier. The best example of this is your social security number:
there is only one per person. That explains in part why so many companies and organizations ask for
your social security number when you do business with them.
In a relational database, each table contains a primary key, a unique identifier for each record. To
make sure the tables relate to each other, the primary key from one table is stored in a related table as
a foreign key. For instance, in the customer table the primary key is the unique customer ID. That
primary key is then stored in the order table as the foreign key so that the two tables have a direct
relationship.
There are two important points you should remember about creating and maintaining relational
database tables. First, you should ensure that attributes for a particular entity apply only to that entity.
That is, you would not include fields in the customer record that apply to products the customer
orders. Fields relating to products would be in a separate table. Second, you want to create the
smallest possible fields for each record. For instance, you would create separate fields for a
customer‘s first name and last name rather than a single field for the entire name. It makes it easier to
sort and manipulate the records later when you are creating reports.
Check point
1. Dear learner, what do DBM and DBMS mean?
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
_________
64
______________________________________________________________________________
______________________________________________________________________________
_____________________________________________________________________
Chapter summary
Information Technology (IT) is the branch of engineering that deals with the use of computer and
telecommunication to handle data, information, and processes. IT plays a vital role in the lives of
people. Information Technology is made up of nine (9) major functions, namely; Capture, Verifying,
Processing/Manipulation, Storage, Retrieval, Data Update, Reproducing, Transmit /Communication,
and Generation. Computer has two main components, namely hardware and software components.
The hardware component is the physical component of a computer system, i.e., those parts of the
computer that can be touched, felt and seen physically. More or less, the hardware component consists
of a combination of 5 basic components: the input devices, output devices, primary storage, the
mother board, and secondary storage. On the other hand, computer software is a collection of
computer programs and related data that provides the instructions for telling a computer what to do
and how to do it. In other words, software is a set of programs, procedures, algorithms and its
documentation concerned with the operation of a data processing system. Computer software has
three major types including systems software, application software and IT procedures. The single
most important resource in an organization is not technology, but it is people. Technology is a tool
that can help an organization produce and manage information more efficiently. In the end, the most
important thing to an organization is what its people decide to do with the information. There is a
need of people resources to operate and organize all Management Information System. These people
resources have two categories namely; end users and Information system specialists. Information can
be classified as descriptive, diagnostic, predictive and prescriptive information. In order to be quality
information, any information must have the time, content and form dimensions.
Telecommunication is the exchange of information in any form (voice, data, text, images, audio, and
video) over networks. Telecommunications network consists of five basic categories of components
including terminals, telecommunication processors, telecommunication channels, computers and
telecommunication control software. Telecommunication networks can be a Wide Area Network
(WAN), Local Area Network (LAN), Client/Server types, network computing and peer to peer
networks. There are three types of network topologies namely; star topology which is widely used
structure for data communications systems, ring topology which is about a cable forms closed ring, or
loop, with all computers and devices arranged along ring and bus topology by which all computers
and devices connect to central cable, or bus. Database is a collection of data organized to serve many
applications efficiently by centralizing the data and controlling redundant data. Rather than storing
65
data in separate files for each application, data are stored so as to appear to users as being stored in
only one location. Traditional databases are organized by fields, records, and files. A field is a single
piece of information; a record is one complete set of fields; and a file is a collection of records. A
database management system is simply the software that permits an organization to centralize data,
manage them efficiently, and provide access to the stored data by application programs. A DBMS is
basically a software program like Word or Excel or e-mail and it helps organizations use their
integrated collections of data records and files known as databases as well as it allows different user
application programs to easily access the same database. Moreover, a DBMS can reduce data
redundancy and inconsistency by minimizing isolated files in which the same data are repeated.
66
CHAPTER FOUR
Chapter objectives
Introduction
Dear students So far, you have learned about computer information systems and the basic
computer resources available to the manager. What you learned generally emphasized the
organizations as a whole, rather than the major areas of decision making commonly found in
organizations. So, you will apply what you have learned about information systems, decision
making, and computer system resources to problems in finance, marketing, manufacturing
and production and human resources. Furthermore, the discussions will highly emphasis the
application of various information systems at the operational, tactical and strategic levels.
The following diagram shows various informational systems across the three managerial
levels namely operational, tactical/middle management and strategic levels across the
different functional areas.
67
Fig 4.1 Information systems pyramid across managerial levels and functional areas
It is a predictable decision that can be made following a well defined set of routine
procedures.
Most decisions at this level require easily defined information that relates to the
current status and activities within the basic business functions (Structured decision).
Information is gained from detailed reports which contain information about routine
activities.
Detailed tasks defined by middle management are carried out by people at operational
level.
68
Acquire and arrange the resources (Computers, people etc) to meet the goals of an
organization.
Information needed involves review, summarization and analysis of data to help plan
and control operations and implement policy that has been formulated by upper
management. Information is usually given to middle managers as summarized reports.
Semi structured decisions that must be made without a base of clearly defined
informational procedures.
In most cases a semi structured decision is complex, requiring detailed analysis and
extensive computations.
Unstructured decisions are the most complex type of decisions and are rarely based on
predetermined routine procedures.
Dear students once you get some information about the nature of decisions across three
managerial levels i.e. operational, tactical and strategic, now it is the time to see various
information systems of functional areas within the organization across the above mentioned
managerial levels. The following paragraphs summarize these issues in detail.
69
finance function is also in charge of managing the capitalization of the firm (finding new
financial assets in stocks, bonds, or other forms of debt).
Whether you are the chief operating officer of a large international organization or merely the
supervisor of a small department at one location in that organization, you will find it
necessary to make financial decisions. The financial decisions you may encounter as a
manger are diverse and could include decisions similar to these:
Should you purchase a large new piece of equipment or lease it for a three-year period?
How much of your department's funds should you allocate to telephone usage rather than
travel?
Should you invest money in new computer equipment or additional merchandise for resale?
Should your organization decide to offer a new product or service, or should it provide the
same products and services in additional markets?
To make these and similar decisions, you need to understand the basic financial accounting
systems found in most organizations. You must also understand how financial information
systems can help you make improved decisions about the financial problems within your
purview.
70
subsystems that may be used separately or in an integrated fashion. The subsystem modules
include;
1. General ledger: General Ledger System provides managers with periodic accounting
reports and statements such as the income statement and balance sheet.
2. Fixed assets: Fixed Assets System maintains records of equipment, property, and other
long--term assets that an organization owns. The records include the original cost of
the as-sets, their depreciation rates, the accumulated depreciation to date, and the
book value of the assets, or the original cost less accumulated depreciation.
3. The Sales Order Processing Subsystem: Sales Order Processing System or order-entry
system, routinely records sales orders and also provides data to other systems that fill
those orders, maintain inventory levels, and bill the customer. This system provides
sales tax data to the general ledger system for posting to taxing agency accounts, stock
data to the inventory sys-tem for updating inventory balances, and sales data to the
accounts receivable system for posting to customer accounts.
4. Accounts receivable Subsystem: The accounts receivable subsystem allows you to enter,
update, and delete customer information, such as charge sales, credit terms, cash
payments received, credit for returned or damaged merchandise, and accounts balances.
Inputs to the accounts receivable subsystem include sales invoices, credit memoranda,
and cash received from customers. Typical outputs are monthly customer statements of
account and a schedule of accounts receivable listing each account and its balance.
5. The Accounts Payable Subsystem: The accounts payable subsystem processes much of
the same routine, repetitive information as the accounts receivable subsystem, except that
the information is about organization’s creditors rather than customers.
6. The Inventory Control Subsystem: The inventory control subsystem provides input to
the general ledger subsystem and receives input from the purchase order and the sales
order subsystems. The basic purpose of the subsystem is to keep track of inventory levels
and inventory costs from the organization. The subsystem maintains information about
71
each stock item, such as stock numbers and stock descriptions, receipts and issues of
stock, and stock balances.
7. The Purchase order Processing Subsystem: The purchase order processing subsystem
processes purchase orders and tracks which purchase orders have been filled, which stock
items ordered are on backorder, which stock items have been damaged or do not meet the
specifications of the original order, and when orders are expected to be received.
The purchase order subsystem provides information to the accounts payable and
inventory subsystems. The subsystem produces a variety of reports, including a backorder
report listing all stock items on backorder and an open order report listing all purchase
orders not yet received and their expected arrival dates.
8. The Payroll Subsystem: The payroll subsystem processes wage and salary information,
such as payment to employees; deductions from employee checks; and payments to
government taxing agencies for taxes owed. The payroll subsystem produces weekly
payroll summary reports, overtime reports; forms for taxing agencies, such as wage and
tax statements; payroll checks for payroll taxes owed to taxing agencies.
Check point
72
strategic planning. This has led to the development of computer-supported financial
information systems for tactical decision-making and strategic planning information systems.
(2) Deploy their resources to pursue organization goals. Whereas operational control systems
are focused on tasks, tactical information systems are focused on resource allocation.
Budgeting Systems
The general ledger subsystem of many computerized accounting systems permits the user to
enter budget amounts by account number. Periodically (weekly, monthly, quarterly, or
annually), the budgeted amounts (allocations) and the actual amounts spent or received
(actual) for each account are compared and various reports are prepared. For example, the
general ledger subsystem of a mainframe accounting system may provide the reports listed
below.
2. Budget variances by line item type, or the differences between allocations and actual
amounts,
4. Current revenues and expenditures compared to the previous year's revenues and
expenditures,
Reports such as these may be prepared for a department, a division, a subsidiary, or the entire
organization. The budgeting system permits managers to compare revenue and expense data
against the standard of the budget allocations. It also allows prior fiscal period, other division
or department, industry-wide data to be used as standards against which current budget
amounts may be compared.
73
Cash Management Systems
Important functions of financial management include ensuring that the organization has
sufficient cash to meet its needs, putting excess funds from any period to use through
investments, and providing borrowing power to meet the organization's cash needs in those
periods when there is an insufficient cash flow.
There are two major reasons why an organization needs cash: for working capital (cash
needed for day-to-day operations) and for the acquisition of long-term assets. To determine if
adequate cash is available for its working capital needs and its long term asset acquisition
plans, the organization must prepare a report of its expected cash flow for the time periods
being considered. Typically, this report shows the cash flow for each month of the coming
year.
A cash flow report shows the estimated amount of cash that will be received and spent each
month. The report shows in which months there will be cash received and spent. The report
shows in which months there will be excess funds that might be put to use, and in which
months there will be insufficient funds, requiring the organization to borrow cash to meet its
working capital or fixed asset acquisition needs.
The information provided by a cash flow helps the manager make decisions about investing,
purchasing, and borrowing money. If this information is placed on an electronic spreadsheet,
the manager may stimulate a number of possible business conditions, such as (1) increasing
or decreasing revenue, (2) increasing or decreasing customer credit problems, (3) deferring
the acquisition of an asset, or (4) repairing existing fixed assets instead of replacing them.
A capital budget contains information about the planned acquisition or disposal of major
plant assets during the current year. The manager may wish to compare the various capital
spending plans in terms of three commonly used evaluation tools: net present value, internal
rate of return, and payback period. These tools can easily be calculated using computer
systems. "What if?" games are performed using software packages.
74
funds for investments, most organizations invest money in securities of one kind or another.
Careful management of these investments is necessary to ensure the achievements of
organization goals.
Current information systems provide unique ways to manage stock and bond portfolios.
These ways typically involve the use of external databases that furnish immediate updating of
stock and bond prices, information about the history of each investment, and various portfolio
investment analysis tools to help the manager stay on top of the organization' s investments.
The system may be a simple one in which the manager's microcomputer is equipped with a
modem and he or she is provided with a subscription to an investment service. Possible
information that can be generated are current dividend, price history, price stability index,
projected changes earnings, current earnings per share, debt as a percent of capital, dividends
history, industry ranking, low price per year and the like. Tactical financial information
systems give the manager increased control over the financial resources of a department or an
entire organization, and provide considerable support when he or she is deciding the
allocation of financial resources to meet organizational goals.
Two major outcomes of financial strategic planning are the setting of financial goals and
directions for the organization. The former may include setting investment goals and return
on investment goals. The latter may involve deciding on new investment opportunities or on
the mix of capital sources used to fund the organization.
75
A major source of computerized information about the current and future status of the
organization is the organization's own financial accounting database. A promising source of
computerized information pertaining to the present and future environment in which the
organization must operate are on-line databases for economic, social, demographic,
technological, and political information. Projecting likely scenarios (minimum, base case and
maximum) for the organization using these two categories of data is the art of forecasting. A
major purpose of strategic decision making is to use long-range forecasts to reduce the risk
involved in major organization decisions.
Computerized accounting systems provide the user with a variety of reports on which many
ratios and analysis tools may be applied. Example, working capital = current assets - current
liabilities, return on assets = Profits after tax/Average assets.
Strategic planners demand forecasts on a variety of factors that will affect organization
performance in the future.
Forecasting the sales revenue of a potential new product makes important information
available to planners considering the development and marketing of the new product.
The types of information used in forecasting the future environment of the organization are
many and diverse. They include descriptions of the present economy and forecasts of the
future economy, information on the present demographic structure of the region or country
and forecasts of the demographic structure of the region or country, and descriptions of the
current social structure and social mores and predictions on the future structure of society and
societal mores.
76
provide decision makers with useful information
prevent incorrect or incomplete information which may result in: additional time
required to correct the original transaction
Check point?
Mention some sub systems of financial information systems at tactical and strategic level.
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------
77
Furthermore, Kottler, et al, (2006) defined as “an overall Marketing Information System can
be defined as a set structure of procedures and methods for the regular, planned collection,
analysis and presentation of information for use in making marketing decisions”.
Marketing information systems support the major activities of a marketing organization. The
information systems collect data that describe marketing operations, process those data, and
make marketing information available to marketing managers to help them make effective
decisions across different managerial levels as discussed below.
78
system.
Some systems allow you to make notes about the calls, to generate follow-up letters,
and to view a customer file while a call to that customer is in progress.
Direct Mail Advertising Systems: Many organizations generate sales by mailing sales
brochures and catalogues directly to customers using direct mail advertising systems. To
distribute sales documents rapidly to large numbers of potential customers, most marketing
departments maintain customer mailing lists that are used for mass mailings. The ‘lists may
be drawn from customer files; accounts receivable records; prospect files; commercial
databases of households, businesses, and organizations; or they can be purchased from
other firms.
Point of Sale System: Systems provide immediate updates to sales and inventory systems
and allow firms to monitor sales trends minute by minute. They also allow firms to
capture customer data and preferences and add the information to their data warehouses.
Delivery Tracking and Routine Systems: Customers like to receive their merchandise on
time. In a manual system, customers called in to a customer representative to check on the
delivery of their merchandise. The customer rep would then have to call the delivery vehicle
driver who uses a cell phone to tell the rep where he or she is and how soon the
merchandise might be delivered. That process took time, frequently frustrated the
customer, and cost the firm money to support.
Electronic Shopping and Advertising: Firms have been able to advertise and
customers to shop via TV; radio, and the telephone for many years. The computer age,
however, has made other avenues for shopping and advertising available, the most dramatic
of which is clearly the Internet.
Virtual shopping: When people view, select, and purchase products and services from a
store in another location using electronic means, they are virtually shopping at that store.
Virtual shopping, or electronic shopping, allows organizations to present information about
goods and services to potential customers who are connected to their electronic “store.”
Check point
Is Online order of goods is an example of virtual
shopping?----------------------------------------------------------------------------------------------------
-------------------
Mention some business entities in your locality that are using point of sale system?
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
79
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------
Examples of tactical marketing information systems that will be discussed in this part of the
paper include those that support the deployment and management of the sales force, the
management of advertising and promotion campaigns, the distribution and delivery of
products sold, and product pricing.
A major objective of sales managers is to reach the sales goals set by top management. To
accomplish this objective, sales managers must make many tactical decisions, such as how
sales territories should be shaped, how the sales force should be allocated within those
territories, and what emphasis should be placed on each type of product offered and
customers served.
To make these decisions effectively, sales managers should have at their disposal a great deal
of data about the sales histories of each salesperson, territory, product and market segment.
These data -- provided by sales management information systems -- can be used to develop
reports analyzing sales activities in ways that help managers make decisions about the
salespeople, territories, products and customers. Analysis of past sales effort might reveal, for
instance, that the greatest volume of sales is obtained with certain market segments. This
information may be obtained from a report that correlates product or service categories with
customer categories.
80
promotional activities should be deployed to achieve sales goals. Advertising and promotion
information systems assist managers in these tasks.
To make decisions regarding the advertising and promotional tactics to use, marketing
managers will need such information as market segment history, the effectiveness of previous
advertising and promotional efforts on each market segment, and the sales history of product
by market segment.
Check point
In what ways tactical and strategic marketing information systems are different to each
other?
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------
Strategic sales forecasting usually includes several varieties of forecasts: forecasts of sales for
the entire organization, forecasts of sales for each product or service, and forecasts of sales
for a new product or service. The results of these sales forecasts will often be further
categorized by sales territory and sales division. Regardless of the type of forecasts, sales
forecasts are usually based on more than historical data; they are not merely projections of
past trends. Sales forecasts are also based on assumptions about the activities of the
competition, government action, shifting customer demand, demographic changes and
movements, and a variety of other pertinent factors, including even the weather. Errors in
sales forecasting will have many implications in the other aspects of the organization.
The major objective of product planning and development information systems is to make
information about consumer preferences obtained from the marketing research system
available for the development of new products. The primary output of planning and
81
development activities is a set of product specification. The specifications will serve as inputs
for other decisions such as product design.
Inputs to marketing research are heavily derived from sources external to the organization.
These inputs include such widely diverse sources of customers as customers, potential
customers, census and demographic data, industry or trade data, economic data, social trend
data, environmental data, and scientific and technological data. These data may be obtained
through such means as direct mail surveys of customers, personal and telephone interviews of
consumers, library searches of governmental and industry reports, searches of the databases
of information utilities, and reports filed by sales personnel.
Marketing research personnel make heavy use of statistical methodology in analyzing the
data collected and in reporting the information to the organization. Obtaining totals, counts,
and averages in terms of consumer responses to questions, correlating social and economic
characteristics of customers with their buying practices, completing times series analyses of
past industry-wide sales to determine the projected sales of a product, and testing hypotheses
about consumer response to differing product packaging represent only some of the statistical
procedures that are used to analyze information for marketing managers.
Conducting trend analyses of the sales of products and services identical or similar to
those offered by the organization to identify products or services that are on the ascent
or descent,
Analyzing population and target group characteristics especially for trends or changes
in data that could affect the organization,
82
The results of marketing research are often presented graphically, in the form of tables,
charts, and graphs.
To ensure that the marketing mix offered by your organization will continue to be effective in
satisfying customers, you must keep abreast of major competitors and their marketing
activities. Market share is likely, in the end, to be the greatest for the organization that
provides the marketing mix most closely matching a given market segment's needs and
wants. Thus, knowledge of competitor prices, products, sales, advertising, and promotions
must be gathered if the organization is to avoid falling behind the competition in the eyes of
the customers. This task is carried out through competitive tracking information systems.
Information about competitor activities is also obtained from informal sources, through such
activities as reading trade journals and newspapers, visiting competitor distribution outlets,
and talking to competitor officers and employees at conventions. Salespeople in most
organizations are encouraged to provide feedback about competitor activities by filing field
reports. The information they obtain may be gathered through observation of competing
salespeople or by seemingly casual questions that addressed to customers. Information about
the competition may also be gathered more systematically by conducting keyword searches in
external databases or information utilities.
1).Organized Data collection – Lots of data can be collected from the market. But the main
word here is “Organized”. Organizing data is very important else the data is
meaningless. Thus MIS helps you to organize your database thereby improving productivity
2). A broad perspective – With a proper MIS in place, the complete organization can be
tracked which can be used to analyze independent processes. This helps in establishing a
broader perspective which helps us know which steps can be taken to facilitate improvement.
83
3) Storage of Important Data – Several times, for example, in pharmaceuticals, when one
drug is being produced they may need data of another drug which was produced years back.
