Professional Documents
Culture Documents
Information Systems For Managers Informa
Information Systems For Managers Informa
for Managers
Information Systems for
Managers
This document is authorized for internal use only at IBS Campuses Batch of 2013-2015, Semester-I. No part of this publication
may be reproduced, stored in a retrieved system, used in a spreadsheet, or transmitted in any form or by any means - electronic,
mechanical, photocopying or otherwise. Transmission, copying or posting on web are violation of intellectual property rights.
C HAPTER 1
Source: http://www.imi-groups.com
S ECTION 1
3
Need for Information Video 1.1.2: An These resources have been briefly explained below:
Systems Introduction to
Figure 1.1.1: Information System Components
Business Information
Information systems carry
Systems
out certain functions that
would help in data analysis
and decision-making. Some
of the important functions
carried out by information
systems are as follows:
Accepting input in the
form of data resources
Processing the data resources into information
products
Storing the data resources
Source: Jessup Leonard M. and Joseph S. Valacich.
Generating output Information Systems Today. New Delhi: Prentice-Hall of
India Private Limited, 2005. Pg 5.
Controlling the performance of the system
components of Information Systems
The IS components include people resources (end users
and IS specialists), equipment (hardware and software
resources), data resources (data and knowledge bases)
and network resources (communications media and
network support). These resources carry out the input,
processing, output, storage and control activities, and
convert the data resources into information products.
Figure 1.1.1 represents the various IS components. It
provides an outline that focuses on the five basic
resources of information systems namely – people,
hardware, software, data and networks.
4
Video 1.1.3 : Business Information Systems
5
S ECTION 2
6
BUSINESS PROCESSES AND ISs services and develop innovative products and/or
services on a regular basis.
Information systems can Video 1.2.2: Business
be used by businesses to Perspective of IS - 2 Maintain an information database about the
achieve strategic customers. Target the customers based on their
advantages by improving previous purchases and sell this information to other
production methods and retailers.
by developing new
products and services. Global expansion.
Following are some of the Some of the other advantages that an organization can
strategic advantages that gain from using information systems are discussed in
a company can gain detail as follows:
through the use of
information systems: Improvements in Business Processes
Enhance the efficiency and effectiveness of business Information systems can be used to develop products,
operations. Create entry barriers to other competitive services and other competencies that will enable
firms. Encourage companies to
the suppliers to do achieve strategic
business with it advantages. The
and attract use of
customers to buy information
its products and/or systems helps in
services. streamlining the
operational and
Strengthen the managerial
organization’s Source:http://img.ehowcdn.com/ p r o c e s s e s . B y Source: http://technosysint.com/
relationships with improving their
the suppliers. business processes, organizations can cut costs,
Enhance the existing products and/or services, cus- improve quality and customer service, and develop
innovative products. The manufacturing process can be
tomize the products and/or
automated; computers are used in design, production
7
and engineering, in addition to the management of resources.
Organizations can use intranets, extranets, Internet and other
networks to interact within and with the outside world (i.,e,
distributors, customers, creditors, investors, etc). For
example, information systems can be used for connecting
manufacturers with dealers and suppliers. Improved business
processes can enable manufacturers improve production,
distribution, sales, etc.
8
S ECTION 3
Source: http://www.sanspareiltech.com/
9
A major goal of networking is scalability. Scalability is the
ability to increase Video 1.3.1 : Computer
s yste m Networking Tutorial -1
performance
gradually as the
workload increases.
For example, a
scalable network
system would be
one that can start Source:
w i t h j u s t a f e w http://www.playgroundchildren.com
nodes but can
easily expand to thousands of nodes. Any device which
is connected to the computer network can be termed as
a node in this case. Nodes can be computers, printers,
servers, routers, switches, cell phones, hubs, etc. A node Video 1.3.2 : Computer
has an address on the network and makes use of the Networking Tutorial - 2
computer network as a medium of communication.
Question 1 of 2
Which of the following statements is true about
information processing at the operational
level?
Check Answer
11
S ECTION 4
This case study was written by Kartikeya P Bolar and reviewed by R Muthukumar, IBS Hyderabad. It is intended to be used as the basis for class discussion rather than to illustrate either
effective or ineffective handling of a management situation. The case was compiled from published sources.
© 2012, IBSCDC.
No part of this publication may be copied, stored, transmitted, reproduced or distributed in any form or medium whatsoever without the permission of the copyright owner.
12
ABOUT THE COMPANY BUSINESS PROCESS
Meru was one of the first radio cab companies in India. The The business process at Meru Cabs included managing the
company’s service was launched with 45 cabs in Mumbai in demand for the cabs across various areas in the four metros
April 2007. Since then, it had grown to have a presence in the and also the timely delivery of the promised service to the
four cities of Mumbai, Delhi, Hyderabad, and Bengaluru in customer. Managing the demand for the cabs required
India. The company derived its name from the mythical developing real-time tracking of vehicles, intelligent route
mountain of the gods that symbolized unshakeable reliability. planning, and also understanding the needs of the customers.
According to company sources, as of 2011, Meru had a fleet Ti m e l y d e l i v e r y o f t h e s e r v i c e r e q u i r e d e ff i c i e n t
of over 5000 cabs through which it served around one million communication, resource allocation, and process automation
passengers a month. The company won the 'Best IT User & control activities.
Awards', given by NASSCOM CNBC TV-18, for three
consecutive years from 2008 to 2010. INFORMATION TECHNOLOGIES AT MERU
BUSINESS MODEL Meru used GPS2 (Global Positioning System) to know the
exact location of its cabs. This helped the company in
Meru’s tagline “Rely on us” described the core value of the managing the logistics (Refer to Exhibit I for ‘GPS at Meru’).
company — the promise of reliable service to its customers.
A two-way data communication link was set up using GPRS3
In order to deliver such a reliable service, the company had a
(General Packet Radio Service) between the vehicles and the
24x7 customer service center. To make sure that customers
backend system (Refer to Exhibit II for ‘GPRS at Meru’).
would have similar experiences in all its cabs, Meru bought
Information such as the location, fare, distance traveled,
brand new cars and ensured that it maintained the safety and
speed, etc. could be sent to the backend system at a
comfort standards and facilities in each of them. The company
particular frequency. Similarly, the details of the customer
took care to train the drivers in soft skills and provided them
whom the driver had to pick up and drop were sent from the
with cars containing the required facilities. The motivation for
backend system to the vehicle. The customer details were
the drivers came from the fact that they could retain the earn-
displayed on the screen in front of the driver for clarity and
ings beyond a specified amount and the fuel cost as their per-
further ratification.
sonal income.
Meru used RFID (Radio Frequency Identification and
Detection) technology to create virtual cab queues at prime
locations like airports to serve customers (Refer to Exhibit III
for ‘RFID at Meru’). To manage its resources and the
13
customers, Meru invested in Oracle ERP (Enterprise Resource 2. Develop a relationship framework between the informa-
P l a n n i n g ) , S i e b e l ’s C R M ( C u s t o m e r R e l a t i o n s h i p tion technology used and the business processes of
Management), and Aspect IVR (Interactive Voice Response). Meru.
Reader’). The customer could even pay his/her fare using the
mobile banking facility. The fare bill was tamperproof and given At the call center executive’s end, an application that consists of a map of
any of the earlier mentioned six places appears. For instance, if it is a
on a printed form. It was based on the tariff and the distance of Mumbai map, the map will comprise pre-installed names of important
the journey. destinations in the city and a four-colored indicator (yellow, green, red, and
black). Red indicates that the car is already loaded with a passenger, green
indicates that the car is vacant; yellow indicates that the car is waiting at a
Meru also tried to use technology innovatively to develop kerb (for a local inhabitant of one of the six places) and black indicates
business intelligence. For instance, it could assess the driving logged-out cars.
14
Exhibit 1.4.1 Exhibit 1.4.3
source: www.12manage.com
Exhibit 1.4.4
Exhibit 1.4.2
source: www.wiredcpu.com
15
C HAPTER 2
Source:http://www.octium.eu/en/index.php/information-systems/what-is-an-infor
mation-system
S ECTION 1
17
Table 2.1.1: Informational Requirements at Various Organi- reports pertaining to the performance of the various business
zational Levels units of the organization. At this level, the plans are compared
with the actual performance and remedial measures are taken
MANAGEMENT
TYPE OF
INFORMATION in case of any deviations.
PROBLEMS TIME FRAME
LEVEL NEEDS
TACKLED
At the strategic level, in addition to the information gathered
Strategic, e.g., from the internal sources, the decision makers would require
Highly
“We want to be
Senior summarized information from the external environment. The decisions
the best at Months-years
Management made at this level are taken in situations that are marked with
customer
service”
a great deal of uncertainty.
20
S ECTION 2
21
transactions generate additional data.
22
S ECTION 3
23
According to Barry E. Cushing, MIS is “a set of human and Architecture of MIS
capital resources within an organization which is responsible
for the collection and processing
of data to produce information Video 2.3.2:
Management
which is useful to all levels of Information Systems
management in planning and
controlling the activities of an
organization.” For the purpose of
analysis, planning, control and
decision making, the system uses
manual procedures, computer
hardware and software, data
models and a database.
24
S ECTION 4
Source: http://www.referenceforbusiness.com
25
DSSs are widely used in business organizations to Characteristics of a DSS
provide support in activities such as financial planning,
forecasting, risk assessment, etc. To arrive at a rational A DSS enables its users to solve a particular problem
solution, a DSS may make use of inquiry, analysis, using the ‘what-if’ analysis. Using this analysis, one can
models, or accounting systems. They are very useful make modifications to the data related to the problem
when complex manipulations and different analysis and find out the effect of these changes on the results.
techniques need to be used to find a solution. There are Thus a DSS is used for analyzing the various
basically two types of decisions – programmable possibilities and deriving an appropriate strategy for
decisions and non-programmable decisions. each situation. Following are the characteristics of a
Programmable decisions are those that are based on DSS:
predetermined rules and can be computerized. They are computerized information systems that are
Computerization is possible since the inputs, process interactive in nature. These systems can be used by
methodology, analysis and choice of decisions are all decision makers in order to control the order of
predetermined. Non-programmable decisions are those operations performed.
that do not follow any fixed rules but are based on
circumstances. DSSs provide support to those decision-making
activities or processes that are specific in nature.
Architecture of DSS They facilitate support to the decision makers in the
organization, but do not replace them.
Accounting systems DSSs are very useful in analytical modeling. The four basic
types of analytical modeling supported by DSS are what-if
Though accounting systems do not contribute directly to
analysis, goal seeking analysis, sensitivity analysis and
decision-making, they can be of great value in tracking
optimization analysis. These are discussed below:
business functions. These systems track information
27
What-if analysis - End achieved. For example, if the net profit is fixed at Rs. 100
users can make use of million, changes can be made to the expenses and
what-if analysis to make revenues in order to achieve the predetermined net profit.
changes in the variables or This is another important decision support tool. MS Excel
in the relationship amongst is generally used for conducting goal seeking analysis.
variables and observe the
changes. The what-if Sensitivity analysis - Sensitivity analysis can be
analysis is used for considered as a type of what-if analysis in which the effect
a n a l y z i n g th e v a r i o u s of a repeated change in a single variable is examined.
possibilities and deriving Using this analysis, one can find out the impact of a single
an appropriate strategy for variable on other variables. It is useful when the user is
each situation. For not sure about the value of a key variable. There are a few
example, the change in DSS packages that automatically and repeatedly make
revenue can be studied by minor changes to the variables. For example, the tax rate
Source: http://us.123rf.com can be changed repeatedly to observe how the revenues
changing the tax rate.
Managers generally use are affected.
such an analysis to observe and evaluate changes. For Sensitivity
instance, the what- if analysis is used for finding out the analysis is
effect of a 5% used to find
reduction in out how a
advertising on sales. continuous
reduction in
Goal seeking advertising
analysis - Goal expenditure
seeking analysis is affects sales.
the reverse of what-if- Scenario, a
analysis. In goal-seek, what-if
the target is fixed and analysis tool Source:
http://latestseoupdates.files.wordpress.com
changes are made to in MS Excel,
the related variables Source:http://i.istockimg.com is used for
so that the target is conducting sensitivity analysis.
28
Optimization analysis - Optimization analysis is a complex
extension of goal-seeking. In optimization analysis, the target
is not fixed. Rather, the target needs to be arrived at after
taking into consideration the constraints involved in achieving
the targets. In this analysis, one or more variables are
changed after taking the constraints into account until the best
alternative or the optimal value is found. Optimization analysis
would require special purpose software and techniques like
linear programming. For instance, optimization analysis is
used for finding out the optimum amount of advertising that
could be used with the given constraints of budget and the
media. Solver, a what-if analysis tool in MS Excel, is used for
conducting optimization analysis.
29
S ECTION 5
Source: http://image.shutterstock.com
30
EIS combines the various features of the MIS and DSS. simple and user-friendly. These systems take in only the
It can be considered a logical extension or form of information which is appropriate and then convert/
decision support systems. Unlike DSS, Executive transform that information into a simpler and more user-
Information Systems are designed to draw inferences friendly form which will aid executives in easy
based on examples or make decisions based on understanding and quick decision-making.
predetermined logic or business rules. They were initially
developed to serve the information requirements of the
Exhibit 6.2
top management. These systems were aimed at
supporting managerial learning about the organization, Mycin
its work process and the impact of external environment. An expert system in the field of medicine named Mycin was devel-
Information is mostly presented in graphical or oped at Stanford University in the 1970s. The primary activity of this
expert system was to diagnose and recommend treatment for some
diagrammatic form so that a user can understand it types of blood infections. Conventionally, it would take about 48
quickly. The format of presentation of information may hours for doctors to properly diagnose a blood infection and by that
time, most of the patients would die. Doctors, therefore, had to
also be predetermined so that reporting is standardized make quick guesses about the expected problems from the avail-
able data and use them to provide a covering treatment under
across the organization. The drill-down facility offered by which drugs which could deal with any problem would be given.
these systems is useful when a manager wants to
The development of Mycin was done partly to explore how experts
access details of previous analyses. EIS also helps the made these rough but important guesses based on limited informa-
management focus its attention on critical issues or tion. The use of an expert tool would help junior or non-specialized
doctors in the process of providing more effective treatment. Mycin
business problems. used various heuristics to control the search for a solution (or proof
of some hypothesis). These were required both to make the reason-
EIS is being widely used in areas like crisis ing efficient and to prevent the user being asked too many unneces-
sary questions. The performance of Mycin was extremely good.
management, strategic planning, employee relations, However, it was never practically implemented. This was due to the
internal and external monitoring of resources and ethical and legal issues related to the use of computers in medi-
cine. One of the questions asked for example, was who would be
decision making at the executive level. It is used for sued if the system made the wrong diagnosis.
providing simplified information to executives and aids in Adapted from, “MYCIN: A Quick Case Study,”
decision-making. http://www.macs.hw.ac.uk/~alison/ai3notes/section2_5_5.html#SE
CTION0055000000000000000.
