0% found this document useful (0 votes)
13 views12 pages

MIS2

Uploaded by

Direwolf Gaming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views12 pages

MIS2

Uploaded by

Direwolf Gaming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Table of Contents

1. Introduction to XYZ Bank .................................................................................................. 1


2. Information System Activities ............................................................................................ 1
2.1. Input ............................................................................................................................ 1
2.1.1. Sources of Data .................................................................................................... 1
2.2. Process ......................................................................................................................... 1
2.3. Storage......................................................................................................................... 5
2.3.1. Storage requirements ........................................................................................... 5
2.3.2. Importance of data security and compliance with regulation .............................. 5
2.4. Output .......................................................................................................................... 5
2.4.1. Utilizing SQL queries to extract relevant data ..................................................... 6
2.4.2. Visualization ........................................................................................................ 6
2.5. Control......................................................................................................................... 8
2.5.1. Internal controls ................................................................................................... 8
2.5.2. Risk mitigation ..................................................................................................... 8
3. Creation of MIS .................................................................................................................. 8
3.1. Software selection ....................................................................................................... 8
3.2. Hardware selection ...................................................................................................... 9
3.3. Data management ........................................................................................................ 9
3.4. Personnel training ........................................................................................................ 9
3.5. Role of stakeholders .................................................................................................... 9
4. Future considerations .......................................................................................................... 9
5. Conclusion ........................................................................................................................ 10
6. References: ....................................................................................................................... 11
1. Introduction to XYZ Bank
XYZ is a bank founded on the principles of trust, transparency and accountability. The
bank is committed to empower the individuals, businesses, and communities to achieve
financial goals and aspirations. The XYZ bank’s mission is to be the main catalyst for
positive change in the financial aspect, empowering their customers to build brighter
futures and achieve financial well-being. The bank strives to deliver personalized banking
experience, innovative solutions and support to all the customers.

2. Information System Activities


Information system activities encompass a range of processes involved in the management
and utilization of information within an organization. These activities can be broadly
categorized into five key components: input, process, storage, output and control.
2.1.Input
The bank uses customer information, transaction data, and market data as inputs. The
account holders' personal information, including their demographics and transaction
history, is included in the customer information. The records of deposits, withdrawals,
transfers, load applications, and credit card transactions comprise the transaction data.
The external data on economic indicators, interest rates, and competition assessments
make up the market data.

2.1.1. Sources of Data


There are primarily two sources of data. They are:
a. Internal sources: Information generated by the bank's systems as a result of
transactions, customer interactions, and account management procedures is gathered
from internal sources. When a consumer completes a form and opens a bank account,
that is an example of an internal source. The consumer data is kept by the bank in its
database.

b. External sources: Industry reports, financial markets, and governmental


organizations are some of the third-party sources from which this data is gathered.

2.2.Process
Process involves the manipulation, transformation, or analysis of input data to produce
meaning outputs. It may include data processing, calculations or decision-making based
on the input data. For e.g.: the bank validates and processes customer transactions,
calculates account balances and also opens new accounts for the customers.
The process activities include three main components in the Management Information
System. They are described below:

1
i. Extract: The process of extracting data from various sources such as transactional
systems, spreadsheets and flat files. It involves reading data from the source systems
and storing it. The bank extracts customer information and their transactional data from
the system.

Let us take an example for demonstrating the Extract process. There are two Excel files
which contains customer information and their transaction information. The files are
named as: ‘customer_info.xlsx’ and ‘transaction.xlsx’.

Fig: Customer Information Excel file

Fig: Transactional data Excel file

To extract the data from these above files, we use the following code:
import pandas as pd
customer_df = pd.read_excel('customer_info.xlsx')

transaction_df = pd.read_excel('transaction.xlsx')

print("Customer Information:")
print(customer_df)

2
print("\nTransaction Data:")
print(transaction_df)

The above code extracts all the data into dataframes providing a complete view of the
data in the Excel files.

ii. Transform: The process of transforming the extracted data into a format that is suitable
for loading into the warehouse is called transform process. It involves cleaning and
validating data, converting data types, combining data from multiple sources and
creating new data fields.
The two separate data files are combined to get the total deposits and total transactions
done by each customer.

customer_df_cleaned =
customer_df.drop_duplicates(subset=['customer_id']).reset_index(drop=True)
customer_df_cleaned['address'] = customer_df_cleaned['address'].str.upper()

merged_df = pd.merge(transaction_df, customer_df_cleaned, on='customer_id',


how='left')

aggregate_metrics = merged_df.groupby('customer_id').agg({'transaction_amount':
['sum', 'count']})

3
aggregate_metrics.columns = ['Total Deposits', 'Total Transactions']

print("Transformed Data:")
print(aggregate_metrics)

The output is:

iii. Load: After the data transformation, it is loaded into the data warehouse. It involves
creating the physical data structures and loading the data into the warehouse. The
loaded data is organized into structured tables or data models within the target system.