Similarly in Media, photographs are stored in archives. This storage of important data plays a
crucial role in execution and thus proves again that MIS is not important only for information
but also for execution.
4) Avoidance of Crisis – The best way to analyze a stock (share market) is to see its
past performance. Top websites like money control thrive on MIS. Similarly MIS helps you
keep tracks of margins and profits. With an amazing information system established, you can
know where your organization is moving and probably avert a crisis long before it has taken
place. Ignoring hints received from MIS reports is foolhardy.
6) Analysis and Planning – MIS is critical for planning. You cannot do planning without
information. For planning, the first thing which is needed is the organizations capabilities,
then the business environment and finally competitor analysis. In a proper MIS, all these are
present by default and are continuously updated. Thus MIS is very important for planning
and analysis.
7) Control – Just like MIS can help in a crisis, in normal times it provides control as you
have information of the various processes going on and what is happening across the
company. Thus it provides you with a sense of control.
84
Manufacturing and production information systems refers to the planning, development, and
maintenance of production facilities; the establishment of production goals; the acquisition,
storage, and availability of production materials; and the scheduling of equipment, facilities,
materials, and labour required to fashion finished products. Manufacturing and production
information systems support these activities.
To produce goods and services, you must have the right quantity of raw materials and
production supplies on hand. Furthermore, you will want to procure these materials and
supplies at the lowest cost and have them delivered at the right time. To assist in this
function, the purchasing information system has to maintain data on all phases of the
acquisition of raw materials and purchased parts used in production.
Quality control information systems provide information about the status or production of
goods as they move from the raw material state, through goods in process, to the finished
goods inventory.
85
4.3.2 Tactical manufacturing and production information systems
Tactical information systems include inventory management and control systems, capacity
planning, production scheduling, and product design and development.
The management and control of raw materials, goods-in-process, and finished goods
inventories is an important part of production system. Careful management and control of
these inventories will usually provide considerable savings to the organization. Inventory
management and control systems use information from operational information systems, such
as the shipping and receiving systems, purchasing systems, and order entry systems.
Maintaining inventories at their proper levels eliminates production shutdowns from lack of
materials and lost sales from lack of finished goods. Ordering too much and ordering too little
are costly in terms of inventory carrying costs and ordering costs respectively. Thus, the best
or economical order quantity (EOQ) strikes a balance between carrying costs and
procurement costs.
The computation of EOQ for each item in inventory would be a very large and tedious task if
done manually. Also, for many inventory items, the manager may wish to play "What If?"
games with the values in the EOQ formula. Without computers, these tasks would be
laborious and may prove too time consuming to keep the order process fine-tuned to current
data.
In addition to ensuring that there will be enough raw materials on hand for forecasted
production, the production manager must also see to it that there will be enough production
capacity available to meet production goals. The purpose of capacity planning is to make
certain that there is sufficient personnel, space, machines, and other production facilities
available at the right time to meet the organization's planned production. Managers also
utilize capacity to minimize capacity in excess of planned production needs.
The purpose of the production schedule is to allocate the use of specific production facilities
for the production of finished goods to meet current or forecasted orders. To manage the
scheduling process, a number of scheduling tools have been developed. Two of these are
Gantt and PERT charts and there are project software packages at this time.
86
4.3.3 Strategic manufacturing information systems
As we just discussed, production information systems are primarily operational and tactical in
nature. They are concerned with providing information to monitor and control the production
of goods and services and to allocate resources to complete production processes.
Manufacturing information systems are typically strategic in nature.
For example, the decision to construct a plant addition or a totally new plant, the selection of
the plant site, and the creation of general plans for the design and layout of the facility are
top-management decisions. Decisions of this magnitude will require the commitment of a
large amount of capital and other resources over a long period of time and thus are strategic
planning decisions. Such decisions are not made lightly.
The decision to locate a plant site requires a great deal of information that is external to the
organization. Facilities planning information systems support top-management decisions in
this area. Some of the information needed is relatively quantitative -- for example, the
availability and cost of trained or experienced labour and the degree to which it is unionized,
the availability and cost of transportation for raw materials and finished goods, the
availability of suitable sites and the cost of land, the proximity of raw materials suppliers
and/or finished goods customers, the availability and costs of power, and the rate of property
and incoming taxation.
Other information used in locating a plant may be qualitative in nature -- for example,
community attitudes toward an organization of the type of wishing to locate there and the
quality of community services, such as education and training opportunities.
The final decision concerning plant location may be made using some form of weighted-
average technique, in which factors such as those listed above are ranked and the total scored
for several potential sites computed. It may also be made on largely emotional factors by top
management.
87
To increase labour productivity- Automating a manufacturing operation usually
increases production rate and labour productivity. This means greater output per hour
of labour input.
To reduce labour cost- Ever-increasing labour cost has been and continues to be the
trend in the world’s industrialized societies. Consequently, higher investment in
automation has become economically justifiable to replace manual operations.
Machines are increasingly being substituted for human labour to reduce unit product
cost.
To reduce or eliminate routine manual and clerical tasks- An argument can be put
forth that there is social value in automating operations that are routine, boring,
fatiguing, and possibly irksome (lack of interest). Automating such tasks serves a
purpose of improving the general level of working conditions.
To improve product quality- Automation not only results in higher production rates
than manual operations; it also performs the manufacturing process with greater
uniformity and conformity to quality specifications. Reduction of fraction defect rate
is one of the chief benefits of automation.
To reduce manufacturing lead time- Automation helps to reduce the elapsed time
between customer order and product delivery, providing a competitive advantage to
the manufacturer for future orders. By reducing manufacturing lead time, the
manufacturer also reduces work-in-process inventory.
88
precision, miniaturization, or complexity of geometry that cannot be achieved
manually. Examples include certain integrated circuit fabrication operations, rapid
prototyping processes based on computer graphics (CAD) models, and the machining
of complex, mathematically defined surfaces using computer numerical control.
These processes can only be realized by computer controlled systems.
Human resource information system (HRIS) refers to the system of gathering, classifying,
processing, recording and dismantling the information required for efficient and effective
management of human resource in an organization. Need for such a system arises due to
several factors.
Human Resource Information Systems (HRIS) is defined as a system used to acquire, store,
manipulate, analyze, retrieve, and distribute information regarding an organization’s human
resources. An HRIS is not simply computer hardware and associated HR-related software.
Although an HRIS includes hardware and software, it also includes people, forms, policies
and procedures, and data.
89
level information systems that collect and report personnel data. These include information
systems pertaining to the organization's positions and employees, and about governmental
regulations.
The financial information system, through its payroll subsystems, collects and reports data
pertaining to human resources that is largely operational in nature. Payroll files often contain
a great deal of information about employees -- including information about employees’ pay
rates, wage classifications, and seniority -- that can be useful to managers making human
resource decisions.
A job is usually defined as a group of like or similar positions. A position, on the other hand,
consists of tasks performed by one worker. The purpose of a position information system is to
identify each position in the organization, the job category in which the position is classified,
and the employee currently assigned to the position. Reference to the position information
system allows a personnel manager to identify the details about unfilled positions. Position
information systems also allow the personnel manager to identify human resource problems.
The personnel department must maintain information on each of the organization's employees
for a variety of reporting purposes. One part of this information system is a personnel file,
which usually contains personal and organization-related information such as name, address,
sex, marital status, citizenship, years of service or seniority data, education and training,
previous experience, employment history within the organization, salary rate, salary or wage
grade, and retirement plans.
Another part of an employee information system is an employee skills inventory. The skills
inventory contains information about every employee's work experience, work preferences,
test scores, interests, and special skills or proficiencies. The skills inventory system provides
information for many personnel decisions.
Many organizations review the work of employees on a regular basis to make decisions
regarding merit pay, pay increases, transfer, or promotion. Typically, a new employee is
evaluated at the end of the first four months and other employees are evaluated semi-
90
annually. These reviews provided by the employee evaluation information systems are often
called performance appraisals. The data for performance appraisals are frequently collected
by administering employee appraisals forms to each employee's immediate superior. The
forms may also be given to peers, the employees themselves, and even customers or clients.
The information inputs to the job analysis and design information system include data
obtained from interviews of supervisors and workers and affirmative action guidelines. Inputs
also include information from sources external to the firm, such as labor unions, competitors,
and governmental agencies. The outputs of the job analysis information system are job
descriptions and job specifications.
To develop recruitment plan and monitor its success, a recruiting information system is
necessary to collect and process the many different types of information needed to construct
the plan. These include a list of unfilled positions; the duties and requirements of these
positions; lists of planned employee retirements, transfers or terminations; information about
the skills and preferences of current employees; and summaries of employee appraisals. The
sources of recruitment, affirmative action plans, information about the success of recent
recruitment activities must also be included in the information systems.
Fringe benefit is anything in addition to the basic salary and over-time pay to an employee.
Information on the benefits and compensation packages will help managers to make informed
decisions.
91
There are two types of human resource planning that are strategic in nature. These are
manpower planning, or staffing planning, and program planning.
Manpower Planning
Organizations that are involved in long-term strategic planning, such as those planning to
expand into new market areas, or to construct new factories or offices in new locations, or to
add new products, will need information about the quantity and quality of the work force that
is available to achieve their goal. Manpower planning serves this purpose. This type of
planning involves identifying the human resources needed to meet the organizational
objectives specified in the strategic plan. This means forecasting the supply and demand of
the required work force. These forecasts are estimates of the characteristics, quantity, and
pricing of the labour force needed to achieve the long-term plants of the organization.
Identifying the types and quantities of workers needed for the strategic plan is forecasting the
demand for human resources. Identifying the human resources available internally and
externally is forecasting the supply of those human resources. Forecasting demand and
supply can be done on a macroeconomic level or a microeconomic (more specific to the
organization) level.
Program Planning
A second strategic planning function is to develop the policies, procedures, and activities that
will achieve the human resource needs spelled out in the manpower plan. Two key activities
in program planning are job analysis and design and recruiting. Job analysis and design is
essential to describe the work force required by the organization. Recruiting plans must be
developed to acquire the right kinds of workers in the right amounts to fill the jobs described.
Where there are insufficient workers with the right skills, training programs may have to be
developed, or the jobs may have to be redefined to fit the skills of the available work force.
92
• Collecting appropriate data and converting them to information and knowledge for
improved timeliness and quality of decision making
• Producing a greater number and variety of accurate and real-time HR-related reports
It supports the senior management of a firm and the strategic planning function. Senior
executives need information on changing government policies, demographics, the actions of
competitors, and changing market conditions now and in the future. Executive information
systems deliver news, reports prepared by external services, and broad overviews of the
performance of the company, and in some cases permit senior executives to "drill down" into
the company to discover how the numbers were produced, who was responsible for certain
actions, and who might have an answer for a problem.
It is the Information system at the management level of an organization that serve the
functions of planning, controlling and decision making by providing routine summary and
93
exception reports. MIS serve the management level of organization as stated above with
online access to the organization’s current performance and historical records. Typically they
are oriented almost exclusively to internal, not environmental or external events. MIS depend
on TPS for their data. It summarize and report on the company’s basic operations. MIS
usually serve managers interest in weekly, monthly and yearly results not day to day
activities.
It supports middle managers whose job is to control the operations of the company on a daily,
monthly, and quarterly basis. An MIS can produce scheduled summary reports, exception
reports, and in some cases on-line ad hoc reports.
Decision support systems (DSS) are interactive, computer-based information systems that use
DSS software and a model base and database to provide information tailored to support semi
structured and unstructured decisions faced by individual managers. They are designed to
use a decision makers own insights and judgments in an ad hoc, interactive, analytical
modelling process leading to a specific decision.
It supports middle management and information workers who need assistance with semi-
structured and unstructured problems. Decision support systems usually contain analytic
models that permit the users to stimulate the business and to understand how to react to a
change in business conditions.
DSS help managers make decisions that are unique, rapidly changing, and not easily
specified in advance. They address problems where the procedure for arriving at solution
may not be fully predefined in advance. Although DSS use internal information from TPS
and MIS, they often bring in information from external sources, such as current stock prices
or product prices of competitors.
In order to better understand a decision support system, let’s compare the characteristics of
MIS system with those of a DSS system:
MIS DSS
94
Structured & Semi-structured decisions Un-structured decisions
sessions
quick responses
iterative process
Check point?
MIS and DSS are similar in terms of the nature of decisions they address. True or
False?---------------------------------------------
Intelligence
95
Is there a problem?
Yes No
Design
What are the alternatives?
Perceptual ability refers to the ways a decision maker perceives a decision problem. If a
decision maker has experience dealing with a similar problem, the problem-solving situation
will not seem as complex and as uncertain as in a case where his or her background with a
similar situation is limited.
Information capacity is important, because all decision making requires an information base.
In complex decision-making situations, decision makers who are receptive to new
information are better prepared to handle the cognitive demands of information search when
they are faced with difficult or uncertain tasks. In contrast, dogmatic decision makers tend to
make rapid decisions based on little information. In either case, decision makers resist
changing a decision once it has been made.
96
The other two attributes that account for differences in decision-making behaviour are risk-
taking propensity and aspiration level. In risky situations, decision makers are more uncertain
about outcomes and possible loss of resources. The aspiration level of decision makers also
influences their effectiveness in identifying problems, evaluating alternatives, and making
choices. In general, decision makers attempt to achieve optimal standard and prior
experiences of success or failure and knowledge of results both influence this standard.
Maximizing when the outcome of a decision is clear, and the alternatives are well
established, the decision maker will make the decision that maximizes the desired outcome.
The maximizing approach assumes that the decision maker is rational and is aware of the
probabilities of each alternative.
Satisfying Since many decisions are made in situations of uncertainty, decision makers are
willing to settle for less than maximum utility. According to Simon (1960), decision makers
display rationality only within limits imposed by their experience, background, and
awareness of alternatives in a given decision situation. A decision maker will set up a
reasonable aspiration level and will reach for possible alternatives until she or he finds one
that achieves this level. Simon calls this satisfying because the decision maker will terminate
his or her search as soon as a satisfactory alternative is found.
Incrementalzing In the third decision-making strategy, the decision maker attempts to take
small steps away from the existing state toward a desired state. This approach may neglect
important outcomes because the alternatives considered are generally familiar to the decision
maker.
97
A decision support system should enable the decision maker to apply the right decision rules
to a problem, rather than using standard rules that may not apply because of changing
conditions. For example, it would be ineffective to apply an inventory reorder model assigned
for slow-moving items to a problem situation involving fast-moving items. As you will see in
the next section, a decision support system provides the decision maker with the flexibility to
explore alternatives by using appropriate data and models.
1. Data-Driven DSS
The first generic type of Decision Support System is a Data-Driven DSS. These systems
include file drawer and management reporting systems, data warehousing and analysis
systems, Executive Information Systems (EIS) and Spatial Decision Support Systems.
Data-Driven DSS take the massive amounts of data available through the company’s TPS
and MIS systems and cull from it useful information which executives can use to make
more informed decisions.
Data- Driven DSS emphasize access to and manipulation of large databases of
structured data and especially a time-series of internal company data and sometimes external
data.
2. Model-Driven DSS
A second category, Model-Driven DSS, includes systems that use accounting and
financial models, representational models, and optimization models. Model-Driven DSS
emphasize access to and manipulation of a model. Simple statistical and analytical tools
provide the most elementary level of functionality.
Model-Driven DSS were isolated from the main Information Systems of the
organization and were primarily used for the typical “what-if” analysis. That is, “What
if we increase production of our products and decrease the shipment time?” These systems
rely heavily on models to help executives understand the impact of their decisions on the
organization, its suppliers, and its customers.
3. Knowledge-Driven DSS
Knowledge-Driven DSS can suggest or recommend actions to managers. These DSS are
personal computer systems with specialized problem solving expertise. The “expertise”
98
consists of knowledge about a particular domain, understanding of problems within
that domain, and “skill” at solving some of these problems. A related concept is Data
Mining. It refers to a class of analytical applications that search for hidden patterns in
a database.
4. Document-Driven DSS
It integrates a variety of storage and processing technologies to provide complete
document retrieval and analysis. The Web provides access to large document databases
including databases of hypertext documents, images, sounds and video. Examples of
documents that would be accessed by a Document-Based DSS are policies and procedures,
product specifications, catalogues, and corporate historical documents, including minutes of
meetings, corporate records, and important correspondence. A search engine is a powerful
decision aiding tool associated with a Document-Driven DSS.
A relatively new targeted user group for DSS made possible by new technologies and the
rapid growth of the Internet is customers and suppliers. We can call DSS targeted for external
users. An Inter organizational DSS, the public Internet is creating communication links for
many types of inter-organizational systems, including DSS. An Inter-Organizational DSS
99
provides stakeholders with access to a company’s intranet and authority or privileges to use
specific DSS capabilities.
Companies can make a Data-Driven DSS available to suppliers or a Model-Driven DSS
available to customers to design a product or choose a product. Most DSS are Intra-
Organizational DSS that are designed for use by individuals in a company as “standalone
DSS” or for use by a group of managers in a company as a Group or Enterprise-Wide DSS.
7. Function-Specific or General Purpose DSS
Many DSS are designed to support specific business functions or types of businesses and
industries. We can call such a Decision Support System a function-specific or industry-
specific DSS. A Function-Specific DSS like a budgeting system may be purchased from a
vendor or customized in-house using a more general-purpose development package. Vendor
developed or “off-the-shelf” DSS support functional areas of a business like marketing or
finance; some DSS products are designed to support decision tasks in a specific industry like
a crew scheduling DSS for an airline. A task-specific DSS has an important purpose in
solving a routine or recurring decision task. Function or task-specific DSS can be further
classified and understood in terms of the dominant DSS component that is as a Model-
Driven, Data-Driven or Suggestion DSS. A function or task-specific DSS holds and derives
knowledge relevant for a decision about some function that an organization performs (e.g., a
marketing function or a production function). This type of DSS is categorized by purpose;
function-specific DSS help a person or group accomplish a specific decision task. General
purpose DSS software helps support broad tasks like project management, decision analysis,
or business planning.
Check point?
List down the types of DSS in their generic order?
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------
100
4.5.6 Components of DSS
Academics and MIS staffs have discussed building Decision Support Systems in terms of
three major components:
A manager, for example, would like to view comparative sales data in tabular form whereas
an architect creating a design plan would be more interested in viewing the result of analysis
in a graphical format. The present-day decision support system built using the Web-based
interface provides its users some special capabilities like better interactivity, facility for
customization and personalization, and more ease of use.
2. The data base: The DSS database is a collection of current or historical data from a
number of applications or groups. It may be a small database residing on a PC that
contains a subset of corporate data that has been downloaded and possibly combined
with external data.
Alternatively, the DSS database may be a massive data warehouse that is continuously
updated by major corporate TPS (including enterprise systems and data generated by Web
site transactions). The data in DSS databases are generally extracts or copies of production
databases so that using the DSS does not interfere with critical operational systems. Generally
it provides:
Very well organized data.
Very easy access for a large variety of the applications needed.
Data integrity that is to be maintained in a very efficient way.
3. The DSS software system -The DSS software system contains the software tools that
are used for data analysis. It may contain various OLAP tools, data-mining tools, or a
collection of mathematical and analytical models that easily can be made accessible to
the DSS user. A model is an abstract representation that illustrates the components or
relationships of a phenomenon. A model can be a physical model (such as a model
airplane), a mathematical model (such as an equation), or a verbal model (such as a
description of a procedure for writing an order). Each decision-support system is built
101
for a specific set of purposes and makes different collections of models available
depending on those purposes.
Perhaps the most common models are libraries of statistical models. Such libraries usually
contain the full range of expected statistical functions, including means, medians, deviations,
and scatter plots. The software has the ability to project future outcomes by analyzing a series
of data. Statistical modeling software can be used to help establish relationships, such as
relating product sales to differences in age, income, or other factors between communities.
Optimization models, often using linear programming, determine optimal resource allocation
to maximize or minimize specified variables, such as cost or time. A classic use of
optimization models is to determine the proper mix of products within a given market to
maximize profits.
Forecasting models often are used to forecast sales. The user of this type of model might
supply a range of historical data to project future conditions and the sales that might result
from those conditions. The decision maker could vary those future conditions(entering, for
example, a rise in raw materials costs or the entry of a new, low-priced competitor in the
market) to determine how new conditions might affect sales. Companies often use this
software to predict the actions of competitors. Model libraries exist for specific functions,
such as financial and risk analysis models.
102
developed to support decisions that are so different each time that it would be hard to develop
a standard set of procedures for programming them. Such decisions may be specific and may
relate to a one-to-only situation. An effective decision support system needs to incorporate
the following features.
To begin with, a decision support system must support semi structured and unstructured
decisions. Semi structured and unstructured problems involve a decision-making process that
can't be defined before actually going through the process of making the decision. For
example, budget analysis is a structured problem but budget preparation is unstructured
problem.
An effective decision support system should support the three phases of the decision making
process: intelligence, design and choice. At each phase of the decision-making process,
different operations occur. During the intelligence phase, data are collected as a basis for
diagnosing a problem or a situation requiring a decision. When alternatives are weighted
during the design phase, data may be manipulated or values may be assigned to each
alternative. A simulation of the results of the alternatives or statistics describing them may be
useful operations for choosing the best option.
Decision support systems must support decision making at all levels of the organization.
Since some decisions require communications among decision makers at all levels, decision
support systems need to support group decision making. In some cases, decisions are made
sequentially, with each decision maker responsible for part of the decision before passing it to
on to the next decision maker. Other decisions require a pooling of knowledge and result
from negotiation and interaction among decision makers. A decision support system should
support interaction among decision makers.
103
decision support system should provide them. Workspaces for displaying data representations
or for preserving intermediate results from operations are useful.
Data access.
What-if analysis
Sensitivity analysis
Goal-seeking analysis
Optimization analysis
104
Let’s briefly look at each type of analytical modelling that can be used for decision support:
II. Sensitivity Analysis: Sensitivity analysis is a special case of what if analysis. Typically,
the value of only one variable is changed repeatedly, and the resulting changes on other
variables are observed. So, sensitivity analysis is really a case of what-if analysis involving
repeated changes to only one variable at a time. Some DSS packages automatically make
repeated small changes to a variable when asked to perform sensitivity analysis. Typically,
sensitivity analysis is used when decision makers are uncertain about the assumptions made
in estimating the value of certain key variables. In our previous spreadsheet example, the
value of revenue could be changed repeatedly in small increments, and the effects on other
spreadsheet variables observed and evaluated. This would help a manager understand the
impact of various revenue levels on other factors involved in decisions being considered.
III. Goal-seeking analysis: Goal-seeking analysis reverses the direction of the analysis done
in what-if and sensitivity analysis. Instead of observing how changes in a variable affect
other variables, goal-seeking analysis (also called how analyses can) sets a target value or a
goal for a variable and then repeatedly changes other variables until the target value is
achieved. For example, you could specify a target value or goal of 2 Million Birr for net
profit after taxes for a business venture. Then you could repeatedly change the value of
revenue or expenses in a spreadsheet model until a result of 2 Million Birr is achieved. Thus,
you would discover what amount of revenue or level of expenses the business venture needs
to achieve in order to reach the goal of 2 Million Birr in after-tax profits. Therefore, this
105
form of analytical modelling would help answer the question, “How can we achieve 2
Million Birr in net profit after taxes?” instead of the question, “What happens if we change
revenue or expenses?” Thus, goal seeking analysis is another important method of decision
support.
Table 4.2 Activities and Examples of the Major Types of Analytical Modelling
106
Type of analytical Activities and Examples
Modelling in DSS
Optimization analysis Finding an optimum value for selected variables, given certain
constraints.
107
To most businesses, manual systems present numerous problems that are solvable by
customer and communications technologies:
Error Level: with manual systems, an uncomfortable level of error often exists. Frequently,
clerks look up the wrong prices, add prices incorrectly on invoices, or produce garbled
journal entries or source documents. Sickness, worry moodiness, and other inherently human
variables can also contribute to high error rates in manual systems.
Temporary or Permanent Loss Of Data: source documents and file folders are easily lost
or misplaced. This often results in lost customer payments and delayed purchases or
payments.
Labour Intensity: manual systems are labour intensive and, therefore, costly. For instance,
data from a single transaction often have to be transcribed several times, and many types of
low-volatility data (data that change infrequently, such as product descriptions and customer
names or addresses) have to be re-recorded by clerks every time a new transaction takes
place. Additionally, a lot of time is wasted coordinating data from department; for instance
making phone calls to trace the status of a customer order.
Poor Level of Service: as can be surmised from the last example, the level of service
support in manual systems is often inferior. For instance, customers like to know
immediately if goods are in stock, when goods are not in stock in stock will be arriving, when
they can expect and order to arrive, what their current status is regarding payments, and so
on. This level of information support is difficult to achieve with a manual system.
Poor Response: virtually everything takes longer to do with a manual system. For example,
when orders are taken, the order-entry department might have to contact the accounts
receivable department for a credit check before an order can be validated. Today, many
computerized order-entry operations are connected to a centralized database and, when a
customer telephones, credit status can be verified immediately. As another example, if a
manager wants to find out if a customer has ordered a specific type of product in the last
month, the manager might have to search through mounds of documents to find the answer.
108
A transaction processing system is a computerized system that performs and records the daily
routine transactions necessary to conduct business. Examples are sales order entry, hotel
reservation systems, payroll, employee record keeping, and shipping. At the operational level,
tasks, resources, and goals are predefined and highly structured. The decision to grant credit
to a customer, for instance, is made by a lower level supervisor according to predefined
criteria.
A transaction processing system supports the processing of a firms business transaction. For
example, the TPS of a department store can record customer purchases, prepare billings to
customers, and order merchandise from suppliers-as well as interrelate these task and others
into an overall accounting system. The TPS of a college or university, on the other hand,
helps perform such tasks as enrolling students in courses, billing students for tuition, and
issuing pay checks to faculty.
2. A TPS is the data life-line for a company because it is the source of data for other
information systems, such as MIS and DSS (Decision Support Systems). Hence,
if the TPS shuts down, the consequences can be serious for the organization
3. A TPS is also the main link between the organization and external entities,
such as customers suppliers, distributors, and regulatory agencies
4. TPS exist for the various functional areas in an organization, such as finance,
accounting, manufacturing, production, human resources, marketing quality
control, engineering, research and development. Until a few years ago, many
companies viewed the TPS for each business function as separate entity with little or
no connection to other systems in the company. Today, however, many companies
109
are trying to build cross-functional TPS to promote the free exchange of
information among different business units.
Check point
Dear learners, MIS is dependent on TPS for its data. Explain why?
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
1. Internal Transactions: Those transactions, which are internal to the company and are
related with the internal working of any organization. For example, Recruitment Policy,
Promotion Policy, Production policy etc.
2. External Transactions: Those transactions, which are external to the organization and
are related with the external sources, are regarded as External Transaction. For example
sales, purchase etc.
1. Data entry
2. Data Capture
3. Data validation
4. Processing and revalidation
5. Storage
6. Output generation
7. Query support
110
The first step in the transaction processing cycle involves data entry. To be processed,
transaction data must first be entered into the system. Documents generated at the point
where a transaction occurs are called source documents and become input data for the
system. The use of automated methods of data entry is known as source data automation.
Optical character recognition (OCR) devices, such as optical scanning wands and
grocery checkout scanners.
Other technologies, including electronic mice, light pens, magnetic stripe cards, voice
input, and tactile.
We could capture transaction data as close as possible to the source that generates the data.
Salespersons capture data that rarely changes by prerecording it on machine-readable
media, or by storing it on the computer system.
There are two steps in validation: error detection and error correction. Error detection is
performed by one set of control mechanisms, error correction is performed by another.
Some commonly used error detection procedures are checking the data for appropriate
font (text, numbers, etc.), checking for aberrations (values that are too low or too high), and
checking for missing data, invalid data, and inconsistent data.
111
Missing data refers to fields that are missing a mandated data value. For example, if the
number of hours worked by a part-time employee is missing on a payroll form; that is a
missing-data error.
Invalid data is data that is outside the range for example, if the number of hours worked by a
part-time employee is 72 hours per week instead of the 1120 hours, then we have invalid
data.
Inconsistent data means that the same data item assumes different values in different
places with-out a valid reason.
Once the accuracy and reliability of the data are validated, the data are ready for processing.
There are two methods to process the transactions:
I. Online transaction processing (OLTP) is the almost instantaneous processing of data. The
term online means that the input device is directly linked to the TPS and therefore the data
are processed as soon as it is entered into the system. Input device may be at a remote
location and be linked to the system by networks or by telecommunications systems. Some
examples of online transaction processing are ATM transactions, student registration for
classes. The processing of flight reservations is another good example of an online
system in which data are processed.
II. Batch Processing, in which transactions are accumulated over time and processed
identically. Batch processing may be done on a daily, weekly, or monthly basis or any
other time period appropriate to the application. For example, a company may process the
travel expenses of its employees on a monthly basis, whereas Batch processing usually
involves.
Processed data must be carefully and properly stored for future use. Data storage is a critical
consideration for many organizations because the value and usefulness of data diminish if
data are not properly stored. The kind of processing and the type of storage medium are, to
some extent, related issues. For example, magnetic tape is often used to store data that is
112
Batch processed. However, online transaction processing cannot be done on magnetic tape; it
relies on other types of storage media, such as magnetic disks.
Once data has been input, validated, processed, revalidated and stored, the output can be
communicated to decision makers in two ways:
The last step in processing a transaction is querying (asking questions of) the system. Query
facilities allow users to process data and information that may otherwise not be readily
available. For example, a sales manager may query the system ‘find the number of
damaged items in a given store’. Many transaction processing systems allow you to make
inquiries and receive responses concerning the results of transaction processing activity.
Typically, responses are displayed in a variety of pre-specified formats or screens.
Check point?
What do you understand by inconsistent
data?----------------------------------------------------------------------------------------------------------
-------------------------------------------
Give some examples for internal and external transactions that may be carried out at Wollo
University.---------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
--------------------------------------------------
113
Chapter summary
In this chapter, you looked at the operational, tactical and strategic levels of information
systems across financial production/manufacturing, marketing and human resource functional
areas of the organization. In doing so, you examined the nature, features and benefits of
the information systems across various levels of the organizations functional areas.
Subsequently, you examined the Decision Support System. Under which you examined the
usefulness of the DSS to managers and its difference with MIS. You also highlighted the
different types of DSS and the components of DSS. Furthermore you continue the discussion
about the capabilities of DSS and the four important types of DSS analytical modelling
namely What-if analysis, Sensitivity analysis, and Goal-seeking analysis and Optimization
analysis
Finally, you described the Transaction Processing System. You began the session by
explaining what the TPS means. Thereafter, you described the different types and
characteristics of the Transaction processing systems. You brought the session to an end by
discussing the various steps involved in the process of the TPS.
REVIEW QUISTIONS
114
CHAPTER FIVE
Chapter objectives
At the end of this unit students will be able to
Define the term knowledge management
Describe the theory knowledge management.
Explain KM sharing.
Explain technologies to support KM
Evaluate KM application in organizations.
INTRODUCTION
Dear students before proceeding to knowledge management, let us start with one basic
question.
What is knowledge?
Knowledge refers to interconnected information on what something is, why something
happens, and how to do something.
- What: definitions of concepts and relationships, taxonomies
- Why: understanding cause-effect relationships
- How-to, know-how: analysis/synthesis; methods, procedure for generating new knowledge
115
There is an important distinction between data, information, knowledge, and wisdom. In the
information technology context, knowledge is very distinct from data and information.
Whereas data are a collection of facts, measurements, and statistics, information is organized
or processed data that are timely (i.e., inferences from the data are drawn within the time
frame of applicability) and accurate (i.e., with regard to the original data). Knowledge is
information that is contextual, relevant, and actionable.
For example:
Data: 32, 3, 15, 2019
Information: 32 new cases of tuberculosis have been reported in the last three
months which is up from 15 from the same time in 2019.
Knowledge: You know this trend is alarming and signals a need to understand it and
take corrective action.
Wisdom: You undertake a literature review; convene an expert panel to generate
recommendations for immediate and long-term action.
116
5.2 DEFINITIONS OF KNOWLEDGE MANAGEMENT(KM)
117
unstructured manner. This structuring of knowledge enables effective and efficient
problem solving, dynamic learning, strategic planning, and decision making.
KM is the systematic process by which knowledge needed for an organization to
succeed is created, captured, shared and leveraged.
KM is a process used by organizations and communities to improve how business is
conducted by leveraging data and information that are gathered, organized, managed,
and shared.
KM is regarded as collection, distribution and efficient use of knowledge resources. It
is a process of knowledge creation, validation, presentation, distribution and
evaluation.
KM is a set of procedures, infrastructures and technical and managerial tools,
designed towards creating, sharing, leveraging information and knowledge within and
across organizations.
KM is a systematic and integrative process of coordinating organization wide
activities of acquiring, creating, storing, sharing, diffusing and deploying knowledge
by individuals and groups, in pursuit of organizational goals.
KM initiatives focus on identifying knowledge, explicating it in such a way that it can be
shared in a formal manner, and leveraging its value through reuse. KM is understood to be an
umbrella term encompassing the many unique but related facets of knowledge – exchange,
transfer and uptake among them.
118
Techno-centric theory focuses on technology and the process of designing technology
enablers to help facilitate the flow of knowledge and the storage of information
KM and organizational learning theory almost always take root in the interaction and
relationship between these two types of knowledge (explicit and tacit). This concept has been
introduced and developed by Nonaka in the 90's (e.g. Nonaka, 1994) and remains a
theoretical cornerstone of this discipline.
I. Explicit Knowledge:
This type of knowledge is formalized and codified, and is sometimes referred to as know-
what (Brown & Duguid 1998). It is therefore fairly easy to identify, store, and retrieve
(Wellman 2009). This is the type of knowledge most easily handled by KMS, which are very
effective at facilitating the storage, retrieval, and modification of documents and texts.
It deals with more objective, rational, and technical knowledge (data, policies, procedures,
software, documents, etc.). Explicit knowledge examples are the policies, procedural guides,
white papers, reports, designs, products, strategies, goals, mission, and core competencies of
the enterprise and the information technology infrastructure. It is the knowledge that has been
codified (documented) in a form that can be distributed to others or transformed into a
process or strategy without requiring interpersonal interaction. From a managerial
perspective, the greatest challenge with explicit knowledge is similar to information. It
involves ensuring that people have access to what they need; that important knowledge is
stored; and that the knowledge is reviewed, updated, or discarded.
119
Explicit knowledge has also been called leaky knowledge because of the ease with which it
can leave an individual, document, or the organization, after it has been documented.
II. Tacit Knowledge
This type of knowledge was originally defined by Polanyi in 1966. It is sometimes referred to
as know-how is usually in the domain of subjective, cognitive, and experiential learning; it is
highly personal and difficult to formalize. Tacit knowledge is the cumulative store of the
experiences, judgement, mental maps, insights, acumen, expertise, know-how, trade secrets,
skill sets, rule of thumb, understanding and learning that an organization has. Tacit
knowledge is found in the minds of human stakeholders. It includes cultural beliefs, values,
attitudes, mental models, etc. as well as skills, capabilities and expertise (Botha et al 2008).
Tacit knowledge has been called sticky knowledge because it may be relatively difficult to
pull it away from its source. Successful transfer or sharing of tacit knowledge usually takes
place through associations, internships, apprenticeship, conversations, other means of social
and interpersonal interactions, or even through simulations.
Tangible Intangible
Physical objects, e.g. in documents or databases Mental objects, i.e. it's in people's head's
120
Generally Most KM systems deal with explicit knowledge (e.g., tangible knowledge that can
be categorized and organized). Tacit knowledge tends to be more valuable, but also more
challenging to manage, than explicit knowledge. Social networking attempts to make
knowledge more accessible by to cataloguing an organization’s human capital. By making
that catalogue available to individuals in an organization, tacit knowledge can be captured
and transformed into discrete information that can searched and organized.
Check point
There are four different types of knowledge support systems that will be discussed in this
section. These are related to:
The creation of knowledge
The distribution of knowledge
The capture and codification of knowledge, and
The sharing of knowledge
Create Distribute
Capture Share
121
Fig 5.2. Knowledge management support systems
I. Creation of knowledge
Knowledge creation is one of the main activities of knowledge workers. The following are
facilities required to help knowledge workers actually create knowledge. To help knowledge
workers create knowledge, the organization must provide the appropriate software as well as
the correct working environment to support those workers.
1. External knowledge base to provide appropriate input for the knowledge worker.
Information concerning the activities of competitor, requirements of the market and
deficiencies in existing products are all necessary items to help the worker improve
existing products and create new knowledge.
2. A user-friendly interface allowing quick access to appropriate information as well as
software applications such as MS projects and CAD tools to help design new
products.
3. Appropriate computer hardware, with large memory and sufficient processing power
to run the more advanced software applications.
II. Capture and codification of knowledge
Capturing knowledge involves entering knowledge into the computer systems. Codifying
involves finding the rules that explain how that knowledge is used. Both data and knowledge
workers can be involved in capturing and codifying knowledge, because either group of
workers could start to provide the knowledge to be entered into the computer system.
Similarly, both types of workers could use the output from a computer system that has
specific knowledge entered into it. However, programming and establishing the computer
system itself is likely to be a specialist task, and will therefore apply to knowledge workers
only.
The idea of capturing and codifying knowledge in a computer system is to try and mimic
human thought and decision-making processes. One of the objectives of computer research is
to have a computer, or an artificial intelligence (AI), that can think like a human being.
122
However, the range of possibilities shows that some form of computer system could replace
both data and knowledge workers. See the following Artificial Intelligence areas.
Expert systems
Expert systems are information systems used to make choices that would normally be
performed by a domain expert such as in the diagnosis of a problem. Knowledge to assist in
these problems or other similar applications can be captured in an expert system. The expert
system is a computer program that makes decisions based on the rules provided in the
application itself. These rules are contained in a rule base, and are derived from human
experts in a specific area of knowledge.
Rules take on the IF-THEN format found in many computer programs. So IF one condition is
true, THEN a particular action takes place. However, if the condition is not true, a different
action or no action at all may occur. For example, a human may look out of the widow before
going a walk and use the rule IF it is raining THEN takes an umbrella; however, if it is not
raining, then no umbrella will be taken. This is called an inference engine.
Intelligent agents
Intelligent agents are software programs that are given to undertake a specific task. The
program is then left running while the human operator carries on with other tasks, the
program reports back to the operator either when the task is complete or when future
information is needed in order to complete the task. One of the main examples of intelligent
agents currently in use is a search program for the internet. The agent is not necessarily a
simple search carried out in a search engine such as Yahoo or Google, but a more detailed
program that reviews web pages in detail and monitors new information being added to the
Internet. When information is found matching the search criteria, than the agent then
continues searching for more web pages that meet the search criteria.
Some web agents are available to help with task such as shopping. Some web sites such as
Yahoo have agents to locate products you may be interested to purchase and provide
comparative prices for those products. The internet bookstore, Amazon has a product called
'eyes' which monitors your book purchases and emails you with a review of similar new
books in case you wish to purchase these as well.
123
Check point
Office automation systems are generally established and maintained by data workers.
However, one aim of the OAS is to increase the productivity of information workers.
The main activities carried out within the OAS will include:
124
Scheduling the work of data and knowledge workers.
Managing the different types of communication, such as digital, document and voice
messages, between workers.
Obtaining and managing data on the different groups such as employees, customers
and suppliers.
IV. Sharing of knowledge
Sharing knowledge within organization involves using the existing network systems to
provide access to database and a communication system to send knowledge to other workers
within the organization. Two specific software systems normally allow for the sharing of
knowledge, namely groupware and intranets. These systems are explained in this section.
i. Groupware fundamentals
Groupware products allow for the sharing of information between different workers within an
organization. Groupware systems will provide a variety of services to workers, as explained
below.
Part of groupware involves fast and efficient communication systems between workers in
many diverse locations. Groupware provides an email system across the whole WAN in the
organization. However, email is not simply sending message, the software will also maintain
a track, or 'thread' of comments and responses to a message. Similarly, messages can be
posted on to "bulletin boards" so all members on the board. Again, the thread principle means
that all workers back to that message in the board. Again, the thread principle means that all
workers can easily see who posted the initial message, and who has responded to that
message.
125
Scheduling meetings
Many workers maintain electronic diaries. Within groupware, these diaries will still be
available, but they will also be viewable via the network by all other workers, it dose enable
group meetings to be booked without having to contact all members individually.
Wide geographical distribution of workers has other problems such as actually attending
meetings. Groupware will allow the use of video conferencing so that meetings can take
place over the WAN. Each workstation is equipped with a small TV camera, and the software
combines each image on the computer screen to provide the impression of a real-time
meeting.
ii. Intranets
It uses by data and knowledge workers. An internet is essentially a private internet. The
internet uses the same technology as the internet, including a web browsers and pages written
in HTML (Hyper-text Markup language) but is kept secure by a firewall, which prevents
members of the public viewing the intranet pages. The firewalls consist of hardware and
software packages. It intercepts all managers between the intranet and the external internet
and only allows authorized communication to pass between the two systems.
Intranets do not require any special hardware to run, and so can be established over an
existing network relatively quick. The only software required is a web browser, such as
Internet explorer or Netscape navigator, and a computer to act as a wave server. Where some
form of group support is required in a hurry, an internet may provide a temporary, and in
some cases a lasting, solution.
An extension of the intranet idea is an extranet. In this system, some third party access is
allowed to the internal web sites. As mentioned above, intranets provide a relatively quick
and easy method of providing an information sharing system within organization where a
network has placing information that requires multiple accesses into some form of web-based
documentation. However, when this has been done the documents can be accessed from any
computer with browser software anywhere on the organization's network. Any information
that needs to be shared can be placed onto the intranet-this information can range from basic
reports through to technical documentation and procedures manuals. The intranet therefore
supports the work of data and knowledge workers.
126
Check point
Name two specific soft ware systems that are available and used to share
knowledge?-----------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------
---------------------------------------
The key technologies are communication and collaboration technologies that are web based
for internet and intranet usage, as well as mobile technologies such as PDA’s, PC’s,
telephone and videoconferencing. New technologies are rapidly emerging that act as
intelligent agents and assistants to search, summaries, conceptualize and recognize patterns of
information and knowledge. The following are common technologies that support
Knowledge management
Communication Technology
Collaboration technology
Information technology
Data storing Technology – Database Management System and Data Warehouses
Data Retrieval Technology – Database Management System and Data Mining
Artificial Intelligence
Decision Support System
Collaboration technologies provide the means to perform group work. Groups can work
together on common documents at the same time (synchronous) or at different times
(asynchronous), in the same place, or in different places. This is especially important for
127
members of a community of practice working on knowledge contributions. Collaborative
computing capabilities such as electronic brainstorming enhance group work, especially for
knowledge contribution. Additional forms of group work involve experts working with
individuals trying to apply their knowledge. This requires collaboration at a fairly high level.
Other collaborative computing systems allow an organization to create a virtual space so that
individuals can work online anywhere and at any time.
Internet, data mining, browsers, data warehouses, and useful program can arrange and
improve organization KM as well as gains competitive advantages. The role of information
technology (IT) in sharing, transfer and storage knowledge is very important. KM without IT
is useless for competitive ends. Knowledge formation and distribution are upgraded by IT
that improves communication, transfer, storage and sharing of organizational knowledge.
Thus, many organizations utilize IT, especially to store and transfer explicit knowledge.
Storage and retrieval technologies originally meant using a database management system to
store and manage knowledge. This worked reasonably well in the early days for storing and
managing most explicit knowledge, and even explicit knowledge about tacit knowledge.
However, capturing, storing, and managing tacit knowledge usually requires a different set of
tools. Electronic document management systems and specialized storage systems that are part
of collaborative computing systems fill this void.
128
It helps you keep your knowledge base content up-to-date
Its tools provide important knowledge management metrics
Decision Support Systems (DSS)- Decision Support Systems are popular tools that assist
decision-making in an organisation. The importance of Knowledge Management (KM) is also
recognised due to its contributions in decision-making in organisations. On the other hand the
organizations knowledge management system depends on its DSS.
129
3. Refine knowledge. New knowledge must be placed in context so that it is actionable. This
is where human insights (tacit qualities) must be captured along with explicit facts.
5. Manage knowledge. Like a library, the knowledge must be kept current. It must be
reviewed to verify that it is relevant and accurate.
Create Capture
Refine
Knowledge
Disseminate
Disseminate Manage Store
Store
Manage
Accessibility: All individuals can use the organization’s combined knowledge and
experience in the context of their own roles.
Availability: Knowledge is usable wherever it is needed whether from the home office, on
the road or at the customer’s side. This enables increased responsiveness to customers,
partners and co-workers.
Check point?
130
List the steps in knowledge management cycle.
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------
Knowledge Acquisition
Organizations acquire knowledge in a number of ways, depending on the type of knowledge
they seek. The first knowledge management systems sought to build corporate libraries of
documents, reports, presentations, and best practices and encouraged employees to create
documents based on their experiences. These efforts have been extended to include
unstructured documents (such as e-mail). In other cases organizations acquire knowledge by
developing online expert networks so that employees can “find the expert” in the company
who has the knowledge in his or her head.
Knowledge Storage
Once they are discovered, documents, patterns, and expert rules must be stored so they can be
retrieved and used by employees. Knowledge storage generally involves the creation of a
database. Document management systems that digitize, index, and tag documents according
to a coherent framework are large databases adept at storing collections of documents.
Management must support the development of planned knowledge storage systems,
131
encourage the development of corporate-wide schemas for indexing documents, and reward
employees for taking the time to update and store documents properly.
Knowledge Dissemination
Portal, e-mail, instant messaging, and search engine technology have resulted in an explosion
of “knowledge” and information dissemination. These technologies have added to an existing
array of groupware technologies and office systems for sharing calendars, documents, data,
and graphics. Rather than a shortage of information and knowledge, contemporary
technology seems to have created a deluge of information and knowledge. Here, management
and organizational activities play a critical role. Training programs, informal networks, and
shared management experience communicated through a supportive culture help managers
focus their attention on the important knowledge and information.
Knowledge Application
Regardless of what type of knowledge management system is involved, knowledge that is not
shared and applied to the practical problems facing firms and managers does not add business
value. To provide a return on investment, organizational knowledge must become a
systematic part of management decision making and become situated in existing and new
decision support systems. Ultimately, new knowledge must be built into a firm’s business
processes and key application systems, including enterprise applications for managing key
internal business processes and relationships with customers and suppliers. Management
supports this process by creating-based on new knowledge-new business practices, new
products and services, and new markets for the firm. More important, management helps to
create a cultural environment where decisions and processes are based on informed
knowledge, not guesswork.
Chapter summary
132
There are two types of knowledge namely, explicit and tacit. The type of knowledge that Most KM
systems deal with is explicit knowledge that is tangible knowledge that can be categorized and
organized easily since tacit knowledge is more challenging to manage, than explicit knowledge.
There are four different types of knowledge support systems namely the creation of
knowledge; the distribution of knowledge; the capture and codification of knowledge, and the
sharing of knowledge.
REVIEW QUISTIONS
1. What is knowledge management? Define it by referring different authors.
2. Write the applications of knowledge management in the organizations.
3. Discuss at least four types of knowledge management support technologies.
CHAPTER SIX
133
Chapter objectives
Introduction
Business information technology poses both security risks and ethical challenges. Personal
information stored in data banks may be used for criminal purposes. The anonymity of some
communication systems may lead to unethical behavior. Information technology isn’t all bad; it offers
many new ways to communicate and store information, but business managers must balance the
business potential with the possible adverse effects. Several laws govern information systems, but the
law often lags behind the technology. Businesspeople use ethics to bridge the gaps between new
technologies and eventual laws.
Business managers and those with access to information systems have the responsibility to act
ethically when using the technology. Some basic ideological rules govern the convergence of
technology and ethics. For example, many people believe that benefits involved in a technological
endeavour should outweigh the risks for all involved stakeholders. Some believe that business
managers have the ethical duty to ensure that anyone who could be affected by the technology is able
to understand and accept any risks involved.
Information system security- refers to measures put in place to protect information system
resources from unauthorized access or being compromised. Security vulnerabilities are
weaknesses in a computer system, software, or hardware that can be exploited by the attacker
to gain unauthorized access or compromise a system.
Information system Ethics refers to rules of right and wrong that people use to make
choices to guide their behaviors in using information system. It is Moral guidelines that
govern use of computers and information systems. Ethics in IS seek to protect and safeguard
individuals and society by using information systems responsibly. Most professions usually
have defined a code of ethics or code of conduct guidelines that all professionals affiliated
with the profession must adhere to.
134
Information privacy is the right of individuals and companies to restrict collection and use
of information about them. The following are some issues under information privacy
Employee monitoring- is using computers to observe employee computer use. Legal for
employers to use monitoring software programs
Electronic profile- Data collected when you fill out form on Web Merchants sell your
electronic profile often you can specify whether you want personal information distributed
cookie- Small file on your computer that contains data about you, Some Web sites sell or
trade information stored in your cookies, Set browser to accept cookies, prompt you to accept
cookies, or disable cookies
In a nutshell, a code of ethics makes individuals acting on their free will responsible and
accountable for their actions.
Although threats to information systems are evolving and abundant, they can all be broken down
under three categories:
Natural Threats: These can best be thought of as threats caused by nature like floods, quakes,
tornadoes, temperature extremes, hurricanes, and storms are all examples.
Unintentional Threats: These threats basically include system failure and the unauthorized or
accidental modification of software. Have you ever accidentally deleted an important file, or tripped
over a power cord?
Intentional Threats: these threats cover when someone purposely damages property or information.
Computer crimes are the best examples of intentional threats. Computer crimes include espionage,
identity theft, child pornography, and credit card crime. In addition, computer virus, Hardware Theft
and Vandalism, soft ware theft, information theft, and unauthorized access are commonly mentioned
threats. We will see them in the following section in detail.
135
6.2.1 Computer Virus
A Computer Virus is a malicious software program “Malware” that can infect a computer
by modifying or deleting data files, boot sector of a hard disk drive or causes a software
program to work in an unexpected manner.
A computer virus is a malicious program that self-replicates by copying itself to another
program. In other words, the computer virus spreads by itself into other executable code or
documents. The purpose of creating a computer virus is to infect vulnerable systems, gain
admin control and steal user sensitive data. Hackers design computer viruses with malicious
intent and prey on online users by tricking them.
A computer virus resides on a host computer and can replicate itself when executed. Virus
can steal user data, delete or modify files & documents, records keystrokes & web sessions of
a user. It can also steal or damage hard disk space, it can slowdown CPU processing. It
disturbs the normal working of a computer system. Virus attaches itself to files stored on
floppy disks, USBs, email attachments and hard disks. A file containing a virus is called
infected file. If this file is copied to a computer, virus is also copied to the computer.
136
when this material is downloaded. These websites may access the computer automatically
when the users visit them.
IV. Networks
Virus can spread if an infected computer is connected to a network. The internet is an
example of such network. When a user downloads a file infected with virus from the internet,
the virus is copied to the computer. It may infect the files stored on the computer.
V. Pirated Software
An illegal copy of software is called pirated software. Virus can spread if user installs
pirated software that contains a virus. A variety of pirated software is available in CDs and
from the internet. Some companies intentionally add virus in the software. The virus is
automatically activated if the user uses the software without purchasing license.
The latest and updated version of Anti-Virus and firewall should be installed on the computer.
The Anti-Virus software must be upgraded regularly.
USB drives should be scanned for viruses, and should not be used on infected computers.
Junk or unknown emails should not be opened and must be deleted straightaway.
Unauthorized or pirated software should not be installed on the computer.
Back up of data. The backup is used if the virus deletes data or modifies it. So back-up your
data on regular basis. There are some great soft wares that can back up your data
automatically.
Freeware and shareware software from the internet normally contain viruses. It is important to
check the software before using them.
Your best protection is your common sense. Never click on suspicious links, never download
songs, videos or files from suspicious websites. Never share your personal data with people
you don’t know over the internet.
137
6.2.2 Unauthorized access
Integrity-Integrity is the assurance that the information being accessed has not been altered
and truly represents what is intended. Just as a person with integrity means what he or she
says and can be trusted to consistently represent the truth, information integrity means
information truly represents its intended meaning. Information can lose its integrity through
malicious intent, such as when someone who is not authorized makes a change to
intentionally misrepresent something. An example of this would be when a hacker is hired to
go into the university’s system and change a grade.
138
Availability- Information availability is the third part of the CIA triad. Availability means
that information can be accessed and modified by anyone authorized to do so in an
appropriate timeframe. Depending on the type of information, appropriate timeframe can
mean different things. For example, a stock trader needs information to be available
immediately, while a sales person may be happy to get sales numbers for the day in a report
the next morning. Companies such as Amazon.com will require their servers to be available
twenty-four hours a day, seven days a week. Other companies may not suffer if their web
servers are down for a few minutes once in a while.
I. Authentication
The most common way to identify someone is through their physical appearance, but how do
we identify someone sitting behind a computer screen or at the ATM? Tools for
authentication are used to ensure that the person accessing the information is, indeed, who
they present themselves to be.
Authentication can be accomplished by identifying someone through one or more of three factors:
something they know, something they have, or something they are. For example, the most common
form of authentication today is the user ID and password. In this case, the authentication is done by
confirming something that the user knows (their ID and password). But this form of authentication is
easy to compromise (see sidebar) and stronger forms of authentication are sometimes needed.
Once a user has been authenticated, the next step is to ensure that they can only access the information
resources that are appropriate. This is done through the use of access control. Access control
determines which users are authorized to read, modify, add, and/or delete information. Several
different access control models exist.
139
III. Encryption
Many times, an organization needs to transmit information over the Internet or transfer it on external
media such as a CD or flash drive. In these cases, even with proper authentication and access control,
it is possible for an unauthorized person to get access to the data. Encryption is a process of encoding
data upon its transmission or storage so that only authorized individuals can read it. This encoding is
accomplished by a computer program, which encodes the plain text that needs to be transmitted; then
the recipient receives the cipher text and decodes it (decryption). In order for this to work, the sender
and receiver need to agree on the method of encoding so that both parties can communicate properly.
Both parties share the encryption key, enabling them to encode and decode each other’s messages.
IV. Backups
Another essential tool for information security is a comprehensive backup plan for the entire
organization. Not only should the data on the corporate servers be backed up, but individual
computers used throughout the organization should also be backed up. A good backup plan
should consist of several components.
V. Firewalls
Another method that an organization should use to increase security on its network is a
firewall. It is Security system consisting of hardware and/or software that prevents
unauthorized network access
A firewall can exist as hardware or software (or both). A hardware firewall is a device that is
connected to the network and filters the packets based on a set of rules. A software firewall
runs on the operating system and intercepts packets as they arrive to a computer. A firewall
protects all company servers and computers by stopping packets from outside the
organization’s network that do not meet a strict set of criteria. A firewall may also be
configured to restrict the flow of packets leaving the organization. This may be done to
eliminate the possibility of employees watching YouTube videos or using Face book from a
company computer.
140
VI. Intrusion Detection Systems
Another device that can be placed on the network for security purposes is an intrusion
detection system, or IDS. An IDS does not add any additional security; instead, it provides
the functionality to identify if the network is being attacked. An IDS can be configured to
watch for specific types of activities and then alert security personnel if that activity occurs.
An IDS also can log various types of traffic on the network for analysis later. An IDS is an
essential part of any good security setup.
Sorry, the computer is down is a well-known phrase to many end users. A variety of controls can
prevent such computer failure or minimize its effects. Computer systems fail for several reasons-
power failure, electronic circuitry malfunctions, telecommunications network problems, hidden
programming errors, computer viruses, computer operator errors, and electronic vandalism. Surge
protector protects computer and equipment from electrical power disturbances. Uninterrupted power
supply is the surge protector that provides power during power loss
Using firewalls and other security technologies, organizations can effectively protect many of
their information resources by making them invisible to the outside world. But what if an
employee working from home requires access to some of these resources? What if a
consultant is hired who needs to do work on the internal corporate network from a remote
location? In these cases, a virtual private network (VPN) is called for.
A VPN allows a user who is outside of a corporate network to take a detour around the
firewall and access the internal network from the outside. Through a combination of software
and security measures, this lets an organization allow limited access to its networks while at
the same time ensuring overall security.
141
devices use special-purpose sensors to measure and digitize a biometric profile of an
individual’s fingerprints, voice, or other physical trait. The digitalized signal is processed
and compared to a previously processed profile of the individual stored on magnetic disk. If
the profiles match, the individual is allowed entry into a computer facility or given access to
information system resources.
Besides the technical controls listed above, organizations also need to implement security
policies as a form of administrative control. In fact, these policies should really be a starting
point in developing an overall security plan. A good information-security policy lays out the
guidelines for employee use of the information resources of the company and provides the
company recourse in the case that an employee violates a policy. It code of conduct is a
Written guideline that helps determine whether computer action is ethical.
X. Physical Security
An organization can implement the best authentication scheme in the world, develop the best
access control, and install firewalls and intrusion prevention, but its security cannot be
complete without implementation of physical security. Physical security is the protection of
the actual hardware and networking components that store and transmit information
resources. To implement physical security, an organization must identify all of the vulnerable
resources and take measures to ensure that these resources cannot be physically tampered
with or stolen. These measures include the following.
Locked doors: It may seem obvious, but all the security in the world is useless if an intruder
can simply walk in and physically remove a computing device. High-value information assets
should be secured in a location with limited access.
Physical intrusion detection: High-value information assets should be monitored through the
use of security cameras and other means to detect unauthorized access to the physical
locations where they exist.
Secured equipment: Devices should be locked down to prevent them from being stolen. One
employee’s hard drive could contain all of your customer information, so it is essential that it
be secured.
142
Environmental monitoring: An organization’s servers and other high-value equipment should
always be kept in a room that is monitored for temperature, humidity, and airflow. The risk of
a server failure rises when these factors go out of a specified range.
Employee training: One of the most common ways thieves steal corporate information is to
steal employee laptops while employees are travelling. Employees should be trained to secure
their equipment whenever they are away from the office.
143
Chapter summary
Dear students could do summarize some of the main issues covered in this chapter?
Well, let us revise together. We begin the discussion by defining information system security
and ethics. Information system security refers to measures put in place to protect information
system resources from unauthorized access or being compromised. Whereas Information
system ethics refers to rules of right and wrong that people use to make choices to guide their
behaviors in using information system.
Next, we identify the various threats to information system including to computer virus
causes and its protection mechanisms, unauthorized access, hard ware and soft ware
vandalism.
Then after, we have discussed about the components of secured information that are
Confidentiality, Integrity and Availability.
Finally we concluded our discussion by elaborating various technologies that can be used to
ensure information security such as authentication, access control, encryption, backups,
firewalls intrusion detection systems, surge protector, sidebar biometric controls, security
policies and physical security.
REVIEW QUESTIONS
3. What is computer virus and in what condition your computer may get infected?
4. Discuss at least five technologies or tools that can be used to ensure information security.
144
ASSIGNMENT FOR THE COURSE MANAGEMENT INFORMATION SYSTEM
Part I. True/False
15. Information could be classified on the basis of the purpose for which it is
utilized, into three main categories namely strategic, tactical and operational
145
information. Mention and describe the sub systems of following information systems
at strategic, tactical and operational level.
I. Financial accounting information system
II. Marketing informational system
III. Manufacturing/production information system
IV. Human resource information system
16. List the threats to information that you knew of and state your experience in how
would you avoid the attack?
146