0% found this document useful (0 votes)
149 views5 pages

Management Information Systems Summary

MIS is a computer-based tool used by people and organizations to store, collect, and analyze information for specific purposes. It offers benefits like understanding applications, enhancing organizations, and providing career opportunities. CBIS is a computer-based system used by organizations to perform tasks through hardware, software, databases, networks, and procedures. Managing data presents difficulties due to increasing amounts of scattered data from multiple sources that can degrade or become unsecure over time. Approaches like data governance and master data management aim to minimize these issues. DBMS systems minimize data redundancy, isolation, and inconsistency while maximizing security, integrity, and independence between data and applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
149 views5 pages

Management Information Systems Summary

MIS is a computer-based tool used by people and organizations to store, collect, and analyze information for specific purposes. It offers benefits like understanding applications, enhancing organizations, and providing career opportunities. CBIS is a computer-based system used by organizations to perform tasks through hardware, software, databases, networks, and procedures. Managing data presents difficulties due to increasing amounts of scattered data from multiple sources that can degrade or become unsecure over time. Approaches like data governance and master data management aim to minimize these issues. DBMS systems minimize data redundancy, isolation, and inconsistency while maximizing security, integrity, and independence between data and applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

MIS Summary

A. MIS: A computer based tool used by people to perform and process information, such as stores,
collects, and analyzes information for a specific purpose.

Benefits of IT:

- Know the process behind some applications


- Can help you enhance applications in your Organization
- Makes you aware of the rapid-developing technologies
- IT offers many career opportunities
- Can help you start your own business

Data: collection of things that are stored but don’t have any specific meaning
Information: collection of data that are stored and have a specific meaning
Knowledge: consists of data and information that have been organized

B. CBIS: A computed based system, used by people to do some or all task in the organization.
Components of the CBIS:

Hardware: Physical components of a computer, such as Monitor, CPU, Mouse, and etc.
Software: Digital Components of a Computer, that has various different purpose.
Database: Collection of data that was store.
Network: Connecting system that permits computer to share resources.
Procedures: Instructors for combining the CBIS components to do a specific task.
People: Individuals that uses hardware and software

Hardware
CPU: every activity a computer a computer perform was processed in the CPU
Storage: Components to store data
Input: Components that transforms physical data to digital data
Output: Components that transforms digital data to physical data
Communication Technologies: Components that enabled one device connects with another device

Software
System Software: The main and necessary software that is required to run the computer. Example:
Windows
Application Software: The additional software that has different function and purposes
Hardware Issues:

- How company keep up with the rapid development of technology?


- How often should company change their hardware?
- Will upgrades increase productivity?
- Will these benefit the organization?

Software Issues:

- Software Defects
- Software Licensing
- Open Systems
- Proprietary Software
- Open Source Software

C. Data Management

Difficulties of Managing Data:


- The amount of data increasing overtime
- Data scattered throughout organization
- Data generated from multiple sources
- Data Degradation
- Data Rot
- Data Security are critical

Data Governance: An approach to managing information across an entire organization.

Master Data: Set of core data such as costumer, product, employee, that spans the enterprise
information system.
Master Data Management: A process that spans organization business process and applications.

Data Warehouse:
Data Marts:

D. DBMS (Database Management System)

DBMS Minimize:

1. Data Redundancy: the same data stored in multiple locations


2. Data Isolation: a specific data cannot be accessed through multiple application
3. Data Inconsistency: Various copies of data are different

DBMS Maximize:

1. Data Security: Data have a high security measure in order to protect it


2. Data Integrity: Date meets certain constraint
3. Data Independence: Application and data are independent from one another, so all
application opens the same data

E. Knowledge Management Cycle (CCRSMD)


Create -> Capture -> Refine -> Store -> Manage -> Disseminate
Tacit:
Implicit:
Explicit:

F. Porter’s Five Forces Model & Porter’s Value Chain Model

Five Forces
Center: Competitor
Right: Buyer Power
Left: Supplier Power
Down: Substitute
Up: New Enfants

Value Chain

Primary:
1. Inbound Logistics
2. Operations
3. Outbound Logistics
4. Marketing and Sales
5. Customer Service

Secondary:
1. Firm Infrastructures
2. Human Resource Management
3. Technology Development
4. Procurement

G. Business Pressures
1. Market and Economic: Global economy, changing workforces, powerful customer
2. Technology: Information overload, technology innovations
3. Societal/Political/Legal: Terrorist attack, security, government regulations

H. Strategies of Competitive Advantage


1. Cost Leader: I can sell lower than you can
2. Differentiation: I’m better because I’m different
3. Innovation: I’m doing something new and you can’t catch up
4. Organization Effectiveness: I can do it more efficiently
5. Customer Orientation: I treat my customer better than you do

I. Ethics
1. Utilitarian: focusing the most good and the least harm
2. Rights: focusing on moral rights
3. Fairness: focuses on fairness and equality
4. Common Good: focuses on respect and compassion for other

Ethics Framework: Recognition -> Research -> Evaluating Alternatives -> Decision Making -> Outcomes

J. E-Commerce & E-Business

E-Commerce: Process of buying, selling, exchanging products and services via Internet.
E-Business: The broader definition of E-Commerce, consists of buying, selling, exchanging
products and services, collaborating with partners and etc.

Pure & Partial EC

Process can be physical or digital, delivery agent can be physical or digital.

Pure: Physical
Partial: Digital

Types of E-Commerce and E-Business


Virtual Organization: E-Commerce only
Brick and Mortal: Physical Stores only
Click and Mortal: Have both physical stores and online stores

K. Alien Software: software that installed to your computer through duplicitous methods.
Adware: software that pop ups advertisements
Spyware: collect private data without consent
Spam Ware: pest ware that uses your computer as a launchpad for spammers
Cookies: small amount of information that website stores on your computer
L. Dealing with threats
Risk Management: Identify, Control, and Minimize threat.
Risk Analysis: Analyzing what kind of threats impacting the system

Risk Mitigation: Concrete actions use to fight the threats


1. Risk Acceptance: Accept and absorb the impacts
2. Risk Limitation: Limiting the impact & risk to the system
3. Risk Transfer: Transferring the risk by implementing controls to the system

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy