Summary - BUAD 822 MIS - ICT

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

BUAD 822: MANAGEMENT INFORMATION SYSTEM/ICT MANAGEMENT

Module 1
✓ Information Technology
✓ Information technology (IT) is a label that has two meanings. In common usage, the term “information
technology” is often used to refer to all of computing. As a name of a postgraduate degree programme , to
refers to the preparation of students to meet the computer technology needs of business, government,
healthcare, schools, and other kinds of organisations.
✓ ITQ: What is information systems?
✓ ITA: Information systems (IS) is concerned with the information that computer systems can provide to aid a
company, non-profit or governmental organization in defining and achieving its goals.
✓ ITQ: What is Management Information System (MIS)?
✓ ITA: Management Information System (MIS) is system a used to convert data from external and internal sources
into information and to communicate that information, in an appropriate form, to managers at all levels in all
functions to enable them to make timely and effective decisions for planning, directing and controlling the
activities for which they are responsible.
✓ D. Components of Information Systems
✓ Information systems are typically made up of three components: Technology, People and Process. The last two,
people and process, are really what separate the idea of information systems from more technical fields, such as
computer science.
✓ ITQ: What are the five basic components of information systems?
✓ ITA: 1. Hardware 2. Software 3. Data 4. Networks 5. Procedures
✓ F. Use of Information Systems.

Information Systems (IS) creates an impact on the organisation’s function, performance and productivity. With
IS support, management of all departments of an organisation can become more effective, IS provides several
advantages to the organisation

1. Ability to link and enable employees Need help with your assignments
Call/WhatsApp Christian - 08108772172
2. Increases boundary spanning

3. Ability to store and retrieve information at any instance

4. Helps in forecasting and long term planning.

✓ ITQ: What is Information System Development?


✓ ITA: Information System Development are the activities that go into producing an information system solution to
an organisational problem or opportunity.

Using the five-component framework

An information system depends on the resources of people (end users and IS specialists), hardware, software ,
data , and networks to perform input, processing, output, storage, and control activities that transform data
resources into information products.

✓ ITQ: Experience and research shows that good information has numerous qualities. What are those qualities?
✓ ITA: Availability/ Accessibility, Accuracy, Reliability/Objectivity, Relevance
/Appropriateness, Completeness, Level of detail/Conciseness, Presentation, Timing, Value of information and
Cost of information.

✓ H. Information Systems for Problem Solving and Decision Making

What does it mean when a company has a competitive advantage? What are the factors that play into it? One of
the most accepted definitions, developed by Michael Porter in his book Competitive Advantage: Creating and
Sustaining Superior Performance. A company is said to have a competitive advantage over its rivals when it is
able to sustain profits that exceed average for the industry. According to Porter, there are two primary methods
for obtaining competitive advantage: cost advantage and differentiation advantage.

Another tool that Porter developed – the “five forces” model, can be used to help understand just how
competitive an industry is and to analyse its strengths and weaknesses. The model consists of five elements,
each of which plays a role in determining the average profitability of an industry. In 2001, Porter wrote an article
entitled “Strategy and the Internet,” in which he takes this model and looks at how the internet impacts the
profitability of an industry. Below is a quick summary of each of the five forces and the impact of the internet.

• Threat of substitute products or services: How easily can a product or service be replaced with something
else? The more types of products or services there are that can meet a particular need, the less profitability
there will be in an industry.

• Bargaining power of suppliers: When a company has several suppliers to choose from, it can demand a lower
price.

• Bargaining power of customers: A company that is the sole provider of a unique product has the ability to
control pricing. But the internet has given customers many more options to choose from.

• Barriers to entry: The easier it is to enter an industry, the tougher it will be to make a profit in that industry.

• Rivalry among existing competitors: The more competitors there are in an industry, the bigger a factor price
becomes. The advent of the internet has increased competition by widening the geographic market and
lowering the costs of doing business.

✓ ITQ: What does it mean when a company has a competitive advantage?


✓ ITA: A company is said to have a competitive advantage over its rivals when it is able to sustain profits that
exceed average for the industry. There are two primary methods for obtaining competitive advantage: cost
advantage and differentiation advantage.

✓ Using Information Systems for Competitive Advantage

A strategic information system is an information system that is designed specifically to implement an


organisational strategy meant to provide a competitive advantage.

Hence, a strategic information system is one that attempts to do one or more of the following:

• deliver a product or a service at a lower cost;

• deliver a product or service that is differentiated;

• helps an organisation focus on a specific market segment;

• enable innovation.

Following are some examples of information systems that fall into this category.
• Business Process Management Systems

•Electronic Data Interchange

• Collaborative Systems

• Decision Support Systems

STUDY SESSION 2

✓ Hardware Requirement

The physical parts of computing devices – those that you can actually touch – are referred to as hardware.
hardware includes Desktop computers, Laptop computers, Mobile phones, Tablet computers, e Readers,

Storage devices, such as flash drives, Input devices, such as keyboards,mice, and scanners and Output devices
such as printers and speakers.

✓ Tour of a PC

All personal computers (PC) consist of the same basic components: a CPU, memory, circuit board, storage, and
input/output devices.

✓ Motherboard

The motherboard is the main circuit board on the computer. The CPU, memory, and storage components,
among other things, all connect into the motherboard.

✓ Random-Access Memory

When a computer starts up, it begins to load information from the hard disk into its working memory. This
working memory, called random-access memory (RAM), it can store data as long as it is receiving power; when
the computer is turned off, any data stored in RAM is lost.

✓ Hard Disk

A hard disk is where data is stored when the computer is turned off and where it is retrieved from when the
computer is turned on.

✓ Solid-State Drives

SSDs store data using flash memory. which is much faster. The SSD performs the same function as a hard disk:

✓ Removable Media

Removable media allows you to take your data with you. USB flash drive.

Network Connection is a digital telecommunications network which allows nodes to share resources.

✓ Smartphones

The first modern-day mobile phone was invented in 1973.

As mobile phones evolved, they became more like small computers. These smart phones have many of the same
characteristics as a personal computer, such as an operating system and memory.

✓ Tablet Computers
A tablet computer is one that uses a touch screen as its primary input and is small enough and light enough to
be carried around easily.

✓ Integrated Computing

computing technology is being integrated into many everyday products. From automobiles to refrigerators to
airplanes, ways that computing technologies are being

✓ ITQ: What is a data base?


✓ ITA: A database is an organised collection of related information. It is an organized collection, because in a
database, all data are described and associated with other data integrated into everyday products:

• The Smart House

• The Self-Driving Car

The Commoditization of the Personal Computer

The PC has become a commodity in the sense that there is very little differentiation between computers, and
the primary factor that controls their sale is their price

✓ ITQ: What are the hardware and software requirements of Information Systems?
✓ ITA: The physical parts of computing and networking devices – those that you can actually touch – are referred
to as hardware, while Software is the set of instructions that tell the hardware what to do.
✓ Types of software

1 operating systems and

2 application software .

✓ ITQ: What is a software ?


✓ ITA: Software is the set of instructions that tell the hardware what to do. Software is created through the
process of programming. Without software, the hardware would not be functional.
✓ C. Data Processing

Data can be quantitative or qualitative. Quantitative data is numeric, while Qualitative data is descriptive.

✓ ITQ: What is a data base?


✓ ITA: A database is an organised collection of related information. It is an organized collection, because in a
database, all data are described and associated with other data.
✓ The major components of database management system are:

1. Software

2. Hardware Need help with your assignments


3. Data
Call/WhatsApp Christian -
08108772172
4. Procedures

5. Database Access Language

✓ ITQ: What is a relational database?


✓ ITA: A relational database is one in which data is organized into one or more tables. Each table has a set of
fields, which define the nature of the data stored in the table.
✓ Data
Data is the most important component of the DBMS. The main purpose of DBMS is to process the data

✓ Procedures

Procedures refer to the instructions and rules that help to design the database and to use the DBMS. These may
include:

1 Procedure to install the new DBMS .

2 To log on to the DBMS.

3 To use the DBMS or application programme .

4 To make backup copies of database.

5 To change the structure of database.

6 To generate the reports of data retrieved from database.

✓ Database access language

The database access language is used to access the data to and from the database.

✓ Users

The users are the people who manage the databases and perform different operations on the databases in the
database system. There are three kinds of people who play different roles in database system.

1. Application Programmers

2. Database Administrators

3. End-Users

✓ ITQ: What are the Components of Database application system ?


✓ ITA: They are: Software, Hardware, Data, Procedures, Database Access Language.
✓ process of doing database design

1. Determine the data to be stored in the database.

2. Determine the relationships between the different data elements.

3. Superimpose a logical structure upon the data on the basis of these relationships.

✓ Database administration

Database administration is the function of managing and maintaining database management systems (DBMS)
software.

✓ Nature of database administration

The degree to which the administration of a database is automated dictates the skills and personnel required to
manage databases.

✓ Database administration tools


Often, the DBMS software comes with certain tools to help DBAs manage the DBMS. Such tools are called native
tools. For example, Microsoft SQL Server comes with SQL Server Management Studio and Oracle has tools such
as

SQL*Plus and Oracle Enterprise Manager/Grid Control.

✓ ITQ: What is database design?


✓ ITA: Database design is the process of producing a detailed data model of database.
✓ Internet

The internet is the global system of interconnected computer networks that use the internet protocol suite
(TCP/IP) to link billions of devices worldwide.

✓ ITQ: What is data communication?


✓ ITA: Data communications is the movement of computer information from one point to another by means of
electrical or optical transmission systems
✓ G. Components of a Network

There are three basic hardware components for a data communications network

1 a server or host computer

2 a client and

3 a circuit

✓ ITQ: Differentiate between the Internet, Intranet and Extranet?


✓ ITA: The Internet is the global system of interconnected computer networks that use the Internet protocol suite
(TCP/IP) to link billions of devices worldwide. An intranet is a LAN that uses the same technologies as the
Internet (e.g., Web servers, Java, HTML [Hypertext

Markup Language]) but is open to only those inside the organization. An extranet is similar to an intranet in that
it, too, uses the same technologies as the Internet but instead is provided to invited users outside the
organization who access it over the Internet.

✓ ITQ: List the types of networks as mentioned above.


✓ ITA: local area networks (LANs), backbone networks (BNs), metropolitan area networks

(MANs), and wide area networks (WANs).

STUDY SESSION 3

Main content

✓ ITQ: What is systems development?


✓ ITA: Systems development is the entire set of activities needed to construct an information systems solution to a
business problem or opportunity.
✓ C. System Development Phases/Stages
✓ System investigation :

Systems development professionals agree that the more time invested in understanding the business problem
to be solved.
✓ System analysis:

Once a development project has the necessary approvals from all participants, the systems analysis stage
begins. Organizations have three basic solutions to any business problem:

(1) Do nothing and continue to use the existing system unchanged.

(2) Modify or enhance the existing system.

(3) Develop a new system.

The main purpose of the systems analysis stage is to gather information about the existing system, to determine
which of the three basic solutions to pursue, and to determine the requirements for an enhanced or new
system.

✓ System design:

Systems analysis describes what a system must do to solve the business problem. Systems design encompasses
two major aspects of the new system:

Logical systems design and Physical systems design

✓ ITQ: What is the systems development life cycle?


✓ ITA: The systems development life cycle (SDLC) is a very structured and risk-averse methodology designed to
manage large projects that included multiple programmers and systems that would have a large impact on an
organization. This structured framework consists of sequential processes by which information systems are
developed, and these include systems investigation, systems analysis, systems design, programming, testing,
implementation, operation, and maintenance.
✓ Programming

Systems developers utilize the design specifications to acquire the software needed for the system to meet its
functional objectives and solve the business problem.

Organizations may buy the software or construct it in-house.

✓ Testing

Thorough and continuous testing occurs throughout the programming stage. testing checks to see if the
computer code will produce the expected and desired results under certain conditions.

✓ Implementation

Implementation is the process of converting from the old system to the new system.

✓ Operation and maintenance

Systems need several types of maintenance. i e debugging the programme, updating the system to
accommodate changes in business conditions and adds new functionality to the system.

✓ D. Four Alternative Development Methodologies

The SDLC methodology is sometimes referred to as the waterfall methodology to represent how each step is a
separate part of the process; only when one step is completed can another step begin.

✓ ITQ: What are the disadvantage of the traditional Systems development life cycle?
✓ ITA: The traditional systems development life cycle (SDLC) is criticized for being quite rigid, changes to the
requirements are not allowed once the process has begun. Also

SDLC was developed for large, structured projects therefore projects using SDLC can sometimes take months or
years to complete.

✓ Rapid application development

Rapid application development (RAD) is a software development methodology that focuses on quickly building a
working model of the software, getting feedback from users, and then using that feedback to update the
working model. After several iterations of development, a final version is developed and implemented.

✓ ITQ: The Rapid application development (RAD) consist of four phases, what are they?
✓ ITA: 1. Requirements Planning 2. User Design 3. Construction4. Cutover
✓ Agile methodologies

Agile methodologies are a group of methodologies that utilise incremental changes with a focus on quality and
attention to detail. The characteristics of agile methods include:

• Small cross-functional teams that include development-team members and users;

• Daily status meetings to discuss the current state of the project;

• Short time-frame increments (from days to one or two weeks) for each change to be completed; and

• At the end of each iteration , a working project is completed to demonstrate to the stakeholders.

The goal of the agile methodologies is to provide the flexibility of an iterative approach while ensuring a quality
product.

✓ ITQ: The Rapid application development (RAD) consist of four phases, what are they?
✓ ITA: 1. Requirements Planning 2. User Design 3. Construction4. Cutover
✓ ITQ: What is end-user development?
✓ ITA: End-user development is a phenomenon where information systems can be developed by end users with
little or no formal assistance from technical specialists. A series of software tools categorised as fourth-
generation languages makes this possible.

MODULE 2

section 4 Need help with your assignments


Main Content Call/WhatsApp Christian - 08108772172
A. Information Systems within organizations

B. Survey and functional information systems

C. Business process designs

D. Drivers behind business process designs projects

E. E-Commerce and supply chain systems

F. Business, intelligence and knowledge management

✓ Information Systems within Organisations


All Successful organisations use information systems to collect data and process it according to the needs of the
analyst, manager or business owner.

✓ ITQ: What are the three type of decision taken at different levels in the organisation?
✓ ITA: They are: Operational-level systems, Management-level systems and Strategic-level systems

✓ ITQ: What are functional Information Systems?


✓ ITA: Functional information system are system that provides detailed information for a

specific type of activity or related group of activities, as well as summarised information for management’s control
of such activities

✓ ITQ: What are the popular functional areas of the business organisation?
✓ ITA: They are: 1. Financial Information System 2.Marketing Information System 3.

Production /manufacturing Information System and 4. Human Resource Information System

✓ Financial information system:

This system supports the decision-making process of financial functions at the level of an organisation

Financial functions include:

Integrating financial & operational information from multiple sources

Providing easy access to data

Making data available immediately

Analysing historical & current financial activity

Monitoring & controlling the use of funds over time

✓ 2. Marketing information system

This system engaged in marketing (selling) of its products to its customers.

Important functions of the marketing process include the following.

The marketing identification function

The purchase motivation function.

The product adjustment function

The physical distribution function

The communication function

The transaction function

The post-transaction function

✓ 3. Production /manufacturing information system


Manufacturing or production information system provides information on production or operation activities of
an organisation

Decisions to be taken in manufacturing system include:

Product Design

Schedule Production

Source Raw Material

Check Inventory

Receive Order

Allocate Resources

Complete Job

Quality Testing

Send Order

✓ 4. Human Resources information system

This functional information system supports the functions of human resource management of an organisation.
also known as personnel management.

The function involves:

Manpower planning.

Staffing

Training and development

Performance evaluation, and

Separation activities

✓ ITQ: What is Business process design and when does it occur?


✓ ITA: Business process design is the method by which an organisation understands and defines the business
activities that enable it to function. It typically occurs at an early, critical phase of projects
✓ ITQ: What is Business process design and when does it occur?
✓ ITA: Business process design is the method by which an organisation understands and defines the business
activities that enable it to function. It typically occurs at an early, critical phase of projects.
✓ The most common initiatives behind business process design projects are:

• Customer and supply chain management

• Operational performance improvement

• Business process integration and automation

• Cost reduction

• New business opportunities.


✓ D. Drivers behind a Business Process Design Project

The need to increase efficiency

The need to evaluate business practice as part of an organizational development project

The need to evaluate potential new business ventures (e.g. joint ventures or alliances) or business offerings

The need to manage the company’s knowledge resources

The need to manage human resources

✓ Methodology: implementing business process design

Business process design projects have two phases: analysis and design. Both phases are typically carried out in
modeling workshops.

Modeling workshops The process of analysing existing processes and defining new or improved ones takes place
in facilitated group sessionss, often called modeling workshops because one of their tangible outputs is a
business process model.

✓ Team members typically include:

Subject matter experts (SMEs) from the organization, who work in the process

Facilitators with experience of working in or designing such processes. Analysing and designing processes

The purpose of the analysis phase is to:

Understand the organisation and its purpose or “mission” and relate this to the organisation’s current
business processes

Identify and analyse the collection of processes and activities currently operational within the organisation,
and ascertain how far they achieve the business's objectives.

✓ The results of the analysis phase are then fed into the design phase, whose purpose is to:

Investigate options for achieving improvement by redesigning the processes currently in operation

Identify and prioritise areas for improvement

Implement process design according to an agreed schedule.

A strategic perspective is higher level (i.e. managers) and seeks to understand the processes that make up the
business and deliver its value.

A tactical perspective is lower level (i.e. practitioners) and seeks to understand the activities that support
processes. It is driven by the task requirements for operational efficiency.

Design-led projects

In a “clean slate” approach, the workshop team designs new processes with little regard for the current
situation, and then considers their impact on the current organisation.

Analysis-led projects

In many IT-driven projects, the purpose of the analysis phase is to understand the processes that are going to be
automated.
✓ ITQ: What is e-commerce?
✓ ITA: E-commerce refers to the use of the internet and the Web to transact business.
✓ The supply chain

A firm’s supply chain is a network of organisations and business processes for procuring raw materials,
transforming these materials into intermediate and finished products, and distributing the finished products to
customers.

✓ Global supply chain issues

More and more companies are entering international markets, outsourcing manufacturing operations, and
obtaining supplies from other countries as well as selling abroad. Their supply chains extend across multiple
countries and regions.

✓ F. Business Intelligence and Knowledge Management

“Business intelligence (BI)” is a term used by hardware and software vendors and information technology
consultants to describe the infrastructure for warehousing, integrating, reporting, and analysing data that comes
from the business environment, including big data.

✓ ITQ: What is Knowledge Management?


✓ ITA: Knowledge management refers to the set of business processes developed in an organisation to create,
store, transfer, and apply knowledge. Knowledge management increases the ability of the organisation to learn
from its environment and to incorporate knowledge into its business processes.
✓ Knowledge storage

Knowledge storage generally involves the creation of a database

✓ Knowledge dissemination

Portals, e-mail, instant messaging, wikis, social business tools, and search engines technology have added to an
existing array of collaboration tools for sharing calendars, documents, data, and graphics. contemporary
technology seems to have created a deluge of information and knowledge.

SESSION 5

Main Content

A. The Information System development

B. Planning the use of information Technology

C. Managing the IT infrastructure

D. Outsourcing Information Systems

E. User rights and responsibilities

✓ ITQ: Who is a CIO and what is his role in an organisation?


✓ ITA: The chief information officer (CIO) is a senior manager who oversees the use of information technology in
the firm. The CIO is expected to have a strong business background as well as information systems expertise and
to play a leadership role in integrating technology into the firm’s business strategy.
✓ B. Planning the Use of Information Technology (IT)
• IT resources and appropriate use of those resources

• Alignment of IT initiatives with enterprise objectives throughout the organisation

• IT organisational structures that facilitate the implementation of enterprise initiatives in support of strategies

• Effective communications framework between the business, IT, and external partners

• IT control framework for selecting and prioritising projects within the company

• IT performance measurement and metrics

IT staff members should include:

• An overall process manager to facilitate the governance process

• Architects accountable for each BU application portfolio

• Programme/Project managers accountable for BU projects portfolio

• Application development director

• Enterprise architecture director

• Strategic sourcing and workforce planning managers

• Value analysts and other corporate finance and planning representatives

Other ad-hoc members may be pulled in as needed.

✓ ITQ: What is the aim of IT management?


✓ ITA: The central aim of IT management is to generate value through the use of technology.

This requires the alignment of technology and business strategies. Technology plays an important role in
improving the overall value chain of an organisation.

✓ IT infrastructure refers to the composite hardware, software, network resources and services required for the
existence, operation and management of an enterprise IT environment. It allows an organization to deliver IT
solutions and services to its employees, partners and/or customers and is usually internal to an organisation and
deployed within owned facilities.
✓ ITQ: What is meant by Outsourcing Information Systems?
✓ ITA: Outsourcing Information Systems refers to engaging the services of another specialised organisation (an
external organisation that specialises in providing these services), to build or operate information systems, if it
does not want to use its internal resources.
✓ E. User Rights and Responsibilities

As a user of information systems, you have both rights and responsibilities in your relationship with the IS
department. Your rights are what you are entitled to receive and your responsibilities are what you are expected
to contribute.

You have a right to:

– Computer hardware and programmes that allow you to perform your job proficiently

– Reliable network and internet connections

– A secure computing environment


– Protection from viruses, worms, and other threats

– Contribute to requirements for new system features and functions

– Reliable systems development and maintenance

– Prompt attention to problems, concerns, and complaints

– Properly prioritised problem fixes and resolutions

– Effective training

You have a responsibility to:

– Learn basic computer skills

– Learn standard techniques and procedures for the applications you use

– Follow security and backup procedures

– Protect your password(s)

– Use computer resources according to your employer's computer use policy

– Make no unauthorised hardware modifications

– Install only authorised programmes

– Apply software patches and fixes when directed to do so

– When asked, devote the time required to respond carefully and completely to requests for requirements for
new system features and functions

– Avoid reporting trivial problems

STUDY SESSION 6

Main Content

A. Security threats

B. Safeguards: Technical, Data and Human

C. Disaster preparedness and incident response

✓ ITQ: What is a security threat in Information Systems?


✓ ITA: A security threat is a challenge to the integrity of information systems that arises from one of three
sources: human error and mistakes, malicious human activity, and natural events and disasters. An example is
an employee who misunderstands operating procedures and accidentally deletes customer records.
✓ The security programme and senior management’s security role

Organisations must address security in a systematic way.

senior-management involvement, has two critical security functions:


1 must establish the security policy.

2 manage risk by balancing the costs and benefits of the security programme.

The National Institute of Standards and Technology (NIST)addresses management’s responsibility

It outlines the following:

1. Computer security should support the mission of the organisation.

2. Computer security is an integral element of sound management.

3. Computer security should be cost-effective.

4. Computer security responsibilities and accountability should be made Explicit.

5. System owners have computer security responsibilities outside their own Organisations.

6. Computer security requires a comprehensive and integrated approach.

7. Computer security should be periodically reassessed.

8. Computer security is constrained by societal factors.

✓ B. Safeguards: Technical, Data and Human

Technical safeguards involve the hardware and software components of an information system. Primary
technical safeguards include; Identification and authentication, Encryption, Firewalls, Malware protection and
Design for secure applications.

✓ Disaster-recovery backup sites

A computer disaster is a substantial loss of computing infrastructure caused by acts of nature, crime, or terrorist
activity.

✓ Incident-response plan

Every organisation should have an incident-response plan as part of the security programme. No organisation
should wait until some asset has been lost or compromised before deciding what to do.

✓ ITQ: What is an Incident-Response Plan?


✓ ITA: An incident-response plan is part of an organisation’s security programme, which dictates how employees
are to respond to security problems, whom they should contact, the reports they should make, and steps they
can take to reduce further loss.

MODULE 3

Main Content

A. Concepts and definition of ICT

B. Ways to apply ICT in business management

C. Networking and the internet

✓ ITQ: How can ICT be used to improve service delivery to customers?


✓ ITA: ICT be used to improve service delivery to customers by providing services online and introducing e-
commerce facilities, which would, at the very least, offer customers a more convenient and efficient experience.
✓ Capabilities of ICT
ICT infrastructure consists of a set of physical devices and software applications that are required to operate the
entire enterprise.

• Computing platforms used to provide computing services that connect employees, customers, and suppliers
into a coherent digital environment, including large mainframes, midrange computers, desktop and laptop
computers, and mobile handheld and remote cloud computing services.

• Telecommunications services that provide data, voice, and video connectivity to employees, customers, and
suppliers

• Data management services that store and manage corporate data and provide capabilities for analysing the
data

• Application software services, including online software services, that provide enterprise-wide capabilities
such as enterprise resource planning, customer relationship management, supply chain management, and
knowledge management systems that are shared by all business units

• Physical facilities management services that develop and manage the physical installations required for
computing, telecommunications, and data management services

• ICT management services that plan and develop the infrastructure, coordinate with the business units for ICT
services, manage accounting for the ICT expenditure, and provide project management services

• ICT standards services that provide the firm and its business units with policies that determine which
information technology will be used, when, and how

• ICT education services that provide training in system use to employees and offer managers training in how to
plan for and manage ICT investments

• ICT research and development services that provide the firm with research on potential future ICT projects and
investments that could help the firm differentiate itself in the marketplace

✓ B. Ways to apply ICT in business and management

communicate with customers, partners and each other

prepare and transmit documents and files, and

browse online and conduct a wide range of electronic transactions.

✓ Below are four ways in which ICT could be better applied:

1. To improve service delivery to customers

2. To improve the organisation’s responsiveness to new developments

3. To change the basis of competition in an industry

4. To improve your organisation’s overall performance

✓ C. Networking and the Internet

A process of connecting set of items together. In MIS, it is typically a process of connecting computers together
to function effectively and efficiently. A computer network or data network is a telecommunications network
which allows computers to exchange data.
✓ The internet is a global network of network , it is the world’s largest implementation of client/server computing
and internetworking, linking millions of individual networks all over the world.
✓ Client-server: The personal computer originally was used as a stand-alone computing device. A programme was
installed on the computer and then used to do word processing or number crunching. However, with the advent
of networking and local area networks, computers could work together to solve problems. Higherend computers
were installed as servers, and users on the local network could run applications and share information among
departments and organisations. This is called client-server computing
✓ Intranet: Just as organisations set up web sites to provide global access to information about their business, they
also set up internal web pages to provide information about the organisation to the employees. This internal set
of web pages is called an intranet.
✓ Extranet: Sometimes an organisation wants to be able to collaborate with its customers or suppliers while at the
same time maintaining the security of being inside its own network. Extranets can be used to allow customers to
log in and check the status of their orders, or for suppliers to check their customers’ inventory levels.
✓ ITQ: What is Electronic Data Interchange (EDI)?
✓ ITA: Electronic Data Interchange (EDI) is an electronic communication method that provides standards for
exchanging data via any electronic means. By adhering to the same standard, two different companies or
organisations, even in two different countries, can electronically exchange documents (such as purchase orders,
invoices, shipping notices, and many others).

The World Wide Web is one of many services that run across the Internet like electronic mail, voice, video, and
file transfers. The World Wide Web is simply one piece of the internet made up of web servers that have HTML
(or similar web script) pages that are being viewed on devices with web browsers.

STUDY SESSION 8

MAIN CONTENT

Application of ICT in MIS

A. Database Management System

B. MIS characteristics and management levels

C. End user computing, Decision support system (DSS) and

Executive Information System (EIS)

D. Environmental Scanning

✓ ITQ: What is a database management system (DBMS)?


✓ ITA: A database management system (DBMS) is software that permits an organisation to centralise data,
manage them efficiently, and provide access to the stored data by application programmes.

The DBMS manages three important things: the data, the database engine that allows data to be accessed,
locked and modified -- and the database schema, which defines the database’s logical structure. These three
foundational elements help provide concurrency, security, data integrity and uniform administration
procedures.

✓ Components of Database Management Systems (DBMS)


1. Applications
2. End user
3. Data Definition Language (DDL)
4. DDL Compiler
5. DML Compiler
6. Query Optimiser
7. Stored Data Manager
8. Data files Need help with your assignments
9. Compiled DML Call/WhatsApp Christian - 08108772172
10. Data dictionary
✓ World Wide Web (www)

The World Wide Web, or simply Web, is a way of accessing information over the medium of the internet. It is an
information-sharing model that is built on top of the Internet.

✓ B. MIS Characteristics and Management Levels

Management oriented

MIS is designed top-down. This means that the system is designed around the need felt by the management at
different levels for information. The focus of the system is to satisfy the information needs of management.

Management directed

Since MIS is 'for the' management it is imperative that it also should have a very strong 'by the' management
initiative. Management is involved in the designing process of MIS and also in its continuous review and up
gradation to develop a good qualitative system Integrated

MIS is an integrated system. It is integrated with all operational and functional activities of management. This is
an important characteristic and- requirement for a system to qualify as MIS.

Common data flows

Through MIS the data being stored into the system, retrieved from the system, disseminated within the system
or processed by the system can be handled in an integrated manner.

Strategic planning

MIS cannot be designed overnight. It requires very high degree of planning which goes into creating an effective
organisation. The reason for this kind of planning is to ensure that the MIS being built not only satisfies the
information need of the managers today but can also serve the organisation for the next five to ten years with
modifications.

✓ Bias towards centralisation

MIS is required to give 'one version of the truth', i.e., it must supply the correct version of the latest information.

✓ MIS supports:

Strategic management: As part of a strategic planning process top executives develop overall organisational
goals, strategies, policies, and monitor the strategic performance of the organisation and its overall direction in
the political, economic, and competitive business environment

✓ Tactical management: Business unit managers and business professionals in selfdirected teams develop short-
and medium-range plans, schedules, budgets and specify policies, procedures, and business objectives for their
sub-units of the company, and allocate resources and monitor the performance of their organisational sub-units,
including departments, divisions, process teams, project teams, and other workgroups.
✓ ITQ: What are Decision-support systems (DSS)?
✓ ITA: Decision-support systems (DSS) are computer-based information systems that provide interactive
information support to managers and business professionals during the decision making process.

DSS components: Unlike management information systems, decision support systems rely on codebases, as well
as databases, as vital system resources. A DSS model base is a software component that consists of models used
in computational and analytical routines that mathematically express relationships among variables.

✓ Executive information systems (EIS) are information systems that combine many of the features of management
information systems and decision support systems.
✓ ITQ: What is the benefit of Environmental scanning to an organisation?
✓ ITA: Environmental scanning helps an organisation gathers information about the external world, its competitors
and itself, so that it can then respond to the information gathered by changing or improving its strategies and
plans as the need arises.

SESSION 9

Main Content

A. Implications for organisations and management

B. Data flow diagrams

C. Management's involvement in MIS design

✓ Implications for Organisations and Management

The impact of MIS on the functions is in its management. With a good MIS support, the management of
marketing, finance, production and personnel becomes more efficient, the tracking and monitoring the
functional targets becomes easy.

✓ ITQ: What is a data flow diagram (DFD) and how is it used?


✓ ITA: A data flow diagram (DFD) is a graphical representation of the "flow" of data through an
information system, modelling its process aspects. A DFD is often used as a preliminary step to create an
overview of the system, which can later be elaborated. DFDs can also be used for the visualisation of
data processing (structured design).
✓ Soft systems methodologies (SSM)

Soft systems methodology (SSM) is an approach to organisational process modeling (business process
modeling) and it can be used both for general problem solving and in the management of change. It was
developed

✓ ITQ: What is a data flow diagram (DFD) and how is it used?


✓ ITA: A data flow diagram (DFD) is a graphical representation of the "flow" of data through an
information system, modelling its process aspects. A DFD is often used as a preliminary step to create an
overview of the system, which can later be elaborated. DFDs can also be used for the visualisation of
data processing (structured design). in England by academics at the University of Lancaster Systems
Department through a ten year action research programme.
✓ The 7-stage representation of SSM:

1. Enter situation considered problematical

2. Express the problem situation


3. Formulate root definitions of relevant systems of purposeful activity

4. Build conceptual models of the systems named in the root definitions

5. Comparing models with real world situations

6. Define possible changes which are both possible and feasible

7. Take action to improve the problem situation

✓ C.Management’s Involvement in MIS Design

Involving business managers in the governance of the IS function and business professionals in the
development of IS applications should thus shape the response of management to the challenge of
improving the business value of information technology.

✓ ITQ: What is Information technology governance (ITG)?


✓ ITA: Information technology governance (ITG) is a subset discipline of corporate governance focused on the
information technologies (IT), information systems (IS), their performance, use, and associated risks.

Session 10

Main Content

A. Data Protection Act

B. Computer misuse Act 1990

C. Regulation of investigatory power Act

D. Rights, control and security measures

✓ ITQ: What is The Data Protection Act 1998 (DPA)?


✓ ITA: The Data Protection Act 1998 (DPA) is an Act of Parliament of the United

Kingdom of Great Britain and Northern Ireland which defines UK law on the processing of data on identifiable
living people. B.Computer Misuse Act 1990

The Computer Misuse Act 1990 is an Act of the Parliament of the United

Kingdom, introduced partly in response to the decision in R v Gold & Schifreen (1988) 1 AC 1063.

Based on the ELC's recommendations, a Private Member's Bill was introduced by

Conservative MP Michael Colvin. The bill, supported by the government, came into effect in 1990. Sections 1-3
of the Act introduced three criminal offences:

1. Unauthorised access to computer material, punishable by 12 months' imprisonment (or 6 months in Scotland)
and/or a fine "not exceeding

level 5 on the standard scale" (since 2015, unlimited);

2. Unauthorised access with intent to commit or facilitate commission of further offences, punishable by 12
months/maximum fine (or 6 months in

Scotland) on summary conviction and/or 5 years/fine on indictment;

3. Unauthorised modification of computer material, punishable by 12 months/maximum fine (or 6 months in


Scotland) on summary conviction
and/or 10 years/fine on indictment;

✓ C. Regulation of Investigatory Powers Act (RIPA) 2000

The Regulation of Investigatory Powers Act 2000 (c.23) (RIP or RIPA) is an Act of the Parliament of the United
Kingdom, regulating the powers of public bodies to carry out surveillance and investigation, and covering the
interception of communications. It was ostensibly introduced to take account of technological change such as
the growth of the internet and strong encryption.

RIPA regulates the manner in which certain public bodies may conduct surveillance and access a person's
electronic communications. The Act:

Enables certain public bodies to demand that an ISP provide access to a customer's communications in secret;

✓ ITQ: What is The Data Protection Act 1998 (DPA)?


✓ ITA: The Data Protection Act 1998 (DPA) is an Act of Parliament of the United

Kingdom of Great Britain and Northern Ireland which defines UK law on the processing of data on identifiable
living people.

Enables mass surveillance of communications in transit; Enables certain public bodies to demand ISPs fit
equipment to facilitate surveillance; Enables certain public bodies to demand that someone hand over keys to

protected information; Allows certain public bodies to monitor people's internet activities;

Prevents the existence of interception warrants and any data collected with them from being revealed in
court.

✓ ITQ: Information risk management (IRM)?


✓ ITA: Information risk management (IRM) is the process of identifying and assessing risk, realising the limitations
in reducing it to an acceptable level, and implementing the right mechanisms to maintain that level.
✓ Categories of risks

Physical damage- Fire, water, vandalism, power loss, and natural disasters

Human interaction- Accidental or intentional action or inaction that can disrupt productivity

Equipment malfunction- Failure of systems and peripheral devices

Inside and outside attacks- Hacking, cracking, and attacking

Misuse of data- Sharing trade secrets, fraud, espionage, and theft

Loss of data- Intentional or unintentional loss of information through destructive means

Application error- Computation errors, input errors, and buffer overflows

Social Status- Loss of Customer base and reputation

It is impossible to have a system or an environment to be 100 percent secure, there should be an acceptable
level of risk.

✓ Ways to deal with risk

There are four basic ways of dealing with risks:


Transfer it: If a company's total or residual risk is too high and it purchases an insurance then it is transfer of risk to
the insurance company

Reject it: If a company is in denial about its risk or ignore it, it is rejecting the risk

Reduce it: If a company implements countermeasures, it is reducing the risk

Accept it: If a company understands the risk and decides not to implement any kind of countermeasures it is
accepting the risk.

Need help with your assignments


Call/WhatsApp Christian - 08108772172

You might also like