For instance, most of the business organizations
subscribe to the stock exchanges and other institutions
to have access to stock market related data. Data
provided by these institutions is complex and quite
detailed. EIS can be used to generate reports which are
31
Architecture of EIS
32
S ECTION 6
Expert Systems
Expert systems are programs designed to provide users 6.2 on an Expert System called Mycin, which was used for
with the expertise of professionals in a particular field. conducting medical diagnosis. The process in which the
These are knowledge-based information systems that use expert knowledge is acquired, documented and
knowledge about a specific area to act as an expert incorporated as software is called knowledge engineering.
consultant to the users. These systems gain knowledge
from an expert and apply this knowledge to make Architecture of Expert System
decisions. The knowledge base of the system consists of
facts, procedural steps and rules that determine how the
data is related to the solution and other relevant
information. The rules are framed on the basis of the
methods used by professionals for solving problems.
33
S ECTION 7
This case was written by K. Prashanth, under the direction of Vivek Gupta, IBS Center for Management Research. It was compiled from published sources, and is intended to be used as a basis for class discussion
rather than to illustrate either effective or ineffective handling of a management situation.
To order copies, call +91-08417-236667/68 or write to IBS Center for Management Research (ICMR), IFHE Campus, Donthanapally, Sankarapally Road, Hyderabad 501 504, Andhra Pradesh, India or email:
info@icmrindia.org
34
“Hospital 2000 is a key attribute helping Bumrungrad Bumrungrad received for its Hospital 2000 IS (Refer Exhibit
Hospital to maintain world class standing in medical care I for other awards). In February 2003, CIO Asia magazine
and service. Top quality healthcare is about getting the included Bumrungrad in its list of top 100 companies for its
right information to the right caregiver at the right time and foresight in deploying an advanced hospital information
Hospital 2000 does this in world-class style. The fully system (IS).
computerized medical record insures that all information is
available to the medical team and the service level, speed Like most of the IS deployed by Asia’s leading hospitals in
and efficiency is enjoyed by our 750,000 patients each the late 1990s, Bumrungrad’s system mainly addressed the
needs of the accounting and billing departments. The
year.”2
hospital’s IT operations were scattered across four
- Curt Schroeder, CEO, Bumrungrad Hospital. systems, running various mutually incompatible
applications. This meant Bumrungrad had to put more staff
INTRODUCTION on board for maintenance. Due to the incompatible
applications, hospital staff could not access the latest
In January 2003, Intelligent Enterprise Asia, a leading IT
patient data quickly, causing inconvenience.
magazine in Asia, announced the Intelligent 20 awards
recognizing the top 20 IT-savvy companies in the continent. Hence, Bumrungrad was looking out for an advanced
In its third year, the award was given to Asian companies, hospital IS which could address several needs at one go.
which employed innovative IT solutions to enhance This included simplifying its internal operation (primarily
operational excellence and customer service capabilities. billing) by connecting all applications from the pharmacy to
Judges from the world’s 10 leading consulting firms eating outlets to the patients’ medical treatment, so that
including IDC, Accenture and Gartner, selected the consolidated medical bills could be generated instantly.
winners. Bumrungrad also wanted the IS to enable foreign patients
of different nationalities to receive necessary information in
One of the awardees was the Bangkok (Thailand)-based
a language of their choice and be able to book
Bumrungrad Hospital Public Company Limited
appointments and accommodation online. It also wanted
(Bumrungrad), Asia’s largest private hospital. Notably,
the IS to facilitate quicker treatment for its patients at clinics
Bumrungrad became the first hospital in Thailand and the
within the premises, and in the process, save the hospital’s
first company in the healthcare industry to receive such an
time and money in administering medical services. All
award. Bumrungrad was recognized for successfully
these requirements prompted Bumrungrad to adopt
implementing the Hospital 2000 information system (IS).
Hospital 2000 IS, which completely transformed the way
The Intelligent 20 award was only one of several awards
the hospital operations were managed.
35
Hospital 2000 adhered to several ANSI3 standards, a global from different parts of the world. The physicians, however,
standard governing the exchange of clinical data and the were consultants and were not on the hospital rolls.
management, delivery and evaluation of healthcare services.
Bumrungrad hired an international management team led by
It kept pace with the IT requirements of a modern day
American professionals. Its CEO, Curtis Schroeder
healthcare business. Commenting on this, Patrick Downing,
(Schroeder) had prior experience of running a hospital in
CEO, Global Care Solutions, the company which installed
California. However, in July 1997, Bumrungrad faced a tough
Hospital 2000 at Bumrungrad said, “It takes advantage of
situation when Thailand was severely hit by economic
paper scanners, cameras, all of the modern devices found in
recession. Owing to the Southeast Asian currency crisis, the
a healthcare facility. It really allows them to capture what they
value of the Thai Baht dipped sharply. The crisis had its fall-
need and to attach it to the Electronic Medical Record and
out on the middle class Thai population, from whom
give that patient better healthcare.”4 Bumrungrad derived most of its revenues. They started
shifting to government hospitals where healthcare was
BACKGROUND NOTE
available free or at a lower cost.
Established in September 1980, Bumrungrad5 was originally
In this adverse situation, Bumrungrad decided to change its
a 200-bed facility. The initial investment was Thai Baht6
90 strategy by targeting more foreign patients, including
mn. The hospital was jointly owned by the Bangkok Bank and expatriates in Thailand and nearby countries. It also decided
the Sophonpanich family, one of Thailand’s leading business to tap patients in developed countries in Europe and the US.
families. In 1989, Bumrungrad went public and its shares Describing the situation, Schroeder said, “We basically had
were listed on the Thai Stock Exchange. Over the next two alternatives at that time. We could shut down the place
decade, Bumrungrad adopted several innovative practices to and lay off employees, cut costs and turn off the lights and try
emerge as the best privately managed hospital in Thailand. to weather the storm, or we could aggressively use it as an
The significant increase in the number of domestic patients opportunity to build market share. We went with the General
over the years led to a manifold increase in revenues. Electric approach, the Jack Welch approach, which is that
where you make your biggest market share is during down
In January 1997, Bumrungrad shifted to a new facility located
at the centre of Bangkok. Constructed at an estimated cost of markets.”7
$110 mn ($60 mn raised through offshore loans), the 12-floor Bumrungrad began an aggressive marketing effort to project
building had 554 beds and 21 operation theatres. The itself as a global hospital complying with international
hospital was equipped with the most modern equipment and standards. The hospital had already applied for and received
had 600 physicians, nearly half trained in the US, and drawn
the ISO8 9002 quality certifications for all its departments and
36
systems in March 1997. In 1999, the ISO certified THE NEED
Bumrungrad as a Comprehensive Tertiary Acute Medical
In view of the intensifying competition in Thailand’s healthcare
Centre9. With this, it became the world’s first healthcare
industry and to generate international appeal, Bumrungrad
company to receive this certification. Schroeder said, “It’s not
was looking for ways and means to enhance service quality.
a magic cure, but whether you’re selling cement, steel or
The management felt that providing the best possible cus-
healthcare, without third party validation, it’s difficult to get
tomer service was critical for the hospital’s growth. However,
international recognition.”10 the deficiencies, which kept cropping up in its existing IS,
Video 2.7.2 : Video of Bumrun-
grad Hospital Virtual Tour were hampering the quality of customer service provided.
Bumrungrad also decided to
use the Internet as an Bumrungrad’s IT operations were handled by four Unix-based
information and marketing systems and several applications like Access and FoxPro,
medium to promote its which varied from department to department. The existing IS
healthcare services to foreign posed problems and also had high maintenance costs. They
patients. It launched its required several people to operate them. Further, they did not
website – generate the information required for the hospital to manage
www.bumrungrad.com - in its operations efficiently. Moreover, the IS was not able to
1997. The website had deliver information, which would help determine the direction
several user-friendly features of business in near future.
to provide healthcare information sought by visitors. For
instance, visitors could get information on the medical Bumrungrad required an IS which not only catered to its
facilities and the range of treatment available at the hospital. immediate IT needs but also those of the future. The IS must
One of the website’s main features was the ‘Find a Doctor’ contain complete Electronic Medical Records11 (EMR) to
section. Using this, patients could choose from 600 doctors help it manage operations better. It must also provide the
and book an appointment online, to suit their preferences and required information for its doctors and other support staff so
requirements. Thus, the patient’s preferences for the type of that they could deliver better patient care.
treatment, the nationality or expertise of the doctor and so on
were taken care of at the first instance. Appointments were Retaining the best doctors was another major challenge for
confirmed within two hours. By mid-1999, the website was Bumrungrad. As the doctors were consultants, who hired
drawing 800 hits a day. Bumrungrad’s management soon felt Bumrungrad’s facilities, they could choose anytime to offer
the need to further modernize its IS to serve customers better. their services to other hospitals. Thailand had nearly 250
hospitals at that time. The management was aware that
37
Video 2.7.3 : Advance Techno- patients preferred only way we could continue to provide excellent service and
logical Support used in Bum- leading doctors and, the get patient days down.”13
rungrad Hospital choice of hospital came
only after that. Bumrungrad also wanted the IS to boost its online initiatives.
Providing an ideal This meant enabling its customers, primarily international
environment with good ones, to book their appointments online through its website.
infrastructure and the It also wanted online communication with Bumrungrad’s
most advanced IS, to suppliers and insurance companies, with whom it had to
attract the best doctors maintain daily contact for billing and other administrative
in the country was, purposes.
therefore, essential for
All these requirements prompted Bumrungrad to go in for a
Bumrungrad.
complete replacement of its existing IS in 1999. It chose
Commenting on this,
Schroeder said, “It is Global Care Solutions14 (GCS), a Luxembourg- based IT
the hospital with the best company to implement the new IS at the hospital.
physicians that will win. We need to create an environment
SYSTEM IMPLEMENTATION
that will allow our doctors to practice medicine in the best
way and create the best relationships with their patients. At On December 17, 1999, Bumrungrad successfully switched
the core, it comes down to good people as well as an over from its old IS to its new customized Hospital 2000
exceptionally well-designed information system. We wanted information system. However, implementing the system was
clinical information at the fingertips of our doctors to enable not easy, considering the number of tasks involved. These
them to make better decisions.”12 included conversion of data contained in the four existing
UNIX systems; providing training to the 1200-strong staff
In the healthcare industry, service efficiency is assessed in and more than 200 doctors; and installation of required
terms of quality of treatment as well as time taken for hardware and software.
treatment. The less the time spent at the hospital, the less
the expenditure incurred by patients. Schroeder said, DATA CONVERSION
“Patients assess their level of hospital care in different ways.
The first major task was data conversion. The four systems
How quickly they move through the system is a key
from which data had to be retrieved were a commercial out
measure. We’d reached a plateau on reducing patient time
patient system, a commercial accounting system, an in-
in the hospital and we knew that better information was the
house in-patient system and a document management
38
system (DMS). Each system was run on different database participation and co-operation from Bumrungrad’s IT team
engines – Oracle, Ingres, Informix and Sybase - complicating and the GCS staff, the installation of Hospital 2000 was
matters further. Most of the information had to be filtered to completed quickly.
eliminate unnecessary and ambiguous information. It was
also difficult to map the data to suit the Hospital 2000 IS, as a One of the critical operations of installing the new system was
significant portion of the data was in the Thai language. the formal switch from the old system. Rather than allowing
the new system to be in use for some time while continuing
While converting the data, the major challenge encountered with the old system and then switching, Bumrungrad opted for
by GCS was with the DMS of FileNet Corporation. This was a one-time switch over. Needless to say, this move was risky,
because FileNet had its own communications protocol15. as there was danger of failure of the new system when the
About five mn documents pertaining to out patient records of old system had been switched off. The GCS staff was on
three and a half years had been scanned into the DMS. The guard to meet any such eventuality. However, proper
records could be instantly accessed by physicians, nurses planning and preparation ensured that the formal installation
and other support staff. To convert this significant amount of went off smoothly. Within 48 hours of full-time operation,
data, the GCS staff wrote a program called ‘FileNet GCS and hospital staff addressed all major issues relating to
Converter’, which converted each document in the DCS into the system. GCS personnel were available on site for the
next 15 days so that the systems and networks were properly
TIFF16 files and saved it in a Microsoft NTFS file system17.
attuned.
The program was administered without interruption for six
months. To ensure that the operations at the hospital were TRAINING
not disturbed, the program was run during particular times of
the day and throughout the night. Another important task was training the 1200 hospital
personnel and 200 physicians. Training was imparted by GCS
At the time of installation in 2000, Bumrungrad needed 450 staff in association with Bumrungrad’s education and training
desktop computers 100 network printers and 120 scanners to department. For this, senior members from each work area in
be placed in various locations across the hospital. The the hospital were selected and trained on the complete usage
Bumrungrad IT team did this job. Once it was accomplished, of the Hospital 2000 system, pertaining to their area of
GCS installed the Hospital 2000 software on all the PCs responsibility. They, in turn, became trainers for personnel in
(terminals) from a remote location using a proprietary their respective work area. To ensure that both trainers and
software distribution method. The advantage of this method staff gained full knowledge of the practical usage of the
was that it facilitated upgradations in the application at any system, a simulated training set up comprising 40 PCs
time without disturbing clients significantly. With active connected through a network was created at the training
39
centre. This set up resembled all the departments of the first sites on which this combination was employed. The
hospital. systems were connected to the Internet through leased lines
and through satellite connection (Refer Exhibit II for a list of
The training lasted for four weeks during which hospital staff hardware and software used in Hospital 2000 IS).
learnt how the various departments were connected through
Hospital 2000. The GCS staff also cleared any doubts about SYSTEM ARCHITECTURE
the system’s functionality. The willingness of the hospital staff
to learn, and the education department’s efforts ensured that The Hospital 2000 IS was built on a three-tier architecture,
the training phase was completed successfully. comprising PC-based clients, clustered servers and the
database (Refer Exhibit III for a diagram of the system
HARDWARE AND SOFTWARE architecture.). The clients represented the face of the IS,
through which data relating to various hospital operations
The hardware for Hospital 2000 comprised 450 Dell Optiplex could be keyed in, and through which data stored in database
PC’s (clients), with a 400 MHz Celeron processor with 64-128 could be extracted. The complete Hospital 2000 suite was
MB Read Access Memory18 (RAM), 4 Pentium®-III XeonTM- available in each of the clients located across the hospital.
based Dell Power Edge 6300 Clustered Servers and a Dell
Power Vault 650F Fibe Channel storage system. The The middle tier comprised clustered servers, also called
combination of a pair of clustered servers and a PowerVault transaction servers, as they facilitated transactions taking
650F supported the 450 clients operating at different locations place in the hospital. The clustering19 of the servers was
in the hospital simultaneously. The Power Vault 650F channel done through the MS Windows 2000 clustering service. This
storage system ran on the MS SQL platform and formed the was essential for the systems to handle high workloads,
database for Hospital 2000 IS. especially during peak hours. The middle tier served as an
interface between the clients and the database. Any
The configuration of the clients was standardized so that they transaction taking place in the hospital (like queries posted into
could be easily integrated with Hospital 2000 IS. Further, the clients as well as data fed into the clients) passed through
uniform configuration meant easier maintenance, as the the middle tier. Its function was to retrieve required data from
hospital’s IT team could develop a basic understanding of the the database and make it available to the clients. It also
system. These systems could also be easily upgraded at any ensured that the database was updated with every transaction
time to meet future requirements. occurring at the clients (like data keyed in, images stored,
The Operating System used was a combination of Microsoft images scanned and so on). This would ensure that integrity of
Windows 2000 and SQL 2000. Bumrungrad was one of the data was maintained.
40
The database server received and processed queries received The well-planned deployment of Hospital 2000 IS enabled
from the middle-tier transaction servers. The major function of Bumrungrad to operate the system without major problems and
these servers was to support data warehousing20 and online avoided unnecessary expenditure for the company. The fact
that the entire deployment, including data conversion, training
analytical processing21 (OLAP). It facilitated storing and
and rollout of hardware and software was completed in 45 days,
extracting valuable information, which was critical to run the was testimony to the kind of co-ordination and team work
operations at Bumrungrad. During peak hours, the server among the hospital IT staff and GCS employees. According to
database processed 170 SQL statements per second. company estimates, Bumrungrad spent US$ 6 mn on the
NETWORK ARCHITECTURE system. Over the years, as the
Video 2.7.4: Microsoft size of operations increased, the
Within the hospital, the clients, the transaction servers and the Amalga System number of clients increased from
database servers had to be properly connected in a network 450 in 1999 to 900 in 2004.
arrangement to enable uniform flow of information. The
database server and the middle tier servers were together INTRODUCING NEW FEATURES
called the data centre, which supported the clients. The servers Over the years, Bumrungrad made
and the clients used the TCP/IP protocol22. (Refer Exhibit IV constant efforts to upgrade the
for the network architecture diagram) Hospital 2000 IS to provide better
service to patients. In February
Across the hospital, a group of clients were clubbed together,
2002, an interesting and useful
based on the commonality of the purpose being served (for
feature – Picture Archive
example, clients in a department) or on any rational basis. They
Communication System (PACS) – was incorporated into
were linked to network hubs, placed in the respective
Hospital 2000 IS. Known as Amalga, it was run on a Microsoft
departments or on each floor in wiring closets. Each hub was
Windows 2003/SQL Server platform (Refer Exhibit V). The
linked to a switch unit point.
estimated cost of the PACS was 28 mn Thai baht23.
This unique network architecture facilitated a rise in the number
of clients as the hospital’s operations could expand without PACS comprised all X-Ray images stored in digital format. This
affecting workflow. This could be done by just adding more hubs enabled Bumrungrad to process radiology studies digitally
or switches. The fibre optic cables facilitated transmission of instead of using films. The system comprised diagnostic
data at quicker speeds between the clients and the data centre. software with a complete package of image manipulation and
reporting tools for radiologists. All radiologists in the hospital
could access digital images instantly through PACS. It also
41
provided them access to medical studies and reports through 17,000,000 baht every year. The database size at Bumrungrad
the Internet and through local area networks. PACS facilitated increased by an estimated 1.5 terabytes between February
exchange of information in various languages. 2002 and October 2003. Another advantage of PACS was that
soft copies of X-ray reports could be sent to other hospitals,
The system drew enthusiastic response from the doctors at both within Thailand or abroad, upon specific requests by
Bumrungrad. Within six months of implementing the system, patients who needed further examination and treatment.
99% of X-ray studies at Bumrungrad were done through PACS.
The doctors explored the system with much enthusiasm. THE BENEFITS
Commenting on the advantages of PACS, Pat Downing said,
“With all historical study information at their fingertips, doctors Hospital 2000 IS led to a significant improvement in the
can look at the whole picture – the result is better informed efficiency of operations at Bumrungrad. Hospital 2000 was the
decisions. Digital radiology offers numerous advantages: first IS in the healthcare industry in Thailand that combined all
reporting times on digital studies are greatly reduced, providing front office systems, all medical, nursing and ancillary
results more quickly; lost films are eliminated ensuring medical departments, and back office accounting functions into one
records remain complete; multiple doctors can collaborate and database. The IS was used across all departments including
view images simultaneously without waiting for hardcopy films labs, radiology, pharmacy, cardiology, patient registration,
and reports are available online in real time as soon as they administration, operation theatre scheduling, billing, purchases,
inventory management, room management and medical
are submitted.”24
records. The database comprised details relating to 2 mn
On an average, nearly four gigabytes of images were stored at patients treated at Bumrungrad dating back to the past 20
the Amalga PACS every day. The physicians and hospital staff years. It even included prescriptions.
could access these images at any point of time from any PC in
A major benefit of the new system, which differentiated it from
the hospital. The efficiency of the system could be seen from
other healthcare systems, was its multi-lingual capabilities.
the fact that an X-Ray image of size up to 7 MB could be re-
Files containing medical records, bills and drug labels could be
trieved and viewed in less than 2 seconds.
instantly translated and printed in Japanese, Chinese and
PACS also obviated the need for the hospital to use X-Ray English. (Refer Exhibit VI for the unique features of Hospital
films, and in the process, significantly cut costs. It eliminated 2000 IS). Every year, the system processed 1.7 bn
the cost of storage and maintenance of films and, more transactions. Since its installation at Bumrungrad, the system
important, removed the risk of X-Ray images being damaged or has been operating at 99.9999% uptime.
lost. It was estimated that since its implementation at
Bumrungrad, the hospital generated savings to the tune of
42
The IS also facilitated quicker patient treatment, helping Once the entire patient data, including medical records, X-
Bumrungrad to treat an estimated three thousand patients rays, were fed into the system, any doctor could continue the
every day. The results of any medical test administered on a treatment for patients by viewing them. Unlike most leading
patient, whether simple blood examination or high-tech corporate hospitals, which only provided access to the
magnetic resonance image scans, could be accessed at 900 patients’ hospitalisation records, the Hospital 2000 system
clients across the hospital. This largely simplified workflow made available a patient’s X-rays, ultrasounds and other test
within the hospital. Every detail regarding the patients, be it records too.
the doctors’ prescription or an X-ray image, could be scanned
and recorded in the database in real time. The doctors had The Hospital 2000 IS proved indispensable for Bumrungrad.
the option to type or scan their comments on patients, This was clear from the words of Ruben Toral, manager of
whichever was convenient. Bumrungrad’s International Program, “We have 554 beds,
over 2,500 outpatients a day and 800,000 patients per year. A
The patients enjoyed the convenience of walking into the similar 500-bed hospital in the US typically treats only
hospital at any time without carrying their prescription or test 100,000 patients per year. Without our IT system, we would
records or even without an appointment. The moment the not be able to handle this many patients.”
patient entered the hospital, the computer systems would
allot them to the doctors who had the shortest queue, thereby QUESTIONS FOR DISCUSSION:
speeding up treatment. The low doctor-patient ratio of 24 1. Bumrungrad upgraded its information systems in the late
patients per day per doctor also contributed to quicker patient 1990s. Explain the rationale for Bumrungrad to make
treatment. significant investments in upgrading these systems.
Most doctors still preferred to give handwritten prescriptions 2. Bumrungrad’s previous information system had several
to patients. This did not cause any problem as all they had to problems which the new system had to address. Describe
do was to simply scan their prescriptions into the system. the features and the architecture of the new system.
Schroeder said, “We had to give them an option because it is Discuss how it solved the problems of the old systems
unlikely that our doctors, with the exception of a handful, will faced by Bumrungrad, earlier.
type their comments...we do not want to disrupt their
methods of operation.”25 By providing as much flexibility as 3. In the light of increasing volume of foreign patients
possible for doctors in their operations, Bumrungrad made handled by Bumrungrad, do you think the implementation
administering treatment a pleasant experience for doctors. of new information system was beneficial for the
company? Discuss.
43
Exhibit I Exhibit II
44
Exhibit III Exhibit IV
Source: www.hospital2000.com
Source: www.hospital2000.com
45
Exhibit V Exhibit VI
1 2 3 4
46
S ECTION 8
Enterprise IS - An Overview
47
The Internet has also had an impact on customers, who have Enterprise
become more demanding as they now have more information Conferencing
about new products and services. The speed of the Internet Tools
has changed every aspect of business, be it interactions with
customers, relationships with partners, or supply chain Enterprise
management. conferencing tools
enable people to
IT helps organizations communicate, coordinate and share information in
collaborate both within and outside the organization. Systems an interactive way.
that facilitate communication, coordination and collaboration These tools include Source:http://www.tnspl.in
to help people work together are known as enterprise teleconferencing,
collaboration systems. The three main components of an discussion forums, chat systems and electronic meeting
enterprise collaboration system are electronic communication systems.
systems, electronic conferencing tools and collaborative work
management tools. Workgroup support systems comprise
Video 2.7.1: CISCO Telepres-
groupware that facilitates linking of workgroups located in ence Magic - 1 Video 2.7.2 Telepresence (CISCO
different geographical regions. Multimedia is another popular Video Conferencing) - 2
48
S ECTION 9
as e-CRM (Refer
E x h i b i t 1 9 . 1 ) . Video 2.9.1: Introduction on CRM
Several factors
including high cost
of acquiring new
customers, cut-
throat competition,
globalization and
high customer
churn rate have led
to e-CRM initiatives
Source: http://www.webgranth.com by organizations. Organizations are looking for ways to
personalize online experiences of customers through e-
Customer relationship management or CRM involves all CRM tools such as e-mail organizers, help-desk software
aspects of interaction (including sales, marketing, and and web development applications.
customer service) of an organization with its customers.
Managing customer relationships electronically, primarily
through the Internet, by organizations is popularly known
49
Video 2.9.2 : Microsoft Dynamics Interview
50
S ECTION 10
ERP - An Overview
just one or two departments/functions, but the entire range of
functions like manufacturing, marketing, human resources,
finance and logistics.
51
S ECTION 11
52
S ECTION 12
Source:http://labho.com
53
E-Business is a much broader term. E-Business transactions sellers, thus enabling the exchange of goods and services.
that are monetary in nature can be termed as e-commerce B2B websites help streamline operations between
transactions. E-Business involves more than buying and organizations and their business partners. For instance, an
selling of products and/or services. Apart from e-commerce, it automobile component manufacturing company can sell its
includes several other areas like supply chain management, components and parts online
customer relationship management, knowledge management, to an automobile manufacturer.
business intelligence and collaborative technologies. E-
Business comprises the processes and culture of an Business-to-Consumer
organization. It uses the intranet, extranet, collaborative Model
technologies and the Internet to connect the organizational The Business-to-Consumer
systems with the employees, customers, suppliers and the (B2C) business model deals
business partners. with B2C transactions. The e-
E-BUSINESS MODELS businesses that adopt B2C
model sell their products and
There are eight e-business models, namely business-to- services directly to individual Source: http://2.imimg.com
business, business-to-consumer, consumer-to-consumer, consumers. This business
business-to-employee, government-to-citizen, citizen-to- model is expected to become more popular when low cost
government, government-to-government and government-to- Internet access is available to the masses through mobile
business. These models are discussed in detail here: phones and other Internet access devices.
Business-to-Business Consumer-to-
Model Consumer Model
Business-to-Business Consumer-to-
(B2B) is the most Consumer (C2C)
popular e-business websites enable the
model dealing with B2B sale and purchase of
transactions. B2B products and
marketplaces evolved services between
Source: http://jeffpulvino.com with the primary goal of Source: http://www.openideo.com/ individual customers.
matching buyers and Individual customers
54
frequently buy and sell products like automobiles, furniture Citizen-to-Government Model
and real estate from each other. They can find such products
on a C2C site and conduct transactions online. The best Citizen-to-Government (C2G) websites help citizens to
example of a C2C business model is an online auction site. In interact with the government. For example, citizens can
1995, eBay.com pioneered C2C auctions. cast their votes during elections and pay taxes online
through government websites. Under the concept of e-
Government-to-Citizen Model democracy, citizens are encouraged to vote and engage
in governance, online. The government takes inputs from
Government-to-Citizen citizens and organizes an e-debate, a concept similar to
(G2C) websites provide a Internet chatting. In an e-debate, political leaders
platform for the belonging to various parties participate. The citizens give
government to connect their opinions regarding the manifestos of various parties.
with citizens in order to This initiative brings citizens closer to the elected
provide benefits to members and also gives them a chance to evaluate their
citizens and to improve leaders. The eSeva portal of Andhra Pradesh government
public services. is also a C2G site.
Examples of this model
Source: http://www.watblog.com/ are electronic Government-to-Government Model
government service
centers which issue ration cards, accept electricity bills and Government-to-Government (G2G) is also known as e-
water bills, issue passports and undertake registration of administration. It aims at cutting costs and improving
motor vehicles. The government hosts some websites which government processes by interconnecting government
contain information about the various public-related initiatives departments. This involves connecting all government
taken and the services offered by it. The websites contain all offices, departments, and district headquarters with each
income and expenditure related information of the other and with the secretariat so that information is
government and thus make the government servants shared by all. This helps in reducing the time taken for
accountable to the people. Further, people can avail various solving customer requests and improves customer service
benefits provided by the government under various schemes. levels. G2G websites are mostly state websites that are
However, it is important for the customers to provide not allowed for public viewing. These sites are mostly
continuous feedback to improve the services. The e-Citizen located in a non-public system.
portal of Singapore and the eSeva portal of Andhra Pradesh
government, etc., are well known G2C sites.
55
Government-to-Business Model
Question 1 of 6
The buying, selling, marketing and servicing of
products over the Internet and computer
networks is called
Source:
http://incentive-intelligence.typepad.com
A. Groupware
56
C HAPTER 3
Source: http://www.enterpriseirregulars.com
This document is authorized for internal use only at IBS Campuses Batch of 2013-2015, Semester-I. No part of this publication
may be reproduced, stored in a retrieved system, used in a spreadsheet, or transmitted in any form or by any means - electronic,
mechanical, photocopying or otherwise. Transmission, copying or posting on web are violation of intellectual property rights.
S ECTION 1
Introduction to MS-Excel
58
S ECTION 2
Spreadsheet Concepts
Worksheet
60
The Menu bar appears Scroll bars and scroll arrows
Video 3.2.3: Understanding
directly below the Title Spreadsheets
bar and displays the Scroll bars and scroll arrows are used for scrolling the
menu with the following sheet. These are used to move the sheet to view the
options: File, Edit, View, required portion of the sheet on the screen.
Insert, Format, Tools, Sheet tab
Data, Window and Help.
Users may work on more than one sheet simultaneously.
Toolbar/Quick Access A user can click on the sheet tab to switch from one
Toolbar sheet to another. Users can also use CTRL+PgUp and
To o l b a r s p r o v i d e CTRL+PgDn to move between worksheets.
shortcuts to menu commands and are generally located Effective Worksheets
near to Menu bar. They consist of the standard toolbar
and the formatting toolbar. The standard toolbar displays In order to design effective worksheets, one has to keep
options for opening, saving files, cut, copy, paste, etc. in mind the basic reason for designing the worksheet,
The formatting toolbar displays options for document i.e., the main purpose for which the worksheet will be
alignment and style. used. Another reason that needs to be borne in mind is
the kind of audience that is being targeted. Worksheets
Column heading and row heading might be used for many purposes and might be targeted
Column and row headings help in assigning addresses at different sets of audiences. Therefore, these aspects
to a cell. Cell addresses are useful for cell referencing. should be kept in mind while designing the worksheets.
For example, A1 refers to the cell in the first column and Some suggestions for developing effective worksheets
first row, B3 refers to the cell in the second column and are mentioned here:
the third row of the document. The worksheet should be given an appropriate
Window controls title so that the user gets an idea of what is
presented in the worksheet. For example, if a
Window controls enable users to zoom a window, restore person is presenting data regarding monthly
a window to its previous position, or hide a window from sales, the worksheet could be titled Monthly
view. Sales Report.
61
The purpose of the worksheet should be clearly
mentioned. For example, specific names like analysis
report, sales report, information report, etc., should
be given.
62
S ECTION 3
Video 3.3.1: Basic Data Entry in Excel Different types of data can be entered in active cells of
spreadsheet. Data type refers to the type of information
one needs to store and work with in a worksheet. Excel
allows four different types of data to be entered or
displayed in the cells. These are: Text, Numbers, Logical
and Error.
63
Text Error
Text is a data type that consists of a combination of Excel displays any error in the formulae. For example, an
letters, numbers and special characters. For example, error displays #VALUE!. It indicates that the value that
Nikhil, Class 1, etc. has been referred to or used in the formula is not correct.
The other errors are like #DIV/0!,#N/
Numbers A,#NAME?,#NULL!,#NUM!,#REF! These will be
The default alignment of numbers in the cell is to the discussed later in functions and formulae.
right. Detailed Concepts on Data Types: Refer to the Link
Dates and times will be displayed based on the below.
format selected. http://www.chem.tamu.edu/class/majors/commonfiles/ex
To consider a number as text, an apostrophe (‘) celtutor.htm#3.2
should be typed before the number. Excel will con-
sider it as text and will automatically align it to the
left. e.g :’123455‘
Logical
64
S ECTION 4
Operators
65
Arithmetic operators
Video 3.4.2: Comparative
Table - 3.4.1: Arithmetic Operators Comparison operators Operators & Logical
Formulas
These operators compare
ARITHMETIC OPERATORS FUNCTION EXAMPLE two values and then
+ Addition 6+4 generate the result in the
form of a logical data type,
- Subtraction 5-3
i.e., TRUE or FALSE.
* Multiplication 2*2 Table 3.4.2 lists out the
/ Division 6/3 comparison operators and
% Percentage 25% their functions along with
an example.
^ Exponentiation 2^3(2*2*2)
Less than or
greater than,
<> P1<>Q1
but not equal
to
66
Text operators Reference operators
The text operator ‘Ampersand’ or ‘&’ concatenates text Reference operators combine a range of cells for
values in two or more cells to generate a single value. calculation. Table 3.4.3 lists the reference operators and
For example, cell A2 contains ‘South’ and cell B2 their functions along with an example.
contains ‘India’. The command =A2&B2 can be used to
combine the text in the two cells. This would produce the Table 3.4.3 - Reference Operators
result South India.
REFERENCE
FUNCTION EXAMPLE
OPERATORS
It is also called the
range operator. It
indicates all the cells
Colon (:) G2:G15
between and including
the given two cell
references.
67
In situations where the formula contains more than one
operator, the operators are evaluated based on the priority
order as given below in Table 3.4.4.
ORDER OPERATOR
1 %
2 ^
3 * and /
4 + and -
5 &
68
S ECTION 5
Cell Formatting
69
Videofiles: http://www.youtube.com/watch?v=oyxknF1jJ_I
Users have many options to format cells in a worksheet. To format cells, they have to first
Format Cells dialog box A drop-down menu appears from which the option called
select the particular cell or cells that are required to be formatted.
Cells needsThey
to bethen have AtoFormat
selected. click onCells dialog box
Users
the menuhavebar
many
andoptions
select tothe
format cells
option in a worksheet.
Format. A drop-downappears
menu appears
which from
has which
variousthe option
tabs like Number tab,
To format cells, they have to first select the particular cell Alignment
called Cells needs to be selected. A Format Cells dialog box appearstab, Font
which hastab, Border
various tabstab,
likePattern tab and
or cells that are required to be formatted. They then have
Number
to click ontab,
the Alignment
menu bar andtab,select
Fontthe
tab, Border
option tab, Pattern Protection
Format.
tab.
tab, and Protection tab.
Each of these tabs is explained here:
Fig.3.5.1: Formatting of Cells
Number tab: The number tab allows the user to select
data types. The various data types that Excel provides
are general, number, currency, accounting, date, time,
percentage, fraction, of
Formatting scientific, text,
input Cells & special and custom.
If the user wants all the values to be expressed in
result cells needed to get
Dollars ($), then the data type ‘Currency’ has to be
desired output of the
selected. This would in turn list out a set of options like
problem else it gives wrong
the currency to be inserted and the way it should be
result or error.
depicted.
Font tab: The font tab enables the user to change the
font size, style and effects of the text.
Fig.3.5 Formatting of Cells
Border tab: The border tab allows the user to add
Each of these tabs is explained here: borders with different styles and colors.
Number tab: The number tab allows the user to select data types. The various data types that Excel provides are
Pattern tab: The pattern tab allows the user to add color
general, number, currency, accounting, date, time, percentage, fraction, scientific, text, special, and custom. If the
user wants all the values to be expressed in Dollars ($), then the data to the selected
type cellshas
‘Currency’ andtochange the background
be selected. This style.
would in turn list out a set of options like the currency to be inserted and the way it should be depicted. 70
Protection tab: The protection tab enables the user to lock down menu appears from which the user has to click on
cells and hide formulas. This option will work only if the the option Freeze Panes.
worksheet is protected (discussed later).
With this, the headings will be frozen and will be visible at
Customized Formatting all times even when the worksheet is scrolled down. In
order to undo freeze panes, the headings (row or
This is one of the features of number formatting where we can column), which have been frozen, have to be highlighted,
format the number as per desired look and feel. This is the Windows option selected and the option Unfreeze
generally used if we need to format certain financial Panes clicked on. This unfreezes the headings.
calculations or population calculations in terms of lakh, crore,
millions, etc. Refer to workout:
DISPLAY CODE
Freeze Panes
71
S ECTION 6
Cell Referencing
Sometimes, if values are directly used in the formula, there
Video 3.6.1: Cell References could be scope for errors as the values used in the formula
may be wrong. It is also difficult to identify the error as the
formula is only visible in the formula bar. To overcome this
problem, cell references can be used.
72
on spreadsheet and they increase data validity. You can use Create a cell reference on the same worksheet
data contained in different parts of a worksheet in one formula
or use the value from one cell in several formulas. You can Create a cell reference to another worksheet
also refer to cells on other sheets in the same workbook, to Change a cell reference to another cell reference
other workbooks and to data in other programs. References
to cells in other workbooks are called external references.
References to data in other programs are called remote There are three types of cell references:
references. A. Relative cell reference
73
Relative Cell Reference Absolute cell reference
Relative cell references are references to cells relative to the If a user does not
position of the formula. When a user creates a formula, want references to
GALLERY 3.6.2: Absolute Cell
references to cells or ranges are usually based on their change when he/ Reference
position relative to the cell that contains the formula. For she copies a
example, when we formula to a
wish to calculate different cell, then
GALLERY 3.6.1: Relative Cell
sum of two absolute reference
Reference
numbers, the cell can be used.
C2 contains the Absolute
formula =A2+B2; references are cell
once we enter, it will references that
give result as 17 always refer to
which is the sum of cells in a specific
the value of cells location. Sometimes, it is necessary to keep a certain position
A2=8 & B2=9. If we that is not relative to the new cell location. This is possible by
copy the same inserting a $ before the column letter or a $ before the row
formula or drag it to number or both. This is called absolute positioning or absolute
C3 for calculation of referencing.
11 and 2 whose cell addresses are different, that is, A3 & B3,
the formula will calculate the sum as C3=A3+B3. The result For example, if a user’s formula add cell A2 with cell B2
will be 13. Here the formula in C3 takes the relative reference (=A2+B2) and he/she copies the formula to another cell, both
of input cells which is adjacent to it as per the formula. This is references will change. The user can create an absolute refer-
known as relative referencing. When a formula that uses ence to cell B2 by placing a dollar sign ($) before the parts of
relative references is copied into another cell, the references the reference that should not change. To create an absolute
in the pasted formula update and refer to different cells reference to cell B2, for example, dollar signs have to be
relative to the position of the formula. added to the formula as follows =A2+$B$2. The dollar sign
locks the cell value and location of B2 to a fixed value and po-
sition. When it is copied and pasted to cell C3, the value of B2
remains exactly the same but A3 is relative. In the first instant
C2=A2+$B$2=8+9=17, while we copied to
74
C3=A2+$B$2=11+9=20. This means A2 is relative reference value and will not change to B$3. The result cells are:
in formula and $B$2 is absolute reference. C2=A2+B$2=9+8=17 and C3=A3+B$2=11+8=19, as shown
above. Similarly, we can make C2=A2+$B2 and once copied
Mixed cell reference to C3 it will be =A3+$B3. Notice the changes: B–column
Mixed cell referencing is a combination of relative and remains same as it is absolute, but row changed to 3. So,
absolute cell references. In mixed cell referencing, a part of C2=A2+$B2=9+8=17, whereas C3=A2+$B3=11+1=12. Mixed
the formula is relative while some part of it is absolute. In a reference is very useful in case of creating a multiplication
mixed cell, reference can either have the row reference table.
absolute and
column relative GALLERY 3.6.3 : Mixed Cell Keynote 3.6.1 on Cell References
(as in B$2) or Reference
the column
reference
absolute and the
row relative (as
in $B2).
Residing the
above example
of A2+B2, the
user copies the
formula to an-
other cell, all the
references will change. A mixed reference can be created to
cell B3 by placing a dollar sign ($) before 2 so that those parts
of the reference do not change. To create a mixed reference
to cell B2, for example, a dollar sign needs to be added to the
formula as follows: =A2+B$2.
75
S ECTION 7
76
Filtering Data To extract the records, click on an arrow button in
the column. A list of values gets displayed for
Database filtering enables a user to view only those specifying the condition.
records that satisfy certain criteria. There are two types
of filters in Excel: AutoFilter and Advanced Filter. Click on Custom. A dialog box called as the Custom
AutoFilter gets displayed. This box takes a
AutoFilter - AutoFilter is a maximum of two conditions on the selected column.
Video 3.7.2: Sort & Filter
type of filtering data Data using Excel For the string columns, wild card characters ‘?’ and
feature in Excel that helps ‘*’ can also be used. The wild card character ‘?’ can
in selecting and displaying be used for representing any single character while
only the data that is ‘*’ can be used to represent any series of characters.
required. For instance, an
employee database Click on the arrow of the left-most drop down box
contains details about all that displays the comparison operators. Select the
the employees in the required operator.
c o m p a n y, w h o a r e
working throughout India. Click on the arrow of the right-most drop down box
Using an AutoFilter, it is possible to find out the number that displays a list of values. Click on the value
of employees working in a particular state, say, Andhra button once again if the required value for condition
Pradesh, and their details. is available so that the displayed list goes off. Enter
the required value in the box.
Following are the steps that a user has to go through for
filtering data using AutoFilter: In case, a second condition needs to be included,
click on AND or OR. Enter the condition in a similar
Insert data in a worksheet. Select a cell in the table. way as entered for the first condition. Click on the
OK button.
Click on the Data menu.
The records that meet the specified criteria will get
Click on the Filter option and then on the AutoFilter displayed. These records can also be copied to
option. The AutoFilter option is now activated. another location.
Arrow buttons are displayed in all the cells with field In order to display all the records, the user should go to
names. the Data menu and click on the option called Filter. The
77
AutoFilter option should be selected from the drop down criteria. The filtering criteria could include multiple
menu that appears. To view all the records,AutoFilter conditions that can be applied to a single column as well
option has to as multiple columns.
be removed.
GALLERY 3.7.1 on Autofilter To do this, the Workout:
option has to Sortprint.pdf
be
deactivated
by clicking on
it. [Refer
Exhibits
3.7.1(a) –
Exhibit 3.7.1(a) 3.7.1(e) (in
Appendix) for
screenshots
on AutoFilter
along with an example]. Refer to the gallery to view the
Exhibits 3.7.1(a) - (e): Screenshots on AutoFilter.
Advanced Filter
Conditional Formatting
79
GALLERY 3.8.1:
Conditional Formatting
80
S ECTION 9
81
Data validation feature of Excel is used to define Workout:
restrictions on what data can or should be entered in a
cell. Suppose we need to format cell A1 so that it can Datavalidation.xls
only take whole numbers between 2 and 5. If we input
any other number it will show a warning message. Select
the cell A1. Go to Data and then Data Validation. You will
get Settings, Input Message and Error Alert. In Settings,
chose Whole Numbers between 2 and 5. Then chose
Input Title as Input and Input Message as “Input a Whole
Number”. In the error alert chose warning -- put the title
as output and message as “The number is not Between 2
and 5”. The checks for Data validation if the user inputs
any number other than between 2 and 5.
82
S ECTION 10
Video 3.10.1: Getting started with formulas The ability to apply formulae to values and compute
and functions results make spreadsheets a powerful application
program. Spreadsheets can be used to perform simple
arithmetic operations like addition, subtraction,
multiplication and division. They can also be used to
apply complex formulae to values and compute results.
In Excel, all formulae should be entered starting with an
‘equal to’ sign, i.e., ‘=’ and then followed by the values or
references of cells whose values will be used in the
calculation as per the operators used. For example, the
formula =2+3+5 adds the numbers 2, 3 and 5.
83
Formula and functions are Video 3.10.2: Functions – Mathematical, Logical, Statistical and
correlated. The same Formulas & Financial; Lookup
addition of three numbers Functions in Excel - 1
described above can be A function is a special keyword which can be entered into
calculated by using built-in a cell in order to process some data which is appended
function called SUM() by within brackets. The syntax for using functions is: cell
selecting the range address = Function Name (Data). The arguments passed
B3:B4:B5 and using the to a function often include a range of cells. Excel
formula B6=SUM(B3:B5). recognizes these functions provided they are preceded
by an equal sign and end with
Sometimes formula contains function. Suppose we need brackets. A typical spreadsheet Video 3.10.4:
Formulas & Functions
to find the average of the above described numbers. It program contains over 100 in Excel - 3
can be set as a formula like: B6=SUM (B3:B5)/3. different functions for
performing statistical, financial,
Replication mathematical and logical
Video 3.10.3:
If a user wants to apply a Formulas & operations. These functions
formula to values in more Functions in Excel - 2 are useful in performing simple
than one cell or range of and frequently used
cells, then replication may calculations. Click on the
be used. Replication is function fx in the formula bar,
copying the formula and you will get different types of Functions used inExcel.
applying it to a range of
cells by dragging the
mouse and selecting the
cells. Replication saves time, eliminates redundancy and
is easy to use.
84
Text functions
Logical functions
Information functions
Financial Functions
Financial functions
Statistical functions
Database functions
85
Table 3.10.1: Financial Functions
86
i) Where, value1, value2,… = values during periods 1, 2, …, repre-
Keynote 3.10.1 on Financial Function senting income during that period.
rate = interest
rate per period. iv) Where,
nper = total values = reference to the cells that contain numbers for
number of which the IRR need to be computed.
payment
periods in an guess = a guess number that is approximately close to
annuity. the IRR result.
Fig.3.10.3(a)
88
functions.
Trigonometrical Functions
functions.
90
Logical functions
91
are already stored in the database. Table 3.12.4 de-
scribes a few Date & Time functions in Excel along with
the syntax for using those functions.
Date Function
92
Workout for Statistical functions:
Statistical Analysis.pdf
LOOKUP.xls
93
S ECTION 11
94
Column charts: They comprise horizontal bars that Chart wizard
show comparison of items. Column charts provide a
ready comparison between separate items. These The Chart Wizard directs the user in the process of
charts can also be used to show changes over time, creating a chart or modifying an existing chart. It takes the
usually known as time series. user through the process of creating a chart by asking him/
her to provide the various specifications like data range,
Bar charts: They comprise vertical bars that show chart type, chart format, how the data needs to be plotted,
comparison of items. Though not a good choice for chart title, axis title, legend, etc. The chart wizard allows
time series, they are more useful in comparing items. the user to create either an embedded chart or a chart
sheet. An embedded chart is a chart that is placed and
Line charts: They are used in time series analysis to saved within the same worksheet where the data is
show trends or changes over different time periods. located. A chart sheet is a new worksheet in which the
Pie charts: They are used to express the relative chart is created. This chart is kept separate from the
percentage of each portion as a part of the whole. worksheet on which the data is given. Refer to the Gallery
They are used to for Exhibits 3.11.1(a) - (f): Screenshots on Charts.
compare parts of a Video 3.11.2: Creating
Charts in Excel Creating charts in spreadsheets
whole. For example,
the population of Charts or graphs are visual representations of the raw
Hyderabad as data. They can be easily created and at the same time can
compared to that of be more easily understood than the raw data itself.
Andhra Pradesh can Presenting data in the form of charts or graphs is more
be represented by a user friendly as compared to presenting the raw data.
pie chart. In pie charts, Based on the data that needs to be represented, one can
values are explained create various types of charts like pie charts, line charts,
in percentage terms. bar charts, column charts, etc., using the spreadsheet
One can use pie charts software.
to show relative percentages when the parts add up to
make 100 percent.
95
Following is the procedure that a user has to go through for axes, gridlines, legend, data labels and data table.
creating charts in spreadsheets: The user then has to click on Next.
Enter data in a worksheet and highlight all the cells The fourth dialog box prompts the user to indicate the
(including the headers) which should be included in chart location, i.e., the place where the user wants
the chart. the chart to appear. The box includes two options:
whether the chart should be placed on a new work-
To create a chart, go to the Menu bar and click on the sheet or whether it should be included in the active or
Insert option. A drop down menu appears from which current worksheet. After selecting an option, the user
the option called Chart has to be selected. has to click on Finish.
Alternatively, the user can directly click on the Chart
Wizard icon on the standard toolbar. A chart wizard Workout for Chart wizard:
helps the user create a chart by showing a string of
dialog boxes. CHART WIZARD.pdf, GSS.XLS
Pivot Table
97
After creating a PivotTable, the data can be rearranged,
organized and analyzed by dragging and dropping fields
in the PivotTable. The user can also include subtotals,
change the summary function for a field, or select a
custom calculation for the PivotTable.
98
S ECTION 13
What-If Analysis
Scenario Analysis
Video 3.13.1: Creating and Displaying Scenarios
A scenario is a tool which is used for planning the
outcomes of data by modifying various cells in the
worksheet. It is a specific set of values that can be saved
in Excel and which can be automatically substituted in a
worksheet. Excel can be used for displaying numerical
data, which is relevant to a particular date, month, topic,
etc. The Scenario Manager is used for entering various
values into the worksheet and to forecast the outcome of
the data. These values are retained for use in the future
and are stored in a hidden part of the workbook. The
values can be retrieved by the Scenario Manager to show
the scenario that uses those specific values. Scenarios are
generally used for predicting the future values. They are
used for conducting a Best Case/Worst Case scenario
regarding a situation. For
99
instance, in the final
scenarios can be Keynote 3.13.1: Scenario Manager results of the Keynote 3.13.2: Data Tables
used for formula. In a
budgeting. A two-variable data
budget consists table, both a row
of several and a column
variables that can be altered to
influence the find the change
financial in the final
performance of results of the
an organization. formula. Data
With the use of tables are used
scenarios, the for creating
decision maker can try out different combinations of the multiple versions of a single operation and enables
variables and check their effect on the financial comparison of these versions in the worksheet.
performance. He/she can enter and save the various
groups or combinations of variables (called scenarios) in One-variable data table: In a one-variable data table, the
the worksheet and can then switch between them to input values are either column-oriented (i.e, listed down
carry out the what-if analysis. This way, one can get the a column) or row-
best as well as the worst results for a particular scenario. oriented (i.e, listed Video 3.13.2: Data Tables - 2
Scenarios can be used for finding out the effect of across a row). The
changes in discount rates on the sales, interest rates on formula used must
loan or investment, etc. refer to an input cell.
Data Tables Tw o - v a r i a b l e d a t a
table: In a two-variable
Data tables consist of a range of cells that display how data table, the input
altering some values in the formula will have an effect on values are both
the final results of the formula. These tables can be a column-oriented (i.e,
one-variable data table or a two-variable data table. In a listed down a column)
one-variable data table, either a row or a column that is as well as row-oriented
part of the formula can be altered to find out the change (i.e, listed across a row). This data table uses only a
100
single formula but with Video 3.13.3: Using Goal given break-even point, for finding out the discount rate
two sets of input Seek in Excel on the products to get the required amount of profit, etc.
values. That is, the
formula refers to two
different input cells.
101
S ECTION 14
102
Video 3.14.2: Data Analysis Tool pack in Excel
103
S ECTION 15
104
Video 3.15.2 : Installing Data Analysis Video 3.15.4: Regression Analysis
Tool Pack using Excel
105
R EVIEW 3.1
Question 1 of 8
In Microsoft Excel, the formula: =3 + 5*6 would give
A. 33
B. 48
C. 23
D. An error
Check Answer
106
S ECTION 16
© 2009, IBSCDC.
No part of this publication may be copied, stored, transmitted, reproduced or distributed in any form or medium whatsoever without the permission of the copyright owner.
107
the national capital, the venue for the event. With athletes objective set by Mr. Kane. Dr. Mathur vaguely recalled from
expected from neighbouring countries, Mr. Kane is very his college studies that there is a scientific way of handling
clear that there should be no compromise on the diet such a situation, but he is unable to recall the details. Could
aspect. Mr. Kane asked Dr. Rohit Mathur, the nutritionist at you help him?
AAI, to personally take charge of the matter and organise
the purchase of foods in an efficient manner. Having resolved the problem with your help after a week’s
joint struggle, Dr. Mathur was very happy to report the
Specialised foods for athletes have a limited market. Hence same to Mr. Kane the very next morning. However, Mr.
there are only two suppliers in the country. The other option Kane felt that Mathur should be addressing the problem
is to import, but that is a costlier option. Kher & Associates head on, by identifying the worth of the nutrients within the
Limited (K & A), a hospitality firm specialising in nutritive given limitations for each of the companies.
diets, is located in Navi Mumbai and produces eight sports
foods. Chawla Sports Foods Limited (CSFL), a Chandigarh This query once again put Dr. Mathur back on a recall track
based firm, produces six types of sports foods. Mr. Arjun of his graduation lessons without success. Could you help
Kher, CEO of K & A, is elated at the possibility of getting an him once again?
order to supply food items for athletes in the forthcoming
athletic meet. And so is Mr. Deepak Chawla, CEO of CSFL.
Calcium Mgms. 400 Iron Mgms. 2.3 10.4 0.8 0.48 0.61 2.1 1.79 0.5
109
Exhibit 3.16.3
Element Unit F1 F2 F3 F4 F5 F6
Carbo-
Gms. 72.6 57.6 2.5 4.2 26.1 0
hydrate
Calcium Mgms. 25 73 50 20 90 0
110
S ECTION 17
© 2012, IBSCDC.
No part of this publication may be copied, stored, transmitted, reproduced or distributed in any form or medium whatsoever without the permission of the copyright owner.
111
autonomy. The new idea of a uniform database through the Exhibit 3.16.1
implementation of an ERP package caused resentment
among the employees. The departments, as such, also had
diverse opinions on the matter.
112
Note:
2. Teams will discuss at the end of 3rd, 5th, and 10th rounds
only.
5. Find the total score for each of the teams and the maxi-
mum and minimum total scores (as shown in Exhibit I).
