Business Information System Notes - Theory
Business Information System Notes - Theory
Learning Outcomes
Identify and describe the nature, types and use of information
Identify and describe computer technology in a business context
Develop business strategies using information systems
Explain various IT hardware, software, networking, and communication technologies
Explain the appropriate procedures of building or acquiring information system
Describe security and ethical issues related to information systems
Over the years, a transformation to an information society has been taking place, and computers and
telecommunications technologies have changed the way that organisations operate. We live in an
information age, and no business of any size can survive and compete effectively without embracing
information technology. Information is a resource of fundamental importance to an organisation. It
is necessary to understand how to apply modern technology in a business in order to achieve the
goal of the organisation. Information is the key to effective planning and efficient management of
any organisation. Information collected, stored and analyzed under Business Information Systems
can be directly utilised for both day-to-day operations and for planning.
Before we provide a definition for information systems, we first explain the terms ‗data‘,
‗information‘, and systems.
1.1.1 DATA
The word data is the plural of datum, which means fact, observation, assumption or occurrence.
Data consists of raw facts about an issue, event or situation, such as an employee‘s name, number
of hours worked in a week, sales order, patient‘s illness etc. More precisely, data are representations
of random facts pertaining to people, things, ideas and events. Data are represented by random
symbols such as letters of the alphabets, numerals, words, values or other special symbols or
images. Data can exist naturally or be created artificially. Artificial data is often produced as a
byproduct of another business process.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2022 - 2023
2
Types of Data
Data Processing
Each organisation, regardless of its size or purpose, generates data to keep record of events or
transactions that take place within the business. Generating and organizing this data in a useful way
is called data processing. Data Processing is also referred to as manipulation of data into a more
useful form. Such processing could include numerical calculations, operations (e.g. classification of
data), transmission of data from one place to another. Organisations undertake data processing
activities to obtain information with which to control and support all activities of the organisations.
Input: The activity of gathering and capturing raw data e.g. using a keyboard, mice, camera,
biometric scanner etc. Also at this step initial data or input data are prepared in some
convenient form for processing. E.g. computers input data is recorded into input medium
such as internal memory, cards, disks, flash etc.
Processing: In information systems processing involves converting or transforming data into
useful outputs using a Central Processing Unit (CPU). Input data are changed, or combined
with other information to produce data in a more useful form. This can include filtering,
calculating (aggregating, dividing, summing, subtracting), recording, duplicating, sorting,
merging, verifying, deleting, etc. E.g. pay checks may be calculated from the time cards or a
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2022 - 2023
3
summary of sales for the month may be calculated from the sales orders.
Output: In information systems, output involves producing useful information usually in the
form of documents and reports.eg using monitors, printers. Results of the preceding
‗processing‘ step are collected. The form of the output result depends on the use of the data.
E.g. pay checks for employee, printed summary of monthly sales for management, or data to
be stored for further processing.
Types of Processing
Batch processing: Refers to processing of data or information by grouping it into groups or
batches. Also known as serial/sequential, tacked/queued of offline processing. The
fundamental of batch processing is that the different jobs of different users are processed in
the order received. Once the stacking of jobs is complete, they are sent for processing while
maintaining the same order. This processing of a large volume of data helps in reducing the
processing costs thus making it data processing economical. Examples include: Examination,
payroll and billing system.
Real time processing: This processing method entails processing where the results are
displayed immediately or in lowest time possible. The data fed into the information system is
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2022 - 2023
4
used almost instantaneously for processing purpose. No lag is expected in this processing
type. Receiving and processing of transaction is carried out simultaneously. This method is
costlier than batch processing because the hardware and software capabilities are better.
Example includes banking system, tickets booking for flights, trains, movie tickets, rental
agencies etc.
Online processing: The nature of processing of this type of data processing requires use of
network connections and data is stored and used on different or remote computers. The job
received by the system is processed at same time of receiving. This can be considered and is
often mixed with real-time processing. It depends on having good networks.
1.1.2 INFORMATION
By itself, data is not that useful. To be useful, it needs to be given context. By adding the context,
data is converted into information. When data are organized or arranged in a meaningful manner
(data processing), they become information. Therefore, information can be viewed as a collection of
facts (data) organised in such a way that they have additional value beyond the value of the facts
(data) themselves. Defining and organizing relationships amongst data creates information.
NB: Information transmitted by formal means tends to be presented in a consistent manner and will
often use the same basic formats. This allows the recipient to quickly and easily locate items of
interest. Because formal information is usually more structured, it is most likely to present a
comprehensive look of the situation it describes. It tends to be more accurate and relevant since it is
created for a specific purpose. However, information that is presented formally may be rigid and
limiting in terms of the type, form and content.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2022 - 2023
5
TARGET
PURPOSE SOURCE TYPE OF INFORMATION
AUDIENCE
The materials used to promote the
Promotional external internal
organisation‘s products or services.
The data collected and provided to support
business decisions, such as planning and
budgeting, business intelligence, market
internal internal/external
intelligence, competitive intelligence,
Decision
customer and business partner feedback,
Support
and operations and functional control.
The information provided to stakeholders
external internal such as annual financial reports and
sustainability reports.
Company data such as latest news,
internal/external community activities, and internal
internal
information such as organisational changes,
Informational
promotions, and the like.
General information, such as opinions
external internal
expressed in blogs.
Instructional information such as best
internal internal/external
practices and manuals.
Activity
Training information such as best practices
Support
external internal and manuals for using products and
services. Often embedded.
internal/external Data processed for transactions such as
internal
order-to-cash and procure-to-pay.
Transaction
Data sent to partners in the value chain to
Processing internal/external
external perform transactions, such as orders and
bills of materials.
Information collected from
employees/teams, and shared through
wikis, different library reports, and research
Knowledge internal internal/external studies to buildup the knowledge base as
Building information source for decision making.
The information can be classified on its
usage.
Training and how-to materials; often sold to
external internal
customers.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2022 - 2023
6
1.1.3 SYSTEM
Simply put, a system is an organized collection of parts (or subsystems) that are highly integrated to
accomplish an overall goal.
The system has various inputs, which go through certain processes to produce certain outputs,
which together, accomplish the overall desired goal for the system. Not every system has a single
goal and very often systems are made up of many smaller systems (subsystems), all contributing to
meeting the overall system objective. For example, an organisation is made up of many
administrative and management functions, products, services, groups and individuals all working to
achieve overall organisational objectives. If one part of the system is changed, the nature of the
overall system is often changed, as well -- by definition then, the system is systemic, meaning
relating to, or affecting, the entire system.
There are numerous types of systems which range from simple to complex. For example, there are
biological systems (for example, the heart), mechanical systems (for example, a thermostat),
human/mechanical systems (for example, riding a bicycle), ecological systems (for example,
predator/prey) and social systems (for example, groups, supply and demand and also friendship).
In organisations too there are common ways of referring to systems:
Simple System and Complex System: A simple system has few components and the
relationship or interaction between elements is uncomplicated and straight forward. A
complex system has many elements that are highly related and interconnected. Complex
systems, such as social systems, are comprised of numerous subsystems, as well. These
subsystems are arranged in hierarchies, and are integrated to accomplish the overall goal of
the system. Each subsystem has its own boundaries, and includes various inputs, processes,
outputs and outcomes geared to accomplish an overall goal for the subsystem. Complex
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2022 - 2023
7
systems usually interact with their environments and are therefore open systems.
Open and Closed System: An open system interacts with its environment while a closed
system has no interaction with the environment. A closed system does not take in
information and therefore is likely to atrophy, that is to vanish. An open system receives
information, which it uses to interact dynamically with its environment. Openness increases
the system‘s likelihood to survive and prosper.
Stable and Dynamic System: A stable system undergoes very little change over time while
a dynamic system undergoes rapid and constant change over time. All organisations are
dynamic systems that operate as subsystems within the environment.
Adaptive and Non-Adaptive System: An adaptive system (sometimes known as-organizing
or cybernetic) responds to changes in the environment and modifies its operation
accordingly. The outputs obtained from system may respond to sometimes uncertain system
may respond to the same stimuli in different way. Examples of adaptive systems include
human beings, plants and business organisations. Non adaptive system is not able to change
to change in response to changes in the environment.
Permanent and Temporary System: A permanent system exists for a relatively long period
of time while a temporary system exists for only a relatively short period of time.
A high-functioning system continually exchanges feedback among its various parts to
ensure that they remain closely aligned and focused on achieving the goal of the system. If
any of the parts or activities in the system seems weakened or misaligned, the system makes
necessary adjustments (control) to more effectively achieve its goals.
Therefore we can say in order to monitor the performance of a system, some kind of feedback
mechanism is required. In addition control must be exerted to correct any problems that occur and
ensure that the system is fulfilling its purpose.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2022 - 2023
8
1.1.4 INFORMATION SYSTEMS
An Information System (IS) is a set of interrelated components that collect, manipulate, store and
disseminate data and information to achieve an objective or goal. In order for an information system
to support the organisation it should have a feedback and control mechanism that improves the
function of the system. Business Information Systems are the combination of hardware, software,
communication networks and procedures that people and organisations use to collect, filter, process,
create, and distribute data and information for their success. In Business Information Systems
(BIS), the feedback mechanism helps organisations to achieve their goals such as increasing profits
or improving customer service. Examples of Business Information systems include Accounting IS,
Human Resource IS, Inventory Information System, Results Management Information System and
many others.
The role of an information system is to convert data from internal and external sources into
information that can be used to aid effective decisions making. An organisation may have different
types of information systems, some of which are useful for the day-to-day operational decisions,
and some of which are used in making tactical and strategic decisions.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2022 - 2023
9
However, a cybernetic information system is one that includes the activities of feedback, and
control. This is a self-monitoring and self-regulating system.
Feedback: is data or information about the performance of a system. For example, data
about sales performance is feedback to a sales manager.
Control: involves monitoring and evaluating feedback to determine whether a system is
moving toward the achievement of its goal. The control function then makes necessary
adjustment to a system's input and processing components to ensure that it produces proper
output. For example, a sales manager exercises control when he or she reassigns salespersons
to new sales territories after evaluating feedback about their sales performance.
Organisations today cannot be successful by only providing the technology that processes and
delivers information. They must also understand the value of the information relevant to the
business, and the ways it is created and used. Bad information can lead an organisation to waste
resources on ineffective projects, but quality information can identify needs, direct targeted services
and create efficiencies in every day work.
Quality information is defined as "information that is suitable for all of an organisation's purposes."
The challenge for the organisation is to make sure that the data can be used to perform the tasks
identified as requiring that information. The following attributes provide a guide to determining the
quality of information:
This describes the scope and content of the information. It has aspects such as:
Accuracy: Accurate information is error free. In some cases, inaccurate information is
sometimes generated because inaccurate data is fed into the transformation process (this is
commonly called garbage in, garbage out [GIGO]). If information is inaccurate, it is of
limited value to a business.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2022 - 2023
10
Completeness: Complete information contains all the important facts. For example, an
investment report that does not include all-important costs is not complete.
Relevancy: Relevant information is important to the decision maker and related to the needs
of the user for a specific situation. Information that wood prices might drop may not be
relevant to a computer chip manufacturer.
Conciseness: Only the information that is needed is produced. In fact, too much information
can cause information overload, whereby a decision maker has too much information and is
unable to determine what is really important.
Scope: Appropriate scope (broad vs. narrow)
Performance: Appropriate for measuring progress, activities etc
Describes how the information is presented to the recipient. It has aspects such as:
Clarity: Information produced should be understandable and clear to the decision maker or
users. Information should be simple and not overly complex to the user.
Detail: complexity vs. abstract. Sophisticated and detailed information may not be needed.
Order: Quality information should be arranged or organised in a way that is valuable to the
decision maker. For example a receipt, or invoice.
Presentation: Quality information should be packaged in a way that is most favourable to
the decision maker. Narrative, Numeric etc
Media: hard vs. soft (audio, video etc)
This describes a time period within which the information deals, and the frequency within which the
information is received. Aspects under the time dimension are:
Timeliness: Timely information is delivered when it is needed. Knowing last week‗s weather
conditions will not help when trying to decide what to wear today.
Currency: is up to date (current),
Frequency: The information is produced as often as needed. Daily reports, or annual
performance reports being received at the right time.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2022 - 2023
11
Time Period: Information is given for the correct time period (past, present or future).
Reliability: Reliable information can be depended on. In many cases, the reliability of the
information depends on the reliability of the data collection method. In other instances,
reliability depends on the source of the information. A rumor from an unknown source that
oil prices might go up may not be reliable.
Verifiable: Information should be verifiable. This means that you can check it to make sure
it is correct, perhaps by checking many sources for the same information. A rumor from an
unknown source that oil prices might go up may not be verifiable.
Confidentiality: Information should be secure from access by unauthorized users.
Accessiblity: Information should be easily accessible by authorized users to be obtained in
the right format and at the right time to meet their needs.
Quality information begins with the collectors of data and the methods of collection. There are
several methods of collecting the data required and these can be used to source data within and
outside the organisation.
Observation: depends on the observer and influenced by his/her bias
Experiment: Information can be collected through designing of the experiment where the
quality of information depends on the experimentation technique. It is performed on trial
basis of controlling the specific parameters.
Survey: Survey method occurs through the questioners‘ session. According to the quality of
question, quality of information can be decided.
Subjective estimation: If the above ways are unsuccessful then this method is applied to
collect expert opinion.
Transaction processing: This method consists of data processing of each transaction that
has representation throughout the organisation.
Interviewing: A technique that is primarily used to gain an understanding of the underlying
reasons and motivations for people‘s attitudes, preferences or behavior. Interviews can be
undertaken on a personal one-to-one basis or in a group. They can be conducted at work, at
home, in the street or in a shopping centre, or some other agreed location.
Case study: The term case-study usually refers to a fairly intensive examination of a single
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2022 - 2023
12
unit such as a person, a small group of people, or a single company. Case-studies involve
measuring what is there and how it got there. In this sense, it is historical. It can enable the
researcher to explore, unravel and understand problems, issues and relationships.
Publications: Publication provides various public forums. E.g. Newspapers, government
agencies, online information etc.
Purchased from outside: The information can be purchased from outside the organisation.
It may be expensive and it may have a bias depending on the source.
Government agencies: It is available but cannot be directly used by all.
Data collection methods used by the organisation and integrated into the information system should
be based on the source of information. Business Information Demand (BID) is the organisation's
continuously increasing and changing need for current, accurate, integrated information, often on
short or very short notice, to support its business activities.
Understanding the BID allows organisations to appropriately plan for information systems that can
capture and provide access to the information needed to support the organisation‘s activities.
Therefore the following steps guide in choosing the method of data collection which will
inadvertently be dependent on the source of data or information to be collected.
1. Identify the goal(s) of the organisation
2. Identify the activities required to achieve the goals
3. Identify the tasks required to support the activities
4. Identify the data resources or information required to support the task.
5. Then identify the source of information
6. Choose the appropriate data collection method.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2022 - 2023
13
keep it safe?
Requirements of the organisation or concerned bodies.
Method issues: Different methods all have specific problems
The physical parts of computing devices are referred to as hardware. These are the digital devices
that you can physically touch. They include devices such as the following:
• desktop computers • e-readers
• laptop computers • storage devices, such as flash drives
• mobile phones • input devices, such as keyboards, mice, and scanners
• tablet computers • output devices such as printers and speakers.
Digital technologies are now being integrated into many everyday objects; so the days of a device
being labelled categorically as computer hardware may be ending. Examples of these types of
digital devices include automobiles, refrigerators, and even soft-drink dispensers.
Hardware represents the physical and tangible components of a computer, i.e. the parts that can be
seen and touched.
Input devices − keyboard, mouse, etc.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2022 - 2023
14
All personal computers need components that allow the user to input data. The Keyboard and the
Mouse are the primary input devices to a personal computer, though variations of each have been
introduced with varying levels of success over the years. A number of many new devices now use a
touch screen as the primary way of entering data. Scanners also allow users to input documents into
a computer, either as images or as text. Microphones can be used to record audio or give voice
commands. Webcams and other types of video cameras can be used to record video or participate in
a video chat session.
The most obvious output device is a display, visually representing the state of the computer. In
some cases, a personal computer can support multiple displays or be connected to larger-format
displays such as a projector or large-screen television. Besides displays, other output devices
include speakers for audio output and printers for printed output.
Motherboard: The motherboard is the main circuit board on the computer. The CPU,
memory, and storage components, among other things, all connect into the motherboard.
Motherboards come in different shapes and sizes, depending upon how compact or
expandable the computer is designed to be. Most modern motherboards have many integrated
components, such as video and sound processing, which used to require separate
components. The motherboard provides much of the bus of the computer (the term bus refers
to the electrical connection between the different computer components). The bus is an
important determiner of the computer‘s speed: the combination of how fast the bus can
transfer data and the number of data bits that can be moved at one time determine the speed.
The Central Processing Unit (CPU): The core of any computing device architecture is the
central processing unit (CPU). The CPU
can be thought of as the ―brains‖ of the
device. The CPU carries out the
commands sent to it by the software and
returns results to be acted upon. The two
main manufacturers of CPUs for
personal computers are Intel and
Advanced Micro Devices (AMD). The
speed (―clock time‖) of a CPU is
measured in hertz. A hertz is defined as one cycle per second. Using the binary prefixes
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
15
mentioned earlier, we see that a kilohertz (kHz) is one thousand cycles per second, a
megahertz (mHz) is one million cycles per second, and a gigahertz (gHz) is one billion
cycles per second. The CPU‘s processing power is increasing at an amazing rate, and many
CPU chips now contain multiple processors per chip. These chips, known as dual-core (two
processors) or quad-core (four processors), increase the processing power of a computer by
providing the capability of multiple CPUs.
These are devices where data can be stored. A computer offers both temporary (Primary) and
permanent (Secondary) storage capabilities.
With improvement of digital devices‘ capacities, new terms were developed to identify the
capacities of processors, memory, and disk storage space. Prefixes were applied to the word byte to
represent different orders of magnitude. The table below illustrates the different units of data
storage:
Table 1: A Listing of Binary Prefixes
Prefix Represents Example
Kilo one thousand kilobyte=one thousand bytes
Mega one million megabyte=one million bytes
Giga one billion gigabyte=one billion bytes
Tera one trillion terabyte=one trillion bytes
Peta one quadrillion petabyte=one quadrillion bytes
Exa one quintillion Exabyte=one quintillion bytes
Random-Access Memory: When a computer starts up, it begins to load information from
the hard disk into its working memory. This working memory, called random-access
memory (RAM), can transfer data much faster than the hard disk. Any program that you are
running on the computer is loaded into RAM for processing. In order for a computer to work
effectively, some minimal amount of RAM must be installed. In most cases, adding more
RAM will allow the computer to run faster. One characteristic of RAM is that it is ―volatile‖,
which means that it can store data as long as it is receiving power; when the computer is
turned off, any data stored in RAM is lost. (Primary Storage)
Hard Disk: The computer needs a place to store data for the long term. Most of today‘s
personal computers use a hard disk for long-term data storage. A hard disk is where data is
stored when the computer is turned off and where it is retrieved from when the computer is
turned on. Why is it called a hard disk? A hard disk consists of a stack of spinning disks
inside a hard metal case. (Secondary Storage)
Solid-State Drives (SSD): Perform the same function as hard disks but for longer-term
storage. Instead of spinning disks, the SSD uses flash memory, which makes them much
lighter and faster than hard disks. Solid-state drives are currently a bit more expensive than
hard disks. SSDs are primarily utilized in portable computers, making them lighter and more
efficient. Some computers combine the two storage technologies, using the SSD for the most
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
16
accessed data (such as the operating system) while using the hard disk for data that is
accessed less frequently. (Secondary Storage)
Removable Media: Besides fixed storage components, removable storage media are also
used in most personal computers. Removable media allows you to take your data with you.
And just as with all other digital technologies, these media have gotten smaller and more
powerful. Early computers used floppy disks, which could be inserted into a disk drive in the
computer. Data was stored on a magnetic disk inside an enclosure. A relatively new portable
storage technology, the USB flash drive device attaches to the universal serial bus (USB)
connector, which became standard on all personal computers beginning in the late 1990s.
Flash drive storage capacity has skyrocketed over the years.
In order for a computer to be useful, it must have channels for receiving input from the user and
channels for delivering output to the user. These input and output devices connect to the computer
via various connection ports, which generally are part of the motherboard and are accessible outside
the computer case.
USB connector: Today, almost all devices plug into a computer through the use of a USB
port. This port type, first introduced in 1996, has increased in its capabilities, both in its data
transfer rate and power supplied.
Bluetooth: Besides USB, some input and output devices connect to the computer via a
wireless-technology standard called Bluetooth. Bluetooth (invented in the 1990s) exchanges
data over short distances of 25m to 60m using radio waves. For devices to communicate via
Bluetooth, both the personal computer and the connecting device must have a Bluetooth
communication chip installed.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
17
As the technologies of the personal computer have become more common, many of the components
have been integrated into other devices that previously were purely mechanical. Ever since the
invention of the personal computer, users have clamoured for a way to carry them around.
Portable Computers: In 1983, Compaq Computer Corporation developed a portable PC
which weighed about 14kg. By today‘s standards, the PC was not very portable. The
computer was designed like a suitcase, to be lugged around and laid on its side to be used.
Besides portability, the Compaq was successful because it was fully compatible with the
software being run by the IBM PC, which was the standard for business. Portable computing
has continued to improve and now laptop and notebook computers can weigh from 1-4 kg
and run on batteries. As more and more organisations and individuals move much of their
computing to the Internet, laptops are being developed that use ―the cloud‖ for all of their
data and application storage. These laptops are extremely light because they have no need of
a hard disk at all! For example, Samsung‘s Chromebook. A Chromebook is a laptop of a
different breed. Instead of Windows 10 or macOS, Chromebooks run Google's Chrome OS.
These machines are designed to be used primarily while connected to the Internet, with most
applications and documents living in the cloud.
Smartphones: The first modern-day mobile phone was invented in 1973, resembled a brick,
weighed 1kg, and cost $4000! Since then, mobile phones have become smaller and less
expensive; today mobile phones are a modern convenience available to all levels of society.
Mobile phones have become more like small computers (smart phones). The first smartphone
was the IBM Simon, introduced in 1994. In January of 2007, Apple introduced the iPhone.
Its ease of use and intuitive interface made it an immediate success and solidified the future
of smartphones. Running on an operating system called iOS, the iPhone was really a small
computer with a touch-screen interface. In 2008, the first Android phone was released, with
similar functionality.
Tablet Computers: A tablet computer is one that uses a touch screen as its primary input
and is small and light enough to be carried around easily. They generally have no keyboard
and are self-contained inside a rectangular case. The first tablet computers appeared in the
early 2000s and used an attached pen as a writing device for input. These tablets ranged in
size from small personal digital assistants (PDAs), which were handheld, to full-sized, 14-
inch devices. Most early tablets used a version of an existing computer operating system,
such as Windows or Linux. In January, 2010, Apple introduced the iPad, which ushered in a
new era of tablet computing. The iPad used the finger as the primary input device, and used
iOS as the operating system of the iPhone. Because the iPad had a user interface that was the
same as the iPhone, consumers felt comfortable and sales took off. The iPad has set the
standard for tablet computing. After the success of the iPad, computer manufacturers began
to develop new tablets that utilized operating systems that were designed for mobile devices,
such as Android.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
18
2.2 SOFTWARE
Software constitutes a set of instructions that tell the hardware what to do. It is created through the
process of programming. Without software, the hardware would not be functional. Software can be
broadly divided into two categories:
Operating systems: Software that manage the hardware and create the interface between the
hardware and the user
Application software: category of programs that do something useful for the user.
All computing devices run an operating system. The operating system software provides several
essential functions, including:
Managing Resources: manages the resources of a computer such as the printer, mouse,
keyboard, memory and monitor.
Providing User Interface: Graphical user interface (GUI) is something developers create to
allow users to easily click something without having to understand how or why they clicked
an icon. Each icon on a desktop represents code linking to the spot in which the icon
represents. It makes it very easy for uneducated users.
Running Applications: is the ability to run an application such as Word processor by locating
it and loading it into the primary memory. Most operating systems can multitask by running
many applications at once.
Support for built-in Utility Programs: Finds and fixes errors in the operating system.
Control Computer Hardware: All programs that need computer hardware must go through
the operating system which can be accessed through the BIOS (basic input output system) or
the device drivers.
Provides structure for data management: An operating system displays structure/directories
for data management. One can view file and folder listings and manipulate on those files and
folders like (move, copy, rename, delete, and many others).
Provides a platform for software developers to write applications.
For personal computers, the most popular operating systems are Microsoft‘s Windows, Apple‘s OS
X, and different versions of Linux. Smartphones and tablets run operating systems as well, such as
Apple‘s iOS, Google‘s Android, Microsoft‘s Windows Mobile, and Blackberry. Since 1990, both
Apple and Microsoft have released many new versions of their operating systems, with each release
adding the ability to process more data at once and access more memory. Features such as
multitasking, virtual memory, and voice input have become standard features of both operating
systems. A third personal-computer operating system family that is gaining in popularity is Linux
(pronounced ―linn-ex‖). Linux is a version of the Unix operating system that runs on the personal
computer and is used primarily by scientists and engineers on larger minicomputers. These are very
expensive computers, and software developer Linus Torvalds wanted to find a way to make Unix
run on less expensive personal computers. Linux was the result. Linux has many variations and now
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
19
powers a large percentage of web servers in the world. It is also an example of open-source
software.
Application software allows the user to accomplish some goal or purpose. For example, in order to
write a paper, one might use the application-software program Microsoft Word, or use iTunes to
listen to music, or use Firefox to surf the web. Even a computer game is considered application
software.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
20
o Project Management Software: These are computer applications used to develop and
manage projects. They enable the features like identifying the critical path, resource,
time and financial management etc. Examples include; Microsoft Project Visual,
Enterprise Architect
o Desktop publishing software: These are computer applications that enable the
preparation of finer quality text and images. They enable the user to edit images by
moderating the size, colour and even shape or orientation. Examples are; Adobe
Photoshop, InDesign, and Microsoft Publisher.
o Accounting software: These are computer applications that enable entering of cash
inflows and outflows, calculation of depreciation etc. They enable production of
cashbooks, balance sheet, profit and loss statements and other accounting statements.
Examples are; Pastel Accounting, SAGE, Tally, QuickBooks, Sun Systems.
Table 2: Comparison of office application software suites
Word
Category Spreadsheet Presentation Other
Processing
Microsoft Word Excel PowerPoint Outlook(email)
Office Access (database)
OneNote(information gathering)
Apple Pages Numbers Keynote Integrates with iTunes, iCloud, and other
iWork Apple software
Open Writer Calc Impress Base (database), Draw (drawing), Math
Office (equations)
Google Document Spreadsheet Presentation Gmail (email), Forms (online form data
Drive collection), Draw (drawing)
Off Shelf Packages: refer to programs that are already written and ready to be run upon
their purchase.
- Designed to perform so many tasks since they are designed to meet needs of a variety of
users.
Disadvantages of off shelf packages
- May not fulfill users‘ specific needs perfectly.
- hard to make adjustments to the software since they are standardized.
- Cannot be used as basis for gaining competitive advantage over others.
- Where the package does too much compared to the company needs, the amount of
extra space occupied in the hardware can lead to memory wastage.
- The package may also be limited to a particular operating system like Microsoft
Office for Windows operating system.
- It may be easy to manufacture viruses that may tamper with such application
programs.
Utility Software: Includes software that allows you to fix or modify your computer in some
way. Examples include antivirus software and disk defragmentation software. These types of
software packages were invented to fill shortcomings in operating systems. Many times, a
subsequent release of an operating system will include these utility functions as part of the
operating system itself.
Programming software: is software whose purpose is to make more software. Most of
these programs provide programmers with an environment in which they can write the code,
test it, and convert it into the format that can then be run on a computer. Modern software
applications are written using a programming language which consists of a set of commands
and syntax that can be organized logically to execute specific functions. Using this language,
a programmer writes a program (called the source code) that can then be compiled into
machine-readable form, the ones and zeroes necessary to be executed by the CPU. Examples
of well-known programming languages today include Java, PHP, and various flavors of C
(Visual C, C++, C#). Languages such as HTML and Javascript are used to develop web
pages.
Enterprise Resource Planning (ERP): The ERP system (sometimes just called enterprise
software) was developed to bring together an entire organisation in one software application.
for example, human resource management, sales, marketing, management, financial
accounting, controlling, and logistics are all consolidated into one single package. Simply
put, an ERP system is application software that utilises a central database and is implemented
throughout the entire organisation.
- An ERP is a software application that is used by many of an organisation‘s
employees.
- All users of the ERP edit and save their information from the data source.
- ERP systems include functionality that covers all of the essential components of a
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
22
business.
- An organisation can purchase additional modules for its ERP system that match
specific needs, such as manufacturing or planning.
By consolidating information systems across the enterprise and using the software to enforce
best practices, most organisations see an overall improvement after implementing an ERP.
Some of the more well-known ERP systems include those from SAP, Oracle, and Microsoft.
As ERP systems are typically designed for multinational companies, they have to support
multiple languages, multiple currencies, and country-specific business practices. The sheer
size and the tremendous complexity of these software systems make them complicated to
deploy and maintain. For example, when a customer places an order, the order data flow
automatically to other parts of the company that are affected by them. The order transaction
triggers the warehouse to pick the ordered products and schedule shipment. The warehouse
informs the factory to replenish whatever has been depleted. The accounting department is
notified to send the customer an invoice. Customer service representatives track the progress
of the order through every step to inform customers about the status of their orders.
Managers are able to use firmwide information to make more precise and timely decisions
about daily operations and longer-term planning.
Supply Chain Management (SCM): Many organisations must deal with the complex task
of managing their supply chains. At its simplest, a supply chain is the linkage between an
organisation‘s suppliers, its manufacturing facilities, and the distributors of its products.
SCM systems manages the interconnection between these linkages, as well as the inventory
of the products in their various stages of development. Most ERP systems include a supply
chain management module.
Mobile Applications
Mobile devices such as tablet computers and smartphones also have operating systems and
application software. A mobile app is a software application programmed to run specifically on a
mobile device. It has been noted that smartphones and tablets are becoming a dominant form of
computing, with many more smartphones being sold than personal computers. This means that
organisations will have to get smart about developing software on mobile devices in order to stay
relevant. One option many companies have is to create a website that is mobile-friendly. A mobile
website works on all mobile devices and costs about the same as creating an app. These days, most
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
23
mobile devices run on one of two operating systems: Android or iOS. Android is an open-source
operating system purchased and supported by Google; iOS is Apple‘s mobile operating system.
Other mobile operating systems of note are Blackberry and Windows.
Integrated Computing
Computing technology is being integrated into many everyday products. From automobiles to
refrigerators to airplanes, computing technology is enhancing what these devices can do and is
adding capabilities that would have been considered science fiction just a few years ago. Examples
of computing technologies being integrated into everyday products include: the Smart House
(Domotics), and the Self-Driving Car etc.
Cloud Computing
Cloud computing is the delivery of shared computing resources, software or data — as a service and
on-demand through the Internet. ―The cloud‖ refers to applications, services, and data storage on the
Internet. These service providers rely on giant server firms and massive storage devices that are
connected via Internet protocols. Cloud computing is the use of these services by individuals and
organisations. Examples of cloud computing include being able to store all the files your need to
access later on over the internet. eg use of drop box, google drive, idrive.
Using a Private Cloud: Many organisations are understandably nervous about giving up
control of their data and some of their applications by using cloud computing. But they also
see the value in reducing the need for installing software and adding disk storage to local
computers. A solution to this problem lies in the concept of a private cloud. While there are
various models of a private cloud, the basic idea is for the cloud service provider to section
off web server space for a specific organisation. The organisation has full control over that
server space while still gaining some of the benefits of cloud computing.
Virtualization: Virtualization software makes it possible to run multiple operating systems
and multiple applications on the same server at the same time. For example, by use of
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
24
virtualization, a single computer can perform the functions of several computers. Companies
such as EMC provide virtualization software that allow cloud service providers to provide
web server access to their clients quickly and efficiently. Organisations are also
implementing virtualization in order to reduce the number of servers needed to provide the
necessary services.
These are tailor made program constructed to meet specific user requirements. These packages are
written by programmers either in house or externally by a software company.
Open-source software is software that makes the source code available for anyone to copy and use.
It is available in a compiled format that we can simply download and install. The open-source
movement has led to the development of some of the most-used software in the world, including the
Firefox browser, the Linux operating system, and the Apache web server. Many also think open-
source software is superior to closed-source software. Because the source code is freely available,
many programmers have contributed to open- source software projects, adding features and fixing
bugs.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
25
Many businesses are wary of open-source software precisely because the code is available for
anyone to see. They feel that this increases the risk of an attack. Others counter that this openness
actually decreases the risk because the code is exposed to thousands of programmers who can
incorporate code changes to quickly patch vulnerabilities. There are many arguments on both sides
of the aisle for the benefits of the two models.
Data is an important component of an information system. Without data, hardware and software are
not very useful! Once we have put our data into context, aggregated and analysed it, we can use it to
make decisions for our organisation. We can say that this consumption of information produces
knowledge. This knowledge can be used to make decisions, set policies, and even spark innovation.
Finally, we can say that someone has wisdom when they can combine their knowledge and
experience to produce a deeper understanding of a topic. It often takes many years to develop
wisdom on a particular topic, and requires patience.
Wisdom
Knowledge
Information
Data
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
26
Databases
The goal of many information systems is to transform data into information in order to generate
knowledge that can be used for decision making. In order to do this, the system must be able to take
data, put the data into context, and provide tools for aggregation and analysis. A database is
designed for just such a purpose. A database is an organized collection of related information. It is
an organized collection, because in a database, all data is described and associated with other data.
All information in a database should be related as well. Databases are not always digital – a filing
cabinet, for instance, might be considered a form of database.
Traditional file processing systems include both manual systems and computer based file systems
that are linked to particular application programs. The specific application program performs
services for the end-users such as the production of reports, however each software defines and
manages its own data.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
27
7) Poor Data Control: There was no centralised control at the data element level, hence a
traditional file system is decentralised in nature. It could be possible that the data field may
have multiple names defined by the different departments of an organisation and depending
on the file it was in. This situation leads to different meaning of a data field in different
context or same meaning for different fields. This causes poor data control.
8) Problem of Security: It is very difficult to enforce security checks and access rights in a
traditional file system, since application programs are added in an adhoc manner.
9) Data Manipulation Capability is Inadequate: The data manipulation capability is very limited
in traditional file systems since they do not provide strong relationships between data in
different files.
Database technology (Database Management System- DBMS) eliminates many of the problems of
traditional file organisation by organizing, centralizing, controlling data, and serving many
applications and different groups at the same time.
DBMS packages generally provide an interface to view and change the design of the database,
create queries, and develop reports. Most of these packages are designed to work with a specific
type of database, but generally are compatible with a wide range of databases. Popular examples of
relational DBMS are MySQL, Microsoft SQL and Oracle.
8) Increased Productivity: The DBMS provides an easy to use query language that allows users
to get immediate response from their queries rather than having to use a specialist
"programmer" to write queries for them.
Disadvantages of the Database Approach
1) Larger Size: More disk space is required and probably a larger and more powerful computer.
2) Greater Complexity: For optimum use the database must be very carefully designed. If not
done well, the new system may fail to satisfy anyone.
3) Greater Impact of System Failure: "All eggs in one basket."
4) More Complex Recovery Procedures: If a system failure occurs it is vital that no data is lost.
5) Initial setup of the database is expensive to install.
6) GIGO
Database Types
Databases can be organized in many different ways, and thus take many forms.
Relational Databases: The most popular form of database today is the relational database. A
relational database is one in which data is organized into one or more tables. Each table has a
set of fields, which define the nature of the data stored in the table. Database languages such
as SQL are used to read, update and store data in a database.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
29
Operational database: This is more of a basic form of database that contain information
relating to the operations of an enterprise. Generally, such databases are organised on
functional lines such as marketing, production, employees, etc.
Commercial database: This is a database that contains information which external users
may require. However, they will not be able to afford maintaining such huge database by
themselves. It‘s a paid service to the user as the databases are subject specific. The access to
commercial database can be given through commercial links. Some of the database service
providers also offer databases on CD-ROMs and the updated versions of the databases are
made available periodically. The databases on CD-ROMs have the advantage of reduced cost
of communication.
Personal database: The personal databases are maintained, generally, on personal
computers. They contain information that is meant for use only among a limited number of
users, generally working in the same department. Microsoft Access and Open Office Base
are examples of personal DBMS used to develop and analyse single-user databases.
Distributed database: These databases have contributions from the common databases as
well as the data captured from the local operations. The data remains distributed at various
sites in the organisation. As the sites are linked to each other with the help of communication
links, the entire collection of data at all the sites constitutes the logical database of the
organisation.
Database Concepts
Big Data: The term refers to such massively large data sets that conventional database tools
do not have the processing power to analyse. For example, Google must process over one
million customer transactions every hour. Storing and analysing that much data is beyond the
power of traditional database-management tools. Understanding the best tools and techniques
to manage and analyse these large data sets is a problem that governments and businesses
alike are trying to solve.
Metadata: can be defined as ―data about data.‖ For example, when looking at one of the
values of Year of Birth in the Students table, the data itself may be ―1992″. The metadata
about that value would be the field name Year of Birth, the time it was last updated, and the
data type (integer). When a database is being designed, a ―data dictionary‖ is created to hold
the metadata, defining the fields and structure of the database.
Data Warehouse: A data warehouse is a large store of data accumulated from a wide range
of sources within a company and used to guide management decisions. Data is extracted
from one or more of the organisation‘s databases and loaded into the data warehouse (which
is itself another database) for storage and analysis. It allows organisations the ability to
analyse data in a historical sense: e.g. how does the data we have today compare with the
same set of data this time last month, or last year.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
30
Data Mining: Data mining is the process of analysing data to find previously unknown
trends, patterns, and associations in order to make decisions. Generally, data mining is
accomplished through automated means against extremely large data sets, such as a data
warehouse. Some examples of data mining include:
o An analysis of sales from a large supermarket chain might determine that milk is
purchased more frequently the day after it rains in cities with a population of less than
50,000.
o A bank may find that loan applicants whose bank accounts show particular deposit and
withdrawal patterns are not good credit risks.
The increasing power of data mining has caused concerns for many, especially in the area of
privacy. In today‘s digital world, it is becoming easier than ever to take data from disparate
sources and combine them to do new forms of analysis. In fact, a whole industry has sprung
up around this technology: data brokers. These firms combine publicly accessible data with
information obtained from the government and other sources to create vast warehouses of
data about people and companies that they can then sell.
Business Intelligence and Business Analytics: With tools such as data warehousing and
data mining at their disposal, businesses are learning how to use information to their
advantage. The term business intelligence is used to describe the process that organisations
use to take data they are collecting and analyse it in the hopes of obtaining a competitive
advantage. Besides using data from their internal databases, firms often purchase information
from data brokers to get a big-picture understanding of their industries. Business analytics is
the term used to describe the use of internal company data to improve business processes and
practices.
Knowledge Management: The concept of knowledge management (KM) arises from the
fact that all companies/organisations accumulate knowledge over the course of their
existence. Some of this knowledge is written down or saved, but not in an organized fashion.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
31
Much of this knowledge is not written down; instead, it is stored inside the heads of its
employees. Knowledge management is the process of formalizing the capture, indexing, and
storing of the company‘s knowledge in order to benefit from the experiences and insights
that the company has captured during its existence.
2.4 NETWORKS
A network is a system in which computer devices are connected to each other to share information
and resources. When personal computers were first developed, they were stand-alone units, but by
the mid-1990s, a network port was standard on most personal computers. As wireless technologies
began to dominate in the early 2000s, many personal computers also began including wireless
networking capabilities.
Networking communication is full of some very technical concepts based on some simple
principles.
Servers: Computers that hold shared files, programs, and the network operating system.
Servers provide access to network resources to all the users of the network. There are many
different kinds of servers, and one server can provide several functions. For example, there
are file servers, print servers, mail servers, communication servers, database servers, fax
servers and web servers etc.
Clients: Clients are computers that access and use the network and shared network
resources. Client computers are basically the customers(users) of the network, as they request
and receive services from the servers.
Packet: The fundamental unit of data transmitted over the Internet. When a device intends to
send a message to another device, it breaks the message down into smaller pieces, called
packets. Each packet has the sender‘s address, the destination address, a sequence number,
and a piece of the overall message to be sent.
Packet-switching: This is when a packet is sent from one device to another over a network,
and from one router to another until it is reaches its destination.
Protocol: In computer networking, a protocol is the set of rules that allow two (or more)
devices to exchange information back and forth across the network.
Network Card: A network device that connects a computer to a network. It is also known as
the Network Adapter or Network Interface Card (NIC). Network cards are of two types:
Internal and External Network Cards.
Transmission Media: Used to interconnect computers in a network, such as twisted-pair
wire, coaxial cable, and optical fiber cable. Transmission media are sometimes called
channels.
Network Cable: Is a wired cable used to connect a device to the network or to other devices
like other computer, printers, etc. Also known as a data cable or Ethernet cable
Hub: A simple network device that connects other devices to the network and sends packets
to all the devices connected to it.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
32
Bridge: A network device that connects two networks together and only allows packets
through that are needed.
Switch: A network device that connects multiple devices on the same network within a
building or campus. For example, a switch can connect your computers, printers, and servers,
creating a network of shared resources. It filters packets based on their destination within the
connected devices.
Router: A network device used to connect multiple networks together. It receives and
analyses packets and then routes them towards their destination. For example, you would use
a router to connect your networked computers to the Internet and thereby share an Internet
connection among many users.
Access point: A network device that allows wireless devices to connect to the network. An
access point takes the bandwidth coming from a router and stretches it so that many devices
can go on the network from farther distances away. It can also give useful data about the
devices on the network, provide proactive security, and serve many other practical purposes.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
33
arrays, tape libraries, and optical jukeboxes, accessible to servers so that the devices appear
like locally attached devices to the operating system.
Enterprise private network (EPN): is a network that a single organisation builds to
interconnect its office locations (e.g., production sites, head offices, remote offices, shops) so
they can share computer resources.
Virtual private network (VPN): is an overlay network in which some of the links between
nodes are carried by open connections or virtual circuits in some larger network (e.g., the
Internet) instead of by physical wires. Sometimes, an organisation will need to allow
someone who is not located physically within its internal network to gain access. This access
can be provided by a virtual private network (VPN).
Client-Server: Higher-end computers are installed as servers, and users on the local network
can run applications and share information among departments and organisations in what is
called client-server computing.
Some are based on Internet Technologies
Internet: is the global system of interconnected computer networks that use the Internet
protocol suite (TCP/IP) to link billions of devices worldwide. Most traditional
communications media, including telephony, radio, television, paper mail and newspapers
are being reshaped or redefined by the Internet, giving birth to new services such as email,
Internet telephony, Internet television, online music, digital newspapers, and video streaming
websites to distribute and share information. This has reduced costs, eliminated waste and
improved customer service, compared to paper-based information. Email, instant messaging
and social networks provide high-speed, highly-accessible communications tools, speeding
up processes that are time-critical. Collaboration over the Internet increases productivity,
improves decision making and reduces travel costs. Global Internet access makes it easy for
organisations to do business anywhere in the world without investing in a local physical
presence. Using e-commerce facilities, organisations can sell their products globally, taking
payment electronically and offering customers the convenience of digital delivery for
suitable products or services. Organisations can also provide support to local customers or
partners.
Intranet: An intranet is an internal network that allows only authorized users (usually
employees) access. It uses Internet technology and offers similar business benefits.
Organisations use intranets to distribute or share information, deploy business applications,
support collaboration and project management, simplify internal communications and
streamline business processes. Just as organisations set up web sites to provide global access
to information about their business, they also set up internal web pages to provide
information about the organisation to the employees.
Extranet: An extranet extends intranet facilities to locations outside the organisation over
secure network connections. An extranet can connect an organisation with branches, remote
workers, suppliers, distributors, business partners, key customers and other authorized users
to create an extended enterprise. In such cases an extranet, which is a part of the company‘s
network is made available securely to those outside of the organisation. Extranets can be
used to allow customers to log in and check the status of their orders, or for suppliers to
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
34
check their customers‘ inventory levels. Extranets simplify the two-way flow of confidential
information, enabling organisations to collect and share critical business data.
Internet Concepts
IP Address: Every device that communicates on the Internet, whether it be a personal
computer, a tablet, a smartphone, or anything else, is assigned a unique identifying number
called an IP (Internet Protocol) address. Historically, the IP-address standard used has been
IPv4 (version 4), however because the number of IP addresses has grown to the point where
the use of IPv4 addresses is inadequate, this has led to a new IPv6 standard, which is
currently being phased in. The IPv6 standard is formatted as eight groups of four
hexadecimal digits, e.g. 2001:0db8:85a3:0042:1000:8a2e:0370:7334.
Domain name: If you had to try to remember the IP address of every web server you wanted
to access, the Internet would not be nearly as easy to use. A domain name is a human-
friendly name for a device on the Internet. These names generally consist of a descriptive
text followed by the top-level domain (TLD). For example, Google‘s domain name is
google.com; google describes the organisation and .com is the top-level domain. In this case,
the .com TLD is designed for commercial companies. Other well-known TLDs include .org,
.net, and .gov.
DNS: DNS stands for ―domain name system,‖ which acts as the directory on the Internet.
When a request to access a device with a domain name is given, a DNS server is queried. It
returns the IP address of the device requested, allowing for proper routing.
Web 2.0
In the early years of the World Wide Web, creating and putting up a website required a specific set
of skills: you had to know how to set up a web server, how to get a domain name, how to write web
pages in HTML, and how to troubleshoot various technical issues as they arose. The Web 2.0
technologies provided a website framework all those who did not have the technical skills of a
webmaster to put content online. Web 2.0 applications began a second bubble of optimism and
investment, and have allowed anyone who wanted to have their own blog or photo-sharing site to
have it. Examples include: MySpace, Photobucket, Facebook, WordPress, and Twitter (2006).
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
35
Wireless Networking
These wireless technologies have made Internet access more convenient and have made devices
such as tablets and laptops much more functional. Let‘s examine a few of these wireless
technologies.
Wi-Fi: Wi-Fi is a technology that takes an Internet signal and converts it into radio waves.
These radio waves can be picked up within a radius of approximately 65 feet by devices with
a wireless adapter. Several Wi-Fi specifications have been developed; starting with 802.11b
(1999), 802.11g specification in 2003 and 802.11n in 2009. Each new specification improved
the speed and range of Wi- Fi, allowing for more uses.
Mobile Network: As the cellphone has evolved into the smartphone, the desire for Internet
access on these devices has led to data networks being included as part of the mobile phone
network. While Internet connections were technically available earlier, it was really with the
release of the 3G networks that smartphones and other cellular devices could access data
from the Internet. This new capability drove the market for new and more powerful
smartphones, such as the iPhone, introduced in 2007. In 2011, wireless carriers began
offering 4G data speeds, giving the cellular networks the same speeds that customers were
used to getting via their home connection.
Bluetooth: While Bluetooth is not generally used to connect a device to the Internet, it is an
important wireless technology that has enabled many functionalities that are used every day.
It is the standard method for connecting nearby devices wirelessly. Bluetooth has a range of
approximately 300 feet and consumes very little power, making it an excellent choice for a
variety of purposes. Some applications of Bluetooth include: connecting a printer to a
personal computer, connecting a mobile phone and headset, connecting a wireless keyboard
and mouse to a computer, and connecting a remote for a presentation made on a personal
computer.
VoIP: A growing class of data being transferred over the Internet is voice data. A protocol
called voice over IP, or VoIP, enables sounds to be converted to a digital format for
transmission over the Internet and then re-created at the other end. By using many existing
technologies and software, voice communication over the Internet is now available to anyone
with a browser (think Skype, Google Hangouts, WhatsApp etc). Beyond this, many
companies are now offering VoIP-based telephone service for business and home use.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
36
How information systems are used within the organisation (Internal Business Environment) depends
on the environment surrounding (External Business Environment) the organisation that uses it.
These environments are constantly changing and are greatly affected by technology advances. A
good information system should be able to provide feedback from the environment within which it
is placed, and be able to control by making corrections to the information system.
The organisational environment can be understood on two dimensions: the micro and macro
environment, and the internal and external environment.
Because environmental influences on the organisation can quickly change, information systems
should be able to monitor the current environment, and be able to anticipate future environment
trends. Organisations that do not monitor these environmental factors may fail to remain
competitive. This process of monitoring the environment is referred to as environmental scanning or
sensing.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
37
An organisation is based on three basic elements, that is, capital, land and labor that are primary
production factors provided by the environment and then, the organisation uses them as inputs and
transforms them into products and services in a production function. Products and services are
consumed and then come back as supply inputs.
But how this is related with Information Systems? Because we, as managers, will focus on how
inputs are combined to create outputs when technology changes are introduced in company.
Technological change requires changes in who owns and controls information, who has the right to
access and update that information, and who makes decisions about whom, when, and how.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
38
Routines and business process: Companies become very efficient because employees
develop routines for producing goods and services. Routines, also called standard operating
procedures, are precise rules, procedures and practises that have been developed to cope with
virtually all expected situations. As employees learn how to do a given task they become
more efficient doing that task and the company can reduce its costs. Business Processes are
collections of such routines. Therefore an organisation is a collection of business processes.
All organisations operate within an environment that influences the way in which they operate.
They draw resources from the environment and they also supply goods and services to this
environment. However the actions and activities of an organisation may also influence the
environment. Therefore organisations and environments have a reciprocal relationship. On the one
hand, organisations are open to, and dependent on, the social and physical environment that
surrounds them. Without financial and human resources organisations could not exist. Organisations
must respond to legislative and other requirements imposed by government, as well as the actions of
their competitors. On the other hand, organisations can influence their environments.
Information systems help organisations perceive changes in their environments and also help
organisations act on their environments.
Information Systems are key instruments for environmental scanning, helping organisations identify
external and internal changes that might require an organisational response. Environments generally
change much faster than organisations. Most organisations are unable to adapt to a rapidly changing
environment. Inertia built into an organisation‘s standard operating procedures, the political conflict
raised by changes to the existing order, and the threat to closely held cultural values inhibit
organisations from making significant changes.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
40
Disruptive technologies are tricky. Firms that invent disruptive technologies as ―first movers‖ do
not always benefit if they lack the resources to exploit the technology or fail to see the opportunity.
One example of disruptive technologies is the Internet. The rapid growth of the Internet, intranets,
extranets and other interconnected global networks in the 1990s dramatically changed the
capabilities of information systems in business. Internet- based and web-enabled enterprise and
global electronic business and commerce systems are becoming commonplace in the operations and
management of today‗s business enterprises. Indeed today‗s information systems are still doing the
same basic things that they began doing over 50 years ago. We still need to process transactions,
keep records, provide management with useful and informative reports, and provide support to the
accounting systems and processes of the organisation. However, what has changed is that we now
enjoy a much higher level of integration of system functions across applications, greater
connectivity across both similar and dissimilar system components, and the ability to reallocate
critical computing tasks such as data storage, processing, and presentation to take maximum
advantage of business and strategic opportunities. With increasing capabilities, future systems will
focus on increasing both the speed and reach of our systems to provide even tighter integration
combined with greater flexibility.
The Internet and related technologies and applications have changed the way businesses operate and
people work, and how information systems support business processes, decision-making and
competitive advantage. Today many businesses are using Internet technologies to web-enable
business processes and to create innovative e-business applications.
The internal business environment relates to how the organisation is managed and operates.
Information systems within the organisation have transformed the way in which organisations
operate today.
Economic Impact
IT changes both the relative costs of capital and the costs of information. Information systems can
be viewed as a factor of production that can be substituted for traditional capital and labour. As the
cost of information technology decreases, it‘s substituted for labour. Therefore, information
technology should result in a decline in the number of middle managers and clerical workers as
information technology substitutes for their labour.
As cost of Information Technology decreases, it also substitutes for other forms of capital (E.g.
buildings or machinery), which remain relatively expensive. So we should expect managers to
increase their investments in IT because of its declining cost relative to other capital investments. IT
affects the cost and quality of information, and changes economics of information, because it helps
firms contract in size, and can reduce transaction costs (costs incurred when a firm buys from the
marketplace what it cannot make itself). According to transaction cost theory, firms and individuals
seek to economize on transaction costs, much as they do on production costs. Traditionally, firms
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
41
have tried to reduce transportation costs through vertical integration, by getting bigger, hiring more
employees, and buying their own suppliers and distributors (E.g. Ford). IT, especially the use of
networks, can help firms lower the transaction costs, making worthwhile for firms outsourcing some
tasks. By this way firms shrink in size because it is cheaper to outsource work to a competitive
marketplace rather than hire employees, which goes against the traditional way of thinking.
As transaction costs decrease, firm size should shrink because it becomes easier and cheaper for
firm to contract for the purchase of goods and services in the marketplace rather than to make the
product or offer the service itself. Firm size can stay constant or contract even as the company
increases its revenues
IT also can reduce internal management costs. According to agency theory, the firm is viewed as a
―nexus of contracts‖ among self-interested individuals rather than as a unified, profit-maximizing
entity. Principal employs ―agents‖ to perform work on his or her behalf. However, agents need
constant supervision and management, otherwise, they will tend to pursue their own interests rather
than company ones (owner interests and goals). As the firm grows in size and scope, agency costs or
coordination costs rise because owners must expend more and more effort supervising and
managing employees. It allows reducing costs because it becomes easier for managers to oversee a
greater number of employees. Concluding, since IT reduces agency costs and transaction costs, it‘s
expected that costs shrink over time, as investment in IT increases, as well as revenues, which are
also expected to increase.
Behavioural Impact
Supply-Push to demand-Pull: There has been a move in the organisation from supply-push
to demand-pull. Supply push is where companies do their best to anticipate what customers
want and then produce or provide service according to their predictions. Information systems
are being designed to allow closer relationships between the customer and the seller thereby
causing the production model to shift to Demand Pull where the customers create their own
personalized versions through their demands within the supply chain. Information Systems
are being created to foster suppliers and customers co-creating products and services.
Self Service: ATMs are an early example of customer self-service. Information systems are
providing customers and suppliers with the ability to see what pertains to their transactions
within the organisation. E.g. Tracking a shipment.
Real-Time Working: Information systems have allowed organisation to operate in as close
to real time as possible, by indicating the state of 'business terrain' as it exists at the moment.
An example is an organisation knowing inventories as of right now, knowing the breaking
news.
Team-based working: The current trend in the internal business environment is to have
people working together on projects. Increased ability to meet, collaborate, and communicate
among team members increases sharing of knowledge and information for the running of the
organisation. Information systems that can foster such collaboration and simultaneous
workings are called groupware.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
42
Anytime, anyplace Information Work: Information systems today are allowing employees
to work remotely, away from their workstations. The advances in wireless technologies
enable people to work in an airport, at a customer site, or even while walking.
Outsourcing and Strategic Alliances: To become more competitive, organisation are
examining which work they should perform internally and which they should give to others.
Outsourcing is where a third party organisation performs information work for the
organisation for short or long term basis (this is part of the extended enterprise). Information
systems that foster such collaboration are needed to ensure security of the organisations'
information.
Flattened Organisations: In the traditional hierarchy, people performing the same type of
work are grouped together and overseen by a supervisor. Management principles such as
division of labour and chain of command define this traditional work environment. Research
shows that information systems facilitate flattening of hierarchies by broadening the
distribution of information to empower lower-level employees and increase management
efficiency. IS pushes decision-making rights lower in organisation because lower-level
employees receive the information needed to make efficient decisions, without supervision,
which make them act quickly.
Consequences:
a) High level managers can solve problems and control employees over big distances;
b) Extinction of many middle managers.
c) Management costs also decrease as a percentage of revenues increase,
d) and the hierarchy becomes efficient, etc
Information systems that foster self-managed groups, and allow employees to manage
themselves have led to lower levels of absenteeism, higher productivity, and higher quality of
work.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
43
The external business environment is the platform where organisations compete or collaborate with
each other. Information systems contribute to the external business environment because they allow
information to move faster, increasing the pace at which individuals and organisation can respond to
events. Furthermore information systems are affecting the external business environment in the
following ways:
Internet Economy: The internet economy is at play today. It began with retailing and selling
over the internet (B2C). This advanced to buyers and suppliers using e-marketplaces to carry
out business deals (B2B). Today‘s economy is bringing together both old and new ways of
operating and Information Systems are a major tool enabling both these worlds to interface
with each other.
Global Marketplace: The business environment is now global. The entire world has become
the marketplace. Information systems are enabling companies to work globally (Asia/Pacific;
the Americas; Europe and the Middle East and Africa-EMEA). The global marketplace
allows competitors across the globe to bid for work via the Internet.
Decapitalisation: Tangible items such as capital equipment and buildings were the tenets of
power in the industrial age. Today, intangible items such as ideas, intellectual capital, and
knowledge have become the desirable item. The Business world is moving from tangible to
intangible. It is decapitalising. For this reason managing talent has become as important as
managing finances.
Faster Business Cycles: The tempo of business has accelerated appreciably. Products on the
market tend to have shorter useful lives. Therefore speed has become of essence.
Information Systems need to be used to accelerate speed to market or to reduce cycle time.
Accountability and Transparency: Confidence and trust in the way public and private
organisations are managed has been shaken world over. There is greater pressure for
accountability and transparency. Information Systems play a role in implementing the
ensuing regulations and enabling transparency.
Rising Risks of IT: In many parts of the world, IT has negatively affected people through
network shutdowns, computer viruses, identity thefts, e-mail scams, movement of jobs across
borders. This requires careful thought into the use of IS in the organisation, including the
protection of information created by the IS.
In order to understand how information systems can benefit managers, we first need to look at what
the functions of managers are, and the kind of information they need for decision-making.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
44
Information systems can support a variety of management decision-making levels and decisions.
These include the three levels of management activity: strategic management, tactical management,
knowledge management and operational management.
STRATEGIC
MANAGEMENT
LEVEL
KNOWLEDGE LEVEL
OPERATIONAL LEVEL
Figure 4: Level
Level of Decision-Making of Decision-Making
in the Organisation in the Organisation
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
45
specify the policies, procedures and business objectives for their subunits of the company.
They also allocate resources and monitor the performance of their organisational sub-units,
including departments, divisions, process teams and other workgroups.
Knowledge Management: This is a level were businesses create and share new
knowledge/information. These are typically used in a business where employees create new
knowledge and expertise - which can then be shared by other people in the organisation to
create further commercial opportunities. Good examples include firms of lawyers,
accountants and management consultants.
Operational management: The members of self-directed teams or operating managers
develop short range plans such as weekly production schedules. They direct the use of
resources and the performance of tasks according to procedures, and within budgets and
schedules they establish for the teams and other workgroups of the organisation.
Using the four level pyramid model above, we can now compare how the information systems in
our model differ from each other.
Functions of a TPS
TPS are ultimately little more than simple data processing systems.
Functions of a TPS in terms of data processing requirements
Inputs Processing Outputs
Validation
Sorting Lists
Transactions Listing Detail reports
Events Merging Action reports
Updating Summary reports?
Calculation
Reservation systems
Stock control systems
Systems for payments and funds transfers
For historical reasons, many of the different types of Information Systems found in commercial
organisations are referred to as "Management Information Systems". However, within our pyramid
model, Management Information Systems are management-level systems that are used by middle
managers to help ensure the smooth running of the organisation in the short to medium term. The
highly structured information provided by these systems allows managers to evaluate an
organisation's performance by comparing current with previous outputs.
Functions of a MIS
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
47
Efficiency oriented
These systems are often used to analyze existing structured information and allow managers to
project the potential effects of their decisions into the future. Such systems are usually interactive
and are used to solve ill structured problems. They offer access to databases, analytical tools, allow
"what if" simulations, and may support the exchange of information within the organisation.
Functions of a DSS
DSS manipulate and build upon the information from a MIS and/or TPS to generate insights and
new information.
Functions of an EIS
EIS organizes and presents data and information from both external data sources and internal MIS
or TPS in order to support and extend the inherent capabilities of senior executives.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
49
Roles of KWS
Knowledge workers perform three key roles that are critical to the organisation and to the managers
who work within the organisation:
Keeping the organisation current in knowledge as it develops in the external world—in
technology, science, social thought, and the arts
Serving as internal consultants regarding the areas of their knowledge, the changes taking
place, and opportunities
Acting as change agents, evaluating, initiating, and promoting change projects
These systems require sufficient computing power to handle the sophisticated graphics or complex
calculations necessary for such knowledge workers as scientific researchers, product designers, and
financial analysts. Because knowledge workers are so focused on knowledge in the external world,
these systems also must give the worker quick and easy access to external databases.
They typically feature user-friendly interfaces that enable users to perform needed tasks without
having to spend a great deal of time learning how to use the system. Knowledge workers are highly
paid—wasting a knowledge worker‘s time is simply too expensive.
Knowledge workstations often are designed and optimized for the specific tasks to be performed;
so, for example, a design engineer requires a different workstation setup than a financial analyst.
Design engineers need graphics with enough power to handle three-dimensional (3-D) CAD
systems. However, financial analysts are more interested in access to a myriad number of external
databases and large databases for efficiently storing and accessing massive amounts of financial
data.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
50
Role of OAS
Paperless work environment
Simplify operations and minimize computational errors
Optimal utilization of resources
Better information sharing and transparency
Enhanced security and recovery of data
Fast response to user requests, A database system responds quickly because it allows users to
cross organisation files; the files are not separated by application.
Centralized security, With all the data in one place, it is easier to control access . This applies
particularly to sensitive or confidential material
These systems use human knowledge captured in a computer to solve problems that ordinarily need
human expertise. Mimicking human expertise and intelligence requires that the computer:
(1) recognize, formulate and solve a problem;
(2) explain solutions and
(3) learn from experience.
These systems explain the logic of their advice to the user; hence, in addition to solving problems
they can also serve as a teacher. They use flexible thinking processes and can accommodate new
knowledge.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
52
EIS
MIS DS
S
KWS TPS
/OAS
Figure 5: Relationship between different IS (ESS MIS DSS TPS KWS OAS)
On the basis of organisational levels, businesses can use strategic information systems to gain an
edge over competitors. Such systems change organisations‘ goals, business processes, products,
services or environmental relationships, driving them into new forms of behaviour. Information
systems can be used to support strategy at the business, firm and industry level.
Business Level: At the business level of strategy, information systems can be used to help
firms become low cost producers, differentiate products and services, or serve new markets.
Information systems can also be used to ―lock in‖ customers and suppliers using efficient
customer response and supply chain management applications. Value chain analysis is useful
at the business level to highlight specific activities in the business where information systems
are most likely to have a strategic impact.
Firm Level: At the firm level, information systems can be used to achieve new efficiencies
or to enhance services by tying together the operations of disparate business units so that they
can function as a whole, let alone promoting the sharing of knowledge across business units.
Industry Level: At the industry level, systems can provide competitive advantage by
facilitating cooperation with other firms in the industry, creating consortiums or communities
for sharing information, exchanging transactions, or coordinating activities. The competitive
forces model, information partnerships, and network economics are useful concepts for
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
53
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
55
business‘ service or product. it is important that customers gain a benefit from this or there is little
incentive for them to put themselves in a potentially weak bargaining position. For instance, with
electronic banking the belief is that once a customer has established a familiarity with one system,
gaining advantage it, there will be a learning disincentive to switch to another. Another example is
America Hospital supplies. It has improved its competitive position by allowing on-line terminals
into customer hospitals. These allowed the swift order/delivery of suppliers by using less skilled
personnel compared with more expensive purchase agents. Once established, it became very
difficult for a hospital to change suppliers.
Recent developments in proving business with the information and processes, necessary to
understand and track customers‘ behavior has been termed customer relationship management
(CRM). Analysis techniques and sophisticated software tools have been developed to exploit the
potential information contained in databases of customer details and activity. CRM is often refined
in to customer profiling, developing categories of customer and attempting to predict their behavior.
One of the goals of CRM is to prevent churn, the gradual wastage of customers to competitors.
d) The threat of substitute products or services
Substitute products or services are those that are within the industry but are differentiated in some
way. There is always the danger that a business may lose a customer to the purchase of a substitute
product from a rival business because that product meets the needs of the customer more closely.
Information technology can prevent this happening in two ways. First, it can be used to provide
differentiated products swiftly by the use of computer-aided design/computer-aided manufacturing
(CAD/CAM). In this latter case, the business produces the substitute product itself.
e) The rivalry among existing firms in the industry
Unless it is a monopoly position, any business in an industry is subject to competition from other
firms. This is perhaps the greatest competitive threat that the business experiences. Information
technology can be used as part of the firm‘s competitive strategy against its rivals, as illustrated in
the preceding sections. Close linkages with suppliers and customers produce competitive forces
against rivals, as does the investment in technology allowing product differentiation and cost
reductions. In some cases, the investment in information technology will be necessary to pre-empt
the competitiveness of other businesses. The major investment by the banks in automated teller
machines is just one example of this.
B) We Analyze the Entry Barriers: The next thing to be done is to analyse the entry barriers as
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
56
below:
Competitive Force: Technology and Environment?
If nothing slows entry of competitors competition will become intense. In this analysis, the
following questions may be considered:
Incumbent Reaction?
What Actions are required to build market share?
Production Process?
C) We Analyze the Substitute Products: Next in the analysis is to consider the presence and the
likely impact of substitute products as below:
Competitive Force: the following questions may be asked:
Products or services from another industry enter the market
Customers becoming acclimated to using substitutes
Is the substitute market growing?
D) Fourth Competitive Forces: This takes into account the following considerations with the
respective questions:
The Suppliers
Who controls the transaction?
E) Fifth Competitive Forces: This takes into account the following considerations with the
respective questions:
The Buyers
Who controls the transaction?
Each element adds value – question who captures it?
These strategies are to do with developing a Sustained Competitive Advantage and entail analyzing
the forces that influence a company‘s competitive position. This analysis will assist management in
developing a strategy aimed at establishing a sustained competitive advantage. To establish such a
position, a company needs to develop a strategy of performing activities differently than a
competitor. The generic strategies mentioned here include:
a) Cost Leadership Strategy
Cost leadership strategy is to do with producing products and/or services at the lowest cost in the
industry. Cost leadership strategy is mainly achieved by reducing the organisation costs in
producing goods or providing services. A good example is the automation or automating parts of the
production process. Cost leadership can be achieved by helping suppliers and customers to reduce
cost, usually by forming alliances and linkages that benefit all the parties involved. In other
situations, cost leadership is achieved by calling a competitor‘s costs to increase, by for example
introducing new product features that will be expensive for a competitor to duplicate. Using internet
technologies for e-business can assist in achieving cost leadership. As an example, the airline easy
jet has dramatically reduced staff costs through transferring over 90% of their ticketing online.
b) Differentiation Strategy
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
57
This involves offering different products, services or product features in the marketplace. Also, it
entails creating a unique divide between the organisation‘s products and those of its competitors. In
many cases, differentiation is used to concentrate on a specific niche in the market so that the
company can focus on specific/particular goods and services. A car manufacturer such as Roll
Royce provides a good example of product differentiation. The cars produced by Roll Royce are
perceived as luxury items that indicates status and importance in society. They are considered for
superior to standard production models in terms of quality, reliability and comfort. By creating this
image, Rolls-Royce has succeeded in differentiating its products from those of its competitors. An
e-commerce-related example of differentiation is that of a newspaper personalizing content of its
readers according to their preferences and then making it available via alerts on e-mail or mobile
phone.
c) Niche Strategy: Select a narrow-scope segment (niche market) and be the best in quality, speed, or
cost in that market.
d) Growth Strategy: Increase market share, acquire more customers, or sell more products.
e) Alliance Strategy: Work with business partners in partnerships, alliances, joint ventures, or virtual
companies.
f) Innovation Strategy: Introduce new products and services, put new features in existing products
and services, or develop new ways to produce them. Innovation is concerned with finding new ways
to approach an organisation‘s activities. Good examples of innovation include improving existing
products or creating new ones, forging strategic linkages, improving production, processes and
entering new markets. Additionally, innovativeness may involve highlights of how responsiveness
to the market environment and the flexibility to be able to respond are important capabilities of a
company.
g) Operational Effectiveness Strategy: Improve the manner in which internal business processes are
executed so that a firm performs similar activities better than rivals.
h) Customer-Orientation Strategy: Concentrate on making customers happy
i) Time Strategy: Treat time as a resource, then manage it and use it to the firm‘s advantage.
j) Entry-barriers Strategy: Create barriers to entry.
k) Lock in Customers or Suppliers Strategy: Encourage customers or suppliers to stay with you
rather than going to competitors.
l) Increase Switching Costs Strategy: Discourage customers or suppliers from going to competitors
for economic reasons.
The goal is to perform activities differently than a competitor. Those activities can be linked in a
Value Chain Model.
According to the value chain model (Porter, 1985), the activities conducted in any organisation can
be divided into two parts: primary activities and support activities.
1.Primary Activities
Are those activities in which materials are purchased, processed into products, and delivered to
customers. Each activity in the case adds value to the product or service hence the value chain. The
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
58
The initial purpose of the value chain model was to analyze the internal operations of a corporation,
in order to increase its efficiency, effectiveness, and competitiveness. We can extend that company
analysis, by systematically evaluating a company‘s key processes and core competencies to
eliminate any activities that do not add value to the product.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
59
In the past the Internet has been used as a marketing channel for companies who want to publish
information about themselves and their products. Recently, this has given way to more innovative
uses of the Internet. Organisations have realized that the Internet can be used strategically for
competitive advantage. However, in order to optimize this strategic impact, a company must
continually assess the strategic position of its Internet-based applications. A strategic position
matrix can help a company identify where to concentrate its use of the Internet to gain competitive
advantage. These strategies include:
Strategy: Focus on improving efficiency and lowering costs by using the Internet and
the World Wide Web as a fast, low cost way to communicate with customers,
suppliers, and business partners.
Example: Outstanding Web sites with value-added information services and online
customer support.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
60
Example: Use the Internet for online transaction processing of sales of products and
services at company Web sites, and electronic document interchange (EDI)
with suppliers.
The value chain concept helps a company evaluate how to use information technology
strategically. Value chains can also be used to strategically position a company‘s Internet-
based applications to gain competitive advantage. The value chain model can be used to
outline several ways that a:
1. Company‘s Internet connections with its customers could provide business benefits
and opportunities for competitive advantage.
2. Company‘s Internet connections with its suppliers could be used for competitive
advantage.
3. Company‘s internal operations can benefit strategically from Internet-based
applications.
Other Strategies
Multidomestic Strategy: Zero standardization along the global dimensions.
Global Strategy: Complete standardization along the seven global dimensions.
Why is it so difficult to build successful information systems including systems that promote
competitive advantage?
Information systems are closely intertwined with an organisations structure, culture and business
processes. New systems disrupt established patterns of work and power relationships, so there is
often considerable resistance to them when they are introduced.
Implementing strategic systems often requires extensive organisational change and a transition from
one sociotechnical level to another. Such changes are called strategic transitions and are often
difficult and painful to achieve. However, not all strategic systems are profitable, as they can be
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
61
expensive to build. Besides, many strategic information systems are easily copied by other firms, so
strategic advantage is not always sustainable.
Strategic information systems are designed to establish a profitable and sustainable position against
the competitive forces in an industry. Due to advances in systems development it has become
increasingly difficult to sustain an advantage for an extended period. Experience also indicates that
information systems, by themselves, can rarely provide a sustainable competitive advantage.
Therefore, the major problem that companies now face is how to sustain their competitive
advantage.
One popular approach is to use inward systems that are not visible to competitors. These proprietary
systems allow the company to perform the activities on their value chain differently than their
competitors.
The IS function can help managers develop competitive weapons that use information technology to
implement a variety of competitive strategies to meet the challenges of the competitive forces that
confront any organisation.
Successful strategic information systems are not easy to develop and implement. They may require
major changes in the way a business operates, and in their relationships with customers, suppliers,
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
62
Success and sustain ability depends on many environmental and fundamental business factors, and
especially on the actions and strategies of a company‘s management team. Sustained success in
using information technology strategically seems to depend on three sets of factors:
The Environment
- a major environmental factor is the structure of an industry.
Foundation Factors
- unique industry position, alliance, assets, technological resources, and expertise are
foundation factors that give a company a competitive edge in the market.
In a transnational approach, a business depends heavily on its information systems and appropriate
information technologies to help it integrate its global business activities. A transnational business
tries to develop an integrated and cooperative worldwide hardware, software, and
telecommunications architecture for its IT platform.
The Internet and the World Wide Web have become vital components in international business and
commerce. Within a few years, the Internet, with its interconnected networks of thousands of
networks of computers and databases has established itself as a technology platform free of many
traditional international boundaries and limits. By connecting their businesses to this online global
infrastructure, companies can:
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
64
There are many ways through which an organisation can acquire information systems to use in the
daily operations of a business and among them they include;
Buy a prepackaged system from a software development company or consulting firm.
(Off-shelf)
Outsource development to a 3rd party. Outside organisations can custom build a system for an
organisation following the given specifications. This option is good when an organisation
does not have enough resources or expertise.
End user development where individual users and departments build their own custom
systems to perform their company activities.
Renting
Leasing
Mergers and Partnerships
In case an organisation decides to build its own system, there are a number of methodologies it can
follow while designing one. A system development methodology is a framework used to structure,
plan, and control the process of developing an information system. A wide variety of such
frameworks have evolved over the years, each with its own advantages and disadvantages. One
system development methodology is not necessarily suitable for use by all projects.
The systems development life cycle (SDLC) is an approach for designing and developing Business
Information Systems solutions. It proceeds in stages: feasibility study, requirements analysis,
design, development, implementation, maintenance and review. Business Information Systems are
designed using the systems development life cycle (SDLC) and other methodologies like prototype,
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
65
System life cycle is an organisational process of developing and maintaining systems. It helps in
establishing a system project plan by giving the overall list of processes and sub-processes required
in developing a system. The SDLC is developed following six stages of feasibility study,
requirements analysis, system design, system development, implementation, maintenance and
review as explained below;
1. Problem Identification
Development of Business Information System begins with identification of a business problem that
needs to be solved or opportunity to be exploited which may come up as a routine or unforeseen
circumstance.
2. Feasibility Study
After identifying that there is a problem, then a feasibility study which may include Technical
feasibility, Economic feasibility, Behavioral feasibility, legal feasibility, scheduling feasibility and
Organisational feasibility needs to be carried out:
Technical feasibility is the assessment of whether hardware, software and communications
components can be developed and /or acquired to solve a business problem.
Economic feasibility is the assessment of whether a project is an acceptable financial risk
and if the organisation can afford the expense and time needed to complete it. This is done
through cost/benefit analysis.
Organisational feasibility is the assessment of the organisation‘s ability to access and make
use of the proposed project.
Behavioural feasibility is the assessment of the human issues involved in a proposed
project, including resistance to change and skills and training needs of employees.
Legal feasibility determines whether there is any conflict between the proposed system and
legal requirements – for example, will the system contravene the Data Protection Act?
Operational feasibility is concerned with whether the current work practices and procedures
are adequate to support the new system. It is also concerned with social factors – how the
organisational change will affect the working lives of those affected by the system.
Schedule feasibility looks at how long the system will take to develop, or whether it can be
done in a desired time-frame.
The completion of this stage is marked by the production of a feasibility report produced by the
systems analyst. If the report concludes that the project should go ahead, and this is agreed by senior
managers, then you proceed to the next stage of detailed requirements analysis.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
66
3. Requirements Analysis
This is where a more detailed investigation into the current system and the requirements of the new
system is carried out. The main purpose is to gather information about the existing system and to
determine requirements for the new or improved system.
Gathering details about the current system and requirements for the new system will involve:
Interviewing staff at different levels of the organisation from the end-users to senior
management.
Examining current business and systems documents and output. These may include current
order documents, computer systems procedures and reports used by operations and senior
management.
Sending out questionnaires and analyzing responses. The questions have to be carefully
constructed to elicit unambiguous answers.
Observation of current procedures, by spending time in various departments. A time and
motion study can be carried out to see where procedures could be made more efficient, or to
detect where bottlenecks occur.
The system analyst‘s report will examine how data and information flow around the organisation,
and may use data flow diagrams to document the flow. It will also establish precisely and in
considerable detail exactly what the proposed system should do (as opposed to how it will do it).
4. System Design
This stage results in logical and physical design that either describes the new system or describes
how the existing system will be modified.
Logical system design states what the system will do using abstract specifications and
Physical system design states how the system will perform its functions, with actual physical
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
67
specifications.
Here the system designers describe how the system will accomplish the business tasks by specifying
the following aspects of a system:
System outputs, inputs, user interfaces;
Hardware, software, databases, telecommunications, personnel & procedures;
Blueprint of how these components are integrated.
6. Implementation
Implementation is the process of converting from the old system to the new system.
Implementation activities are needed to transform a newly developed information system into an
operational system for end users. This should be done following a number of activities like;
Acquisition - acquire necessary hardware and software resources.
Training - educate and train management, end users, etc. IS personal must be certain that
end users are trained to operate the new system or the implementation process will fail. End
users must be taught to operate the system and managers must be educated on how the new
technology changes the business processes and authority and responsibilities of management
Testing - test and make necessary corrections to programs, procedures, and hardware.
System testing involves testing hardware devices, testing and debugging computer programs,
and testing information processing procedures. An important part of testing is the production
of prototypes of displays, reports, and other output. It is important to involve end users in the
testing stage to recognize errors, and to provide feedback
Documentation - record detailed system specifications. Developing good user
documentation is an important part of the implementation process. An example of
documentation is a manual of operating procedures and sample data input and output.
Documentation is extremely important when solving problems or making changes, especially
if the people who developed the system are no longer with the firm.
Conversion - convert present system to new and/or improved system. Conversion from the
old system to the new system can be difficult and even painful. This should be done
following any of the four strategies of;
o Parallel conversion is where the old system and the new system operate
simultaneously for a period of time.
o Direct conversion (Plunge) is where the old system is cut off and the new system
turned on at a certain point in time.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
68
o Phased conversion is where components of the new system are introduced in stages,
until the entire new system is operational. This type of conversion is used in larger
systems that can be broken down into individual modules that can be implemented
separately at different times.
o Pilot conversion is where a new system is introduced in one part of the organisation
on a trial basis, when new system is working properly; it is introduced in other parts of
the organisation.
7. System Maintenance
Maintenance involves monitoring, evaluating, and modifying of existing information systems to
make necessary improvements. Post-implementation review is also part of IS maintenance where
the new system is evaluated to be certain that the newly implemented system meets the system
objectives established for them. At this stage, audits are performed to assess the system‘s
capabilities and to determine if it is being used correctly. Here different types of maintenance like
debugging and updating are performed.
Debugging is a process that continues throughout the life of the system.
Updating is done to accommodate changes in business conditions like adding new features to
the existing system without disturbing its operation
The different types of maintenance that can be performed include;
Perfective maintenance is done to improve on performance of the system.
Adaptive maintenance is done to cope up/adapt to changing needs within a company.
Corrective maintenance is done to rectify the coding and syntax errors:
Preventive Maintenance is done to protect the system from breaking down and affecting
usage.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
69
5.2.2 Prototyping
This is an iterative approach to systems development. There are two types of prototypes that‘s;
Operational prototype and Non-operational prototype. Operational prototype is where system
designers accesses real data files, edits input data, makes necessary computations and
comparisons, and produces real output while Non-operational prototype is a mockup, or just
model of a proposed system.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
70
Advantages of Prototyping
Reduces development time.
Reduces development costs.
Maximum user involvement.
Developers receive quantifiable user feedback.
Facilitates system implementation since users know what to expect.
Results in higher user satisfaction.
Exposes developers to potential future system enhancements
Disadvantages of prototypes
Can lead to insufficient analysis.
Users expect the performance of the ultimate system to be the same as the prototype.
Developers can become too attached to their prototypes
Can cause systems to be left unfinished and/or implemented before they are ready.
Sometimes leads to incomplete documentation.
If sophisticated software prototypes (4th GL or CASE Tools) are employed, the time saving
benefit of prototyping can be lost.
RAD is a methodology for compressing the analysis, design, build, and test phases into a series of
short, iterative development cycles. It involves use of extensive user involvement, prototyping, JAD
sessions, integrated CASE tools, and code generators.
RAD projects are typically staffed with small integrated teams comprising of developers, end users,
and IT technical resources. Small teams, combined with short, iterative development cycles
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
71
optimizes speed, unity of vision and purpose, effective informal communication and simple project
management.
