Yin Chen 2024 Application of Computer Information Management System in Universities in the Information Age
Yin Chen 2024 Application of Computer Information Management System in Universities in the Information Age
DOI 10.3233/JCM-247177
IOS Press
Abstract. The application of computer information management system (IMS for short here) in university management faces
problems such as incomplete system software and complex system design. Applying clustering algorithms (CA for short here) to
computer student IMS can help optimize the system’s overall effectiveness. This article constructed a computer student IMS
based on computer technology and applied it to the management of college students. This article also combined CA to conduct
relevant effectiveness tests on the system, in order to optimize the overall effectiveness of the system. Under the algorithm in
this article, the average connection speed for each user accessing the system was 9.17 Mbps. The average reaction time was
0.34 seconds, the average security level was 92.47%, and the highest memory usage rate of the system was 34.27%; Under the
decision tree algorithm, the average connection speed of each user accessing the system was 8.82 Mbps, and the average reaction
time reached 0.64 s. The average security level was 88.41%, and the highest memory usage rate was 42.58%. Under the artificial
neural network algorithm, the average connection speed of the system was 8.47 Mbps, the average response time was 0.86 s, and
the highest memory usage rate was 45.97%. Analyzing the data reveals that the algorithm introduced in this paper significantly
enhances system connection speed and reduces reaction time. This improvement not only enhances security measures but also
minimizes memory usage, effectively optimizing the overall efficiency of the system.
Keywords: Computer information management system, university management work, student information management, system
safety, clustering algorithm
1. Introduction
Many universities have also integrated this technology to build computer IMS, which are used in
university management work to improve the efficiency of management work. In the actual application
process of this system, there are also many problems, such as incomplete system software, vulnerabilities
in the system itself, and security risks in network software. The existence of these problems seriously
restricts the development of computer IMS. It is necessary to combine relevant technologies and methods
to effectively optimize the effectiveness of the system to improve its security and operational efficiency,
so that the system can better serve the management work of universities.
∗
Corresponding author: Yijun Chen, Informatization Center, Nantong University, Nantong, Jiangsu 226019, China. E-mail:
[email protected].
The information system is composed of computer hardware, computer software, information resources,
etc. It is mostly used to process various data information flow. The research on information systems is
also emerging in endlessly. Guha, Samayita explored the application of big data (BD) analysis in the
fields of information systems, operations management, and healthcare, and also discussed the future
potential and related challenges of BD applications in these areas. He proposed a framework for applying
BD in the fields of information systems, operations management, and healthcare [1]. Paustian, Keith
pointed out that two countries, Australia and Canada, are based on soil information systems and use soil
science and soil carbon quantification methods to support China’s climate change policies to promote
soil carbon sequestration in agricultural land. He also outlined a quantitative system and pointed out
that it can serve as a core component of the new global soil information system [2]. Al-Okaily, Aws
used DeLone and McLean information system success model to explore the effectiveness factors of
Accounting information system. He used a partial least squares structural equation model to collect
information data from 117 chief financial officers of Jordanian listed companies to test the research
model. The results indicate that information quality, service quality, and training quality have significant
positive contributions to organizational efficiency [3]. Karjalainen, Mari analyzed the reasons for em-
ployees’ participation in information system security behavior and pointed out that the dynamic nature of
information system security behavior has not been sufficiently considered in information system security
research. He proposed the use of inductive methods to explore the theoretical understanding of the
process of information system security behavior changes, which was inspired by dialectical thinking [4].
Brooks, Nita G. focused on assessing the skill requirements for information system security positions to
understand the expectations of security work. He emphasized issues related to course management and
analyzed 798 job advertisements, including exploring soft skills related to the field, as well as degree and
certification requirements. He also discussed the meaning of information systems courses and provided
some suggestions for future research [5]. However, these scholars’ research on information systems is not
comprehensive enough and further exploration is needed.
Information systems belong to human-machine integration systems that support the input, storage,
processing, output, and control of information. Other scholars have different views on the research of
information systems. Al-Qaysi, Noor searched and analyzed 2382 articles using information systems to
test education and information system theories/models, and selected 122 articles for further rigorous anal-
ysis. The research results indicate that the use and satisfaction theory and social constructivist theory are
considered the most widely used educational theories in social media. These results contribute to a better
understanding of social media research related to education and information system theory/models [6].
