302 MIS & E-Commerce Complete Notes
302 MIS & E-Commerce Complete Notes
DEPARTMENT OF MANAGEMENT
Study Material
SUB: 302 Management Information System
Unit I Fundamentals of Management Information System
Information System
information system, an integrated set of components for collecting, storing, and
processing data and for providing information, knowledge, and digital products.
Business firms and other organizations rely on information systems to carry out and
manage their operations, interact with their customers and suppliers, and compete in
the marketplace.
Information systems are used to run interorganizational supply chains and electronic
markets. For instance, corporations use information systems to process financial
accounts, to manage their human resources, and to reach their potential customers
with online promotions.
Many major companies are built entirely around information systems. These include
eBay, a largely auction marketplace; Amazon, an expanding electronic mall and
provider of cloud computing services; Alibaba, a business-to-business e-
marketplace; and Google, a search engine company that derives most of its revenue
from keyword advertising on Internet searches.
Governments deploy information systems to provide services cost-effectively to
citizens. Digital goods—such as electronic books, video products, and software—
and online services, such as gaming and social networking, are delivered with
information systems.
Individuals rely on information systems, generally Internet-based, for conducting
much of their personal lives: for socializing, study, shopping, banking, and
entertainment.
Types of Information Systems
Operational-support systems
Support operational managers by monitoring the day-to-day’s elementary activities
and transactions of the organization. e.g. TPS and OAS
1. Transaction processing systems (TPS)
Transaction processing systems, or TPS, are used “…for the collection, storage,
retrieval and modification of transactions made by an organization. An example of
a transaction processing system, commonly used in businesses, are the systems
employed by major credit card companies found in almost every retail store.”
(Business Dictionary, 2018).
2. Process control systems
Process control systems make sure industrial processes are carried out efficiently,
consistently and with as little variation as possible. They're installed in industrial
settings to: help maintain throughput, quality, yield and energy efficiency. make sure
working practices are carried out safely and profitably.
3. Office Automation Systems (OAS)
OAS are systems which aim to improve the efficiency with which employees process
information, and data. The most recognizable example of these systems within the
workplace office, is Microsoft Office XP, or any other similar system which allows
people to work from home, or other locations. It improves productivity of employees
working in an office environment.
Management-support systems
Support the monitoring, controlling, decision-making, and administrative activities
of middle managers. e.g. MIS, DSS
1. Management information systems (MIS)
Management information systems are created from the data stipulated by the TPS.
The role of MIS, according to Chirs-Kimble (2018), are as follows;
• Based on internal information flows
• Support relatively structured decisions
• Used by lower and middle managerial levels
• Efficiency oriented
MIS looks at inputs, processing and outputs. Inputs refers to internal transactions,
files and structured data, processing deals with sorting, merging and summarizing
data, and outputs refers to summary, action and detailed reports. For example,
inventory control systems.
2. Decision Support Systems (DSS)
Decision support systems are systems which help users reach a decision, during the
decision-making process. DSS “…improve operational efficiency and business
performance by enhancing the ability of stakeholders to make faster, smarter
decisions based on information, rather than gut instinct alone. They aid gathering
useful information from raw data, for example, documents and business models.
Executive support systems are intended to be used by the senior managers directly
to provide support to non-programmed decisions in strategic management.
This information is often external, unstructured and even uncertain. Exact scope and
context of such information is often not known beforehand.
This information is intelligence based −
• Market intelligence
• Investment intelligence
• Technology intelligence
Data: Data are facts that are used by programs to give valuable information. Data
are normally stored in machine- readable form on disk or tape until the computer
needs them. A database is an organized collection of facts and information which
comprises of two or more related data files. An organization's database can contain
facts and information on customers, personnel, inventory, competitors' sales, online
purchases, and much more.
Hardware: In information system, hardware is the machinery and often referred to
as the central processing unit (CPU), and all of its support equipment. Among the
support equipment are input and output devices, storage devices and
communications devices, and it consists of the physical components of a computer
that perform the input, processing, storage, and output activities of the computer.
Input devices include keyboards, mice, and other pointing devices, automatic
scanning devices, and equipment that can read magnetic ink characters. Processing
devices include computer chips that contain the central processing unit and main
memory. Advances in chip design allow faster speeds, less power consumption, and
larger storage capacity.
Software: It is Computer programs and the manuals that support them. Computer
programs are machine-readable instructions. Software includes the computer
programs that govern the operation of the computer. These programs permit a
computer to process payroll, send bills to customers, and provide managers with
information to increase profits, reduce costs, and provide better customer service.
Software is required for computers of all sizes, from small handheld computers to
large supercomputers. For example, The Android operating system by Google and
Microsoft's Mobile 6.5 are operating systems for cell phones and small portable
devices.
People: People are the most vital element in most computer-based information
systems. They are responsible for success and failure for most organizations.
Information systems people include all the people who manage, run, program, and
maintain the system. Users are people who work with information systems to get
results. Users include employees like financial executives, marketing
representatives, manufacturing operators, customers, system administrators etc.
Procedures: These are the policies that run the operation of a computer system.
Procedures can be in the form of guidelines in the user manuals. Procedures include
the strategies, policies, methods, and rules for using the information system
including the operation, maintenance, and security of the computer. For example,
procedure to login to the system, procedure for registration, procedure for ordering,
billing etc.
Management Information System
MIS is an organized integration of hardware and software technologies, data,
processes, and human elements. It is a software system that focuses on the
management of information technology to provide efficient and effective strategic
decision making.
A Management Information System is
• An integrated user-machine system
• For providing information
• To support the operations, management, analysis, and decision-making
functions
• In an organization
The system utilizes
• Computer hardware & software
• Manual procedures
• Models for analysis, planning, control, and decision making, and
• A database
MIS Definition
Management Information System (MIS) is an integrated man/machine system for
providing information to hold up the operations, management and decision-making
functions in an organization. - G.B. Davis
A formal method of collecting timely information in a presentable form in order to
facilitate effective decision making and implementation, in order to carry out
organisational operations for the purpose of achieving the organisational goals. -
Walter I. Kennevan
A Management Information System is an organized portfolio of formal systems for
obtaining, processing, and delivering information in support of the business
operations and management of an organization. - Zwass (1992)
Objectives of MIS
MIS has five major objectives which include:
• Data Capturing
• Processing of Data
• Storage
• Retrieval
• Dissemination
Data Capturing
MIS capture data from various internal and external sources of the organization.
Data capturing may be manual or through computer terminals.
Processing of Data
The captured data is processed to convert into the required information. Processing
of data is done by such activities as calculating, sorting, classifying, and
summarizing.
Storage of Information
MIS stores the processed or unprocessed data for future use. If any information is
not immediately required, it is saved as an organization record, for later use.
Retrieval of Information
MIS retrieves information from its stores as and when required by various users.
Dissemination of Information
Information, which is a finished product of MIS, is disseminated to the users in the
organization. It is periodic or online through a computer terminal.
Characteristics of MIS
Following are the characteristics of MIS:
System Approach
The information system follows a System’s approach. The system’s approach
implies a holistic approach to the study of system and its performance in the light
for the objective for which it has been constituted.
Management Oriented
The top-down approach must be followed while designing the MIS. The top-down
approach suggests that the system development starts from the determination of
management needs and overall business objectives.
The MIS development plan should be derived from the overall business plan.
Management oriented characteristic of MIS also implies that the management
actively directs the system development efforts.
Need-Based
MIS design and development should be as per the information needs of managers at
different levels, strategic planning level, management control level and operational
control level. In other words, MIS should cater to the specific needs of managers in
an organization’s hierarchy.
Exception Based
MIS should be developed on the exception-based reporting principle, which means
an abnormal situation, i.e. the maximum; minimum or expected values vary beyond
tolerance limits. In such situations, there should BE exception reporting to the
decision-maker at the required level.
Future Oriented
Besides exception-based reporting, MIS should also look at the future. In other
words, MIS should not merely provide past or historical information; rather it should
provide information, on the basis of projections based on which actions may be
initiated.
Integrated
Integration is a necessary characteristic of a management information system.
Integration is significant because of its ability to produce more meaningful
information.
Long Term Planning
MIS is developed over relatively long periods. Such a system does not develop
overnight. A heavy element of planning is involved. The MIS designer must have
the future objectives and needs of the company in mind.
Sub-System Concept
The process of MIS development is quite complex and one is likely to lose insight
frequently. Thus, the system, though viewed as a single entity, must be broken down
into digestible sub-systems which are more meaningful at the planning stage.
Central Database
A central database is a mortar that holds the functional systems together. Each
system requires access to the master file of data covering inventory, personnel,
vendors, customers, etc. It seems logical to gather data once, validate it properly and
place it on a central storage medium, which can be accessed by any other subsystem.
Role of MIS
Decision making
Management Information System (MIS) plays a significant role in the decision-
making process of any organization. In any organization, a decision is made on the
basis of relevant information which can be retrieved from the MIS.
Coordination among the department
Management Information System satisfy multiple need of an organization across the
different functional department.
Finding out Problems
As we know that MIS provides relevant information about every aspect of activities.
Hence, if any mistake is made by the management then MIS, information will help
in finding out the solution to that problem.
Comparison of Business Performance
MIS store all past data and information in its Database. That why the management
information system is very useful to compare business organization performance.
Strategies for an Organization
Today each business is running in a competitive market. An MIS supports the
organization to evolve appropriate strategies for the business to assent in a
competitive environment.
For example, in order to develop an effective production scheduling system, it is
necessary to balance such factors as setup costs, Workforce, Overtime rates,
Production capacity, Inventory level, Capital requirements and Customer services.
Benefits of MIS
• Increased customer satisfaction
• Improved quantity and quality of information
• Improved quality and quantity management decisions
• Improved responsiveness number of the competitor’s condition
• Improved operational efficiency and flexibility
• Improved quality of internal and external communications
• Improved quality of planning
• Improved quality control and supervision
Limitations of MIS
• High Cost
Employees should have the capacity of learning of the information system with the
changing competitive and business environment; otherwise, it will be difficult for
the organization to stay in the market.
• It cannot meet the special demands of each person.
• The MIS is not good if the basic data is obsolete and outdated.
• Mostly information provided by the MIS is in quantitative form. Hence,
it ignores the qualitative information like the attitude of an employee.
Types of MIS
Transaction Processing System
A TBS is a software that ensures the completion of a business transaction and also
keeps track of transactions. An online transaction processing system (OTPS) is an
equivalent system that online merchants use for e-commerce.
The TPS ensures that each transaction is successful by storing, sending and receiving
information via a database. It supplements the business point of sale system (POS),
which is the unit that reads credit cards, prints receipts and accepts and stores cash.
For example, if a customer purchases a book from a shop, they might pay with a
credit card. A TPS takes the customer's card information, communicates with their
bank and approves or declines the purchase based on their account balance.
Types of transaction processing systems
There are two types of transaction processing systems:
Batch processing
Through batch processing, a TPS interprets sets, or batches, of data by grouping
items based on similarities. Batch processing can create a time delay because it
reviews several sets of data simultaneously, requiring more computing power.
Example: A customer pays for a subscription service at the end of the month, The
TPS system processes the transactions as a batch because they occur at the same
time. In this case, a delay in processing transactions is acceptable because the system
only interprets batches once per month.
Real-time processing
Real-time processing is a method to process transactions as they appear. This helps
prevent delays in processing and can provide a more accurate result.
Example: An e-commerce website might use a TPS to process credit card
transactions in real-time to ensure payment before the company starts its fulfillment
process. Processing transactions in real-time also helps the company identify and
address errors quickly, as well as increase its overall response times.
Transaction processing system components
Each TPS has four major components that help it function:
1. Inputs
An input is an original request for a product or payment that an outside party sends
to a company's TPS. If your company uses batch processing, its TPS stores groups
of inputs and then processes them at a later time. In comparison, if your company
uses a real-time system, it processes each input as it arrives.
Inputs typically include:
• Invoices
• Bills
• Coupons
• Custom orders
2. Processing system
The processing system reads each input and creates a useful output, such as a receipt.
This element can help you define the input data and what the output should be. Based
on the kind of TPS your company is using, processing times can vary.
3. Storage
The storage component of TPS refers to where a company keeps its input and output
data. Some companies store these documents in a database. The storage component
ensures the organization, security and accessibility of every document for later use.
For example, if a vendor would like to confirm that your company has paid an
invoice, you can check your system's storage to find the invoice and determine if
you delivered a payment.
4. Outputs
TPS outputs are documents the system generates once it completes processing all
inputs, such as receipts the company stores in its records. These documents can help
validate a sale or transaction and provide important reference information for tax
and other official purposes.
For example, if a vendor sends your company an invoice, you can pay the invoice
and send the vendor confirmation of your payment. Then, you can amend the original
invoice and mark it as "paid" in the company's TPS.
TPS benefits
Here are some common benefits of using a TPS:
Increased transaction speeds
With a TPS in place, businesses can effectively increase the speed of each
transaction to minimize wait times for customers. Some systems process transactions
in real-time, while others collect transaction information during a set period and then
process it at a later time, often after business hours.
Improved cost efficiency
A TPS can potentially conduct and organize thousands of transactions throughout
the day. This can save a company money by reducing the need to upgrade the system
or use more than one system to meet demand.
Improved reliability
Using a TPS can ensure that you process customer transactions quickly and
accurately. A reliable TPS can also help your organization save money on potential
troubleshooting or coding costs for malfunctioning systems.
Automated management
ATPS automates much of a company’s internal resource and revenue management.
By increasing automation, employees can spend less time reviewing transactions.
Automation is an important part of increasing the profitability of a business because
it offers employees more time to focus on engaging tasks that require critical
thinking.
Disadvantage of ESS
• Functions are limited
• Hard to quantify benefits
• Executive may encounter information overload
• System may become slow
• Difficult to keep current data
• May lead to less reliable and insecure data
• Excessive cost for small company
These functions shouldn’t be isolated to in-house teams. Rather, the SCM platform
must be accessible across the supply chain, encompassing every stakeholder,
including:
• Suppliers
• Manufacturers
• Wholesalers
• Transportation providers
• Logistics managers
• Retailers
This ensures that everyone has visibility into the product or service as it moves along
the production chain. By gaining better oversight into these processes, companies
can expedite delivery, improve the customer experience and achieve supply chain
cost reduction.
Advantages of using supply chain management software
• A good supply chain management software can:
• help control and reduce costs
• alleviate risks, such as late shipments and logistical errors
• improve customer service and communication
• help with forecasting and decision-making
Supply chain software can also help:
Advantages of CRM
• Provides better customer service and increases customer revenues.
• Discovers new customers.
• Cross-sells and up-sells products more effectively.
• Helps sales staff to close deals faster.
• Makes call centers more efficient.
• Simplifies marketing and sales processes.
Disadvantages of CRM
• Sometimes record loss is a major problem.
• Overhead costs.
• Giving training to employees is an issue in small organizations.
Knowledge Management System (KMS)
A knowledge management system is any kind of IT system that stores and retrieves
knowledge to improve understanding, collaboration, and process alignment.
Knowledge management systems can exist within organizations or teams, but they
can also be used to center your knowledge base for your users or customers.
The meaning of knowledge management system, while broad in use, can be
narrowed to the following purpose: to help people utilize knowledge to better
achieve tasks.
There are many types of knowledge management systems, but they all share some
common characteristics. These include:
• FAQ content
• Forum or community feature
• How-to articles and tutorials
• Education, academies, and training programs
• Certificates
• Case studies
• Webinars
3) MIS is oriented, defined and designed in terms of the user's requirements and its
operational viability is ensured.
4) MIS is kept under continuous surveillance, sot that its open system is modified
according to the changing information needs
5) MIS focuses on results and goals, and highlights the factors and reasons for non
achievements.
6) MIS is not allowed to end up into and information generation mill avoiding the
noise in the information and the communication system.
7) MIS recognizes that a manager is a human being and therefore, the systems must
consider all the human behavioral aspects in the process of management.
8) MIS is easy to operate and therefore, the design of MIS has such good features
which make up a user friendly design.
9) MIS recognizes that the information needs become obsolete and new needs
emerge. The MIS design, therefore, has a potential capability to quickly meet newer
and newer needs of information.
10) MIS concentrates on developing the information support to manage critical
success factors. It concentrates on the mission critical applications serving the needs
of the top management.
Factors contributing to failures
1) MIS is conceived as a data processing and not as an information system.
2) MIS does not provide that information which in needed by managers but it tends
to provide the information generally the function calls for. MIS then becomes an
impersonal function.
3) Understanding the complexity in the business systems and not recognizing it in
the MIS design leads to problems in the successful implementation.
4) Adequate attention is not given to the quality control aspects of the inputs, the
process and the outputs leading to insufficient checks and controls in MIS.
5) MIS is developed without streamlining the transaction processing systems in the
organizations.
6) Lack of training and appreciation that the users of the information and the
generators of the data are different, and they have to play an important role in the
MIS.
7) MIS does not meet certain critical and key factors of its users, such as a response
to the query on the database, an inability to get the processing done in a particular
manner, lack of user-friendly system and the dependence on the system personnel.
8) A belief that the computerized MIS can solve all the management problems of
planning and control of the business.
9) Lack of administrative discipline in following the standardized systems and
procedures, wrong coding and deviating from the system specifications result in
incomplete and incorrect information.
10) MIS does not give perfect information to all users in the organization. Any
attempt toward such a goal will be unsuccessful because every user has a human
ingenuity, bias and certain assumptions not known to the designer. MIS cannot make
up these by providing perfect information.
KCES’s College of Engineering and Management, Jalgaon
DEPARTMENT OF MANAGEMENT
Study Material
SUB: 302 Management Information System
Unit – II Development Process of Management Information System
However, they are times when off the shelf, software does not meet the business requirements. The
solution to this problem is custom made software.
Systems analysis and design refers to two closely related disciplines system analysis and system design.
System analysis is concerned with understanding the business objectives, goals and developing
business processes. The end product of systems analysis is systems specifications.
System design uses the output from system analysis as its input. The main objective of system
design is to interpret the system requirements into architectural, logical and physical designs of
how the information system to be implemented.
Object oriented analysis and design uses visual modeling to improve communication among all
stakeholders and produce high-quality products.
An object is a representation of a real-world entity such as a customer, a product, an employee, etc.
Unified Modeling Language (UML) is a general-purpose language used to create visual designs for a
system.
The following image shows a sample UML diagram that shows users interacting with a point of sale
system
SDLC stands for “Software Development Life Cycle.” As the name suggests, it is a process for
developing software. In other words, SDLC is a structured way to create and develop high-quality
software. The process starts from planning but not finishes after the delivery of the product.
As you may understand from the name (software development life cycle), SDLC is not a linear project
management framework. Instead, it becomes a cycle where feedback is made, problems are solved
through repetitions, or new features are acquired. SDLC process consists of phases like planning,
designing, implementing, testing, deploying, and maintenance. The stages of the software development
life cycle are which describe how to develop and maintain particular software. Each phase has different
processes and activities.
The system development life cycle refers to the processing of planning, creating, testing, and deploying
an information system. The main objective of system development life cycle is to produce high-quality
information systems that meet or exceed the expectations of the users within the stipulated budget and
time frame.
SDLC uses a number of development methodologies to achieve this objective. The next sections will
discuss some of the most popular development methodologies.
SDLC consists of a plan that describes how the software will be developed, maintained, and improved.
The software is actually a product, and that there is a life process in that product. The purpose of SDLC
is to produce software with high quality that meets customer needs. Software development life
cycle reduces the hassle of developing a new product. It’s important to have an SDLC in place as it helps
to transform a product from a design state into a complete product. This production process consists of
phases that follow each other. As the requirements for software functions are constantly changing and
expanding, these phases are handled in a continuous loop. At any stage in the cycle, it is possible to go
back and forward again. This helps the development team to produce high-quality software.
SDLC consists of time-based and content-divided phases. Every phase needs to be deliverable from the
previous step. For example, design gets its inputs from the requirement phase. In the build phase,
developers use the designated product template to develop the software. The SDLC process consists
essentially of the following phases:
Requirement Phase
Design Phase
Build/Development Phase
Testing Phase
Deployment/Deliver Phase
Maintenance
The requirement phase is the first and the most critical stage of SDLC for both the developing team and
the project manager. In this phase, the client or stakeholders specify all the information about the product
they want. The product features, specifications, expectations, and all other requirements related to the
product or software. The business manager or project manager gathers all of this information and also
prerequisites. Here are some examples:
The build/development phase is also known as the coding phase. Developers start coding in this stage.
In this phase, the smallest piece of software is called a unit. Units make up modules. Therefore,
developers develop units and modules step by step in a weekly or monthly work plan. Additionally, the
coding phase is the longest phase of the SDLC process, and it requires a focused approach for the
developers.
Once the software is complete, it is time for the testing phase. This phase is where you focus on
investigation and discovery. Then, the testing team starts testing the functionality of the entire system.
This is done to verify whether the software works and gives the result as per the requirements addressed
in the requirement phase. The development team makes a test plan. This test plan includes;
Integration testing
System testing
Acceptance test
If there is a bug/defect detected in the software, it is not working as expected. The testing team gives
detailed information to the development team about the issue. If the defect is valid or worth fixing, it
will be fixed, and the development team will replace it with the new one.
Deployment/Deliver Phase: After completing all tests successfully, the product will be delivered to the
customer. Now, customers should do beta testing for the product after the delivery. Beta, or beta version,
refers to the system testing and vulnerability testing of the software’s initial release. This release aims
to run the software smoothly under different hardware. After the customer starts testing the software, the
necessary checks are made to correct it if any problem is encountered.
Maintenance Phase : The last phase of the process SDLC is the maintenance phase, where the process
continues until the software’s life cycle ends. The product alone is not sufficient as a delivery output.
Also, user manual and version difference documents should be created for end-users. Additionally, the
maintenance phase begins with the delivery. There are different maintenance activities such as
debugging, preventing, improving the infrastructure, adding new features to the product.
Principle for System Development is the process of defining, designing, testing, and implementing a
new software application or program. It can include the internal development of customized systems,
the creation of database systems, or the acquisition of third-party-developed software. The most effective
way to protect information and information systems is to integrate security into every step of the systems
development process, from the initiation of a project to develop a system to its disposition.
The Establishment Phase is the first phase of the employment cycle. It deals in the process
of understanding the kind of human resource required for the organization to achieve its
goals. The development stage refers to a phase that a company goes through during the
preliminary stage of its corporate life. Companies that are in this stage are characterized
by their focus on early-stage business activities. Development stage companies are
generally underfunded and likely to be on the lookout for sources of capital.
System documentation provides an overview of the system and helps engineers and
stakeholders understand the underlying technology. It usually consists of the requirements
document, architecture design, source code, validation docs, verification and testing info,
and a maintenance or help guide.
Establish standards:
Projects big and small have a lot of moving parts. There’s so much to coordinate and track
to get from Point A to Point B and execute a successful project. That’s why projects are
broken down into smaller, more digestible pieces, also known as project phases. Project
phases allow you to take your unwieldy project and organize it so that you can wrap your
mind around it and make progress.
A capital investment appraisal usually involves a statement of the initial investment cost,
the on-going costs, and the anticipated benefits, as well as the calculation of a number of
suitable investment performance indicators or statistics.
Divide and conquer:
As computing technology has improved, we have tried to construct software systems that
can deal with larger and more complex problems. In order to provide such solutions, the
software systems themselves have become larger and more complex. Unfortunately, there
is a limit to how much we can take in and understand at any one time. The Romans had a
strategy called divide and rule. However, this covered the idea that it was easier to rule
over groups in conflict with each other.
Design systems are becoming more important for businesses to drive value through their
brand. As Customer Experience expectations become a key differentiation for brands,
Design, and brand consistency across an organization becomes crucial. Companies are
seeing the benefits that design systems can offer in helping to scale their brands and
understanding the return on investment.
Main Elements
Depending on the methodology employed (agile vs waterfall) the level of formality and detail in the SRS
will vary, but in general an SRS should include a description of the functional requirements, system
requirements, technical requirements, constraints, assumptions and acceptance criteria. Each of these is
described in more detail below:
Business Drivers
Business Model
Technical Requirements
System Qualities
Acceptance Criteria
Business Drivers
This section describes the reasons why the customer is looking to build the system. The rationale for the
new system is important as it will guide the decisions made by the business analysts, system architects
and developers. Another compelling reason for documenting the business rationale behind the system is
that the customer may change personnel during the project. Documentation which clearly identifies the
business reasons for the system will help sustain support for a project if the original sponsor moves on.
The drivers may include both problems (reasons why the current systems/processes are not sufficient)
and opportunities (new business models that the system will make available). Usually a combination of
problems and opportunities are needed to provide motivation for a new system.
Business Model
This section describes the underlying business model of the customer that the system will need to
support. This includes such items as the organizational context, current-state and future-state diagrams,
business context, key business functions and process flow diagrams. This section is usually created
during the functional analysis phase.
This section usually consists of a hierarchical organization of requirements, with the business/functional
requirements at the highest-level and the detailed system requirements listed as their child items.
Generally, the requirements are written as statements such as "System needs the ability to do x" with
supporting detail and information included as necessary.
Business and System Use Cases
This section usually consists of a UML use case diagram that illustrates the main external entities that
will be interacting with the system together with the different use cases (objectives) that they will need
to carry out. For each use-case there will be formal definition of the steps that need to be carried out to
perform the business objective, together with any necessary pre-conditions and post-conditions.
5) Structure of SRS
In order to form a good SRS, here you will see some points which can be used and should be
considered to form a structure of good SRS. These are as follows :
1. Introduction
(i) Purpose of this document
(ii) Scope of this document
(iii) Overview
2. General description
3. Functional Requirements
4. Interface Requirements
5. Performance Requirements
6. Design Constraints
7. Non-Functional Attributes
8. Preliminary Schedule and Budget
9. Appendices
Software Requirement Specification (SRS) Format as name suggests, is complete specification and
description of requirements of software that needs to be fulfilled for successful development of
software system. These requirements can be functional as well as non-functional depending upon type
of requirement. The interaction between different customers and contractor is done because its
necessary to fully understand needs of customers.
Depending upon information gathered after interaction, SRS is developed which describes
requirements of software that may include changes and modifications that is needed to be done to
increase quality of product and to satisfy customer’s demand.
1. Introduction :
(i) Purpose of this Document –
At first, main aim of why this document is necessary and what’s purpose of
document is explained and described.
(ii) Scope of this document –
In this, overall working and main objective of document and what value it will
provide to customer is described and explained. It also includes a description of
development cost and time required.
(iii) Overview –
In this, description of product is explained. It’s simply summary or overall
review of product.
2. General description :
In this, general functions of product which includes objective of user, a user characteristic,
features, benefits, about why its importance is mentioned. It also describes features of user
community.
3. Functional Requirements :
In this, possible outcome of software system which includes effects due to operation of
program is fully explained. All functional requirements which may include calculations, data
processing, etc. are placed in a ranked order.
4. Interface Requirements :
In this, software interfaces which mean how software program communicates with each other
or users either in form of any language, code, or message are fully described and explained.
Examples can be shared memory, data streams, etc.
5. Performance Requirements :
In this, how a software system performs desired functions under specific condition is
explained. It also explains required time, required memory, maximum error rate, etc.
6. Design Constraints :
In this, constraints which simply means limitation or restriction are specified and explained
for design team. Examples may include use of a particular algorithm, hardware and software
limitations, etc.
7. Non-Functional Attributes :
In this, non-functional attributes are explained that are required by software system for better
performance. An example may include Security, Portability, Reliability, Reusability,
Application compatibility, Data integrity, Scalability capacity, etc.
9. Appendices :
In this, additional information like references from where information is gathered, definitions
of some specific terms, acronyms, abbreviations, etc. are given and explained.
Information is a corporate resource, as important as the capital, labor, know-how, etc. and is being used
for decision making. Its quality, therefore, is required to be very high. Low quality information would
adversely affect the organizational performance as it affects decision making. The quality of
information is the result of the quality of the input data, processing design, system design, system
procedure which generate such a data, and the management of the data processing function. Quality,
unlike any other product, is not an absolute concept. Its level is determined with reference to the context
and its use, and the user. Perfect quality just as perfect information is non-achievable and has cost
benefit implications.
However, it is possible to measure the quality of information on certain parameters. All these parameters
need not have a very high value in terms of the unit of measure. Some parameters may have lesser
importance in the total value on account of their relevance in the information and its use.
The quality of the parameters is assured if the following steps are taken:
Proper people organization is basic to the management of any activity or function. The same thing is
true for the development of the MIS. The principle of the organization and structuring the organization
to the specific needs of the function is a prime necessity. When we talk with reference to the MIS a
number of issues come up and they are not the same in all the organizations. Hence, the organization
structure of the MIS would differ from one organization to the other.
The type, the size and the structure of corporate organization becomes the basis for the MIS organization
for handling the MIS function and management alternatives. The major issues involved are:
In a centralized set, the responsibility of acquisition of the data, of providing the information to the users,
becomes the centralized function. The centralized organization is also recommenced when the
information needs are more or less static.
Depending upon the situation, hardware and software solutions are available. In a decentralized set-up
the allocation the hardware is a centralized decision but the collection of data and its processing becomes
the user's responsibility. Training, problem solving and system development, however, is a centralized
function. In all such situations, the information processing is based on the database management system.
Therefore, the management of the database becomes the centralized responsibility and its use becomes
the responsibility of users.
7) Barriers to successful Development of MIS
The difficulties and issues of the management data systems, if all the current barriers are separated into
humanistic, organizational and ecological factors, the significant downsides and the reasons of failure
and using MIS in public organizations are as following:
Organizational factors
• The lack of good conditions for investment and coordinated effort of the managers, customers and
management
• The lack of consistency and multifaceted nature of the current manual frameworks.
• The lack of existing frameworks and techniques examination before the framework plan
• The lack of assessment of the current power
• Bad state of teaching the particular powers
• The lack of HR with the board and PC fields and other required specializations (the issues of engrossing
HR)
• Inadequate training of the customers
• Inadequate and fragmented documentation
• Unsuitable implementation of the framework
Humanistic factors
• The lack of data of the managers and customers as they don't know precisely what they need and what
their data needs are.
• The lack of comprehension of the requirements of the customers by planners (the lack of right meaning
of the necessities and their investigation)
• The lack of data of the administrators and customers about the joint effort technique with the planner
group.
• The lack of interest of the chiefs and customers in framework structure.
• The lack of comprehension of the administrators of programming and data frameworks.
• The lack of data of the majority of the examiners and developers (planners) with new framework
workplace.
• The lack of acknowledgment of the framework executers and opposition against the change.
• The lack of exactness in the information gathered
Ecological factors
• The lack of value paradigm of the current data frameworks
• The lack of reasonable advisors for structuring the framework and programming
• The lack of strategies and technique and phases of making the framework
• The lack of assessment of ecological perspectives in the board data frameworks
• The lack of appropriate utilization of broad communications to build up the way of life of utilizing PC
and data frameworks.
• The lack of holding appropriate instructional classes in the colleges and the lack of reasonable training
of HR in such manner.
• The lack of genuine thought and satisfactory interest in such manner.
KCES’s College of Engineering and Management, Jalgaon
DEPARTMENT OF MANAGEMENT
Study Material
SUB: 302 Management Information System
Unit III Applications of Management Information System
An accounting information system (AIS) is a structure that a business uses to collect, store, manage,
process, retrieve, and report its financial data so it can be used by accountants, consultants, business
analysts, managers, chief financial officers (CFOs), auditors, regulators, and tax agencies.
Specially trained accountants work in-depth with AIS to ensure the highest level of accuracy in a
company's financial transactions and record-keeping, as well as make financial data easily available to
those who legitimately need access to it—all while keeping data intact and secure.
• An accounting information system (AIS) is used by companies to collect, store, manage, process,
retrieve, and report financial data.
• AIS can be used by accountants, consultants, business analysts, managers, chief financial officers,
auditors, and regulators.
• An AIS helps the different departments within a company work together.
• An effective AIS uses hardware and software to effectively store and retrieve data.
• The internal and external controls of an AIS are critical to protecting a company's sensitive data
An accounting information system is a way of tracking all accounting and business activity for a
company. Accounting information systems generally consist of six primary components: people,
procedures and instructions, data, software, information technology infrastructure, and internal controls.
Below is a breakdown of each component in detail.
1. AIS People
The people in an AIS are the system users. An AIS helps the different departments within a company
work together. Professionals who may need to use an organization's AIS include:
• Accountants
• Consultants
• Business analysts
• Managers
• Chief financial officers
• Auditors
For example, management can establish sales goals for which staff can then order the appropriate amount
of inventory. The inventory order notifies the accounting department of a new payable. When sales are
made in a business, the people and departments involved in the sales process could include the following:
With a well-designed AIS, everyone within an organization can access the same system and retrieve the
same information. An AIS also simplifies the process of reporting information to people outside of the
organization, when necessary.
3. AIS Data
An AIS must have a database structure to store information, such as structured query language (SQL),
which is a computer language commonly used for databases. SQL allows the data that's in the AIS to be
manipulated and retrieved for reporting purposes. The AIS will also need various input screens for the
different types of system users and data entry, as well as different output formats to meet the needs of
different users and various types of information.
The data contained in an AIS is all of the financial information pertinent to the organization's business
practices. Any business data that impacts the company's finances should go into an AIS.
The type of data included in an AIS depends on the nature of the business, but it may consist of the
following:
• Sales orders
• Customer billing statements
• Sales analysis reports
• Purchase requisitions
• Vendor invoices
• Check registers
• General ledger
• Inventory data
• Payroll information
• Timekeeping
• Tax information
4. AIS Software
The software component of an AIS is the computer programs used to store, retrieve, process, and analyze
the company's financial data. Before there were computers, an AIS was a manual, paper-based system, but
today, most companies are using computer software as the basis of the AIS. Small businesses might use
Intuit's Quickbooks or Sage's Sage 50 Accounting, but there are others. Small to mid-sized businesses
might use SAP's Business One. Mid-sized and large businesses might use Microsoft's Dynamics GP, Sage
Group's MAS 90, or MAS 200, Oracle's PeopleSoft, or Epicor Financial Management.
Quality, reliability, and security are key components of effective AIS software. Managers rely on the
information it outputs to make decisions for the company, and they need high-quality information to
make sound decisions.
AIS software programs can be customized to meet the unique needs of different types of businesses. If
an existing program does not meet a company's needs, the software can also be developed in-house with
substantial input from end-users or can be developed by a third-party company specifically for the
organization. The system could even be outsourced to a specialized company.
For publicly-traded companies, no matter what software program and customization options the business
chooses, Sarbanes-Oxley regulations will dictate the structure of the AIS to some extent. This is because
SOX regulations establish internal controls and auditing procedures with which public companies must
comply.
5. IT Infrastructure
Information technology infrastructure is just a fancy name for the hardware used to operate the
accounting information system. Most of these hardware items a business would need to have anyway and
can include the following:
• Computers
• Mobile devices
• Servers
• Printers
• Surge protectors
• Routers
• Storage media
• A back-up power supply
In addition to cost, factors to consider in selecting hardware include speed, storage capability, and
whether it can be expanded and upgraded.
Perhaps most importantly, the hardware selected for an AIS must be compatible with the intended
software. Ideally, it would be not just compatible, but optimal—a clunky system will be much less helpful
than a speedy one. One way businesses can easily meet hardware and software compatibility requirements
is by purchasing a turnkey system that includes both the hardware and the software that the business needs.
Purchasing a turnkey system means, theoretically, that the business will get an optimal combination of
hardware and software for its AIS.
A good AIS should also include a plan for maintaining, servicing, replacing, and upgrading components
of the hardware system, as well as a plan for the disposal of broken and outdated hardware, so that sensitive
data is destroyed.
6. Internal Controls
The internal controls of an AIS are the security measures it contains to protect sensitive data. These can
be as simple as passwords or as complex as biometric identification. Biometric security protocols might
include storing human characteristics that don't change over time, such as fingerprints, voice, and facial
recognition.
An AIS must have internal controls to protect against unauthorized computer access and to limit access
to authorized users, which includes some users inside the company. It must also prevent unauthorized
file access by individuals who are allowed to access only select parts of the system.
An AIS contains confidential information belonging not just to the company but also to its employees
and customers. This data may include:
All of the data in an AIS should be encrypted, and access to the system should be logged and surveilled.
System activity should be traceable as well.
An AIS also needs internal controls that protect it from computer viruses, hackers, and other internal and
external threats to network security. It must also be protected from natural disasters and power surges
that can cause data loss.
A Human Resources Information System (HRIS) is the most used software in HR. In this article, we will
give an overview of what an HRIS is, its main functionalities, and everything you need to know to have a
basic understanding of the HRIS.
HRIS stands for Human Resources Information System. The HRIS is a system that is used to collect and
store data on an organization’s employees.
In most cases, an HRIS encompasses the basic functionalities needed for end-to-end Human Resources
Management (HRM). It is a system for recruitment, performance management, learning & development,
and more.
An HRIS is also known as HRIS software. This is a bit confusing as it implies that different systems can
have different software running on them. However, this is not the case. The HRIS is, in essence, an HR
software package.
The HRIS can either run on the company’s own technical infrastructure, or, more common nowadays, be
cloud-based. This means that the HR software is running outside of the company’s premises, making it
much easier to update.
Other commonly used names are HRIS system and HRMS, or Human Resources Management system.
These are all different words for the same thing. Collectively, these systems are also called Human Capital
Management systems, or HCM.
Benefits of an HRIS
Centrally, the HRIS holds employee information. A wide range of employee data is then easily accessible,
in one system.
HRIS functions
There are different kinds of HRIS systems and software. Because an HRIS encompasses all the
functionalities for HR, all separate functionalities are part of the system. These functionalities include:
• Applicant Tracking System (ATS). This software handles all the company’s recruiting needs.
It tracks candidate information and resumes, enables recruiters to match job openings to suitable
candidates from the company’s application pool, and helps in guiding the hiring process.
• Payroll. Payroll automates the pay process of employees. Contractual data and information on
new hires is often entered into this system – sometimes combined with time & attendance data –
and at the end of the month, payments orders are created.
• Benefits administration. Another functionality of the HRIS is benefits management. Employee
benefits are an important aspect of compensation and are also managed in this system. More
advanced systems offer an employee self-service model for employee benefits. In this case,
employees can select the benefits they are looking for themselves. One may want more paternity
leave, the other one a more expensive company car. This self-service approach to benefits is also
called a cafeteria model.
Inventory management is a set of activities aimed at tracking stock and maintaining optimal stock
amounts. It encompasses control over the entire flow of goods, from purchase to sale, with the purpose of
having the right amount of the right stock at the right place at the right time.
Note that inventory management is different from inventory control, even though these two notions sound
alike and are often used interchangeably. Inventory control handles stock that you already have in your
warehouse or storage facility while inventory management is a broader term that includes activities of
strategic planning, forecasting demand, and replenishing stock amounts.
Inventory management is important for different participants of the supply chain including
• manufacturers,
• warehouses,
• wholesalers,
• retailers, and
• eCommerce businesses.
Main types of inventory
There are many different types of inventory, but typically they are grouped into 4 categories.
1. Raw materials (including components) are any items that are needed to produce finished products.
For example, if you manufacture clothes, then fabric, threads, and sewing accessories would be the
raw materials that you purchase and use in the production process.
2. Work-in-progress (WIP) inventory includes items that are partly finished and not ready for sale
yet. In clothing manufacturing, shirts that are finished except for the buttons being sewn on would
be considered WIP.
3. Maintenance, repair, and operations (MRO) goods are items that support the manufacturing
process and are not a part of the finished product. Continuing the garment industry example, it can
be needles, patterns, scissors, and so on.
4. Finished goods are products that are manufactured and ready to be sold.
1. Purchasing (reordering) is buying raw materials needed for manufacturing or finished goods that
are intended to be sold.
2. Production is the process of turning raw materials into finished goods or preparing items for sale.
3. Storage is holding stock, e.g., raw materials before they are used or finished goods before they are
sold.
4. Sales is transferring goods to the customers.
5. Reporting is monitoring how much a business is selling and how much profit it makes.
Erroneous inventory planning. Calculating the right amount of stock for multiple product types is a
challenging task, whether it concerns ordering raw materials necessary for manufacturing or predicting
the ever-changing customer demand for retail sales. If done wrong, it can lead to one of the two equally
frustrating problems.
• Overstocking is having too many goods. Ordering and keeping extra goods “just in case” is a bad
idea because you have to pay for additional storage space, you have your invested cash tied up, and
besides, you risk being left with unsold items that you’ll have to discard (for example, perishable or
seasonal products).
• Out-of-stocks means not having enough goods. In this case, either the production process stops
causing delays and possible non-fulfillments, or you lose revenue and have unhappy customers that
want to buy the product that you ran out of. In 2020, the value of stockouts in the retail sector
was stimated as $1.14 trillion — that sounds like a problem, doesn’t it?
• Disparate data. The disconnected structure of different systems in the supply chain can be a cause
of mistakes and uninformed decisions. It can also happen in case you have multiple warehouses,
points of sale, manufacturing facilities, etc. Lousy data sharing leads to poor planning and lack of
understanding of what’s going on with your business.
• Wrong purchase time or amount. The Future of Supply Chain report by BCI states that in 2020,
73 percent of their respondents encountered a detrimental effect on the supply side. The process of
replenishment involves accurate prediction of the amount of items you need and also calculating the
time needed for them to be delivered as lead times vary across different vendors. Any supply
disruptions can result in the problems we described above.
• Inaccurate inventory counts. Inventory count is a process of monitoring what you have in store to
ensure there are no discrepancies. Many businesses still perform their inventory counts manually,
which takes too much time and is prone to errors. Such a lack of visibility can result in either lost
items or overselling (that’s when you sell something you actually don’t have, oops).
• Disorganized warehouse. A lack of order in a warehouse is, unfortunately, a very frequent problem.
Unoptimized inventory allocation, poorly labeled areas, incorrect storage conditions — all this leads
to wasted time, lost or damaged goods, and possible theft.
Well, the pros and cons are obvious. Periodic systems are cheaper, simpler, and offer more limited
capabilities, while perpetual ones require more investments and are more advanced, providing real-time
visibility and control. However, different businesses require different solutions and approaches so the
choice depends on your specific needs.
An IMS can be a standalone solution or you can have similar functionality in your warehouse management
system (WMS), supply chain management platform, enterprise resource planning (ERP), or other business
management platforms.
Whether facilities are looking to improve their production data collection, manage their resources better,
or execute their production orders quicker, a manufacturing information system can provide the best
solution to fit their business needs.
The marketing information system distributes the relevant information to the marketers who can make the
efficient decisions related to the marketing operations viz. Pricing, packaging, new product development,
distribution, media, promotion, etc.
Every marketing operation works in unison with the conditions prevailing both inside and outside the
organization, and, therefore, there are several sources ( viz. Internal, Marketing Intelligence, Marketing
Research) through which the relevant information about the market can be obtained.
Components of Marketing Information System
1. Internal Records: The Company can collect information through its internal records comprising
of sales data, customer database, product database, financial data, operations data, etc. The
detailed explanation of the internal sources of data is given below:
• The information can be collected from the documents such as invoices, transmit copies, billing
documents prepared by the firms once they receive the order for the goods and services from the
customers, dealers or the sales representatives.
• The current sales data should be maintained on a regular basis that serves as an aide to a the
Marketing Information System. The reports on current sales and the inventory levels help the
management to decide on its objectives, and the marketers can make use of this information to
design their future sales strategy.
• The Companies maintain several databases such as*Customer Database- wherein the complete
information about the customer’s name, address, phone number, the frequency of purchase,
financial position, etc. is saved.
*Product Database- wherein the complete information about the product’s price, features, variants,
is stored.
*Salesperson database, wherein the complete information about the salesperson, his name,
address, phone number, sales target, etc. is saved.
• The companies store their data in the data warehouse from where the data can be retrieved
anytime the need arises. Once the data is stored, the statistical experts mine it by applying several
computer software and techniques to convert it into meaningful information that gives facts and
figures.
2. Marketing Intelligence System: The marketing intelligence system provides the data about the
happenings in the market, i.e. data related to the marketing environment which is external to the
organization. It includes the information about the changing market trends, competitor’s pricing
strategy, change in the customer’s tastes and preferences, new products launched in the market,
promotion strategy of the competitor, etc.
In order to have an efficient marketing Information System, the companies should work
aggressively to improve the marketing intelligence system by taking the following steps:
• Providing the proper training and motivating the sales force to keep a check on the market trends,
i.e. the change in the tastes and preferences of customers and give suggestions on the
improvements, if any.
• Motivating the channel partners viz. Dealer, distributors, retailers who are in the actual market to
provide the relevant and necessary information about the customers and the competitors.
• The companies can also improve their marketing intelligence system by getting more and more
information about the competitors. This can be done either by purchasing the competitor’s
product, attending the trade shows, reading the competitor’s published articles in magazines,
journals, financial reports.
• The companies can have an efficient marketing information system by involving the loyal
customers in the customer advisory panel who can share their experiences and give advice to the
new potential customers.
• The companies can make use of the government data to improve its marketing Information
system. The data can be related to the population trends, demographic characteristics, agricultural
production, etc. that help an organization to plan its marketing operations accordingly.
• Also, the companies can purchase the information about the marketing environment from the
research companies who carry out the researches on all the players in the market.
• The Marketing Intelligence system can be further improved by asking the customers directly about
their experience with the product or service via feedback forms that can be filled online.
3. Marketing Research: The Marketing Research is the systematic collection, organization, analysis
and interpretation of the primary or the secondary data to find out the solutions to the marketing
problems.Several Companies conduct marketing research to analyze the marketing environment
comprising of changes in the customer’s tastes and preferences, competitor’s strategies, the scope
of new product launch, etc. by applying several statistical tools. In order to conduct the market
research, the data is to be collected that can be either primary data (the first-hand data) or the
secondary data (second-hand data, available in books, magazines, research reports, journals, etc.)
The secondary data are publicly available, but the primary data is to be collected by the researcher
through certain methods such as questionnaires, personal interviews, surveys, seminars, etc.
A marketing research contributes a lot in the marketing information system as it provides the
factual data that has been tested several times by the researchers.
4. Marketing Decision Support System: It includes several software programs that can be used by
the marketers to analyze the data, collected so far, to take better marketing decisions.With the use of
computers, the marking managers can save the huge data in a tabular form and can apply statistical
programs to analyze the data and make the decisions in line with the findings.
Basically, it is the practice of consolidating an enterprise’s planning, its manufacturing, its sales and
marketing efforts into one management system. It combines all databases across different departments
into a single database which can be easily accessible to all employees of that enterprise. It helps in
automation of the tasks involved in performing a business process.
Before an ERP system, there are different databases of different departments which they managed
by their own. The employees of one department does not know about anything about other
department.
After ERP
After ERP system, databases of different departments are managed by one system called ERP
system. It keep tracks of all the database within system. In this scenario, employee of one
department have information regarding the other departments.
Vendors of ERP :
1. Baan
2. JD Edwards
3. Oracle
4. PeopleSoft
5. SAP
Benefits of ERP:
1. This system helps in improving integration.
2. It is the flexible system.
3. There are fewer errors in this system.
4. This system improved speed and efficiency.
5. There is a complete access to information.
6. Lower total costs in complete supply chain.
7. This system helps in Shortening the throughput times.
8. There is sustained involvement and commitment of the top management.
Limitations of ERP:
ERP Implementation
Enterprise Resource Planning (ERP) is made to automate any task. With ERP, it is easy to manage
every department under one single database. This consumes not much time and is easy and fast way
to do work with. Developed in 1990s, Enterprise Resource Planning is foundation system for
domestic and global operations, supporting most or all functional areas in their daily operations. Is
one of the more common categories of business software, especially with large-scale businesses.
It is business strategy and set of industry-domain-specific applications that build customer and
shareholder communities value network system by enabling and optimizing enterprise and inter-
enterprise collaborative operational and financial processes. ERP at its core is an effective way of
centralizing information and workflow processes through data management. Because ERP keeps all
of your workflow data in one place.
Example:
Any enterprise’s planning, manufacturing, sales and marketing efforts are put under one management
system and then it combines to one single database system.
Data mining is a process used by companies to turn raw data into useful information. By using
software to look for patterns in large batches of data, businesses can learn more about their customers
to develop more effective marketing strategies, increase sales and decrease costs. Data mining depends
on effective data collection, warehousing, and computer processing.
• Data mining is the process of analyzing a large batch of information to discern trends and patterns.
• Data mining can be used by corporations for everything from learning about what customers are
interested in or want to buy to fraud detection and spam filtering.
• Data mining programs break down patterns and connections in data based on what information
users request or provide.
• Social media companies use data mining techniques to commodify their users in order to generate
profit.
• This use of data mining has come under criticism lately as users are often unaware of the data
mining happening with their personal information, especially when it is used to influence preferences.
In other cases, data miners find clusters of information based on logical relationships or look at
associations and sequential patterns to draw conclusions about trends in consumer behavior.
Warehousing is an important aspect of data mining. Warehousing is when companies centralize their
data into one database or program. With a data warehouse, an organization may spin off segments of
the data for specific users to analyze and use. However, in other cases, analysts may start with the data
they want and create a data warehouse based on those specs.
• Association rules, also referred to as market basket analysis, searches for relationships between
variables. This relationship in itself creates additional value within the data set as it strives to link
pieces of data. For example, association rules would search a company's sales history to see which
products are most commonly purchased together; with this information, stores can plan, promote, and
forecast accordingly.
• Classification uses predefined classes to assign to objects. These classes describe characteristics
of items or represent what the data points have in common with each. This data mining technique
allows the underlying data to be more neatly categorized and summarized across similar features or
product lines.
• Clustering is similar to classification. However, clustering identified similarities between objects,
then groups those items based on what makes them different from other items. While classification
may result in groups such as "shampoo", "conditioner", "soap", and "toothpaste", clustering may
identify groups such as "hair care" and "dental health".
• Decision trees are used to classify or predict an outcome based on a set list of criteria or decisions.
A decision tree is used to ask for input of a series of cascading questions that sort the dataset based on
responses given. Sometimes depicted as a tree-like visual, a decision tree allows for specific direction
and user input when drilling deeper into the data.
• K-Nearest Neighbor (KNN) is an algorithm that classifies data based on its proximity to other
data. The basis for KNN is rooted in the assumption that data points that are close to each are more
similar to each other than other bits of data. This non-parametric, supervised technique is used to
predict features of a group based on individual data points.
• Neural networks process data through the use of nodes. These nodes is comprised of inputs,
weights, and an output. Data is mapped through supervised learning (similar to how the human brain
is interconnected). This model can be fit to give threshold values to determine a model's accuracy.
• Predictive analysis strives to leverage historical information to build graphical or mathematical
models to forecast future outcomes. Overlapping with regression analysis, this data mining technique
aims at supporting an unknown figure in the future based on current data on hand.
Marketing
Once the coffeehouse above knows its ideal line-up, it's time to implement the changes. However, to
make its marketing efforts more effective, the store can use data mining to understand where its clients
see ads, what demographics to target, where to place digital ads, and what marketing strategies most
resonate with customers. This includes aligning marketing campaigns, promotional offers, cross-sell
offers, and programs to findings of data mining.
Manufacturing
For companies that produce their own goods, data mining plays an integral part in analyzing how
much each raw material costs, what materials are being used most efficiently, how time is spent along
the manufacturing process, and what bottlenecks negatively impact the process. Data mining helps
ensure the flow of goods is uninterrupted and least costly.
Fraud Detection
The heart of data mining is finding patterns, trends, and correlations that link data points together.
Therefore, a company can use data mining to identify outliers or correlations that should not exist. For
example, a company may analyze its cash flow and find a reoccurring transaction to an unknown
account. If this is unexpected, the company may wish to investigate should funds be potentially
mismanaged.
Human Resources
Human resources often has a wide range of data available for processing including data on retention,
promotions, salary ranges, company benefits and utilization of those benefits, and employee
satisfaction surveys. Data mining can correlate this data to get a better understanding of why
employees leave and what entices recruits to join.
Customer Service
Customer satisfaction may be caused (or destroyed) for a variety of reasons. Imagine a company that
ships goods. A customer may become unhappy with ship time, shipping quality, or communication
on shipment expectations. That same customer may become frustrated with long telephone wait times
or slow e-mail responses. Data mining gathers operational information about customer interactions
and summarizes findings to determine weak points as well as highlights of what the company is doing
right.
Data mining can look very different across applications, but the overall process can be used with
almost any new or legacy application. Essentially any type of data can be gathered and analyzed, and
almost every business problem that relies on qualifiable evidence can be tackled using data mining.
The end goal of data mining is to take raw bits of information and determine if there is cohesion or
correlation among the data. This benefit of data mining allows a company to create value with the
information they have on hand that would otherwise not be overly apparent. Though data models can
be complex, they can also yield fascinating results, unearth hidden trends, and suggest unique
strategies.
Data mining doesn't always guarantee results. A company may perform statistical analysis, make
conclusions based on strong data, implement changes, and not reap any benefits. Through inaccurate
findings, market changes, model errors, or inappropriate data populations, data mining can only guide
decisions and not ensure outcomes.
There is also a cost component to data mining. Data tools may require ongoing costly subscriptions,
and some bits of data may be expensive to obtain. Security and privacy concerns can be pacified,
though additional IT infrastructure may be costly as well. Data mining may also be most effective
when using huge data sets; however, these data sets must be stored and require heavy computational
power to analyze.
3) Cloud Computing - Meaning, characteristics, Types, Advantages, Cloud Computing models
Cloud Computing?
According to ZDNet, “cloud computing is the delivery of on-demand computing services — from
applications to storage and processing power — typically over the internet and on a pay-as-you-go
basis.”
In simplest terms, the cloud refers to the internet. When organizations store data in virtual data centers
or access programs using an internet connection instead of relying on their device’s hard drive or on-
premises IT infrastructure, it means they are operating in the cloud.
Cloud computing can be as simple as “servers in a third-party data center” or entire serverless
workloads that are infinitely scalable and geo-redundant. Cloud servers and services are scalable and
elastic.
Cloud computing is the delivery of computing resources, such as IT infrastructure or data center over
the internet. This model allows businesses to rent storage space or access software programs from a
cloud service provider, instead of building and maintaining their own IT infrastructure or data center.
One major benefit of using cloud computing services is that companies pay only for the resources they
use.
To better understand its technical aspects, cloud computing processes can be divided into frontend and
backend. The frontend component allows users to access data and programs stored in the cloud through
an internet browser or by using a cloud computing application. The backend consists of servers,
computers and databases that store the data.
According to Technology Review, the phrase “cloud computing” was first mentioned in 1996 in a
Compaq internal document.
The year 1999 was a milestone for cloud computing when Salesforce became the first company to
deliver enterprise applications over the internet. This was also the beginning of Software-as-a-Service
(SaaS).
In 2002, Amazon launched Amazon Web Services (AWS), which was another significant development
in cloud computing. Its suite of cloud-based services included storage, computation and even human
intelligence. In 2006, Amazon launched Elastic Compute Cloud (EC2), allowing businesses as well as
individuals to rent virtual computers and run their own computer applications.
The year 2009 saw yet another giant milestone in cloud computing as Google Workspace (now Google
Workspace) started to provide browser-based enterprise applications. In the same year, Microsoft
entered the cloud computing arena with Microsoft Azure, and soon companies
like Oracle and HP followed suit.
Cloud computing includes everything from virtual machines to databases to entire serverless
applications. Some examples of cloud computing include:
Microsoft Azure: Microsoft Azure is a fine example of a Platform-as-a-Service (PaaS) that supports
the entire application development lifecycle, right from development to deployment and beyond. Azure
provides a plethora of tools, languages and frameworks to developers.
Dropbox: Dropbox is a cloud-based file hosting service that allows users to store and sync files to their
devices so they can access them from anywhere. It also allows users to share large files, including
images and videos via the internet, facilitating effective collaboration.
Before cloud computing came into existence, companies were required to download applications or
programs on their physical PCs or on-premises servers to be able to use them. For any organization,
building and managing its own IT infrastructure or data centers is a huge challenge. Even for those who
own their own data centers, allocating a large number of IT administrators and resources is a struggle.
The introduction of cloud computing and virtualization was a paradigm shift in the history of the
technology industry. Rather than creating and managing their own IT infrastructure and paying for
servers, power and real estate, etc., cloud computing allows businesses to rent computing resources
from cloud service providers. This helps businesses avoid paying heavy upfront costs and the
complexity of managing their own data centers. By renting cloud services, companies pay only for
what they use such as computing resources and disk space. This allows companies to anticipate costs
with greater accuracy.
Since cloud service providers do the heavy lifting of managing and maintaining the IT infrastructure,
it saves a lot of time, effort and money for businesses. The cloud also gives organizations the ability to
seamlessly upscale or downscale their computing infrastructure as and when needed. Compared to the
traditional on-premises data center model, the cloud offers easy access to data from anywhere and on
any device with internet connectivity, thereby enabling effective collaboration and enhanced
productivity.
From startups to large corporations and government agencies, every organization uses the cloud to
access technology services to streamline workflows, improve communication, productivity, service
delivery and more. Listed below are some of the most common uses of cloud computing.
• Storage: One of the most common uses of cloud computing is file storage. While there are several
options to store and access data, such as hard drives on PCs, external hard drives, USB drives, etc.,
cloud storage enables businesses to seamlessly access data from anywhere and on any device with an
internet connection. Cloud storage services like Amazon S3, DropBox or OneDrive provide secure
access to data and also allows businesses to upscale and downscale storage space based on their
requirements.
• Database: Cloud database is another popular business use case. IBM defines cloud database as “a
database service built and accessed through a cloud platform.” A cloud database delivers most of the
same functionalities as a traditional database, but with additional benefits such as flexibility, cost
savings, failover support, specialized expertise and more.
• Web applications: Web applications are a must-have tool for businesses today. Powered by cloud
technology, anyone can access web-based apps using a web browser, providing instant remote access
to information. This allows business professionals to communicate with customers and provide them
with required information while they’re on the go, and helps them collaborate with colleagues from
anywhere.
• Collaboration: Due to its easy accessibility, integration, flexibility, security and ease of use, cloud-
based tools, such as Microsoft 365 and Google Workspace, have become the obvious choice for
businesses looking to collaborate both internally across departments and externally with clients. Gmail,
Google docs, Microsoft Outlook, Microsoft Word, Teams, etc., are powerful business tools designed
to enhance collaboration and productivity.
• SaaS applications: Software-as-a-Service (SaaS) applications, such as Salesforce, allow businesses to
store, organize and maintain data, as well as automate marketing and manage clients efficiently. SaaS
solutions are highly functional and do not require software and/or hardware management.
There are four main types of cloud computing: public, private, hybrid and multicloud.
Public cloud
VMware defines public cloud as “an IT model where on-demand computing services and infrastructure
are managed by a third-party provider and shared with multiple organizations using the public internet.”
Cloud service providers offer various services like Infrastructure-as-a-Service (IaaS), Platform-as-a-
Service (PaaS) and SaaS to individuals and businesses who rent these services on a monthly or pay-
per-use basis. Amazon Web Services (AWS), Microsoft Azure, Google Cloud, Alibaba
Cloud and IBM Cloud are the top five cloud providers.
Private cloud
A private cloud or an internal cloud is where the IT infrastructure (hardware and software resources)
is solely dedicated to a single organization, unlike a public cloud where the computing resources are
shared among multiple tenants. A private cloud environment is ideal for businesses for whom meeting
regulatory requirements, security and control are a priority. Traditionally, a private cloud is hosted at a
company’s data center and uses its own hardware. However, an organization may outsource hosting to
a third-party provider who remotely manages the computing resources.
Hybrid cloud
A hybrid cloud is a combination of both public cloud and private cloud environments. Businesses use
this model to supplement their compute capacity. When the capacity of a private cloud reaches its peak,
businesses can leverage public cloud to enhance the capabilities of the private cloud. Hybrid cloud
enables businesses to scale compute capacity up or down depending on the traffic or service demands.
This eliminates the need to purchase and maintain new servers, allowing businesses to save cost, time
and effort.
Multicloud
Multicloud is the practice of using a combination of clouds — two or more public or private clouds, or
a combination of both, from several cloud providers. A multicloud approach allows businesses to select
the best services from different cloud vendors based on their budgets, technical requirements,
geographic locations and so on. This model enables businesses to use different clouds for different
purposes. For instance, an organization can use one cloud for software development and testing, another
cloud for data backup and disaster recovery, and other for data analytics.
The three types of cloud computing services are Infrastructure-as-a-Service (IaaS), Platform-as-a-
Service (PaaS) and Software-as-a-Service (SaaS).
Infrastructure-as-a-Service (IaaS)
IaaS is a cloud computing service where cloud providers deliver and manage virtualized computing
infrastructure over the internet. Instead of creating an in-house IT infrastructure, businesses can access
essential resources, such as operating systems, networking, storage space, development tools, etc., on
demand. This saves hardware and software costs as well as minimizes the burden of IT staff.
Platform-as-a-Service (PaaS)
PaaS allows businesses to concentrate on the development, deployment and management of software
applications and services without having to worry about the underlying infrastructure since cloud
providers do the heavy lifting. With PaaS, developers and programmers gain access to not only IT
infrastructure but also application/software platform and solution stack. Some of the examples of PaaS
include AWS Elastic Beanstalk, Google App Engine and Microsoft Azure.
Software-as-a-Service (SaaS)
SaaS provides businesses with ready-to-use software that is delivered to users over the internet. All of
the underlying infrastructure, including hardware, software, data storage, patch management and
hardware/software updates, are managed by SaaS providers. SaaS is a subscription-based model, which
requires businesses to subscribe to the services they want to use. Users can access SaaS applications
directly through web browsers, which eliminates the need to download or install them. SaaS allows
users to access web-based solutions from anywhere and at any time with an active internet connection.
Some popular SaaS solutions include Microsoft 365, Google Workspace and Salesforce.
Cloud computing enables businesses to operate from virtually anywhere and with more efficiency.
Some benefits of cloud computing include:
• Cost savings: One of the greatest benefits of cloud computing is reduced costs. Since businesses do
not need to build their own IT infrastructure or purchase hardware or equipment, it helps companies
reduce capital expenses significantly.
• Flexibility/scalability: Cloud computing offers greater flexibility to businesses of all sizes. Whether
they require extra bandwidth, computing power or storage space, they can seamlessly scale up or down
computing resources depending on their needs and budget.
• Security: Data security is a major concern for businesses today. Cloud vendors provide advanced
security features like authentication, access management, data encryption, etc., to ensure sensitive data
in the cloud is securely handled and stored.
• Mobility: Cloud computing allows users to access corporate data from any device, anywhere and at
any time, using the internet. With information conveniently available, employees can remain
productive even on the go.
• Increased collaboration: Cloud applications allow businesses to seamlessly communicate and
securely access and share information, making collaboration simple and hassle-free. Cloud computing
empowers multiple users to edit documents or work on files simultaneously and in a transparent
manner.
• Disaster recovery: Data loss and downtime can cause irreparable damage to businesses of any size.
Major cloud vendors are well-equipped to withstand unforeseen disruptive events, such as
hardware/software failure, natural disasters and power outages, to ensure high application availability
and business continuity.
• Automatic updates: Performing manual organization-wide software updates can take up a lot of
valuable IT staff time. However, with cloud computing, service providers regularly refresh and update
systems with the latest technology to provide businesses with up-to-date software versions, latest
servers and upgraded processing power.
Disadvantages of Cloud Computing
The advantages of operating in the cloud are immense. However, there are certain disadvantages that
companies should be aware of before deciding to transition to the cloud. Listed below are the top five
disadvantages of cloud computing.
1. Downtime: Since cloud computing systems are completely reliant on the internet, without an active
internet connection, businesses cannot access the data or applications hosted in the cloud. Google
suffered three severe outages in 2020 that affected the majority of its services and users across the
globe.
2. Vendor lock-in: Migrating a company’s workloads and services from one cloud provider to another is
a major challenge in cloud computing. Differences between cloud environments may cause
compatibility or integration issues. If the transition isn’t handled properly, it could expose an
organization’s data to unnecessary security vulnerabilities.
3. Limited control: Since the cloud infrastructure is wholly owned and managed by the cloud vendor,
businesses using cloud computing services have limited control over their data, applications and
services. Therefore, it’s important to have a proper end-user license agreement (EULA) in place to
understand what a business can do and can’t do within a cloud infrastructure.
4. Security: One of the major concerns of storing a company’s sensitive data in the cloud is security.
Although cloud service providers implement advanced security measures, storing confidential files on
remote servers that are entirely owned and operated by a third party always opens up security risks.
When an organization adopts a cloud computing model, the IT security responsibility is shared between
the cloud vendor and the user. As such, each party is responsible for the assets, processes and functions
they control.
5. Data loss or theft: Storing crucial data in virtual data centers can open the doors to a variety of risks
that could lead to data loss, such as cloud misconfiguration, information theft, security breach, stolen
credentials, etc. Moreover, cloud service providers, such as Microsoft and Google, follow a shared
responsibility model, where the vendor assumes responsibility for application availability and
everything that entails, while the customer retains responsibility for application data, administration
and user management.
4) AI – Introduction, Application, types
The definition of Artificial Intelligence says: “Description In computer science, artificial intelligence,
sometimes called machine intelligence, is intelligence demonstrated by machines. In contrast to the natural
intelligence displayed by humans.” Artificial Intelligence (AI) refers to the induction of human intelligence
in computers. Which are experts to think like humans and imitate their behavior. Additionally, the word
may also refer to any computer that displays human mind-like characteristics. Such as learning and
problem-solving based on that learning.
Above all, AI is the technology that makes machines “think”. Also, it enables them to do tasks like humans
do. It is not remembering data and process it as common programs do. It is enabling machines to think on
their own and make logical decisions about things like humans do. The common technologies or algorithms
that make AI possible are listed below. Anything that doesn’t use these high-level algorithms can’t be
regarded as AI.
• Machine Learning
• Deep Learning
• Neural Networks
• Bayesian networks
• Evolutionary algorithms
Before we move on to discover the various types and applications of artificial intelligence, we need to visit
the world of Alan Turing and more specifically the Turing Test; a method of inquiry.
Long before AI was a commonly used term in the world. Alan Turing had made a proposition that
highlighted that the criteria for a computer to qualify as having artificial
intelligence would simply be whether or not it could mimic human responses under specific conditions.
The test places a human observer or judge at the center of it all and asks it to decide the “human” out of the
two candidates (one of which is a computer). If the judge points to the computer as the human candidate. It
means that the computer did indeed have artificial intelligence. Since it was able to present
itself convincingly as a human to a blind judge.
While this test has its own set of problems with validity and even with the method of performance. It does
not do away with the fact that with the right training and programming. Computers can gain accurate
knowledge and data. This can be useful to assist humans across a variety of forms/arenas.
Types of Artificial Intelligence
The following can also be thought of as stages of AI through which AI is evolving and finally reach the
stage like human intelligence. We discuss the three most common types of Artificial Intelligence below.
Artificial Narrow Intelligence (ANI), also known as Narrow AI or Weak AI. It is a form of Artificial
Intelligence that performs one narrow range or a single task. It has a limited spectrum of capabilities. For
now, this is the AI that exists largely today. A machine that possesses ANI doesn’t mean it is dumb. Instead,
it means it can work with a small amount of data than humans do.
When the term AI comes to mind, it generally refers to AGI. If an Artificial Intelligence system is
designed to completely emulate human intelligence and behavior. We call it Artificial General Intelligence.
Moreover, some scientists also like to call it Strong AI and Full AI. Simply put, it is the Artificial
Intelligence System that can function and make similar decisions to humans.
Artificial Super Intelligence (ASI) is the conceptual AI, often termed as Super AI, that not only imitates
human intelligence and behavior. It is the stage where computers are self-conscious and exceed human
intelligence and ability. Also, replicating human beings’ multifaceted intellect. ASI would be far stronger
at everything we do like maths, science, art, sports, medicine. Moreover, entertainment, interpersonal
relationships, everything. Ultimately, super-intelligent beings’ decision-making and problem-solving
capacities would be far superior to human beings.
Types Of AI Applications
The following are some of the major applications of artificial intelligence that are currently in use.
1. Knowledge reasoning
Knowledge representation and reasoning in the field of artificial intelligence are dedicated to representing
information about the world. In a form that a computer system can use to solve complex tasks. Accordingly,
the application allows a computer to collect raw data from different companies, institutions, and centers.
Likewise, it then represents it in graphical forms. To extract relations and patterns in the data. A machine
then finally uses this data form to take further actions just like humans would do. The most common
examples of knowledge reasoning are medical diagnose, human-like speech, or theorem provers.
2. AI Planning
Automated planning, commonly referred to as AI planning, is the application of AI. It deals with producing
concrete steps or courses of action for a specified task that optimize performance measures. AI planning
describes steps for a described system. These algorithms make use of the way humans perform a task. So,
they write code for machines to do the same. Common examples include robots and autonomous systems,
cognitive assistants, and service composition.
Instead of using explicit instructions, relying on patterns and inference. ML is the subset of AI that uses
training data to make predictions about a specific field. It is also referred to as predictive analytics. As it
trains on historical data available about a domain. Also, learns the factors that contribute to the output. ML
algorithms are available in a wide range of applications. Such as email filtering, weather prediction, and
computer vision. Where the creation of a traditional algorithm to perform the task is difficult or unfeasible.
NLP is like a subfield of linguistics, computer science, information engineering, and artificial intelligence.
It deals with the interaction between machines and humans. As humans use natural languages to
communicate. This field enables machines to understand these languages. Also, respond in the same
manner. You can see the most common example in digital personal assistants(DPA).
Unlike NLP which uses text to extract information. CV uses digital images or videos to help computers
gain a high-level understanding of the world. A CV is described as a field of study aimed at developing
techniques to help computers “see” and comprehend digital media. Such as photographs or
videos. However, this remains an unresolved problem based on both the limited knowledge of biological
vision and the nature of visual perception in a physical world that is dynamic and almost variable. It
is commonly used in image processing/editing applications.
What is Computer Vision and How is it Transforming Our World?
6. Biometrics
Biometrics uses methods for unique recognition of humans based upon one or more intrinsic physical or
behavioral traits. Computer science, in particular, uses this as a form of identity access management and
control. Whereby it can create personalized identity checks to prevent any mismatch or sharing of identities.
Furthermore, It is available in a wide array of industries. Many of them choose it as their method of keeping
track of employees and their workings within the organization.
7. Virtual Agent
Moreover, outside the world of commerce. These agents are also able to perform non-verbal
behavior. Listen to humans to hold conversations with them regarding everyday topics if need be.
8. Deep learning Platforms
Used in pattern recognition and classification (for large sets). This is a special type f machine learning that
consists of artificial neural networks with many abstraction layers.
What this helps to do is break down the data sets and arrange them in particular manners. To aid the
understanding and to help figure out any patterns/classifications/groupings that might be possible within
that one set. All this also helps to gain insight on data repetition, data formation, and the crossover of data
on many ends.
Deep Learning Frameworks: Choose The Best Fit For You
Major AI Companies in the World
Below is a brief introduction of major companies (hand-picked from Forbes AI 50 list around the world
that are using AI to solve real-world problems.
Nuro
An AI company that builds autonomous vehicles to transfer goods. The range is from retail centers and
shops to homes or storage to shopping centers.
Uptake
A five-year-old company that leverages artificial intelligence to analyze how its customers’ machines can
run better and avoid common failures.
Lemonade
They sell renters and homeowners insurance through the use of a chatbot to collect customer information
and work through claims.
Dataminr
The company ingests public internet data. Like social media posts and uses deep learning, natural language
processing, and advanced statistical modeling to send users tailored alerts.
Icertis
Earlier this year, the company celebrated its tenth anniversary. They use a cloud-based platform to help
companies analyze past contract negotiations. Moreover, automate administrative tasks.
5) Big Data – Meaning , uses, issues with big data, benefits, Operational & analytical big data,
challenges
Definition: As Gartner defines it – “Big Data are high volume, high velocity, or high-variety information
assets that require new forms of processing to enable enhanced decision making, insight discovery, and
process optimization.”Let's dig deeper and understand this in simpler terms.
The term ‘big data’ is self-explanatory − a collection of huge data sets that normal computing techniques
cannot process. The term not only refers to the data, but also to the various frameworks, tools, and
techniques involved. Technological advancement and the advent of new channels of communication (like
social networking) and new, stronger devices have presented a challenge to industry players in the sense
that they have to find other ways to handle the data.
From the beginning of time until 2003, the entire world only had five billion gigabytes of data. The same
amount of data was generated over only two days in 2011. By 2013, this volume was generated every ten
minutes. It is, therefore, not surprising that a generation of 90% of all the data in the world has been in the
past few years.
All this data is useful when processed, but it had been in gross neglect before the concept of big data came
along.
With the development and increase of apps and social media and people and businesses moving online,
there’s been a huge increase in data. If we look at only social media platforms, they interest and attract
over a million users daily, scaling up data more than ever before. The next question is how exactly is this
huge amount of data handled and how is it processed and stored. This is where Big Data comes into play.
And Big Data analytics has revolutionized the field of IT, enhancing and adding added advantage to
organizations. It involves the use of analytics, new age tech like machine learning, mining, statistics and
more. Big data can help organizations and teams to perform multiple operations on a single platform,
store Tbs of data, pre-process it, analyze all the data, irrespective of the size and type, and visualize it too.
This is the data generated by airplanes, including jets and helicopters. Black box data includes
flight crew voices, microphone recordings, and aircraft performance information.
This is data developed by such social media sites as Twitter, Facebook, Instagram, Pinterest,
and Google+.
This is data from stock exchanges about the share selling and buying decisions made by
customers.
This is data from power grids. It holds information on particular nodes, such as usage
information.
5. Transport Data
This includes possible capacity, vehicle model, availability, and distance covered by a vehicle.
This is one of the most significant sources of big data. Search engines have vast databases
where they get their data.
Additionally, Bernard Marr, a Big Data and Analytics expert, has come up with his brilliant list of 20
Big Data sources that are freely available to everybody on the web. Some of them are briefed about
here.
• Data.gov – where all of the US Government’s data is freely accessible, and information ranging from
climate to crime is available.
• Analogous to this is the UK Government’s portal, Data.gov.uk, where metadata on all of UK books
and publications since 1950 can be gathered.
• There is also the US Census Bureau – which covers valuable information like population, geography,
and other data. Identical to this is the European Union Open Data Portal, comprising the census data
from European Union institutions.
• And something closer to our interests – the Facebook Graph, provides the application program interface
information (Graph API), after gathering info from all the data that is shared publicly by its users.
• In the healthcare sector, there is the Healthdata.gov and NHS Health and Social Care Information
Centre, from the US and the UK, respectively.
Google Trends, Google Finance, Amazon Web Services public datasets, are all similar examples. From
these examples, it is clear that big data is not about volumes alone. It also includes a wide variety and
high velocity of data. In 2001, Doug Laney - an industry analyst-articulated the 3 Vs of big data as
velocity, volume, and variety.
The speed at which data is streamed, nowadays, is unprecedented, making it difficult to deal with it in
a timely fashion. Smart metering, sensors, and RFID tags make it necessary to deal with data torrents
in almost real-time. Most organizations are finding it difficult to react to data quickly.
Not many years ago, having too much data was simply a storage issue. However, with increased storage
capacities and reduced storage costs, industry players like Remote DBA Support are now focusing on
how relevant data can create value.
There is a greater variety of data today than there was a few years ago. Data is broadly classified as
structured data (relational data), semi-structured data (data in the form of XML sheets), and
unstructured data (media logs and data in the form of PDF, Word, and Text files). Many companies
have to grapple with governing, managing, and merging the different data varieties.
Veracity (the quality of the data), variability (the inconsistency which data sometimes displays), and
complexity (when dealing with large volumes of data from different sources) are other essential
characteristics of data.
1. Today’s consumer is very demanding. He talks to pass customers on social media and looks at different
options before buying. A customer wants to be treated as an individual and to be thanked after buying
a product. With big data, you will get actionable data that you can use to engage with your customers
one-on-one in real-time. One way big data allows you to do this is that you will be able to check a
complaining customer’s profile in real-time and get info on the product/s he/she is complaining about.
You will then be able to perform reputation management.
2. Big data allows you to re-develop the products/services you are selling. Information on what others
think about your products -such as through unstructured social networking site text- helps you in
product development.
3. Big data allows you to test different variations of CAD (computer-aided design) images to determine
how minor changes affect your process or product. This makes big data invaluable in the manufacturing
process.
4. Predictive analysis will keep you ahead of your competitors. Big data can facilitate this by, as an
example, scanning and analyzing social media feeds and newspaper reports. Big data also helps you do
health-tests on your customers, suppliers, and other stakeholders to help you reduce risks such as
default.
5. Big data is helpful in keeping data safe. Big data tools help you map the data landscape of your
company, which helps in the analysis of internal threats. As an example, you will know if your sensitive
information has protection or not. A more specific example is that you will be able to flag the emailing
or storage of 16 digit numbers (which could, potentially, be credit card numbers).
6. Big data allows you to diversify your revenue streams. Analyzing big data can give you trend-data that
could help you come up with a completely new revenue stream.
7. Your website needs to be dynamic if it is to compete favorably in the crowded online space. Analysis
of big data helps you personalize the look/content and feel of your site to suit every visitor based on,
for example, nationality and sex. An example of this is Amazon’s IBCF (item-based collaborative
filtering) that drives its “People you may know” and “Frequently bought together” features.
8. If you are running a factory, big data is important because you will not have to replace pieces of
technology based on the number of months or years they have been in use. This is costly and impractical
since different parts wear at different rates. Big data allows you to spot failing devices and will predict
when you should replace them.
9. Big data is important in the healthcare industry, which is one of the last few industries still stuck with
a generalized, conventional approach. As an example, if you have cancer, you will go through one
therapy, and if it does not work, your doctor will recommend another therapy. Big data allows a cancer
patient to get medication that is developed based on his/her genes.
1. One of the issues with Big data is the exponential growth of raw data. The data centres and databases
store huge amounts of data, which is still rapidly growing. With the exponential growth of data,
organizations often find it difficult to rightly store this data.
2. The next challenge is choosing the right Big Data tool. There are various Big Data tools, however
choosing the wrong one can result in wasted effort, time and money too.
3. Next challenge of Big Data is securing it. Often organizations are too busy understanding and analyzing
the data, that they leave the data security for a later stage, and unprotect data ultimately becomes the
breeding ground for the hackers.
KCES’s College of Engineering and Management, Jalgaon
DEPARTMENT OF MANAGEMENT
Study Material
SUB: 302 Management Information System
Unit V E-Commerce
Electronic commerce is generally considered to be the sales aspect of e-business. It also consists of the
exchange of data to facilitate the financing and payment aspects of business transactions. This is an effective
and efficient way of communicating within an organization and one of the most effective and useful ways
of conducting business. It is a Market entry strategy where the company may or may not have a physical
presence.
Everything you need to know about the E- Commerce. The term electronic commerce or e-commerce refers
to any sort of business transaction that involves the transfer of information through the internet.
By definition it covers a variety of business activities which use internet as a platform for either information
exchange or monetary transaction or both at times.
E-commerce means using the Internet and the web for business transactions and/or commercial transactions,
which typically involve the exchange of value (e.g., money) across organizational or individual boundaries
in return for products and services.
The terms ‘e-commerce’ and ‘e-business’ are often used interchangeably but what do these words really
mean?
E-commerce refers to online transactions - buying and selling of goods and/or services over the Internet.
E-business covers online transactions, but also extends to all Internet based interactions with business
partners, suppliers and customers such as: selling direct to consumers, manufacturers and suppliers;
monitoring and exchanging information; auctioning surplus inventory; and collaborative product design.
These online interactions are aimed at improving or transforming business processes and efficiency.
The architectural framework for e-commerce consists of six layers of functionality or services as follows:
1. Application services.
2. Brokerage services, data or transaction management.
3. Interface and support layers.
4. Secure messaging, security and electronic document interchange.
5. Middleware and structured document interchange, and
6. Network infrastructure and the basic communication services.
Application services
In the application layer services of e-commerce, it is decided that what type of e- commerce application is
going to be implemented. There are three types of distinguished e-commerce applications i.e., consumer to
business application, business to-business application and intra-organizational application.
This layer is rapidly becoming necessary in dealing with the voluminous amounts of information on the
networks. This layer works as an intermediary who provides service integration between customers and
information providers, given some constraint such as low price, fast services or profit maximization for a
client. For example, a person wants to go to USA from Bangladesh. The person checks the sites of various
airlines for the low-price ticket with the best available service. For this he must know the URLs of all the
sites. Secondly, to search the services and the best prices, he also has to feed the details of the journey again
and again on different sites. If there is a site that can work as information broker and can arrange the ticket
as per the need of the person, it will save the lot of time and efforts of the person. This is just one example
of how information brokerages can add value.
Another aspect of the brokerage function is the support for data management and traditional transaction
services. Brokerages may provide tools to accomplish more sophisticated, time-delayed updates or future-
compensating transactions.
The third layer of the architectural framework is interface layer. This layer provides interface for e-
commerce applications. Interactive catalogs and directory support services are the examples of this layer.
Interactive catalogs are the customized interface to customer applications such as home shopping.
Interactive catalogs are very similar to the paper-based catalog. The only difference between the interactive
catalog and paper-based catalog is that the first one has the additional features such as use of graphics and
video to make the advertising more attractive.
Directory services have the functions necessary for information search and access. The directories attempt
to organize the enormous amount of information and transactions generated to facilitate e-commerce.
The main difference between the interactive catalogs and directory services is that the interactive catalogs
deal with people while directory support services interact directly with software applications.
In any business, electronic messaging is an important issue. The commonly used messaging systems like
phone, fax and courier services have certain problems like in the case of phone if the phone line is dead or
somehow the number is wrong, you are not able to deliver the urgent messages. In the case of courier
service, if you want to deliver the messages instantly, it is not possible as it will take some time depending
on the distance between the source and destination places. The solution for such type of problems is
electronic messaging services like e-mail, enhanced fax and EDI.
The electronic messaging has changed the way the business operates. The major advantage of the electronic
messaging is the ability to access the right information at the right time across diverse work groups.
The main constraints of the electronic messaging are security, privacy, and confidentiality through data
encryption and authentication techniques.
Middleware services
The enormous growth of networks, client server technology and all other forms of communicating
between/among unlike platforms is the reason for the invention of middleware services. The middleware
services are used to integrate the diversified software programs and make them talk to one another.
Network Infrastructure
We know that the effective and efficient linkage between the customer and the supplier is a precondition
for e-commerce. For this a network infrastructure is required. The early models for networked computers
were the local and long distance telephone companies. The telephone company lines were used for the
connection among the computers. As soon as the computer connection was established, the data traveled
along that single path. Telephone company switching equipment (both mechanical and computerized)
selected specific telephone lines, or circuits, that were connected to create the single path between the caller
and the receiver. This centrally-controlled, single-connection model is known as circuit switching.
Electronic Market
Electronic Market: is a place where online shoppers and buyers meet. E-market handles business transaction
including bank-to-bank money transfer also. In e-market, the business center is not a physical building. But
it is a network-based location where business activities occur. In e-market, the participants like buyers,
sellers and transaction handler are not only one different locations but even they do not know each other.
An IOS is a unified system with several business partners. A typical IOS will include a company and its
supplier and customers. Through IOS buyers and sellers arrange routine business transactions. Information
is exchanged over communication network using specific formats. So, there is no need for telephone calls,
papers, documents or correspondence.
- EDI (Electronic Data Interchange): It provide secure B2B connection over value added network(Van’s)
- Extranet: which provide secure B2B connection over internet.
- EFT (Electronic Fund Transfer): Electronic Fund Transfer from one account to another.
- Electronic Forms: Online (web-pages) forms on internet.
- Shared Data Base: information stored in repositories (collection of data) shared by trading partners
- Supply Chain Management: Co-operation between company and its suppliers and customers regarding
demand forecasting, inventory management and order fulfillment.
Types of E-Commerce.
E-commerce conducted between businesses differs from that carried out between a business and its
consumers. There are five generally accepted types of e-commerce:
Business to Business or B2B refers to e-commerce activities between businesses. An e-commerce company
can be dealing with suppliers or distributors or agents. These transactions are usually carried out through
Electronic Data Interchange or EDI. In general, B2Bs require higher security needs than B2Cs. For example,
manufacturers and wholesalers are B2B companies.
With the help of B2B e-commerce, companies are able to improve the efficiency of several common
business functions, including supplier management, inventory management and payment management.
Using e-commerce enabled business applications, companies are able to better control their supplier costs
by reducing PO (purchase order) processing costs and cycle times. This has the added benefit of being able
to process more POs at a lesser cost in the same amount of time. E-commerce technology can also serve to
shorten the order-ship- bill cycle of inventory management by linking business partners together with the
company to provide faster data access. Businesses can improve their inventory auditing capabilities by
tracking order shipments electronically, which results in reduced inventory levels and improves upon the
ability of the company to provide “just-in- time” service.
This e-commerce technology is also being used to improve the efficiency of managing payments between
a business and its partners and distributors. By processing payments electronically, companies are able to
lower the number of clerical errors and increase the speed of processing invoices, which results in lowered
transaction fees.
Business to Customer (B2C)
Business to Customer or B2C refers to e-commerce activities that are focused on consumers rather than on
businesses. For instance, a book retailer would be a B2C company such as Amazon.com and other
companies that follow a merchant model or brokerage business models. Other examples could also be
purchasing services from an insurance company, conducting online banking and employing travel services.
Customer to Business or C2B refers to e-commerce activities, which use reverse pricing models where the
customer determines the prices of the product or services. In this case, the focus shifts from selling to
buying. There is an increased emphasis on customer empowerment.
In this type of e-commerce, consumers get a choice of a wide variety of commodities and services, along
with the opportunity to specify the range of prices they can afford or are willing to pay for a particular item,
service or commodity. As a result, it reduces the bargaining time, increases the flexibility and creates ease
at the point of sale for both the merchant and the consumer.
Customer to Customer or C2C refers to e-commerce activities, which use an auction style model. This
model consists of a person-to-person transaction that completely excludes businesses from the equation.
Customers are also a part of the business and C2C enables customers to directly deal with each other. An
example of this is peer auction giant, Ebay.
It is a new trend in e-commerce. This type of e-commerce is used by the government departments to directly
reach to the citizens by setting-up the websites. These websites have government policies, rules and
regulations related to the respective departments. Any citizen may interact with these websites to know the
various details. This helps the people to know the facts without going to the respective departments. This
also saves time of the employees as well as the citizens. The concept of Smart City has been evolved from
B2G e-commerce.
Benefits of E-Commerce
Few innovations in human history encompass as many potential benefits as E- Commerce does. The global
nature of the technology, low cost, opportunity to reach hundreds of millions of people, interactive nature,
variety of possibilities, and resourcefulness and growth of the supporting infrastructure (especially the web)
result in many potential benefits to organizations, individuals, and society. These benefits are just starting
to materialize, but they will increase significantly as E-Commerce expands. It is not surprising that some
maintain that the E-Commerce revolution is just 'as pro- found as the change that came with the industrial
revolution.
Benefits to Organizations
Benefits to Society
- Electronic commerce enables more individuals to work at home and to do less traveling for shopping,
resulting in less traffic on the roads and lower air pollution.
- Electronic commerce allows some merchandise to be sold at lowest prices, so less affluent people can
buy more and increase their standard of living.
- Electronic commerce enables people in third world countries and rural areas to enjoy products and
services that otherwise are not available to them.
- Electronic commerce facilitates delivery of public services, such as health care, education, and
distribution of government social services at a reduced cost and/or improved quality. Health care services,
e.g., can reach patients in rural areas.
The limitations of E-Commerce can be grouped into two categories which are:
Non-technical Limitations
Of the many non-technical limitations that slow the spread of E-Commerce, the following are the major
ones:
Lack of Awareness: Lack of awareness of the technology and its potential benefits are also equally
responsible for the poor growth of e-commerce. Lack of interest and willingness to make a paradigm shift
has become a crucial issue. Many companies are not willing to accept that their businesses need a
revolutionary change to subsist in the potentially digital world. The single most important challenge today
pertains to increasing awareness of the benefits of e-commerce to potential customers, educate the market
and the customers will themselves opt for these services.
Lack of Infrastructure: E-commerce infrastructure development is at its infancy stage in Bangladesh. This
unsatisfactory development is yet another major bottleneck for successful net business in Bangladesh.
This high cost of infrastructure development for e-business is also including the cost of leased lines.
Lack of Confidence: The people in Bangladesh still show hesitancy in buying through the Net. Lack of
quality products, timely delivery of products as some of them tend to go out of stock, lack of solutions
security are the potential reasons for not developing e-commerce. People do not understand this new way
of buying and selling products, i.e. the services in a digital environment which are available online.
Skeptic Attitude: Though the Internet is continuing to grow at a rapid rate, along with e- commerce
transactions, the shoppers are still skeptical about safety and have not been quick to trust sending personal
information such as credit card numbers or address over the Net. Lack of adequate imagination and
understanding of what web- based technologies can do to markets and competition only adds to the delay
in economic development. The old business habits are demanding and controlling the business. The risk
adverse attitude of the people is conspicuous and waiting for others to lead is also another attitude.
Credit Cards Frauds: In Bangladesh, distribution channels are just one part of the problem related to e-
payments. The bigger problem is that of security. All credit cards related transactions are approved offline
and given the high incidence of frauds, the banks are extremely wary of approving them. In-fact, there are
some unconfirmed reports of a multi-national bank refusing to approve credit card transactions carried out
by a large Bangladesh portal.
Absence of Tax Laws: E-commerce over the Net has effectively eliminated national borders. This has
posed an important question as to tax on the transactions over the internet. Net business posed many
peculiar technological and legal problems making it difficult to impose tax and formulate a sound taxation
policy.
Cyber Laws: Another important problem is lack of comprehensive cyber laws so as to ensure safety and
protection. There should not be any legal regulations, or barriers to faster and increased development of e-
commerce. The crying need of the hour is urgent action to be taken by the Government to enact cyber
laws including electronic fund transfer, and amendments of official Secrets Act.
Stock Dilemma: Many people are not too happy with e-commerce trends. Though online shopping may be
growing but so is frustration with it. A key source of dissatisfaction is the out of stock dilemma. In most
cases, advertised products or services are not available. The options of feedback and not receiving
suggestions are also reasons for annoyance. Many online consumers want more detailed information on
their purchases but are not available. The Net is becoming more mainstream and the expectations are also
becoming more mainstream.
Lack of Skills and Expertise: Lack of skilled and trained personnel impedes the growth of implementation
of IT related e-commerce. The use of the Net for trade requires a complex introduction of servers, browser
software and knowledge of web design, hosting, promotion and many more skills. It requires understanding
many new things. Many Bangladeshi businesses are not prepared to approach electronic commerce. For
many business houses for which commerce over internet may not work, would take a lot of efforts for every
little return.
Internet Outrage: Failures in networks and the Net itself can play havoc. We read of frequent press reports
of internet outrages. The IT industry is notyet attempting to improve network reliability to prevent these
outrages. Reliability is a major issue in net business that needs to be attended.
Absence of Cyber Brand Image: Another problem is that advertising and the Net tends to focus on e-
commerce rather than on brands found in the real world. This would prove to be a deterrent in ensuring
consumer loyalty. The biggest thing going for it is a brand image and power. Though the already existing
name is known and trusted, the issue is how to extend it into the new cyber reality. A concern should be to
preserve the old values of trust and dependability of the brand, and at the same time, keep it upon on the
Net. At the same time, the whole business structure will have to undergo a change re-engineered.
Inadequate Government Role: The government is not taking a serious view of e- commerce related
information technology in terms of its promotion. Spreading awareness, imparting education, of the benefits
of e-commerce, enacting new cyber laws, amendments to existing commercial laws, developing strong,
communication infrastructure are the key domestic roles for the government to play.
No Encouragement from Business Community: The business community is extremely an important sector
to be targeted for the introduction of any technological innovations in business. It means it is the business
community that sustains e-commerce and greatly influences the thinking and adoption process of various
segments of the society to move forward in the field of information technology. It motivates the people who
share the courage and conviction to move the new business paradigm.
Preferring Foreign Sites: Online shoppers in Bangladesh do not prefer Bangladeshi websites to a large
extent and prefer US and other foreign websites. There are many reasons for this as they provide better
selection, prices, stock, quality products, shipping, payment process security, customer service and wide
variety of sites among other things.
Difficulty of Reengineering: The web business structure will have to undergo a drastic change and be
reengineered. It is not just about having a website or about sticking a web address on conventional
advertising or transferring a few people to a new division and designation. It is about breaking free and
creating new web services to satisfy the existing customers.
Internet for Small Business: Another problem is that for major project, a large consumer product company
needs profiling of customers who undertake transaction through e-commerce. E-commerce is still being
dominated by large corporations. Small and medium sized business houses have to take advantage of
everything on the Net. Online shopping is clearly catching on with consumers and retailers need to keep
pace with growing demands.
Infant Stages: Electronic commerce is still in its infant stage. Bangladeshi commerce is establishing itself
in the area of internet business. The concept of e-commerce is still in evolutionary stage, it is a job that still
needs to be defined. The IT function has not grown beyond the marketing department and credit cards,
merchant accounts, digital signatures and prompt payment and one has to realize that the e-commerce role
is more about harnessing technological resources to deliver profits to the Net users. Only a few Bangladeshi
big houses have gone online to explore the potentials of e-commerce.
E-commerce has yet to take off in Bangladesh, because Bangladeshi consumers are wary of leaving their
re credit card numbers on the Net. They eye the neighborhood shopkeeper with suspicion and drive a hard
bargain. So, e-commerce websites are losing thousands of customers.
EDI
EDI stands for Electronic Data Interchange. EDI is an electronic way of transferring business documents in
an organization internally, between its various departments or externally with suppliers, customers, or any
subsidiaries. In EDI, paper documents are replaced with electronic documents such as word documents,
spreadsheets, etc.
EDI Documents
Following are the few important documents used in EDI −
• Invoices
• Purchase orders
• Shipping Requests
• Acknowledgement
• Business Correspondence letters
• Financial information letters
Steps in an EDI System
Following are the steps in an EDI System.
• Reduction in data entry errors. − Chances of errors are much less while using a computer for data entry.
• Shorter processing life cycle − Orders can be processed as soon as they are entered into the system. It
reduces the processing time of the transfer documents.
• Electronic form of data − It is quite easy to transfer or share the data, as it is present in electronic format.
• Reduction in paperwork − As a lot of paper documents are replaced with electronic documents, there is
a huge reduction in paperwork.
• Cost Effective − As time is saved and orders are processed very effectively, EDI proves to be highly cost
effective.
• Standard Means of communication − EDI enforces standards on the content of data and its format which
leads to clearer communication.
E-Commerce Overview
E-Commerce or Electronics Commerce is a methodology of modern business, which addresses the need of
business organizations, vendors and customers to reduce cost and improve the quality of goods and services
while increasing the speed of delivery. Ecommerce refers to the paperless exchange of business information
using the following ways −
• Non-Cash Payment − E-Commerce enables the use of credit cards, debit cards, smart cards,
electronic fund transfer via bank's website, and other modes of electronics payment.
• 24x7 Service availability − E-commerce automates the business of enterprises and the way
they provide services to their customers. It is available anytime, anywhere.
• Advertising / Marketing − E-commerce increases the reach of advertising of products and
services of businesses. It helps in better marketing management of products/services.
• Improved Sales − Using e-commerce, orders for the products can be generated anytime,
anywhere without any human intervention. It gives a big boost to existing sales volumes.
• Support − E-commerce provides various ways to provide pre-sales and post-sales assistance
to provide better services to customers.
• Inventory Management − E-commerce automates inventory management. Reports get
generated instantly when required. Product inventory management becomes very efficient
and easy to maintain.
• Communication improvement − E-commerce provides ways for faster, efficient, reliable
communication with customers and partners.
E-Commerce – Disadvantages: Security, System and Data Integrity, System Scalability, ecommerce is Not
Free, Customer Relationship Problems and a Few Others
1. Security:
Security continues to be a problem for online businesses. Customers have to feel confident about the
integrity of the payment process before they commit to the purchase. Banks such as ICICI Bank, HDFC
Bank, State Bank of India have added secure payment gateways to process online banking transactions
quickly and safely.
2. System and Data Integrity:
Data protection and the integrity of the system that handles the data are serious concerns. Computer viruses
are rampant, with new viruses discovered every day. Viruses cause unnecessary delays, file backups,
storage problems, and other similar difficulties. The danger of hackers accessing files and corrupting
accounts adds more stress to an already complex operation.
3. System Scalability:
A business develops an interactive interface with customers via a website. After a while, statistical analysis
determines whether visitors to the site are one-time or recurring customers. If the company expects 2 million
customers and 6 million show up, website performance is bound to experience degradation, slowdown, and
eventually loss of customers. To stop this problem from happening, a website must be scalable, or
upgradable on a regular basis.
4. E-Commerce is Not Free:
So far, success stories in e-commerce have forced large business with deep pockets and good funding to
invest in creating on-line websites. According to a report, small retailers that go head-to-head with e-
commerce giants are fighting losing battle. As in the brick-and-mortar environment, they simply cannot
compete on price or product offering. Brand loyalty is related to this issue, which is supposed to be less
important for online firms. Brands are expected to lower search costs, build trust, and communicate quality.
A search engine can come up with the best music deals, for example, yet consumers continue to flock to
trusted entities such as HMV.
5. Consumer Search is not Efficient or Cost-Effective:
On the surface, the electronic marketplace seems to be a perfect market, where worldwide sellers and buyers
share and trade without intermediaries. However, a closer look indicates that new types of intermediaries
are essential to e-commerce. They include electronic malls that guarantee legitimacy of transactions. All
these intermediaries add to transaction costs.
6. Customer Relations Problems:
Not many businesses realise that even e-business cannot survive over the long term without loyal customers.
Building customer loyalty to a specific site is not an easy task. Customers are notoriously fickle-minded,
and do not minding visiting a competing website just to avail even one-time benefits or discounts.
7. Products-People Won’t Buy Online:
Imagine a website called furniture, com or living.com, where venture capitalists are investing millions in
selling home furnishings online. In the case of a sofa, you would want to sit on it, feel the texture of the
fabric etc. Beside the sofa test, online furniture stores face costly returns which makes the product harder
to sell online.
8. Corporate Vulnerability:
The availability of product details, catalogues, and other information about a business through its website
makes it vulnerable to access by the competition. The idea of extracting business intelligence from the
website is called web framing. And such threats are increasing day by day in this digital, networked world.
9. High Risk of Internet Start-Up:
Many stories unfolded in 1999 about successful executives in established firms leaving for Internet start-
ups, only to find out that their get-rich dream with a dot.com was just that – a dream.
With customers are getting comfortable with online shopping, nowadays, an eCommerce site and online
payment acceptance is a must to have for any business.
Customers are happy with browsing and shopping at any time from anywhere with just a few clicks and
along with this rise of online shopping and eCommerce, E-payments are gaining widespread popularity.
COVID and the limitation it has imposed on people who made online payments the need of time. Many
businesses are now offering their products and services online.
However, if you are a business and want to accept e payments, you have to work on your electronic
payment system to provide better and secure service for your customers.
And to know the e-payment system here is everything you need to know.
An e-payment or Electronic Payment system allows customers to pay for the services via electronic
methods.
They are also known as online payment systems. Normally e-payment is done via debit, credit cards,
direct bank deposits, and e-checks, other alternative e-payment methods like e-wallets, bitcoin,
cryptocurrencies, bank transfers are also gaining popularity.
Internet banking – In this case, the payment is done by digitally transferring the funds over the internet
from one bank account to another.
Card payments – Card payments are done via cards e.g. credit cards, debit cards, smart cards, stored
valued cards, etc. In this mode, an electronic payment accepting device initiates the online payment
transfer via card
Credit/ Debit card – An e payment method where the card is required for making payments through an
electronic device.
Smart card – Also known as a chip card, a smart card, a card with a microprocessor chip is needed to
transfer payments.
Stored value card – These types of cards have some amount of money stored beforehand and are needed
to make funds transfer. These are prepaid cards like gift cards, etc.
Direct debit – Direct debit transfers funds from a customer’s account with the help of a third party
E-cash – It is a form where the money is stored in the customer’s device which is used for making
transfers.
E-check – This is a digital version of a paper check used to transfer funds within accounts.
Alternate payment methods – As technology is evolving, e-payment methods kept evolving with it (are
still evolving..) These innovative alternate e-payment methods became widely popular very quickly
thanks to their convenience.
E-wallet – Very popular among customers, an E-wallet is a form of prepaid account, where customer’s
account information like credit/ debit card information is stored allowing quick, seamless, and smooth
flow of the transaction.
Mobile wallet – An evolved form of e-wallet, mobile wallet is extensively used by lots of customers.
It is a virtual wallet, in the form of an app that sits on a mobile device. Mobile wallet stores card
information on a mobile device.
The user-friendly nature of mobile wallets makes them easier to use. It offers a seamless payment
experience making customers less dependent on cash.
QR payments – QR code-enabled payments have become immensely popular. QR code stands for ‘Quick
Response’ code, a code that contains a pixel pattern of barcodes or squares arranged in a square grid.
Each part of the code contains information. This information can be merchant’s details, transaction
details, etc. To make payments, one has to scan the QR code with a mobile device.
Contactless payments – Contactless payments are becoming popular for quite some time. These
payments are done using RFID and NFC technology.
The customer needs to tap or hover the payment device or a card near the payment terminal, earning it a
name, ‘tap and go’.
UPI payments – NPCI (National Payment Corporation of India) has developed an instant real-time
payment system to facilitate interbank transactions.
This payment system is titled UPI(Unified Payment Interface). Payments via UPI can be made via an app
on a mobile device.
Biometric payments – Biometric payments are done via using/scanning various parts of the body, e.g.
fingerprint scanning, eye scanning, facial recognition, etc.
These payments are replacing the need to enter the PIN for making transactions making these payments
more accessible and easy to use.
Payments are done via Wearable devices – Wearable devices are rapidly becoming popular among
customers.
These devices are connected to the customer’s bank account and are used to make online payments.
AI-based payments – As machine learning and Artificial Intelligence is creating a revolution all around
the world, AI-based solutions are becoming more popular.
Payments based on AI such as speakers, chatbots, ML tools, deep learning tools, etc are making it easier
for businesses to maintain transparency.
Payment initiation – Customer finalizes the product/service and chooses the payment method to initiate
the transaction.
Depending on the payment method, the customer enters the required information like card number, CVV,
personal details, expiration date, PIN, etc.
The chosen payment method either redirects the customer to an external payment page or a bank’s
payment page to continue the payment process.
Payment authentication – The information submitted by the customer along with other details like
payment information, customer’s account information is authenticated by the operator.
The operator can be a payment gateway or any other solution involved. If everything gets authenticated
positively, the operator reports a successful transaction.
On the contrary, if there is any problem with any of the authentication checks, the transaction fails.
Payment settlement – After the successful authentication process, payment from the customer’s bank
gets transferred into the merchant’s account by the online payment service provider.
People are almost comfortable with online shopping and e-payments. With this trend, accepting online
payment is a must for any business.
E-payments are making shopping and banking more convenient. They are helping customers to reach
more clients locally and globally.
With e-payments, customers can pay online at any time from anywhere, making them easily accessible
and convenient for customers.
It’s easy to integrate online payment solutions with businesses as many payment processing solution
providers offering different types of solutions.
Online payment solutions come with security and risk and anti-fraud tools making them reliable and
secure not only for customers but also for merchants.
E-payments are proved to be highly effective for international transactions, as they are cheaper, easier,
faster, and generally are real-time.
KCES’s College of Engineering and Management-Jalgaon
Department of Management
MBA-II (Sem-III)
STUDY MATERIAL
CASE 1
A waiter takes an order at a table, and then enters it online via one of the six
terminals located in the restaurant dining room. The order is routed to a printer
in the appropriate preparation area: the cold item printer if it is a salad, the hot-
item printer if it is a hot sandwich or the bar printer if it is a drink. A customer’s
meal check-listing (bill) the items ordered and the respective prices are
automatically generated. This ordering system eliminates the old three-carbon-
copy guest check system as well as any problems caused by a waiter’s
handwriting. When the kitchen runs out of a food item, the cooks send out an
‘out of stock’ message, which will be displayed on the dining room terminals
when waiters try to order that item. This gives the waiters faster feedback,
enabling them to give better service to the customers. Other system features aid
management in the planning and control of their restaurant business. The system
provides up-to-the-minute information on the food items ordered and breaks out
percentages showing sales of each item versus total sales. This helps
management plan menus according to customers’ tastes. The system also
compares the weekly sales totals versus food costs, allowing planning for tighter
cost controls. In addition, whenever an order is voided, the reasons for the void
are keyed in. This may help later in management decisions, especially if the
voids consistently related to food or service. Acceptance of the system by the
users is exceptionally high since the waiters and waitresses were involved in the
selection and design process. All potential users were asked to give their
impressions and ideas about the various systems available before one was
chosen.
Questions:
1. In the light of the system, describe the decisions to be made in the area of
strategic planning, managerial control and operational control? What
information would you require to make such decisions?
2. What would make the system a more complete MIS rather than just doing
transaction processing?
3. Explain the probable effects that making the system more formal would have on
the customers and the management.
1. In the light of the system, describe the decisions to be made in the area of
strategic planning, managerial control and operational control? What
information would you require to make such decisions?
Answer: A management information system (MIS) is an organized combination
of people, hardware, communication networks and data sources that collects,
transforms and distributes information in an organization. An MIS helps
decision making by providing timely, relevant and accurate information to
managers. The physical components of an MIS include hardware, software,
database, personnel and procedures.
There are 3 areas in the organization. They are strategic, managerial and
operational control.
The information required to make such decision must be such that it highlights
the trouble spots and shows the interconnections with the other functions. It
must summarize all information relating to the span of control of the manager.
The information required to make these decisions can be strategic, tactical or
operational information.
Advantages to management:
2. What would make the system a more complete MIS rather than just doing
transaction processing?
3. Explain the probable effects that making the system more formal would have on
the customers and the management.
Answer: The management system should be an open system and MIS should be
so designed that it highlights the critical business, operational, technological and
environmental changes to the concerned level in the management, so that the
action can be taken to correct the situation. To make the system a success,
knowledge will have to be formalized so that machines worldwide have a
shared and common understanding of the information provided. The systems
As the transactions are taking place every day, the system stores all the data
which can be used later on when the hotel is in need of some financial help from
financial institutes or banks. As the inventory is always entered into the system,
any frauds can be easily taken care of and if anything goes missing then it can
be detected through the system.
CASE 2
worldwide sales in excess of $40 million a day (Ford, Honeycutt, & Simintiras,
2003).
Transaction processing is used to access and update the databases when users
need to immediately view or add information; other data processing programs
are used at regular intervals to provide summary reports of activity and database
status. Examples of systems that involve all of these functions are automated
teller machines, credit sales terminals, and airline reservation systems (Thierauf,
1978).
The information processing tools that Dell uses include computers, the internet,
maps, spreadsheets, models, and databases. For the operational level of Dell, the
most appropriate tool for information processing is maps. Through the said
Conclusion
Recommendations
Since the MIS of a company is a vital part of its operations and its survival in
the modern world, it must be well updated and it must compete well with MIS’s
competitors. The MIS of a company should be created from high standards so
that it can be of stiff competition against its counterparts. The MIS system
should help the company to achieve its goals and assist the company in reaching
its potential.
Questions:
1. Comment on the MIS in Dell and suggest the positives and negatives of MIS
in Dell?
2. The dell directly sells its computers to the customer whether it will give them
good and reliable information or they are lacking in information system due to
this move?
3. Develop the information flow diagram for dell and suggest some
improvement in the same.
CASE 3
Reception: The reception module handles various enquiries about the patient’s
admission and discharge details, bed census, and the patient’s movements
within the hospital. The system can also handle fixed-cost package deals for
Administration: This module handles all the master entry details for the
hospital requirement such as consultation detail such as doctor specialization,
consultancy fee, and service charges.
Pharmacy Store: This module deals with all medical items. This module helps
in maintaining Item Master Maintenance, Receipt of Drugs/consumables, issue
handling of material return, generating retail bills, stock maintenance. It also
helps in fulfilling the requirements of both IPD and OPD Pharmacy.
Blood Bank: The blood bank module provides information on the collection
and storage of blood, results of blood tests, cross-matching identifications, and
transfusion reactions. It also enables the maintenance of donor mailing lists and
donation ledgers. It would also provide online stock of blood available in three
blood banks (GTB, LNJP and DDU
OPD and IPD Billing: The billing module facilitates cashier and billing
operations for different categories of patients and automatic posting of charges
for different services such as lab tests, medicines supplied, consulting fees, food
and beverage charges, etc. It enables credit party billing through integration
with the financial accounting module.
Intensive Care Unit (ICU): This module caters to scheduling, maintaining ICU
Record, drug orders, consultant details, specific blood requests etc.
Marketing Module: This module ensures that the hospital gets maximum
exposure to the general public and vice versa. This module keeps track of the
enquiries made at the reception and follows the lead.
Doctor’s Module: This module helps the doctors to keep a track of the entire
medical history of a particular patient. Details such as the medicines prescribed,
general medical records, previous consultations are all available to the doctor.
Questions:
1. Using tools of System Analysis elaborate any one of the subsystems of HMS
in detail.
2. Draw any Patient registration form and any one sample MIS report.