Professional Documents
Culture Documents
Annamalai University: Directorate of Distance Education
Annamalai University: Directorate of Distance Education
Annamalai University: Directorate of Distance Education
346E2320
349E2330
1 - 24
ANNAMALAI UNIVERSITY
DIRECTORATE OF DISTANCE EDUCATION
M.B.A. E - Business
Second Semester
Copyright Reserved
(For Private Circulation Only)
M.B.A. E-BUSINESS
Second Semester
MASTER OF BUSINESS ADMINISTRATION
M.B.A. FINANCIAL MANAGEMENT
Third Semester
MANAGEMENT INFORMATION SYSYEM
Editorial Board
Dr. N. Ramagopal
Dean
Faculty of Arts
Annamalai University
Annamalai Nagar.
Members
Internals
Dr. G. Natarajan Dr. S. Partheeban
Assistant Professor Assistant Professor
Management Wing - DDE Management Wing - DDE
Annamalai University Annamalai University
Externals
Lesson Writers
SYLLABUS
Learning Objectives
The learning objectives of the course are:
LO1: To provide a real-world understanding of management information
systems in business;
LO2: To impart a firm foundation and background needed in the field of
information systems;
LO3: To explain the information system technologies currently available in
business world;
LO4: To provide the right balance of conceptual background, technical
information and real-world applications and
LO5: To introduce the infrastructure required and security issues for the
effective use of information system.
Course Outcomes
At the end of this course, the candidates should be able to:
C01: Use the knowledge of information system models for decision
making;
CO2: Analyze Management Information Systems within a context of an
integrated collection of subsystems;
CO3: Categorize the components of information systems and differentiate how
they interact to have competitive advantage;
CO4: Classify the conceptual foundations, structure and technology of
information systems. Apply planning and development techniques
involved in the implementation of an information system,
specifically DSS;
CO5: Create an information-based DSS within an MIS supporting improved
decision making and problem solving by means of insights and
CO6: Have the capacity of working with the associated technologies related
to inventory contol system.
ii
Teaching Methods
Lecture, Case Study and Seminar Presentation
Unit–I Introduction
MIS: Need - Purpose – Objectives - Data Information, - Knowledge - Elements of
Comprehensive Management Information System – Types of Information System –
Information as a Strategic Resource - Use of Information for Competitive
Advantages – Information System for Decision Making – Models of Decision Making
– Classical, Administrative and Herbert Simon’s Models – Attributes of Information
and its Relevance to Decision Making – Types of Information.
Unit–II MIS and Business
MIS in Organization – Top Management Responsibility – Data Processing Group
Responsibility – Development and Maintenances of MIS – Role of Computer in MIS –
Information Technology Infrastructure.
Unit–III System Analysis
System Analysis – System Concept - System Planning and Mutual Investigation
– Assessing Enterprise Information Requirements – System Design – The process
and Stages of System Design – Input Design - Forms Design – System Approach –
System implementation – System Testing – System Audit – System Development
Life Cycle.
Unit–IV Decision Support System
Decision Support System: Data Warehousing and Data Mining – Business
Intelligence and Analytics – Executive Information System - Executive Support
System – Expert Systems and Knowledge Based Expert System.
Unit–V MIS and Digital Firm
MIS Model for a Digital Firm - Organizations Structure for Digital Firm – BPO -
Management Issues in MIS – Information Security and Control – Ethical and Social
Dimension.
Unit–VI Application of MIS
Application of MIS in Functional Area – Marketing – Production System -
Accounting System - Inventory Control System - Human Resource Information
Systems - Recent Developments in MIS (for discussion only).
Text Books
1. Kenneth G. Laudon & Jane P. Laudon, “Management information
system – Managing the Digital firm,” Eighth edition, New Delhi: Prentice
– Hall of India Pvt. Ltd., 2003.
2. Robert C. Nickerson, “Business and Information System,” Second
edition, New Delhi: Prentice-Hall of India Pvt. Ltd., 2002.
3. Rich Schiesser, IT System Management, New Delhi, Prentice Hall of
India Pvt. Ltd., 2002.
iii
Supplementary Readings
1. Leonard Jessup & Joseph Valacich, “Information Systems Today,” New
Delhi: Prentice Hall of India Pvt. Ltd., 2003
2. Kenneth C. Laudon and Jane P. Laudon, Management Information
System, Fifth Edition, Singapore: Pearson Education (Sg.) Pvt. Ltd.,
2003.
3. Goyal, DP., Management Information Systems: Managerial
Perspectives, 4th edition, Vikas Publishing House, New Delhi, 2014
4. Janakiraman and Sarukeshi, Decision Support Systems, 12th Edition,
PHI Learning Pvt. Ltd., New Delhi, 2011.
Journals and Magazines
1. Journal of Management Information System
2. ACM Transactions of Management Information System
3. International Journal of Information Management
4. Information and Management
Web Resources
1. http://en.wikipedia.org/wiki/Management_information_system
2. http://www.webopedia.com/TERM/M/MIS.html
3. http://www.tutorialspoint.com/management_information_system/mana
gement_information_system.htm
4. http://searchcio.techtarget.com/definition/decision-support-system
5. http://www.techopedia.com/definition/770/decision-support-system-
dss
iv
M.B.A. E-BUSINESS
Second Semester
MASTER OF BUSINESS ADMINISTRATION
M.B.A. FINANCIAL MANAGEMENT
Third Semester
MANAGEMENT INFORMATION SYSYEM
CONTENTS
U.No. L. No. Title P. No.
1. Introduction to Management Information System 1
2. Types of Information System 15
I 3. Information System and Strategic Management 25
4. Information System for Decision Making 38
5. Management Information System in Organization 54
6. Management and Other Group Responsibility 63
II 7. Development and Maintenance of MIS 67
8. Role of Computers in MIS and Designing MIS Infrastructures 76
9. Systems Analysis 86
10. System Planning for Information Systems 99
III
11. System Design and Implementation 105
12. Systems Development Life Cycle 124
13. Decision Support System 134
14. Business Intelligence and Analytics 154
IV
15. Executive Information System and Executive Support System 174
16. Expert System and Knowledge Base Expert System 191
17. MIS Model for Digital Firm 211
18. Organization Structure for Digital Firm 230
V
19. Information Security and Control 248
20. Ethical and Social Dimension 266
21. Application of MIS in Functional Area 284
22. Marketing Information System 303
VI
23. Production System and Accounting System 321
24. Inventory Control and Human Resource Information Systems 341
UNIT – I
LESSON – 1
INTRODUCTION TO MANAGEMENT INFORMATION SYSTEM
1.1. INTRODUCTION
Many organizations have flourished in a highly competitive environment,
because they have created a set of finely tuned business processes and information
systems that simultaneously promote agility, efficiency and quality. The
organizations can respond instantly to customers and changes in the marketplace
as events unfold, while working closely with suppliers and retailers. As a part of
ongoing effort to monitor quality, efficiency and costs on products/services, the
management would see the opportunities to use information systems to improve
business performance.
The latest technology alone would not provide solutions. The organizations
have to carefully revise its business processes to support a better products/services
on actual customer orders rather than “best guesses of customer demand. Once
that was accomplished, suitable software will be useful for coordinating the flow of
information among disparate internal production, ordering and invoicing systems
within the company and with systems of retailers and suppliers.
In order to help the customers management systems of many organizations
reduce inventory costs, because the organizations and dealers do not have to pay
for making/storing customers did not want. The system also increases customer
satisfaction by making it easier for customer to buy exactly the design, make and
option they desire. Information provided by the system helps management monitor
trends and forecast demand and product/service requirements more accurately,
which is clearly depicted in Figure 1.1.
Figure 1.1. Information System to monitor trends and forecast demand and
production/service requirements
Business
Problem
Analyze market Tough Competition
trends Demanding Customers
Management
Monitor quality,
efficiency and
costs
Redesign
order and Organization Information Business
production System Solution
processes
Reduce Costs
Forecast demand and
Deploy suitable Increase revenue
production requirements
Software Technology Improve customer service
more accurately
Integrate
software with
intranet and
internet
2
will certainly want to know how to invest this money wisely. If we make wise
choices, our firm can outperform competitors. If we make poor choices, we will be
wasting valuable capital.
We can see the results of the massive spending on information technology and
systems around us everyday by observing how people conduct business. More
wireless cell phone accounts were opened in 2005 then telephone land lines
installed. Cell phones, Blackberrys, handhelds, e-mail, online conferencing, and
international teleconferencing over the internet have all become essential tools of
business.
Currently more than 80 million businesses had dot.com internet sites
registered. Most of the customers purchase something every day on the Internet.
The responsiveness of the new economy had led many experts to believe the era of
massive recessions and booms of the typical business cycle is over, replaced by
much smaller contractions and expansions, and strong long-term growth.
There has been a massive shift in media markets. As newspaper readership
continue to decline, more than 50 million people receive their news online. As
growing percentage of the American economy and other advanced industrial
economics in Europe and Asia-depend on imports and exports. Foreign trade, both
exports and imports, accounts for more than 25 per cent of the goods and services
produced in the United States and even more in countries such as Japan and
Germany.
The emergence of the Internet into a full-blown international communication
system had drastically reduced the costs of operating on a global scale. Customers
now can shop in a worldwide market place, obtaining price and quality information
reliably 24 hours a day. Firms can achieve extraordinary cost reduction by finding
low-cost suppliers and managing production facilities in other countries. Digital
content firms that produce Hollywood movies are able to sell millions more copies of
DVDs of popular films by using foreign markets. Internet service firms, such as
Google and eBay are able to replicate their business models and services in
multiple countries without having to redesign their expensive fixed cost information
system infrastructure.
Role of the Management Information System
The MIS plays exactly the same role in the organization. The system ensures
that an appropriate data is collected from the various sources, processed, and sent
further to all the needy destinations. The system is expected to fulfill the
information needs of an individual, a group of individuals, the management
functionaries: the managers and the top management.
The MIS satisfies the diverse needs through a variety of systems such as Query
Systems, Analysis Systems, Modeling Systems and Decision Support Systems the
MIS helps in Strategic Planning, Management Control, Operational Control and
Transaction Processing.
The MIS helps the clerical personnel in the transaction processing and
answers their queries on the data pertaining to the transaction, the status of a
4
particular record and references on a variety of documents. The MIS helps the
junior management personnel by providing the operational data for planning,
scheduling and control, and helps them further in decision making at the
operations level to correct an out of control situation. The MIS helps the middle
management in short them planning, target setting and controlling the business
functions. It is supported by the use of the management tools of planning and
control. The MIS helps the top management in goal setting, strategic planning and
evolving the business plans and their implementation.
The MIS plays the role of information generation, communication, problem
identification and helps in the process of decision making. The MIS, therefore, plays
a vital role in the management, administration and operations of an organization.
1.3.2 OBJECTIVES OF MIS
The goals of an MIS are to implement the organizational structure and
dynamics of the enterprise for the purpose of managing the organization in a better
way and capturing the potential of the information system for competitive
advantage. Following are the basic objectives of an MIS:
Capturing Data: Capturing contextual data, or operational information that
will contribute in decision making from various internal and external sources of
organization.
Processing Data: The captured data is processed into information needed for
planning, organizing, coordinating, directing and controlling functionalities at
strategic, tactical and operational level. Processing data means:
making calculations with the data
sorting data
classifying data and
summarizing data
Information Storage: Information or processed data need to be stored for
future use.
Information Retrieval: The system should be able to retrieve this information
from the storage as and when required by various users.
Information Propagation: Information or the finished product of the MIS
should be circulated to its users periodically using the organizational network.
1.3.3. DATA, INFORMATION AND KNOWLEDGE
Data, information, knowledge and wisdom are closely related concepts, but
each has its own role in relation to the other. Data is collected and analyzed to
create information suitable for making decisions, while knowledge is derived from
extensive amounts of experience dealing with information on a subject. For
example, the height of Mt. Everest is generally considered data. This data may be
included in a book along with other data on Mt. Everest to describe the mountain in
a manner useful for those who wish to make a decision about the best method to
climb it. Using an understanding based on experience climbing mountains to advise
persons on the way to reach Mt. Everest's peak may be seen as "knowledge". Some
5
complement the series "data", "information" and "knowledge" with "wisdom", which
would mean the status of a person in possession of certain "knowledge" who also
knows under which circumstances is good to use it.
That is to say, data is the least abstract, information the next least, and
knowledge the most. Data becomes information by interpretation; e.g., the height of
Mt. Everest is generally considered "data", a book on Mt. Everest geological
characteristics may be considered "information", and a report containing practical
information on the best way to reach Mt. Everest's peak may be considered
"knowledge".
All individuals, companies and, in general, all organisations are continuously
capturing data, many of which are of no significance to them at all. However, other
data are available that would afford them a better understanding of their own
environment and of themselves. These data – what we know as information – enable
them to make more accurate decisions. For this reason, the right amount of
information at the right time is a key factor for every organisation.
Company managers take decisions, prepare plans and control their company’s
activities using information that they can obtain either from formal sources or
through informal channels such as face-to-face conversations, telephone calls,
social contacts, etc. Managers are challenged by an increasingly complex and
uncertain environment. In these circumstances, managers should theoretically be
able to define and obtain the type of information they require. However, this is not
what happens in practice; rather, the way managers perform their work depends on
the available information that they have access to. Most decisions are therefore
made in the absence of absolute knowledge, either because the information is not
available or because access to it would be very costly.
Despite the difficulties in obtaining information, managers need relevant
information on which to base their planning, control and decision-making
functions. Although the terms data and information are sometimes used
indiscriminately, they do have different meanings. Data are non-random symbols
that represent the values of attributes or events. Hence, data are facts, events and
transactions stored according to an agreed code. Data are facts obtained through
reading, observation, calculation, measurement, etc. The amounts and other details
on an organisation’s invoices, cheques or pay slips, etc, are referred to as data, for
example. Data are obtained automatically, the result of a routine procedure such as
invoicing or measurement processes.
"Information" bears a diversity of meanings that ranges from everyday to
technical. Generally speaking, the concept of information is closely related to
notions of constraint, communication, control, data, form, instruction, knowledge,
meaning, mental stimulus, pattern, perception, and representation.
Beynon-Davies uses the concept of a sign to differentiate between data and
information; data is a series of symbols, while information occurs when the symbols
are used to refer to something.
6
It is people and computers who collect data and impose patterns on it. These
patterns are seen as information which can be used to enhance knowledge. These
patterns can be interpreted as truth, and are authorized as aesthetic and ethical
criteria. Events that leave behind perceivable physical or virtual remains can be
traced back through data. Marks are no longer considered data once the link
between the mark and observation is broken.
According to Davis and Olson:
“Information is a data that has been processed into a form that is meaningful
to recipient and is of real or perceived value in the current or the prospective action
or decision of recipient.”
Figure 1.2. Transformation of data into information
Data Transformation
Information
Process
Classification by Characteristic
Based on Anthony's classification of Management, information used in
business for decision-making is generally categorized into three types:
Strategic Information: Strategic information is concerned with long term
policy decisions that defines the objectives of a business and checks how well these
objectives are met. For example, acquiring a new plant, a new product,
diversification of business etc., comes under strategic information.
Tactical Information: Tactical information is concerned with the information
needed for exercising control over business resources, like budgeting, quality
control, service level, inventory level, productivity level etc.
Operational Information: Operational information is concerned with
plant/business level information and is used to ensure proper conduction of
specific operational tasks as planned/intended. Various operator specific, machine
specific and shift specific jobs for quality control checks comes under this category.
Classification by Application
In terms of applications, information can be categorized as:
Planning Information: These are the information needed for establishing
standard norms and specifications in an organization. This information is used in
strategic, tactical, and operation planning of any activity. Examples of such
information are time standards, design standards.
8
Systems Concept
According to Yourdan, the word system is one of the most used terms in the
day-to-day life. This observation is very correct that we often refer different systems
in our day-to-day life. This includes solar systems, Biological systems, Human
system, Real time systems, online systems, cybernetic systems, Expert systems,
Information Systems etc. Thus we can very easily find so many systems very
popular around us. But is their exist relationship between so many systems we
come across and the systems concept? Indeed the answer is the ‘conceptualization
process’ of set of related activities resulted in so many number of systems around
us.
Now let us generalize and extend this conceptualization process with five
different elements namely, Input, Process, Output, Control and memory as shown
in figure 1.4.
Figure 1.4 : Basic Components of a system
Control
M em ory
All systems we come across in our day-to-day life will have all the above stated
five components. However, some of these components in many of the systems
cannot be realized very easily. Say for example the memory components of the
Human system may not be so visible as it is the case with memory component of
Information systems. In information systems the memory components can be
traced to all the files and ledgers or in the database. But in human systems the
memory components is nothing but the brain and the contents a specific brain can
be reproduced. From the Figure 1.4., it is possible to explain any systems in the
world. That is, one can very easily identify the various inputs, process and output
for all the systems. But identifying the control component and memory component
for naturally formed system requires in-depth analysis. However, in the artificially
created systems the success of the system depends on the proper deployment of the
controls on various inputs, processes and output. Also, the various happening of
the system is required to be recorded. But in most of the artificial systems created,
the memory component is not considered so significant. For example consider a car
as a system, the memory components one can identify so visibly with it is, the
distance travelled in the speedometer. But now the real question to be answered is,
the answer is no. There are many memory components that are available in the car,
but they are not predominantly required for the users of the car. Think about the
memory system in the car, which can bring the details like number of turns the car
can has taken in its life period. Thus, in most of the artificially created systems the
10
many memory components can be identified but all of them are usually not given
with proper significance.
Though, it is observed that most of the artificially created systems have
insignificant memory component, there exist at least one exception to that which is
nothing but an information systems. Indeed, the real significance of information
system relies heavily on the ‘memory system’ and its ability to retrieve or generate
information form the huge pools of data. From Figure 1.5. The information system
can be explained in terms of various data generation sources, various data
processing techniques and various possible information output in terms of
management reports. In the artificially created information systems appropriate
control is required to be designed for various inputs various processes and possible
information outputs. The details of the information systems with various inputs,
processes, output, control and memory are shown in Figure 1.5.
Figure 1.5. Components of Information System
Control
What controls are needed to protect against accidental loss of damage?
Is there a need to control access to data used by the application?
Storage
Does the application use previously stored
data?
Does create data that must be stored for
future use by this or other applications?
Sub systems
The subsystems can be defined as the independent entity available within the
system. Thus, it is nothing but a system residing within a ‘larger system’ defined
with clear-cut boundaries and processes. In a specific system it is always possible
to identify different subsystems. If this universe is considered as system we can
state different subsystems as stars, planets, satellites and comets. Each of these
sub-systems can be defined with clear-cut boundaries and functions. Similarly, in
the Figure 1.5, the components of information system namely Input, Process,
Output, Storage and Control can be individually called as different subsystems of
the Information systems. In the artificially created systems, the subsystems are
required to be carefully defined and created so that they can ensure the cohesive
functioning of the system. Normally, in such systems ‘created boundaries’ and
interfaces are carefully studied to make sure that the relations among subsystems
are clearly defined. This is considered very important because, too many sub-
systems will sometimes be a problem. For example, human body as a system can
considered. However, such considerations will create too many systems parameters
for the system designers. Thus, in artificially created systems optimal number of
11
Management
of IS
Development of IS
(Solutions to Problems)
Application of IS
(To Operations, Management
and Strategic Advantages)
Technology of IS
(Hardware, Software, Networks and
Data Management)
Foundation Concepts of IS
(Fundamental Behavioral and Technical Concepts)
Thus, the elements of MIS are to be explained from the business end users
perspective. The business end users framework for understanding the elements of
MIS is shown in Figure 1.6, which is a pyramid where the bottom most layer
represents the fundamental behavioural and technical concepts that should be
known to understand information systems. Those who have got fundamental ideas
related to the basic computer operations can understand the aspects related to this
layer.
12
The second layer from the bottom of the MIS pyramid represents the
technology aspects of the information systems like hardware, software, networks
and data management. The people associated in this layer of MIS are the
technocrats like software engineers etc. An ordinary end user may not recognize the
minute aspects in this layer. The layer from the bottom of the pyramid represents
the application of the information systems to various business requirements like
Operations, Management, Decision Making, and gaining the competitive and
strategic advantage. This layer represents the interfacing layer between the
identified application and the possible technological solution. For example, the first
satellite was launched in the year 1956, but it is identified that the satellite
applications can be used in the business, only in early 80s. This identified
application of satellite in the business has resulted in the growth of GIS
(Geographic Information Systems) technology. Similarly, what we are seeing today
as computer applications for our business in the day-to-day life is only a small-
identified aspects, but there exist a numerous scope for computer application in the
business in future. The fourth layer from the bottom of the pyramid in the Figure
1.6 represents the development of Information System for the identified application
areas of the specific business mode. This layer of the business end users framework
will represent the creation of MIS for the specific business establishment.
The top most layers in the MIS pyramid represents the management aspect of
the developed and implemented Information System in an organization. The
activities corresponding to this layer belongs to the specific business establishment
for which the MIS established and operated. For the ordinary end users this layer
may not be so familiar. However, the employees of the specific business
establishment can recognize the various activities in this layer of the business end
users framework.
Technology Elements of MIS
The technology elements of MIS are shown in the Figure 1.7. In which, the
details like computer networks, hardware, software, data and people are shown in
the different layers of the triangle representing the various aspect of MIS is sown in
the second base layer of the triangle and it signifies the importance of technology
elements in MIS. The second layer of Figure 1.7 is more elaborately represented in
the Figure 1.7.
In the figure 1.7 the network elements are represented in the base layer of the
triangle. This signifies the importance of computer networks in the present day
computerized MIS. Also, the computer networks in one form or another governs
more Internet orientation of the business establishment in the form of B2B type of
Electronic Commerce. In the Figure 1.7, the second layer is represented with the
elements of computer hardware in the enterprise network. The data management
and the related hardware support like physical memory component of the
computers are represented in the third base layer of the triangle. The top most two
layers in the Figure 1.7 represent the people and software resource is an MIS. The
overall control of the technology elements are taken care by the concerned people in
13
the technology domain. Also, software systems are essential to operate the
enterprise Information Systems.
Figure 1.7. Technology elements of MIS
People
Data Elements
Software Resource
Hardware Components
Network Elements
LESSON – 2
TYPES OF INFORMATION SYSTEM
2.1. INTRODUCTION
Information systems fall into six major types catering to four levels of
management. The five major functional areas are sales and marketing,
manufacturing, finance, accounting, finance, human resources (represented in
Figure 2.1).
Transaction processing systems (TPS) performs the major lower level work
such as order entry, sales management, scheduling, accounting systems.
Office systems support word processing, document management and
storage, electronic meeting and planning (calendars).
Knowledge work systems support design and analysis such as CAD or data
analysis.
Decision support systems (DSS) such as cost analysis systems and pricing
analysis.
Management information systems (MIS) such as sales and marketing
management systems, inventory control, capital budgeting.
Executive support systems (ESS) such as five-year sales trend, profit
planning, strategic planning.
Executive Support
Strategic Level System
(Senior Managers)
Decision Support
System
MIS FILES
Order
processing Sales data
Order file system
Managers Reports M IS
Fig. 2.2
19
Input Output
Production
data Product
design
Inventory
dat a Facility design
Vendor
dat a Production
Data
Marketing Base
data Vendor
data
Industrial
engineering QC/QA
data
External
data
Others
External interface
Internal records
Product plan
Ext ernal Environment
Marketing
intelligence
data Price plan
Ot hers
Marketing Data
research base
Place plan
data
Marketing
Promotion plan
decision
data
Fig. 2.4
21
Payroll Management
Payroll reports
System
Master
file
Government
documents
Data elements in
Payroll master file
Employee number
Name
Address
Department
occupation
Pay rate On-line queries:
Vacation time Earnings
Gross pay
Earnings
Fig. 2.5
The figure exhibits a transaction processing system of human resources for
employee record keeping. It maintains basic employee data, such as employee
name, age, sex, marital status, address, educational background, salary, job title,
date of hiring, and date of termination. The system can generate various types of
reports such as the list of newly hired employees, employees who are terminated,
employees on leave, employees on training, employees with specific skill sets etc.
2.3.5. INTER RELATIONSHIPS AMONG SYSTEMS
Operational-level systems are TPSs. Examples of these are payroll or order
processing that track the flow of the daily routine transactions that are necessary to
conduct business. Knowledge-level systems support clerical, managerial, and
professional workers. They consist of the office systems for increasing data workers’
productivity and knowledge work systems for enhancing knowledge workers’
productivity. Management-level systems (MIS and DSS) provide the management
control level with reports and access to the organization’s current performance and
historical records.
Most MIS reports condense information from TPS and are not highly
analytical. Decisions-support systems (DSS) support management decisions when
these decisions are unique, rapidly changing, and not specified easily in advance.
They have more analytical models and data analysis capabilities than MIS and
23
often draw on information from external as well as internal sources. The various
types of systems in the organization exchange data with one another. TPS are a
major source of data for other systems, especially MIS and DSS.
Executive
information
system
Management Decision
information support
system system
Know ledge
w ork systems Transaction
& processing
Office system
automation
systems
Fig. 2.6
Relationship between TPS, office systems, KWS, MIS, DSS, and ESS.
2.4. REVISION POINTS
1) The major types of Information System such as. Transaction Processing
System, Knowledge Work System, Decision-Support System, Management
Information System and Executive Support System
2) Different types of information system support people to act according to the
process and each system provide and exchange data one another.
2.5. INTEXT QUESTIONS
1) Discuss on the different transaction processing system in the organizations
2) What are the characteristics of DSS? How is it different from the ESS?
3) Describe the relationship between different levels of information system.
2.6. SUMMARY
Information system stands on four levels of management. The systems form,
not a hierarchy but a level of systems, with each type either formatting or
processing the information from a lower level. MIS depends on the data in
transaction processing systems. MIS serves the management level by providing the
managers with reports and on-line access to current records and historic
information.
24
LESSON – 3
INFORMATION SYSTEM AND STRATEGIC MANAGEMENT
3.1. INTRODUCTION
Strategic information systems are such types of information systems which are
especially critical to firms' long term prosperity and survival. They are the powerful
tools for staying ahead of the competition. Strategic information systems change the
goals, operations, products, services, or environmental relationships of
organizations to help them gain an edge over competitors. At times the business of
such organizations may even change.
3.2. OBJECTIVES
After studying this lesson, you will be able to
Know the Strategic Information Systems
know the importance of value chain model
know the difficulty in building strategic information system
discuss about firm level strategy and information system
know how information system influences the organization strategically
3.3. CONTENTS
3.3.1 Strategic Information Systems
3.3.2 Value Chain Model
3.3.3 Efficient Customer Response Systems
3.3.4 Strategic Impact of Information System
3.3.1. STRATEGIC INFORMATION SYSTEMS
Strategic information systems are different from strategic level systems for
senior managers that focus on long-term, decision making problems. Strategic
information systems can be used at all organizational levels and are more far
reaching and deep rooted than the other kinds of systems. Strategic information
systems alter the way a firm conducts its business completely or the very business
of the firm itself altogether. Organizations with such systems in place may need to
change their internal operations and relationships with customers and suppliers in
order to reap the benefit of new information systems.
Old model of strategy are not adequate to handle the present situation. They
have to be modified to in the light of new digital firms and the information flows.
Earlier business strategy emphasized competing head on against other firms in the
same marketplace. Now the emphasis is increasingly on exploring, identifying, and
occupying new market niches before competitors can understand such segments
and react.
Generally there is no single strategic system that encompasses all strategic
requirements. In practice there are a number of systems operating at different
levels of strategy, business, firm and industry level. Every level of business strategy
separate strategic systems is used. At each level of business strategy an appropriate
model is used for analysis.
26
activities
Support
Human resources Workforce planning system
Technology Computer-Aided Design system
Procurement Computerized ordering system
Equipmen
Dist ribut or
Computer- t
controlled Computeri maintenan Automated
Automated
machining zed ce shipment
warehousi
system ordering System scheduling
ng system
Assembler
system systems
Primary activities t racking
On line
syst em
f orecast ing
Product ion
System
Value chain
Value web
Fig. 3.1
Figure illustrates the activities of the value chain and the value web. It is a
strategic information system that could be developed to make each of the value
activities more cost effective.
A firm can achieve a strategic advantage by providing value, not only through
its internal value chain processes but also through powerful, efficient ties to value
web partners as well. Businesses should try to develop strategic information
systems for both the internal value chain activities and the external value web
activities that add the most value. A strategic analysis may help in identifying
activities where information systems could provide the greatest boost. Such
28
purchased. The data come from a range of sources credit card transactions,
demographic data, purchase data from checkout counter scanners at supermarkets
and retail stores, and data collected when people access and interact with Web
sites. Analysis of such data can help one-to-one marketers create personal
messages based on individualized preferences. The level of fine-grained
customization provided by these data analysis systems parallels that for mass
customization.
The cost of acquiring a new customer has been estimated to be five times than
that of retaining an existing customer. By carefully examining transactions of
customer purchases and activities, firms can identify profitable customers and
target them for more business. Likewise, companies can use these data to identify
non profitable customers and wed them away. Companies that skilfully use
customer data will focus on identifying the most valued customers and use data
from a variety of sources to understand their needs.
3.3.3. EFFICIENT CUSTOMER RESPONSE SYSTEMS
Digital firms have the capabilities to go far beyond traditional strategic systems
for taking advantage of digital links with other organizations with which they do
business. A powerful business-level strategy available to digital firms involves
linking the value chains of vendors and suppliers to the firm's value chain.
Integration of value chains can be carried further by digital firms through linking
the customer's value chain to the firm's value chain in an efficient customer
response system. Firms using systems to link with customers and suppliers can
reduce their inventory costs while responding rapidly to customer demands.
By keeping prices low and shelves well stocked using a legendary inventory
replenishment system, Wal-Mart has become the leading retail business in the
United States. To manage the supply chain the company tries to eliminate delays
and cut the amount of resources tied up along the way. This can be accomplished
by streamlining the company's internal operations or by asking suppliers to put off
delivery of goods and their payments until the moment they are needed.
Supply chain management systems can not only lower inventory costs but can
also deliver the product or service more rapidly to the customer. Supply chain
management can thus be used to create efficient customer response systems that
respond to customer demands more efficiently. An efficient customer response
system directly links consumer behavior back to distribution, production, and
supply chains.
The convenience and ease of using these information systems raise switching
costs. Switching cost is the cost associated with the cost of switching from one
product to another competing product. This discourages customers from going to
competitors. Just-in-time inventory allows customers to reduce their inventories by
ordering only enough material for a few days' inventory. Stockless inventory allows
them to entirely eliminate their warehouse inventories. All inventory responsibilities
shift to the distributor who manages the supply flow. The stockless inventory is a
30
powerful instrument for locking in customers, thus giving the supplier a decided
competitive advantage.
Supply chain management and efficient customer response systems are two
instances of how emerging digital firms can engage in business strategies not available
to traditional firms. These systems require network-based information technology
infrastructure investment and software competence to make customer and supply
chain data flow seamlessly among different organizations. These types of systems have
greatly enhanced the efficiency of individual digital firms and the economy as a whole
by moving toward a demand-pull production system, and away from the traditional
supply-push economic system in which factories were managed on the basis of 12-
month official plans rather than on near-instantaneous customer purchase
information. The following figure illustrates the relationships between supply chain'
management, efficient customer response, and the various business-level strategies.
Firm-Level Strategy
Business level strategy
Vendors Customers
Business Organization
Fig. 3.2
Collection of businesses is a business firm. Firm is organized financially as a
collection of strategic business units and the returns to the firm are directly tied to
strategic business unit performance. Issue is how can the overall performance of
these business units be increased? and how can information technology
contribute? Synergy and core competency are the ways of achieving them.
Synergy is attained when some units can be used as inputs to other units or
two organizations can pool markets and expertise. Such relationships can lower
costs and generate profits. Recent bank and financial firm mergers are clearly an
example of this. IT can be used strategically to tie together the operations of
disparate business units so that they can act as a whole. Such systems lower
retailing costs, increase customer access to new products and speed up the process
of marketing.
31
THE INDUSTRY
TRADITIONAL
THE FIRM INDUSTRY
COMPETITORS
SUPPLIERS CUSTOMERS
Fig. 3.3
By working with other firms, industry participants can use information
technology to develop industry-wide standards for exchanging information or
business transactions electronically which force all market participants to
subscribe to similar standards. Firms benefits from such value webs with
complementary firms in the industry. Such efforts increase efficiency at the
industry level as well as at the business level-making substitute products less
possible and perhaps raising entry costs. This discourages new entrants. Industry
members are nowadays building industry-wide, IT supported consortia, symposia,
and communications networks to coordinate activities vis-a-vis government
agencies, foreign competition, and competing industries.
IMPROVED COMPETITIVE
FORCES MODEL SUBSTITUTE
NEW MARKET
ENTRANTS PRODUCTS &
INDUSTRY SET SERVICES
INDUSTRY 1 INDUSTRY 2
INDUSTRY COMPETITORS
INDUSTRY 3 INDUSTRY 4
CUSTOMERS
SUPPLIERS
Fig. 3.4
The competitive forces model needs some modification in this dynamic digital
era. The traditional Porter model assumes a relatively static industry environment,
relatively clear-cut industry boundaries, and a relatively stable set of suppliers,
substitutes, and customers.
Instead of participating in a single industry, today's firms are much more
aware that they participate in industry sets of multiple related industries that
consumers can choose from to obtain a product or service. Automobile companies
compete against other automobile companies in the auto industry, and also
compete against many other industries in the transportation industry, which
includes train, plane, and bus transportation companies. Success or failure for a
33
single auto company may depend on the success or failure of various other
industries.
In the digital era we can expect greater emphasis on building strategies to
compete and cooperate with members of the firm's industry set. Internet technology
has affected industry structure by providing technologies that make it easier for
rivals to compete on price alone and for new competitors to enter the market.
Profits have also been dampened because the Internet dramatically increases the
information available to customers for comparison shopping, thus raising their
bargaining power. Although the Internet can provide benefits such as new channels
to customers and new operating efficiencies, firms cannot achieve competitive
advantage with this technology unless they have skillfully integrated Internet
initiatives into their over all strategy and operations.
Network Economics
A third strategic concept useful at the industry level is network economics. In
case of factories and agriculture the production experiences diminishing returns.
The more any given resource is applied to production, the lower the marginal gain
in output, until a point is reached where the additional inputs produce no
additional outputs. This is the law of diminishing returns. This is the foundation for
most of modern economics. In the case of network, the marginal costs of adding
another participant are about zero, whereas the marginal gain is much larger. This
is true when the number of subscribers in a telephone system, or the Internet, the
greater the value to all participants. From this network economics perspective,
information technology can be strategically useful. Internet sites can be used by
firms to build communities of users. The like-minded customers want to share their
experiences in the web site. This can build customer loyalty and enjoyment, and
build unique ties to customers.
Strategic information systems often change the organization as well as its
products, service and operating procedures, driving the organization into new
behaviour patterns. Using technology effectively for strategic benefit requires
careful planning and management.
Adopting such strategic systems discussed requires changes in business goals,
relationships with customers and suppliers, internal operations, and information
architecture. These socio-technical changes, affecting both social and technical
elements of the organization, can be considered strategic transitions. It is the
movement between levels of socio-technical systems. Such changes often entail
blurring of organizational boundaries, both external and internal. Suppliers and
customers may become intimately linked and may share each other's
responsibilities. Managers will need to devise new business processes for
coordinating their firms' activities with those of customers, suppliers, and other
organizations. The organizational change requirements surrounding new
information systems are so important that the managers have to attach due
importance.
34
The managers should locate the type of system that will provide them strategic
advantages. In that they need to seriously consider the following:
the factors influencing the industry and strategy preferred by the industry
leaders.
need to look at the types of information and communication technology by
the industry leader and the type that would shoot them.
the nature of change and its direction and its momentum have to be
ascertained.
On understanding the above, the manager must look into the organisation
critical issues like
the organisation information system status, whether it is ahead or lagging
behind others.
organisation strategic plan and its compactability with information service
strategy.
capital availability and the organisation technology to develop strategic
information system.
can the new information system deliver greater value.
expected benefits in functional area by use of internet technology.
With all the above information managers can develop a promising strategic
information system.
3.3.4 STRATEGIC IMPACT OF INFORMATION SYSTEM
Information systems that have a strategic impact on a business helps to create
unique competitive advantage for the business. This advantage, which puts the
business in a stronger position to compete than other businesses, can be gained in
several ways.
Approach Way to achieve Information systems role
Cost leadership Have lowest production/ operations Cost reduction support in the
cost among competitors managerial and operational
Differentiation Provide goods and services that are Supporting tools to identify and
unique develop unique goods or services
Focus Goods or services designed for Provide information to identify
specific segment of the market (niche) niche markets
Innovation Develop new ways of operating or Provide technology necessary for
managing the business innovation in a business
Growth Expand goods or services provided by Provide capabilities to handle
the business increased volume of business
Business alliance Form groups of business that work
Provide the technology for
together business in alliance to work
effectively together
The main approach is summarized above for gaining a competitive advantage
and how information systems can help in each approach.
35
Cost Leadership
One way a business can gain a competitive advantage is through cost
leadership, which means having the lowest production or operating costs among
the business's competitors. Information systems can help create cost leadership by
providing unique operational and managerial support that reduces costs. Consider
a car manufacturer with special types of manufacturing information systems, such
as computer integrated manufacturing (CIM), the manufacturer could have the
lowest production costs in that industry. Its cars would sell for less than its
competitors, thus giving the business a competitive advantage.
Differentiation
Next way a business can gain a competitive advantage is through
differentiation, which means providing goods or services that are unique so that the
customer wants to purchase from the business. Information systems can help
create differentiation by providing the tools to identify and develop unique goods or
services. The car manufacturer could use a marketing research information system
to identify consumer interest on new types of cars, a computer aided system (CAD)
to design the car quickly, and a computer aided manufacturing (CAM) system to
produce the cars rapidly. If the business could identify and produce a new product
before its competitors did, the business would have a competitive advantage, at
least until other businesses caught up.
Focus
A third way competitive advantage can be gained by a business is to focus on a
niche, which means to provide goods or services that are designed for a specific
segment of the market. The car manufacturer might decide to focus on sports cars
and gain a competitive advantage by becoming the principal producer of such cars.
Information systems can help a business focus on a niche by providing information
to identify niche markets. The car manufacturer could use a decision support
system to analyze the data in a data warehouse by using data mining techniques to
help identify potential market niches.
Innovation
Another way of gaining a competitive advantage is through innovation. This is
developing new ways of operating or managing the business. Information systems
can provide the technology necessary for innovation in a business. The car
manufacturer could use an innovative approach to inventory control that requires a
special information system to function. The innovative approach, which would not
be possible without the information system, would provide better inventory
management than the approach used by competitors, thus giving the business a
competitive advantage.
Growth
A fifth way a business can gain a competitive advantage is by growth. This is
expanding the goods or services provided by the business. Such expansion could be
into new goods or services or into new geographic regions. This approach is the
opposite of the focus approach. Information systems are essential for businesses to
36
grow because they provide the capabilities to handle the increased volume of
business. If the car manufacturer wants to grow by expanding into new lines of
cars, he needs the appropriate information systems like order entry, inventory
control, and others for the increase in transactions.
Business Alliances
The sixth way a business can gain a competitive advantage is through
business alliances, which means forming groups of businesses that work together.
The car manufacturer could form an alliance with a car distributor to exclusively
distribute its cars. Information systems can help create alliances by providing the
technology for the businesses in the alliance to work effectively together. Thus, the
car manufacturer and the distributor could link their information systems so that
the manufacturer could check the distributor's inventory to decide when to increase
production, and the distributor could electronically place orders with the
manufacturer.
Helping a business gain a competitive advantage through cost leadership,
differentiation, focus, innovation, growth, and business alliances are just some of
the ways that information systems can have a strategic impact on a business.
3.4. REVISION POINTS
1) Strategic Information System change the organizations goals, operations,
products, services or environmental relationships of organization to help them
gain an edge over competitors.
2) Business level stagey making is how an organization effectively compute in
the market
3) Value chain analysis is variable analytic tool which is used at a business
level, in which the basic activities are primary activities and supportive
activities.
4) Based on the physical activities (primary activities), supportive activities such
as, production forecasting system, online tracking are more useful to face the
competitive market environment.
3.5. INTEXT QUESTION
1) Script an essay on firm level strategy and information systems.
2) Explain how the information system influences organizations strategically.
3) What is competitive advantage?
3.6. SUMMARY
Strategic information systems can be used at all organization levels and are
more far reaching and deep rooted than the other kinds of systems. It also alters
the way a firm conducts its business completely. As we think, no strategic system
will solve all strategic requirements, but indeed, a number of systems operating at
different levels are required. If such strategic systems are adopted great changes
will occur.
37
LESSON – 4
INFORMATION SYSTEM FOR DECISION MAKING
4.1. INTRODUCTION
Decision making function is an essential function of different managerial
activities. The managers at various levels are first and foremost decision makers in
many organizations. The organization is filled with decision makers at various levels
and hence it is possible to evolve organization as decision-making model similar to
the model of organization as Information Processing System. Thus, any set of
activities that can help the managers in taking decisions can be called as Decision
Supporting activities. The activities can be a manual procedure or even a document
will aid in decision-making by the managers in various organizations. Hence, it
should be noted that the decision-making is more a manual process that can be
aided with various tools. In other words structured decision-making process
requires choosing one alternatives from the group of different alternatives available
to the organization or an Individual.
4.2. OBJECTIVES
After studying this lesson you will understand
About Decision-Making Process
Classification of Decisions
Models of Decision-Making
Classification of the Information
4.3. CONTENTS
4.4.1. Human Decision Making Process
4.3.2. Classification of Decisions
4.3.3. DSS Definition and Classification
4.3.4. DSS Design and Development
4.3.5. Expert Systems
4.3.6. Models of Decision-Making
4.3.7. Organizational Decision-Making
4.3.8 Types of Information
4.3.9. Classification of the Information
4.3.1. HUMAN DECISION MAKING PROCESS
Newell and Simon (1972) proposed a model for human decision-making. It
consisting of three different stages namely (i) Intelligence stage (ii) Design stage and
(iii) Choice stage.
i. Intelligence Stage
This is a stage where every individual recognizes the problem and solution to
the problem is being sought intangibly in this stage. For example consider an
wagons to transport them. In this circumstance they will recognize the need for
transport facilities to transport the commodities.
39
Knowledge
Acquisition Knowledge Expert and/or
Program Engineering Know ledge Engineer
Workstation
ACCOUNTS
STRUCTURED
RECEIVABLE
PRODUCTION
ELECTRONIC COST OVERRUNS
SCHEDULING
TPS
MIS
OAS
BUDGET
PREPARATION
PROJECT
SEMI-STRUCTURED
SCHEDULING
DSS
FACILITY
ESS
LOCATION
KWS
UNSTRUCTURED
NEW PRODUCTS
PRODUCT
NEW MARKETS
DESIGN
Fig. 4.2
45
Fig. 4.3
Choice
Choosing among alternatives. Larger DSS can be used to develop more
extensive data on a variety of alternatives and use complex analytic models to
account for all of the consequences and opportunities.
Implementation
Monitoring the progress of a specific solution. Reporting systems can be used
to obtain information on specific solutions. A full blown MIS can be of good use.
But can also use smaller MIS or project planning and evaluation software. This four
46
stage process does not move linearly. They may iterate to the earlier stage for want
of details or redefinition etc. at time one has to repeat the earlier stage.
INDIVIDUAL MODEL OF DECISION MAKING
Human individual decision making can fall into any of the four models.
They are rational, cognitive, systematic and intuitive decision making.
The rational model of human behaviour holds that people engage in basically
consistent rational value maximization calculations. An individual ascertains his
goals, ranks all possible alternative of achieving those goals. He is expected to
select an alternative that contributes most to those goals. It is difficult to list all the
possible alternatives. Many of us have multiple goals. Hence owing to the above two
reason one cannot calculate all the combination to arrive at a decision.
The cognitive style describes underlying personality disposition towards the
treatment of information selection and evaluation of consequences. Systematic
decision makers approach the problem by structuring it in term of some formal
method. They evaluate and gather information in their structured way. Intuitive
decision makers approach the problem with multiple methods in an unstructured
way using trial and error to find the solution. They do not structure the information
gathering or evaluation. All the methods have advantages and also associated
disadvantages. Individuals can have their bias towards certain issues which will
influence their information gathering and evaluation process.
4.3.7. ORGANIZATIONAL DECISION MAKING
In organizational context decision making is not individualistic but group.
Such decision making is influenced by the structural and political dimensions of
the individual organization. The four organizational decision making models are
rational model, Bureaucratic model, Political model and Garbage can model.
Bureaucratic Models
The most important goal of top management is preservation of the
organization. The next important goal is reduction of uncertainty. Policies do not
allow radical changes from the present status as it increases the uncertainty. In
bureaucratic organizations policies allow only incremental changes which allow
only marginal changes from the past. Such organizations decision is an outcome of
standard operating procedure (SOP) honed over the years. Change in SOP’s is very
rare and do not change. They have to replace with new team of people and risk
when they change the SOP. Changes happen over a long period of time.
Political model
Even the lower level employee shares some power. The power is shared across
the whole organization. Any decision is an outcome of the political bargain struck
across different key leader and interest groups instead of a real solution to a
problem. Outcome reflects the conflicts, the major stake holders, their diverse
interest, unequal power, and confusion that constitute the politics.
Garbage can model
Assumes that organizations do not make any rational decisions but the
decisions are accidents. The decisions are a product of stream of solutions,
47
problems and situations that are randomly associated. This may be true as many
organizations apply wrong solutions to wrong problem and finally die.
System Design Implications
Decision making is not a simple process for a person in the rational individual
model. Information systems cannot make the decision for humans but is expected
to support the decision making process. The way decision is made depend on the
types of decisions, decision makers, and frames of reference. Systems have to be
built to support group and organizational decision making. Information systems
developed should have the following characteristics.
Systems are flexible and provide many options for handling data and
evaluating information.
Systems are capable of supporting a variety of styles, skills, and knowledge.
Systems are powerful with multiple analytical and intuitive models for the
evaluation of data and the ability to keep track of many alternatives and
consequences.
Systems share the understanding of group and organizational processes of
decision making.
Systems are sensitive to the bureaucratic and political requirements of
systems.
4.3.8. TYPES OF INFORMATION
The word information is used commonly in our day to day working. In MIS,
information has a precise meaning and it is different from data. The information
has a value in decision making while data does not have. Information brings clarity
and creates an intelligent human response in the mind.
In MIS a clear distinction is made between data and information. Data is like
raw materials while the information is equivalent to the finished goods produced
after processing the raw material. Information has certain characteristics.
These are: Information
Improves representation of an entity
Updates the level of knowledge.
Has a surprise value.
Reduces uncertainty.
Aids in decision making.
The quality of information could be called good or bad depending on the mix of
these characteristics. A sales report shows in Table 4.1 will highlight this point.
It can be noted in the above example that sales data is processed with the
budget data and further some results are computed, providing information of an
exceptional nature that is the sale of new product in the total sales. The sales data
progressively becomes information when processed with other data such as the
budget and the new product sales.
Devis and Olson defines information as a data that has been processed into a
form that is meaningful to the recipient and is of real or perceived value in the
current or the prospective actions or decisions of the recipient. Data is defined as
48
Ratio of sales performance 85% 15 per cent less than budget. Represents
Performance of Sales vs. Budget.
Sales of new products 80/60 days Reduces the uncertainty of sales of new
product as expected sales were only Rs.70
lakhs.
The above model of communication is used in the MIS. The MIS is equivalent
to the transmitter which provides information and sends through reports (channel)
to the various receivers, which is decoded or interpreted by the receiver at the
destination. The poor quality of information due to various factors would create
confusion and misunderstanding, which is equivalent to a Noise and a Destortion
in the communication model. A good MIS communicates the information without a
noise and a distortion to the user.
Information Presentation
Presentation of the information is an art. The data may be collected in the best
possible manner and processed analytically, bringing lot of value in the
information; however, if it is not presented properly, it may fail to communicate
anything of value to the receiver. The degree of communication is affected by the
methods of transmission, the manner of information handling and the limitations
49
Bias in Information
While choosing the appropriate method of communicating information a care
has to be taken to see that is not biased. For example, while using the techniques
of classification or filtering the information, it should not happen that certain
information gets eliminated or does not get classified. That is, a deliberate bias in
covering certain information is to be avoided. This bias enters because people try to
50
block sensitive information which affects them. To overcome this problem, a formal
structure of organization should be adopted and the type of information and its
receiver should be decided by the top management.
Many a times the data and the information are suppressed but the inferences
are informed, with no or little possibility of verification or rethinking. In this case
one who draws inferences may have a bias in the process of collection, processing
and presentation of data and information. Though the deliberate enforcement of the
inference on the receiver avoids a possibility of the multiple inferences, but in this
case processors bias is forced on the receiver. For example, organizations have
departments like Corporate Planning, Market Research, R and D, HRD and so on,
which collect the data and analyze it for the company and communicate the
inferences. In all these cases personal bias, organizational bias and management
bias may be reflected in the entire process of collection processing, and
communication inference.
Table 4.3. Methods to Avoid Misuse of Information
Method Reason Example
deviation from the exception creates a bias by design itself. For a quick grasp, the
information is presented in a graphical form. The choice of scale, the graphic size
and the colour introduced a bias in the readers mind.
The base, which may creep in inadvertently because of the information system
design, can be tackled by making the design flexible, so far as reporting is
concerned. Allow the manager or the decision maker to choose his classification or
filtering criteria, the scope of information, the method of analysis and the
presentation of inference. However, somewhere balance needs to be maintained
between the flexibility of the design and the cost, and its benefits to the managers.
Disregarding the bias in information, it must have certain attributes to increase its
utility as shown in Table 4.4.
Table 4.4. Attributes of the Information
Attribute Explanation
The accuracy in The test of accuracy is how closely it represents a
representation situation or event. The degree of precision will
decide the accuracy in representation.
The form of presentation Forms are qualitative or quantitative numeric or
graphic, printed or displayed, summarized or
detailed.
The frequency of reporting How often the information is needed? How often
it needs to be updated
The scope of collection Internal form organization or external to
organization
The time scale It may relate to the past, the current and the
future and can cover the entire time span.
The relevance to decision The information has relevance to a situation and
making also to a decision making. The irrelevant
information is a data.
Complete for the decision The information which covers all the aspects of
considerations the decision situation by way of the scope,
transactions and period is a complete.
The timeliness of reporting The receipt of information on time or when
needed is highly useful. The information arriving
late loses its utility as it is outdated.
Redundancy is the repetition of the parts or messages in order to circumvent
the distortions or the transmission errors. The redundancy, therefore, sometimes is
considered as an essential feature to ensure that the information is received and
digested.
52
UNIT – II
LESSON – 5
MANAGEMENT INFORMATION SYSTEM IN ORGANIZATION
5.1. INTRODUCTION
An organization is a stable, formal social structure that takes resources from
the environment and processes them to produce outputs. Organizations use
information to produce outputs, but are not designed primarily for processing
information. Capital and labour are drawn from the environment. The organization
transforms them into output and return them back to the environment as products
or services.
5.2. OBJECTIVES
After completing this lesson, you will be able to
understand the common and unique features in organizations
know the impact of information systems in organization
know the different types of organization
know the role of Internet, WWW on Information System
5.3. CONTENTS
5.3.1. Organization and Information
5.3.2. Information System Dimensions
5.3.3. Information System and Organization
5.3.4. Impact of Information Systems on Organizations
5.3.5. Internet and World Wide Web Role on Information Systems
5.3.1. ORGANIZATION AND INFORMATION
The organization is more stable entity than informal group on its longevity and
routines. They are legal entities and have internal rules and procedures that are in
accordance with the laws. They are social structures as they are a collection of
social elements.
FIG. 5.1. The Organization and Information Systems Influence each Other
M ediating factors
Environment
Culture
Structure
Standard Procedures INFORMATION
ORGANISATIONS
Business Process TECHNOLOGY
Politics
Management Decisions
Chance
people within the organization, their ways of working, their relationships. People
working in organizations develop customary ways of working, gain attachments to
existing relationships, make arrangements with subordinates and superiors as to
how a work will be done, how much work will be done, and under what conditions
etc. Mostly these do not find place in the rules book. The behavioral definition is the
more realistic of the two.
The technical definition encourages focusing on the way the inputs are
transformed into output when technology changes are introduced. Here capital and
labor can substitute for each other infinitely. But the realistic behavioral definition
suggests building information system or rebuilding is more than technical
arrangement of machines or workers. An information system changes the
organizational balance of rights, privileges, obligations, responsibilities, and feelings
that has been established over a long period of time. Such changes bring in
changes as to who owns and controls information, who has the right to access and
update that information, and who makes decision on whom, when and how.
Therefore a great deal of resistance is expected for new information system
implementation.
Fig. 5.2 Organization
Government
Firm
Competitors
Customers
Financial Institutions
Information
system
Fig. 5.3
Organizations reside in the environment it take the input from the
environment and gives the output to the environment. Organization depends on the
social and physical environment that surrounds them. Organization has to depend
on the society for the manpower, consumers etc. it has to comply with the
legislative and other statutory requirements of the government.
5.3.2. INFORMATION SYSTEM DIMENSIONS
Organization
Information systems are part of organizations, and in some cases (financial
information services) they are the organization. Information systems will have the
SOPs (Standard Operating Procedures) and the culture of an organization imbedded
within them.
Technology
Organization
Information
systems
Management
Fig. 5.4
Management: Information systems supply tools and information needed by
managers to allocate, coordinate and monitor their work, make decisions, create
new product, and services and make long-range strategic decisions.
Technology: Management uses information systems technology (hardware,
software, storage, and telecommunications) to carry out their functions. It is the
glue that holds the organization together.
58
Information systems are tied to the organization's business strategy, rules, and
procedures. A change in strategy, rules or procedures requires changes in software,
hardware, databases, and communications technology, and vice-versa.
Fig. 5.5 Organization and Information System Interdependence
Softw are
Business
strategy
Softw are Hardw are
Rules
Procedures
Tele-
communications
Interdependence
IMPLEMENTING CHANGE
TASK
RESISTANCE
TECHNOLOGY PEOPLE
MUTUAL
ADJUSTMENT
STRUCTURES
Fig. 5.6
61
LESSON – 6
MANAGEMENT AND OTHER GROUP RESPONSIBILITY
6.1. INTRODUCTION
Data processing and users of the Information system are any person who has
an interest in an existing or proposed information system. The major players may
include technical and non-technical workers as well as internal and external
workers. There are a number of persons, who have their own views about a system
as well as has their own role to develop the system.
In real life situation, any individual may play more than one of these roles. For
example, a system owner might also be a system user, similarly system analyst
might also be a project manager, so any combination of these may work. Broadly,
there are five major group of people and others are external service providers and
project managers.
All the above group people have one thing in common – they all are
information workers. Information worker means any person whose work is to
create, collect, process, distribute and use information. So now, we briefly examine
the each group people separately.
6.2. OBJECTIVES
After studying this lesson you will understand
About Management and Other group responsibility on System Development
6.3. CONTENTS
6.3.1 Management and Other Group Responsibility on System Development
6.3.1. MANAGEMENT AND OTHER GROUP RESPONSIBILITY
Managers (System Owner)
Any information system can have one or more owners. Usually, system owners
are the managers of the organization. If a system is large then the system owners
are middle level or top level managers. If the system is small then the system owner
may be middle manager or the supervisor of the organization.
System owner has to pay for the system to be built, so they are the persons
who set the vision and priorities for the system. Hence, they view an information in
terms of cost and benefits to solve problems and exploit opportunities.
System Analyst
System managers, users, designers and builders have different perspectives on
information system. Some of these are technical person and others are non
technical, one owner may be interested in overall or general view of the information
while the designer is interested in each and every detail of the system. This
situation represents the gap that has always existed when one wants to use the
benefits of information technology or computer based solution to their business
problem. Only a system analyst would be able to fill up these gaps. System analyst
is a specialist who studies the problems and needs of an organization to determine
how people, data, process and information technology can best accomplish
improvements for the business. The system analyst is a unique stakeholder
64
Internal System Users: They are employees of business for whom information
system is built. Internal system users are clerical and service workers, technical
and professional staff, supervisors, middle managers and top managers.
External System Users: They are also known as remote users (a user who is
located at a distant place but needs the information). Mobile user (a user whose
location is constantly changing but who is required to access information system
from any location. Example of external user are customers, suppliers, partners,
employees etc.
External Service Providers
A combination of system analyst, system designer and system builder can
come together to sell their expertise and experience to other business organizations
in order to help those businesses, to develop or integrate their information system
solution, they may also be affiliated with a consulting services organization.
Project Managers
The above group people must work together or in a team to successfully build
a quality information system. As we all know, a team can not perform better if it is
without an effective leader. Therefore one of the groups play the role of project
manager to ensure that systems are developed on time, within budget and an
acceptable quality. Project manager is an experienced skilled professional who
accepts the responsibility for planning, monitoring and controlling project with
respect to schedule, budget, deliverables, customers satisfaction, technical
standard and system quality.
6.4. REVISION POINTS
1) The major players in information system may include technical and non-
technical workers as well as internal and external workers.
2) There are a number of persons, who have their own views about a system as
well as has their own role to develop the system.
3) There are five major group of people and others are external service providers
and project managers play their role in information system development.
6.5. INTEXT QUESTIONS
1) List out the different group of people play their role in Information System
Development.
2) Explain the role of Managers in Information system Development
3) What are the roles of external workers in system development?
6.6. SUMMARY
There are mainly five groups of people play their responsibility in information
system management, users in an organization such as managers, system users,
system builders, system designers and system analyst.
6.7. TERMINAL EXERCISE
1) In what ways has the role of information systems in business expanded
during the last 40 years?
2) Give a detailed account on Management and other group responsibilities in
Information System Management.
66
LESSON – 7
DEVELOPMENT AND MAINTENANCE OF MIS
7.1. INTRODUCTION
In MIS, the information is recognized as a major resource like capital and time.
If this resource has to be managed well, it calls upon the management to plan for it
and control it, so that the information becomes a vital resource for the system.
7.2. OBJECTIVES
After studying this lesson you will understand
The process of Management Information Development
About the Maintenance of Management Information System
The problems related to the maintenance of MIS
Measures to overcome the problems related to the maintenance of
Information System
7.3. CONTENTS
7.3.1 The process of Management Information Development
7.3.2 Maintenance of Management Information System
7.3.3 Problems related to the Maintenance of MIS
7.3.4 Measures to overcome the problems related to the maintenance of MIS
7.3.1. THE PROCESS OF MANAGEMENT INFORMATION DEVELOPMENT
Development of Information System involves a multistep process called the
information system development cycle. The steps taken to develop management
information system are given below.
The management information system needs good planning.
This system should deal with the management information not with data
processing alone.
It should provide support for the management planning, decision-making
and action.
It should provide support to the changing needs of business management.
Major challenges in MIS implementation are:
Quantity, content and context of information - how much information and
exactly what should it describe.
Nature of analysis and presentation- comprehensibility of information.
Availability of information - frequency, contemporariness, on-demand or
routine, periodic or occasional, one-time info or repetitive in nature and so
on
Accuracy of information.
Reliability of information.
Security and Authentication of the system.
68
outgoing manager must be done with the proper consent of the related staff. There
must be regular change in reports of maintenance of Management Information
System.
Change in Forms: For the proper maintenance of MIS, there must be change
in forms of reports of maintenance of Management Information System. The change
in forms is done with the change in environment of the organization, so that the
new forms should not be contrary to the existing reports.
Change in Procedures: The procedures of the maintenance of Management
Information System must be changed with the change in form, software and
hardware in an organization. The new procedure must be related to the new forms
and easily adopted in new software and hardware. The pros and cons of new
procedures must be taken into account before implementing it. The procedures
must not be contrary to the goals of the organization.
System controls and Security Needs: The system controls and maintenance
of the system are the responsibilities of the line manager of an organization.
Sometimes, there are unauthorized changes in the existing system for its
improvement, which is not accepted in the organizations. Maintenance is closely
related to control. It helps in improving the system’s scope and services, and
reducing the error due to the environment changes. Each system is to be tested in
accordance with the test specifications and procedures prevailing in the particular
organization. Each new form may be tested relatively independent of the system to
which they belong.
Change in Hardware: There should be proper change in the acquisition of
computer system equipments with the passage of time. The design of the computer
system and the architecture available from vendors are closely tied together. Once a
choice of a new CPU and peripheral equipment has made, then make a decision
whether to buy or lease. The capital expenditure analysis must also be taken into
consideration. Other factors like usage, anticipated replacement schedule and
vendor’s options also take into account.
Software Addition or Modification: There is a continuous need for change in
software packages. There should be proper planning, forecasting, operating, and
control models, so that software must be developed internally or under contract.
The addition or modification of software must be taken into account depending on
the nature of the hardware. It would have been cheaper to have developed the
entire software internally in the organization.
Change in Economic Conditions: Changes in general economic conditions
play a major role in defining financial information systems. If the system is properly
designed, it should meet the needs of all users, not just the accounting and finance
departments. General economic conditions dictate corporate policy in several areas,
and the ability to internalize these changes in an important part of a good systems
design. As these changes are only partly predictable, the system should be
evaluated periodically to ensure both proper inclusion and measurement of new
conditions. Changes in the unemployment rate, both nationally and locally, could
71
effect the direct labour cost and could also affect the time frame for completion of
planned projects. Changes in inflation and interest rates have even more far-
reaching impacts. A rise in interest rates may hinder customers attempting to
obtain short-term credit to purchase a company’s product. The same rise in interest
rates may stop a company from expanding plant capacity, stockpiling inventories,
or replacing and updating fixed assets. This list is not all inclusive, but it should be
noted that periodic systems evaluations will help to ensure that these and similar
items are included.
New Technology: The development of computer technology, applications
programs, and management techniques have progressed at such a rate as to make
farcical the articles of only a few years ago suggesting that total information
systems would always be myths. Data communications system interactive systems
with video displays, tremendous storage capacities, and higher-speed computers
are staggering to old-line managers. This new technology is being introduced and
used by different institutions.
Industry and Competitive Conditions: Change in industrial conditions
should be treated in the same manner as changes in economic conditions; however,
the timing of reactions of these changes may be more important. The expansion or
collapse of a market for a company’s products is of such importance that failure to
react on a timely basis may mean failure of the business as a whole. Competitive
strategies, price policy, hiring, and capital budgeting are but a few of the areas
affected by changes in business conditions. New technology, either in production of
products or in the creation of alternative products, may affect even the basic
concepts that form the corporate objectives. New standards for measurement such
as package sizes or the metric system may have great financial impact. Industry
innovations in reporting or gathering data , such as point-of-purchase data
collection in retailing, and video responses to stock price information in brokerage
houses, are other examples. These and the changes cited earlier require anything
from routine to major changes in the Management Information System.
Changes in Government Policies, Regulations and Legislation: Large
companies require specialists or lawyers to keep management appraised of the
numerous change in reporting requirement, compliance requirements, and
pressures for change. For example, banks must be aware of new regulations,
maximum interest rates, interest rates established through federal reserve
activities, minimum down payments required on loans and mortgages, acceptance
rules. Manufacturing companies must be aware of change in pension rules,
financial disclosure, companies must be aware of change in pension rules, financial
disclosure, and so on. Health care facilities must be aware of legislation and rulings
with regard to state and federal government payments for the elderly, indigent, and
so on. In other words there is a continuous flow of rules from government that
requires constant updating of the Management Information System in a Company.
72
3) Once the organizational planning stage is over, the designer of the system
should take certain strategic maintenance of MIS may be applied to the
activities such as, Change in policy statements, Change in reports, Change in
forms, Change in procedures, System controls and security needs, Change in
hardware, software addition or modification, Change in economic conditions,
New technology, Industry and competitive conditions, Change in government
policies, regulations and regulations.
4) Problems related with maintenance is the ongoing activity that keeps the
Management Information System are presented.
5) Measures to overcome the problems related to the maintenance of MIS are as,
Proper planning for maintenance, responsibility, initiation of maintenance
projects, adequate documentation, qualified personnel for the proper
maintenance of MIS.
7.5. INTEXT QUESTION
1) What are the steps involved in information system development?
2) List out the various activities to be applied for the strategic maintenance of
MIS.
3) Write short note of impact of new technology in system maintenance.
4) What are the problems related with the ongoing maintenance of MIS?
5) Point out the measures to overcome the problems related to the maintenance
of MIS.
7.6. SUMMARY
Development of Information System involves a multistep process called the
information system development cycle. Creating a unified MIS covering the entire
organization will lead to a more economical, faster and more integrated system,
however it will increase in design complexity manifold. Once the organizational
planning stage is over, the designer of the system should take certain strategic
Maintenance of MIS may be applied to the activities such as, Change in policy
statements, Change in reports, Change in forms, Change in procedures, System
controls and security needs, Change in hardware, software addition or modification,
Change in economic conditions, New technology, Industry and competitive
conditions, Change in government policies, regulations and regulations. Problems
related with maintenance is the ongoing activity that keeps the Management
Information System are presented. Measures to overcome the problems related to
the maintenance of MIS are as, Proper planning for maintenance, responsibility,
initiation of maintenance projects, adequate documentation, qualified personnel for
the proper maintenance of MIS.
7.7. TERMINAL EXERCISES
1) Draw a flow chart on the steps involved in Information System Development.
2) What is called the strategic maintenance?
3) Write a short note on ongoing maintenance of information system.
75
LESSON – 8
ROLE OF COMPUTERS IN MIS AND DESIGNING MIS
INFRASTRUCTURES
8.1. INTRODUCTION
In the modern workplace, it is imperative that Information Technology (IT)
works both effectively and reliably. Computer and information systems managers
play a vital role in the implementation and administration of technology within their
organizations. They plan, coordinate, and direct research on the computer-related
activities of firms. In consultation with other managers, they help determine the
goals of an organization and then implement technology to meet those goals.
They oversee all technical aspect of an organization, such as software development,
network security, and Internet operations. In designing of MIS infrastructure, there
exist many ways to organize an infrastructure in an organization. There is no single
organization structure that applies optimally to all situations. This could be due
factors such as size, maturity, and orientation of a firm. Hence, firms MIS
organization varies widely from one company to another company and it can
directly influence the best design for MIS infrastructure.
8.2. OBJECTIVES
After studying this lesson, you will be able to
Know the different role of computers in MIS
understand the four critical departments in designing the MIS information
infrastructure
learn the general view in framing the “MIS infrastructure”
know how to maintain the quality of data in an organization
Along with quality assurance
8.3. CONTENTS
8.3.1. Role of Computers in MIS
8.3.2. Designing of MIS infrastructure
8.3.3. Locations for the Help Desk
8.3.4. Locations for the Database Administration
8.3.5. Locations of Network Operations
8.3.6. Locations for Systems Management
8.3.7. MIS-Maintenance of Application Quality
8.3.8. Maintenance of Data Quality
8.3.9. Quality Assurance with User-Developed Systems
8.3.1. ROLE OF COMPUTERS IN MIS
Computer and information systems managers direct the work of other IT
professionals, such as computer software engineers and computer programmers,
computer systems analysts, and computer support specialists. They plan and
coordinate activities such as installing and upgrading hardware and software,
programming and systems design, the implementation of computer networks, and
77
the development of Internet and intranet sites. They are increasingly involved with
the upkeep, maintenance, and security of networks. They analyze the computer and
information needs of their organizations from an operational and strategic
perspective and determine immediate and long-range personnel and equipment
requirements. They assign and review the work of their subordinates and stay
abreast of the latest technology to ensure that the organization remains
competitive.
Computer and information systems managers can have additional duties,
depending on their role within an organization. Chief technology officers (CTOs), for
example, evaluate the newest and most innovative technologies and determine how
these can help their organizations. They develop technical standards, deploy
technology, and supervise workers who deal with the daily information technology
issues of the firm. When a useful new tool has been identified, the CTO determines
one or more possible implementation strategies, including cost-benefit and return
on investment analyses, and presents those strategies to top management, such as
the chief information officer (CIO).
Management information systems (MIS) directors or information technology
(IT) directors manage computing resources for their organizations. They often work
under the chief information officer and plan and direct the work of subordinate
information technology employees. These managers ensure the availability,
continuity, and security of data and information technology services in their
organizations. In this capacity, they oversee a variety of technical departments,
develop and monitor performance standards, and implement new projects.
IT project managers develop requirements, budgets, and schedules for their
firm’s information technology projects. They coordinate such projects from
development through implementation, working with their organization’s IT workers,
as well as clients, vendors, and consultants. These managers are increasingly
involved in projects that upgrade the information security of an organization.
Work Environment
Computer and information systems managers generally work in clean,
comfortable offices. Long hours are common, and some may have to work evenings
and weekends to meet deadlines or solve unexpected problems; in 2008, about 25
percent worked more than 50 hours per week. Some computer and information
systems managers may experience considerable pressure in meeting technical goals
with short deadlines or tight budgets. As networks continue to expand and more
work is done remotely, computer and information systems managers have to
communicate with and oversee offsite employees using laptops, e-mail, and the
Internet.
Injuries in this occupation are uncommon, but like other workers who spend
considerable time using computers, computer and information systems managers
are susceptible to eyestrain, back discomfort, and hand and wrist problems such as
carpal tunnel syndrome.
78
within the infrastructure division, it is possible to provide better control for the help
desk operations. Also, in the case of internal help desk kept within organization,
staffing and various performance metrics of the operating personnel of the IT
infrastructure can be effectively handled.
In the case of internal help desk, the help desk operations can also be located
as the division of computer operations. This is because computer operations are
being staffed 24 hours a day and 7 days a week. The organization with Customer
Service Center is shown in the figure 8.1 where computer operations are separated
from the CSC. This is because, the most of the support required for the computer
operations division are with regard to providing desktop support and hence a
separate division within the customer service namely, desktop support can be
located in the Customer Service division.
Infras tructure
Desk
Help Desk
Support
Infrastructure
Network
Operations
Infrastructure
5) What are the organizational factors and data factors associated with the
ability of the organization to maintain the data quality? Explain.
8.6. SUMMARY
Different approaches have been developed to explain the process of designing
MIS infra-structure. Here, in this lesson there is a clear view, how to maintain the
database, network operations, system management and etc. in a detailed manner.
Besides, the ability of an organization to maintain data quality depends on both
organizational factors and data factors. The problems and benefits have also been
presented in detail
8.7. TERMINAL EXERCISES
1) What are the roles of MIS?
2) What are the MIS infrastructures of an organizations?
3) Define: a. Help desk ; b. Database Administration;
c. Network operations d. Systems Management;
e. Data Quality.
8.8. SUPPLEMENTARY MATERIALS
Management Information Systems, Stephan B.Harsh, Michigan State
university.
8.9. ASSIGNMENT QUESTIONS
1) Explain the general preferences of the user in help disk of ‘MIS infrastructure’
of an organization.
2) What do you mean by quality assurance? Explain quality assurance with
user-developed systems.
8.10. REFERENCES
1) Rich Schiesser (2003), IT Systems Management: Designing, Implementing,
and Managing World – Class Infrastructures. Prentice-Hall of India, Third
Printing.
2) Dharminder Kumar and Sangeeta Gupta, Management Information Systems:
A computer oriented approach for Business Operations, Excel Books, 2003.
8.11. LEARING ACTIVITIES
As a system manager, design management information system for your
organization. While designing the system consider different locations such as, help
desk, data base administration, network operations, systems management. Also
consider on application quality.
8.12. KEY WORDS
Portfolios, Desktop, Vender, Custodians.
86
UNIT – III
LESSON – 9
SYSTEMS ANALYSIS
9.1. INTRODUCTION
Systems analysis can be defined as the set of processes carried out to
represent the existing manual Information System into the structured Information
System design based on which an automated and computerized Information System
can be evolved. System analyst is the person associated with the process. The
process of system analysis also requires the extensive role of (i) Users of the
proposed system (ii) Top management personnel (iii) Auditors as well as quality
assurance people (iv) System designers and (v) Programmers. However, the system
analyst will coordinate the role of these people before finalizing a specific
Information System Design. Hence, a system analyst is required to have certain
qualities so that he can successfully coordinate varied set of people.
9.2. OBJECTIVES
After completing this lesson you should be able to,
understand the role of system analyst in information system development
describe the attributes of system analyst
differentiate system analysis and system designing
know the various stages in system analysis and organizational analysis
clear with the methods in information gathering for system analysis
explain the techniques of information gathering
9.3. CONTENTS
9.3.1. Role of Systems Analyst in Information System Development
9.3.2 Systems Analysis Vs Systems Designing
9.2.3. Stages of Systems Analysis
9.3.4. Methods of Information Gathering for Systems Analysis
9.3.5. Information Gathering Tools
9.3.6 Techniques of Information Gathering
9.3.1. ROLE OF SYSTEMS ANALYST IN INFORMATION SYSTEM DEVELOPMENT
The system analyst is considered to be the key member of any system
development project. Hence, the system analyst is identified with the following roles
in the system development project.
Archaeologist and Scribe
The role of system analyst as archaeologist and scribe in the system
development project is to uncover the details and to document business policies of
the company that has ordered the proposed Computerized MIS. The Business policy
of the organization is considered to be an important aspect in designing the
Information System. Because, the level of transparency that is to be adapted with
regard to ‘Information reach’ over different levels of the Management is a key aspect
while designing the information architecture of the organization.
87
Innovator
As an innovator of the system development project, the system analyst should
be able to separate the symptoms of the user’s problem from the true causes. With
the knowledge on computer technology the system analyst should guide the user
about the different possibilities of usage of computers. In this role the system
analyst of the system development project is expected to define the requirement of
the users as well as the requirement of the system. This has done by gathering the
data, facts and opinion of the users of the system. Thus, the system analyst as an
innovator should be able to come up with the detailed and complete specification of
the Computerized MIS proposed for the organization.
Mediator
As stated earlier the system development project will normally have the roles of
different set of people, who often disagree with one another. Hence, a system
analyst should act as the mediator between different set of conflicting ideas
regarding the system development project.
Project Leader
The system analyst are often found to be the person who is more experienced
than the many of the programmers working on the project for developing the
Computerized Information System for the specific organization. Hence, the system
analyst need qualities more than drawing the system design that include people
skills to interview the users, application knowledge of computer technology etc.
Attributes of the System Analyst
In order to perform the role of system analyst, a person in the Information
System development team should have the following attributes.
1. Knowledge about the Organizations
The system analyst should be able to recognize the specific pattern of
functioning of the organization that has ordered the product ‘Computerized MIS’.
This can be possible only when the analyst understands the various ways by which
different organizations functions. He must be able to understand the structure and
the relationship between different departments in an organization. Normally
computerized MIS are built for the tasks associated with accounting, marketing,
and materials management and hence an analyst is required to have basic
knowledge about these aspects of the different organizations.
2. Knowledge of Computer Systems and Software
The system analyst should have widespread knowledge about different
systems and applications software available for the project and his programmers. In
this context, it should be noted that in-depth expertise in programming languages
is not required for the system analyst. However, he should be able to identify the
suitable technology for the Information System projects provided to him. Also, the
knowledge about different conceptual ideas related to all the domains in the
computer technology is considered to be very important for a system analyst. In
simple terms a system analyst should be a jack of all domains available in
computer technologies and he need not be master of specific technology like
88
generated in the systems analysis process namely conceptual system design is used
as the input details for drawing the physical system designing in SDLC. The output
generated at the end of the system designing process will help the programmers to
write the software coding associated with the Information system development
project. Also, based on the physical system design formulated, the data base design
is decided by the database designers or administrators. Thus, to explain the
relationship between system analyst, system designers and programmers the
following points are given.
1) On small Information System design projects, the roles of analysis, design,
and programming are combined. Thus, it is possible to find out the single
person doing all these roles.
2) On relatively complex project the single person possibly an analyst performs
the roles of systems analysis and system designing. However, the
programming works will be taken care by the group of programmers
monitored by the project leaders. Under these circumstances mostly the
system analyst will act as the project leaders. This will enable them to
correspond and guide the programmers in more efficient manner.
3) In large and complex Information System development projects different
individuals will perform the role of systems analysis and system designing.
The programming work associated with the project might get out-sourced or it
will be performed by large number of programmers controlled in different
groups by appropriate team leaders. However, periodic review meeting will be
conducted among different team leaders, system designers and system
analyst associated with the project. The senior most system analyst will act as
project leader for the projects of this sort. This type of Information system
Development projects will go through each and every step of the SDLC in
meticulous and in cautious manner because of risk associated with the
project. This type of Information System Development projects will be taken
up only in large Information system development agencies.
9.3.3. STAGES OF SYSTEMS ANALYSIS
The process of systems analysis is carried out in different stages, when the
creation of new application requires long project duration. Some of the basic
activities performed in the system analysis are the extension of the feasibility study
carried out in the System Development Life Cycle (SDLC). This practically mean
that the same information and its gathering methods adapted for feasibility study
will be incorporated for meeting the information requirements of the systems
analysis. The information collected for systems analysis will be utilized to represent
the system in diagrammatic form with the help of tools for systems analysis. Thus,
it should be noted that the systems analysis is not a preliminary study. It is an in-
depth study of end user information needs that produces functional requirements
that are used as the basis for the design of a new information system. Traditionally
Systems analysis involves a detailed study of,
1) The information needs of the organization.
2) Information needs of end users.
90
words. With closed response question the user is given a set of answer form which
to select respondents select from the same set of possible answers. The advantages
disadvantages of structured and unstructured interviews are given above.
Selecting Interviewees
Before conducting an interview the right person to be interviewed is to be
identified. Conducting interview takes time. Thus it is not possible to use this
method to gather all the information needed in an investigation. Moreover the
analyst should verify the data gathered by using one of the other data collection
methods. Since a limited number of persons will be selected for interviewing,
analyst should be careful to include those people who have information that will not
be collected through some other method. During the early stages of study, when
analyst is determining projects feasibility, interviews are often limited to
management or supervisory personnel.
Conducting the Interview
Conducting interview is a scientific process. Interviewing is an art as well as a
skill that comes through practice and knowledge of the system under investigation.
Those who are successful and effective in using interviewing methods during
system studies agree on the steps analyst should follow. To ensure the interview is
useful, the analyst should remember the following points. (i) Make an appointment
with the interviewees in advance. Interviews are successful only if carefully planned
and arranged in advance and (ii) Prepare for the thoroughness’ of the topic of
interviews and prepare an appropriate set of questions that should be answered
during the planned conversations. While conducting the interview, the following
points to be observed.
1. Proper introduction of the interviewer to the interviewee is a very essential.
2. Outline of the topic should be provided to the interviewee based on the
nature of the project.
3. The Interview should be started with basic questions that can establish
the framework within which the rest of the interview will be conducted
4. The note taking process of the interviewer should not distract the
interviewee.
5. Drawing conclusions during the process of interview should be avoided
and if necessary further clarifications can be sought with the interviewee.
6. Monopolizing the conversation should be avoided
7. Attentive listening is very essential for the interviewer
8. Emotional involvement in the interview process should be avoided.
9. Rushing through the interview should be avoided
10. Proper distinction between facts and opinions should be made.
11. Summarizing the information gathered during the interview in logical and
in systematic manner is very essential.
95
Questionnaire
Questionnaire provides a useful alternative to interviews. Questionnaire
should be designed carefully for maximum effectiveness. Questionnaire may be the
only feasible way for the analyst contact a large number of persons about various
aspects of the system. When large multi department studies are being conducted,
questionnaires can be distributed to all appropriate persons to collect facts about
the system.
There are some disadvantages to questionnaires also. Even though
distribution may be made to a large number of individuals, full response is very
rare. Follow-up questionnaire may be needed to encourage individuals to respond
but even then over all response rates are not uncommon. Many people take their
time in completing questionnaires they receive about the system study may not be
their not be their top priorities. When large groups can be gathered together for the
sole purpose of completing a questionnaire, response rates may be improved.
Selecting Questionnaire Forms
Development and distribution of questionnaire is very expensive. Therefore
time invested in developing a questionnaire should be used wisely. The format and
content of the questionnaire is all-important in collect in meaningful facts.
Open Ended Questionnaire
Like interviews, questionnaire can be open-ended. Open –ended forms are
good for finding out about feelings, opinions and general experience. They are also
useful for exploring a process or problem. For example, an analyst, using
questionnaire to study credit verification methods in a retail sales environment
would probably collect the most useful information from an open question. The
open format provides ample opportunity for the representative to describe the
reasons for their ideas. Some people however, find it easier to check one of a set of
prepared responses than to think for them.
Closed Questionnaire
The closed questionnaire method limits the possible responses of the recipient.
Through careful wording of question, the analyst can control the frame of reference.
This format is the best method for eliciting factual information. It also force
individuals to take a stand on opinion about important issues and some common
forms of closed questionnaire response are yes/no, agree/disagree.
Steps in Questionnaire Development
Good questionnaire are not developed quickly. They take time and handwork.
Good questionnaire are not just written they are designed. Careful thought coupled
with pre-testing of both the format and the questions are the basis of meaningful
data collection through questionnaires. While developing a questionnaire the
following points should be observed.
96
1. Identifying the facts need to be collected and the persons best qualified to
provide it.
2. Proper identification of the questionnaire to be used like Open ended or
closed - ended.
3. Developing a pool of questions to be included in the questionnaire.
4. Examining the questionnaire for flaws and defects such as unnecessary
questions, misinterpreted questions, question that cannot be possibly
answered, questions that are interpreted differently, questions that do not
adequate response, improper ordering questions etc
5. Possibility of conducting the pilot study based on the questionnaire on a
small group.
6. Analyzing the responses of the pretest to ensure that the intended data
analysis can be carried out with the type of data collected
Observation
Observation means seeing through any system directly. Thus observation
provides first hand information about how activities are carried out. Interviewing
a person either directly or through questionnaire or reading about a particular
through documents and fills may not give complete and correct information. Where
as direct observation by a person can give correct information. Because
interviewing requires recalling memory, often memory fails to give correct and
complete information. Reading a document or file gives what should happen. But
observation Actually tells what exactly happens.
Observer should watch for minor details in systems and he should also watch
for other unusual happenings. These observations will help to analyze the system
thoroughly to identify bottlenecks in the system.
For example, the trained observer can pick up important clues such as office
conditions, bottlenecks, and pace of work and methods of work. They are not
gained from casual observation but needs deliberate attention. It is unlikely that
this knowledge can be gained without the conscious co-operative of the person
being observed. The analyst should always arrange to be introduced to the person
and give an explanation of what is going to be done and why, some interviewing
may also be necessary to explain the logic behind some of the operations.
Sampling
When we have voluminous data, it may not be practical to observe each and
every item. So we take a representative sample of the total data with the assumptions
that any resulting information of the sample will hold good for entire volume.
Firm conclusions to the whole set of data can be obtained by randomly
selecting and examining 10% or 15% data. For example, if it is found from random
sampling that 10% of invoices have a value between Rs. 1000 and Rs 1500, then it
can be inferred that the same proportion will exist in the whole lot of invoices.
97
In order to achieve the above assumption we follow some of the methods such as.
a) Every nth data of the volume.
b) Every data which occurs after a constant interval.
The sampling technique can be used to reveal volumes, frequencies, trends
or rations. It is also commonly used as a method of work measurement.
Record Searching
The main purpose of record search is to establish quantitative information,
volumes, frequency trends, and rations. It will also help to establish how much
reliance can be put on the estimates given by the staff or the management of
department. It may also indicate whether the departmental objectives are being
achieved and whether information needed for decision-making is available when
required. It may disclose exceptions and additions to the information obtained from
interviews such as documents not mentioned, or received and filed without any
action. The following points may be observed while searching the records.
1. The collected information must be accurate and it should be related to the
current practices.
2. The information should be crosschecked wherever possible. For example, a
procedure, which is laid down in the manual may not be followed in
practice. This has to be verified.
3. The information collected must be relevant to the analysis begin made.
9.4. REVISION POINTS
1) Roles and responsibilities of system analysis in Information System
Development.
2) Different stages in System Analysis
3) Various sources of information gathering and techniques.
9.5. INTEXT QUESTIONS
1) Differentiate system analysis and system designing.
2) What are the stages of system analysis? Explain each stage in detail.
3) Explain about the methods of Information gathering for systems analysis.
4) Explain the need and different types of investigation.
9.6. SUMMARY
System analyst is the key member of any system development project. Hence,
he plays many roles in the development of the project. Moreover, system analyst is
a person who is more experienced than any, working on the project. He should also
have a wide knowledge about different systems and application software available
for the project.
9.7. TERMINAL EXERCISES
Define the following:
a. System analysis; b. Project reader; c. Interpersonal;
d. Systems designing; e. on-site observation; f. Sampling;
g. Skill questionnaire
98
LESSON – 10
SYSTEM PLANNING FOR INFORMATION SYSTEMS
10.1. INTRODUCTION
The value of planning is well-understood fact. The Companies with strategic
planning approach tend to achieve better results than companies that do not, yet
many organizations do not plan or do it poorly. An information system with
computer application is a complex project and therefore needs an overall plan to
guide its initial development and subsequent change. The plan describes the
structure and content of the proposed information system and how it is to be
developed. Since all projects within the plan cannot be developed and implemented
concurrently, priorities must be set for implementation in the planning. Also, it
should be noted that information resources available in every organization contrary
to other resources. However, the intangible nature of the information resources
make it so complex and to tough to understand. Thus, in the organizations where
there exists scope for hectic activities with higher level of dynamism, there are more
opportunities for information system applications. Even it is possible to state that
in such organizations the wastage of various resources can be minimized with
Information Systems application. Therefore it is mandatory for such organizations
to go in for Information Systems applications with well-defined plan and
appropriate allocation. The master plan once developed for Information System
application does not remain constant, as it requires updating as when
developments occur.
Normally, the organizations strategic planning will have the basis for
Information System planning and this is considered to be the fundamental aspect
of Information Systems planning. Thus, it is very essential to align MIS strategy of
the organization with its organizational strategy. However, achieving this alignment
is just not an ordinary task and once achieved successfully will result big success.
For example, think about the popularity of ATM banking in India, Initially not all
the banking systems were having ATM’s. Now a stage has been reached in the
market, where the bank cannot survive without ATM facility. There exist different
approaches for the organizations to organizing and supervise its information system
planning effort. Normally, the Chief Information Officer (CIO) of the organization will
take up the responsibility for MIS planning.
The Information System Plan for an organization is reviewed and approved
based on the difference, the proposed system can make with the existing set of
activities. The priorities for implementation are set based on the functions being
served and the degree of high level support provided. “In some companies, the
review is performed by information systems steering committee composed of
executives from major functional areas plus the information systems executive. The
steering committee reviews and approves the master development plan and also
periodically reviews progress against the plan,” (Gordon, 1983). The completed
information system plan will be given to the organization’s top-level committee for
review, approval and integration with other plans.
100
The planning cycle for information systems should go in coherence with the
cycle for the organization plan. This will enable the information system plan to get
easily merged with the overall organizational plan. The information system plan
should establish the information roles of various organizational units. Also, it
should ensure the coordination and integration required by different functions
planning for new or revised information resources, and the planning cycle.
10.2. OBJECTIVES
After studying this lesson you will able to
understand the process of information system planning
get familiar with information system goals, objectives and architecture
be clear with forecast of development affecting the plan
learn to maintain the master plan
10.3. CONTENTS
10.3.1. Contents of Information System Master Plan
10.3.2. Maintenance of the Master Plan
10.3.1. CONTENTS OF INFORMATION SYSTEM MASTER PLAN
The master plan for the Information Systems will have two components namely
(i) a long-range plan for three to five years (or longer) and (ii) a short-range plan for
one year. The plan will act as basis for resource allocation and control. The long-
range portion of the plan provides general guidelines for direction, and the short-
range portion of the plan provides a basis for specific accountability with regard to
operational and financial performance of the organization. The master development
plan for Information Systems establishes a framework for all detailed information
system planning. In general, it consists of four major sections:
1) Goals, objectives, and architecture of the proposed Information Systems.
2) List of current Information Processing capabilities
3) Forecast of developments that can affect the plan
4) The specific plan for immediate action.
However, the above stated details will not be organized in the same logical
manner in a particular Information Systems plans. Each of these sections are
described in more detailed manner as follows.
Information system Goals, Objectives and Architecture
This section of the plan provides the following descriptions
1) Goals, objectives, and strategies of the organization.
2) External environment like industry, government regulations, customers,
and suppliers who are likely to influence the system in one-way or
another.
3) Internal constraints of the organization such as management philosophy.
4) Possible business risks and potential consequences associated with the
project.
5) Proposed Information system’s overall goals, objectives, and strategies
6) Tentative Architecture of the Information System
101
Thus, it should be noted that the plan for the Information Systems should be
made within the context of overall organizational goals, policy, objectives,
strategies, and plans. Also, there should be policy, goals, objectives, strategies, and
plans for the proposed Information System. The general goals provide guidelines for
the directions in which the information system project should be directed. The
objectives should be more specific and should be explicitly stated in, so that
performance or nonperformance may be measured. For example, a goal might be
“to provide information system resources on a timely basis to all organizational
units.” An objective might be “to get periodic financial reports not later than 36
hours after the end of the period.”
The information architecture provided in the plan might define major
categories of information and the major information subsystems or applications.
The overall architecture or structure of the information system could provide a
framework for detailed planning for further course of action.
Current Capabilities
The organization might be using the computers and other peripheral already
for some of its operations. Hence, the details of the current status of an information
system will find its place in the master plan of the proposed Information System. It
includes such items as the following:
1. Existing details of:
a. Usable Hardware
b. Generalized Software like system software, database management system,
etc.)
c. Application Systems available if any.
d. Computer Personnel.
2. Analysis of:
a. Operational expense
b. Hardware Utilization
c. Software Utilization
d. Personnel Utilization
3. Status of other projects in process
4. Assessment of strengths and weaknesses with regard to Information system
applications.
The purpose of identifying the existing details of inventory is to clearly identify
the current status of all systems. Accordingly, application may be classified by:
1) Major functional system like as accounting, marketing, human resources etc.
2) Organizational strategies (e.g., provide online ordering by customers)
3) Need for maintenance or revision:
a. Application which are working reasonably well
b. Applications which require revises implementation or improvement
c. Applications which need to be substantially revised or completely
replaced by new systems
In the case of personnel, useful classifications might include:
102
to the plan could also be caused due to the regulations from the government and
actions from the competitors.
10.4. REVISION POINTS
1) Some of the organizations wasting its various resources, which can be
minimized by implementing Information Systems.
2) Organizations should go for Information Systems
10.5. INTEXT QUESTIONS
1) Differentiate the terms ‘planning for information systems’ and ‘information
system plan’.
2) Briefly explain the contents of information system master plan.
3) What do you mean by the current capabilities of information systems?
Explain.
4) What is a specific plan for Information systems? Differentiate it with master
plan.
10.6. SUMMARY
Normally in organization, we can really know the value of planning to achieve
better results when compared with companies that do not plan properly. In
organization strategic planning will have the basis for information system planning
which is considered to be the fundamental for information system planning.
10.7. TERMINAL EXERCISES
1) Define: a. Strategic planning; b. Master plan
c. System software; d. application software
2) List-out the four major sections of master development plan for Information
Systems establishment.
10.8. SUPPLEMENTARY MATERIALS
“Management Information Systems: New approaches to organization and
Technology,” 5e Kenneth C. Landon, Jane. P. Landon.
10.9. ASSIGNMENT QUESTIONS
1) Explain about ‘forecast of development’ affecting the information systems
master plan.
2) Explain about maintenance of information systems master plan.
10.10. SUGGESTED READING / REFERENCE BOOK
Gordan. B. Davis (1984). Management Information Systems: Conceptual
foundations, Structure and Development. Singapore: McGraw-Hill Book co.
10.11. LEARNING ACTIVITIES
You have been assigned to develop Information systems for your organization.
In order to fulfill the organization requirements plan the system and sale-systems
for long-term as well as short-term. Prepare a flow diagram
10.12. KEY WORDS
Dynamism, FOSS, Hectic, ERP, SAP.
105
LESSON – 11
SYSTEM DESIGN AND IMPLEMENTATION
11.1. INTRODUCTION
Systems analysis represents the fourth step of the SDLC. In other words it can
be explained that the systems analysis sets the objectives for the proposed
information system. However, system design will be the next step immediately
following systems analysis, consisting of details specifying; how the objectives set
forth at the analysis stage are accomplished.
11.2. OBJECTIVES
After studying this lesson, you will be able to
understand the system designing process in a detailed manner
describe the tools for system designing
know the types of forms
analyse the design consideration to be maintained in the form
understand the four major forms of conversion, to the newly computerized
MIS from the manual system
know about the technical, operational and economic evaluation of the new
system
know the two ways of providing protection and security
comprehend the various aspects of security considerations
11.3. CONTENTS
11.3.1. System Designing Process and its Sub-Components
11.3.2. User Interface Design
11.3.3. Data Design
11.3.4. Process Design
11.3.5. System Specifications
11.3.6. Tools for System Designing
11.3.7. Conversion
11.3.8. Evaluation of System Value
11.3.9. System Dependency and Vulnerability
11.3.10. Environmental Protection.
11.3.1. SYSTEM DESIGNING PROCESS AND ITS SUB-COMPONENTS
In other words the activities corresponding to the ‘system designing’ can be
identified from the fifth step of the System Development Life Cycle (SDLC) shown in
the figure 11.1. Thus, the system design will consist of design activities that
produce system specifications, satisfying the functional requirements developed in
the systems analysis stage.
claims etc. In all these categories of GUI, the data is transformed through forms
and information is obtained through forms. Hence it can be said the forms is a
physical carrier of data as well as information within the computerized MIS. Thus,
form is defined GUI that can be made as a document having constant printed
information and space to add variables information.
TYPES OF FORMS
The three types of forms are (i) Action forms (ii) Records or memory forms and
(iii) Reports.
Any form may be classified as action form, record or report form or some
combination thereof. The information recorded on forms constitute data. The forms
can also be classified as input or output forms depending on their functions in a
data processing environment. Input forms provide information from the
environment to the system. Output forms provide information from the
environment to the system to the environment. Many of the input are also
function forms (e.g., withdrawal from an inventory). More or the output forms are
reports, but some of them may be action forms (e.g., recorders, replenish stock).
The forms may also be classified as single part or multi-part forms. The different
types of forms, its characteristics and the relevant examples are stated in the Table
11.1.
Table 11.1: Details of Forms and its types.
S. Types of Characteristics Examples
No. Forms
1. Action Orders, Instructs, Authorize Purchase Order
Provides the results of certain Display regarding sale
Process. performance of the month.
Capable of getting shared from Requisition Sales Slip, Shop
one system to another. Order, Claim, Time Cards.
words unnecessary forms must be eliminated and if necessary other forms must be
improved.
11.3.7. CONVERSION
Conversion to the new application system will be initiated after all the
programs and procedures have been prepared manually and individually tested.
“Three major activities prepared for actual conversion are acceptance testing, file
building, and user training.” Acceptance testing is the activity where the completed
application software will be compared with its specifications. It verifies to the user
that the system meets performance criteria as well as operational requirements.
The testing includes verification of user inputs, operating and control procedure
and outputs. Hence in acceptance testing the difference between what users
expected and what the system delivers are identified and resolved. The acceptance
test is being developed as part of the system planning.
File building refers to the collection and conversion to the machine-readable
form of all new data required by the application. This is nothing but the installation
of different executable files constituting the developed software. Thus, it can be a
long and tedious process. Normally, some file conversion programs will be employed
if the required data is already in computer readable form. If not, the data must be
gathered, coded and entered into the database. Sufficient time and human resource
should be provided to clean up the data, that is remove inaccuracies and
inconsistencies and make the data complete.
User training may be relatively straight forward or a critical effort and it
depends on the degree to which the new application system affects existing jobs. If
the technique such as job design is used as part of computerized MIS initiative,
training will involve substantial reorientation of the users to their jobs. Hence,
proper user training is considered to be an important factor in overcoming user
resistance to the system.
Though, the training is considered to be the essential requirement to operate
the new system, the new system will be deployed in four different schemas before
its full operational cycle. The deployment of the new system is taken up in four
schemes namely (a) Parallel Conversion (b) Pilot Conversion (c) Phased conversion
and (d) Plunged Conversion. Hence, it should be noted that the training details for
the end users of the Information System is largely influenced by the conversion
scheme followed for the specific Information System. The conversion schemas
stated can be implemented individually or in combination with one another in the
practical implementation process. Figure-11.2. provides the pictorial representation
of the four different conversion schemas discussed.
112
Old System
(a) Parallel
New System
Old System
(b) Pilot
New System
Old System
(d) Plunged
New System
system usage. With many voluntary-use systems, initial use may be very high and
will gradually taper to a steady level once the novelty of the system has worn off.
Another caution is that some application cause subtle changes in the structure and
behaviour of organization in ways that were not anticipated, and these changes
may be difficult to uncover through the simple measures described above.
Technical Evaluation
The questions asked during a technical evaluation are similar to those used
determine whether the application was technically feasible. Some examples are:
Is the data transmission rate enough to handle the data?
Is there sufficient secondary storage to keep the necessary data?
Does the CPU respond to all requests with the specified time period?
When applications are installed, subsequent evaluation may disclose that the
operate ineffectively because the technical capabilities of the hardware or software
cannot support them properly. An on –line real-time operation may be very slow
because computer involved has insufficient capacity to handle the workload. A
communication network may adequately handle the workload but be more costly
than had been anticipated. An another common problem is that transaction
volumes were underestimated. So that secondary storage for on line processing has
inadequate capacity.
Operational Evaluation
Operational evaluation considers whether the input data is properly provided
the output is usable and used appropriately. Evaluation of applications should
examine how well they operate with special reference to input, error rates, timelines
of output and utilization. Some research on utilization of output suggests the need
for periodic evaluation of applications. In a study by Gee, 64 line managers at the
middle level manufacturing companies were interviewed and asked to evaluate
control information items they received as being used substantially or a being
irrelevant or background information of 579 items, 46 percent (267) were
considered to be irrelevant or useful only for background. In a further investigation,
49 middle managers were asked to classify items of control information as vital
(admitting no delay), important (used for reference and delay or inaccuracy
generally not significant), or background (items rarely used). The results from 38.3
items were as follows:
Vital 32%
Important 36%
Background 32%
There is a tendency not to terminate a report once it is started. Even though it
may not be used, there often is a feeling that it might have utility in the future. This
is consistent with the concept of the value of unused information. Various methods
can be used to identify unused reports. They are,
a) Termination of the report to see if anyone asks for it when it does not arrive
b) Periodic review of all reports by a task force.
115
information were lost, are not often thought about. The cost of either event
occurring could be extremely high, and organizations really have no alternative but
to protect their information resources.
11.3.9. SYSTEM DEPENDENCY AND VULNERABILITY
There are many areas in which the thought of existing without the computer is
frightening, as we would simply lose control. The traffic in India controlled by the
computer; hospitals could not function effectively; neither could the railways or the
airlines; the banking system in India would collapse, as would many of the large
companies, whose production lines and processes would be thrown into chaos. The
computer and its servants are assuming a place in society, which their inventors
never imagined. The dangers of dependency are immense, especially dependencies
on machines, which relatively few people, understand. Even computer programmers
and operators do not know how the electronics within the machine function. Of
course, programmers do not need this knowledge to write programs, but it indicates
the string of dependencies that the many groups of people does, of course, lead to
vulnerability of computer system, to fraud, error, misuse and damage.
In recent discussions at the American National Computer Conference in New
York the following areas were highlighted for attention.
1) Control and protection of input and output from error, theft and
modification.
2) Access to computer files
3) Unauthorized use of programmes
4) Unauthorized changes to programmes
5) Physical protection of magnetic files, tape and disc.
6) Adequate controls
7) Auditability.
These are all concerned with the protection of the system themselves, but
there is also a need to protect computer resources from physical damage. The best
auditing and control procedures possible will be of little use if the computer center
is burned down. Hence, the protection and security of computer systems can be
examined at two levels
1) Physical
2) Systems.
Physical security is concerned with
1) Access security is concerned with
2) Fire
3) Theft
4) Power interruptions
5) Sabotage
6) Environmental
Access to Facilities: Access to premises is the starting point, because if access
is difficult or impossible, except for authorized personnel, the possibility of theft or
117
damage is reduced. There are various ways in which access can be controlled
including magnetic card locks, reception areas, security guards etc
Fire: The effects of fire can be guarded against with fireproof premises,
cupboards and security copies of files stored off the premises. Special fire detection
and control systems can be installed which can put the fire out by using a chemical
gas to suffocate the flames. Sprinkler devices can also be used, but water does as
much damage as, if not more damage then, fire.
Theft: Theft is a real hazard, both direct theft of magnetic tapes or discs, and
indirect theft via terminals. The first is controlled by access security, the second by
systems security. There have been a number of cases of staff stealing files and
offering to sell them back.
Power Interruption: Power interruptions caused by power cuts strikes or
installing the appropriate equipment can protect against simple voltage
fluctuations. It is important to remember that RAM files are volatile and will be
affected by power interruption.
Sabotage: Sabotage, though less likely, is nevertheless a threat, terrorists, staff
taking, have sabotaged computer centers.
11.3.10. ENVIRONMENTAL PROTECTION
Even though these threats can be guarded against to some extent 100 percent
security is never possible and so it is essential that every organization has
contingency plans in the event of a serious disruption taking place. Contingency
plans should cover:
1. Copies of files and software
2. Access to data-processing resources
3. Contingency procedures
Copies of files should be made regularly, ideally daily, and these should be
held with copies of software off the premises, preferably in secure premises. Most
banks offer such a service.
Of course, copy files are of limited value if there are no machines to put them
on. It is usual to have an arrangement with another company to borrow their
machine and vice versa. These are known as reciprocal arrangements. Some
organizations are so dependent on computer systems for order taking or control
that they have their own stand-by facilities at another site. With the growth of
distributed systems protection is increased, because if one site is taken out another
site can be used. However important these aspects of security are, the main threats
come from the breaching of systems controls.
Systems Security can be Separated into
1. Data Security
2. File Security
3. Programme Security
4. System design controls
Data Security
Data are vulnerable at three points in the system
118
1. Input
2. Processing
3. Output
Input: when data are input, full records must be kept which show clearly
where the data originated. (i.e.) the prime documents, the person inputting the
data, and where the data are going within the system. For batch systems, batch
controls should be kept: the data, reference number and content are vital items to
be recorded. For interactive systems where data are input direct to the computer,
often with no prime document, the computer must produce a detailed transaction
log.
Processing: During processing, as data are moved around the computer, it is
essential that the controls affected by the move are checked before and after the
move. This calls for additional programming but will ensure the integrity of the
data.
Output: Output controls are associated with files security, but in addition it is
important to ensure that the computer does not provide data to unauthorized
users, either or paper on screen. It is import that every item of data output should
be recorded, showing:
1. What has been the output?
2. To whom it was given? and
3. When?
Even if some unauthorized person gains access, this control procedure should
identify the fault.
File Security
Data are held in the computer as some form of electronic signal in the main
processor, or as a sensitized spot on some magnetic medium external to the
computer. There is always a possibility that the data could be wiped off the file,
over-written, mixed up with other data or simply lost.
There are a variety of engineering devices within the computer to provide a
degree of protection, but the computer cannot foresee human error. It is essential
therefore, that data files are removed at regular intervals and held in a relatively
secure form.
At least two copies of these files should be kept one on the premises and the
other elsewhere, preferably in a bank. The normal procedure is known as
grandfather, father, son which means holding a copy of each files as follows:
1) The last updated file position-son
2) The transactions to reach the last updated file position-son
3) The previous updated file position-father
4) The transactions to reach the previous updated file position-father
5) The previous updated file to previous updated file position-father-
grandfather
If this procedure is followed (usually standard practice), it is possible to
recreate the file position that might be lost or changed by re-running the previous
119
file and transactions. Where batch processing is used, the files should be copied at
the end of each run. When transaction processing is used, the files should be
copied at the end of each run. In transaction processing regular copies have to be
taken on a time basis, i.e hourly, daily, weekly, etc. With copies of the files available
containing the appropriate controls, it is possible to recover from situations which
would be a disaster in most manual systems. However, copies can be checked with
the controls. It has been known for a file to be regenerated from a partially read
security file, thus creating an incomplete file. When files are being changed (file
maintenance) it is important to control the implications of the changes. Basically
four types of action take place:
1) New/insert record
2) Amendment to existing details
3) Display current details
4) Delete record
When a validation program links with a file maintenance system, part of the
controls should be a count of the different types of transaction that are going to
affect the master file. In the main update itself, the program must produce the
following controls:
1) Number of record brought forward:
2) Breakdown of transactions input:
3) Rejections:
4) Total update records: and
5) Number of records carry forward.
In some files, where information other than static information is held, it may
be necessary to expend the controls under each of the categories to show either
absolute values or high values, or in the case of a file where an amendment does
not affect the file structure, the date of the last update.
Programme Security
Programme Security is important. There are three program libraries held on
the computers test library, a temporary library and a load library. Access to and
use of these libraries must be carefully controlled.
The first step is to restrict access to a very number of people. The next step is
for the computer to record and produce a control report for every access to the
program libraries, showing:
1) Who accessed the library.
2) Which programmes they extracted
3) When this report can then be reviewed and, if necessary, questions be
asked.
In addition to controls on library access it is crucial to protect programmes
from unauthorized use. This is difficult if people with authority wish to misuse the
programmes for their own purposes. One of the controls that can be used is to
produce a control system which links to the computer accounts system and shows
for every programme:
120
When a system is designed originally it is a good idea to check with the auditor
how he or she intends to design the audit system so that the required facilities can
be built in. This is not only good sense, but also can save in the audit fees. The
primary requirement will undoubtedly be a clear audit path through the system.
Audit Path
An audit path or trail is a way in which the auditor can check transactions by
leaving control signals as the data proceed through the system, rather like leaving
marks on trees when going through a dense forest.
The ability to select a transaction at random at any point in the system and
trace in either to its entry or exit, or both, is fundamental to effective auditing. This
requires considerable understanding of the way in which computer-based systems
work and the variety of interpretations that can be placed by programmers on
seemingly simple and direct instructions. The responsibility of ensuring that the
systems are auditable rests with the designer, who should insist on the design and
programming standards that are required. Those involved in the programming and
operation of computer systems should be allowed no discretion in interpretation of
such auditing standards. However, such standards should be prepared with a view
to the programming and operational constraints and the general level of machine
efficiency.
The audit system must provide a means for auditing the following aspects:
1. Systems:
a. User needs;
b. Design methods;
c. Project control
d. Testing procedures, and
e. Maintenance procedures.
2. Processing:
a. Organization of transactions;
b. Data entry;
c. Data communications;
d. Processing procedures, and
e. Storage and retrieval of data.
3. Computer Operations:
a. Input/output controls;
b. Library controls;
c. Division of duties;
f. Physical searching procedures, and
d. Stand-by and back-up
Meeting these auditing and security requirement places a burden on the
system designer, but it is a burden he or she must accept if the systems are going
to serve the organization.
11.4. REVISION POINTS
1) System design is the next step immediately following system analysis
122
LESSON - 12
SYSTEMS DEVELOPMENT LIFE CYCLE
12.1. INTRODUCTION
The concept MIS development is aimed at the computer based Information
Systems. The system development and related ideas gains significance with the
proliferation of more personal computers and its increasing pattern of its usage
among the people. Hence, it is imperative to say that the process related to the
creation of Computer Based Information System for existing manual Information
System can be called as System Development. The Information System
Development process is carried out conceptually in three different stages namely
system definition phase, system design phase and system Implementation phase.
These three phases put together can be called as System Development Life Cycle
(SDLC). The typical System Development Life Cycle (SDLC) is shown in the figure-
10, where 3 stages of system development is shown as sequential stages with feed
back.
12.2. OBJECTIVES
After studying this lesson, you will be able to
Know the significance of different stages in Management Information
System Development Life Cycle.
Know the approaches regarding MIS software development.
have an idea about the phases of software testing and also the approaches
regarding software development
12.3. CONTENT
12.3.1. System Development Life Cycle
12.3.1. SYSTEM DEVELOPMENT LIFE CYCLE
The system definition stage is provided in the figure-10 with four activities
namely, 1. Activities related to Proposal Definition 2. Activities related Feasibility
Assessment 3. Activities related to Information Requirement and Analysis.
4. Activities related to Framing Conceptual Design of the System. Similarly, the
system development stage in the System Development Life Cycle is given with four
more activities namely 1. Activities related to Physical system design 2. Activities
related to Physical Database design 3. Activities related to Program Development
and 4. Activities related to procedure development. The third stage of the system
development (i.e.) the Implementation stage of the SDLC is given with three
activities namely; 1. Activities related to Conversion of the newly developed system
2. Activities related to the Operation and Maintenance of the newly created system
and 3. activities like Post audit.
SDLC: System Definition Stage
As stated previously the system definition stage of the SDLC consist of four
different sets of activities and they are mentioned in the figure 12.1 in the top most
block. Following are the functions performed in each of the activities in the
definition stage of the SDLC.
125
1. Proposal Definition
The proposal definition phase is not necessary if the application was defined as
part of information system planning. Otherwise, a simple procedure may be used
for proposal of an application. Proposals may be for entirely new application or for
enhancements to existing applications. (i.e.) The proposal could be for the creation
of new computer based MIS or It could be for the corrections to be carried out in
already existing computerized MIS. Normally the proposal will not be too complex
but it will have justification to proceed with the feasibility analysis. The proposal
will be subjected to the user management approval. The user management will
normally be the steering committee consisting of representative from all the levels of
the management. The proposal once accepted in this stage alone will move to the
next phases of activities in the System Development Life Cycle. Some of the items
that can be normally found in the proposal for the Information System include the
organizational need for or benefit from the proposed infrastructure (Computerized
MIS), Organizational support in terms of budget, sponsor management support etc.
Definition Stage Development Stage Installation and Operation
System. Hence, these types of instructions are given with less reasoning regarding
the purpose of different data and information entry into the system.
3. Computer Operating Personnel: The procedure given for these kinds of
personnel include the general maintenance procedures to be performed by
computer operators and control personnel. Also, these procedures include
instructions for quality assurance, backing up system files, maintaining program
documentation, etc.
4. Training Personnel: This includes a separate training manuals or set of
training screens developed for the implementation stage and subsequent training.
Implementation Stage
The system implementation stage of the SDLC as stated earlier would have
three different set of activities. During this phase of the SDLC the entire software
component of the Information System should be ready in the form of executable file
(.exe) format. Normally, the technocrats like Hardware Engineers and networking
Professionals carry out the activities related to this phase of the SDLC. However,
the users of the system will be involved in phase, because their choices for
appropriate end user computer terminal will be taken into considerations while
installing the physical structures of Information System. This stage of the SDLC is
grouped into four different sets of activities namely 1. Activities related to
conversion 2. Activities related to operation and maintenance 3. Activities related to
post audit.
1. Conversion
Conversion of the new application system will be initiated after all the
programs and procedures have been prepared manually and individually tested.
“Three major activities prepared for actual conversion are acceptance testing, file
building, and user training”. Acceptance testing is the activity where the completed
application software will be compared with its specifications. It verifies to the user
that the system meets performance criteria as well as operational requirements.
The testing includes verification of user inputs, operating and control procedure
and outputs. Hence in acceptance testing the difference between what users
expected and what the system delivers are identified and resolved. The acceptance
test is being developed as part of the system planning.
File building refers to the collection and conversion to the machine-readable
form of all new data required by the application. This is nothing but the installation
of different executable files constituting the developed software. Thus, it can be a
long and tedious process. Normally, some file conversion programs will be employed
if the required data is already in computer readable form. If not, the data must be
gathered, coded and entered into the database. Sufficient time and human resource
should be provided to clean up the data, that is remove inaccuracies and
inconsistencies and make the data complete.
User training may be relatively straight forward or a critical effort and it
depends on the degree to which the new application system affects existing jobs. If
the technique such as job design is used as part of computerized MIS initiative,
132
training will involve substantial reorientation of the users to their jobs. Hence,
proper user training is considered to be an important factor in overcoming user
resistance to the system
2. Operation and Maintenance
When the system appears to be operating without any difficulty it is turned
over to the information processing function. “This often requires not only the
approval by the user stating that the system meets predefined acceptance criteria,
but also approval of the system operations and maintenance groups stating that it
meets standards for documentation and maintainability ” .
Any further changes in the application are handled as maintenance of an
application can be classified into repairs and enhancements. Repairs are required
when incomplete or incorrect coding renders the application defective
enhancements are additions or improvements to the developed software. Normally,
repairs dominate the maintenance activity for the first few months of operation.
Later, most of the maintenance are enhancements. The system developers perform
sometimes maintenance, but often it is responsibility of a separate maintenance
group.
3. Post Audit
The most part of the system development life cycle is a review of the
application after it has been in operation for a period, such as year. An audit team
consisting of representatives from users, development team, maintenance team,
operational executives, and perhaps internal auditing people review the operation of
the system in terms of cost and benefit of the application newly deployed. The post
audit function could bring out the recommendation for dropping, repairing or
enhancing an application and suggestions for improving the development process
on subsequent applications in the organization.
12.4. REVISION POINTS
1) Different stages in system development life cycle.
2) Feasibility assessment including, Technical economic, motivational,
schedulable operable feasibilities.
3) Different set of activities such as, physical system design, physical database
design, programme development and procedure development.
4) System implementation stage activities namely, conversion, operation and
maintenance and post audit.
12.5. INTEXT QUESTIONS
1) Explain SDLC and its relevance.
2) Compare and contrast Conceptual System Design and Physical system
Design.
3) What is a procedure development? Who are different levels of personnel found
to be in need of operational procedure in an MIS Organization?
4) Explain the various set of activities associated with the implementation stage
of the SDLC.
133
12.6. SUMMARY
The system development life cycle is provided with all its different stages.
The system development and related ideas gain more importance with the usage of
personal computers, by increasing the pattern of its usage among the people.
12.7. TERMINAL EXERCISES
1) Define the following:
a. System development life cycle
b. Definition stage in SDLC
c. Feasibility
d. Technical feasibility
e. Economic feasibility
f. Operable feasibility
2) List-Out various activities involved in implementation stage.
12.8. SUPPLEMENTARY MATERIALS
1) Journal of Information and Systems management.
2) Saravana Muthiah, Multimedia University Malaysia (www.dline.info/jism).
12.9. ASSIGNMENT QUESTIONS
1) What is the feasibility assessment of Information Systems Development?
Explain its significance.
2) What are the phases of software testing? Explain the approaches regarding
software development.
12.10. SUGGESTED READINGS / REFERENC BOOK
Gordan.B. Davis (1984). Management Information Systems: Conceptual
foundations, Structure and Development. Singapore: McGraw-Hill Book co.
12.11. LEARNING ACTIVITIES
Plan a new management Information System for your own organisation and
list all the activities. Based on the activities design the system development stage
and different operations.
12.12. KEY WORDS
Architecture
Technocrats
Post audit
Penetration
Enhancing
Conversion
Feasibility
Design
SDLC
Testing.
134
UNIT - IV
LESSON – 13
DECISION SUPPORT SYSTEM
13.1 INTRODUCTION
To succeed in business today, companies need information system that can
support the diverse information and decision–making needs of their managers and
business professional. This lesson will explore in more detail, how this can be
accomplished by decision support system (DSS).Decision support systems are
achieved the popularity in various areas, including business, engineering, the
military, and medicine. They are specifically valuable in circumstances which the
amount of available information is prohibitive for the intuition of an unaided
human decision maker and in which exactness and optimality are of prominence.
DSS can aid individuals’ cognitive deficiencies by combining various sources of
information, providing intelligent access to relevant knowledge, and assisting the
process of structuring decisions. They can also select choice among well-defined
alternatives and form on formal approaches, such as the methods of operations
research, engineering economics, statistics, and decision theory. Proper usage of
decision-making tools increases productivity, efficiency, and electiveness and
allowing them to make optimal choices for technological processes, planning
business operations, competitive advantage logistics, or investments.
13.2 OBJECTIVES
After reading and studying this lesson you should be able to:
Identify the changes taking place in the form and use of decision support in
business.
Understand the DSS concept and how it differs from traditional
management system.
Describers the characteristics and competencies of DSS.
Explain the Components and applications of DSS.
Discuss how databases are used in web.
Recognize how data warehouse differs from database and know the basic
ways to engage in data mining.
13.3 CONTENTS
13.3.1 Decision Making and DSS
13.3.2 Types of Problems
13.3.3 Decision Support System (DSS)
13.3.4 Characteristics and Capabilities of DSS
13.3.5 Components of DSS
13.3.6 DSS Benefits
13.3.7 DSS Applications
13.3.8 Data Warehouses
13.3.9 Data Warehouse Characteristics
13.3.10 Components of a Data Warehouse
135
These Characteristics and Capabilities of DSS permit decision makers to make better, more
reliable decision in a timely manner and they are provided by the major DSS components.
consistent Graphical User Interface (GUI) structure for most decision support
system. The main product of an interaction with a DSS is insight. As managers are
their users often who are not trained fully in computer, DSSs need to be prepared
with intuitive and easy-to-use interfaces. These interfaces aid in model
The Knowledge-Based Management Subsystem can act as an independent
component or support any of the other subsystems. It provides intelligence to
augment the decision maker’s own. It can be interconnected with the organization’s
knowledge repository (part of the Knowledge Management System - KMS) which is
called the Organizational Knowledge Base. Knowledge can be provided through Web
servers. Many artificial intelligence (AI) methods have been applied in Web
development system such as Java and are easy to incorporate into the other DSS
components. A DSS must comprise the three major components: DBMS, MBMS
and user interface.
The Data Management Subsystem (DBMS) is composed of the subsequent
elements: • DSS database, • SBMS, • Data directory, • Query facility.
The Query Facility permits to access manipulate and query data. It receives
requests for data from other DSS components, determines how the results can be
filled, frames the detailed requests and returns the results to the issuer of the
request. It contains a special query language (SQL). Significant functions of a DSS
query system are selection and manipulation operations.
The Data Directory is a catalog of all data in a database. It encompasses data
definitions and its main function is to response questions about the availability of
data items, their source and their exact meaning. It supports the addition of
entries, deletion of entries and retrieval of information about specific objects.
Data Security is required by confidentiality laws. In some circumstances,
unauthorized access prolongs to modifying data in place or abolishing it. Data must
be secured from unauthorized access through security measures such is user ID
and Password protection. It is vital to identify exactly who has right of entry to and
why they have access to specific sets of data and to what extent an individual is
allowed to change the data in the system. Data can be encrypted so that even in
case of unauthorized access the viewed data is scrambled an unintelligible.
13.3.6 DSS BENEFITS
DSS Improves personal efficiency and Speed up the process of decision
making. Increases organizational control and helps automate managerial processes.
It encourages exploration and discovery on the part of the decision maker and
facilitates interpersonal communication .Further; it promotes learning or training
and reveals new approaches to thinking about the problem space.DSS creates a
competitive advantage over competition.
13.3.7 DSS APPLICATIONS
A growing number of organizations implement software applications that
produce decision automatically and in real time. Following are some of the example
of how DSS are used for various purposes.
142
DSS is to find the proper pricing to maximize the overall revenue from selling seats
for each flight.
Financial Services
Manually deciding how much money to loan to which customer at what
interest rate could delay the decision process to a point of losing the potential
customer. Loan applicants are reluctant to wait more than a day or even a few
hours for the bank’s response. Automated decision aid can produce offers within
minutes after a customer enters data. The DSS combines this data with data
retrieved from credit history databases and preprogrammed rule models to create a
rapid response.
Typical application areas of DSSs are management and planning in business,
food production and retailing health care, the military, and any area in which
management will encounter complex decision situations. Decision support systems
are typically used for strategic and tactical decisions faced by upper-level
management—decisions with a reasonably low frequency and high potential
consequences—in which the time taken for thinking through and modeling the
problem pays of generously in the long run.
13.3.8 DATA WAREHOUSES
In a large company obtaining concise, reliable information about current
operations and changes across the entire company would be difficult because data
are often maintained in separate systems such as sales manufacturing, or
accounting. Some of the data you needed might be found in the sales system and
other pieces in manufacturing system. Many of these systems use outdated data
management technologies or file systems where information is difficult for user to
access. You might have to spend more amount of time in locating and gathering the
data you needed or you may be forced to make decision based on incomplete
knowledge. Data warehouse address the problems in finding data about past
events. The term Data Warehouse was coined by Bill Inmon in 1990, which he
defined in the following way: "A warehouse is a subject-oriented, integrated, time-
variant and non-volatile collection of data in support of management's decision
making process". He defined the terms in the sentence as follows:
Subject Oriented: Data that gives information’s about a particular subject
instead of about a company's ongoing operations.
Integrated: Data that is gathered into the data warehouse from a variety of
sources and merged into a coherent whole
Time-variant: All data in the data warehouse is identified with a particular
time period.
Non-volatile: Data is stable in a data warehouse. More data is added but data
is never removed.
This enables management to gain a consistent picture of the business. It is a
single, complete and consistent store of data obtained from a variety of different
144
sources made available to end users in what they can understand and use in a
business context. It can be
Used for decision Support
Used to manage and control business
Used by managers and end-users to understand the business and make
judgments
A data warehouses a database that stores current and historical data of
potential interest to decision makers throughout the company. The data originated
in many core operational transaction systems, such as system for sales, customer
accounts and manufacturing and may include data from web site transaction. The
data warehouse consolidates and standardized information from different
operational databases so that the information can be used across the enterprise for
management analysis and decision making.
13.3.9 DATA WAREHOUSE CHARACTERISTICS
The term data warehouse has been coined to describe data storage that has
the following characteristics:
The storage capacity is very large.
The data are accumulated by adding new records, as opposed to being kept
current by updating existing records with new information.
The data are easily retrievable.
The data are used solely for decision making, not for use in the firm’s daily
operations.
Differences between a data warehouse and a database
A data warehouse is a repository of information collected from multiple
sources, over a history of time, stored under a unified schema, and used for data
analysis and decision support; whereas a database, is a collection of interrelated
data that represents the current status of the stored data. There could be multiple
heterogeneous databases where the schema of one database may not agree with the
schema of another. A database system supports ad-hoc query and on-line
transaction processing
Data Mart
Companies often build enterprise-wide data warehouse, where a central data
warehouse serves the entire organization, or they create smaller, decentralized
warehouses called data marts. A data mart is a subset of a data warehouse in
which a summarized or highly focused portion of the organization’s data is placed
in a separate database for specific population of users. For example, a company
might develop marketing and sales data marts to deal with customer information. A
data mart typically focuses on a single subject area or line of business, so it usually
can be constructed more rapidly and at lower cost than an enterprise-wide data
warehouse. Data mart is used in the following situation:
Extremely urgent user requirement
The absence of a budget for a full scale data warehouse strategy
145
The disadvantage of using the Top Down approach is that it requires more
time and initial investment. The business has to wait for the EDW to be
implemented followed by building the data marts before which they can access their
reports.
Bottom Up Approach
The bottom up approach suggested by Ralph Kimball is an incremental
approach to build a data warehouse. Here we build the data marts separately at
different points of time as and when the specific subject area requirements are
clear. The data marts are integrated or combined together to form a data
warehouse. Separate data marts are combined through the use of conformed
dimensions and conformed facts. A conformed dimension and a conformed fact is
one that can be shared across data marts.
A Conformed dimension has consistent dimension keys, consistent attribute
names and consistent values across separate data marts. The conformed dimension
means exact same thing with every fact table it is joined.
A Conformed fact has the same definition of measures, same dimensions
joined to it and at the same granularity across data marts.
The bottom up approach helps us incrementally build the warehouse by
developing and integrating data marts as and when the requirements are clear. We
don’t have to wait for knowing the overall requirements of the warehouse. We
should implement the bottom up approach when
1) We have initial cost and time constraints.
2) The complete warehouse requirements are not clear. We have clarity to only
one data mart.
The advantage of using the Bottom Up approach is that they do not require
high initial costs and have a faster implementation time; hence the business can
start using the marts much earlier as compared to the top-down approach.
The disadvantages of using the Bottom Up approach are that it stores data
in the de normalized format; hence there would be high space usage for detailed
data. We have a tendency of not keeping detailed data in this approach hence losing
out on advantage of having detail data .i.e. flexibility to easily cater to future
requirements.
Bottom up approach is more realistic but the complexity of the integration
may become a serious obstacle.
Design considerations
To be a successful data warehouse designer must adopt a holistic approach
that is considering all data warehouse components as parts of a single complex
system, and take into account all possible data sources and all known usage
requirements.
Most successful data warehouses that meet these requirements have these
common characteristics:
Are based on a dimensional model
148
For example, Virgin Mobile Australia uses a data warehouse and data mining
to increase customers’ loyalty and roll out new services. The data warehouse
consolidates data from its enterprise system, customer relationship management
system and customer billing system in massive database. Data mining has enabled
management to determine the demographic profile of new customers and relate it to
the handsets they purchased. It has also helped management evaluated the
performance of each store and point-of-sale campaigns, consumer reactions to new
products and services, customer attrition rates and the revenue generated by each
customer.
Harrah’s Entertainment, the second-largest gambling company in its industry,
uses data mining to identify its most profitable customers and generate more
revenue from them. The company continually analyzes data about its customers
gathered when people play its slot machines or use Harrah’s casinos and hotels.
Harrah’s marketing department uses this information to build a detailed gambling
profile, based on a particular customer’s ongoing value to the company. For
instance, data mining lets Harrah’s know the favorite gaming experience of a
regular customer at one of its Midwest riverboat casinos, along with that person’s
preferences for room accommodations, restaurants, and entertainment. This
information guides management decisions about how to cultivate the most
profitable customers, encourage those customers to spend more, and attract more
customers with high revenue-generating potential. Business intelligence has
improved Harrah’s profits so much that it has become the centerpiece of the firm’s
business strategy.
Predictive analytics use data mining techniques, historical data, and
assumptions about future conditions to predict outcomes of events, such as the
probability a customer will respond to an offer or purchase a specific product. For
example, the U.S. division of The Body Shop International plc used predictive
analytics with its database of catalog, Web, and retail store customers to identify
customers who were more likely to make catalog purchases. That information
helped the company build a more precise and targeted mailing list for its catalogs,
improving the response rate for catalog mailings and catalog revenues.
Text Mining and Web Mining Business intelligence tools deal primarily with
data that have been structured in databases and files. However, unstructured data,
most in the form of text files, is believed to account for over 80 percent of an
organization’s useful information. E-mail, memos, call center transcripts, survey
responses, legal cases, patent descriptions, and service reports are all valuable for
finding patterns and trends that will help employees make better business
decisions. Text mining tools are now available to help businesses analyze these
data. These tools are able to extract key elements from large unstructured data
sets, discover patterns and relationships, and summarize the information.
Businesses might turn to text mining to analyze transcripts of calls to customer
service centers to identify major service and repair issues. Text mining is a
relatively new technology, but what’s really new are the myriad ways in which
unstructured data are being generated by consumers and the business uses for
these data. The Interactive Session on Technology explores some of these business
applications of text mining. The Web is another rich source of valuable information,
151
some of which can now be mined for patterns, trends, and insights into customer
behavior. The discovery and analysis of useful patterns and information from the
World Wide Web is called Web mining. Businesses might turn to Web mining to
help them understand customer behavior, evaluate the effectiveness of a particular
Web site, or quantify the success of a marketing campaign. For instance, marketers
use Google Trends and Google Insights for Search services, which track the
popularity of various words and phrases used in Google search queries, to learn
what people are interested in and what they are interested in buying.
13.4. REVISION POINTS
1) Decisions are classified according to the type: Unstructured Decisions,
Structured Decisions and Semi structured Decisions.
2) A decision support system is a computer system at the management level of
an organization that combines data, sophisticated analytical tools, and user-
friendly software to support semi-structured and unstructured decision
making.
3) Components of a DSS include a database of data used for query and analysis;
software with models, data mining, and other analytical tools and user
interface.
4) A data warehouse is a database that stores current and historical data of
potential interest to decision makers throughout the company.
5) Data mining helps the user by discovering the relationships and presenting
them in an understandable way so that the relationships may provide the
basis for decision making.
6) The types of information obtained from data mining include associations,
sequences, classifications, clusters and forecasts.
13.5. INTEXT QUESTIONS
1) What is DSS?
2) Define data warehouse
3) What is data mart?
4) Discuss the difference between MIS and DSS.
13.6. SUMMARY
Decision Support system (DSS) offers a significant potential for assisting and
improving management decision making.DSS support for the intelligent and design
phase of decision making can led to better choices with more predictable
outcomes.DSS are interactive, computer-based information systems that use DSS
software and a model base and database to provide information tailored to support
semi structured and unstructured decision faced by individual managers. They are
designed to use a decision make’s own insights and judgment in an ad hoc,
interactive, analytical modeling process leading to specific decision. Typical
application areas of DSSs are management and planning in business, food
production and retailing health care, the military, and any area in which
management will encounter complex decision situations. A data warehouse is a
database that stores current and historical data of potential interest to decision
makers throughout the company. Companies often build enterprise-wide data
warehouse, where a central data warehouse serves the entire organization, or they
152
create smaller, decentralized warehouses called data marts. A data mart is a subset
of a data warehouse in which a summarized or highly focused portion of the
organization’s data is placed in a separate database for specific population of users
.A term that is often used in conjunction with data warehousing and the data mart
is data mining. Data mining is the process of finding relationship in data that are
unknown to the user.
13.7. TERMINAL EXERCISES
1) Describe DSS and identify the characteristics of a DSS.
2) What are the differences among structure, semi-structured and unstructured
decision making? Give an example of each.
3) Describe the application of DSS.
4) Explain the components of DSS.
5) What is the difference between data warehouse and a database?
6) Discuss the components of data warehouse.
7) What are the some areas of business other than marketing that would require
data warehouses?
8) Explain how data mining is used in financial data analysis.
9) Discuss in detail about any four data mining applications
13.8. SUPPLEMENTARY MATERIALS
1) http://study.com/academy/lesson/data-warehousing-and-data-mining-
information-for-business-intelligence.html
2) http://www.tutorialspoint.com/dwh/dwh_overview.htm
3) http://www.cs.ubbcluj.ro
13.9. ASSIGNMENTS
Bank officers use DSSs to decide to whom to extend and to whom to deny
credit. Universities might use DSSs to decide which applicant to admit and which
applicant to reject. Would you agree to use DSSs for such decisions without human
intervention?
13.3.10. REFERENCES
1) Power, D. J. (2002). Decision support systems : concepts and resources for
managers. Westport, Conn., Quorum Books.
2) James A O’Brien, George M.Marakas and Ramesh Behl, “Management
Information System”, Ninthedition, Tata McGraw Hill Education Private
Limited, New Delhi.,2010
3) Kenneth C.Laudon and Jane P.Laudon, “Management Information System”
Tenth Edition, PHI Learning Private limited, New Delhi,2008.,
4) Effy Oz, “Management Information System”, Fifth Edition, Thomas Course
Technology,2007
13.3.11. LEARNING ACTIVITIES
Prepare a one-page report on the career you intend to pursue. Give at least
four examples of activities involved in such a career that call for problem solving.
Explain which problem solving is structured and which is unstructured.
153
LESSON – 14
BUSINESS INTELLIGENCE AND ANALYTICS
14.1. INTRODUCTION
Business intelligence (BI) has two different connotations related to the use of
the term intelligence. The main is the human intelligence capacity applied in
business affairs/activities less frequently. Intelligence of Corporate is a novel field of
the investigation of the application of human cognitive and artificial intelligence (AI)
technologies to the organization and decision support in various business problems
.The second associates to the intelligence as information valued for its money and
relevance. It is expert knowledge, technologies and information competent in the
management of organizational and specific business. Hence, in this logic, business
intelligences a wide category of applications and technologies for collecting,
providing access to, and investigating data for the purpose of assisting corporate
users to make better business decisions. The term implies having a complete
knowledge of all of the factors that affect the business. It is imperative that firms
have an in depth knowledge about factors such as the customers, competitors,
economic environment, business partners and internal processes to make effective
and quality decisions in business. To make these kinds of decisions a specialized
field of business intelligence known as competitive intelligence concentrates solely
on the external competitive environment. Information is collected on the actions of
competitors and decisions are ended based on this information. In modern
businesses vast amount of data are available due to increasing standards,
automation, and technologies. Data warehouse technologies have set up
repositories to store this data. OLAP (Online-Analytical processing) reporting
technologies have allowed quicker generation of new reports which investigate the
data. Business intelligence has now become the art of scrutinizing through large
amounts of data, extracting relevant information, and changing that information
into knowledge upon which actions can be taken. This lesson explores the
concepts, components, emergence, Benefits of a Business Intelligence and Analytics
Strategy and various BI techniques.
14.2. OBJECTIVE
After reading and studying this lesson you should be able to:
Understand the concepts and components of business intelligence.
Describe how online analytical processing can meet key information needs
of managers.
Explain the applications of Business Intelligence(BI) and Business Analytics
(BA).
14.3. CONTENTS
14.3.1 Business Intelligence.
14.3.2 Definitions.
14.3.3 What does BI do?
14.3.4 External Databases.
155
Figure 14.1 shows how BI works. The firm’s operational databases keep track
of the transactions generated by running the business. These databases feed data
to the data warehouse. Managers uses business intelligence tools to find patterns
and meaning in the data. Managers then act on what they have learned from
analyzing the data by making more informed and intelligent business decisions.
The important business intelligence tool is OLAP (Online Analytical Processing)
leeves (WWW.ASKJEEVES.COM) are just a few of the popular search engine sites
and portals available to users to search Web-accessible information. The sites are
organized in a manner that makes them easy to use. Searches can be simple or use
advanced features to look for complex combinations of key words. There is no
charge for the use of these searches.
online sales vs retail? What is complex is getting a straight answer because bits and
pieces of the truth are scattered about. Web services is a powerful agent that can
dissolve barriers among your enterprise and enrich them with analytic BI
functionality that enables a broader audience of users to run on-the-spot queries
and seamlessly “drill through” to various systems.
advanced analytics features; it deals with complicated problems and vast amount of
data. Mohammad AtwahAlma'aitah (2013).
Data Warehouse
Huge collections of historical data that can be processed to support
management decision making. It is the techniques to store very large amount of
historical data in database, especially for business intelligence.
Data Mart
Collections of archival data that is part of a data warehouse usually focusing
on one aspect of the organization such as sales of a family of products or daily
revenues in geographic region.
Data Mining
A term that is often used in conjunction with data warehousing and the data
mart is data mining. Data mining is the process of finding relationships in data that
are unknown to the user. It is analogous to a miner panning for gold in a mountain
stream. Data mining helps the user by discovering the relationships and presenting
them in an understandable way so that the relationship may provide the basis for
decision making.
Business Intelligence Vendors
It is important to remember that business intelligence and analytics are
products defined by technology vendors and consulting firms. They consist of
hardware and software suites sold primarily by large system vendors to very large
Fortune 500 firms. The largest five providers of these products are SAP, Oracle,
IBM, SAS Institute, and Microsoft (see Table 2.1). Microsoft’s products are aimed at
small to medium size firms, and they are based on desktop tools familiar to
employees (such as Excel spreadsheet software), Microsoft SharePoint collaboration
tools, and Microsoft SQL Server database software. The size of the American BI and
BA marketplace in 2010 is estimated to be $10.5 billion and growing at over 20%
annually (Gartner, 2010). This makes business intelligence and business analytics
one of the fastest-growing and largest segments in the U.S. software market.
Table 14.1 Market Leaders and Share For The Top Business Intelligence Vendors
The Business Intelligence Environment
Figure 14.6 gives an overview of a business intelligence environment,
highlighting the kinds of hardware, software, and management capabilities that the
165
major vendors offer and those firms develop over time. There are six elements in
this business intelligence environment:
Data from the business environment: Businesses must deal with both
structured and unstructured data from many different sources, including
mobile devices and the Internet. The data need to be integrated and
organized so that they can be analyzed and used by human decision
makers.
Business intelligence infrastructure: The underlying foundation of
business intelligence is a powerful database system that captures all the
relevant data to operate the business. The data may be stored in
transactional databases or combined and integrated into an enterprise-data
warehouse or series of interrelated data marts.
Business analytics toolset: A set of software tools are used to analyze data
and produce reports, respond to questions posed by managers, and track
the progress of the business using key indicators of performance.
Managerial users and methods: Business intelligence hardware and
software are only as intelligent as the human beings who use them.
Managers impose order on the analysis of data using a variety of
managerial methods that define strategic business goals and specify how
progress will be measured. These include business performance
management and balanced scorecard approaches focusing on key
performance indicators and industry strategic analyses focusing on changes
in the general business environment, with special attention to competitors.
Without strong senior management oversight, business analytics can
produce a great deal of information, reports, and online screens that focus
on the wrong matters and divert attention from the real issues. You need to
remember that, so far, only humans can ask intelligent questions.
Delivery Platform: MIS, DSS, ESS. The results from business intelligence
and analytics are delivered to managers and employees in a variety of ways,
depending on what they need to know to perform their jobs. MIS, DSS, and
ESS, deliver information and knowledge to different people and levels in the
firm—operational employees, middle managers, and senior executives. In
the past, these systems could not share data and operated as independent
systems. Today, one suite of hardware and software tools in the form of a
business intelligence and analytics package is able to integrate all this
information and bring it to managers’ desktop or mobile platforms.
User Interface: Business people are no longer tied to their desks and
desktops. They often learn quicker from a visual representation of data
than from a dry report with columns and rows of information. Today’s
business analytics software suites emphasize visual techniques such as
dashboards and scorecards. They also are able to deliver reports on
Blackberrys, iPhones, and other mobile handhelds as well as on the firm’s
Web portal. BA software is adding capabilities to post information on
Twitter, Facebook, or internal social media to support decision making in
an online group setting rather than in a face-to-face meeting
166
The logic of the BA process in figure 14.7 is initially based on a question: What
valuable or problem-solving information is locked up in the sources of data that an
organization has available? At each of the three steps that make up the BA process,
additional questions need to be answered, as shown in Figure 14.7. Answering all
these questions requires mining the information out of the data via the three steps
of analysis that comprises the BA process. The analogy of digging in a mine is
appropriate for the BA process because finding new, unique, and valuable
information that can lead to a successful strategy is just as good as finding gold in
a mine.
Many firms routinely undertake BA to solve specific problems, while other
firms undertake BA to explore and discover new knowledge to guide organizational
planning and decision-making to improve business performance.
and advertising variables may be in the form of any of the measurable scales for
data, but they have to meet the three conditions of BA previously mentioned: clear
relevancy to business, an implementable resulting insight, and performance and
value measurement capabilities.
To determine whether observed trends and behavior found in the relationships
of the descriptive analysis of Step 1 actually exist or hold true and can be used to
forecast or predict the future, more advanced analysis is undertaken in Step 2,
Predictive Analytic analysis, of the BA process. There are many methods that can
be used in this step of the BA process. A commonly used methodology is multiple
regression This methodology is ideal for establishing whether a statistical
relationship exists between the predictive variables found in the descriptive
analysis. The relationship might be to show that a dependent variable is
predicatively associated with business value or performance of some kind. For
example, a firm might want to determine which of several promotion efforts
(independent variables measured and represented in the model by dollars in TV
ads, radio ads, personal selling, and/or magazine ads) is most efficient in
generating customer sale dollars (the dependent variable and a measure of
business performance). Care would have to be taken to ensure the multiple
regression models was used in a valid and reliable way, which is why ANOVA and
other statistical confirmatory analyses are used to support the model development.
Exploring a database using advanced statistical procedures to verify and confirm
the best predictive variables is an important part of this step in the BA process.
This answers the questions of what is currently happening and why it happened
between the variables in the model. A single or multiple regression models can
often forecast a trend line into the future. When regression is not practical, other
forecasting methods (exponential smoothing, smoothing averages) can be applied as
predictive analytics to develop needed forecasts of business trends. The
identification of future trends is the main output of Step 2 and the predictive
analytics used to find them. This helps answer the question of what will happen. If
a firm knows where the future lies by forecasting trends as they would in Step 2 of
the BA process, it can then take advantage of any possible opportunities predicted
in that future state.
In Step 3, Prescriptive Analytics analysis, operations research methodologies
can be used to optimally allocate a firm’s limited resources to take best advantage
of the opportunities it found in the predicted future trends. Limits on human,
technology, and financial resources prevent any firm from going after all
opportunities they may have available at any one time. Using prescriptive analytics
allows the firm to allocate limited resources to optimally achieve objectives as fully
as possible. For example, linear programming (a constrained optimization
methodology) has been used to maximize the profit in the design of supply chains
(Paksoy et al., 2013). This third step in the BA process answers the question of how
best to allocate and manage decision-making in the future.
170
workstations to make this strategy work. This may not be adequate for Fortune 500
firms needing a global networking solution. Regardless of which strategy your firm
adopts, all BI and BA systems lock the firm into a set of vendors and switching is very
costly. Once you train thousands of employees across the world on using a particular
set of tools, it is extremely difficult to switch. When you adopt these systems, you are
in essence taking in a new partner. The marketplace is very competitive and given to
hyperbole. One BI vendor claims “[Our tools] bring together a portfolio of services,
software, hardware and partner technologies to create business intelligence solutions.
By connecting intelligence across your company, you gain a competitive advantage for
creating new business opportunities.” As a manager, you will have to critically evaluate
such claims, understand exactly how these systems could improve your business, and
determine whether the expenditures are worth the benefits.
14.3.11. BENEFITS OF A BUSINESS INTELLIGENCE AND ANALYTICS STRATEGY
A business intelligence (BI) and analytics strategy empowers employees with
the precise information at the right time. As results insightful business knowledge
with the capability to expect change and unlock new opportunities. When a
thorough understanding of business and technical requirements for BI is in place
higher revenue will be generated per employee High performing companies are50
percent more likely to practice analytic information strategically
14.3.12. BI VS BA
The table 14.3 shows the difference between business intelligence and
business analytics.
Table 14.3 : BA vs BI
172
LESSON – 15
EXECUTIVE INFORMATION SYSTEM AND EXECUTIVE SUPPORT
SYSTEM
15.1. INTRODUCTION
Executive information system is a computer based system that assists the
information that is required by the various top executives. It provides very fast
access to the timely information and also offers the direct access to the different
management reports. Just as executives have always had to cope with operations,
strategy, financial planning and people, now they are going to have to deal with
information technology. Top management, which some years ago was shielded from
information technology, cannot afford to be so any longer. One type of system that
helps top managers with strategic, unstructured decision making is executive
information systems (EIS).DSS mainly assist in planning tasks, but the EIS the
powerful tool vital feature is to support the control activities. An executive who
practices an EIS has a greater capability to evaluate all aspects of the company’s
operations and to seek out problems and opportunities. ESS is a reporting software
tool that allows you to turn your organization's data into useful summarized
reports. These reports are generally used by executive level managers, for quick
access to reports coming from all company levels and departments such as billing,
cost accounting, staffing, scheduling, and more. Purpose and Features of EIS,
Characteristics and Components of EIS, Critical Success factor of DSS/EIS, ESS
Model, Dashboards and Balanced Scorecard Systems were discussed below.
15.2. OBJECTIVES
After reading and studying this lesson you should be able to:
Understand the concept of Executive Information system (EIS).
Describers the characteristics and competencies of EIS.
Discuss the critical success factor of EIS.
Explain the role of Executive Support System(ESS)
Discussed the model of ESS.
15.3. CONTENTS
15.3.1 Purpose and Features of EIS.
15.3.2 Characteristics of EIS.
15.3.3 Components of EIS
15.3.4 Critical Success factor of DSS/EIS.
15.3.5 ESS.
15.3.6 ESS Model.
15.3.7 Relationship of Systems to one Another.
15.3.8 Dashboards and Balanced Scorecard Systems
15.3.1 PURPOSE OF EIS
The primary purpose of an Executive Information System (EIS) is to help
managerial learning about business, its work processes and interaction with the
175
external environment. Informed managers can ask better questions and make
better decisions. Vandenbosch and Huff (1992) from the University of Western
Ontario found that Canadian organizations adapting an EIS achieved better
business results if their EIS stimulated managerial learning. Organizations with an
EIS designed to maintain managers' "mental models" were less effective than
organizations with an EIS designed to build or enhance managers' knowledge.
Learning further about system behavior and how numerous system inputs and
actions interrelate will let managers to make more proactive changes to make long-
term improvement.
A secondary purpose for an EIS is to permit timely access to information.
Managers can obtain all of this information in an EIS through traditional methods.
However, the resources and time needed to manually compile information in a wide
range of formats, and in response to ever fluctuating and ever more definite
questions usually inhibit managers from obtaining this information. By the time a
useful report can be compiled, the strategic issues facing the manager have
changed, and the report is never fully utilized. Timely access also influences
learning. When a manager obtains the answer to a question, that answer typically
sparks other related questions in the manager's mind. If those questions can be
posed immediately, and the next answer retrieved, the learning cycle continues
unbroken. Using traditional methods, by the time the answer is produced, the
context of the question may be lost, and the learning cycle will not continue. (Floyd
Kelly.,n.d)
Definition
An executive information system (EIS) is a decision support system (DSS) used
to support senior executives in the decision-making. It ensures this by granting
easy access to significant data needed to achieve strategic goals in firms. An EIS
generally features graphical displays on an easy-to-use interface. Executive
information systems can be practiced in many different types of organizations to
monitor the performance, identify the opportunities and problems of the enterprise.
Features of EIS
Fig 15.1: Common Features of EIS
An EIS is a set of computer-based tools with features such as color graphics,
touch screens commands, and natural-language interfaces, that help managers to
176
uses an EIS that provides instantaneous access to all managers about company-
wide information.
Finally, as corporations around the world try to "achieve more with less",
managers searching for tools that reduce bureaucratic waste and operating costs.
The Manitoba Public Insurance Corporation reduced its operating costs by using
Before the system was installed, the company used a mainframe to determine at
insurance rates. Unfortunately, each time there was a rate change, considerable
portions of the software had to the rewritten. Today, the company relies on an EIS
to make these changes automatically and provide managers with current
information; this has resulted in significant cost savings. The EIS also does 'what-
if" analysis, helping managers to be proactive in their decision making. Some
popular EIS packages are Commander-EIS, SAS/EIS-Express, IRI software and EIS
Toolkit. Table 3.1 lists some popular EIS packages.
Table 3.1 : Some Popular EIS Packages and their Operating Systems
Package Vendor Operating System
Commander EIS Comshare Windows,OS/2,UNIX
SASIEIS Package SAS institute OS/2, UNIX
IRI Software Information Resources, Inc. MS-DOS
Lightship Pilot Software Windows,OS/2
EIS Toolkit MicroStrategy Windows
Source: James A o’Brien et al.,(2010)
15.3.2. CHARACTERISTICS OF AN EIS
DSS and EIS have many functions in common, including "what-if" analysis,
risk analysis, and graphical analysis. In addition to these, an EIS has two special
functions
Derived-information function.
Drill-down function.
Derived Information
Derived information is gleaned from existing data with the primary purpose of
identifying the cause or the source of a given problem. For example, when a
manager is informed the sales in Region A have fallen by 30%, the information
simply identifies the presence of a problem: it does not indicate the cause of the
problem. The derived-information function in an EIS identifies what and the why of
information and assists managers with further data analysis so that the cause of a
drop in sales can be determined.
Drill-Down
Drill-down is the location and retrieval of data at whatever level of detail is
desired by the user .For example, a human resource manager may want to know
the total number of employees working in Division A (summary data) and a
breakdown of employees in sales, and administration (more detailed data) in that
division. For example, managers in the state of Wisconsin's health insurance office
can drill down for specific information about a health claim or even about the
179
databases and relational databases. This system results into difficulty in data
location and retrieval. Data warehousing overcomes this difficulty.
Data mart:-It is usually a customized database as per the requirements of a
specific type of users. They are created from data warehouses .for creating a data
mart relevant data are extracted from data warehouses and are earmarked for
specific users. EIS data marts contains those data which are relevant for executives
for strategic management that involves strategic planning and strategic control,
Data are kept in precise form and whenever details of any issue are required, these
are mined from data warehouses. .
Data mining:-It is an activity which involves finding relevant data from data
warehouse. It discovers various patterns which are followed by available data
automatically.
EIS Software: EIS software is in dedicated from that is used for data
manipulation from database.
Personal productivity software:-it is general purpose software that anyone
can use to develop his own application. EIS use them to provide status information
about organizational performance.
Prewritten EIS Software:- It is designed to meet the information needs of
executives Some prewritten EIS software contains external information in the form
of industry trend, competition analysis, proposed legislation changes etc.
Customized EIS Software: - If an organization does not want to use
prewritten software, it can develop EIS software on its own according to its specific
requirements.
The basic software needed for a typical EIS includes four components:
Text base software. The most common form of text are probably documents;
Database. Heterogeneous databases residing on a range of vendor specific
and open computer platforms help executives access both internal and
external data;
Graphic base. Graphics can turn volumes of text and statistics into visual
information for executives
Model base. The EIS models contain routine and special statistical,
financial, and other Quantitative analysis.
This may be in the form of report and graphics. These may be either through
hard copy or screen display. The report remains brief because executives require so
many reports in a single day and if these reports are not brief these ay not be
handled effectively by the executives. These reports are called summary reports.
15.3.4. CRITICAL SUCCESS FACTORS FOR DSS/EIS
Critical success factor(CSFs) for DSS/EIS are those that significantly
increase the chances of successfully using and implementing these technologies. A
brief summary of these factors are listed below:
Top management commitment
Availability of accurate and reliable data
181
product price, which is found in venture analysis. The market executive can
evaluate pricing as related to competition along with the relationship of product
quality with price charged. In summary, EIS software package enables marketing
executives to manipulate the data by looking for trends, performing audits of the
sales data, and calculating totals, averages, changes, variances, or ratios.
Financial A financial analysis is one of the most important steps to companies
today. The executive needs to use financial ratios and cash flow analysis to
estimate the trends and make capital investment decisions. An EIS is a
responsibility-oriented approach that integrates planning or budgeting with control
of performance reporting, and it can be extremely helpful to finance executives.
Basically, EIS focuses on accountability of financial performance and it recognizes
the importance of cost standards and flexible budgeting in developing the quality of
information provided for all executive levels.
15.3.5. EXECUTIVE SUPPORT SYSTEM (ESS)
Executive Support System (ESS) is a comprehensive support system that gives
beyond EIS to comprise communication, Office automation, analysis support and
intelligence. EIS assists only the top executives; it does slight to improve
coordination and control except through the indirect effect of focusing attention
throughout the enterprises on the executive’s “critical success factors”. It is only
meant to make the executive understand where the organization is today.ESS has
the ability to drill down, moving from a piece of summary data to lower and lower
levels of detail. The ability to drill down is useful not only senior executives but also
to employees at lower levels of the firm who need to analyze data. OLAP tools for
analyzing large databases provide capability.
A major challenge of executive support systems has been to integrate data
from systems designed for very different purposes so that senior executives can
review organizational performance from a firm-wide perspective. ESS based on such
data can be considered logical extensions of enterprise system functionality.
Executives need a wide range of external data, from current stock
news to competitor information, industry trends, and even projected legislative
action. Through their ESS, many managers have access to news services, financial
market databases, economic information, and whatever other data they may
require.
Contemporary ESS includes tools for modeling and analysis. With only a
minimum of experience, most managers find they can use these tools to create
graphic comparisons of data by time, region, product, price range, and so on. ESS
need to have some facility for environmental scanning. A key information
requirement of managers at the strategic level is the ability to detect signals of
problems in the organizational environment that indicate strategic threats and
opportunities (Walls et al., 1992). The ESS need to be designed so, that both
external and internal sources of information can be used for environmental
scanning purposes.
184
information for other systems. These different types of systems are loosely coupled
in most business firms, but increasingly firms are using new technology to
integrate information that resides in many different systems.
Fig. 15.4
Figure 15.4 Data Visualization’s digital dashboard delivers comprehensive and
accurate information for decision making. The graphical overview of key
performance indicators helps managers’ quickly spot areas that need attention.
Advantages of ESS
Easy for upper level executive to use
Ability to analyze trends
Augmentation of managers' leadership capabilities
Enhance personal thinking and decision-making
Contribution to strategic control flexibility
Enhance organizational competitiveness in the market place
Instruments of change
Increased executive time horizons.
Better reporting system
Improved mental model of business executive
Help improve consensus building and communication
Improve office automation
Reduce time for finding information
Early identification of company performance
Detail examination of critical success factor
Better understanding
Time management
Increased communication capacity and quality
188
Disadvantage of ESS
Functions are limited
Hard to quantify benefits
Executive may encounter information overload
System may become slow
Difficult to keep current data
May lead to less reliable and insecure data
Excessive cost for small company
Main Kinds of Information Systems in Business Are Described Briefly Below
Executive Support Systems
An Executive Support System ("ESS") is designed to help senior management
make strategic decisions. It gathers analyses and summarizes the key internal and
external information used in the business.
A good way to think about an ESS is to imagine the senior management team
in an aircraft cockpit - with the instrument panel showing them the status of all the
key business activities. ESS typically involve lots of data analysis and modeling
tools such as "what-if" analysis to help strategic decision-making.
Management Information Systems
A management information system ("MIS") is mainly concerned with internal
sources of information. MIS usually take data from the transaction processing
systems (see below) and summaries it into a series of management reports.
MIS reports tend to be used by middle management and operational
supervisors.
Decision Support Systems
Decision-support systems ("DSS") are specifically designed to help
management make decisions in situations where there is uncertainty about the
possible outcomes of those decisions. DSS comprise tools and techniques to help
gather relevant information and analyse the options and alternatives. DSS often
involves use of complex spreadsheet and databases to create "what-if" models.
Knowledge Management Systems
Knowledge Management Systems ("KMS") exist to help businesses create and
share information. These are typically used in a business where employees create
new knowledge and expertise - which can then be shared by other people in the
organisation to create further commercial opportunities. Good examples include
firms of lawyers, accountants and management consultants.
KMS are built around systems which allow efficient categorization and
distribution of knowledge. For example, the knowledge itself might be contained in
word processing documents, spreadsheets, PowerPoint presentations. internet
pages or whatever. To share the knowledge, a KMS would use group collaboration
systems such as an intranet.
189
LESSON - 16
EXPERT SYSTEM AND KNOWLEDGE BASE EXPERT SYSTEM
16.1. INTRODUCTION
An Expert system (ES) is a type of application program that makes decisions or
resolves problems in a particular field by using knowledge and analytical rules
defined by experts in that field. A Knowledge-Based System uses the knowledge
provided with to solve problems in a specific domain. Books and manuals have an
incredible amount of knowledge but a human has to read and interpret the
knowledge for it to be used. Taking this into consideration it can be understood
that a human cannot perform a complex problem because of the various
disadvantages he/she might be facing. The disadvantages are unreliable, speed,
and not enough memory capacity would cause a human to make a mistake or be
inefficient. For this circumstance Humans can design Expert systems providing the
human intelligence and knowledge of solving a specified problem. These ES and
KBES systems have underlying rules which they are bound to helping them in
solving complex problems. Adequate information must be fed to the expert system
to make it able to accomplish the different tasks the human would want it to
do.Knowledge-based systems collect the small fragments of human know-how into
a knowledge-base which is used to reason through a problem, using the knowledge
that is appropriate.
16.2. OBJECTIVES
After reading and studying this lesson you should be able to:
Understand the concept of Expert system and knowledge based expert
system
Describers the evolution of expert system.
Explain the Components and applications of expert system.
Explain Knowledge-based system versus Expert system
Discuss types of problems solved by ES.
Explain the benefits of ES
16.3. CONTENTS
16.3.1 Capturing Knowledge: Expert Systems
16.3.2 Purpose of Expert System and Knowledge Base Expert System.
16.3.3 Knowledge-based system versus Expert system
16.3.4 ES Architecture
16.3.5 Components of Expert System.
16.3.6 Prominent Expert System
16.3.7 Types of problems solved by expert systems
16.3.8 Expert System Applications
16.3.9 Benefits of ES.
16.3.10 Disadvantages of ES.
192
decision making in the functional areas. Office automation systems (OAS) such as
airline reservation systems were developed to support office workers. Computers
also were introduced in the manufacturing environment, with applications ranging
from robotics to computer-aided design and manufacturing (CAD/CAM). Additional
increasing computing capabilities and reduced costs justified computerized support
for a growing number of non-routine applications, and decision support systems
were developed to provide computerized support for complex, non-routine
decisions.
Rule-Based Knowledge: Knowledge represented in the fond of rules and statements of fact.
Rules are statements that typically take the form of a premise and a conclusion such as: If
(condition), Then (conclusion).
Knowledge Base
The knowledge base of an expert system contains (1) facts about a specific
subject area (e.g., John is an analyst) and (2) heuristics (rules of thumb) that
express the reasoning procedures of an expert on the subject (e.g., IF John is an
analyst, THEN he needs a workstation).There are many ways that such knowledge
is represented in expert systems. Examples are rule based, frame-based, object-
based, and case-based methods of knowledge representation. See Figure 16.3.
198
Developing an expert system requires input from one or more experts who
have a thorough command of the knowledge base, and one or more knowledge
engineers who can translate the knowledge (as described by the expert) into a set of
rules. A knowledge engineer is similar to a traditional systems analyst but has
special expertise in eliciting information and expertise from other professionals.
The software modules perform inferences on a knowledge base built by an
expert and/or knowledge engineer. This provides expert answers to an end user’s
questions in an interactive process.
Software Resources
An expert system software package contains an inference engine and other
programs for refining knowledge and communication with users. The inference
engine program process the knowledge (such as rules and facts) related to a specific
problem. It then makes associations and inferences resulting in recommended
courses of action for a user. User interface programs for communicating with end
users are also needed, including an explanation program to explain the reasoning
process to a user if requested. Knowledge acquisition programs are not part of an
expert system but are software tools for knowledge base development, as are expert
system shells, which are used for developing expert systems.
Examples for Rule Based and Object-Oriented
The DENDRAL
The DENDRAL is one of the initial systems to cover the domain-specific
knowledge in problem solving. It was established at Stanford in the late 1960’s by
Lindsay. The DENDRAL was planned to be able to recognize the structure of
organic molecules from their chemical molecules. The Number of molecules is large
to be able to refer to books often. The DENDRAL uses the heuristic knowledge
developed by chemical experts to clarify the problem from the structure of the
molecule. DENDRAL was a success in only a few trials and was marketed all over
the world.
The MYCIN
MYCIN was developed by Buchanan and Shortliff in the mid-1970 in Stanford.
MYCIN can be also described as a system which acts like a doctor in a hospital. It
uses expert medical knowledge to diagnose and prescribe treatment for spinal
meningitis and bacterial infections of the blood. MYCIN is the first program which
had the capability to reason with uncertain or incomplete information and provided
clear and logical explanations of its reasoning. szakwani (2007).
16.3.6. PROMINENT EXPERT SYSTEMS
Prominent expert systemslisted by Szakwani(2007) have listed below
Dendral:- analyze mass spectra
Dipmeter:- Advisor analysis of data gathered during oil exploration
Mycin:- diagnose infectious blood diseases and recommend antibiotics (by
Stanford University)
CADUCEUS:- (expert system) blood-borne infectious bacteria
201
decisions that may have many shades of meaning. For example, a man or a woman
can be strong or intelligent.
The rules might include one that says: “If the temperature is cool or cold and
the humidity is low while the outdoor wind is high and the outdoor temperature is
low, raise the heat and humidity in the room.” The computer would combine the
membership function readings in a weighted manner and, using all the rules, raise
and lower the temperature and humidity. Fuzzy logic provides solutions to
problems requiring expertise that is difficult to represent in the form of crisp IF-
THEN rules. In Japan, Sendai’s subway system uses fuzzy logic controls to
accelerate so smoothly that standing passengers need not hold on. Mitsubishi
Heavy Industries in Tokyo has been able to reduce the power consumption of its air
conditioners by 20 percent by implementing control programs in fuzzy logic. The
autofocus device in cameras is only possible because of fuzzy logic. In these
instances, fuzzy logic allows incremental changes in inputs to produce smooth
changes in outputs instead of discontinuous ones, making it useful for consumer
electronics and engineering applications. Management also has found fuzzy logic
useful for decision making and organizational control. A Wall Street firm created a
system that selects companies for potential acquisition, using the language stock
traders understand. A fuzzy logic system has been developed to detect possible
fraud in medical claims submitted by health care providers anywhere in the United
States.
Street firm created a system that selects companies for potential acquisition, using
the language stock traders understand. A fuzzy logic system has been developed to
detect possible fraud in medical claims submitted by health care providers
anywhere in the United States.
16.3.8. EXPERT SYSTEM APPLICATIONS
Using an expert system involves an interactive computer-based session in which
the solution to a problem is explored, with the expert system acting as a consultant
to an end user. The expert system asks questions of the user, searches its knowledge
base for facts and rules or other knowledge, explains its reasoning process when
asked, and gives expert advice to the user in the subject area being explored.
Expert systems are being used for many different types of applications, and
the variety of applications is expected to continue to increase. Expert systems are
being used in many different fields, including medicine, engineering, the physical
sciences, and business. Expert system helps diagnose illnesses, search for
minerals, analyze compounds, recommend repairs, and do financial planning. So
from a strategic business standpoint, expert systems can be and are being used to
improve every step of the product cycle of a business, from finding customers to
shipping products to providing customer service.
Decision management-Systems that appraise situations or consider alternatives and
make recommendations based on criteria supplied during the discovers process:
Loan portfolio analysis.
Insurance underwriting.
Demographic forecasts.
Software debugging.
Medical diagnosis.
Manufacturability studies.
Communications networks.
Information classification.
Suspect identification
Production monitoring.
Chemical testing.
may be too high to offset the benefits expected from some applications. Also, expert
system can’t maintain themselves, that is, they can’t learn from experience but
instead must be taught new knowledge and modified as new expertise is needed to
match developments in their subject areas.
Although there are practical applications for expert system, applications
have been limited and specific because, as discussed, expert systems are narrow in
their domain of knowledge. An amusing example of this is the user who used an
expert system designed to diagnose skin diseases to conclude that his rusty old car
had likely developed measles. Additionally, once some of the novelty had worn off,
most programmers and developers realized the common expert systems were just
more elaborate version of the same decision logic used in most computer programs.
Today, many of the techniques used to develop expert system can now be found in
most complex programs without any fuss about them. The knowledge in an ES is
highly dependent upon the human expert expressing and articulating knowledge in
the form that can be used in a knowledge-base. The lack of human common sense
needed in some decision makings .The creative responses human experts can
respond to in unusual circumstances. Domain experts not always being able to
explain their logic and reasoning
16.4. REVISIONS POINTS
1) An expert system (ES)is a knowledge-based information system that uses its
knowledge about a specific, complex application area to act as an expert
consultant to end users. Expert systems provide answers to questions in a
very specific problem area by making humanlike inferences about knowledge
contained in a specialized knowledge base. They must also be able to explain
their reasoning process and conclusions to a user, so expert systems can
provide decision support to end users in the form of advice from an expert
consultant in a specific problem area.
2) Knowledge based system is the engine which uses such information processes
it in to rules and facts which can be used in archiving a specified goal.
Knowledge-based system is a more general than the expert system
3) The components of an expert system include a knowledge base and software
modules that perform inferences on the knowledge in the knowledge base and
communicate answers to a user's questions.
4) Knowledge base consists of declarative knowledge that are facts about the
domain and procedural knowledge that are heuristic rules from the domain.
5) The strategy used to search through the knowledge base is called inference
engine. Two strategies are commonly used: forward chaining and backward
chaining
6) A knowledge engineer is similar to a traditional systems analyst but has
special expertise in eliciting information and expertise from other
professionals.
7) Fuzzy logic is a rule-based technology that can represent such imprecision by
creating rules that use approximate or subjective values. It can describe a
209
16.9. ASSIGNMENTS
How an expert system could be used to detect probable fraud committed by a
bank employee.
16.10. REFERENCES
1) K.P. Tripathi (2011), “A Review on Knowledge-based Expert System: Concept
and Architecture”, IJCA Special Issue on “Artificial Intelligence Techniques -
Novel Approaches & Practical Applications” AIT, 2011.
2) szakwani (2007), “Expert System and Knowledge Based Systems”,
www.omandev.net/index.php/author/szakwani.
16.11. LEARNING ACTIVITIES
Expert system can distribute expertise. How so?. Discuss in a group.
16.12. KEYWORDS
Expert System.
Fuzzy logic
Inference Engine.
Knowledge based Expert System.
User Interface.
Backward chaining.
Decision Management.
Forward chaining.
Mobile Computing.
Neural Networks
Software Resources.
211
UNIT - V
LESSON – 17
MIS MODEL FOR DIGITAL FIRM
17.1. INTRODUCTION
Today it is widely recognized that information systems knowledge is essential
for managers because most organizations need information systems to survive and
prosper. Information systems can help companies extend their reach to faraway
locations, offer new products and services, reshape jobs and work flows, and
perhaps profoundly change the way they conduct business. Four powerful
worldwide changes have altered the business environment. The first change is the
emergence and strengthening of the global economy. The second change is the
transformation of industrial economies and societies into knowledge- and
information-based service economies. The third is the transformation of the
business enterprise. The fourth is the emergence of the digital firm. These changes
in the business environment and climate pose a number of new challenges to
business firms and their management. BPO started with non-core processes and is
now moving towards more critical applications. It has boomed with call centers and
customer support processes, and now is happening with software development,
Human Resources (HR), Finance and Accounting (F&A), training, payroll, and
procurement. The trend is moving beyond the outsourcing of typical back-office
functions into middle-office functions. BPO is catching up with industries like
medical transcription, animation production, and even disaster recovery
management systems. Moreover, it is not just India or the Philippines that are
booming with BPO. Central & Eastern Europe’s markets are aggressively chasing
near shore outsourcing from Europe. Dimensions of Information Systems,
Contemporary approaches to information system, The Competitive Business
Environment and the Emerging Digital Firm, The Emerging Digital Firm, The Digital
Firm: Electronic Commerce, Electronic Business, and New Digital Relationships,
The Challenge of Information Systems: Key Management Issues, Business Process
Outsourcing (BPO) and Quality Dimension in BPO were discussed below.
17.2. OBJECTIVES
After reading and studying this lesson you should be able to:
Identify the Transformation of Business Enterprise.
Understand the concept of digital firm..
Describers the Emergence of the digital firm.
Explain the Perspective of Information systems.
Discuss how databases are used in w Rise in the Information Economy.
Explain the organization structure of digital firm.
Understand the functions of BPO and Management issues in MIS.
17.3. CONTENTS
17.3.1 Information Systems
212
Empowerment
Time-based competition
more rapidly than traditional firms, giving them more flexibility to survive in
turbulent times. Digital firms offer extraordinary opportunities for more global
organization and management. By digitally enabling and streamlining their work,
digital firms have the potential to achieve unprecedented levels of profitability and
competitiveness.
Figure 17.3 illustrates a digital firm making intensive use of Internet and
digital technology for electronic business. Information can flow seamlessly among
different parts of the company and between the company and external entities—its
customers, suppliers, and business partners. More and more organizations are
moving toward this digital firm vision.
17.3.6. THE DIGITAL FIRM: ELECTRONIC COMMERCE, ELECTRONIC BUSINESS, AND
NEW DIGITAL RELATIONSHIPS
The changes we have just described represent new ways of conducting
business electronically both inside and outside the firm that can ultimately result
in the creation of digital firms. Increasingly, the Internet is providing the underlying
technology for these changes. The Internet can link thousands of organizations into
a single network, creating the foundation for a vast electronic marketplace.
An electronic market is an information system that links together many buyers and
sellers to exchange information, products, services, and payments. Through
computers and networks, these systems function like electronic intermediaries,
with lowered costs for typical marketplace transactions, such as matching buyers
and sellers, establishing prices, ordering goods, and paying bills (Bakos, 1998).
Buyers and sellers can complete purchase and sale transactions digitally,
regardless of their location.
A vast array of goods and services are being advertised, bought, and
exchanged worldwide using the Internet as a global marketplace. Companies are
furiously creating eye-catching electronic brochures, advertisements, product
manuals, and order forms on the World Wide Web. All kinds of products and
services are available on the Web, including fresh flowers, books, real estate,
musical recordings, electronics, and steaks. Even electronic financial trading has
arrived on the Web for stocks, bonds, mutual funds, and other financial
instruments.
Increasingly the Web is being used for business-to-business transactions as
well. For example, airlines can use the Boeing Corporation's Web site to order parts
electronically and check the status of their orders. Altranet Energy Technologies of
Houston operates an on-line marketplace called altranet.com where many different
energy industry suppliers and buyers can meet any time of day or night to trade
natural gas, liquids, electricity, and crude oil in a spot market for immediate
delivery. Participants can select their trading partners, confirm transactions, and
obtain credit and insurance.
The global availability of the Internet for the exchange of transactions between
buyers and sellers has fueled the growth of electronic commerce. Electronic
commerce is the process of buying and selling goods and services electronically
with computerized business transactions using the Internet, networks, and other
digital technologies. It also encompasses activities supporting those market
transactions, such as advertising, marketing, customer support, delivery, and
payment. By replacing manual and paper-based procedures with electronic
alternatives, and by using information flows in new and dynamic ways, electronic
218
commerce can accelerate ordering, delivery, and payment for goods and services
while reducing companies' operating and inventory costs.
The Internet has emerged as the primary technology platform for electronic
commerce. Equally important, Internet technology is facilitating management of the
rest of the business—publishing employee personnel policies, reviewing account
balances and production plans, scheduling plant repairs and maintenance, and
revising design documents. Companies are taking advantage of the connectivity and
ease of use of Internet technology to create internal corporate networks called
intranets that are based on Internet technology. Procter & Gamble set up a private
intranet for employees to publish reports, charts, and their ideas for improving the
company. The number of these private intranets for organizational communication,
collaboration, and coordination is soaring. In this text, we use the term electronic
business to distinguish these uses of Internet and digital technology for the
management and coordination of other business processes from electronic
commerce.
The Window on Organizations showed how Li & Fung allowed its suppliers and
business partners to access portions of its private intranet. Private intranets
extended to authorized users outside the organization are called extranets, and
firms use such networks to coordinate their activities with other firms for electronic
commerce and electronic business.
Examples of Electronic Commerce and Electronic Business
Electronic Commerce
Drugstore.com operates a virtual pharmacy on the Internet selling
prescription medicine and over-the-counter health, beauty, and wellness products.
Customers can input their orders via Drugstore.com's Web site and have their
purchases shipped to them.
Travelocity provides a Web site that can be used by consumers for travel and
vacation planning. Visitors can find out information on airlines, hotels, vacation
packages, and other travel and leisure topics, and they can make airline and hotel
reservations on-line through the Web site.
Milwaukee Electric Tool, a subsidiary of the Atlas Copco AB global industrial
machine tools conglomerate based in Stockholm, created a secure sales extranet
that allows its distributors to search the company's product catalog and order
equipment.
Electronic Business
Roche Bioscience scientists worldwide use an intranet to share research
results and discuss findings. The intranet also provides a company telephone
directory and newsletter.
Texas Instruments uses an intranet to provide employees with a
consolidated report of all of their compensation and benefits, including pension
plans, 401K employee savings plans, and stock purchase plans. Employees can use
charts and modeling tools to see the value of their portfolios and benefits now and
in the future.
219
Dream Works SKG uses an intranet to check the daily status of projects,
including animation objects, and to coordinate movie scenes.
17.3.7 THE CHALLENGE OF INFORMATION SYSTEMS: KEY MANAGEMENT ISSUES
Although information technology is advancing at a blinding pace, there is
nothing easy or mechanical about building and using information systems. There
are five key challenges confronting managers:
The Strategic Business Challenge: Realizing the Digital Firm: How can
businesses use information technology to become competitive, effective, and
digitally enabled? Creating a digital firm and obtaining benefits is a long and
difficult journey for most organizations. Despite heavy information technology
investments, many organizations are not obtaining significant business benefits,
nor are they becoming digitally enabled. The power of computer hardware and
software has grown much more rapidly than the ability of organizations to apply
and use this technology. To fully benefit from information technology, realize
genuine productivity, and take advantage of digital firm capabilities, many
organizations actually need to be redesigned. They will have to make fundamental
changes in organizational behavior, develop new business models, and eliminate
the inefficiencies of outmoded organizational structures. If organizations merely
automate what they are doing today, they are largely missing the potential of
information technology.
The Globalization Challenge: How can firms understand the business and
system requirements of a global economic environment? The rapid growth in
international trade and the emergence of a global economy call for information
systems that can support both producing and selling goods in many different
countries. In the past, each regional office of a multinational corporation focused on
solving its own unique information problems. Given language, cultural, and
political differences among countries, this focus frequently resulted in chaos and
the failure of central management controls. To develop integrated, multinational,
information systems, businesses must develop global hardware, software, and
communications standards; create cross-cultural accounting and reporting
structures (Roche, 1992); and design transnational business processes.
The Information Architecture and Infrastructure Challenge: How can
organizations develop an information architecture and information technology
infrastructure that can support their goals when business conditions and
technologies are changing so rapidly? Meeting the business and technology
challenges of today's digital economy requires redesigning the organization and
building a new information architecture and information technology (IT)
infrastructure.
Information architecture is the particular form that information technology
takes in an organization to achieve selected goals or functions. It is a design for the
business application systems that serve each functional specialty and level of the
organization and the specific ways that they are used by each organization.
As firms move toward digital firm organizations and technologies, information
220
serve you best. There are seven commonly used models, although many businesses
successfully employ multiple models on one site to generate revenue.
Virtual storefront: Sells physical products directly to consumers or
businesses.
Information broker: Provides product pricing and availability information;
generates revenue from advertising or directing buyers to sellers.
Transaction Broker: Processes online sales transactions for fee.
Online Marketplace: Provides digital environment where buyers and sellers
meet
Content Provider: Provides digital content, such as news; revenue from fees
or advertising sales
Online Service Provider: Provides connectivity; revenue from fees,
advertising, or marketing information
Virtual Community: Provides online meeting place for people of similar
interests
Portal: Provides initial point of entry to the Web, along with specialized
content and services
Syndicator: aggregates content or applications to resell as package to third-
party Web sites
17.3.8 BUSINESS PROCESS OUTSOURCING (BPO)
BPO is an important branch and trend of outsourcing that many management
theories and methodologies generated and developed for outsourcing can be applied
to. Many corporations, like Dell, AIG, IBM and Citi Group, have been using BPO
and leveraging the larger scale of outside service providers to cut costs,improve
process quality and speed time to market. Also, many IT service vendors, like IBM,
EDS, Accenture, and SAP, have integrated BPO services into their systems and
models.
17.3.9. QUALITY DIMENSION IN BPO
As a special service provider, BPO service quality is the degree and direction of
variation between the service receiver’s expectations and perceptions. As Kumar
(2004) pointed out “Service excellence has become the basic instinct and real value
differentiator that drives client satisfaction. Operational excellence, product/service
leadership and highly effective client relationship management are keys to assuring
superior service delivery. The service provider must have a clearly defined service
vision in line with outsourcers ’priorities and hones on creating measurable values”
Hongyan Li et al.,(n.d), suggested the following dimensions In each dimension, the
sub-measures are identified based on the nature of BPO service. These criteria
arestrongly acknowledged as some of the main factors leading to BPO success.
Reliability
Reliability is how to manage the outsourcing relationship, assuring the successful
service delivery after the deal is signed and the outsourced process activities are in
operation. Grover et al. (1996) suggested that the success of outsourcing is heavily
dependent on the reliability of the service a service provider provides.
223
effective service recovery from failure is one of the major demands that customers
expect. Using outsourced E-Learning process as an example, other customer
expectations include:
When a break-down happens, an excellent E-Learning service provider
should be able to resolve it promptly;
Specific individuals should be available to provide help on any application
problems.
Conformance
Conformance is the degree to which the design and operation of an application
of service meets its established standards. Although BPO is usually considered
service first, it is actually providing applications to organizations. Any outsourced
business process involves some specifications which are usually restricted by a
contract. The BPO activities should align the outsourcing objectives with the
appropriate contract reviews, performance monitoring and measurement systems.
Therefore, quality BPO service should provide the needed framework for driving the
behavior of the BPO provider towards sustaining the quality level of service required.
The conformance performance in BPO involves how the provider is able to
align his activities with the evolving goals of the client. Only then will the providers’
activities be completely client focused and will add real value. For this to succeed
the client should provide the needed resources for managing the relationship or the
provider will not be able to fulfill his part of the relationship. For example, in the
HR Recruitment process, the governance team should not only control the cycle
time or the cost-per-hire but more importantly, the new-hire efficacy and turnover.
Quality in the recruitment process does not end with the hiring step but would also
measure how the newly hired employee fits the job, and how the selection was
accurate, reliable, and effective. HRRP providers are dedicated to enhancing the
process creating access for their clients to the best of the talents.
Flexibility
Outsourcing, especially in the process of HR-Recruitment, provides flexibility
to the organization’s staffing function (RES (2005)). For example, flexibility reflects
the ability of BPO service provider to adapt to their clients’ seasonal peaks, and
scale to maintain their service metrics, like time-to-fill and cost- per hire, even at
times of talent shortages.
An E-learning process should be able to support both synchronous and
asynchronous learning, accommodate diversity course resources and assessment
tools, etc. Synchronous learning has significant strength in the number of different
applications it can be applied to. Thinking of live E-learning as not solely training.
Assurance and Empathy
Assurance and empathy are both client focused quality criteria. Assurance is
reflected by the knowledge and courtesy of employees and their ability to instill
trust and confidence. Empathy is the degree of individualized attention the service
provider gives its customers. As the quality advantages of BPO service, assurance
and empathy are the critical view organizations gain when they outsource their
225
processes to the provider. In other words, assurance and empathy help improve the
perceived service quality, customer value and customer satisfaction.
In a HRO deal, the buyer and the provider can hold a monthly virtual meeting
between senior managers to measure the each side’s satisfaction. This way, any quality
drop can be more visible at senior levels and more likely to be rapidly resolved. Based
the perspective of assurance and empathy, quality BPO service should support the
increasing dependency between the client and the service provider. A trusted
relationship between BPO service providers and their clients should be built around
open communication, fairness, belief in the mutual benefit and interdependence. In
addition, quality BPO service requires that the service provider has formal systems and
procedures to consistently fulfill the requirements of different customers and deliver
services to the agreed service levels. Moreover, higher levels of quality capability require
that the providers must have quality and performance measures in place to monitor
performance progress and proactively enhance the quality of service they are providing.
Other customer expectations include:
Providing effective customer training and education programs;
Sharing work practices and problem solving approaches with their clients;
Deploying more staff to improving the functions of the system;
Helping customer in strategic planning and setting proper expectations;
Detailed fee-for services, no hidden costs, etc.
Security
In BPO, the outsourced business process often interacts with other business
processes of the customer, or intervene important or confidential business
information. BPO service has to guarantee the security of the customer business.
Concretely, the quality of security should be analyzed from the following aspects:
Confidential data and information;
Security auditing;
Encryption and anti-virus protection;
Secure physical environment.
Industry Structure
The growth of BPO in India can be classified into four distinct phases:
The First Wave: Company Owned Units Pioneered BPO in India
Company owned units such as American Express, General Electric (GE),
Citibank, and AOL etc. triggered the trend of outsourcing back office operations and
call centre services to India.
Since then several banks, insurance companies, airlines and manufacturing
companies have set up back office service centers in India.
The Second Wave: Venture Funded New Companies
Over the last few years, a number of experienced professionals have set up
start-up operations in India. Generally such start-ups have been funded by venture
capital funds.
226
is shifting towards that of enhancing the competitiveness of BPO buyers, the value
of the technology driving BPO is increasing.
17.7. TERMINAL EXERCISES
1) What are the dimensions of information system?
2) Describe the capabilities of digital Firm. Why are digital firms so powerful?
3) List and describe why information systems are so important for business today.
4) What are the major managerial and organizational challenges posed by
electronic business and electronic commerce?
5) How has Internet technology changed value propositions and business models?
6) What is electronic commerce? How has electronic commerce changed
consumer retailing and business-to-business transactions?
17.8. SUPPLEMENTARY MATERIALS
1) Hongyan Li et al., (n.d), “Improving Quality in Business Process Outsourcing
through Technology” Source: http://www.kenexa.com/Solutions/Recruitment
ProcessOutsourcing.
2) BPO Excellence. 2006. How to make BPO sustainable and the role of
technology in achieving this. SAP Seminar June.
3) Erlanger, L. 2006. Business process outsourcing: putting IT in the director’s
chair. Infor World 27 Feb.
17.9. ASSIGNMENTS
List and describe important types of m-commerce services and applications
17.10. REFERENCES
1) James A O’Brien, George M.Marakas and Ramesh Behl, “Management
Information System”, Ninth edition, Tata McGraw Hill Education Private
Limited, New Delhi., 2010.
2) Kenneth C. Laudon and Jane P. Laudon, “Management Information System”.
Tenth Edition, PHI Learning Private limited, New Delhi, 2008.,
3) PricewaterhouseCoopers,” The evolution of BPO in India”, April2005.
17.11. LEARNING ACTIVITIES
How does internet change consumer and supplier relationships?
17.12. KEYWORDS
Digital Firm.
Globalization
Technical Approach
Behavioral Approach
Virtual Community Information System.
Business Process outsourcing
E-commerce
E-business
Conformance.
230
LESSON – 18
ORGANIZATION STRUCTURE FOR DIGITAL FIRM
18.1. INTRODUCTION
Computers are changing every aspect of our lives from entertainment to
shopping, from the work we do and where we do it, to how we communicate with
friends and relatives. Even though we are still hearing negative news about the dot-
com bubble from the late 1990s through 2001, the death of the Internet has been
greatly exaggerated. Not only is it alive and well, but thriving. The difference
between then and now is that many of the companies went bust primarily because
of poor business planning or simply because their product wasn't viable to begin
with. As you can see from the opening vignette in the text, many companies are
remodeling their businesses and information systems with the Internet in mind.
This chapter gives you an overview of many of the subjects we'll touch on in
this course. It will help you understand how information technology is being used
by many businesses worldwide to increase operational efficiency, improves effective
management, save money, and create better relationships between suppliers and
customers.
18.2. OBJECTIVES
After reading and studying this lesson you should be able to:
Understand the traditional organisation and its characteristics.
Understanding the need for a shift in culture in managing the firm.
Assess the impact of the Internet and Internet technology on business and
government.
Comprehending the impact that information systems and
telecommunication networks have had on working culture, business
processes and employees within the firm.
18.3. CONTENTS
18.3.1 Digital Firm
18.3.2 Paradigm Shift to Digital Firm
18.3.3 Comparison between Conventional Design Vs. Digital Firm
18.3.4 E-Communication
18.3.5 E-collaboration
18.3.6 Real Time Enterprise
18.3.1 DIGITAL FIRM
There has been a tremendous growth in expenditure in information
technology over the past two decades. Companies have invested in information
systems and have come to rely on functionality, reliability and availability of these
systems to fulfill business processes effectively. Within the same period of time
there has also been a tendency to increase connectivity within the organisation
through the use of local and wide area networks. More over the availability of cheap
communication networks and the Internet has prompted connectivity among the
231
competitors. Market and business risks have increased. Then differentiating factors
in manufacturing process and products are no longer competitive advantage. What
is critically important is service to the customer and customer satisfaction.
Customer satisfaction and high level customer service is possible using knowledge
based proactive management systems. These transformations have made
conventional organisation design obsolete. The basis of conventional organisation
design is command and control which is now collaborates and control. This change
has affected the organisation structure, scope of operations, reporting mechanisms,
work practices, workflows, and business processes at large. The comparison
between conventional organisation design and Digital Firm is summarized in Table
18.1.
18.3.3. COMPARISON BETWEEN CONVENTIONAL ORGANIZATION DESIGN VS.
DIGITAL FIRM
Table 18.1 Comparison between Conventional organization Design Vs. Digital Firm
Conventional Organization Design Digital Firm
achieving MIS goals. Having discussed so much good about Digital Firm, its
management has some challenges to meet information needs arising due to global
operations of the business into a comprehensive MIS.
To achieve the said benefits of Digital Firm it is necessary to redesign the
organisation to realize the benefits of digital firm. The organisation structure should
lean and flat. Get rid of rigid established infrastructure such as branch office, zonal
office. Allow people to work from anywhere. Automate processes after re-
engineering to cut down process cycle time.
Another challenge is to convert domestic process design to work for
international process, where integration of multinational information systems using
different communication standards, country specific accounting practices, and laws
of security are to be adhered strictly.
Internet and networking technology has thrown another challenge to enlarge
the scope of organization where customers and vendors become part of the
organisation. This technology offers a solution to communicate, coordinate, and
collaborate with customers, vendors and business partners. This is just not a
technical change in business operations but a cultural change in the mindset of
managers and workers to look beyond the conventional organisation. It means
changing the organisation behavior to take competitive advantage of the Digital
technology. The last but not least important, is the challenge to organize and
implement information architecture and information technology platforms,
considering multiple locations and multiple
Content provider
Web designer
Content designer
Web developer/programmer
Web administrator
Web master controls the website inflow/outflow, content management and
regulation of the traffic. The role is similar to DBA in RDBMS environment. Web
designer conceptualizes and visualizes the requirement of the parties and creates a
web design, which is attractive, useful and easy to handle. He plays a role of an
architect and an interior designer of the website. Web developer/programmer writes
web pages using HTML, DHTML, XML, CGI script and other tools. They are also
involved in program writing for transaction processing, information processing,
providing links to other sites, writing interfaces for connectivity to other databases
and to create text, images and a multimedia input to the site. These people are
subject experts and are key people in making a website a grand success. They have
to write contents of the website looking into the needs of the target website visitors.
The contents should address the needs of the users of the website. The content
designers give website layout icons, positioning and display ideas to deliver the
contents to the viewer’s immediately. They provide input in terms of aesthetics,
colours, navigating through different information layers, and so on.
Web administrator maintains the website. He is a troubleshooter. In case of
any problem, web administrator is the first contact point of users/viewers to solve
their difficulties. The job is to keep the website very responsive and keep contents
latest and up-to-date. Web administrator is responsible to make viewers analysis in
terms of visits to website, areas visited and business generated. A Digital Firm
structure model is given in Fig. 18.3.
All buying and selling does not succeed through E-commerce. The products
and services, which are standard in nature, and customer does not have a great
need of interaction with seller, are best suited for E-commerce. E-commerce culture
is mostly virtual and impersonal. E-commerce site must create confidence in the
buyer showing competitive prices, performance assurance and post sale support.
Faster processing in every step and covering entire buying and selling cycle are very
much essential. The look and feel of E-commerce website should be customer
friendly and attractive. Finally, security and reliability of information, transactions,
and order fulfillment is an absolute necessity.
18.3.4. E-COMMUNICATION
In E-business world, E-communication system is a backbone of all processes
whose role is to share information by messages or store information to download on
access by the customer. This is done through many applications and systems. Most
popular and widely used messaging system is e-mail and voice -mail. Through
these systems both parties communicate on ongoing basis. It provides facilities to
store, delete and search mails supporting the reference need of the user. This
system is popular when one to one communication is needed. When there is a need
of communication in real time, systems available are voice conference, Video
conferencing and electronic meeting systems. Voice conferencing is conducted on
telephone network using speaker phones or networked PCs with Internet telephone
connectivity. Video conferencing provides capabilities of video and audio for
participants situated at different locations. Video conferencing also becomes an
interacting and effective communication system when it has a feature of white
boarding and document sharing. In electronic meeting system, participants sit in a
meeting room with networked PCs and online screen projector to discuss the
meeting agenda. PC network is chosen for communication and access databases
and processing and projecting on the screen for common viewing .this system is
useful to solve some problems, and communication within small groups.
Another E-Communication system which is a kind of offline is known as web
publishing. web publishing uses websites and portals for storing documents,
catalogues, drawings, pictures and so on for sharing. Such information is stored on
documents. In this system, a user searches, navigates, selects and downloads
documents for self-use. Web publishing is popular research organisations,
educational bodies, government organisations, and large business and commercial
bodies. These organisations have large information set and document to share with
community.
E-communication systems are capable of sending messages, documents, and
files in any format over Internet. The communication could be online in offline mode
and online in real time mode. All E-communication systems have sufficient
safeguards, which make them secured for use. Internet and web technologies are
used for forming different interest groups to communicate and share the
information. These groups are popularly known as ‘user groups’ who have common
interest in subject, technology or tool, and come together with the objective of
239
Ware tools handle communication between stages, trigger process of that stage,
support member to perform, and secure the completed task and hands it over to
the next stage. Group Ware tools work best where work is to be performed step by
step. Another popular application is electronic document processing. For example,
in project management, contracts are created and finalized between a customer or a
vendor and the organisation. Such contract has a number of sections like technical,
commercial, legal, performance and obligation and so on. These documents are
prepared step by step by different experts in the organisation. In other words,
contract document preparation work flows from stage to stage in segment towards
the goal of publication.
Work Group Application
Work Group Application differs from workflow to the extent that in workflow a
process or transaction is handled while in workgroup the members of the group
share a common database and perform their respective roles to achieve some
common goals. The concept of a work group is that a set of information has a
multiple use and the concerned users draw this information to perform their role.
Members of the work group are in a network and use GroupWare tools to
communicate coordinate, and collaborate by sharing knowledge, software and
databases to complete a group assignment.
2) https://suzhou.wikispaces.com/file/view/351Ch1.ppt.
3) https://cld.pt/.../Kenneth%20C.%20Laudon.
18.9. ASSIGNMENTS
1) The Internet may not make corporations obsolete, but the corporations will
have to change their business models. Do you agree? Why or why not?
2) How have social technologies changed e-commerce?
18.10. REFERENCES
1) Power, D.J. (2002). Decision support systems: concepts and resources for
managers. Westport, Conn., Quorum Books.
2) James A. O’Brien, George M. Marakas and Ramesh Behl, “Management
Information System”, Ninthedition, Tata McGraw Hill Education Private
Limited, New Delhi., 2010.
3) Kenneth C.Laudon and Jane P. Laudon, “Management Information System”
Tenth Edition, PHI Learning Private Limited, New Delhi, 2008.
4) Effy Oz, “Management Information System”, Fifth Edition, Thomas Course
Technology, 2007.
18.11. LEARNING ACTIVITIES
Form a group with three or four of your classmates. Select two businesses that
are competitors in the same industry and that use their Web sites for electronic
commerce. Visit these Web sites. You might compare, for example, the Web sites for
iTunes and Napster, Amazon and BarnesandNoble.com, or E*Trade and Scottrade.
Prepare an evaluation of each business’s Web site in terms of its functions, user
friendliness, and ability to support the company’s business strategy. Which Web
site does a better job? Why? Can you make some recommendations to improve
these Web sites? If possible, use Google Sites to post links to Web pages, team
communication announcements, and work assignments; to brainstorm; and to
work collaboratively on project documents. Try to use Google Docs to develop a
presentation of your findings for the class.
18.12. KEY WORDS
Data Mining.
E-Business
Digital Firm
E-collaboration.
Data Base Management System.
ERP
Real Time Enterprise
BPO.
248
LESSON – 19
INFORMATION SECURITY AND CONTROL
19.1. INTRODUCTION
Securing Information Systems are becoming increasingly important as e-
commerce and e-business further integrates into the consumer experience. The
lack of security measures allow hackers to invade private networks and cause
complete system disruptions or failure. Hackers destroy these systems through
viruses, worms, bugs, and malicious software and hardware to obtain valuable and
private information. Systems must be protected through the use of firewalls,
intrusion detection systems, and authentication programs; essentially a user must
be identified before he/she is able to log on to a system.
Usually, systems are vulnerable because they are in electronic form, which is
more vulnerable than manual form. There is a small drawback relative to the gains
that data in electronic form has. Electronic form makes information and critical
data accessible to those who desire to obtain these files by illegal means. It is
possible for criminals to gain data through networks as they are being passed in
packets while they are being transmitted. Systems need to be protected from
vulnerabilities that can occur to them and cause costly damage to a company.
Systems can shut down if damaged by abuse from hackers trying to access
information and these hackers can even alter the data, destroy it, or steal it for
personal use. Securities are put in to place to help prevent unauthorized access,
alteration, theft, or physical damage to the information systems. Controls are used
to ensure the safety of the organization's assets, and the accuracy and reliability of
it's accounting records. Systems are vulnerable to hardware and software problems,
disasters and internet vulnerabilities. Included are malicious software, hackers and
the internal threat of employees.
Concepts
Information System
The term information system describes the organized collection,
processing, transmission, and spreading of information in accordance with defined
procedures, whether automated or manual.
Security
Policies, procedures and technical measures used to prevent unauthorized
access, alteration, theft, or physical damage to information systems.
Controls
Methods, policies, and organizational procedures that ensure safety of
organization’s assets; accuracy and reliability of its accounting records; and
operational adherence to management standards is known as controls.
19.2. OBJECTIVES
After reading and studying this lesson you should be able to:
Understand the concept of information security and control.
Describers the goals of IS.
249
Some viruses do not affect any files, but the speed at which they spread and
their repeated attacks slow down network traffic to an intolerable crawl.
Without protection against malware and intruders, connecting to the Internet
would be very dangerous. Firewalls, intrusion detection systems, and antivirus
software have become essential business tools. Firewalls prevent unauthorized
users from accessing private networks. A firewall is a combination of hardware and
software that controls the flow of incoming and outgoing network traffic. It is
generally placed between the organization’s private internal networks and
distrusted external networks, such as the Internet, although firewalls can also be
used to protect one part of a company’s network from the rest of the network.(Refer
figure 19.2)
part of an ongoing dialogue between a sender and a receiver. It sets up state tables
to track information over multiple packets. Packets are accepted or rejected based
on whether they are part of an approved conversation or whether they are
attempting to establish a legitimate connection. Network Address Translation (NAT)
can provide another layer of protection when static packet filtering and state full
inspection are employed. NAT conceals the IP addresses of the organization’s
internal host computer(s) to prevent sniffer programs outside the firewall from
ascertaining them and using that information to penetrate internal systems.
Application proxy filtering examines the application content of packets. A proxy
server stops data packets originating outside the organization, inspects them, and
passes a proxy to the other side of the firewall. If a user outside the company wants
to communicate with a user inside the organization, the outside user first “talks” to
the proxy application and the proxy application communicates with the firm’s
internal computer. Likewise, a computer user inside the organization goes through
the proxy to talk with computers on the outside. To create a good firewall, an
administrator must maintain detailed internal rules identifying the people,
applications, or addresses that are allowed or rejected. Firewalls can deter, but not
completely prevent, network penetration by outsiders and should be viewed as one
element in an overall security plan.
In addition to firewalls, commercial security vendors now provide intrusion
detection tools and services to protect against suspicious network traffic and
attempts to access files and databases. Intrusion detection systems feature full-
time monitoring tools placed at the most vulnerable points or “hot spots” of
corporate networks to detect and deter intruders continually. The system generates
an alarm if it finds a suspicious or anomalous event. Scanning software looks for
patterns indicative of known methods of computer attacks, such as bad passwords,
checks to see if important files have been removed or modified, and sends warnings
of vandalism or system administration errors. Monitoring software examines events
as they are happening to discover security attacks in progress. The intrusion
detection tool can also be customized to shut down a particularly sensitive part of a
network if it receives unauthorized traffic.
One way to protect against viruses is to use antivirus software, which is
readily available on the market from companies that specialize in developing this
kind of software, such as Symantec and McAfee. Subscribers can regularly update
the software with code that identifies and deletes or quarantines new viruses, or
choose automatic updates, in which virus definitions are updated automatically
when the computer is connected to the Internet. However, if a new virus is designed
to operate in a way not yet known, the software is unlikely to detect it. Most virus-
detection applications allow the user to automatically or selectively destroy suspect
programs. Another way to minimize virus threats is to program network software,
especially e-mail server software, to reject any messages that come with executable
files that might be or contain viruses. Some e-mail applications, such as Microsoft
Outlook, are programmed to reject such files.
256
Some viruses are called Trojan horses, analogous to the destructive gift given
to the ancient Trojans. In computer terms a Trojan horse is any virus disguised as
legitimate software or useful software contains a virus.Many people also refer to
spyware that comes with useful software as Trojan horse software.
A growing number of viruses and worms take advantage of vulnerable features
of operating systems, most notably Microsoft Windows. Most attack this company's
operating systems because the large majority of organizations worldwide use
Microsoft operating systems to run their servers and computers. In the same way
software vendors provide patches against direct intrusion into computer systems,
they also distribute security patches against viruses and worms. However, it is up
to security profession and network administrators to implement those patches as
soon as they become available.
A logic bomb is software that is programmed to cause damage at a specified
time to specific applications and data files. It lies dormant until a certain event
takes place in the computer or until the computer's inner clock reaches the
specified time; the event or time triggers the virus to start causing damage. Logic
bombs are usually planted by insiders, that is, employees of the victimized
organization.
Unauthorized downloading and installation of software that might cause
damage can be controlled by limiting administration rights to employees. Many
organizations instruct operating .Systems to deny such rights to most employees.
They Program ISs to accept new software installation only when the proper access
codes are entered.
19.3.5. RISKS TO ONLINE OPERATIONS
Denial of Service
Denial of service(DoS) occurs when someone launches a frequent and
unusually large number of information requests to a Web site. The mere logging in
to a site is such a request. The intention of suchlog-in requests is to slow down
legitimate traffic on the site's server; business can slow to a halt. The server's or
servers' frantic effort to handle the massive amount of traffic denies legitimate
visitors and business partners access to the site.
Such attacks are usually perpetrated from multiple computers; in which case
they are called distribute denial of-service (DDoS) attacks. In most such attacks,
the perpetrator launches software that uses other people's computers for the
attack-unbeknownst to them.
For example, during the 2009 Iranian election protests, foreign activists trying
to help the opposition engaged in DDoS attacks against Iran’s government. The
official Web site of the Iranian government (ahmadinejad.ir) was rendered
inaccessible on several occasions. Although DoS attacks do not destroy information
or access restricted areas of a company’s information systems, they often cause a
Web site to shut down, making it impossible for legitimate users to access the site.
For busy e-commerce sites, these attacks are costly; while the site is shut down,
customers cannot make purchases. Especially vulnerable are small and midsize
257
3. Design Rs------
4. Conversion Rs------
5. Implementation Rs------
6. Miscellaneous Rs-------
2. Facilities Rs------
- Total(B) Rs-------
1. Personnel Rs----_
Total(c) Rs--------
259
3. Better decisions
Total(D)
Data Tampering
Data Tampering is also called as ‘data diddling’ which is the most common
approach and is often used by insiders. It involves entering false, fabricated, or
fraudulent data into the computer; or changing or deleting existing data. For
example operator may transfer some amount to his own account and try to cover
up the transfer with some take-debit and credit-debit and credit transactions.
Programming Techniques
Programming techniques is another approach used by computer criminals to
modify a computer programs. There are many types of programming fraud schemes
which are known by different names.-The more knowing attack method is the use
of a virus (Turban, et al, 2001).
Table 19.2 Programming Fraud Schemes
Programming
Definition
Technique
Secret instruction inserted into program (or data) that are innocently run
Virus during ordinary task. The secret instruction may destroy or alter data as
well as spared within or between computer systems
A program which replicates itself and penetrates a valid computer
Worms system. It may spread within a network, penetrating all connected
computers.
An illegal program, contained within another program, that 'seeps’ until
Trojan horse some specific event occurs, then triggers the illegal program to be
activated and cause damage
Salami slicing A program designed to siphon-off small amounts of money from a
number of large transaction, so the quantity taken is not readily
apparent.
Super Zapping A method of using a utility ‘Zap’ program that can bypass controls to
260
also ask whether cloud providers will submit to external audits and security
certifications. These kinds of controls can be written into the service level
agreement (SLA) before to signing with a cloud provider.
Securing Mobile Platforms
If mobile devices are performing many of the functions of computers, they need
to be secured like desktops and laptops against malware, theft, accidental loss,
unauthorized access, and hacking attempts. Mobile devices accessing corporate
systems and data require special protection. Companies should make sure that
their corporate security policy includes mobile devices, with additional details on
how mobile devices should be supported, protected, and used. They will need tools
to authorize all devices in use; to maintain accurate inventory records on all mobile
devices, users, and applications; to control updates to applications; and to lock
down lost devices so they can’t be compromised. Firms should develop guidelines
stipulating approved mobile platforms and software applications as well as the
required software and procedures for remote access of corporate systems.
Companies will need to ensure that all smart phones are up to date with the latest
security patches and antivirus/ant spam software, and they should encrypt
communication whenever possible.
19.4. REVISION POINTS
1) The term information system describes the organized collection, processing,
transmission, and spreading of information in accordance with defined
procedures, whether automated or manual.
2) Security is Policies, procedures and technical measures used to prevent
unauthorized access, alteration, theft, or physical damage to information
systems.
3) Controls are a methods, policies, and organizational procedures that ensure
safety of organization’s assets; accuracy and reliability of its accounting
records; and operational adherence to management standards is known as
controls.
4) Confidentiality, Integrity and availability are the basic Principles of
Information Systems Security.
5) Once criminals have a person's identifying details, such as a Social Security
number, driver’s license number, or credit-card number, they can pretend to
be this person. This crime is called identity theft.
6) Data Tampering is also called as ‘data diddling’ which is the most common
approach and is often used by insiders. It involves entering false, fabricated,
or fraudulent data into the computer; or changing or deleting existing data.
7) Programming techniques is another approach used by computer criminals to
modify a computer programs. There are many types of programming fraud
schemes which are known by different names.-The more knowing attack
method is the use of a virus.
8) Information System (IS) controls can be grouped under two categories:
General Controls and Application Control.
264
LESSON – 20
ETHICAL AND SOCIAL DIMENSION
20.1. INTRODUCTION
Information systems raise new and often-perplexing ethical problems. This is
truer today than ever because of the challenges posed by the Internet and electronic
commerce to the protection of privacy and intellectual property. Other ethical
issues raised by widespread use of information systems include establishing
accountability for the consequences of information systems, setting standards to
safeguard system quality that protect the safety of individual and society, and
preserving values and institutions considered essential to the quality of life in an
information society. Ethics in information system, moral dimensions of information
system, System quality.
20.2. OBJECTIVES
After reading and studying this lesson you should be able to:
Analyze the relationships among ethical, social, and political issues that are
raised by information systems.
Identify the main moral dimensions of an information society and specific
principles for conduct that can be used to guide ethical decisions.
Evaluate the impact of contemporary information systems and the Internet
on the protection of individual privacy and intellectual property.
Assess how information systems have affected everyday life.
20.3. CONTENTS
20.3.1 Understanding Ethical and Social Issues Related to Systems
20.3.2. Ethics in an Information Society
20.3.3. The Moral Dimensions of Information Systems
20.3.4. System Quality: Data Quality and System Errors
20.3.5. Quality Of Life: Equity, Access, and Boundaries
20.3.1. UNDERSTANDING ETHICAL AND SOCIAL ISSUES RELATED TO SYSTEMS
In the past ten years we have witnessed, arguably, one of the most ethically
challenging periods for U.S and global business. Table 20.1 provides a small sample
of recent cases demonstrating failed ethical judgment by senior and middle
managers. These lapses in management ethical and business judgment occurred
across a broad spectrum of industries.
In today’s new legal environment, managers who violate the law and are
convicted will most likely spend time in prison. U.S.Federal Sentencing Guidelines
adopted in 1 987 mandate that federal judges impose stiff sentences on business
executives based on the monetary value of the crime, the presence of a conspiracy
prevent discovery of the crime, the use of structured financial transactions to hide
the crime, and failure to cooperate with prosecutors (US. Sentencing Commission,
2004).
267
Social issues
Ethical issues
Information
technology and
systems
Polity
269
Quality of Life
Suddenly individual actors are confronted with new situations often not
covered by the old rules. Social institutions cannot respond overnight to these
ripples—it may take years to develop etiquette, expectations, social responsibility,
politically correct attitudes, or approved rules. Political institutions also require
time before developing new laws and often require the demonstration of real harm
before they act. In the meantime, you may have to act. You may be forced to act in
a legal gray area. We can use this model to illustrate the dynamics that connect
ethical, social, and political issues. This model is also useful for identifying the
main moral dimensions of the information society, which cut across various levels
of action— individual, social, and political.
Five Moral Dimensions of the Information Age
The major ethical, social, and political issues raised by information systems
include the following moral dimensions:
Information rights and obligations. What information rights do individuals and
organizations possess with respect to themselves? What can they protect? What
obligations do individuals and organizations have concerning this information?
Property rights and obligations. How will traditional intellectual property rights
be protected in a digital society n which tracing and accounting for ownership are
difficult and ignoring such property rights is so easy?
Accountability and control. Who can and will be held accountable and liable for
the harm done to individual and collective information and property rights? System
quality. What standards of data and system quality should we demand to protect
individual rights and the safety of society?
Quality of life. What values should be preserved in an information- and
knowledge-based society? Which institutions should we protect from violation?
Which cultural values and practices are supported by the new information
technology?
KEY TECHNOLOGY TRENDS THAT RAISE ETHICAL ISSUES
Ethical issues long preceded information technology. There are four key
technological trends responsible for these ethical stresses and they are summarized
in Table 20.2.
Table 20.2 Technology Trends that Raise Ethical Issues
Trend Impact
Computing power doubles every More organizations depend on computer systems for
18 months critical operations
Networking advances and the Copying data from one location to another and
270
The doubling of computing power every 18 months has made it possible for
most organizations to use information systems for their core production processes.
As a result, our dependence on systems and our vulnerability to, system errors and
poor data quality have increased. The very same information systems that lead to
high levels of productivity also create opportunities for ‘abuse. Social rules and laws
have not yet adjusted to this dependence. Standards ‘for ensuring the accuracy and
reliability of information systems are not universally accepted or enforced.
Advances in data storage techniques and rapidly declining storage costs have
been responsible for the multiplying databases on individuals—employees,
customers, and potential customers—maintained by private and publications.
These advances in data storage have made the routine violation of individual
privacy both cheap and effective. Already, massive data storage systems are cheap
enough for regional and even local retailing firms to use in identifying customers.
For instance, the major, America Online (AOL), MSN, and Yahoo! maintain detailed
search histories on the more than 75 million Americans whose Internet search
engines every day and who generate more than 200 million searches each day.
These huge collections of “consumer intentions” become the natural targets of
private firms looking for market advantage, government agencies, and private
investigators.
Advances in data analysis techniques for large pools of data are another
technological trend that heightens ethical concerns because companies and
government agencies are able to find out much detailed personal information about
individuals. With contemporary data management tools, companies can assemble
and combine the myriad pieces of information about you stored on computers
much more easily than in the past.
Think of all the ways you generate computer information about yourself—
credit card purchases; telephone calls; magazine subscriptions; video rentals; mail-
order purchases; banking records; local, state, and federal government records
(including court and police records); and visits to Web sites to read Web materials,
use search engines, and write blogs. Put together and mined properly, this
information could reveal not only your credit information but also your driving
habits, your tastes, your associations, intended purchases, political views, and
interests. What you thought was private, in fact, can quickly become public.
Companies with products to sell purchase relevant information from these
sources to help them more finely target their marketing campaigns. The use of
computers to combine data from multiple sources and create electronic dossiers of
detailed information on individuals is called profiling.
For example, hundreds of Web sites allow Double Click (www.doubleclick.net),
an internet advertising broker, to track the activities of their visitors in exchange for
revenue from advertisements based on visitor information Double Click gathers.
271
Double Click uses this information to create a profile of each online visitor, adding
more detail to the profile as the visitor accesses an associated Double Click site.
A new data analysis technology called non obvious relationship awareness
(NORA) has given both the government and the private sector even more powerful
profiling capabilities. NORA can take information about people from many disparate
sources, such as employment applications, telephone records, customer listings,
and “wanted” lists, and correlate relationships to find obscure hidden connections
that might help identify criminals or terrorists.
NORA technology scans data and extracts information as the data are being
generated so that it could, for example, instantly discover a man at an airline ticket
counter who shares a phone number with a known terrorist before that person
boards an airplane. The technology is considered a valuable tool for homeland
security but does have privacy implications because it can provide such a detailed
picture of the activities and associations of a single individual.
Finally, advances in networking, including the Internet, promise to reduce
greatly the costs of moving and accessing large quantities of data and open the
possibility of mining large pools of data remotely using small desktop machines,
permitting an invasion of privacy on a scale and with a precision heretofore
unimaginable. If computing and networking technologies continue to advance at
the same pace as in the past, by 2023, large organizations will be able to devote the
equivalent of a contemporary desktop personal computer to monitoring each of the
350 million individuals who will then be living in the United States (Farmer and
Mann, 2003).
Figure 20.2 illustrates NORA technology can take information about people
from disparate sources and find obscure, non-obvious relationships. It might
discover, for example, that an applicant for a job at a casino shares a telephone
number with a known criminal and issue an alert to the hiring manager.
20.3.2. ETHICS IN AN INFORMATION SOCIETY
Ethics is a concern of humans who have freedom of choice. Ethics is about
individual choice: When faced with alternative courses of action, what is the correct
moral choice? What are the main features of ethical choice?
Basic Concepts: Responsibility, Accountability, And Liability
Ethical choices are decisions made by individuals who are responsible for
the consequences of their actions. Responsibility is a key element of ethical action.
Responsibility means that you accept the potential costs, duties, and obligations for
the decisions you make.
Accountability is a feature of systems and social institutions: It means that
mechanisms are in place to determine who took responsible action, who is
responsible. Systems and institutions in which it is impossible to find out who took
what action are inherently incapable of ethical analysis or ethical action. Liability
extends the concept of responsibility further to the area of laws.
Liability is a feature of political systems in which a body of laws is in place
that permits individuals to recover the damages done to them by other actors,
systems, or organizations. Due process is a related feature of law-governed
societies and is a process in which laws are known and understood and there is an
ability to appeal to higher authorities to ensure that the laws are applied correctly.
These basic concepts form the underpinning of an ethical analysis of
information systems and those who manage them. First, information technologies
are filtered through social institutions, organizations, and individuals. Systems do
not have impacts by themselves, Whatever information system impacts exist are
products of institutional, organizational, and individual actions and behaviors.
Second, responsibility for the consequences of technology falls clearly on the
institutions, organizations, and individual managers who choose to use the
technology. Using information technology in a socially responsible manner means
that you can and will be held accountable for the consequences of your actions.
Third, in an ethical, political society, individuals and others can recover damages
done to them through a set of laws characterized by due process.
Ethical Analysis
When confronted with a situation that seems to present ethical issues, how
should you analyze it? The following five-step process should help.
1) Identify and describe clearly the facts. Find out who did what to whom, and
where, when, and how. In many instances, you will be surprised at the errors
in the initially reported facts, and often you will find that simply getting the
facts straight helps define the solution. It also helps to get the opposing
parties involved in an ethical dilemma to agree on the facts.
273
2) Define the conflict or dilemma and identify the higher-order values involved.
Ethical, social, and political issues always reference higher values. The parties
to a dispute all claim to be pursuing higher values (e.g. , freedom, privacy,
protection of property, and the free enterprise system). 1jpically, an ethical
issue involves a dilemma: two diametrically opposed courses of action that
support worthwhile values. For example, the chapter-ending case study
illustrates two competing values: the need to protect citizens from terrorist
acts and the need to protect individual privacy.
3) Identify the stakeholders. Every ethical, social, and political issue has •
stakeholders: players in the game who have an interest in the outcome, who
have invested in the situation, and usually who have vocal opinions. Find out
the identity of these groups and what they want. This will be useful later
when designing a solution.
4) Identify the options that you can reasonably take. You may find that none of
the options satisfy all the interests involved, but that some options do a better
job than others. Sometimes arriving at a good or ethical solution may not
always be balancing of consequences to stakeholders.
5) Identify the potential consequences of your options. Some options may be
ethically correct but disastrous from other points of view. Other options may
work in one instance but not in other similar instances. Always ask yourself,
‘What if I choose this option consistently over time?”
Candidate Ethical Principles
Once your analysis is complete, what ethical principles or rules should you
use to make a decision? What higher-order values should inform your judgment?
Although you are the only one who can decide which among many ethical principles
you will follow, and how you will prioritize them, it is helpful to consider some
ethical principles with deep roots in many cultures that have survived throughout
recorded history.
1) Do unto others as you would have them do unto you (the Golden Rule).
Putting yourself into the place of others, and thinking of yourself as the object
of the decision, can help you think about fairness in decision making.
2) If an action is not right for everyone to take, it is not right for
anyone(Immanuel Kant’s Categorical Imperative). Ask yourself, “If everyone
did this, could the organization, or society, survive?”
3) it an action cannot be taken repeatedly, it is not right to take at all (Descartes
‘rule of change). This is the slippery-slope rule: An action may bring about a
small change now that is acceptable, but if it is repeated, it would bring
unacceptable changes in the long run. In the vernacular, it might be stated as
once started down a slippery path, you may not be able to stop.”
4) Take the action that achieves the higher or greater value (the Utilitarian
Principle) this rule assumes you can prioritize values in a rank order and
understand the consequences of various courses of action.
5) Take the action that produces the least harm or the least potential cost (Risk
Aversion Principle). Some actions have extremely high failure costs of very low
274
Cookies are tiny files deposited on a computer hard drive when a user visits
certain Web sites. Cookies identify the visitor’s Web browser software and track
visits to the Web site. When the visitor returns to a site that has stored cookie, the
Web site software will search the visitor’s computer, find the cookie, and know what
that person has done in the past. It may also update the cookie, depending on the
activity during the visit. In this way, the site can customize its contents for each
visitor’s interests. For example, if you purchase a book on the Amazon.com Web
site and return later from the same browser, the site will welcome you y name and
recommend other books of interest based on your past purchases. Figure 20.3
illustrates how cookies work.
Web sites using cookie technology cannot directly obtain visitors’ names and
addresses. However, if a person has registered at a site, that information can be
combined with cookie data to identify the visitor. Web site owners can also combine
the data they have gathered from cookies and other Web site monitoring tools with
personal data from other sources, such as offline data collected from surveys paper
catalog purchases, to develop very detailed profiles of their visitors.
Marketers use Web bugs as another tool to monitor online behavior. Web bugs
are tiny graphic files embedded in e-mail messages and Web pages that are
designed to monitor who is reading the e-mail message or Web page and transmit
that informatio4 to another computer. Other spyware cane secretly installs itself on
an Internet user’s computer by piggybacking on larger applications.
There are now tools to help users determine the kind of personal data that can
be extracted by Web sites. The Platform for Privacy Preferences, known as P3P,
enables automatic communication of privacy policies between an e-commerce site
and its visitors. P3P provides a standard for communicating a Web site’s privacy
policy to Internet users and for comparing that policy to the user’s preferences or to
other standards, such as the FTC’s new FTP guidelines or the European Directive
on Data Protection. Users can use P3P to select the level of privacy they wish to
maintain when interacting with the Web site.
The P3P standard allows Web sites to publish privacy policies in a form that
computers can understand. Once it is codified according to P3P rules, the privacy
policy becomes part of the software for individual Web pages (see Figure 20.4). P3P
enables Web sites to translate their privacy policies into a standard format that can
be read by the user’s Web browser software. The user’s Web browser software
evaluates the Web site’s privacy policy to determine whether it is compatible with
the user’s privacy preferences.
consortium, but users will not be able to obtain sender information or privacy
statements. Many users may also need to be educated about interpreting company
privacy statements and P3P levels of privacy.
Property Rights: Intellectual Property
Contemporary information systems have severely challenged existing law and
social practices that protect private intellectual property. Intellectual property is
considered to be intangible property created by individuals or corporations.
Information technology has made it difficult to protect intellectual property because
computerized information can be so easily copied or distributed on networks.
Intellectual property is subject to a variety of protections under three different legal
traditions: trade secrets, copyright, and patent law.
Trade Secrets
Any intellectual work product—a formula, device, pattern, or compilation of
data-used for a business purpose can be classified as a trade secret, provided it is
not based on information in the public domain. Protections for trade secrets vary
from state to state. In general, trade secret laws grant a monopoly of the ideas
behind a work product, but it can be a very tenuous monopoly.
Software that contains novel or unique elements, procedures, or compilations
can be included as a trade secret. trade secret law protects the actual ideas in a
work product, not only their manifestation. To make this claim, the creator or
Owner must take care to bind employees and customers with nondisclosure
agreements and to prevent the secret from falling into the public domain.
Copyright
Copyright is a statutory grant that protect creators of inte1letual property from
having their work copied by others for any purpose during the life of the author
plus an additional 70 years after the author’s death. For corporate-owned works,
copyright protection lasts for 95 years after their initial creation. Congress has
extended copyright protection to books; periodicals, lectures, dramas, musical
compositions, maps, drawings, artwork of any kind, and motion pictures. The
intent behind copyright laws has been to encourage creativity and authorship by
ensuring that creative people receive the financial and other benefits of their work.
Patents
A patent grants the owner an exclusive monopoly on the ideas behind an
invention for 20 years. The congressional intent behind patent law’ was to ensure
that inventors of new machines, devices, ‘or methods receive the full financial and
other rewards of their labor and yet still make widespread use of the invention
possible by providing detailed diagrams for those wishing to use the idea under
license from the patent’s owner. The granting of a patent is determined by the
Patent Office and relies on court rulings.
The key concepts in patent law are originality, novelty, and invention. The
Patent Office did not accept applications for software patents routinely until a I 981
Supreme Court decision that held that computer programs could be a part of a
patentable process. Since that time, hundreds of patents have been granted and
thousands await consideration.
The strength of patent protection is that it grants a monopoly on the under-
lying concepts and ideas of software. The difficulty is passing stringent criteria
279
ofnon-obviousness (e.g., the work must reflect some special understanding and
contribution originality, and novelty, as well as years of waiting to receive
protection.
Mechanisms are being developed to sell and distribute books, articles, and
other intellectual property legally on the Internet, and the Digital Millennium
Copyright Act (DMCA) of 1 998 is providing some copyright protection. The DMCA
implemented a World Intellectual Property Organization Treaty that makes it illegal
to circumvent technology-based protections of copyrighted materials. Internet
service providers (ISPs) are required to take down sites of copyright infringers that
they are hosting once they are notified of the problems.
Accountability, Liability, and Control
Along with privacy and property laws, new information technologies are
challenging existing liability laws and social practices for holding individuals and
institutions accountable. If a person is injured by a machine controlled, in part, by
software, who should be held accountable and, therefore, held liable? Should a
public bulletin board or an electronic service, such as America Online, permit the
transmission of pornographic or offensive material (as broadcasters), or should they
be held harmless against any liability for what users transmit (as is true of common
carriers, such as the telephone system)? What about the Internet? If you outsource
your information processing, can you hold the external vendor liable for injuries
done to your customers? Some real-world examples may shed light on these
questions.
Computer-Related Liability Problems
During the last week of September 2009, thousands of customers of TD Bank,
one of the largest banks in North America, scrambled to find their payroll checks,
social security checks, and savings and checking account balances. The bank’s 6.5
million customers were temporarily out of funds because of a computer glitch. The
problems were caused by a failed effort to integrate systems of TD Bank and
Commerce Bank. A spokesperson for TD Bank, said that “while the overall
integration of the systems went well, there have been some speed-bumps in the
final stages, as you might expect with a project of this size and complexity.”
(Vijayan, 2009). Who is liable for any economic harm caused to individuals or
businesses that could not access their full account balances in this period? This
case reveals the difficulties faced by information systems executives who ultimately
are responsible for any harm done by systems developed by their staffs. In general,
insofar as computer software is part of a machine, and the machine injures
someone physically or economically, the producer of the software and the operator
can be held liable for damages. Insofar as the software acts like a book, storing and
displaying information, courts have been reluctant to hold authors, publishers, and
booksellers liable for contents (the exception being instances of fraud or
defamation), and hence courts have been wary of holding software authors liable for
book like software. In general, it is very difficult (if not impossible) to hold software
producers liable for their software products that are considered to be like books,
regardless of the physical or economic harm that results. Historically, print
publishers, books, and periodicals have not been held liable because of fears that
280
liability claims would interfere with First Amendment rights guaranteeing freedom
of expression.
20.3.4. SYSTEM QUALITY: DATA QUALITY AND SYSTEM ERRORS
The debate over liability and accountability for unintentional consequences of
system use raises a related but independent moral dimension: What is an
acceptable, technologically feasible level of system quality? At what point should
system managers say, “Stop testing, we’ve done all we can to perfect this software.
Ship it!” Individuals and organizations may be held responsible for avoidable and
foreseeable consequences, which they have a duty to perceive and correct. And the
gray area is that some system errors are foreseeable and correctable only at very
great expense, an expense so great that pursuing this level of perfection is not
feasible economically—no one could afford the product. For example, although
software companies try to debug their products before releasing them to the
marketplace, they knowingly ship buggy products because the time and cost of
fixing all minor errors would prevent these products from ever being released. What
if the product was not offered on the marketplace, would social welfare as a whole
not advance and perhaps even decline? Carrying this further, just what is the
responsibility of a producer of computer services—should it withdraw the product
that can never be perfect, warn the user, or forget about the risk (let the buyer
beware)? Three principal sources of poor system performance are (1) software bugs
and errors, (2) hardware or facility failures caused by natural or other causes, and
(3) poor input data quality. zero defects in software code of any complexity cannot
be achieved and why the seriousness of remaining bugs cannot be estimated.
Hence, there is a technological barrier to perfect software, and users must be aware
of the potential for catastrophic failure. The software industry has not yet arrived at
testing standards for producing software of acceptable but not perfect performance.
Although software bugs and facility catastrophes are likely to be widely reported in
the press, by far the most common source of business system failure is data
quality. Few companies routinely measure the quality of their data, but individual
organizations report data error rates ranging from 0.5 to 30 percent.
20.3.5. QUALITY OF LIFE: EQUITY, ACCESS, AND BOUNDARIES
Negative social consequences of systems
Many of these negative social consequences are not violations of individual
rights or property crimes. Nevertheless, these negative consequences can be
extremely harmful to individuals, societies, and political institutions. Computers
and information technologies potentially can destroy valuable elements of our
culture and society even while they bring us benefits
Balancing power although computing power decentralizing, key decision-
making remains centralized. The shift toward highly decentralized
computing, coupled with an ideology of empowerment of thousands of
workers, and the decentralization of decision making to lower organizational
levels, have reduced the fears of power centralization in institutions
Rapidity of change Businesses may not have enough time to respond to
global competition
Maintaining boundaries Computing, Internet use lengthens work-day,
infringes on family, personal time. Even leisure time spent on the computer
281
threatens these close social relationships. Extensive Internet use, even for
entertainment or recreational purposes, takes people away from their family
and friends. Among middle school and teenage children, it can lead to
harmful anti-social behavior, such as the recent upsurge in cyber bullying.
Dependence and vulnerability Public and private organizations ever more
dependent on computer systems. With systems now as ubiquitous as the
telephone system, it is startling to remember that there are no regulatory or
standard-setting forces in place that are similar to telephone, electrical,
radio, television, or other public utility technologies. The absence of
standards and the criticality of some system applications will probably call
forth demands for national standards and perhaps regulatory oversight.
20.4. REVISION POINTS
1) Ethics refers to the principles of right and wrong that individuals, acting as
free moral agents, use to make choices to guide their behaviors.
2) Ethical issues in information systems have been given new urgency by the
rise of the Internet and electronic commerce. Internet and digital firm
technologies make it easier than ever to assemble, integrate, and distribute
information unleashing new concerns about the appropriate use of customer
information, the protection of personal privacy, and the protection of
intellectual property.
3) Five Moral Dimensions of the Information Age are Information rights and
obligations, Property rights and obligations, Accountability and control and
Quality of life
4) The use of computers to combine data from multiple sources and create
electronic dossiers of detailed information on individuals is called profiling.
5) Responsibility is a key element of ethical action. Responsibility means that
you accept the potential costs, duties, and obligations for the decisions you
make.
6) Accountability is a feature of systems and social institutions: It means that
mechanisms are in place to determine who took responsible action, who is
responsible.
7) Liability is a feature of political systems in which a body of laws is in place
that permits individuals to recover the damages done to them by other actors,
systems, or organizations.
8) Due process is a related feature of law-governed societies and is a process in
which laws are known and understood and there is an ability to appeal to
higher authorities to ensure that the laws are applied correctly.
9) A patent grants the owner an exclusive monopoly on the ideas behind an
invention for 20 years.
10) Three principal sources of poor system performance are (1) software bugs and
errors, (2) hardware or facility failures caused by natural or other causes, and
(3) poor input data quality.
11) System quality is finding an acceptable amount for the quality of data and
number of system errors.
282
12) Quality of life is the social cost of introducing information technologies. These
social consequences can be extremely harmful or helpful to individuals,
societies and political institutions
20.5. INTEXT QUESTIONS
1) Define Ethics?
2) Explain the five moral dimensions of the information age?
3) Differentiate between responsibility, accountability, and liability.
20.6. SUMMARY
Information technology is introducing changes for which laws and rules of
acceptable conduct have not yet been developed. Increasing computing power,
storage, and networking capabilities including the Internet expand the reach of
individual and organizational actions and magnify their impacts. The ease and
anonymity with which information is now communicated, copied, and manipulated
in online environments pose new challenges to the protection of privacy and
intellectual property. The main ethical, social, and political issues raised by
information systems center around information rights and obligations, property
rights and obligations, accountability and control, system quality, and quality of
life. Contemporary data storage and data analysis technology enables companies to
easily gather personal data about individuals from many different sources and
analyze these data to create detailed electronic profiles about individuals and their
behaviors. Data flowing over the Internet can be monitored at many points. Cookies
and other Web monitoring tools closely track the activities of Web site visitors. Not
all Web sites have strong privacy protection policies, and they do not always allow
for informed consent regarding the use of personal information. Traditional
copyright laws are insufficient to protect against software piracy because digital
material can be copied so easily and transmitted to many different locations
simultaneously over the Internet. Although computer systems have been sources of
efficiency and wealth, they have some negative impacts. Computer errors can cause
serious harm to individuals and organizations. Poor data quality is also responsible
for disruptions and losses for businesses. The ability to own and use a computer
may be exacerbating socioeconomic disparities among different racial groups and
social classes. Widespread use of computers increases opportunities for computer
crime and computer abuse. Computers can also create health problems, such as
RSI, computer vision syndrome, and techno stress.
20.7. TERMINAL EXERCISES
1) What ethical, social, and political issues are raised by information systems?
Information technology is introducing changes for which laws and rules of
acceptable
2) Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
3) Explain how ethical, social, and political issues are connected and give some
examples.
4) List and describe the key technological trends that heighten ethical concerns.
5) Identify and describe six ethical principles
6) How have information systems affected everyday life?
283
UNIT - VI
LESSON – 21
APPLICATION OF MIS IN FUNCTIONAL AREA
21.1. INTRODUCTION
A management information system is organized according to the business
functionality of an organization. Thus an MIS contains systems in areas of
accounting, human resources, marketing, manufacturing, research and
development, legal services, operations/support, and finance. Each functional
system uses its own set of function-specific subsystems, all of which interface with
both the TPS and the MIS. Provides support to managers as they work to achieve
corporate goals. Enables managers to compare results to established company
goals and identify problem areas and opportunities for improvement. In the
following sections, we will describe information systems for four major business
areas of the firm and marketing subsystems in detail.
21.2. OBJECTIVES
After reading and studying this lesson you should be able to:
Understanding of the use of IS to support the major functional areas in
business.
Describe the Information systems in marketing, manufacturing, and human
resource management with a special emphasis on computer integrated
manufacturing.
An understanding of the different roles managers play and how marketing
information systems can support them in these roles
An appreciation of the different types and levels of marketing decision
making
A knowledge of the major components of a marketing information system
21.3. CONTENTS
21.3.1. Organizational Information Systems
21.3.2. Cross Functional Information Systems
21.3.3. Marketing Information System
21.3.4. Human Resources Information System
21.3.5. Manufacturing Information System
21.3.6. Information Systems for Production/Operations Management
21.3.7. Financial Information System
21.3.1. ORGANIZATIONAL INFORMATION SYSTEMS
The business areas of the firm-finance, human resources, information
services, manufacturing, and marketing-use the database produced by the
transaction processing system, plus data from other sources, to produce
information that managers use 'in making decisions and solving problems.
Information systems have been developed for each of these business areas. All of
these information systems are examples of organizational information systems.
285
They are developed to meet the needs for information relating to those particular
parts of the organization.
As a prospective managerial end user you should have a general
understanding of the major ways information systems are used to support each of
the functions of business. The term business information systems is used to
describe a variety of types of information systems (transaction processing,
information reporting, decision support, etc.) that support the functions of business
such as accounting, finance, marketing, or human resource management.
21.3.2. CROSS FUNCTIONAL INFORMATION SYSTEMS:
Information systems can be grouped into business function categories,
however, in the real world information systems are typically integrated
combinations of functional information systems. Such systems support business
processes, such as product development, production, distribution, order
management, customer support, and so on. There is a strong emphasis in many
organizations to develop such composite or cross-functional information systems
that cross the boundaries of traditional business functions in order to reengineer
and improve vital business processes. These organizations view cross-functional
information systems as a strategic way to share information resources and improve
the efficiency and effectiveness of a business, thus helping it attain its strategic
objectives.
Applications of information systems in the functional areas of business include:
1. Production/Operations IS
2. Marketing IS
3. Financial IS
4. Accounting IS
5. Human Resource Management IS
Business firms are turning to Internet technologies to integrate the flow of
information among their internal business functions and their customers and
suppliers. Companies are using the World Wide Web and their intranets and
extranets as the technology platform for their cross-functional and inter
organizational information systems.
In addition, many companies have moved from functional mainframe legacy
systems to cross-functional client/server network applications. This typically has
involved installing enterprise resource planning (ERP) or supply chain management
(SCM) software. Instead of focusing on the information processing requirements of
business functions, ERP software focuses on supporting the supply chain processes
involved in the operations of a business.
A management information system is organized according to the business
functionality of an organization.
Thus an MIS contains systems in areas of accounting, human resources,
marketing, manufacturing, research and development, legal services,
operations/support, and finance. See figure 21.1.
286
Each functional system uses its own set of function-specific subsystems, all
of which interface with both the TPS and the MIS.
Each functional system requires different information and support for
decision making; but they share some common information needs.
Input Subsystems
As shown in Figure 21.1, the transaction processing system gathers data, from
both internal and environmental sources and enters the data into the database. We
Observed that data gathering in the discussion of the distribution system. The
marketing research subsystem also gathers internal and environmental data by
conducting special studies. The marketing intelligence subsystem gathers
environmental data that serves to keep management informed of activities of the
firm's competitors and customers and other elements that can influence marketing
operations.
A marketing MIS supports activities throughout the many activities of
marketing departments. Some of the typical subsystems of a marketing MIS are
marketing research, product development and delivery, promotion and advertising,
product pricing and sales analysis.
One of the most common uses of a marketing MIS is to produce sales reports.
These are typically produced on a regular schedule, such as by week, month and
quarter. Reports can be organized by sales representative, product, customer or
geographic area. Such reports allow managers to see which aspects of sales are
doing well and which ones need attention.
Perhaps one sales representative has suddenly experienced a drop in sales by
losing one major customer and needs some support to develop some new leads.
If there are only a handful of sales reps sharing one office, a manager might be able
to pick up on this just by talking to everyone. However, what if a manager has to
oversee more than 100 sales reps in 12 different offices around the nation?
A specialized information system that provides regular updates in a meaningful
format will make it a lot easier for the manager to make effective decisions.
21.3.4. THE HUMAN RESOURCES INFORMATION SYSTEM
The human resources information system (HRIS) provides information to
managers throughout the firm concerning the firm's human resources. Figure 21.3
illustrates the HRIS, using the same format as the MKIS. The transaction
processing system provides input data, as does a human resources research
subsystem that conducts special studies and a human resources intelligence
subsystem that gathers environmental data that bear on HR issues.
The output subsystems of the HRIS each address a particular aspect of HR
management: planning, recruiting, and managing the workforce; compensating the
employees; providing employee benefits; and preparing the many HR reports that
are required by the environment, primarily government agencies. This is the way
that output subsystems are determined-they represent the major areas of interest
to the users.
289
Case Management
Cash management systems collect information on all cash receipts and
disbursements within a company on a realtime or periodic basis. Cash
management systems:
1) Allow businesses to deposit or invest excess funds more quickly and thus
increase the income generated by deposited or invested funds.
2) Produce daily, weekly, or monthly forecasts of cash receipts or disbursements
(cash flow forecast) that are used to spot future cash deficits or surpluses.
Online Investment Management
Many businesses invest their excess cash in short-term low-risk marketable
securities or in higher return/higher risk alternatives, so that investment income
may be earned until the funds are required. Online investment management
services:
Help a financial manager make buying, selling, or holding decisions for each
type of security so that an optimum mix of securities is developed that minimizes
risk and maximizes investment income for the business.
Capital Budgeting
The capital budgeting process involves evaluate the profitability and financial
impact of proposed capital expenditures. This application makes heavy use of
spreadsheet models that incorporate present value analysis of expected cash flows
and probability analysis of risk to determine the optimum mix of capital projects for
a business.
Financial Forecasting and Planning
A variety of financial forecasting packages provide analytical techniques that
result in economic or financial forecasts of national and local economic conditions,
wage levels, price levels, and interest rates.
Financial Planning systems use financial planning models to evaluate the
present and projected financial performance of a business or of one of its divisions
or subsidiaries. Financial planning systems:
1) Help determine the financial needs of a business and analyze alternative
methods of financing the business.
2) Use financial forecasts concerning the economic situation, business
operations, and types of financing available, interest rates, and stock and
bond prices to develop an optimal financing plan for the business.
3) They frequently use electronic spreadsheet packages and DSS generators to
build and manipulate models.
4) Are used to answer what-if and goal-seeking questions in order to evaluate
financial and investment alternatives.
Accounting Information Systems
Accounting information systems are the oldest and most widely used
information systems in business. Computer based accounting information
systems:
298
Accounts Payable
Accounts payable systems keep track of data concerning purchases from and
payments to suppliers. Accounts payable systems:
1) Prepare checks in payment of outstanding invoices and produce cash
management reports.
2) Help ensure prompt and accurate payment of suppliers to maintain good
relationships, ensure a good credit standing, and secure any discounts offered
for prompt payment.
3) Provide tight financial control over all cash disbursements of the business.
4) Provide management with information needed for the analysis of payments,
expenses, purchases, employee expense accounts, and cash requirements.
Payroll
Payroll systems receive and maintain data from employee time cards and other
work records. Accounts payable systems:
1) Produce paychecks and other documents such as earning statements, payroll
reports, and labour analysis reports
2) Are prepared for management and government agencies.
3) Help businesses make prompt and accurate payments to their employees,
as well as reports to management, employees, and government agencies
concerning earnings, taxes, and other deductions.
4) Provide management with reports analyzing labour costs and productivity.
General Ledger
General ledger systems consolidate data from accounts receivable, accounts
payable, payroll, and other accounting information systems. General ledger
systems:
1) Produce the periodic financial statements and reports of the business.
2) Help businesses accomplish accounting tasks in an accurate and timely
manner.
3) Typically provide better financial controls and management reports and
involve fewer personnel and lower costs than manual accounting methods.
21.4. REVISION POINTS
1) The term business information systems is used to describe a variety of
types of information systems (transaction processing, information reporting,
decision support, etc.) that support the functions of business such as
accounting, finance, marketing, or human resource management..
2) Applications of information systems in the functional areas of business
include:
1. Production/Operations IS, 2. Marketing IS, 3. Financial IS,
4. Accounting IS, 5. Human Resource Management IS.
3) A marketing MIS supports activities throughout the many activities of
marketing departments. Some of the typical subsystems of a marketing MIS
are marketing research, product development and delivery, promotion and
advertising, product pricing and sales analysis.
301
organization. These include systems to analyze revenues, costs and profits, auditing
systems for both internal and external purposes and systems to manage funds.
A financial MIS can also be used to prepare reports for third parties, such as
external auditors or shareholders. Accounting information systems are the oldest
and most widely used information systems in business.
21.7. TERMINAL EXERCISES
1) Explain the human resource management information system?
2) Describe manufacturing information system?
3) Discuss the accounting information system?
21.8. SUPPLEMENTARY MATERIALS
1) www.studylecturenotes.com.
2) dosen.narotama.ac.id/.../Marketing-Research-and-Information-Systems.
3) http://www.drososd.gr.
21.9. ASSIGNMENTS
Discuss the applications of information systems in the functional areas of
business ?
21.10. REFERENCES
1) Kenneth C. Laudon and Jane P. Laudon, “Management Information System”
Tenth Edition, PHI Learning Private Limited, New Delhi, 2008.
2) United States Sentencing Commission, U.S.Sentencing Commision’s Source
book of federal sentencing statistics.http://www.ussc.gov/ANNRPT/2004.
3) www.utdallas.edu/
4) www.umsl.edu/~chewl/
21.11. LEARNING ACTIVITIES
Discuss the role of corporate internet in HRMIS
21.12. KEYWORDS
Manufacturing Information System
Human Resources Information System
Marketing Information System
Accounting Information Systems
Financial Information System.
Production/Operations Management.
303
LESSON – 22
MARKETING INFORMATION SYSTEM
22.1. INTRODUCTION
The business function of marketing is concerned with the planning,
promotion, and sale of existing products in existing markets, and the development
of new products and new markets to better serve present and potential customers.
Marketing information systems integrate the information flow required by many
marketing activities.
Marketing information systems provide information for:
1) Internet/intranet web sites and services make an interactive marketing
process possible where customers can become partners in creating,
marketing, purchasing, and improving products and services.
2) Sales force automation systems use mobile computing and Internet
technologies to automate many information processing activities for sales
support and management.
3) Other marketing systems assist marketing managers in product planning,
pricing, and other product management decision, advertising and sales
promotion strategies, and market research and forecasting.
4) Planning, control, and transaction processing in the marketing function.
5) Strategic, tactical and operational information systems assist marketing
managers in product planning, pricing decisions, advertising and sales
promotion strategies and expenditures, forecasting market potential for new
and present products, and determining channels of distribution.
6) Control Reporting Systems support the efforts of marketing managers to
control the efficiency and effectiveness of the selling and distribution of
products and services.
7) Analytical reports provide information on a firm's actual performance versus
planned marketing objectives.
22.2. OBJECTIVES
After reading and studying this lesson you should be able to:
A knowledge of the major components of a marketing information system
Understanding of the components of Targeted Marketing.
Describe the Marketing intelligence systems.
Understanding of the Inputs and outputs to the Marketing MIS.
22.3. CONTENTS
22.3.1. Interactive Marketing
22.3.2. Sales Force Automation
22.3.3. Sales and Product Management
22.3.4. Targeted Marketing
22.3.5. Marketing Information System
22.3.6. Marketing Subsystem
304
the methods (and technologies) of collection, storing, retrieving and processing data
notwithstanding.
firm, for example, marketing research may determine that mull, fuel-efficient cars
are desired; that "two-car" families represent the largest potential market, and that,
for an extra $800, the average buyer would rather have velour upholstery and a
stereo radio than air bags and crash-resistant bumpers. Information like this is
rarely used by other MIS applications and need not be placed in the data base. It is
of interest to planners, however, and is conveyed to them in document form.
Inputs to the Marketing MIS
As compared to other management information systems, the marketing MIS
relies on external sources of data. The sources include the Internet, competition,
customers, journals and magazines, and other publications.
Strategic Plan and Corporate Policies
Marketing relies on the organization’s strategic plan for sales targets and
projections.
A sales projection of a firm might be that it is expected to increase sales by
steady 10% for the next five years. A marketing MIS report from such a
firm might organize current sales performance as compared to the sales
projection.
Strategic plan can also contain information about projected needs for the
sales force, product and service pricing, distribution channels, promotion, and
new product features.
Transaction Processing System
The transaction processing system and E-commerce of an organization
contains a large amount of data on products, customers, and sales force.
Sales data on products can reveal which products are selling and which
ones are slow sellers. Reports summarizing order data might include sales
activity by customer, product, and geographical region.
The marketing MIS might use the product information to formulate future
sales, develop advertisements, or make product development decisions.
Customer data may be used to develop customer incentive programs such
as frequent flyer mileage in airlines.
External Sources
Data on competitors such as new products and services, pricing strategies,
strengths and weaknesses of existing product lines, packaging, marketing
and distribution methodology- is important.
Knowing what the competitors are doing or are likely to do is helpful in
designing new products and services, and marketing an existing product
line.
Competitive data on competitors can be obtained from their marketing
materials, brochures, sales promotions, and the web.
The process of obtaining competitive market information is termed as
marketing intelligence.
Information on the target market of a farm’s product is also important.
314
Product Development
Product development is the second marketing module involved in the "front
end" of production. The product development function is to translate consumer
preferences (from the marketing research module) into general product
specifications, which are refined into detailed product design and material
specifications by the engineering section.
It is the responsibility of the product development section to provide
information about the legality, exclusivity (patent rights), competition (similar
products), performance, appearance, reliability, customer benefits and company
benefits of a proposed product. Although many of the inputs required to generate
this information come from external sources - patent right information, for example
- many others are made available by other MIS subsystems or modules; the
engineering module of the production subsystem provides product performance and
reliability data; the marketing research module can provide consumer reaction to
the appearance of the product; the finance subsystem can furnish data on the
profitability of similar products; and so on.
The primary outputs of the product development module are specifications for
new products Specifications developed by marketing personnel are concerned more
with product attributes than with design characteristics. For example, product
design may specify that a portable hair dryer be hand held, fold to fit in a 6" by 8"
by 3" case, have variable fan and heat controls, use no more than 1,000 watts of
electricity, and cost less than Rs.800 to produce in quantities of 100,000 or more.
An artist's conception of the finished product may accompany the specifications.
These specifications may be changed to accommodate the working mechanisms,
materials, and assembly processes proposed by engineering. The exchange of
information between product development and engineering is particularly important
when several products are under development concurrently or products require
may cycles between these two sections. Graphic representations and the technology
for producing them, which are characteristic of DSS, are very helpful in both
product development and engineering.
Pricing
The role of the pricing module is to fix an appropriate price for each product
made by the firm. In micro economic theory, prices are determined in the
marketplace and cannot be controlled by the seller alone In practise, however, the
underlying economic assumptions (rational behaviour by consumers, perfect
competition on product differentiation, and so on) are not met, and the seller has
considerable say in sew price- Advertising, in particular, permits variances from the
market price by modifying consumer for a particular brand.
Puce are based on marketing research output on public opinion, the prices of
competitive products, anti the costs of production (from the production subsystem).
The processes used to determine price can lac as simple as a percentage markup on
costs, or they may be based on a simulation of profit for various prices under
315
Reports generated by the marketing MIS can help marketing mangers make
good sales decisions. Refer figure 22.5.
The sales-by-product report lists all major products and their sales for a
period, such as a week or month. This report shows which product is doing
well and which ones need improvement or should be discarded altogether.
The sales-by-salesperson report lists total sales for each salesperson for a
period, such as a week or month. This report can be subdivided to include
products sold by each salesperson.
The sales-by-customer report lists sales for each customer for a period,
such as a week or month. This report can be used to identify high and low-
volume customers
Sales Management
The entire marketing effort ultimately culminates in sales, and the success or
failure of marketing is often (unjustly, perhaps) attributed to sales personnel. In a
typical manufacturing firm, where products are not sole directly to-consumers, the
sales personnel deal with the purchasing agents of other organizations and must
rely more on a technical and professional knowledge of their products than on the
stereotyped “sales pitch” frequently associated with consumer products.the sale of
industrial products is much more compatible with an MIS sales management
module. Sales managemnt is less open-ended than some other modules, but it is
still subject to budget control and receives, from the financ subsystem, a sales
budget input. Othe inputs includde the plans for promotion of each product and
sales estimate order ( from the sales force)
As usual, budget constraints on the input side must be complemented by
appropriate outputs. l,tt this case, the actual cost and volume of sales complete the
information needed for management control. The processing implied.by the budget
is relatively simple; expenditure, balances, and projected surpluses x deficits are
computed for various accounts, and the results are conveyed to managers via
reports. Another important output of the sales management module is a projection
of the sales volume for ssequent periods. Such projections often become the basis
for organizational objectives, which may come back to haunt the sales management
section. Overly optimistic projections cannot be met, and overly pessimistic ones
reflect badly on the ability and/or the integrity of the manager who submits them.
The techniques of developing sales projections range from the purely intuitive to the
highly mathematical. Although there is much to be said for intuition, experience,
"gut feelings," and other intangibles, they are sat be found in the MIS data base or
application base. Instead, MIS can assist in projections of this type through
multiple regression analysis, simulation, exponential smoothing, and other
management science bols of forecasting. Economic conditions, historical sales data,
performance evaluation of salespersons, rind the promotion budget can all be
incorporated into predictive models. And if Bayesian analysis is there are even ways
to combine a manager's subjective, intuitive estimates with empirical data.
317
Table 22.1 shows that information systems are used in sales and marketing in
a number of ways. At the strategic level, sales and marketing systems monitor trends
affecting new products and sales opportunities, support planning for new products
and services, and monitor the performance of competitors. At the management level,
sales and marketing systems support market research, advertising and promotional
campaigns, and pricing decisions. They analyze sales performance and the
performance of the sales staff. Knowledge-level sales and marketing systems support
marketing analysis workstations. At the operational level, sales and marketing
systems assist in locating and contacting prospective customers, tracking sales,
processing orders, and providing customer service support.
Table 22.1 Examples of Sales and Marketing Information Systems
System Description Organizational Level
3) http://study.com/academy/lesson/applications-of-management-information-
systems-mis-financial-marketing-manufacturing-human-resources.html
4) http://elearning.vtu.ac.in/17/e-Notes/12MBA15/Unit5veena.pdf
22.9. ASSIGNMENTS
1) Discuss how marketing information system assist marketing managers in e-
commerce, product development and customer relationship.
2) What are the three types of input subsystems that exists in an information
system for a business area?
22.10. REFERENCES
1) James A O’Brien, George M. Marakas and Ramesh Behl, “Management
Information System”, Ninthedition, Tata McGraw Hill Education Private
Limited, New Delhi., 2010.
2) Kenneth C. Laudon and Jane P. Laudon, “Management Information System”
Tenth Edition, PHI Learning Private limited, New Delhi, 2008.
3) Raymond Mcleod, Jr and George P. Schell, “Management Information System”
Tenth Edition, Pearson Prentice Hall, New Delhi, 2009.
22.11. LEARNING ACTIVITIES
Draw a diagram of an information system for your college or university. Use
the format of input subsystems, databases and output subsystems. Hint: In
specifying the output subsystem, identify information that would be of interest to
the users-members of the university or college administration.
22.12. KEYWORDS
Marketing information system
Marketing Intelligence System
Marketing mix
Order processing
Pricing
Product development
Promotion.
321
LESSON - 23
PRODUCTION SYSTEM AND ACCOUNTING SYSTEM
23.1. INTRODUCTION
A management information system that is targeted for use any
where production is taking place. Modern management information systems are
generally computerized and are designed to collect and present
the data which managers need in order to plan and direct operations within
the company. Production involves the conversion of resource inputs into goods and
service outputs. Automobile manufacturers cover labour, capital, and raw material
into finished automobiles. Law firms "produce" legal services with the time and the
progression expertise of their partners. And military units provide national security
using labour, ships, tanks, aircraft, and other military hardware. Although these
examples show that a production function can be identified in a variety of
organizations, it is more common to think of production in terms of the manufacture
of goods. The study of accounting information systems (AISs) is, in large part, the
study of the application of information technology (IT) to accounting systems. This
chapter describes the ways that information technology affects financial accounting,
managerial accounting, auditing, and taxation. Answering the question ‘‘what are
accounting information systems’’ and then look at some new developments in the
field. Following this, we will examine some traditional roles of AISs in commerce.
23.2. OBJECTIVES
After reading and studying this lesson you should be able to:
Understand the concept of production system.
Describers the material requirement planning.
Discuss the operations of shipping and receiving.
Be able to distinguish between such terms as ‘‘systems,’’ ‘‘information
systems,’’ ‘‘information technology,’’ and ‘‘accounting information systems.’’
Learn how information technology (IT) influences accounting systems.
23.3. CONTENTS
23.3.1. The Production Subsystem
23.3.2. Material Requirements Planning
23.3.3. Management Activities in Production
23.3.4. Accounting Information Systems
23.3.5. Subsystems of Accounting Information System
23.3.1. THE PRODUCTION SUBSYSTEM
Manufacturing involves a number of activities not typically found in the
production of services inventory management, for example and will serve as a more
complete example of the production function. A diagram of the production
subsystem of an MIS for a manufacturing firm is shown in Figure 23.1.
Production Subsystem Modules
Modules in the production subsystem reflect the organizational structure of
the production department in the same manner as the subsystems reflect overall
322
Although these reports are shown as documents in Figure 23.1 quality information
is also furnished in more immediate form, verbally or by a mechanical signal, when
deviations from quality standards require the cessation of production operations.
Obviously, a manufacturing process cannot be permitted to continue out of control
during the time it takes to prepare and deliver a printed report, it must be corrected
as soon as possible after the problem is detected. The exact method of altering
operations personnel to quality discrepancies varies with different manufacturing
processes and products. Some Japanese manufacturing firms have installed pull
cords at work stations that permit any employee who discovers a quality problem to
signal for the shutdown of the manufacturing process.
Many operations inputs are actually transaction data and reflect basic
activities such as the consumption of materials, labour time, machine time, and
quantities of output. at makes the inputs somewhat unusual in operations is the
variety of data collection devices that may be employed. Sensors that record the
starting and stopping of machines, special purpose terminals that log in the arrival
and departure of employees, scanners that. measure raw material usage, counters
that record the volume of output, and similar devices are commonly used to collect
data in operations.
Classification, summarization, computation, and other TPS• and MIS process
convert operational data into management information that is used throughout the
MIS. For example, information on resource consumption is made available to
finance for cost accounting purposes, employee activities are reported to personnel
for the payroll, finished goods production is reported to shipping and receiving so
that orders may be filled, and so on. One of the more important outputs is not
based on transaction data but is prepared on the basis of resource availability and
marketing input; the master production schedule, which is used-internally for
scheduling operations and in the MRP module for planning material requirements.
Engineering
The engineering section - whether included in the production department, as
it is in this model, or organized as a separate department, as it is in many large
manufacturing firms - is chiefly responsible for the design of the product and the
production facilities. Engineering works closely with marketing in product design
and with other sections in the production department, notably operations, in
facility design. Engineering, especially when it has a research and development
function, can be a very expensive activity if not closely controlled. Budget in puts
are particularly important to engineering for this reason. Other than the budget
and the product specifications developed in the marketing subsystem, the
engineering module receives few MS inputs. More likely, the engineering section will
depend on environmental inputs relating to new developments in materials, health
and safety standards, and basic research. Also, many engineering data are
generated internally through product and materials testing.
The complexity of the processes found in engineering applications and the
increased likelihood of external data suggest the use of derision support systems
rather than MIS. DSS, or, at least, DSS technology - microcomputers. Mathematical
324
models, independent data bases, graphics displays, and the like - is used
extensively in engineering, but marry MS implications remain. The bill of materials
used by the MRP module is engineering based, as are the product design followed
by operations and the standards used in quality control. Although engineering may
use independent hardware for many internal applications, it is still possible,
through data communications, to make engineering available to other modules and,
in turn, to use MIS applications and/or data for DSS applications in engineering.
Shipping and Receiving
The dominant CBIS activity in the shipping and receiving section is
transaction processing MIS module is interesting nonetheless for its interface with
two enormously important environmental elements; vendors and customers. The
vendors are the suppliers of the raw material, components and subassemblies used
to manufacture finished products, and the customer, of course, are those finished
products. The customers of a manufacturing firm may be wholesalers, retailers or
other manufacturers and should not be confused with consumers, who are the
ultimate users of manufactured goods.
In the absence of a separate inventory module in this model, we will assume
that data on the inventory of both materials and finished goods are maintained by
shipping and receiving. Inventory applications require inputs on the addition of raw
materials (from receiving) and finished operations (from operations) as well as on
the consumption of raw materials (by operations) and the shipping of finished
goods (to customers). Because this model incorporates on MRP module, some of the
more traditional inventory processes - the computations of EOQ, for example - are
not required. The very important MRP input of inventory status replaces traditional
inventory reports and is a major output of this module.
Two additional inputs to the shipping and receiving module are the shipping
instruction from the finance subsystem and invoices from vendors. Shipping
instructions give the authority to ship finished goods to customers, after billing
actions have been initiated in finance, and invoices are notification that raw
materials or other physical resource inputs are in transit to the manufacturer.
Other outputs of the shipping and receiving module include invoices from the
manufacturer (which advise customers that goods have been shipped) and due-out
notices( which inform customers of temporary delay in shipping).
The processing in these other shipping and receiving applications reflects the
transaction processing orientation and consists largely of data maintenance. In
particular, data on unfilled orders, for which due out notices have been sent, must be
maintained to ensure shipment when the inventory is replenished. Other data, such
as the description and quantity of the goods shipped and received, are important to
certain financial application. Although the TPS processes in the shipping and
receiving module like those elsewhere, can be carried out in any data management
environment, the dependence of MIS applications on the timeliness and the
availability of these data require data they be stored and maintained in the database.
325
Purchasing
The purchasing function in this model appears to be just an extension of MRP_
Indeed, all of the internal inputs to purchasing shown in Figure 23.1 are MRP
outputs; order release notices planes orders and rescheduled orders. These inputs
are processed into purchase orders issued to the materials or components used in
production. But purchasing agents, in order to make intelligent decisions
concerning the choice of vendors, must also have data on the type, quality, price,
delivery availability of raw materials offered by various vendors. These data are not
normally found in the MIS data base; they must be provided by the user from
external sources. This is another situation in which a decision support system may
be more appropriate than an MIS.
Quality Control
Quality Control (QC) ensures that materials, work in process, and finished
goods meet acceptable standards of quality. Although quality control is part of the
production subsystem in this model, care must be exercised to avoid any conflict of
interest between QC, which measures quality, and operations, which is responsible
for quality; To a lesser extent, QC is also kept at arm's length from engineering,
which may have some responsibility for establishing the standards against which
quality is measured.
'Inputs to quality control from the MIS include only the quality standards.
However, as in some other modules we have discussed, there may be decision
support applications. In this case, DSS models may be used to develop sampling
plans for selecting items to be inspected, simulating the cost of various inspection
plans for hypothetical quality levels, and performing statistical analyses on the
results of quality inspections.
Output from the QC module is in the form of quality reports, with the
provision, as noted earlier, that some more expeditious means may be necessary to
call serious quality control problems to the attention of operations managers.
Inputs to the Manufacturing MIS
Strategic plan or corporate policies.
The TPS:
Order processing
Inventory data
Receiving and inspecting data
Personnel data
Production process
External sources
Manufacturing MIS Subsystems and Outputs
Design and engineering
Master production scheduling
Inventory control
Manufacturing resource planning
Just-in-time inventory and manufacturing
Process control
Computer-integrated manufacturing (CIM)
Quality control and testing
327
Figure 23.2 suggests that accounting information systems (AISs) stand at the
crossroads of two disciplines: ‘‘accounting’’ and ‘‘information systems.’’ Thus, the
study of AISs is often viewed as the study of computerized accounting systems. But
because we cannot define.
Definition: An accounting information system is a collection of data and
processing procedures that creates needed information for its users.
Accounting
You probably have a pretty good understanding of accounting subjects
because you have already taken one or more courses in the area. Thus, you know
that the accounting field includes financial accounting, managerial accounting, and
taxation. Accounting information systems are used in all these areas—for example,
to perform tasks in such areas as payroll, accounts receivable, accounts payable,
inventory, and budgeting. In addition, AISs help accountants maintain general
ledger information, create spreadsheets for strategic planning, and distribute
financial reports. Indeed, it is difficult to think of an accounting task that is not
integrated, in some way, with an accounting information system.
The challenge for accountants is to determine how best to provide the
information required to support business and government processes. For example,
in making a decision to buy office equipment, an office manager may require
information about the sources of such equipment, the costs of alternate choices,
and the purchasing terms for each choice. Where can the manager obtain this
information? That’s the job of the accounting information system.
AISs don’t just support accounting and finance business processes. They often
create information that is useful to non-accountants—for example, individuals
working in marketing, production, or human relations. Figure 23.2 provides some
examples. For this information to be effective, the individuals working in these
subsystems must help the developers of AIS identify what information they need for
their planning, decision making, and control functions. These examples illustrate
why an AIS course is useful not only for accounting majors, but also for many non-
accounting majors.
Information (versus Data)
Although the terms data and information are often used interchangeably, it is
useful to distinguish between them. Data (the plural of datum)are raw facts about
events that have little organization or meaning—for example, a setoff raw scores on
329
Fig. 23.3
Transaction Processing System
The TPS is central to the overall function of the information system. It
converts economic events into financial transactions, records financial transactions
in the accounting records (journals and ledgers), and distributes essential financial
information to operations personnel to support their daily operations.
The TPS deals with business events that occur frequently. In a given day, a
firm may process thousands of transactions. To deal efficiently with such volume,
similar types of transactions are grouped together into transaction cycles. The TPS
consists of three transaction cycles: the revenue cycle, the expenditure cycle, and
the conversion cycle. Each cycle captures and processes different types of financial
transactions.
331
End Users
End users fall into two general groups: external and internal. External users
include creditors, stockholders, potential investors, regulatory agencies, tax
authorities, suppliers, and customers. Institutional users such as banks, the SEC,
and the Internal Revenue Service (IRS) receive information in the form of financial
statements, tax returns, and other reports that the firm has a legal obligation to
produce. Trading partners (customers and suppliers) receive transaction oriented
information, including purchase orders, billing statements, and shipping
documents.
Internal users include management at every level of the organization, as well
as operations personnel. In contrast to external reporting, the organization has a
great deal of latitude in the way it meets the needs of internal users. Although there
are some well-accepted conventions and practices, internal reporting is governed
primarily by what gets the job done. System designers.
Accounting and Finance Subsystems Modules
One of the most obvious ways in which the, finance department becomes
involved in the activities of others departments is through the administration of the
budget, a fact represented by the manner in which the budget module overlaps all
four subsystems. Other finance modules, shown in figure 23.5, include-cost
accounting, funds management, financial accounting accounts receivable, and
accounts payable.
Budget
The budget provides control over an organization's financial resources, and
because other resources can be expressed. in monetary terms, the budget is a
control measure over those resources as well. The budget is also a planning tool - a
means of implementing plans by allocating, resources (or the funds to acquire
resources) to various activities in the organization for specific purposes. A plan to
introduce a new product, for example, is implemented by a budget (and other
directives)authorizing funds for research and development, the acquisition of new
equipment and material, the hiring and training of production personnel,
promotional campaigns, and so forth.
Budgeting, is a cyclical process that starts with budget guidance from ,top
management. The various profit centers in the organization then submit projected
costs and incomes for the coming budget period. These inputs are refined during
budget preparation as both the budget guidance and the expectations of functional
managers are modified to approach a common level. As shown in figure 23.5.
inputs to this process are both -internal (in the form of historical data) and external
(environmental data).
The development of a budget involves some unstructured decision making,
particularly on the part of top management. Electronic spread sheets ,can be of
assistance in the budgeting process. The development of income and cost
projections may require forecasting model. The capacity may be provided by a DSS,
although the recurring nature of the budget process may lead to the incorporation
333
of such models into the MIS. The remaining processes by. which data are
exchanged between those who ,formulate guidance and those who prepare the
projections, and by which the budget document itself is -prepared are largely a
matter or record keeping and report generation. In large organizations, however, the
sheet volume of the data associated with the budget can make even these routine
functions a challenging MIS application.
Although budgets are prepared and distributed as documents, they dynamic
nature of the budget requires that it be maintained in the data base, where it is
available to both planners and users. Planners must have the capability, of
modifying the budget as environmental conditions change, and users must have
access to the current .Status of their accounts.
Cost Accounting
In financial control, the budget provides projected data, whereas actual data
are furnished by the cost accounting module. As noted earlier, not all resource
expenditures are measured in monetary terms, and some control over labour;
machine time, and raw materials, for example - is exercised outside the finance
subsystem. 'Even these resources expenditure, however, are converted to dollar
amounts and .serve as input data to the cost accounting module.
Process in cost accounting involves the maintenance of cost data and the
comparison of actual costs to standards. For example, if the standard .time for
performing a certain job is 3 hours at a standard wage of Rs. 6,50 an hour, an
actual, time of 3 1/2 hours would result in a labour variance of (Rs.6.50x3)- (6 X
3.5), or - Rs.3.25. If the criteria for an exception report is 10 percent over standard,
this particular performance, which is (3.5-3)/3, or 16.67 percent, over standard,
would be called to the attention of management: for eorrecti.ve action. Although
this example results in a negative variance, management should, also be made
aware of large positive variances, which might indicate inappropriate standards, an
unexpected learning curve effect, or an unusually. efficient operation that could be
adopted in other areas.
Funds Management
Another financial module with close ties to budgeting is funds management.
The purpose of funds management is to ensure that funds will be available to meet
the financial obligations of the organization while at the same time maximizing the
returns on invested funds not needed to meet current obligations.
Funds management, also referred as capital budgeting, is an upper level
management activity in an organisation and, not unexpectedly, relies heavily on
data from external, as well as internal, sources. External data for these applications
come primarily from the financial community: investment opportunities, interest
rates, bond ratings and so on. Internal data center on projected sources (interest
and dividends on investments, accounts receivable due, wages, accounts payable,
and so on) of funds.
334
Financial Accounting
The classification, recording, and summarization of monetary transactions is
referred to as financial as opposed to managerial - accounting. Although there is
some management information generated in financial accounting, the primary
purpose is to paint a financial picture of the organization for investors and creditors
and to satisfy legal requirements. This is in marked contract to a purely managerial
activity such as cost accounting, although financial and cost accounting may share
certain input data.
Monetary transactions, receipts and expenditures of funds are made available
to the financial accounting module through the data be and are maintained in
journals. Periodically, journal data are used update basic financial statements,
such as the balance sheet and the income statement. The processes involved in the
preparation of these statements rarely go beyond simple calculation and report
generation.
Although the accounting department is a traditional computer user,
accounting applications have art somewhat constrained by long-standing
"Generally Accepted Accounting Principles" (GAAP), some of which can be traced
back to the fifteenth century? One particular problem facing automated accounting
s the need for an audit trail to back up accounting entries. Random access files and
data bases are particularly difficult to audit, and in many cases, processing and
storage efficiencies must be sacrificed for compliance with GAAP.
Billing
The billing module receives input in the form of sales data (orders) from the
marketing subsystem a d sets in motion the process of filling those orders and
obtaining payment for them. The first step in this process involves a credit check
that compares the amount of the order with the limits imposed when the accounts
was established and modified by account status feedback from the accounts
receivable module, if credit can be extended, the order is further processed to
generate output for the customer, the accounts receivable module, and the
production subsystem. The customer receives a statement containing the amount
and terms of the payment due; similar data are provided the accounts receivable
module, and slopping instructions are sent to shipping and receiving module of the
production subsystem.
Billing is essentially a transaction processing activity, although some routine,
structured decisions such as the approval of credit) are made. Management
information based on billing data is more likely to be reflected in reports from other
modules - accounts receivable, for example - than from the billing module itself.
Accounts Receivable
The accounts receivable module is a logical extension of the billing module. At
the transaction - processing level, inputs from the billing module are added to a
customer's accounts balance, and payments are subtracted. Outputs from
accounts receivable include sales income data for budgeting and financial
accounting as well as account status feedback to billing.
336
At the MIS level, accounts are analyzed to provide information used in the
determination of credit ratings and payment terms. For example, if an analysis
shows that very few customers are taking advantage of discounts for early payment,
consideration should be given to increasing the discount. Simulation or other
techniques of financial analysis can weigh the loss of income from discounts
against the benefits of receiving early payment and can help financial managers to
make the discount decision. In the case of decisions regarding discounts, the MIS
analysis is subject to modification on the basis of external data that are not found
in the MIS data base, general economic factors affecting payment, the discounting
practices of competitors, and current interest rates. Other analyses classify
accounts by risk, age accounts by their due dates, or compute ratios for turnover
and collection.
Accounts Payable
The accounts payable module is the "cost counterpart" of the accounts
receivable module. The purpose of accounts payable is to pay vendors for the
materials ordered by the production subsystem and to settle other payable
accounts - except the payroll - in the organization. For simplicity, only payments for
materials are shown in Figure 23.5.
Payments are made on the basis of statement or invoice data entered into the
data base by the shipping and receiving module of the production department, or
on receipt of the material, depending on payment terms. The timing of payments is
also influenced by discounts and the availability of funds Discounts, such as "2-10,
net 30" (which means, "2 percent discount if paid within ten days, or the full
amount if paid between eleven and thirty days"), are usually taken if funds for the
budget period have not been expended or can be made available from other
sources.
Accounts payable is also a good example of how legal requirements and
generally accepted accounting practices complicate an MIS. Although payment data
can be stored almost definitely in electronic media in relatively little physical space,
state statutes of limitations require the maintenance of canceled checks for an
average of six years. This is just one example of the legal requirements for retaining
records that influence many modules within an MIS.
Order Processing
Captures and processes customer orders and produces data for inventory
control and accounts receivable.
Inventory Control
Process data reflecting changes in inventory and provides shipping and reorder
information.
Payroll
Records employee work and compensation data and produces paychecks and
other payroll documents and report
337
General ledger
Consolidates data from other accounting systems and produces the periodic
financial statements and reports of the business.
The Role of the Accountant
The different roles that accountants play with regard to the information system
are
1) Accountants as users must decide what information must be collected, how it
must be processed, and how it must be reported.
2) Accountants as systems designers must work with computer professionals in
designing the conceptual system while the computer professionals handle the
physical system. Keep in mind that the AIS is the custodian of the
accountant’s data and the processor of his or her information. The AIS cannot
be ignored.
3) Accountants as auditors must form opinions of the fairness of a company’s
financial statements. In recent years the profession has broadened this attest
function. Assurance services include traditional auditing but are also
concerned with the quality of information used by decision makers. Formation
of that opinion is dependent on the auditor’s ability to evaluate the accounting
system and have confidence that its output is reliable. IT auditing is
performed as part of the financial audit to determine the integrity of the
organization’s information system. Internal auditors are employees of the
organization.
Inputs to the Financial Information System
Strategic plan or corporate policies
Contains major financial objectives and often projects financial needs.
Transaction processing system (TPS)
Important financial information collected from almost every TPS -
payroll, inventory control, order processing, accounts payable,
accounts receivable, general ledger.
External sources
Annual reports and financial statements of competitors and general
news items.
Financial MIS Subsystems and Outputs
Financial subsystems
Profit/loss and cost systems
Auditing
Internal auditing
External auditing
Uses and management of funds
Management Activities in Finance
Operational control is concerned with tasks. In finance, those tasks include
preparing billing documents, recording receipts, and making payments.
338
Cost reports
balance sheet, statement of cash flows, tax returns, and other reports
required by law; and(3)the management reporting system (MRS), which
provides internal management with special-purpose financial reports and
information needed for decision making such as budgets, variance reports,
and responsibility reports.
23.5. INTEXT QUESTIONS
1) What is production information system?
2) Define accounting information system.
3) Explain the management activities in finance.
23.6. SUMMARY
Computer based manufacturing information system help a company achieve
Computer integrated manufacturing (CIM) and thus simplify automate and
integrate many of the activities needed to quickly produce high quality products to
meet changing customer demands .manufacturing resource planning system help
plan the types of resources needed in the production process. Manufacturing
execution system monitors and controls the manufacturing of products on the
factory floor through shop floor scheduling and control system, controlling the
physical process, a machine tool or machines with some humanlike work
capabilities. Accounting information system record, report, and analyze business
transaction events for the management of the business enterprises. Six essential
accounting system including order processing, inventory control, accounts
receivable, accounts payable, payroll and general ledger. Information system in
finance supports manager in decision regarding the financing of a business and the
allocation of financial resources within a business.
23.7. TERMINAL EXERCISE
1) Discuss the subsystems of production information system.
2) Discuss the subsystems of accounting information system.
3) Explain the role of accountant regard to information system.
23.8. SUPPLEMENTARY MATERIALS
1) Cheney, Glenn. ‘‘Are Auditors Patriot Act Ready?’’ Accounting Today Vol. 21,
No. 22 (December 17,2007), p. 14.
2) Coustan, Harvey, Linda M. Leinicke, W. Max Rexroad, & Joyce A. Ostrosky,
‘‘Sarbanes-Oxley: What it Means to the Marketplace’’ Journal of Accountancy
(February 2004), pp. 43–47.
3) Hannon, Neal J., ‘‘The Lead Singer Gets a Chorus,’’ Strategic Finance, Vol. 87,
Iss. 11 (May 2006),pp. 59–60.
4) http://www.businessdictionary.com/definition/manufacturing-information-
system.html#ixzz3Zqj1UOiY
23.9. ASSIGNMENTS
Take a survey of the students in your class to find out what jobs their parents
hold. How many are employed in manufacturing? How many are employed in
service industries? How many could be classified as knowledge workers?
340
23.10. REFERENCES
1) James A O’Brien, George M. Marakas and Ramesh Behl, “Management
Information System”, Ninthedition, Tata McGraw Hill Education Private
Limited, New Delhi, 2010.
2) Kenneth C. Laudon and Jane P. Laudon, “Management Information System”,
Tenth Edition, PHI Learning Private Limited, New Delhi, 2008.
3) James A. Hall, “Accounting Information Systems”, Eight Edition, South-
Western, Cengage Learning, 2013.
23.11. LEARNING ACTIVITIES
Hiring an employee and taking a sales order are business activities but are not
accounting transactions requiring journal entries. Make a list of some other
business activities that would not be captured as journal entries in traditional AIS.
Do you think managers or investors would be interested in knowing about these
activities? Why or why not?
23.12. KEYWORDS
Accounting information system
General Ledger
Inventory control
JIT
Management reporting system
Manufacturing information system
Material requirements planning
Order processing
payroll
Quality control
Shipping.
341
LESSON – 24
INVENTORY CONTROL AND HUMAN RESOURCE INFORMATION
SYSTEMS
24.1. INTRODUCTION
The inventory control system is a database used to describe in detail the
products sold by a company. A transaction history file is maintained automatically
so that detailed review of the receipts and shipment of products is available
throughout the system Minimum Stock Point, Order Point, and Maximum Stock
Point can be automatically computed based on various sales usage averaging
formulas, thereby reducing investment in Inventory Stock while reducing out of
stock and dead stock conditions. Various reports ranging from a master listing, to
different price lists, stock labels, valuation reports and reorder/overage reports are
available. Price files, supplied by your vendors/manufacturers, can be used to
automatically upload price/cost changes into the Inventory database. The effective
management of human resources in a firm to gain a competitive advantage in the
marketplace requires timely and accurate information on current employees and
potential employees in the labor market. With the evolution of computer technology,
meeting this information requirement has been greatly enhanced through the
creation of HRIS.
24.2. OBJECTIVES
After reading and studying this lesson you should be able to:
Understand the concept of inventory information system
Describers the types of inventory reports.
Explain the purpose and nature of an HRIS as well as the differences
between the types of information systems functionality in an HRIS
Discuss how the information from an HRIS can assist in decision making in
organizations
24.3. CONTENTS
24.3.1. Inventory Management
24.3.2. Reports
24.3.3. Physical Counting
24.3.4. Human resource information system
24.3.5. Why Do We Need HRIS?
24.3.6. Model of an Organizational System Centered on HRIS
24.3.7. Designing of MIS for Attendance Capturing & Recording System
24.3.1. INVENTORY MANAGEMENT
1) Inventory management systems allow you to manage your stocks on a
quantity and value basis, plan, enter and check any goods movements and
carry out physical inventory.
342
Miscellaneous
The verify inventory data program is a maintenance program to ensure
internal data integrity in the Inventory database.
The increase prices/cost program is used to make changes(increase or
decrease) in either selling price or latest cost by either a flat fixed amount,
or a percentage.
The recompute stocking controls program automatically recomputed the
minimum, buy point ,and maximum based on pre-established averaging
formulas for a selected range of parts.
The change part id program is a maintenance program used to change a
Part ID throughout the entire system.
The purge inventory part file program is a maintenance program used to
remove parts from the Inventory database.
The purge inventory history program deletes old Inventory History records
from the system. Usually, six month’s worth of history is adequate to
provide automatic stock controls (minimum, buy point, maximum)
computation.
The price file upload menu provides access to a third level menu of Price
File Upload Menu programs.
Setup Part File
The establish product type codes program is used to assign a new
Product Type code to selected part records. It also assigns the G/L
Accounts based on the defaults established in the icTypefile editor as per
the new Product Type code assigned.
The establish manufacturer codes program is used to assign a new
Manufacturer code to selected part records
The establish g/l account defaults program is used to assign the
G/LAccounts for selected part records based on the defaults established in
the icType file editors
The establish preferred vendor program is used to assign a new Preferred
Vendor code to selected part records
The establish discount tables program is used to clone an existing
Quantity Discount Pricing Table from an established Part onto other
selected parts.
The establish stock formulas program is used to assign a Stock Formula
to selected warehouse quantity records
The roll subcost into master program is used to recalculate the current
Average, Latest, and Book Cost for a master part record based on the costs
of its Sub-Assembly Table. This program is used to periodically correct cost
figures on master/kit parts based on more recent costing information in the
subassembly parts.
The roll average cost to book cost program is used on a yearly basis, after
the year end Inventory Valuation has been computed and finalized, to
roll the current Average Cost into the Book Cost field. This is a common
method for setting aside a Last In First Out (LIFO) cost figure in preparation
for the next year end valuation.
345
File Editors
File editors provide low level access to the database for
programmer/system administrator use only.
The EDIT INVENTORY PART FILE program is used to add, change, view or
delete part records in the Inventory database
Each part is identified by a upto 15 character Part Id and can also be located
by its description. additional description lines are available ,along with non-
printing note lines for cross-reference or product sourcing information.
The Product Type code groups similar items into logical groups for
pricing/discounting considerations
Manufacturer is a three character code designating the manufacturer
and/or vendor which groups parts together for use in customer pricing
schemes and is also useful for sorting reports/listings by manufacturer
General Ledger asset, Sales and Cost of Sales account numbers are used to
produce daily and monthly invoice journals, and to update the General Ledger.
The Volume is used for converting quantity sold to common factor (for
example, cubic feet of gas per cylinder, pounds to tons).
The Multiplier is a pricing conversion factor used to convert between
stocking units and pricing units, (for example, sold by the pound, but
priced per ton).
The file includes List Price, along with average, latest cost and book cost
figures.
The MSdS Id indicates which Material Safety data Sheet is required for this
part. As Orders/Invoices are created, a customer’s MSDS file is
automatically monitored and updated as new MSDS sheets are triggered for
distribution.
The Vendor Part Id is a secondary index used to locate a part via the code
encrypted INVENTORY CONTROL SYSTEM in its barcode label.
Seven (7) Y/N flags are used to determine tax status, whole units versus
decimals, on-line editing options and pricing combination status
Stocking information for an unlimited number of stores and warehouses is
maintained, including the bin Location, quantities On Hand, available for
sale, Back Ordered (hard goods)/ Empty (cylinders), On Order from vendor,
Minimum, Buy Point and Maximum stocking levels
The Warehouse Quantity
Screen (located behind the master part screen) is used to interactively review
and/or adjust the stocking control factors.
Built-in controls exist for:
Averaging formula
Minimum days/quantity to stock
Buy point days/quantity to stock
Maximum days/quantity to stock
adopted the attitude that it is just as easy to maintain “hardcopy" files in the first
place and do not use computer files for personnel records. Privacy and freedom of
information requirements aside, personnel records require inputs on name, security
number, address, telephone number, pext of kin, training, education, age,
employment skills, job title, wage rate, and other similar data for every employee. In
addition to maintaining dating these data through normal transaction processing
methods, the personnel records module management reports summarizing relevant
information, such as an age or educational profile of Special reports may be used to
find "in-house" candidates for job openings = such as the b-al engineering example
cited at the beginning of this section on the personnel subsystem.
Training
In-house training in modem organizations can range from none at all to the
operation of college facilities Programs of instruction also vary greatly from very
specific, job-oriented skills to very management development programs. And much
training is conducted by outside agencies on a basis or simply by the
reimbursement of employees for educational expenses. For MIS purposes, we are
concerned not so much about the conduct of training but about the of training
information. The training activity is normally a profit center. That is, other
departments are "charged" for training services and have the option not to use them
or to go elsewhere for training. The training section is motivated to provide high
quality training at low cost and reasonable prices in order to show a profit. In this
context, training is like production or marketing or any other profit center and has
similar information needs.
The training module also has some unique MIS applications. Inputs are
received on purely training matters, such as job specifications, management
development requirements, contractual obligations to train or retrain employees,
employee qualifications and skill levels, and the availability of instructors and
training facilities. These data are used to develop and schedule programs of
instruction in almost the same way that the production subsystem develops
production schedules. In a DSS environment, some of the same scheduling
algorithms could be used for both applications. Outputs from the training module
include summary reports of training activities, detail reports for the updating of
personnel records, cost data for cost accounting, and projections of future
requirements for budget planning.
Payroll
The last module in this MIS module is also the first - or at least one of the first
- business data processing application; the payroll. You are probably already
familiar with payroll operations. The inputs consist of wage rates, hours of labour,
deductions, withholdings, and other similar data, from which pay is computed,
paychecks are printed, and reports are produced for state and federal tax agencies.
Although the computations of pay is largely a transaction processing activity, the
payroll represents so great a portion of the budget that even slight changes in pay
must be considered in financial planning. In this regard, analyses of the payroll to
352
show age, seniority, wage differentials, overtime, and other factors can be used to
determine the effect of wage demands during labour negotiations, the burden of
future retirement benefits, or the impact of changes in tax laws, such as a change
in the employer's contribution to social security.
24.3.5. WHY DO WE NEED HRIS?
Using HRIS gives firms several advantages (Beckers & Bsat, 2002). They
include the following:
Providing a comprehensive information picture as a single, integrated
database; this enables organizations to provide structural connectivity
across units and activities and to increase the speed of information
transactions (Lengnick-Hall &Lengnick-Hall, 2006)
Increasing competitiveness by improving HR operations and management
processes
Collecting appropriate data and converting them to information and
knowledge for improved timeliness and quality of decision making
Producing a greater number and variety of accurate and real-time HR-
related reports
Streamlining and enhancing the efficiency and effectiveness of HR
administrative functions
Shifting the focus of HR from the processing of transactions to strategic
HRM
Reengineering HR processes and functions
Improving employee satisfaction by delivering HR services more quickly and
accurately
The ability of firms to harness the potential of HRIS depends on a variety of
factors, such as
The size of the organization, with large firms generally reaping greater
benefits;
The amount of top management support and commitment;
The availability of resources (time, money, and personnel);
The HR philosophy of the company as well as its vision, organizational
culture, structure, and systems;
Managerial competence in cross-functional decision making, employee
involvement, and coaching; and
The ability and motivation of employees in adopting change, such as
increased automation across and between functions (Ngai&Wat, 2004).
24.3.6. A Model of Organizational System Centered on HRIS
The documentation and evaluation of HRIS development and
implementation are critical since we envision the effective functioning of any
organization as dependent on the effective management of its employees. The use of
computer technology to improve the management of employees is centered on the
creation and maintenance of an HRIS. Figure 24.6 depicts a model of an
353
critical to the efficient operation of an organization. Note that, if the HRIS were
removed, it would still be a model of organizational functioning. However, it is our
contention that an organization operating in accordance with this model would run
more slowly and less efficiently, and this could hurt its competitiveness in the
marketplace. Fourth, the HRIS and the HR program evaluation results, in terms of
HR metrics and cost-benefit results (value added and return on investment—ROI),
are in continual interaction. This emphasis is consistent with current thinking in
the HRM field (Cascio, 2000; Fitz-enz, 2000, 2002) and has generated the HR
workforce scorecard (Becker et al., 2001; Huselid et al., 2005). Finally, it is
important to note that the successful design, development, and implementation of
Other aspects of this model are important. First, all the factors in the external
environment will influence the internal functioning of the organization. The most
important of these factors is national culture. National culture will affect all the
factors in the external environment: government regulations, the labor market,
societal concerns, technology, HRM research, and competition. These factors, in
turn, will have an impact on the organization.
24.3.7. DESIGNING OF MIS FOR ATTENDANCE CAPTURING & RECORDING SYSTEM
The main objective of Attendance Recording System (ARS) is to ensure that
the attendance (i.e. presence or absence) of employees is accurately recorded and
reported for computation of payable days, overtime hours, festival allowances and
payable ESI contributions etc.
Responsibilities
Following are the responsibilities assigned at various levels in the
organization-
1) Employing Activity’s Responsibilities
2) Approving official’s Responsibility
3) Timekeeping Responsibilities
Employing Activity’s Responsibilities
Time keepers shall ensure that:
1) Worker’s shift punch times are according to shifts allotted by corresponding
department HOD.
2) The recording and approval of time and attendance are performed timely and
accurately as required by worker’s allotted shift.
3) All required supporting documentation is available for audit purpose.
4) Procedural guidance manual is clear and adequate to ensure that time
keeping are correctly performed.
5) All corrections and adjustments are in accordance with corresponding
department list provided by department HOD.
Approving official’s Responsibility
1) Normally, timekeeping responsibilities shall be assigned to individuals who
are aware of employee’s attendance and absence each day.
2) Timekeeper shall ensure that exceptions to the worker’s normal tour of duty
are recorded in a timely and accurate manner.
355
CP/IP (version 7.3.1). It describes the Machine No., location, memory used, status,
record no., and last update time. Captured data is to be load by using either
Windows 2000 or Telnet through the use of loader. When the captured data is to be
completely loaded then we requires to the processing of punched data. During the
processing of punched data the processed data is to be transferred in the database.
In the proper working of this system the Punch Card Reader machine, Auto
data Capture software, loader, Processing of punched data and transferring the
processed data into the database plays an important role. Firstly the employee
punched his card into the punching machine. The card is to be punched in the
machine according to the shift on which employee do work. Therefore the card is to
be punched in the time of shift started, lunch in, lunch out and when the shift
ended. The punching machine reads employees card no. and that particular time,
on which the card is to be punched. After that the whole data is captured by the
Auto Data Capture software that, describes machine number, on which the card is
to be punched, location, memory used, status, record no. and last update time. The
captured data is to be loaded by the loader. We can load captured data by using
either Windows 2000 or Telnet through the use of loader.
When the captured data is to be completely loaded then we requires to the
processing of captured data. For processing of punched data we need to give the
process start date i.e. the date of processing loaded data, process unit i.e. the unit
that is to be processed and process day of employee. After giving these values it
starts processing of punched data automatically. If in any date the data is not
exists then it displays a message that punched data is not available on that date. If
any employee punched his card more than one times instantly then it automatically
deletes double punched card. After processing of captured data it displays the
message that punched data processing have in completed. If there are any mistakes
in the processed data i.e. missing punched time etc. then it can be eliminated by
using missing punch correction form.
If missing punching exists in processed data then we required the transferring of
punched data. In the process of transferring the punched data we need to key in
payment day of employee, pay unit and the date of employee attendance. If the data is
to be not processed on that date then it does not transferred the data in the database.
It transferred whole data in the database. After transferring of processed data into the
monthly attendance database we can perform various operations on it i.e.
1) Getting daily attendance of employee according to their unit on which they are
working.
2) Getting attendance of employee in a range.
3) Getting monthly attendance of employee.
Reporting from the Designed MIS
The reports which are used by top management are generated from the
above MIS like Monthly Attendance, Card Replacement, Sick Report, and Monthly
Voucher Correction which are submitted to HR Manager and he takes proper
357
decisions related with Attendance Capturing & Recording. The proposed system has
following advantages:
1) Worker’s individual information is stored separately.
2) Searching of particular information became faster.
3) Generation of various reports made review processes.
4) Due to user friendly interface the matter became easy to understand.
5) Password oriented system increased security of data.
6) There are facilities of full database backup and central control of user.
7) Well-defined authorization and security levels.
8) The developed system is on-line.
9) Economical.
Management Activities in Personnel
Personnel operations are perhaps more dominated by operational control
activities than any of the other functions considered in this model. The tasks over
which operational control is exercised in personnel are those of maintaining
records, processing pay, and conducting training. Management control is exercised
over the very important human resources with which personnel activities deal,
primarily through hiring and the management of training resources - instructors,
equipment, and other facilities. At the strategic planning- level, top managers
establish policies and objectives for hiring, promotion, training, and other personnel
activities. And although labour negotiations are technically a task, the importance
and the long intervals between negotiations make them a strategic responsibility as
well. Examples of the information needs of personnel managers at the three
management activity levels are shown in Table 2.4.
Examples of Information Requirements in Personnel
Operational Management Strategic
Control Control Planning
Training schedules Training requirements Projected labour costs
Wage rates Labour costs
Pesonnel actions Personnel reports (Labour law)
Labour contracts
Labour markets
Training reports
(Privacy Acts)
(Freedom of
Information Acts)
24.4. REVISION POINTS
1) The inventory control system is a database used to describe in detail the
products sold by a company.
2) The edit inventory part file program is used to add, change, view or delete
part records in the Inventory database.
3) The stocking reports list the current Quantity On Hand, Available, and On
Order, along with the Minimum, Buy Point, and Maximum stocking level and
suggested Reorder Quantity.
358
4) The physical counting programs are a series of programs used to assist the
process of taking an offline physical inventory and reconciling the results
with the database figures.
5) The inventory master listing program lists all data associated with a
part including pricing, product type, G/L codes, current quantities, detailed
transaction history, stock control averaging formulas with minimum, buy
point and maximum
6) The inventory physical count program is used to produce additional copies
of counting sheets for a batch of selected parts if more than one person is to
be doing the counting. Note: since a given part could be located in multiple
places throughout a warehouse.
7) A HRIS is a software solution for small to mid-sized businesses to help
automate and manage their HR, payroll, management and accounting
activities. A HRIS generally should provide the capability to more effectively
plan, control and manage HR costs; achieve improved efficiency and quality
in HR decision making; and improve employee and managerial productivity
and effectiveness.
24.5. INTEXT QUESTIONS
1) What is inventory control system?
2) What are the components of human resource information system?
24.6. SUMMARY
Transaction processing systems are operations information systems that
process data resulting from business transactions. They involve the basic activities
of data entry, transaction processing, file and database processing etc. .Finance
and Accounting information system take care of inventory control, accounts
payable, receivable, budget and general ledger systems .Human resource
information system support for staffing, training and development, compensation
and performance appraisal .A model of organizational functioning centered on an
HRIS was discussed briefly, with the discussion focusing on how the feedback from
results generated by an HRIS can influence the operation of the entire organization
24.7. TERMINAL EXERCISES
1) Explain the Stocking Reports.
2) Discuss inventory control system.
3) What is required for the effective management of human resource in a firm to
gain a competitive advantage in the market place?
4) Explain the subsystem of HRIS.
24.8. SUPPLEMENTARY MATERIALS
1) Mohan ThiTe, Michael J. Kavanagh, and Richard d. Johnson, “Evolution of
Human Resource Management and Human Resource Information systems”
The Role Of Information Technology.
2) Information and management
3) International journal of information management.
359
24.9. ASSIGNMENT
What are the most important HR applications a company should offer to its
employees via a Web based system? Why?
24.10. REFERENCES
1) Cascio, W.F. (2000). Costing human resources: The financial impact of
behavior in organizations (4th ed.). Cincinnati, OH: South-Western
College.
2) Fitz-enz, J. (2000). The ROI of human capital: Measuring the economic value
of employee per formance. New York: AMACOM/American Management
Association.
3) Beckers, A.M., & Bsat, M. Z. (2002).A DSS classification model for research in
human resource information systems. Information Systems Management,
19(3), 41-50.
4) Huselid, M.A., Becker, B. E., & Beatty, R. W. (2005). The workforce scorecard:
Managing human capital to execute strategy. Boston: Harvard Business
School Press.
5) www.infonetx.com.
6) K.P. Tripathi (2011),” Role of Management Information System (MIS) in
Human Resource”, IJCST Vol. 2, issue 1, march 2011.
24.11. LEARNING ACTIVITIES
Case Study: Position Description and Specification for an HRIS Administrator
One way to assess the nature and importance of a particular function or
position in an organization is to examine the job description and job specifications
for this position, as they tell us what activities, duties, and tasks are involved in the
job as well as what knowledge, skills, and abilities (KSA) are required to perform the
job. The following is an actual advertisement for an HRIS administrator. A large
corporation placed this ad in the “Job Central” section of the Internet site for the
International Association for Human Resources Information Management
(http://ihrim.hrdpt.com/cgi-bin/a/searchjobs_quick.cgi, accessed July 10, 2010).
HRIS Administrator
Job Level: Senior (5+ Years), Full time.
Reports to: Sr. Director of Human Resources Operations.
Position Summary
MOMIRI, LLC is an Alabama Native Owned Corporation, providing shared
services to the MOMIRI family of companies and planning and incubating the next
generation of companies serving federal and commercial customers. MOMIRI
companies offer core expertise in telecommunications, information technology,
product development, major program management, open source software,
construction management, facility operations, and operations support. MOMIRI
companies realize that quality personnel are the key to our success. An excellent
benefits package, professional working environment, and outstanding leaders are
all keys to retaining top professionals.
360
Primary Function
The incumbent will serve as a key member of the HR Support Services
department and provide professional human resources support in specific functions
or disciplines to management and staff for the MOMIRI family of companies. This
position is viewed as going to a midlevel professional who assists management and
staff with HR programs at the tactical level and performs all essential duties and
responsibilities at the direction of the Manager of HR Operations.
Essential Duties and Responsibilities
1) Provides technical assistance to senior-level HR staff and management on
several HR programs to include employee relations, compensation, EEO
compliance, company policies and procedures, disability programs (STD, LTD,
FMLA, ADA), federal and state employment laws, and personnel actions as
needed.
2) Supports and maintains the Human Resources Information System (HRIS) in
addition to other systems supported by the management of enterprise
applications.
3) Serves as technical point-of-contact for assigned functional areas and assists
subject matter experts with ensuring data integrity, testing of system
changes, report writing and analyzing data flows for process improvement
opportunities.
4) Supports HRIS and other enterprise systems’ upgrades, patches, testing and
other technical projects as assigned.
5) Recommends process/customer service improvements, innovative solutions,
policy changes and/or major variations from established policy.
6) Serves as key systems liaison with other departments and process
stakeholders (e.g., Payroll).
7) Writes, maintains, and supports a variety of reports or queries utilizing
appropriate reporting tools. Assists in development of standard reports for on
going customer needs.
8) Maintains data integrity in ATS, HRIS, and other enterprise systems by
running queries and analyzing and fully auditing data across all HR
departments.
9) Conducts new hire in-processing to include systems training for new
employees and entering new employee information in Cost point.
10) Conducts termination out-processing to include entering employee separation
information in Cost point and reporting attrition data.
11) Develops user procedures, guidelines, and documentation for HR-related
systems. Trains system users on new processes/functionality.
12) Provides HR tools and resources for management and staff to accomplish
their goals and objectives.
13) Processes personnel actions (hires, terminations, pay & title changes,
promotions, Employment status, etc.) to include entering data into HRIS.
14) Assists with special HR-related projects and provides training to other staff
members as required.
361
362