113
C HAPTER 4
Source: http://zone.ni.com
S ECTION 1
115
to requisite file-processing system, records are stored in various
Video 4.1.1: Database
information to the Management System files. In order to extract, add, or delete records in a
end users and their particular file, various application programs need to be
organizations. It written. The file-processing system has certain
involves the disadvantages like difficulty in accessing data,
definition of duplication of data, large storage space being required
structures for data and other security related problems. Since data was
storage and the stored on the tapes as long and sequential computer
provision for files, any slight modifications in the data had to be made
manipulation of in all the files that contained the data. These difficulties
data. It also ensures led to the development of the DBMS.
system security, preventing data loss due to system
failure and unauthorized access. The DBMS software is Table 4.1.1 Different Terms Used in Different Models:
responsible for the creation, maintenance and use of
database systems in an organization. In the DBMSs, the
data records are consolidated into databases that can be
accessed by different application programs. The DBMS
serves as an interface between users and the various
databases. This helps the users access data easily. The
most typical DBMS is a relational database management
system (RDBMS). Microsoft Access is a popular
example of a single or small-group user DBMS. Entity-Relationship model is useful for database design
Microsoft’s SQL Server, Oracle, MySQL, etc., are and consists of entities, relationships and attributes as
examples of a DBMS that serves multiple-users. the basic elements or constructs. An entity consists of
basic objects or concepts about which data is collected
How does a DBMS solve the problems of the tradi- and stored. These may be places, people, objects,
tional file environment: events, customers, orders, or something abstract like a
Prior to the advent of the Database Management loan or a holiday. Employees, invoices, projects, etc., are
System (DBMS), organizations stored data in a file- examples of entities. In the relational model, an entity is
processing system, which followed electronic file equivalent to a table. Entities can be classified based on
processing approach to store and manipulate data. In a whether they are independent or dependent. In certain
116
instances, they are also referred to as strong or weak. An one instance of another entity Q. For example, the
independent entity is one which does not depend upon employee name (P) is associated with the identification
another entity for identification while a dependent entity number (Q) of the employee. Also, the identification
depends upon another entity for identification. The occurrence number of the employee can be used to identify the
of an entity, also known as the instance of an entity, is an employee name. One-to-many or 1:N relationships take
individual occurrence of an entity. In the relational model, an place when one instance of an entity P is associated with
occurrence is equivalent to a row while an attribute is zero, one, or many instances of another entity Q.
equivalent to a column. However, entity Q has an association with only one
instance of entity P. For example, a department (P)
A relationship represents the association between two or consists of a number of employees (Q). All these
more entities. It can be defined as the way in which data is employees (Q) belong to only one department (P). This
shared between these entities. For example, an organization relationship is also called the many-to-one or N:1
consists of many departments. Each department consists of a relationship. Many-to-many or M:N relationships take
number of employees. Each employee is identified with an place when one instance of an entity P is associated with
employee identification number. Relationships are classified zero, one, or many instances of another entity Q. And,
on the basis of degree, connectivity and cardinality, direction, one instance of entity Q is associated with zero, one, or
type and existence. The degree of a relationship refers to the many instances of entity P. For example, in an
number of entities that are associated with the relationship. organization, a single project (P) can be assigned to
Binary relationships (relating two entities), ternary many employees (Q) and at the same time, a single
relationships (relating three entities), N-ary relationships employee (Q) can be assigned to many projects (P). This
(relating N number of entities), etc., are the different types of relationship is also called the N:M or non-specific
relationships classified on the basis of degree. When an entity relationship. The direction of a relationship indicates the
is related to itself, the relationship is termed as a recursive flow of relationship from the originating entity to the
relationship. Connectivity refers to the mapping of related terminating entity. In a relationship, the entity from which
entity occurrences in the relationship. These can be one or the relationship commences is called the parent entity
many. Cardinality refers to the actual number of associated while the entity at which the relationship concludes is
instances for each of the two entities. called the child entity. The connectivity of a relationship
Three types of relationships based on connectivity take place decides the direction of the relationship. For example, in a
between entities. These are one-to-one, one-to-many and one-to-one relationship, the direction flows from an
many-to-many relationships. One-to-one or 1:1 relationships independent entity to a dependent entity. In one-to-many
take place when one instance of an entity P is associated with relationships, the direction always flows from one side to
117
many sides, only once to the parent entity. The direction will The E-R model is based on various structures. These
be an arbitrary one in situations where both the entities are structures are formed out of the entities and they define the
independent or in case of relationships between those entities. Refer to Figure 8.8 for
many-to-many Video 4.1.2 : Databases the various structures.
relationships.
For a database designer, the E-R model:
Converting E-R model
to a database model: Goes well with the relational model. The constructs
The E-R model should used in the model (entities and relationships) can be
be converted to a model transformed easily into relational tables.
which can be used It is simple and can be easily understood by the end
directly in a database. user.
Therefore, we need to
convert the E-R model to
It requires minimal training.
a relational model. The relational model consists of
It can be used as a design plan for implementing a
relations, tuples and attributes. A relation is a two
data model in database management.
dimensional table which is made up of tuples. A tuple in the
relational model is a row in a database. It is made up of one
or more attributes (or columns in the database model).
Attribute is a characteristic or a property of the relation
contained in a tuple. Table 1 gives the different terms which
are used by different models.
118
S ECTION 2
Earlier, databases were designed based on the network pertaining to a single instance like the details of a
(collection of records that is organized as collections of particular employee, say, Nikhil.
arbitrary graphs) and the hierarchical (collection of records
that is logically organized to conform to the upside-down In relational databases, each row is distinctive and each
tree structure) models. In 1970, Edgar F. Codd proposed column has a unique name. Each row has a key that
the relational model. This model gained prominence over identifies the row with the relation. Data records stored in
the years and began to dominate the data processing tables can be accessed using a primary key. The primary
applications scenario in business organizations. key is a field in a record that is used to distinguish a record
from other records in the table. For example, employee
The Relational Database Model, also known as the number will be the primary key in the employee table.
Relational Database Management System (RDBMS), is Thus, relational databases allow the designating of certain
based on the concept of tables or relations. In this model, fields as keys to facilitate specific field value search, i.e.,
the data is organized in the form of two-dimensional when two different tables constitute the same field values,
tables, representing data and relationships. Each row of a a single operation can be performed by matching the field
table corresponds to a record, while each column values to select the related records in the two tables. At
corresponds to a field. Unique keys or primary keys are times, the fields will be referred to by the same name in
used to access records in a table. The fields contain both the tables. For instance, a table containing the
attributes like employee ID, employee name, age, etc., personal details of the employees will have a field for
while a row (also known as a tuple) identifies the details employee ID. A table containing the official details of the
employees will also have an employee ID field. This
119
employee ID field can be used as a medium for relating the The process of normalization is based on the concept of
two tables. Another example is linking a customer file and an normal form. A relational table is said to be in a normal form if
accounts receivable file by using a common field, such as it satisfies a set of constraints. A database can be normalized
the customer account number field. The user can then up to six normal forms but most databases
request a report consisting of fields from both the customer
Table 4.2.1(a): Table Not Complying with the Second Normal Form
and the accounts receivable records. This facility offered by
relational databases can also be extended to relate multiple Student Course ID Percentage Course Title
ID Obtained
tables. 111 223 70 Data Warehousing
112 224 60 SQL
Relational databases also have keys called foreign keys. 113 225 85 RDBMS
114 226 75 C and C++
These keys are primary keys of one table which can be 115 227 65 Java
included in another table for relating or joining the data. For 116 225 55 RDBMS
example, the social security numbers of the father and 117 224 56 SQL
118 223 87 Data Warehousing
mother can be used to represent their child. In this example, 119 226 62 C and C++
the social security number of the father and/or the mother 120 227 78 Java
acts as a primary key in a table that represents them while it
acts as a foreign key in the table which represents their child. are only up to the third normal form. To be in the first normal
form, every table must have a primary key, which is a column
Relational database management systems like DB2, (or set of columns) that uniquely identifies each row. Usually,
Microsoft SQL Server, Oracle, Informix, Sybase SQL Server, each table contains only one primary key. Sometimes, there
Ingres, SQLite, Access, etc., are based on the relational can be more than one primary key in a table. In such
model. situations, one key is selected as the primary key; the others
are called alternate keys.
Normalization of data: Normalization is a technique used
for designing relational databases. It refers to the To be in second normal form, the table should be in the first
optimization of tables to remove any redundancy and normal form and there should not be any partial dependency,
scalability issues that might arise when the amount of data is i.e., all the non-key fields (fields that are not primary) should
increased. It is a two-step process which involves arranging be functionally dependent on the full primary key. Refer to Ta-
the data in a tabular form after deleting the repeating groups ble 4.2.1(a) for an example of a table that does not comply
and the duplicated data from relational tables. with the second normal form.
120
Table 4.2.1(b): Table Complying with the Second Table 4.2.2(a) : Table not Complying with the third
Normal form: normal form:
121
Table 4.2.2(b): Tables Complying with the Third Normal
Form
To convert the table into the third normal form, the table
should be further split into two as given in Table 4.2.2(b). One
table would have the customer ID, customer and the
salesperson while the other would have the salesperson and
the zone.
122
S ECTION 3
Capabilities of DBMS
DBMS reduces responsiveness of the data. The DBMS approach enables
d a t a better data sharing and avoids duplication.
redundancy and
improves The DBMS helps in effectively managing huge volumes of
productivity and interrelated data. Any changes made in the data are
concurrency. In reflected in every location at which the data is recorded.
a DBMS, data is The DBMS also helps in preventing data redundancy.
integrated and Different applications in banking, such as check
can be processing, savings accounts, bank credit cards,
accessed by automated teller systems and loan accounting require such
multiple activities to be done on a regular basis. The entire data
programs and related to the customers can be consolidated into a
users. In a common customer database.
DBMS, simple The DBMS enables frequent updation and maintenance of
Source: http://www.adroitglobalnetwork.com queries can be databases so that they reflect new business transactions.
used to obtain The DBMS supplies information to the end users through
information. Therefore, there is no need to write programs. application programs. These programs share the data that
The DBMS approach reduces the costs involved in data are stored in the common databases. Also, the end users
maintenance. Managing data in databases augments need not know where and how the data is physically
maintenance through data independence. In a DBMS, stored. The DBMS provides inquiry and reporting capabili-
data is stored in databases which are reliable and secure. ties to the end users. These facilities enable the end users
Database management enhances the accessibility and
123
R EVIEW 4.1
Question 1 of 3
The Database Management System (DBMS)
i. Serves as an interface between users and the
various databases.
ii. Helps the users to access data easily.
iii. Enables the programmers and administrators to
create, delete, interrogate and maintain
databases to provide requisite information to the
A. Only i and ii
Check Answer
124
C HAPTER 5
Source: http://www.techbubbles.com/
S ECTION 1
Tables
Video 5.1.1: Working Table is a collection of data about Video 5.1.3 : Creating a Video 5.1.4: Adding
with Tables specific theme such as product, Table Relationships
Between Tables
customer, student, etc. Data is or-
ganized into columns (fields) and
rows (records or tuples). In the da-
tasheet view, user can add, edit or
view the data in the table. In the
design view, user can create the
entire table from scratch.
126
Query is a statement Video 5.1.5: Creating a Forms
used to fetch/retrieve Simple Select Query in
MS-Access Forms are used to enter or modify data in a database.
data from the database.
It can be used as a Ms Access has a form wizard to create forms.
source of records for
Video 5.1.6: Working with
forms and reports.
forms
127
Reports MS Access 2007 Application Development
128
Video 5.1.13: MS
Video 5.1.11: MS-
Access Tutorial -2
Access Tutorial - 1
129
R EVIEW 5.1
Question 1 of 3
A __________ enables you to view data from
a table based on a specific criterion
A. Form
B. Query
C. Report
D. Table
Check Answer
130
C HAPTER 6
Source: http://computerforensicsmanagement.com
This document is authorized for internal use only at IBS Campuses Batch of 2013-2015, Semester-I. No part of this publication
may be reproduced, stored in a retrieved system, used in a spreadsheet, or transmitted in any form or by any means - electronic,
mechanical, photocopying or otherwise. Transmission, copying or posting on web are violation of intellectual property rights.
S ECTION 1
Introduction
132
S ECTION 2
133
workplaces or is simply read by an unauthorized person, internally some employees wish to steal some
problems of privacy are found. Second, criminals are confidential information from their employers while
using the computer as a tool to commit a crime, such as leaving the organization. It will cause substantial cost
the distribution of child pornography, and the growth of and inconvenience to the organization. For example, the
the internet has made these crimes both more common development of computer viruses such as the “love bug”,
and more difficult to police. Criminals are working worms and Torjans represent some major threats to the
against encryption techniques and exchanging data with systems. Let us look into some less obvious threats such
few opportunities for the police to monitor and stop. as telephone hacking or phreaking, which is gaining an
Hence standard warrants for search and telephone authorized access into an organizations’s telephone
tapping are required to be modified. Third, a computer is network in order to make free long-distance calls.
regarded as a source of evidence. If any evidence can Hacking frequently involves people who operate from
be obtained and subsequently decrypted, it will be many states.
helpful to criminal investigators.
Fraud
Hacking
We can define fraud as
Hacking is gaining any dishonest
an unauthorized misrepresentation of
access to facts intended to induce
information another to do or refrain
systems from doing something,
deliberately and it which will cause losses.
may amount to a Hence in this context the
notional security fraud will result in
crime when the obtaining a benefit by
defendant Source:
Altering a com- http://lawincyber.files.wordpress
accesses .com
sensitive puter input in an
Source:http://1.bp.blogspot.com information. Let us unauthorized
look into some way. This will require a little technical expertise.
external threats now. Some people wish to break the Altering, destroying or stealing the output
system from outside to access sensitive information, or usually to conceal unauthorized transactions.
134
Altering or deleting stored data. Altering or offense when a person without the permission of the
misusing existing system tools or software copyright owner does the following act(s):
packages or altering code for fraudulent
purposes. It requires thorough programming Makes unauthorized copies by burning music
skills and is not very common. files or films on a CD-R or a DVD-R.
Distributes and sells or hires out unauthorized
Some people will manipulate banking systems to make copies of CDs, VDs and DVDs.
unauthorized electronic funds transfers and it would be
Distributes unauthorized copies on a larger scale
considered as serious thefts. An increasing problem is
as a commercial enterprise on Internet.
the unauthorized use of credit card numbers and other
data collected as part of the identity theft. Possesses unauthorized copies with a view to
sell, distribute or hire out to other people.
Piracy
While not dealing commercially, distributes
In United unauthorized copies on such a scale as to have
States, most a measurable impact on the business of the
states passed copyright owner.
laws to The penalties for these copyright offenses will depend on
protect the seriousness of the offense.
copyrighted
materials and Pornography
people who
In the United States it may be legal or illegal for adults to
a r e
read or view obscene material and it depends on the
distributing
rules of state or residence. In most states, child
a n d
pornography is regarded as illegal. Even if the
Source: http://cybernetnews.com downloading
pornography is not illegal per se, it may be considered
copyrighted
harmful or distressing for others to see, whether coming
materials without permission are liable to face civil
across it unexpectedly as adults or as children. The
actions for damages, penalties and which may also lead
various offenses are related to possession, storage and
to criminal prosecution. According to English law,
distribution of obscene material, although some states do
Designs and Patents Act 1988 recognizes Piracy as
not criminalize mere possession as long as there is no
attempt to show it to others and if the distribution is not
135
for any gain. But child pornography, which features the biological virus, which
Video 6.2.2: Viruses,
sexual abuse of children, is often considered so serious spreads by inserting itself Worms and Botnet
that mere possession is an offense. The general test of intoliving cells. By Explained
obscenity is whether the material tends to corrupt those extending the analogy,
who are likely to read, see or hear it. when a virus is inserted
Harassment into a program, it is
termed as an infection
While content my be offensive in a non-specific way,
and the infected file is
harassment directs obscenities and derogatory
called a host. Viruses are
comments at specific individuals focusing on gender,
regarded as one of the
race, religion, nationality and sexual orientation. Often
several types of malicious
this will occur in chat rooms, through new groups, and by
software. The term virus is often extended to refer to
sending hate e-mails to interested parties. All forms of
worms, Trojan horses and other sorts of malicious
unsolicited e-mails and advertisements an also be
software. Let us understand a basic rules that a
considered to be forms of Internet harassment where the
computer virus cannot directly damage hardware, but
content is offensive or of an explicit sexual nature. Now
only software.
termed Spam, it has been criminalized in various
While viruses can be deliberately destructive, may other
countries.
viruses are merely annoying. Some viruses have delayed
Computer Virus payload, which is called a bomb. For instance, on a spe-
cific day a virus might display a specific message or wait
We can define a until it has infected a specific number of hosts. A time
computer virus as bomb occurs on a specific date or at a specific time, and
self-replicating/self- a logic bomb will occur when the user of a computer
reproducing- takes an action that will trigger the bomb. However the
automation program, negative effect of viruses is their uncontrolled self-
which spreads by reproduction, which wastes computer resources.
inserting copies of
As of 2006, viruses are less common than network-borne
itself into other
worms, due to the popularity of the internet. Anti-virus
executable codes or
software, which is initially designed to protect computers
documents. It Source: http://2.bp.blogspot.com
from viruses, has a turn expanded to cover worms and
behaves like a
other threats such as spyware.
136
S ECTION 3
137
We can use encryption to ensure secrecy, but we still
need other techniques to make communications secure,
R EVIEW 6.1
particularly to verify the integrity and authenticity of a
message; for example, a message authentication code Question 1 of 3
(MAC) or digital signatures. Another consideration is ______can be defined as a self-replicating
and self-reproducing automation program
protection against traffic analysis. that spreads by inserting copies of itself into
Encryption is also used in software copy protection other executable codes or documents.
against reverse engineering, unauthorized application
analysis, cracks and software piracy used in different
encryption.
Disaster Recovery Planning
A disaster recovery plan is defined as a comprehensive
statement of consistent actions to be taken before,
during and after a disaster. We should then document A. Computer Virus
and test the plan to ensure the continuity of operations
and availability of critical resources in the event of a B. Encryption
disaster. The primary goals of disaster recovery planning
is protecting the organization in the event that all or parts C. Piracy
of its operations and/or computer services are rendered
unusable. We can say that preparedness is the key. The D. Hacking
planning process minimizes interruptions in operations,
ensures some level of organizational stability and an
orderly recovery after a disaster. Other objectives of
disaster planning are mentioned as under:
Providing a sense of security
Check Answer
Minimizing risk of delays
Guaranteeing the reliability of standby systems
Providing a standard for testing the plan
Minimizing decision-making during a disaster
138
C HAPTER 7
Source: http://business.mega.mu
S ECTION 1
Source: http://www.investigativeproject.org
140
Cloud computing has brought major changes in the compliance environment. Combined effect of all these
infrastructure layer.There are new frameworks in the factors can lead to an entirely new scenario.
applications layer that enable agile development for
cloud and scales all at the same time. In client access, Every organization wants to spend more money on new
the CIO (Chief Information Officer) is flooded with a wide applications development and not just on maintenance
range of devices. Largest changes are taking place in as it used to
the data side. Unstructured data is growing at an happen in the
exponential rate while they are generated from both past. The new
inside and outside the organizations. generation of
companies has
Many organizations always face the dilemma of as to created new
how much money they should spend on maintaining ways of
existing developing
infrastructure as applications,
compared to accessing them
developing new and creating
Source: http://www.hewitt-times.org
business value for entirely new
the company. data. They also
want to gain entirely new insights in the backdrop of high
In the past few growth in data volumes and also the different types of
years, growth in data. All these mega trends are somewhat converging to
the IT industry has create entirely new possibilities.
been driven largely
by the new In every organization there are some people who
generation of understand the business and some who understand
Source: http://www.combridges.com
companies such as technology. If left unattended, this can lead to gaps
Google, Facebook, which will not be productive. The gap between these two
Twitter and Apple. Huge volumes of data generated by sets of people has to be bridged and that is the only way
such growth and development are also being thrown at you can create high business value. This new
the CIO of a typical global organization. Additionally, opportunity can be fully exploited by the data experts
there are new norms in the increasingly regulatory and (data scientists) to help bridge the gap. It goes without
saying that such attempts will require changes in people
141
and processes. The role of a server architect could
change to that of a data center architecture cloud
architect. In the earlier days, the provisioning expertise
was required to purchase a server computer. Now it
leads to provisioning a server virtually. Even IT could be
provisioned as a service. All the layers (data,
infrastructure, application and client access) have to
work in sync to take maximum advantage of the new
approaches.
Cloud Computing
143
include creating Google sites thus giving some flexibility/ service, as we pay only what we utilize. In simple words,
customization to the user to create their own sites. Cloud computing is a progression of our technology that uses
Infrastructure include hard ware and software maintenance as the World Wide Web and main servers to continue the
in Redbus.in on Amazon (however software is developed by services. This technology permits for more well-organized
redbus.in). Applications consists of Gmail using only email computing system capable of high-speed processing and
application without much customization. It offers a variety of bandwidth. There is a considerable work efficiency with cloud
works to cloud users. computing because home/office-based computers would not
do all the complicated setting up of numerous applications.
Some of its popular usages are information contact, stockpile
services, etc. This also portrays delivery form of some IT It is the growing bandwidth power of Internet which has
services supported by a set of web protocols. The end result of enabled us to enter the cloud computing era. This new model
the cloud computing is an easily reached website on the World of computing
Wide Web. essentially implies
that an organization
Cloud users are provided with numerous services or or consumer can
applications through access and obtain
the Internet. Data the computer
and Information are processing power
stocked up on and many software
servers at an applications over
isolated place. the Internet. There
Normally, the main is no need to incur
characteristic of capital expenditure Source:
cloud computing is in buying hardware
http://cloudcomputingcompaniesnow.com
its ability to expand equipments and
(scalable) and often software. According to Gartner research, Cloud computing
use practical Source: http://www.vedainformatics.com market was worth $160 billion in 2011. Both hardware and
resources. Spending software companies are contributing to the development of
on a latest cloud computing models. Hardware manufacturers such as
communication, training instruction, multiple license software, HP, Dell and IBM are building large scale cloud computing
or appointing new human resources is not needed in cloud centers which provide processing power, data storage facilities
computing. This actually encompasses a "pay-per-use"
144
and high speed Internet connections to all the client firms house the remote enterprise database servers.
organizations, who depend primarily on the Internet for Since the new
business software applications. Software firms such as cloud computing
environment
does not use its
o w n
infrastructure,
hence there is
no need for
making huge
investments in
h a r d w a r e a n d Source: http://techsol.tnlexperts.com
software assets
on part of the end users, i.e, customers. Instead, they
buy the computing services from remote service
Source: http://www.ngoilgasmena.com
providers and hence have to only pay by usage. This
Google, Microsoft, Oracle, SAP and SalesForce.com type of subscription-based billing is also called on-
offer software applications as services delivered over the demand computing or utility computing. Cloud computing
Internet. Google Apps is a common example which is can be attractive to small and medium enterprises
essentially a complete suite of Internet-based desktop (SMEs) as they usually lack the financial muscles to
software applications such as word processing, make huge investments in hardware/software. But
spreadsheet and calendars. SalesForce.com customer sometimes complex proprietary solutions supporting
relationship management software is offered on Apple i- unique business processes may give competitive
phone. The hardware in the cloud computing advantage to some large corporations, which could be
environment consists of remote servers and client another hybrid computing model where organizations will
machines. The client machines could be desktop PCs, use their own infrastructure for their mission critical
laptops, tablets, cellphones, smart phones (iPhones, applications and adopt the cloud computing model for
Blackberry), etc. Apart from Internet, Wi-Fi and wireless systems that are routine and less critical. Thus cloud
broadband, cellular networks also figure in this computing invariably leads to more flexible infrastructure:
environment. Software as a service firms provide the part of which is owned by the organization and the other
system integration services to clients while large server part rented from large computer centers owned perhaps
145
by the hardware Video 7.3.1: Awesome
vendors.Since the entire ID Cloud Computing Ex-
infrastructure has many plained with Animation
components such as
hardware, operating
systems, enterprise
software applications,
networking, system
integration, data storage
and management, and
different Internet platforms,
many service provider
companies have to adopt total solution provider
approach as they may not be able to survive by providing
merely one or two components mentioned above.
146
S ECTION 3
Case Study: Better off in the Cloud – Case of Bajaj Finance Limited
This case study was written by Sindhuja P N and reviewed by R Muthukumar, IBS Hyderabad. It is intended to be used as the basis for class discussion rather than to illustrate either ef-
fective or ineffective handling of a management situation. The case was compiled from published sources.
© 2012, IBSCDC.
No part of this publication may be copied, stored, transmitted, reproduced or distributed in any form or medium whatsoever without the permission of the copyright owner.
147
personal loans was always expected. To meet the dynamic task as it involved identification of nearly 1.5 million eligible
needs of the market, the use of IT for customer service customers from a hugely populated database of around six
progressed by leaps and bounds. Toward this end, the financial million and then managing these contacts through an end-to-
service industry moved on to the ‘cloud1’ too. In January 2010, end sales cycle. This fuelled the need for a single CRM system
Devang Mody (Mody), head of sales finance & cross selling at that could effectively manage back office as well as front office
Bajaj Finance Limited, was feeling happy and satisfied as he functions to markedly improve loan turnaround times for the
had been able to considerably reduce the time taken to process processing of loans. A single platform CRM could also improve
applications for consumer finance from 45 minutes to just 5 the firm’s ability to handle the company’s promotional
minutes by using cloud computing. campaigns more efficiently and effectively. For instance,
customers with a good payment record could be tracked and
BACKGROUND NOTE offered personal loans and other special benefits.
Bajaj Finance Limited (BFL), formerly Bajaj Auto Finance CLOUD COMPUTING AT BFL
Limited, a diversified non-banking financial company, was Video 7.3.1 Cloud
Computing With this in mind, Mody
engaged primarily in the business of financing. It provided two-
and three-wheeler financing, consumer durables financing, decided to follow the cloud
personal loan cross-sell, personal and small business loans, computing approach to
vendor financing, mortgages, construction equipment finance, achieve endless scalability
and infrastructure finance. During the fiscal year ended March and to save on the capital
31, 2010, BFL’s net income was Rs. 6584 million. As of 2011, spending on IT infrastructure.
the company was the leading player in the Indian asset finance Under his strategic initiative,
market. the cloud computing (Refer to
Exhibit I for ‘the explanation
However, in 2009, BFL found itself struggling to meet customer of Cloud Computing’) program went live in April 2009 at BFL
demands due to its aging IT infrastructure application which (Refer to Exhibit II for ‘Cloud Computing Project at BFL’). This
needed immediate replacement. The IT infrastructure cloud strategy enabled its customers to file their applications
application was based on an in-house CRM (customer online and get faster approvals. Also it reduced the capital
relationship management) application developed using MS expenditure on IT infrastructure as the company did not have to
Excel and MS Access. This in-house IT application lacked acquire new hardware or software licenses.
accuracy, consistency, and scalability as the business
information was spread across multiple systems. Replacing it Cloud computing enabled BFL to outsource all the IT
with an enhanced IT application infrastructure was a challenging infrastructure capabilities; the company just needed an access
148
point (internet) to access all the data and software services Salesforce.com provided. A major indication of the success of
(SaaS, Software as a Service) on time. In this way, the the service provided by Salesforce.com was in the level of loan
company was able to get rid of all IT infrastructure related activity during the holiday period. The in-house system was
issues and effectively utilize the critical time of the IT team for capable of processing only 1,500 loan applications per day.
strategizing and focusing on delivering what the business But after the deployment of the new system, this number went
needed. Hence, the company decided to choose a cloud up to a whopping 8,500
computing solution based on Salesforce.com2. Video 7.3.2 : Interview with a p p l i c a t i o n s p e r d a y. B y
Devang Mody deploying the new CRM, BFL
BFL moved its consumables financing and cross sell divisions increased its business volume
into Salesforce.com. Thus, the functionality of cloud-based by a factor of more than 100%.
CRM was extended to 300 employees across more than 50
cities in India. The company ‘went on cloud’ on the Mody was excited about
Salesforce.com CRM system in April 2009. Consequently, with speaking about the robustness
the help of the customization toolset, all major processes were of the new system as one
made online. This comprised the integration of various transaction was happening in
services like the call center application dialer, credit bureau, approximately every four seconds. Moreover, an SMS facility
and corporate mobile services. With the help of for sending out text messages directly from Salesforce.com to
Salesforce.com, Bajaj Finance was able to roll out new dealers to communicate loan approvals had a commendable
products and processes across the distribution network. The loan turnaround time of just four minutes. The laser-sharp
approval timelines helped BFL to fulfill its ultimate goal in
total cost of the implementation of this new CRM was Rs3. 1.5
marketing the personal loan as a viable product alternative to
million, assumed to be less than an on premise application
credit cards.
development.
Mody, with the successful implementation of the new CRM,
Most financial services companies move away from the cloud
was on Cloud Nine. He thanked the Salesforce.com CRM that
model computing due to the fear of downtime. However, BFL
had helped the company to harness the power of the internet
experienced much better uptime with the Salesforce.com
which in turn helped BFL to achieve its business objectives
platform than with the older in-house solution. The system
with a high level of customer satisfaction.
reported only 2 outages of approximately 15 minute periods in
9 months of going live. According to Mody, it was impossible
for the company to establish the kind of IT infrastructure
facilities that
149
QUESTIONS FOR DISCUSSION Exhibit II
150
S ECTION 4
Business Intelligence/Analytics
Business Analytics (BA)
Video 7.4.1: What is
refers to the skills, Business Intelligence?
technologies,
applications and
practices for continuous
iterative exploration and
investigation of past
business performance to
gain insight and drive
business planning. The
field of business analytics
has improved
significantly over the past
few years, providing business users with better insights,
particularly from operational data stored in transactional
Source: http://enterpriseblog.net systems.
151
Supply Chain Visibility: Organizations have automated
significant portions of their supply chain. In the process,
The key consumer of these analytics is the business they have enabled the collection of significant data about
user, a person whose job is not directly related to inventory, the
analytics per se (e.g., a merchandiser, marketer, performance of
salesperson, etc), but who typically must use analytical suppliers,
tools to improve the results of a business process along logistics, etc.
one or more dimensions (e.g., profit, time to market, etc). N e w
Fortunately, data mining, analytic applications and applications
business intelligence systems are now being better aid in analyzing
integrated with transactional systems, thereby creating a this data to
closed loop between operations and allowing data to provide useful
be analyzed faster and the analysis results to be quickly insights about
reflected in business actions. Mined information is being t h e
deployed to a broader business audience, which is taking performance of
advantage of business analytics in everyday activities. Source: http://www.ultimosoft.com/ suppliers and
Analytics are now regularly used in multiple areas, partners,
including sales, marketing, supply chain optimization and material expenditures, accuracy of sales forecasts to
fraud detection. The analysis of customer data has better control materials inventory, accuracy of production
provided success in reducing customer attrition, plans, the accuracy of plans for order delivery, etc.
improving customer profitability, increasing the value of e-
commerce purchases and increasing the response of Price optimization: The wide adoption of CRM and
direct mail and e-mail marketing campaigns. This has Supply Chain Management software has allowed
paved the way for new applications of business analytics enterprises to fully interface/integrate their demand and
to emerge. Of these new areas, some of the applications supply chains. Based on this integration, enterprises are
which are particularly promising include: now able to capture up-to-the-minute data about the
demand of a particular product as well as data of similar
supply chain visibility, granularity about the corresponding data’s supply. By
price optimization, and analyzing these two data streams, corporations are able
to optimize the price of a particular product along several
workforce analysis. dimensions so that the demand will meet the available
152
supply. For example, the price of a product may be blood of any organization in terms of their day to day
different through one channel, e.g., the Web, than operations.
through another, e.g., in the retail store. Such price
optimizations allow corporations to maximize the profit Managers need databases which can provide them the
margin of each item sold while reducing their inventory. information that will help them to take better decisions
and run their companies more efficiently. Large
Work Flow Analytics: Once corporations have been organizations will have large databases for every
able to analyze traditional function such as manufacturing, sales,
data about their accounting, etc.
customers and
their suppliers, it Special tools are required for analysis of huge volumes
is only natural of data and accessing data which may reside in different
for them to systems. Data warehousing, data mining and even
begin analyzing accessing internal databases through the web are typical
data about their of these capabilities.
employees. A Source: http://www.recordsolutions.ca Data warehouse is a
new generation type of data base, which
of analytic applications allows enterprises to identify stores present and past
workforce trends, such as attrition rates and perform data that are relevant to
tasks such as compensation and benefits analyses. the managers and
Companies whose cost or revenue model is dependent decision makers in the
on hourly models, e.g., contact centers or systems organization.
integrators, are able to use this new generation of Transaction processing
employee-centered analytics to optimize staffing levels systems in basic
and skills requirements in order to minimize the number Source: functions such as sales,
of employees who could not be billed. Organizations use http://www.latestbusinessupdat
es.com productions are the
databases to track and process business transactions. starting point along with
Receiving materials from suppliers, processing customer web site transactions.
orders and paying salaries to employees, etc., are the The data warehouse consolidates and standardizes
examples of business transaction. These form the life information from various databases of operational
systems. This will enable the information that can be
153
used across the entire enterprise, leading to analysis "Human intelligence".
Video 7.4.2: A Day in the
and decision-making. Similarly, Business life of a Business
Intelligence enables Intelligence Engineer
The data warehouse usually gives the access rights in companies to
terms of “Read-only”. Alteration rights will be denied for accumulate
the users. It has the ability for standard query tools for information; develop
adhoc information, analytical tools and graphical deeper knowledge
reporting facilities. Intranet portals can’t act as a gateway about customers,
for accessing the data warehouse information. suppliers, competition
Organizations usually construct enterprise wide data and their internal
warehouses. These central warehouses serve the entire operational
company. A data mart is a subset of data warehouse processes; and
containing summarized or highly selective portion of the change decision making behavior leading to better
company’s data. This is placed in a separate database achievement of goals and higher profits. Decisions with
made for a fixed set of users. A data mart can typically better responses with data and patterns should lead to
concentrate on a single subject area or line of business. improved organizational performance.
For that reason it can be built rapidly and at a much Online Analytical Processing (OLAP)
lower cost compared to enterprise wide data warehouse.
Multi-dimensional data analysis is supported by OLAP.
Data marts are hence a series of tools to analyze the User managers can view the same data using a wide
data in a warehouse. These tools help us to see the new variety of dimensions. Each attribute of information
patterns, relationships and insights which are useful for (product/service type, price, cost, area or month of sales)
making better decisions. Such tools are usually called represents a different dimension. The manager can
business intelligence tools. The major BI tools include know the actual sales of one product in a particular
software for database query/reporting, tools for month, how that compares with previous month and
multidimensional analysis and data mining. same month of previous year and how it compares with
An individual's ability to combine the knowledge already sales forecast. Even ad-hoc queries can be answered
learnt along with new information and ultimately change online by OLAP. There could also be a provision to store
behaviors in such a way that he/she succeeds in this historical data for many years.
attempt or adapt to a new situation is generally termed
154
Data Mining value of eggs, eggs are bought 75% of the time.
Such information helps managers take better
Traditional queries of database can provide answers to decisions. Effectiveness of promotion plan is hence
simple questions such as better understood.
"what was the total sales
of 5 HP pumps in March Sequence - Here the happenings are connected
2012 ? " OLAP can over a time period. For example, if the possession
compare sales of the of house is taken from a builder, a new TV will be
same product with the purchased within one month 50% of the time and a
budget and area for the microwave oven will be purchased within 2 months
previous 3 years. 40% of the time.
156
S ECTION 5
© 2012, IBSCDC.
No part of this publication may be copied, stored, transmitted, reproduced or distributed in any form or medium whatsoever without the permission of the copyright owner.
157
purchased together and to initiate new campaign strategies to ABOUT PILOT STUDY TO ASSESS CUSTOMER
attract the customers. SATISFACTION
158
Exhibit I
54580 UNIBIC CHOCONUT COOKIES 135 GMS. FAIR & LOVELY MU VIT TOT FAIR
12350
CREAM 80 GMS
12350 PONDS MAGIC TALC 400 GMS.
12350 BKS HEALTH MAGAZINE
VASELINE BODY LOTION TOTAL
12350 12350 COTTON MATOVEL SMALL
MOISTURE 300 ML
SUNFEAST PASTA TREAT MASALA 83
12350
12350 PRIYA GINGER&GARLIC PASTE 200 GMS. GMS
12350 BISLERI WATER 500 ML
12350 DIVYA DEEPAM GINGELLY OIL 1 LTR.
30539 VSR NEW SONA MASOORI RICE 25 KG
VIJAYA SUNFLOWER REFINED OIL 1 LTR
12350 30539 GROUNDNUT FRESH
REFIL
12350 VEGAN WET DOSA BATTER 850 GMS 31089 BAJAJ ELECTRIC RICE COOKER RCX5
159
S ECTION 6
160
These online communities formed by social networking e-commerce
Video 7.6.1: The World of
sites can tremendously increase the number of one's experience is very
Social Media 2011
business or social contacts by making connections attractive to many
through individual members. These sites link individuals businesses and
through their mutual business or personal connections, there are many such
facilitating them to mine their friends (and in turn, their social shopping
friends' friends) for business sales leads, job searching sites.
tips, or new contacts. For instance, Facebook focuses on
extending their friendships, while LinkedIn.com Collective action
concentrates on job placements networking. and social
interaction online
The members of social networking sites spend a lot of with rich exchange
time surfing web pages, checking out other member of multimedia information and evolution of aggregate
users and knowledge, as a result of new social technologies
exchanging like blogs, wikis, social networking sites, is called
messages. This social computing. One example of social computing is
leads them to tagging. Tagging is developing a tag for a particular set
reveal a lot of of information which is
information about organized by an
Video 7.6.2: Social
themselves. individual but acts like
Networking in Plain English
Organizations can a identification of
harvest this information which the
information to other individuals are
c r e a t e a f u l l y Source: http://caprium.com looking for on the Web,
focused and provided the tags are
targeted promotions which will be much better than shared with other
ordinary text and display ads usually found on the World individuals. Social
Wide Web. Companies can use such sites to interact computing shifts
with potential customers. Successful sites are in a computing to the edges
position to attract potential visitors and are so "sticky" to of the network and
ultimately become effective marketing tools. This type of empowers individual users with relatively low
161
technological sophistication in using the Web to manifest
their creativity, engage in social interaction, contribute
their expertise, share content, collectively build new Video 7.6.5: Super Cafe:
tools, Super Social Network
Video 7.6.3: Antenzen: Coworkers
Network
162
R EVIEW 7.1
Question 1 of 4
Which of the following is an example of a cloud
computing application?
A. Skype
B. Salesforce.com
C. Twitter
D. Facebook Applications
Check Answer
163
S ECTION 7
This case study was written by Kartikeya P Bolar and reviewed by Saradhi Kumar Gonela, IBS Hyderabad. It is intended to be used as the basis for class discussion rather than to illustrate either
effective or ineffective handling of a management situation. The case was compiled from published sources.
© 2012, IBSCDC.
No part of this publication may be copied, stored, transmitted, reproduced or distributed in any form or medium whatsoever without the permission of the copyright owner.
164
A CUSTOMER’S ADVICE THE VIDEO WONDER
With his worries uppermost in his mind, Devesh couldn’t help His Swiss client also helped him with the script of the video.
talking about them to one of his customers from Singapore. The video showing Devesh explaining his business was posted
The customer then suggested that Devesh could try to create on the web on January 19, 2008 (Refer to Exhibit I for the You
visibility for his business among new customers whom he had Tube appearance of the video). Within a short time, the video
never met. Devesh was startled by the customer’s suggestion. had received more than 30,000 views and visitors spread
positive reviews and comments about it. Viewership further
The customer suggested that he put up a video on the internet multiplied as most viewers posted the links on their blogs,
explaining his business. Devesh was worried that making such social networking sites like Facebook and Linkedin and
a video would prove to be too expensive. Besides, wouldn’t bookmarked the webpage link on many social bookmarking
there be the expense of posting such an advertisement on the sites. Due to the huge response, the video managed to appear
internet? The customer then suggested that he post his video on the first page of the popular search engine Google.
on YouTube, which hosted videos without any charge. He
With its popularity, the video boosted Devesh’s business. Along
explained that through YouTube, Devesh could reach potential
with the development of the video, Devesh also created an
customers for free. Devesh asked him if his video would not get
email address (?) for himself. He received a number of emails
lost in the huge number of videos posted on YouTube. The
from tourists, especially foreigners, booking his cab services.
customer explained that if the video was given an appropriate
Devesh not only survived the recession but actually increased
category and proper labels or tags or keywords, it would
his business manifold.
definitely be viewed by interested people. Also, there was a
chance that they would forward his video to friends as well, Devesh wanted his co-drivers also to understand the value of
which would further enhance his visibility. social media and to use the media to increase their visibility.
Having succeeded in increasing his business, Devesh
Mesmerized by the idea, Devesh began thinking day and night embarked on the idea of developing videos for struggling small-
about the content for the video. When he shared the idea with time businessmen in Varanasi.
others, one of his regular clients from Switzerland decided to
QUESTIONS FOR DISCUSSION
help him out with the development of the video. Devesh was
really grateful for his education which enabled him to converse 1. Investigate in detail the potential business applications of the
in English with the clients – a rare accomplishment among various social media discussed in the case.
Indian taxi drivers. 2. If you were a management consultant, what would you ad-
vise Devesh to do to become even more successful in his
business?
165
This document is authorized for internal use only at IBS Campuses Batch of 2013-15, Semester-I. No part of this publication may
be reproduced, stored in a retrieved system, used in a spreadsheet, or transmitted in any form or by any means - electronic,
mechanical, photocopying or otherwise. Transmission, copying or posting on web are violation of intellectual property rights.