customer_df_cleaned = customer_df.drop_duplicates().reset_index(drop=True)
customer_df_cleaned['address'] = customer_df_cleaned['address'].str.upper()

merged_df = pd.merge(transaction_df, customer_df_cleaned, on='customer_id',


how='left')

aggregate_metrics = merged_df.groupby('customer_id').agg({'transaction_amount':
['sum', 'count']})
aggregate_metrics.columns = ['Total Deposits', 'Total Transactions']

customer_df_cleaned.to_excel('C:\\Users\\mahat\\Downloads\\cleaned_customer_info
.xlsx', index=False)
merged_df.to_excel('C:\\Users\\mahat\\Downloads\\merged_data.xlsx', index=False)
aggregate_metrics.to_excel('C:\\Users\\mahat\\Downloads\\aggregate_metrics.xlsx')

The above code saves all the information in three separate files in the mentioned
locations.

4
2.3.Storage
Bank deals with a wide range of data including customer information, transactional data,
account details, loan information, credit stores, financial statements, reports and more. Each
type of data may have different characteristics including volume and sensitivity.

2.3.1. Storage requirements


The type of data, volume, regulatory requirements and business needs determine the
storage requirements for the bank data. Some of the common storage requirements are:

i. Scalability: Banks handle enormous amounts of data, including regulatory reports,


transaction records, client data, and historical data, among other things. Systems for
storing data must be scalable in order to handle increasing data volumes over time
without sacrificing dependability or performance.

ii. Security: Ensuring the security of bank data storage is crucial in order to safeguard
confidential information against unwanted access, data breaches, and cyber-attacks.
To protect data integrity and confidentiality, banks have strong security measures in
place, such as intrusion detection systems, access controls, encryption, and
authentication procedures.

iii.Data accessibility: Bank data must be readily accessible for various banking
operations, analytics, reporting, and regulatory compliance purposes. Storage systems
should provide rapid and dependable data access, allowing for real-time processing,
batch processing, and ad hoc inquiries.

2.3.2. Importance of data security and compliance with regulation


Ensuring the security of banking data storage is crucial in order to safeguard
confidential information against unwanted access, data breaches, and cyberattacks. To
protect data integrity and confidentiality, banks employ strong security features like
encryption, access controls, authentication procedures, and intrusion detection systems.
For banks to guarantee data governance, privacy, and legal compliance, compliance
with regulatory regulations (such as GDPR, CCPA, KYC, and AML) is imperative. To
reduce regulatory risks and stay out of trouble, banks abide by industry norms and laws
governing the storage, retention, and protection of data.
2.4.Output
The output represents all the information needed for the bank to make informed decisions.
It includes reports, analysis, and market trends which impacts the bank’s operation and
strategic decisions. Different tools and techniques can be used to generate meaningful
outputs that can be used in making informed decisions.

5
2.4.1. Utilizing SQL queries to extract relevant data
SQL (Structured Query Language) is used to query relational databases and retrieve data
for analysis and reporting. After loading the required files into the database system, we
can perform various operations.

i. Retrieving all the information


The following query can be used to retrieve the information from the database.

SELECT * FROM customer_info;

ii. Retrieving specific customer details based on conditions


The following query retrieves all the information of customers who are above the age
of 30.

SELECT * FROM customer_info WHERE Age > 30;

iii. Joining two different tables


The following query retrieves the transaction and the customer’s name.

SELECT t.Transaction_ID, c.Customer_Name


FROM transaction t
INNER JOIN customer_info c ON t.Customer_ID = c.Customer_ID;

iv. Calculation
The following query counts the total data and sums the total amount.

SELECT Customer_ID, COUNT(*) AS Transaction_Count, SUM(transaction_amount)


AS Total_Amount
FROM transaction
GROUP BY Customer_ID;
2.4.2. Visualization
Data visualization can be done using tools like histograms, bar graphs and charts. They
make it easier to understand, analyze and communicate insights.

6
Sum of loan_amount by
transaction_category
4500000
4000000
3500000
3000000
2500000
2000000
1500000
1000000
500000
0
entertainment food transportation utilities

Fig: Bar graph

Sum of account_balance by card_type

3992056.69 4513130.17

2426198.3

Fig: Pie Chart

Total deposits and transactions


9000
8000
7000
6000
5000
4000
3000
2000
1000
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

Total Deposits Total Transactions


Fig: Line
Graph

7
2.5.Control
There are primarily two ways to control the system. They are described below:
2.5.1. Internal controls
To ensure data security, compliance, and accuracy, the bank will:
• Conduct comprehensive data validation procedures to guarantee that the data input
into our MIS satisfies predetermined requirements and is error- and inconsistency-
free.
• To ensure that only authorized workers have access to sensitive data and functionality
inside the MIS, use access controls to limit access.
• Create thorough audit trails to monitor user actions, data changes, and system events,
ensuring accountability and transparency in our business practices.
2.5.2. Risk mitigation
To mitigate risks and ensure smooth operation, the bank should:
• Regularly monitor the system for anomalies, security breaches, or performance issues,
enabling us to detect and respond to potential threats in a timely manner.
• Provide ongoing training and education to our staff on security best practices, data
handling procedures, and compliance requirements, empowering them to play an
active role in safeguarding our MIS.
• Stay proactive in updating our security protocols, software patches, and system
configurations to address emerging threats and vulnerabilities, thereby staying one
step ahead of potential risks.

3. Creation of MIS
Developing and deploying a Management Information System (MIS) for a bank requires
meticulous planning and execution to ensure its efficacy in supporting the bank's operations
and strategic goals. The below are the main components that should be considered during
the creation:

3.1.Software selection
It is essential to evaluate and choose MIS software that is especially made for banking
operations and that has features catered to the demands of the sector. To support a variety
of tasks such transaction processing, customer relationship management, risk management,
and regulatory compliance, the software should have features for data management,
reporting, analytics, and visualization. When choosing the program, factors like vendor
support, scalability, adaptability, and ease of interaction with current systems should be
taken into account.

8
3.2.Hardware selection
For the hardware infrastructure to satisfy the MIS's requirements, it must be reliable and
expandable. Large volumes of data processing and storage should be handled by the servers,
storage systems, and networking equipment that will be purchased.
3.3.Data management
Data is the lifeblood of our MIS, and thus, we'll develop meticulous procedures for its
collection, storage, and maintenance. This includes defining clear data governance policies
encompassing quality standards, access controls, and retention policies. Automation tools
will be leveraged to streamline processes and uphold data consistency across the board.
3.4.Personnel training
The effectiveness of our staff's use of our MIS's capabilities is what makes it successful. In
order to do this, extensive training courses covering everything from using the software
interface to deciphering data insights will be made available. Best practices for handling
data and following strict security guidelines will receive extra attention.
3.5.Role of stakeholders
A collaborative approach is essential for the successful implementation of MIS.
Throughout the process, we'll actively involve all relevant parties, including as
management, IT staff, and end users. Through the process of seeking their feedback,
attending to their issues, and maintaining a line of communication, we will make sure that
the MIS is in complete harmony with our operational needs and company goals.

4. Future considerations
It is crucial to consider the future evolution of MIS to stay ahead of the curve and meet the
evolving needs of the organization and industry. Some key considerations for the future
development are:
i. Adaptability: The bank will place a high priority on making sure the MIS is still
flexible and expandable to handle future expansion and changes within our company.
This includes creating infrastructure and architecture that are adaptable enough to
quickly add new features, modules, and capabilities as needed.

ii. Integration: To improve MIS's functionality and effectiveness, we must look into
integration possibilities with cutting-edge technologies like blockchain, machine
learning, and artificial intelligence (AI). While connection with blockchain can
improve data security, transparency, and trust, integration with AI and ML algorithms
can enable sophisticated analytics, predictive modelling, and automated decision-
making.

iii. Emerging technologies: Maintaining current with new developments in technology


and market trends will be essential to our MIS's ongoing development. The banking
industry could experience a significant transformation in risk assessment, predictive

9
analytics, and consumer engagement with the help of technologies like the Internet of
Things (IoT). We can collect real-time data on consumer behavior, market trends, and
operational performance by utilizing IoT devices and sensors. This allows for more
informed decision-making and strategic planning.

5. Conclusion
In the dynamic and competitive world of the banking sector, the need of a well-designed
Management Information System (MIS) cannot be emphasized for XYZ Bank. MIS is
essential to enabling informed decision-making at all organizational levels since it is a
dependable source of current and accurate information. Through using technology,
embracing innovation, and cultivating a culture of ongoing enhancement, we are well-
positioned to reach unprecedented levels of success and sustain our competitive advantage
in the dynamic banking sector.

10
6. References:
Ali, K. M. F. (n.d.). Management Information System (MIS) in Banking Sector. Retrieved
April 13, 2024, from
https://www.academia.edu/9685539/Management_Information_System_MIS_in_Bankin
g_Sector
Feng, W., Zhuang, J., & Zhou, H. (2011). Cadre Information Management System Design
and Implementation of People’s Bank. Procedia Engineering, 15, 3989–3992.
https://doi.org/10.1016/J.PROENG.2011.08.747
Luo, J., Xu, J., Aldosari, O., Althubiti, S. A., & Deebani, W. (2022). Design and
Implementation of an Efficient Electronic Bank Management Information System Based
Data Warehouse and Data Mining Processing. Information Processing & Management,
59(6), 103086. https://doi.org/10.1016/J.IPM.2022.103086
Qiu, D., & Yang, Z. (2016). Design and Implementation of Bank Client Information
Management System Based on Web. https://doi.org/10.2991/EMIM-16.2016.188

11

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy