Professional Documents
Culture Documents
MIS SUMMRY NOTES 2 final
MIS SUMMRY NOTES 2 final
MIS SUMMRY NOTES 2 final
Management :
Information
Information, in MIS, means the processed data that helps the management in planning,
controlling and operations. Data means all the facts arising out of the operations of the
concern. Data is processed i.e. recorded, summarized, compared and finally presented to
the management in the form of MIS report.
System
Data is processed into information with the help of a system. A system is made up of
inputs, processing, output and feedback or control.
Thus MIS means a system for processing data in order to give proper information to the
management for performing its functions.
Characteristics of MIS
When you base your decisions on data available from management information
systems, they reflect information that comes from the operations of your company.
Management information systems take data generated by the working level and
organize it into useful formats. Management information systems typically contain
sales figures, expenses, investments and workforce data. If you need to know how
much profit your company has made each year for the past five years to make a
decision, management information systems can provide accurate reports giving you
that information.
You can enter reduced staff levels or increased promotion budgets and see what
happens to revenue, expenses and profit for different levels of cuts or increases.
Management information systems systems play a critical role in making realistic
scenarios possible.
Any decisions you make result in changes in the projected company results and may
require modifications to your business strategy and overall goals. Management
information systems either have trend analysis built in or can provide information that
lets you carry out such an analysis. Typical business strategies include projections
for all fundamental operating results.
A trend analysis allows you to show what these results would be in the current
situation and how they will change once you have implemented the decisions you
have taken. The new values form the basis of your strategic approach going forward.
While you make your decisions with specific goals in mind and have the
documentation from management information systems and trend analysis to support
your expectations, you have to track company results to make sure they develop as
© Peter Kiveli Kabete National Polytechnic 8 of 83
planned. Management information systems give you the data you need to determine
whether your decisions have had the desired effect, or whether you have to take
corrective action to reach your goals. If specific results are not on track, you can use
management information systems to evaluate the situation and decide to take
additional measures if necessary.
Routine decision making means such decisions, which are taken in respect of the day to
day activities of the organization and which require less thinking and advice. These are of
a repetitive nature.
Basic decision making means such decisions that are essential for the existence of the
organization and for which complete study, analysis, power, and critical thinking are
essential.
The organizational or institutional decisions are which are taken by the executives or
officers in their formal capacity and which may be delegated to other persons.
When the size of the business unit is small and the decisions to be taken do not require
high, specific and technical knowledge, then the decisions for various problems are
normally taken by the managers himself.
Group decision-making techniques mean such decisions which are not taken by a
single individual, but by a group.
This is known as participating decisions that are known as individual decision making.
Policy decisions are those which relate to the basic policies of the organization and these
are taken by the top management or board of directors.
Programmed decision making is of repetitive and routine nature and which is taken
through some well decided and well-organized system, so that when the problem arises, it
may be solved by using that method.
types of decision making in management
Non Programmed decision making is not a routine or repetitive nature..
This decision making is based on traditional methods, and not on the predecided
procedure.
Decisions for which Advance preparation is done, are based on the collection of facts,
analysis and scientific methods are known as planned decision making.
Tactical decision making is of routine nature, related to the normal day to day activities
and is of relatively lesser significance.
For these decisions, the options are limited and do not require much analysis and
evolution.
This affects the future of the business and is related to the whole Organization.
In other words, these are the decisions, which are taken presently, but their primary effect
is observed after some time.
Organizational decision making means such decisions which are taken by the higher
authorities of the Institution and affect the whole organization or enterprise.
Departmental decision making is for those decisions which affect the operation of the
whole department of an enterprise and its employees.
To gain the maximum benefits from your company's information system, you have to
exploit all its capacities. Information systems gain their importance by processing the
data from company inputs to generate information that is useful for managing your
operations. To increase the information system's effectiveness, you can either add more
data to make the information more accurate or use the information in new ways.
Information systems help in planning and control.
senior manager
Strategic
level
Management
middle level managers level
Operational level
© Peter Kiveli Kabete National Polytechnic 11 of 83
operational level mgrs
i)THE T.P.S
It deals with e.g accounting transactions processing
wages and salaries
Employee data
Management
Payroll Payroll reports
system
master fm
Government documents
Employee cheque
TYPICAL TPS APPLICATION
document database
IB M
Disc storage
Maintran
ce
Image index
Online
Image LAN optical
workstation storage
Scanning
iii)MIS
workstation
Management Level Information Systems
For management level of an organization, two types of information systems
involved, which is Management Information System (MIS) and Decision Support System
(DSS).
Management Information Systems (MIS, information system at the management
level of an organization that serve the functions of planning, controlling and decision
making by providing routine summary and exception reports) serves the management
level of the organization, provides managers with reports and in some cases with on-line
access to organization’s current performance and historical records. Most of the systems
oriented almost exclusively to internal, not environmental or external events. MIS primarily
serve the functions of planning, controlling and decision making at the management level.
© Peter Kiveli Kabete National Polytechnic 13 of 83
Generally, they are dependant on underlying TPS for their data. MIS summarize and
report on the basic operations of the company. The basic data from TPS are compressed
and are usually presented in long reports that are produced on a regular schedule. Figure
3.3 shows how a typical MIS transforms transactions level data from inventory, production
and accounting into MIS files that are used to provide managers with reports. MIS usually
serve managers interested in weekly, monthly or yearly results – not day-today activities.
MIS generally address structured questions that are known well in advance but the
systems are not flexible and have little analytical capability. Most MIS uses simple
routines such as summaries and comparisons as opposed to sophisticated mathematical
models or statistical techniques. characteristics of MIS are:
MIS support structured decisions at operational and management control levels.
However, they are useful for planning purpose of senior management staff.
MIS are generally reporting and control oriented. They are designed to report on
existing operations and therefore to help provide day-to-day control of operations.
MIS rely on existing corporate data and data flows.
MIS have little analytical capability.
MIS generally aid in decision making using past and present data.
MIS are relatively inflexible.
MIS have an internal rather than an external orientation.
TPS
Order
Sales
processing
system data
Order file
Unit
Material production
resource cost
planning MIS REPORTS
MANAGER
Production systems
Production
Master file
change
General data
ledger
system
Expenses
Accounting
data
File
- Used both internal (TPS,MIS) and external data e.g stock prices, prices of
competitions etc
© Peter Kiveli Kabete National Polytechnic 14 of 83
- Used for data analysis
CHARACTERISTIC
- Flexible , adaptable & quick response
- Incorporate data about external events they also us summarized reports form
MIS & DSS
- Filter compress and track critical data
Graphics
Communications
Local processing
ESS WORKSTATION
ESS
Internal data WORKSTATION
External
TPS / MIS data
data
Menus
Menus Financial data Graphics
Graphics Communication
Communication Local processing
Local processing
Executive
support
system ESS
Management Management
systems system
MIS DSS
Transaction
Knowledge
system processing
KWS and system
OAS (TPS)
MANAGING KNOWLEDGE
KNOWLEDGE MANAGEMENT IN ORGANIZATION
Every organization should have the ability to gather produce maintain and
disseminate knowledge
Knowledge management is defined as a process of systematically and actively
managing and leveraging the stores of knowledge in an organization.
It is an attempt by organization to put procedures and technologies in place that
do the following
Transfer individual knowledge into data base
Group collaboration
Artificial intelligence
Artificial intelligence applications and group collaboration focuses on supporting
information and knowledge work they aim at defining and capturing the
organizations knowledge base knowledge may include.
Structural internal knowledge
External knowledge
Information knowledge
Managing data
There activities can be supported OAS
OAS can be defined as any application of information technology that intents to
increase the productivity of information workers office e.g. word processing DTP
system
Documents imaging system
The must contain a scanner for bit-mapping images and storing images as
graphics
The optical disk can be kept online in a juke b ox( a device used for
storing and retrieving many optical disks.
The system must have index server to contain indexes that will allow users
to identifies and retrieve documents when needed
Collaboration
Coordination
TASKS
Publishing - different changes in documents can be tracked
Application development
Robotics - machines which can do human work more efiicnciently can work is
dangerous environment
Expert systems - can mimic expert knowledge and reasoning to some problems.
BENEFITS OF USING EXPERT SYSTEM
Contributes to productivity
To preserve expertise
Reduce costs
Very fragile
It is at management level
TYPES OF DSS
Two types of DSS
a) Model driven DSS
b) Data driven DSS
MODEL DRIVEN
- Stand alone system
DATA DRIVEN
One can extract useful data from the system and analyze its uses TPS data
COMPONENT OF DSS
DSS data base - collection of current or historical data from number of application
or groups
DSS software system - collection of software tools used for data analysis e.g
OLAP or data mining tools or collection of mathematical and analytical models
User interface - permits easy interrelation between users of the system and the
DSS software tools
DSS
DATABASE
DSS Software
system models
OLAP tools
data mining
User
interf
ace
User
Increases participation
People - trained facilitators and staff that support hardware and software
Examples are
Electronic meeting system(EMS)
Supports meeting at the same place or different places at different times
Monitor performances
c)Decisions made at these different levels can be:
Structured (tps)
Semi-structured(tactical)
Unstructured(strategic)
(i) Data – This is a more than a raw materials of information system. (the
processed information)
(ii) Network – Telecommunications network like the internet, intranet and
extranet
(iii) People – This are people required for the operation of the information
system e.g. (end users and IS specialist)
(iv) Software- ensures that the hardware can deliver user needs
(v) Hard ware – these are the physical components of the system. Example
system unit internal devices and the peripheral devices
Today’s project managers, freelancers and business leaders need to keep up with the
pace of emerging technology and management trends. When it comes to project
management methodologies, the number of rules, acronyms and principles may seem
overwhelming even to experienced managers. To help you choose a methodology for your
next project and provide you with new tools and ideas, we’ve created the following list of
approaches to project management.
1) Traditional Methodologies
8) Kanban
9) Extreme Programming
The critical path method (CPM) is an extension of the PERT approach that represents
an algorithm for scheduling project activities. The critical path represents the longest (in
terms of duration) sequence of essential project activities that must be completed on
time. Calculating the critical path is key to determining the total duration of a project, its
milestones, deadlines and essential activities that need to be completed on time. Best
for: complex projects where delivery terms and deadlines are critical, in such areas as
construction, defense, software development, and others.
With this information, you can determine the critical path by identifying the longest stretch
of dependent activities and measuring them from start to finish.
Once you’ve identified which activities are on the longest, or critical path, you can more
easily discern which have total float, or can be delayed without making the project longer.
Now we’ll try to demonstrate the concept of the critical path method with a simple, real-life
example: planning a killer party. How should you plan and execute on this project?
First, we need to define all of the tasks that must be finished to complete the project. For
our party example, it might look like this:
When we look at these tasks individually, we realize that some of them cannot be started
before the others are completed. That is, some tasks are dependent on others. We’ve
designated these relationships in the table below:
The actions “invite your friends,” “buy the food and drinks,” “cook your casserole,” and
“host the party” form a sequence of tasks that must be performed in a specific order, one
right after the other, to ensure a successful result. Such tasks are
called sequential activities.
These tasks, together with the start of our project (“choose a date and venue”) are the
most critical steps in completing our project. Thus, these actions will be placed on the
critical path.
The essential concept behind critical path analysis is that you can’t start certain tasks until
others are finished. These tasks need to be completed in a sequence, with each stage
being completed before the next stage can begin.
art to finish that must be completed to ensure the project is finished by a certain time. The
activities on the critical path must be very closely managed. If jobs on the critical path slip,
take immediate action to get the project back on schedule. Otherwise, the whole project
can be delayed.
Imagine that you have a project that will take 30 days to complete. If the first activity on the
critical path is 1 day late, the project will take 31 days to complete, unless another activity
on the critical path can be completed 1 day earlier. The critical path essentially determines
the end date in your project schedule.
The critical path in project management may contain all the important activities associated
with a project, or it may not. In fact, the activities on the critical path are not always the
most important parts of the project. At the same time, there will be tasks that are not on
the critical path, but that still determine your project’s success.
Understanding the critical path method involves determining which activities are critical to
complete on time. But other activities that lie outside of the critical path may also be very
important and require additional attention.
Traditional critical path schedules in project management are based only on causal
dependencies. We’ve already marked these dependencies in our plan. (e.g., it’s
impossible to cook the casserole without buying the ingredients). However, a project may
have limited resources that need to be taken into consideration, such as how to calculate
load in resource planning. These limitations will create more dependencies, often referred
to as resource constraints.
If you work on a team, you may split the project work between team members. In our
example, while you’re choosing a date and venue and inviting people, one of your friends
can make a playlist, and another can get the food and drinks. The tasks can be done in
parallel, as on our chart above.
However, if you’re the only person responsible for the project, you have a resource
constraint because you can’t be in two places at the same time. In this case, your critical
path will look different.
On the chart above, we assume that you first need to choose the date and venue, and
only later can you make a playlist. However, depending on the project conditions, these
tasks can be performed in a different order.
This kind of critical path is called a resource critical path. This method was proposed as an
extension to the traditional critical path analysis to allow for the inclusion of resources
related to each activity. A resource-leveled schedule may include delays due to resource
bottlenecks (i.e., unavailability of a resource at the required time), and it may cause a
previously shorter critical path to lengthen.
In project management, a critical path is the sequence of dependent tasks that form the
longest duration, allowing you to determine the most efficient timeline possible to complete
a project. Here's a rundown on how to calculate critical path in your project.
Getting back to our party example, let’s assume that you have to do everything by
yourself. We estimated the length of time each activity will take. Also, we determined the
approximate start time for each task on the critical path. Here’s what we came up with:
Now if we add up all of our critical tasks’ duration, we’ll get the approximate time that we
need to complete the whole project. In our case, 3 days and 6 hours, since “make the
ultimate playlist” and “set up the sound system” are not on the critical path. If we add the
duration to the start time, we can calculate the earliest project completion time.
Understanding the CPM allows us to make this calculation quickly and accurately.
The critical path method was developed for complex, but fairly predictable, projects.
However, in real life, we rarely get to manage such projects. A schedule generated using
critical path method techniques is often not followed precisely. As we already mentioned,
any delay of an activity on the critical path directly impacts the completion date.
New technical requirements may pop up, and new resource constraints may emerge.
Let’s say you’re planning to redecorate your living room with a friend. Your task list may
look like this:
In our example, the curtain tasks form a sub-project and can be treated as a non-critical
path. Your friend can “choose the new curtains” and “hang the new curtains” any time
before the end of your project. The curtain tasks have flexibility in the start and end date,
If any of the parallel tasks were to be significantly delayed, it would prevent our whole
project from being completed on time. Therefore, you should always keep an eye on
parallel tasks.
Now, let’s assume that choosing the curtains took our friend longer than we initially
expected. This will delay the end of the project.
Our redecoration is incomplete without the new curtains, so the path that previously was
non-critical becomes critical. The initial critical path changes.
To keep an eye on your non-critical tasks, keep your project schedule up-to-date. That’s
the only way you’ll know exactly where your project is at any given moment and whether it
will be delivered as initially planned.
The video below provides a great introduction to the critical path method (CPM).
A Gantt chart, commonly used in project management, is one of the most popular and
useful ways of showing activities (tasks or events) displayed against time. On the left of
the chart is a list of the activities and along the top is a suitable time scale. Each activity is
represented by a bar; the position and length of the bar reflects the start date, duration and
end date of the activity. This allows you to see at a glance:
To summarize, a Gantt chart shows you what has to be done (the activities) and when (the
schedule).
It is a sequence of activities with the shortest time advance, which takes into account the
constraints of resources (people, equipment) and shifts part of the implicit reserves into
so-called buffer activities. For example, a project buffer set between the last activity in the
chain and the project deadline ensures that delays won’t have an effect on the project
deadline. Other buffers include feeding and resource buffers.This technique emphasizes
prioritization, dependencies analysis, and optimization of time expenses.Best for: complex
projects with limited resources.. Agile v)Project Management Methodologies Agile
methodologies offer an iterative approach to managing projects. Originally developed for
software projects, nowadays Agile is widely used in marketing and advertising projects.
Agile teams easily adapt to changes, provide tangible results, perform quality assurance,
meaning less rework and improved quality.
You can introduce changes at any stage of the project. Other work processes will
change dynamically
Best for: projects that require a responsive and fast-paced approach and involve teams
that boast strong communication and collaboration skills.
On this page we will explain how to make a Gantt chart. If you need to understand the
concept of the Gantt chart, you can read: What is a Gantt Chart?
Gantt charts are created using project management information system (PMIS)
applications, such as Primavera Project Planner®, Microsoft Project®, and MindView®. A
typical approach for creating a schedule is to hold meetings with selected project team
members and to begin identifying activities. While this approach will result in a schedule, it
may not be a complete schedule. A complete schedule contains enough activities to
ensure compliance with the 100% Rule. The 100% Rule requires that the scope baseline
addresses 100% of the project scope. The scope baseline components are the primary
sources used to identify the schedule activities. If the scope baseline addresses 100% of
the project scope, then the schedule activities address 100% of the project scope.
Following these steps will ensure that the final project schedule is a complete schedule.
Gather the team and review the approved scope baseline, which consists of three
components: 1) the Scope Statement, 2) the Work Breakdown Structure (WBS) and 3)
the WBS Dictionary. The project team member should confirm that the scope baseline
addresses 100% of the project scope.
Using a technique called Decomposition, the project team breaks down each WBS work
package into activities. Just like when creating the WBS work packages, the team needs
Every activity is related to one or more other activities. Every activity, except the first and
last, has a relationship with a predecessor and a successor. Sequencing activities means
placing the activities in the right order using the right relationships. There are four types of
relationships:
1. Finish to Start – Cannot start the successor activity until its predecessor Is
finished.
2. Start to Start – Cannot start the successor activity until its predecessor has
started.
3. Start to Finish – Cannot finish the successor activity until its predecessor had
started.
4. Finish to Finish – Cannot finish the successor activity until its predecessor has
finished.
Relationships 1 and 2 are the most commonly used. Finish to Start is a sequential
relationship and Start to Start is typically a parallel or over-lapping relationship.
Before the durations can be estimated, resources must be identified and estimated.
Resources include labor, material and equipment. There are several estimating techniques
used including Analogous, Parametric, Three-Point and Bottom Up. Skills, competencies
and technology are key factors to consider in the basis of the estimate. After estimating
the resources, they are loaded in the schedule against the respective activities. A resource
calendar is also created to show when resources are needed and available.
Duration is the time between the start and end of an activity. Review the resources,
relationships and sequencing, then estimate the duration for each activity. The same
estimating techniques used for estimating resources can be used to estimate durations,
but make sure you identify constraints. Which are limitations or restrictions on an activity.
Create the Gantt chart by loading all information into a project management software tool.
Review the schedule and ensure that all schedule risks have been addressed. Check that
response plans and schedule contingencies have been included. A typical way to address
schedule contingencies is to add Buffers at the activity level, the project level or both. A
Buffer is an activity with no resources or scope to provide additional time and reduce
schedule risks. Resource optimization techniques, such as resource smoothing or leveling
are used to create realistic schedules. Review and approve the schedule. The approved
Gantt chart schedule becomes the schedule baseline.
5) Agile model
The most popular agile methods include Rational Unified Process (1994), Scrum (1995), Crystal Clear,
Extreme Programming (1996), Adaptive Software Development, Feature Driven Development, and Dynamic
Systems Development Method (DSDM) (1995). These are now collectively referred to as agile methodologies,
after the Agile Manifesto was published in 2001.
Individuals and interactions . in agile development, self-organization and motivation are important, as
are interactions like co-location and pair programming.
Working software . Demo working software is considered the best means of communication with the
customer to understand their requirement, instead of just depending on documentation.
Customer collaboration . As the requirements cannot be gathered completely in the beginning of the
project due to various factors, continuous customer interaction is very important to get proper product
requirements.
Responding to change . agile development is focused on quick responses to change and continuous
development.
With Scrum, your team works in fixed-length intervals called Sprints that include sprint
planning stage, sprint review and daily standup meetings. It also has the following three
clearly defined roles:
Product Owner usually refers to a customer or other stakeholder who takes part in
all development stages conveying the global vision and providing feedback.
Scrum Master is the person responsible only for managing the project process,
removing obstacles and coaching their team through meetings or other venues.
8)Kanban
Kanban is an Agile approach that visualizes work, limits work in progress and helps to
quickly move work from the “Doing” to the “Done” status. Work items are organized on
Kanban boards where they flow from one development stage to another. The best part
about Kanban boards is that you can customize the number and the names of the stages
to make them fit your industry and project workflow needs.
Unlike Scrum, Kanban approach doesn’t prescribe any deadlines or set other fixed time
frames. There’s also no Kanban master to manage the processes – the entire team is
responsible for the work delivery.Best for: collaborative teams that have lots of incoming
requests varying in priority and size.Getting More Efficient with actiTIME
9)Extreme Programming
© Peter Kiveli Kabete National Polytechnic 45 of 83
Extreme programming (XP) is one of the Agile methodologies created for software
development projects that advocates frequent “releases” in short development cycles,
intended to improve team productivity and quality of the software. The core of XP consists
of five values, four development processes: coding, testing, listening, and designing – and
multiple software development practices that can be either done in conjunction or in
isolation. Best for: small teams developing engineering projects with dynamically
changing requirements.
Adaptive Project Framework (APF) grew from the idea that most IT projects can’t be
managed using traditional PM methods. APF is an iterative, client-focused and adaptive
project planning designed to help project managers respond to unexpected changes. APF
includes the following five stages:
and requirements.
requirements.
Cycle build – team commences its work while manager adjusts the work scope,
records change requests and ideas for improvement.
Client checkpoint – project team and their client review the results before starting
the next APF cycle.
Risk time and Status – external events may impact the project negatively or
positively.
The Chain of Events – a delay in one segment of the project will cause delays in
other segments.
Critical Event Strings – event chains that are most likely to impact the project.
Project managers need to identify these, to mitigate their potential negative impact.
Performance tracking with Event Chains – project managers should update the
results of the Monte Carlo simulation throughout the duration of the project.
Extreme project management (XPM) method allows altering the project plan, budgets and
final outcome at any stage of the project to fit the changing needs. In other words, it offers
a people-driven approach, instead of the process-driven, meaning that in XPM, people
adapt models to fit the project, not otherwise. Best for: complex projects with uncertain
and unpredictable factors.
Created half a century ago before Agile, The Rational Unified Process (RUP) is an
iterative process framework designed for software development teams. It offers an
iterative approach to project management that relies on product users’ feedback for
planning future development stages and includes the following phases:
Transition – project delivery and final adjustments based on the end-user feedback
Best for: software development projects where end-user satisfaction is the key
requirement.
The program Evaluation and Review Technique (PERT) is used to identify the time it takes
to finish a particular task or activity. This, in turn, helps in scheduling and coordination,
task delegation and budget estimation.
To determine realistic estimates using this technique, managers create PERT charts –
flowcharts that depict activity sequences inside the project. Chart nodes represent events
that may include one or several tasks, and arrows show their sequence. After that,
managers calculate optimistic and pessimistic time, expected and most likely time. Other
important metrics include possible slack – the task-level delay time, and critical path – the
longest possible path from the start to the end of a task, an event or a project.
Best for: large and long-term projects with non-routine tasks and challenging
requirements.
Initiating – assessing and defining the scope and goals of the project.
Task Management
Reports
2)TRELLO
Collaboration
Checklists
Calendar View
Trello is a flexible and visual online tool for managing projects and organizing anything on
personal and team levels. It might look simple on the surface, but there’s endless power
under the hood. Invite your team members to your boards and collaborate on your
projects. Connect special power-ups to enhance your experience with time tracking,
reporting and other functionality.
3)JIRA
Key features:
Roadmaps
Reports
Integrations
Jira is project management software tailored for Agile software teams. With Jira, teams
can customize their project workflow, issue types, board details and track project progress.
Reports and boards provide an overview of the project’s progress. To extend Jira’s
functionality, you can choose from 1,000+ add-ons at the Atlassian Marketplace.
When evaluating the right project management methodology for your next project, here
are a few factors to consider:
Project budget
Resistance to change
Rigidity of structure
Information system are a major corporate asset with respect both to the benefits they
provide and to their high costs. Therefore organization have to plan for the long term when
acquiring information systems and services that will support business initiatives
The requirement of various individuals in the organization from data worker to top
management, essential applications are identified and project priorities are set. Other
projects can be carried out immediately or given a higher priority because of their strategic
role or expected benefits.
Once the need is established, the system has to be acquired. This is done in context of the
already existing systems architecture in the firm.
Skill base- the skills available about the method will determine the acquisition
method
Bureaucracy –the less the bureaucracy the more attractive the method
Time factor –time available will determine the method
Regulations in a particular country- legal implication
Expert advice and experience. This will determine the choice of method
Cost – different methods have different costs. The less the cost the more likely the
method of acquisition
Location where Sourcing will be done will determine the acquisition method
Why of ERP?
Features of ERP
Advantages of ERP
Disadvantage of ERP
Why CRM?
Scope of CRM
Advantages of CRM
Attributes of a DSS
Characteristics of a DSS
Benefits of DSS
Components of a DSS
Classification of DSS
There are several ways to classify DSS. Hoi Apple and Whinstone classifies DSS as
follows −
Text Oriented DSS − It contains textually represented information that could have
a bearing on decision. It allows documents to be electronically created, revised
and viewed as needed.
Database Oriented DSS − Database plays a major role here; it contains organized
and highly structured data.
Spreadsheet Oriented DSS − It contains information in spread sheets that allows
create, view, modify procedural knowledge and also instructs the system to
execute self-contained instructions. The most popular tool is Excel and Lotus 1-2-
3.
Solver Oriented DSS − It is based on a solver, which is an algorithm or procedure
written for performing certain calculations and particular program type.
Rules Oriented DSS − It follows certain procedures adopted as rules.
Rules Oriented DSS − Procedures are adopted in rules oriented DSS. Export
system is the example.
Compound DSS − It is built by using two or more of the five structures explained
above.
Types of DSS
What is Knowledge?
Personalized information
State of knowing and understanding
An object to be stored and manipulated
A process of applying expertise
A condition of access to information
Potential to influence action
Intranet
Data warehouses and knowledge repositories
Decision support tools
Groupware for supporting collaboration
Networks of knowledge workers
Internal expertise
Definition of KMS
Purpose of KMS
Improved performance
Competitive advantage
Innovation
Sharing of knowledge
Integration
Continuous improvement by −
o Driving strategy
o Starting new lines of business
© Peter Kiveli Kabete National Polytechnic 61 of 83
o Solving problems faster
o Developing professional skills
o Recruit and retain talent
Start with the business problem and the business value to be delivered first.
Identify what kind of strategy to pursue to deliver this value and address the KM
problem.
Think about the system required from a people and process point of view.
Finally, think about what kind of technical infrastructure are required to support the
people and processes.
Implement system and processes with appropriate change management and
iterative staged release.
Creating content
Storing content
Indexing content
Searching content
Retrieving content
Publishing content
Archiving content
Revising content
Managing content end-to-end
Advantages of CMS
Content management system helps to secure privacy and currency of the content and
enhances performance by −
Ensuring integrity and accuracy of content by ensuring only one user modifies the
content at a time.
Implementing audit trails to monitor changes made in content over time.
Providing secured user access to content.
Organization of content into related groups and folders.
Allowing searching and retrieval of content.
Recording information and meta-data related to the content, like author and title of
content, version of content, date and time of creating the content etc.
Workflow based routing of content from one user to another.
Converting paper-based content to digital format.
Organizing content into groups and distributing it to target audience.
6)MIS - Executive Support System
Market intelligence
Investment intelligence
Technology intelligence
Following are some examples of intelligent information, which is often the source of an
ESS −
External databases
Technology reports like patent records etc.
Technical reports from consultants
Market reports
Confidential information about competitors
Speculative information like market conditions
Government policies
Financial reports and information
Characteristics of BIS
Benefits of BIS
Approaches of BIS
Capabilities of BIS
Information Delivery
Dashboard
Collaboration /search
Managed reporting
Visualization
Scorecard
Ad hoc Analysis
Production reporting
OLAP analysis
Characteristics of EAI
EAI is defined as "the unrestricted sharing of data and business processes among
any connected applications and data sources in the enterprise."
EAI, when used effectively allows integration without any major changes to current
infrastructure.
Extends middleware capabilities to cope with application integration.
Uses application logic layers of different middleware systems as building blocks.
Keeps track of information related to the operations of the enterprise e.g. Inventory,
sales ledger and execute the core processes that create and manipulate this
information.
Challenges of EAI
Hub and spoke architecture concentrates all of the processing into a single
server/cluster.
Often became hard to maintain and evolve efficiently.
Hard to extend to integrate 3rd parties on other technology platforms.
The canonical data model introduces an intermediary step.
© Peter Kiveli Kabete National Polytechnic 68 of 83
Added complexity and additional processing effort.
EAI products typified.
Heavy customization required to implement the solution.
Lock-In − Often built using proprietary technology and required specialist skills.
Lack of flexibility − Hard to extend or to integrate with other EAI products!
Requires organization to be EAI ready.
Types of EAI
Data Level − Process, techniques and technology of moving data between data
stores.
Application Interface Level − Leveraging of interfaces exposed by custom or
packaged applications.
Method Level − Sharing of the business logic.
User Interface Level − Packaging applications by using their user interface as a
common point of integration.
viii))MIS - Business Continuity Planning
Business Continuity Planning (BCP) or Business Continuity and Resiliency Planning
(BCRP) creates a guideline for continuing business operations under adverse conditions
such as a natural calamity, an interruption in regular business processes, loss or damage
to critical infrastructure, or a crime done against the business.
It is defined as a plan that "identifies an organization's exposure to internal and external
threats and synthesizes hard and soft assets to provide effective prevention and recovery
for the organization, while maintaining competitive advantage and value system integrity."
Understandably, risk management and disaster management are major components in
business continuity planning.
Objectives of BCP
Phases of BCP
This phase is used to obtain formal agreement with senior management for each time-
critical business resource. This phase has the following sub-phases −
Recovery Phase
This phase involves creating recovery strategies are based on MTDs, predefined and
management-approved. These strategies should address recovery of −
Business operations
Facilities & supplies
Users (workers and end-users)
Network
Data center (technical)
Data (off-site backups of data and applications)
Final Phase
The final phase is a continuously evolving process containing testing maintenance, and
training.
The testing process generally follows procedures like structured walk-through, creating
checklist, simulation, parallel and full interruptions.
Maintenance involves −
Training is an ongoing process and it should be made a part of the corporate standards
and the corporate culture.
Design, planning, execution, control, and monitoring of supply chain activities with the
objective of creating net value, building a competitive infrastructure, leveraging worldwide
logistics, synchronizing supply with demand and measuring performance globally.
SCM consists of −
operations management
logistics
procurement
information technology
integrated business operations
Objectives of SCM
Features of SCM
Scope of SCM
SCM Processes
Advantages of SCM
To the suppliers −
(i) Emergency of maintenance: This is due to the malfunction or buy in the system
where maintenance is urgent and usually calls for immediate attention
(ii) Routine maintenance: It is required to keep the system performance in order. The
activities may include rewriting manual procedures outering report formats
(iii) System improvements: When a new system is implemented users may suggest
additional improvements to the system. To make the changes the analyze develops
necessary manual procedures to satisfy the requirements
(iv) Special reporting requests: These are periodic requests for tactical and strategic
management information which does not come under routine production
(iv) Software configuration management: Involves use of a configuration control
board
(v) Perfective maintenance
(vi) Preventive maintenance
Information system security refers to the way the system is defended against
unauthorized access, use, disclosure, disruption, modification, perusal, inspection,
recording or destruction.
There are two major aspects of information system security −
Security of the information technology used − securing the system from malicious
cyber-attacks that tend to break into the system and to access critical private
information or gain control of the internal systems.
Security of data − ensuring the integrity of data when critical issues, arise such as
natural disasters, computer/server malfunction, physical theft etc. Generally an off-
site backup of data is kept for such problems.
Guaranteeing effective information security has the following key aspects −
Preventing the unauthorized individuals or systems from accessing the information.
Maintaining and assuring the accuracy and consistency of data over its entire life-
cycle.
Ensuring that the computing systems, the security controls used to protect it and
the communication channels used to access it, functioning correctly all the time,
thus making information available in all situations.
Ensuring that the data, transactions, communications or documents are genuine.
Ensuring the integrity of a transaction by validating that both parties involved are
genuine, by incorporating authentication features such as "digital signatures".
Ensuring that once a transaction takes place, none of the parties can deny it, either
having received a transaction, or having sent a transaction. This is called 'non-
repudiation'.
© Peter Kiveli Kabete National Polytechnic 77 of 83
Safeguarding data and communications stored and shared in network systems.
Information systems bring about immense social changes, threatening the existing
distributions of power, money, rights, and obligations. It also raises new kinds of crimes,
like cyber-crimes.
Following organizations promote ethical issues −
The Association of Information Technology Professionals (AITP)
The Association of Computing Machinery (ACM)
The Institute of Electrical and Electronics Engineers (IEEE)
Computer Professionals for Social Responsibility (CPSR)
Strive to achieve the highest quality, effectiveness, and dignity in both the process
and products of professional work.
Acquire and maintain professional competence.
Know and respect existing laws pertaining to professional work.
Accept and provide appropriate professional review.
Give comprehensive and thorough evaluations of computer systems and their
impacts, including analysis and possible risks.
Honor contracts, agreements, and assigned responsibilities.
Improve public understanding of computing and its consequences.
Access computing and communication resources only when authorized to do so.
IEEE code of ethics demands that every professional vouch to commit themselves to the
highest ethical and professional conduct and agree −
To accept responsibility in making decisions consistent with the safety, health and
welfare of the public, and to disclose promptly factors that might endanger the
public or the environment;
To avoid real or perceived conflicts of interest whenever possible, and to disclose
them to affected parties when they do exist;
To be honest and realistic in stating claims or estimates based on available data;
To reject bribery in all its forms;
To improve the understanding of technology, its appropriate application, and
potential consequences;
(i) Personal privacy - information system facilitates the users having their own
hardware, operating system and software tool to access the server that are
connected to each and to users by a network
Due to distribution of network on a large scale data and information transfer in
a big amount takes place which leads to hidden chances of disclosing
information and violating the privacy of any individual or a CHAPTER. It’s a
major challenge of information system to maintain privacy and integrity.
(ii) Access right it becomes high priority for the IT and cyberspace with great
advancement in technology E- commerce and electronic payment systems on
the internet has heightened this issue for various corporate organizations and
government agencies.
- Generally intrusion detection system are used to determine whether the user is
an intruder or appropriate user.
(iii) Harmful actions - damage or negative consequence to the information system
such as los s of importantly information loss of ownership, destruction of property
and undesirable substantial impacts. This principal of ethical conduct restricts
any outsider form use of information system in a manner which leads to any
loss of udders. Employee and employers and general public.
To recover from harmful actins extra time and efforts are required to remove
viruses form computer systems.
(iv) Patents - a patent can preserve the unique and secret asp0ects of an idea,
obtaining a patent is difficult a s compared with obtaining a copyright.
Patents is granting a property right by a sovereignty authority to an inventor
A patent user has to reveal the full details of a program to a pro efficiencies
programmed for building a program
(v) Copyright - information specialist are to be familiar with necessary concept
of the copy right law.
Copyright law works as a very powerful legal tool in protecting computer
software both before a security breach and after security branch.
Guidelines for responsible use of I.S
(i) You should respect the privacy of other users
You should not seek information on obtain copies of or modify file tapes or
passwords belonging to other user or organization
Computer crime
Use of computers as an instruments to further illegal
ends such as committing frauds, trafficking and
intellectual property stealing or violating privacy.
Control measures to computer crime
(i) Use of strong passwords - use of different user ID and password
combination for different account and avoid writing then down.
Make passwords more complicated by combining words and special characters.
(ii) Use firewalls to block connection to unknown or bargains sites and will
keep out some type of viruses and hackers
(iii) Block spyware attacks prevent spyware from infiltrating your computer by
installing and updating antispyware software.
(iv) Protect your data by using encryption for your most sensitive files such as
tax returns and financial reports
(v) Secure your wireless network - review and modify default settings
(i)
Emerging trends in mis
(i) Cloud computing - defined a s utilization of computing service i.e. software as
well a s hardware as a service over a network
(ii) Mobile application - they are designed to run on smart phones tablets and other
mobile device.
(iii) User interfaces - touch screen capability has revolutionized tray users interact
with application - the users interact with what is displayed and also removes
any intermediate hand held device like the mouse.
(iv) Analytics - process which helps discovery information patterns with data. Field
of analytics is a combination of statistics computer programming and operations
research
(v) Education programmes
(vi) Data mining
How to cope
Do extensive research before finalizing your app development
Program written by institution or ministry of education which determines the
learning progress.
Crucial challenges facing education programmes
(i) Resistance to change - making trend and testing method is difficult especially
where is technology based. It becomes difficult to experiment with new
technology or teaching method s as one want to risk success of the students.
Solution
Establishing a global network of like - minded professionals through assessment
lessons and advice is a good way to connect with other school boards and
instructors who are adapting to new technology
(ii) Education budget - cost of implementing technology to education programs is
high i.e. management of network and learning devices.
Solution
Cost - saving products & partnership - school board official and teachers should
lose for cost saving technology products and potential partnership that recognize
school challenges by providing matching solutions.
Crucial challenges facing A.I
(i) A1 ethics - as companies bring A1 to more process ethics becomes a pressing
concern - A1 tends to amplify and bring seemingly scientific credence’s to
human biases casting a dark shadow over its potential for decision making
applications.
How to cope
- Organizations must carefully analyze training data before feeding it into the
algorithm ensuring it can’t lead to unethical conclusions
(ii) Data governance concern - people have become increasingly concerned
about how companies access and use their personal information - b/s using
customer facing A1 need to account for this in their future development responsible
data governance is more crucial than ever especially in rise of cybercrime.
How to cope
© Peter Kiveli Kabete National Polytechnic 81 of 83
Companies need to ensure they can see how their A1 algorithms use data at all
stages and restrict it
Crucial challenges facing data analytics
(i) Inaccessible data - moving data into one centralized system has impact if it is
not easily accessible to the people that need it.
How to solve
Decision - makers and risk managers need access to all of an organizations data
for insights on what is happening at any given moment even if they are working
off site.Confusion or anxiety - users may feel confused or anxious about switching
the traditional data analysis methods to modern automation.
How to solve
It is important to illustrate how changes to analytics will actually streamline the role
and make it moiré meaningful and fulfilling.
CHAPTER 10
a) Emerging issues in MIS
(i) Data mining – These are tools used to collect information regarding consumer
purchases and economic trends
(ii) Cloud computing – This involves utilization of computing services i.e software,
hardware
(iii) Analytics – Help to discover information pattern in data by converting raw data into
meaningful information
(iv) Networking- Ability for companies to communicate with others companies for
business purposes
(v) Artificial intelligence – It a simulation of human intelligence process by machines
i.e expert system
b)Challenges of emerging trend in MIS
i) Data mining
i) Incomplete data – Data may be unavailable due to human error
Coming with the challenge: hiring professional experts
ii) Data privacy and security – Intrusion of people privacy has been on the rise
through lacking etc. Coping with the challenge- proper data encryption feature to
hinder intrusion of privacy
(i) Analytic
a) Expensive – Data scientist are needed so as to help converting raw data to useful
data
Coping with challenge – Hiring professional data scientist
b) Resistant to change – A lot of employees are not open to change coping with
challenge – offer training about analysis to smoothen their work
(ii) Networking
i) Security – Hacker can easily gain access to network coping with challenges –
proper authentication where we know who accessed system at what time and
did what
c) Choice of approach – There are a variety of network option available coping with
challenge – do extensive research to find best network to use
iv). Cloud Computing
a) Security issues – Broken authentication, data breaches, data breaches coping
with challenge – develop a secure user identify management access control
b) Cost – Expensive to run and maintain
……………………………END……………………………………………….