Zeiss, Roman proposed a new research direction for information systems to address the issue of neglecting
the sustainability potential of information systems in establishing circular material flows, which is how
information systems can help understand and develop circular material flows to enhance and expand the
use of products and components [7]. Astuty, Widia conducted a questionnaire survey on the employees of
Indonesian public enterprises in charge of managing Accounting information system, and analyzed the
data using partial least squares method. The research results emphasize the important role of enterprise
resource planning in managing the quality of accounting information system. Enterprise resource planning
is likely to improve the reliability, efficiency and flexibility of the quality of accounting information
system in Indonesian public enterprises [8]. Overall, there is not much research related to information
systems. In order to improve the research on IMS, it is necessary to study the application of computer
IMS in universities in the information age.
This article provides a specific analysis of the security issues in university computer IMS, and proposes
corresponding solutions to address these issues. By analyzing the current application status of this
L. Yin and Y. Chen / Application of computer information management system in universities 1559
system in university management, it is found that there are certain shortcomings. This article proposes
an optimization method for the application path of this system in university management. This article
also integrates computer technology to construct a computer student IMS, designs multiple functional
modules, and provides a detailed description of the content of each module. It improves the overall
efficiency of university management by applying the system to university management.
The operation of various activities in universities cannot be separated from the support of computer
IMS [9]. If there are security issues with computer IMS, the implementation of many educational activities
would be affected to a certain extent.
the system has not been optimized, which can affect the user experience [12]. The direct interface can
be said to be a key link in the data interaction of IMS, which would have a crucial impact on user
experience and work quality, and transmit data information to university managers, enabling them to
use advanced information functions to perfect its quality. In the actual design process, developers and
functional designers have focused on the functional application of the system, lacking attention to the
human-machine interface. This would lead to a complex user operation process, low user convenience,
and correspondingly increased labor and time costs for teaching management work. When users use the
system, they may also develop a certain level of resistance, which may have a negative impact on the later
management work.
Fig. 1. Design of the structural framework of the computer student IMS in universities.
3.1. CA
CA can filter and classify large-scale data, gather similar data together, classify them, and perform
data mining analysis on them [15]. Applying CA to the student IMS, the algorithm would collect student
1564 L. Yin and Y. Chen / Application of computer information management system in universities
information with similar features and group students who choose the same course according to the
corresponding learning objectives. This can facilitate the effective management of student information
by the system, thereby improving the management efficiency of the system and achieving the goal of
optimizing system effectiveness.
Assuming that the sample data in the computer student IMS is represented as Q = {q1 , q2 , · · · , qn },
W = {w1 , w2 , · · · , wn }. The distance between two objects can be represented by Euclidean distance,
with the formula:
v
u r
uX
e(qa , qb ) = t (qat − qbt )2 (1)
t=1
Among them, r represents the dimension of the sample data in the student IMS, and e(qa , qb ) represents
the distance between two objects.
Calculate the student data class in the student IMS using the formula:
1 X
wa = g (2)
n
q⊂Wa
Among them, q represents the center class of the n class, while wa represents the student data class.
In the CA, an iterative method is used to partition the data in the student IMS and calculate the objective
function. The formula is:
t X
X
U= e(p, Wa ) (3)
a=1 q⊂Wa
In order to verify that CA can effectively optimize the effectiveness of computer student IMS, this
article takes a computer student IMS in a certain university as the research object, and combines CA
to conduct experimental tests on the relevant effectiveness of the system. This article also conducted
comparative experiments on the system using decision tree algorithm and artificial neural network (ANN)
algorithm, and the experimental results are displayed below.
In the student IMS, users need a certain reaction time to complete corresponding tasks when accessing
web pages, downloading data information, and other related operations. The shorter the reaction time
of the system, the higher the operational efficiency of the system. From the data in Fig. 4, it can be
seen that under different algorithms, there are significant differences in the reaction time of the system
when each user performs related operations. Under the algorithm in this article, when each user operates
on the system, the reaction time of the system is relatively short, and the overall control is within 0.4
seconds. When user 3 performs related operations, the system’s reaction time reaches the shortest, 0.31
seconds. When user 4 performs related operations, the system’s reaction time reaches the longest, 0.38
seconds, and the average reaction time is 0.34 seconds. Under the decision tree algorithm, the reaction
time would be relatively longer for each user when performing operations. The maximum reaction time
reached 0.68 seconds, the minimum reached 0.61 seconds, and the average reaction time reached 0.64
seconds. Under the ANN algorithm, the reaction time would be longer when each user performs related
operations, with the longest reaction time reaching 0.87 seconds and the shortest being 0.81 seconds,
and the average reaction time reaching 0.84 seconds. In summary, under the algorithm proposed in this
article, the reaction time of the system is the shortest when each user performs related operations in the
system, demonstrating that the algorithm can successfully reduce the system’s reaction time and increase
its operating efficiency.
the algorithm proposed in this article, the system’s security level would be higher, indicating that this
algorithm can effectively improve the system’s security effectiveness and ensure the information security
of students.
usage of the system continues to increase as the number of users increases. When the number of users is
50, the system’s memory usage rate is 6.23%; When the number of users increased to 500, the system’s
memory usage increased to 42.58%. Under the ANN algorithm, the memory usage of the system is also
continuously increasing. When there are only 50 users, the memory usage of the system is 8.26%. When
the number of users reaches 500, the memory usage of the system is as high as 45.97%, accounting for
nearly half of the system’s memory. In summary, under the algorithm proposed in this article, the memory
usage of the system would be lower. It shows that the algorithm can optimize the memory usage of the
system and improve its operational efficiency.
4. Conclusions
The application of computer IMS can effectively improve the efficiency of management work, but there
are also many problems. This article analyzed the current application status of this system in university
management. In response to its current application status, some solutions have been proposed. This
article also constructed a university computer student IMS based on computer technology, and provided a
detailed description of each module of the system. This article also combined CA to conduct relevant
testing experiments on the effectiveness of computer student IMS. The experimental results show that
under the algorithm proposed in this paper, the system has faster connection speed, shorter reaction time,
higher security, and lower memory usage. It indicates that the algorithm can effectively improve the
system’s operational efficiency and overall effectiveness. Due to limitations in experimental conditions,
this experiment only conducted experimental analysis on connection speed, response time, security, and
memory usage, and did not conduct research on other aspects. In future research endeavors, Continuous
Assessment (CA) must consistently evolve to align with the evolving application requirements of the
student Information Management System (IMS) in university administration, thereby enhancing its
efficacy. This adaptive approach will offer more effective support in advancing the development of diverse
management activities within universities.
References
[1] Guha S, Subodha K. Emergence of big data research in operations management, information systems, and healthcare: Past
contributions and future roadmap. Production and Operations Management. 2018; 27(9): 1724-1735.
[2] Paustian K, Collier S, Baldock J, Burgess R, Creque J, DeLonge M, et al. Quantifying carbon for agricultural soil
management: from the current status toward a global soil information system. Carbon Management. 2019; 10(6): 567-587.
[3] Wang ETG, Tai JCF. Factors affecting information systems planning effectiveness: Organizational contexts and planning
systems dimensions. Information & Management. 2023; 40(4): 287-303.
[4] Karjalainen M, Suprateek S, Mikko S. Toward a theory of information systems security behaviors of organizational
employees: A dialectical process perspective. Information Systems Research. 2019; 30(2): 687-704.
[5] Brooks NG, Timothy HG, Steven AM. Information systems security job advertisement analysis: Skills review and
implications for information systems curriculum. Journal of Education for Business. 2018; 93(5): 213-221.
[6] Qaysi A, Noor NMN, Mostafa AE. A systematic review of social media acceptance from the perspective of educational
and information systems theories and models. Journal of Educational Computing Research. 2020; 57(8): 2085-2109.
[7] Zeiss R, Ixmeier A, Recker J, Kranz J. Mobilising information systems scholarship for a circular economy: Review,
synthesis, and directions for future research. Information Systems Journal. 2021; 31(1): 148-183.
[8] Astuty W, Pratama I, Basir I, Harahap JPR. Does enterprise resource planning lead to the quality of the management
accounting information system. Polish Journal of Management Studies. 2022; 25(2): 93-107.
[9] Kumar S, Vijay M, Abhinav S. Research in operations management and information systems interface. Production and
Operations Management. 2018; 27(11): 1893-1905.
[10] Heeks R, Angelica VO. Conceptualising the link between information systems and resilience: A developing country field
study. Information Systems Journal. 2019; 29(1): 70-96.
L. Yin and Y. Chen / Application of computer information management system in universities 1569
[11] Siponen M, Tuula K. Demystifying beliefs about the natural sciences in information system. Journal of Information
Technology. 2021; 36(1): 56-68.
[12] Samadi S. Theory of planned behavior and knowledge sharing among nurses in patient computer management system:
The role of distributive justice. Management Science Letters. 2018; 8(5): 427-436.
[13] Mukred M, Yusof ZM, Mokhtar UA, Sadiq AS, Hawash B, Ahmed WA. Improving the decision-making process in
the higher learning institutions via electronic records management system adoption. KSII Transactions on Internet and
Information Systems. 2021; 15(1): 90-113.
[14] Novak A, Daniel B, Tomas K. Product decision-making information systems, real-time sensor networks, and artificial
intelligence-driven big data analytics in sustainable Industry 4.0. Economics, Management and Financial Markets. 2021;
16(2): 62-72.
[15] Zou HL. Clustering algorithm and its application in data mining. Wireless Personal Communications. 2020; 110(1): 21-30.