Professional Documents
Culture Documents
Summary - BUAD 822 MIS - ICT
Summary - BUAD 822 MIS - ICT
Summary - BUAD 822 MIS - ICT
Module 1
✓ Information Technology
✓ Information technology (IT) is a label that has two meanings. In common usage, the term “information
technology” is often used to refer to all of computing. As a name of a postgraduate degree programme , to
refers to the preparation of students to meet the computer technology needs of business, government,
healthcare, schools, and other kinds of organisations.
✓ ITQ: What is information systems?
✓ ITA: Information systems (IS) is concerned with the information that computer systems can provide to aid a
company, non-profit or governmental organization in defining and achieving its goals.
✓ ITQ: What is Management Information System (MIS)?
✓ ITA: Management Information System (MIS) is system a used to convert data from external and internal sources
into information and to communicate that information, in an appropriate form, to managers at all levels in all
functions to enable them to make timely and effective decisions for planning, directing and controlling the
activities for which they are responsible.
✓ D. Components of Information Systems
✓ Information systems are typically made up of three components: Technology, People and Process. The last two,
people and process, are really what separate the idea of information systems from more technical fields, such as
computer science.
✓ ITQ: What are the five basic components of information systems?
✓ ITA: 1. Hardware 2. Software 3. Data 4. Networks 5. Procedures
✓ F. Use of Information Systems.
Information Systems (IS) creates an impact on the organisation’s function, performance and productivity. With
IS support, management of all departments of an organisation can become more effective, IS provides several
advantages to the organisation
1. Ability to link and enable employees Need help with your assignments
Call/WhatsApp Christian - 08108772172
2. Increases boundary spanning
An information system depends on the resources of people (end users and IS specialists), hardware, software ,
data , and networks to perform input, processing, output, storage, and control activities that transform data
resources into information products.
✓ ITQ: Experience and research shows that good information has numerous qualities. What are those qualities?
✓ ITA: Availability/ Accessibility, Accuracy, Reliability/Objectivity, Relevance
/Appropriateness, Completeness, Level of detail/Conciseness, Presentation, Timing, Value of information and
Cost of information.
What does it mean when a company has a competitive advantage? What are the factors that play into it? One of
the most accepted definitions, developed by Michael Porter in his book Competitive Advantage: Creating and
Sustaining Superior Performance. A company is said to have a competitive advantage over its rivals when it is
able to sustain profits that exceed average for the industry. According to Porter, there are two primary methods
for obtaining competitive advantage: cost advantage and differentiation advantage.
Another tool that Porter developed – the “five forces” model, can be used to help understand just how
competitive an industry is and to analyse its strengths and weaknesses. The model consists of five elements,
each of which plays a role in determining the average profitability of an industry. In 2001, Porter wrote an article
entitled “Strategy and the Internet,” in which he takes this model and looks at how the internet impacts the
profitability of an industry. Below is a quick summary of each of the five forces and the impact of the internet.
• Threat of substitute products or services: How easily can a product or service be replaced with something
else? The more types of products or services there are that can meet a particular need, the less profitability
there will be in an industry.
• Bargaining power of suppliers: When a company has several suppliers to choose from, it can demand a lower
price.
• Bargaining power of customers: A company that is the sole provider of a unique product has the ability to
control pricing. But the internet has given customers many more options to choose from.
• Barriers to entry: The easier it is to enter an industry, the tougher it will be to make a profit in that industry.
• Rivalry among existing competitors: The more competitors there are in an industry, the bigger a factor price
becomes. The advent of the internet has increased competition by widening the geographic market and
lowering the costs of doing business.
Hence, a strategic information system is one that attempts to do one or more of the following:
• enable innovation.
Following are some examples of information systems that fall into this category.
• Business Process Management Systems
• Collaborative Systems
STUDY SESSION 2
✓ Hardware Requirement
The physical parts of computing devices – those that you can actually touch – are referred to as hardware.
hardware includes Desktop computers, Laptop computers, Mobile phones, Tablet computers, e Readers,
Storage devices, such as flash drives, Input devices, such as keyboards,mice, and scanners and Output devices
such as printers and speakers.
✓ Tour of a PC
All personal computers (PC) consist of the same basic components: a CPU, memory, circuit board, storage, and
input/output devices.
✓ Motherboard
The motherboard is the main circuit board on the computer. The CPU, memory, and storage components,
among other things, all connect into the motherboard.
✓ Random-Access Memory
When a computer starts up, it begins to load information from the hard disk into its working memory. This
working memory, called random-access memory (RAM), it can store data as long as it is receiving power; when
the computer is turned off, any data stored in RAM is lost.
✓ Hard Disk
A hard disk is where data is stored when the computer is turned off and where it is retrieved from when the
computer is turned on.
✓ Solid-State Drives
SSDs store data using flash memory. which is much faster. The SSD performs the same function as a hard disk:
✓ Removable Media
Removable media allows you to take your data with you. USB flash drive.
Network Connection is a digital telecommunications network which allows nodes to share resources.
✓ Smartphones
As mobile phones evolved, they became more like small computers. These smart phones have many of the same
characteristics as a personal computer, such as an operating system and memory.
✓ Tablet Computers
A tablet computer is one that uses a touch screen as its primary input and is small enough and light enough to
be carried around easily.
✓ Integrated Computing
computing technology is being integrated into many everyday products. From automobiles to refrigerators to
airplanes, ways that computing technologies are being
The PC has become a commodity in the sense that there is very little differentiation between computers, and
the primary factor that controls their sale is their price
✓ ITQ: What are the hardware and software requirements of Information Systems?
✓ ITA: The physical parts of computing and networking devices – those that you can actually touch – are referred
to as hardware, while Software is the set of instructions that tell the hardware what to do.
✓ Types of software
2 application software .
Data can be quantitative or qualitative. Quantitative data is numeric, while Qualitative data is descriptive.
1. Software
✓ Procedures
Procedures refer to the instructions and rules that help to design the database and to use the DBMS. These may
include:
The database access language is used to access the data to and from the database.
✓ Users
The users are the people who manage the databases and perform different operations on the databases in the
database system. There are three kinds of people who play different roles in database system.
1. Application Programmers
2. Database Administrators
3. End-Users
3. Superimpose a logical structure upon the data on the basis of these relationships.
✓ Database administration
Database administration is the function of managing and maintaining database management systems (DBMS)
software.
The degree to which the administration of a database is automated dictates the skills and personnel required to
manage databases.
The internet is the global system of interconnected computer networks that use the internet protocol suite
(TCP/IP) to link billions of devices worldwide.
There are three basic hardware components for a data communications network
2 a client and
3 a circuit
Markup Language]) but is open to only those inside the organization. An extranet is similar to an intranet in that
it, too, uses the same technologies as the Internet but instead is provided to invited users outside the
organization who access it over the Internet.
STUDY SESSION 3
Main content
Systems development professionals agree that the more time invested in understanding the business problem
to be solved.
✓ System analysis:
Once a development project has the necessary approvals from all participants, the systems analysis stage
begins. Organizations have three basic solutions to any business problem:
The main purpose of the systems analysis stage is to gather information about the existing system, to determine
which of the three basic solutions to pursue, and to determine the requirements for an enhanced or new
system.
✓ System design:
Systems analysis describes what a system must do to solve the business problem. Systems design encompasses
two major aspects of the new system:
Systems developers utilize the design specifications to acquire the software needed for the system to meet its
functional objectives and solve the business problem.
✓ Testing
Thorough and continuous testing occurs throughout the programming stage. testing checks to see if the
computer code will produce the expected and desired results under certain conditions.
✓ Implementation
Implementation is the process of converting from the old system to the new system.
Systems need several types of maintenance. i e debugging the programme, updating the system to
accommodate changes in business conditions and adds new functionality to the system.
The SDLC methodology is sometimes referred to as the waterfall methodology to represent how each step is a
separate part of the process; only when one step is completed can another step begin.
✓ ITQ: What are the disadvantage of the traditional Systems development life cycle?
✓ ITA: The traditional systems development life cycle (SDLC) is criticized for being quite rigid, changes to the
requirements are not allowed once the process has begun. Also
SDLC was developed for large, structured projects therefore projects using SDLC can sometimes take months or
years to complete.
Rapid application development (RAD) is a software development methodology that focuses on quickly building a
working model of the software, getting feedback from users, and then using that feedback to update the
working model. After several iterations of development, a final version is developed and implemented.
✓ ITQ: The Rapid application development (RAD) consist of four phases, what are they?
✓ ITA: 1. Requirements Planning 2. User Design 3. Construction4. Cutover
✓ Agile methodologies
Agile methodologies are a group of methodologies that utilise incremental changes with a focus on quality and
attention to detail. The characteristics of agile methods include:
• Short time-frame increments (from days to one or two weeks) for each change to be completed; and
• At the end of each iteration , a working project is completed to demonstrate to the stakeholders.
The goal of the agile methodologies is to provide the flexibility of an iterative approach while ensuring a quality
product.
✓ ITQ: The Rapid application development (RAD) consist of four phases, what are they?
✓ ITA: 1. Requirements Planning 2. User Design 3. Construction4. Cutover
✓ ITQ: What is end-user development?
✓ ITA: End-user development is a phenomenon where information systems can be developed by end users with
little or no formal assistance from technical specialists. A series of software tools categorised as fourth-
generation languages makes this possible.
MODULE 2
✓ ITQ: What are the three type of decision taken at different levels in the organisation?
✓ ITA: They are: Operational-level systems, Management-level systems and Strategic-level systems
specific type of activity or related group of activities, as well as summarised information for management’s control
of such activities
✓ ITQ: What are the popular functional areas of the business organisation?
✓ ITA: They are: 1. Financial Information System 2.Marketing Information System 3.
This system supports the decision-making process of financial functions at the level of an organisation
Product Design
Schedule Production
Check Inventory
Receive Order
Allocate Resources
Complete Job
Quality Testing
Send Order
This functional information system supports the functions of human resource management of an organisation.
also known as personnel management.
Manpower planning.
Staffing
Separation activities
• Cost reduction
The need to evaluate potential new business ventures (e.g. joint ventures or alliances) or business offerings
Business process design projects have two phases: analysis and design. Both phases are typically carried out in
modeling workshops.
Modeling workshops The process of analysing existing processes and defining new or improved ones takes place
in facilitated group sessionss, often called modeling workshops because one of their tangible outputs is a
business process model.
Subject matter experts (SMEs) from the organization, who work in the process
Facilitators with experience of working in or designing such processes. Analysing and designing processes
Understand the organisation and its purpose or “mission” and relate this to the organisation’s current
business processes
Identify and analyse the collection of processes and activities currently operational within the organisation,
and ascertain how far they achieve the business's objectives.
✓ The results of the analysis phase are then fed into the design phase, whose purpose is to:
Investigate options for achieving improvement by redesigning the processes currently in operation
A strategic perspective is higher level (i.e. managers) and seeks to understand the processes that make up the
business and deliver its value.
A tactical perspective is lower level (i.e. practitioners) and seeks to understand the activities that support
processes. It is driven by the task requirements for operational efficiency.
Design-led projects
In a “clean slate” approach, the workshop team designs new processes with little regard for the current
situation, and then considers their impact on the current organisation.
Analysis-led projects
In many IT-driven projects, the purpose of the analysis phase is to understand the processes that are going to be
automated.
✓ ITQ: What is e-commerce?
✓ ITA: E-commerce refers to the use of the internet and the Web to transact business.
✓ The supply chain
A firm’s supply chain is a network of organisations and business processes for procuring raw materials,
transforming these materials into intermediate and finished products, and distributing the finished products to
customers.
More and more companies are entering international markets, outsourcing manufacturing operations, and
obtaining supplies from other countries as well as selling abroad. Their supply chains extend across multiple
countries and regions.
“Business intelligence (BI)” is a term used by hardware and software vendors and information technology
consultants to describe the infrastructure for warehousing, integrating, reporting, and analysing data that comes
from the business environment, including big data.
✓ Knowledge dissemination
Portals, e-mail, instant messaging, wikis, social business tools, and search engines technology have added to an
existing array of collaboration tools for sharing calendars, documents, data, and graphics. contemporary
technology seems to have created a deluge of information and knowledge.
SESSION 5
Main Content
• IT organisational structures that facilitate the implementation of enterprise initiatives in support of strategies
• Effective communications framework between the business, IT, and external partners
• IT control framework for selecting and prioritising projects within the company
This requires the alignment of technology and business strategies. Technology plays an important role in
improving the overall value chain of an organisation.
✓ IT infrastructure refers to the composite hardware, software, network resources and services required for the
existence, operation and management of an enterprise IT environment. It allows an organization to deliver IT
solutions and services to its employees, partners and/or customers and is usually internal to an organisation and
deployed within owned facilities.
✓ ITQ: What is meant by Outsourcing Information Systems?
✓ ITA: Outsourcing Information Systems refers to engaging the services of another specialised organisation (an
external organisation that specialises in providing these services), to build or operate information systems, if it
does not want to use its internal resources.
✓ E. User Rights and Responsibilities
As a user of information systems, you have both rights and responsibilities in your relationship with the IS
department. Your rights are what you are entitled to receive and your responsibilities are what you are expected
to contribute.
– Computer hardware and programmes that allow you to perform your job proficiently
– Effective training
– Learn standard techniques and procedures for the applications you use
– When asked, devote the time required to respond carefully and completely to requests for requirements for
new system features and functions
STUDY SESSION 6
Main Content
A. Security threats
2 manage risk by balancing the costs and benefits of the security programme.
5. System owners have computer security responsibilities outside their own Organisations.
Technical safeguards involve the hardware and software components of an information system. Primary
technical safeguards include; Identification and authentication, Encryption, Firewalls, Malware protection and
Design for secure applications.
A computer disaster is a substantial loss of computing infrastructure caused by acts of nature, crime, or terrorist
activity.
✓ Incident-response plan
Every organisation should have an incident-response plan as part of the security programme. No organisation
should wait until some asset has been lost or compromised before deciding what to do.
MODULE 3
Main Content
• Computing platforms used to provide computing services that connect employees, customers, and suppliers
into a coherent digital environment, including large mainframes, midrange computers, desktop and laptop
computers, and mobile handheld and remote cloud computing services.
• Telecommunications services that provide data, voice, and video connectivity to employees, customers, and
suppliers
• Data management services that store and manage corporate data and provide capabilities for analysing the
data
• Application software services, including online software services, that provide enterprise-wide capabilities
such as enterprise resource planning, customer relationship management, supply chain management, and
knowledge management systems that are shared by all business units
• Physical facilities management services that develop and manage the physical installations required for
computing, telecommunications, and data management services
• ICT management services that plan and develop the infrastructure, coordinate with the business units for ICT
services, manage accounting for the ICT expenditure, and provide project management services
• ICT standards services that provide the firm and its business units with policies that determine which
information technology will be used, when, and how
• ICT education services that provide training in system use to employees and offer managers training in how to
plan for and manage ICT investments
• ICT research and development services that provide the firm with research on potential future ICT projects and
investments that could help the firm differentiate itself in the marketplace
A process of connecting set of items together. In MIS, it is typically a process of connecting computers together
to function effectively and efficiently. A computer network or data network is a telecommunications network
which allows computers to exchange data.
✓ The internet is a global network of network , it is the world’s largest implementation of client/server computing
and internetworking, linking millions of individual networks all over the world.
✓ Client-server: The personal computer originally was used as a stand-alone computing device. A programme was
installed on the computer and then used to do word processing or number crunching. However, with the advent
of networking and local area networks, computers could work together to solve problems. Higherend computers
were installed as servers, and users on the local network could run applications and share information among
departments and organisations. This is called client-server computing
✓ Intranet: Just as organisations set up web sites to provide global access to information about their business, they
also set up internal web pages to provide information about the organisation to the employees. This internal set
of web pages is called an intranet.
✓ Extranet: Sometimes an organisation wants to be able to collaborate with its customers or suppliers while at the
same time maintaining the security of being inside its own network. Extranets can be used to allow customers to
log in and check the status of their orders, or for suppliers to check their customers’ inventory levels.
✓ ITQ: What is Electronic Data Interchange (EDI)?
✓ ITA: Electronic Data Interchange (EDI) is an electronic communication method that provides standards for
exchanging data via any electronic means. By adhering to the same standard, two different companies or
organisations, even in two different countries, can electronically exchange documents (such as purchase orders,
invoices, shipping notices, and many others).
The World Wide Web is one of many services that run across the Internet like electronic mail, voice, video, and
file transfers. The World Wide Web is simply one piece of the internet made up of web servers that have HTML
(or similar web script) pages that are being viewed on devices with web browsers.
STUDY SESSION 8
MAIN CONTENT
D. Environmental Scanning
The DBMS manages three important things: the data, the database engine that allows data to be accessed,
locked and modified -- and the database schema, which defines the database’s logical structure. These three
foundational elements help provide concurrency, security, data integrity and uniform administration
procedures.
The World Wide Web, or simply Web, is a way of accessing information over the medium of the internet. It is an
information-sharing model that is built on top of the Internet.
Management oriented
MIS is designed top-down. This means that the system is designed around the need felt by the management at
different levels for information. The focus of the system is to satisfy the information needs of management.
Management directed
Since MIS is 'for the' management it is imperative that it also should have a very strong 'by the' management
initiative. Management is involved in the designing process of MIS and also in its continuous review and up
gradation to develop a good qualitative system Integrated
MIS is an integrated system. It is integrated with all operational and functional activities of management. This is
an important characteristic and- requirement for a system to qualify as MIS.
Through MIS the data being stored into the system, retrieved from the system, disseminated within the system
or processed by the system can be handled in an integrated manner.
Strategic planning
MIS cannot be designed overnight. It requires very high degree of planning which goes into creating an effective
organisation. The reason for this kind of planning is to ensure that the MIS being built not only satisfies the
information need of the managers today but can also serve the organisation for the next five to ten years with
modifications.
MIS is required to give 'one version of the truth', i.e., it must supply the correct version of the latest information.
✓ MIS supports:
Strategic management: As part of a strategic planning process top executives develop overall organisational
goals, strategies, policies, and monitor the strategic performance of the organisation and its overall direction in
the political, economic, and competitive business environment
✓ Tactical management: Business unit managers and business professionals in selfdirected teams develop short-
and medium-range plans, schedules, budgets and specify policies, procedures, and business objectives for their
sub-units of the company, and allocate resources and monitor the performance of their organisational sub-units,
including departments, divisions, process teams, project teams, and other workgroups.
✓ ITQ: What are Decision-support systems (DSS)?
✓ ITA: Decision-support systems (DSS) are computer-based information systems that provide interactive
information support to managers and business professionals during the decision making process.
DSS components: Unlike management information systems, decision support systems rely on codebases, as well
as databases, as vital system resources. A DSS model base is a software component that consists of models used
in computational and analytical routines that mathematically express relationships among variables.
✓ Executive information systems (EIS) are information systems that combine many of the features of management
information systems and decision support systems.
✓ ITQ: What is the benefit of Environmental scanning to an organisation?
✓ ITA: Environmental scanning helps an organisation gathers information about the external world, its competitors
and itself, so that it can then respond to the information gathered by changing or improving its strategies and
plans as the need arises.
SESSION 9
Main Content
The impact of MIS on the functions is in its management. With a good MIS support, the management of
marketing, finance, production and personnel becomes more efficient, the tracking and monitoring the
functional targets becomes easy.
Soft systems methodology (SSM) is an approach to organisational process modeling (business process
modeling) and it can be used both for general problem solving and in the management of change. It was
developed
Involving business managers in the governance of the IS function and business professionals in the
development of IS applications should thus shape the response of management to the challenge of
improving the business value of information technology.
Session 10
Main Content
Kingdom of Great Britain and Northern Ireland which defines UK law on the processing of data on identifiable
living people. B.Computer Misuse Act 1990
The Computer Misuse Act 1990 is an Act of the Parliament of the United
Kingdom, introduced partly in response to the decision in R v Gold & Schifreen (1988) 1 AC 1063.
Conservative MP Michael Colvin. The bill, supported by the government, came into effect in 1990. Sections 1-3
of the Act introduced three criminal offences:
1. Unauthorised access to computer material, punishable by 12 months' imprisonment (or 6 months in Scotland)
and/or a fine "not exceeding
2. Unauthorised access with intent to commit or facilitate commission of further offences, punishable by 12
months/maximum fine (or 6 months in
The Regulation of Investigatory Powers Act 2000 (c.23) (RIP or RIPA) is an Act of the Parliament of the United
Kingdom, regulating the powers of public bodies to carry out surveillance and investigation, and covering the
interception of communications. It was ostensibly introduced to take account of technological change such as
the growth of the internet and strong encryption.
RIPA regulates the manner in which certain public bodies may conduct surveillance and access a person's
electronic communications. The Act:
Enables certain public bodies to demand that an ISP provide access to a customer's communications in secret;
Kingdom of Great Britain and Northern Ireland which defines UK law on the processing of data on identifiable
living people.
Enables mass surveillance of communications in transit; Enables certain public bodies to demand ISPs fit
equipment to facilitate surveillance; Enables certain public bodies to demand that someone hand over keys to
protected information; Allows certain public bodies to monitor people's internet activities;
Prevents the existence of interception warrants and any data collected with them from being revealed in
court.
Physical damage- Fire, water, vandalism, power loss, and natural disasters
Human interaction- Accidental or intentional action or inaction that can disrupt productivity
It is impossible to have a system or an environment to be 100 percent secure, there should be an acceptable
level of risk.
Reject it: If a company is in denial about its risk or ignore it, it is rejecting the risk
Accept it: If a company understands the risk and decides not to implement any kind of countermeasures it is
accepting the risk.