RAD follows the six stages of requirements planning, analysis, system design, construction and
deployment.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
72
Joint Application Design is a process originally developed for designing a computer-based system
by bringing together business area people (users) and IT (Information Technology) professionals in
a highly focused workshop. JAD centers around a structured workshop session where everyone gets
together in a room and talks it out. Everyone hears what the rest of the group has to say.
The Spiral Model was designed to include the best features from the Waterfall and Prototyping
Models. This model introduces a new component - risk-assessment in the development process.
Similar to the Prototyping Model, an initial version of the system is developed, and then repetitively
modified based on input received from customer evaluations.
Risk assessment is included as a step in the development process as a means of evaluating each
version of the system to determine whether or not development should continue. If the customer
decides that any identified risks are too great, the project may be halted. For example increase in
costs.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
73
New IT skills.
Alteration of patterns of communication.
Decrease of time spans between communications.
Modification of points of influence, authority and control.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
74
Change management involves analyzing and defining all changes facing the organisation, and
developing programs to reduce the risks and costs, and maximize the benefits. This can be achieved
through;
Commitment from top management and an organisational design to plan the future of IT and
IS within the business.
Proper education and training.
Direct end user participation before implementation to help end users assume ownership of a
system.
Development of a change action plan.
Assigning selected managers as change sponsors.
Development of employee change teams.
Encourage open communications and feedback about organisational changes.
Involve as many people as possible in reengineering and other change programs.
Tell everyone as much as possible about everything more so new system achievements as
often as possible, preferably in person.
Make liberal use of financial incentives and recognition to motivate early adoption of the
implemented systems.
Different financial models are used to measure the business value of information systems under the
cost – benefit analysis as below;
The Payback Method which measures time required to pay back the initial investment on a
project
Accounting Rate of Return on Investment (ROI) which approximates the accounting income
earned by the investment.
Present value that measures value of a payment or stream of payments to be received.
Net present value which determines amount of money an investment is worth. If the cash
flow is positive over the time period, it means that the investment returns more benefits than
it costs.
Cost-benefit ratio that calculates returns from capital expenditure.
Profitability index that compares profitability of alternative investments by dividing the
present value of total cash inflow by initial cost.
Internal Rate of Return (IRR) that measures the rate of return or profit an investment is
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
75
expected to earn.
When data are stored in digital form, they are more vulnerable than when they exist in manual form.
Security refers to the policies, procedures, and technical measures used to prevent unauthorized
access, alteration, theft, or physical damage to information systems.
Controls consist of all the methods, policies, and organisational procedures that ensure the safety of
the organisation's assets; the accuracy and reliability of its accounting records; and operational
adherence to management standards.
Threats to computerized information systems include hardware and software failure; user errors;
physical disasters such as fire or power failure; theft of data, services, and equipment; unauthorized
use of data; and telecommunications disruptions. On-line systems and telecommunications are
especially vulnerable because data and files can be immediately and directly accessed through
computer terminals or at points in the telecommunications network.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
76
Controls upon information systems are based upon the two underlying principles of the need to
ensure the accuracy of the data held by the organisation and the need to protect against loss or
damage. The most common threats faced by organisational information systems can be placed into
the following categories of accidents, natural disasters, sabotage (industrial and individual),
vandalism, theft, unauthorised use (hacking) and computer viruses which will now be described.
Types of Vulnerabilities
Illegal access and use: One of the most common security risks in relation to computerised
information systems is the danger of unauthorised access to confidential data. Crimes
involving illegal system access and use of computer services are a concern to both
government and business. Most security breaches involving confidential data can be
attributed to the employees of the organisation.
Since the outset of information technology, computers have been plagued by criminal
hackers. A criminal hacker is a person who attempts to gain unauthorised access to a
computer-based information system, usually via a telecommunications link. In many cases,
criminal hackers are people looking for fun and excitement – the challenge of beating the
system. A criminal hacker is also called a cracker who is a computer-savvy person who
attempts to gain unauthorized or illegal access to computer systems to steal passwords,
corrupt files and programs, or even transfer money. However, this is the popular use of this
term and is considered incorrect by many IT professionals. Hackers enjoy computer
technology and spend time learning and using computer systems. Traditionally, ‗hacking‘
referred to the process of writing program code, so hackers were nothing more than skilled
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
77
computer programmers. Even today, many people consider themselves to be ‗hackers‘ of the
traditional kind and dislike being associated with the stereotype of a computer criminal.
Data Alteration and Destruction: Data and information are valuable corporate assets. The
intentional use of illegal and destructive programs to alter or destroy data is as much a crime
as destroying tangible goods. Most common of these types of programs are viruses and
worms. Virus is a program that attached itself to other programs. Worms are the once which
are independent program that replicates its own program files until it interrupts the operation
of networks and computer systems. There are over 60,000 known computer viruses today,
with over 5,000 new viruses and worms being discovered each year.
There are several different types of computer virus. Some examples include:
o The link virus attaches itself to the directory structure of a disk. In this way, the virus
is able to manipulate file and directory information. Link viruses can be difficult to
remove since they become embedded within the affected data. Often, attempts to
remove the virus can result in the loss of the data concerned.
o Parasitic viruses insert copies of themselves into legitimate programs, such as
operating system files, often making little effort to disguise their presence. In this way,
each time the program file is run, so too is the virus. Additionally, the majority of
viruses are created as terminate and stay resident (TSR) programs. Once activated, the
virus remains in the computer‘s memory performing various operations in the
background. Such operations might range from creating additional copies of itself to
deleting files on a hard disk.
o Macro viruses are created using the high-level programming languages found in e-
mail packages, web browsers and applications software, such as word processors.
Technically, such viruses are extremely crude but are capable of causing a great deal
of damage.
o With the possible exception of anti-viruses, all viruses must be considered to be
harmful. Even if a virus program does nothing more than reproduce itself, it may still
cause system crashes and data loss. In many cases, the damage caused by a computer
virus might be accidental, arising merely as the result of poor programming.
Information and Equipment Theft: Theft can be divided into two basic categories; data
theft and physical theft. Data theft normally involves making copies of important files
without causing any harm to the originals. Physical theft, as the term implies, involves the
theft of hardware and software.
Individuals who illegally access systems often do so to steal data and information. Using
password sniffers is another approach. A password sniffer is a small program hidden in a
network or a computer system that records identification numbers and passwords. Using a
password sniffer, a criminal hacker can gain access to computers and networks to steal data
and information, invade privacy, plant viruses, and disrupt computer operations. Service
organisations are particularly vulnerable to data theft since their activities tend to rely heavily
upon access to corporate databases.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
78
In addition to theft of data and software, many different computer systems and equipment
have been stolen from offices. To fight computer crime, many companies use devices that
disable the disk drive and lock the portable computer to the desk. Software and Internet
Piracy Software piracy is the act of illegally duplicating software. Internet piracy means
illegally gaining access to and using the Internet.
Accidents: A number of estimates suggest that 40–65% of all damage caused to information
systems or corporate data arises as a result of human error. Some examples of the ways in
which human errors can occur include:
Inaccurate data entry: As an example, consider a typical relational database management
system, where update queries are used to change records, tables and reports. If the contents
of the query are incorrect, errors might be produced within all of the data manipulated by the
query. Although extreme, significant problems might be caused by adding or removing even
a single character to a query. Errors in handling files, including formatting a disk by mistake,
copying an old file over a newer one, and deleting a file by mistake
Attempts to carry out tasks beyond the ability of the employee. In smaller computer-
based information systems, a common cause of accidental damage involves users attempting
to install new hardware items or software applications. In the case of software applications,
existing data may be lost when the program is installed or the program may fail to operate as
expected.
Failure to comply with procedures for the use of organisational information systems.
Where organisational procedures are unclear or fail to anticipate potential problems, users
may often ignore established methods, act on their own initiative or perform tasks
incorrectly. Failure to provide access to the most current information by not adding new and
deleting old URL links
Failure to carry out backup procedures or verify data backups. In addition to carrying
out regular backups of important business data, it is also necessary to verify that any backup
copies made are accurate and free from errors.
Natural disasters: All information systems are susceptible to damage caused by natural
phenomena, such as storms, lightning strikes, floods and earthquakes.
Sabotage: With regard to information systems, sabotage may be deliberate or unintentional
and carried out on an individual basis or as an act of industrial sabotage. Individual sabotage
is typically carried out by a disgruntled employee who wishes to exact some form of revenge
upon their employer. The logic bomb (sometimes known as a ‗time bomb‘) is a well-known
example of how an employee may cause deliberate damage to the organisation‘s information
systems. A logic bomb is a destructive program that activates at a certain time or in reaction
to a specific event. In most cases, the logic bomb is activated some months after the
employee has left the organisation.
Vandalism: Deliberate damage caused to hardware, software and data is considered a
serious threat to information systems security. The threat from vandalism lies in the fact that
the organisation is temporarily denied access to some of its resources. Even relatively minor
damage to parts of a system can have a significant effect on the organisation as a whole. In a
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
79
small network system, for example, damage to a server or shared storage device might
effectively halt the work of all those connected to the network. In larger systems, a reduced
flow of work through one part of the organisation can create bottlenecks, reducing the overall
productivity of the entire organisation. Damage or loss of data can have more severe effects
since the organisation cannot make use of the data until it has been replaced.
Computer related Mistakes: Errors in computer programs, Installing computing capacity
inadequate for the level of activity on corporate Web sites
Inadequate planning: Inadequate planning for and control of equipment malfunctions.
Inadequate planning for and control of environmental difficulties (electrical problems,
humidity problems, etc.)
Denial of service (DoS): As companies begin to rely on network technology to reduce costs,
they become more vulnerable to certain risks. For example, more harm can be caused if an
individual gains access to a network server than if they merely gain access to a single PC.
Similarly, companies relying on the Internet for business communications may find
themselves subject to denial of service attacks. Typically, these attacks involve blocking the
communications channels used by a company. For example, an e-mail system might be
attacked by sending millions of lengthy messages to the company. Other techniques involve
altering company web pages or attacking the systems used to process online transactions. In
these cases, companies are usually forced to shut down services themselves until the problem
can be dealt with. The impact of a denial of service attack can be extremely severe, especially
for organisations that rely heavily on the Internet for e-commerce.
Trojans: Recently the use of Trojans to disrupt company activities or gain access to
confidential information has grown sharply. Most of the Trojans encountered by business
organisations are designed to gather information and transmit regular reports back to the
owner. Typically, a Trojan will incorporate a key logging facility (sometimes called a
‗keystroke recorder‘) to capture all keyboard input from a given computer. Capturing
keyboard data allows the owner of the Trojan to gather a great deal of information, such as
passwords and the contents of all outgoing e-mail messages. Some Trojans are designed to
give owners control over the target computer system. Effectively, the Trojan acts as a remote
control application, allowing the owner to carry out actions on the target computer as if they
were sitting in front of it. Sometimes, the owner of the Trojan will make no effort to conceal
their activities: the victim sees actions being carried out but is unable to intervene, short of
switching off the computer. More often, however, the Trojan operates silently and the victim
is unaware that their computer is running programs, deleting files, sending e-mail, and so on.
Some programs are designed to disrupt company activities by initiating denial of service
attacks or by attacking company servers. However, incidents involving these kinds of Trojan
are rare since they often require very high levels of access to company systems.
Identity theft and brand abuse: Identity theft involves using another person‘s identity to
carry out acts that range from sending libellous e-mail to making fraudulent purchases. It is
considered relatively easy to impersonate another person in this way, but far harder to prove
that communications did not originate from the victim. For business organisations, there is a
threat that employees may be impersonated in order to place fraudulent orders. Alternatively,
a company may be embarrassed if rumours or bogus press releases are transmitted via the
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
80
Internet. The term brand abuse is used to cover a wide range of activities, ranging from the
sale of counterfeit goods, for example software applications, to exploiting a well-known
brand name for commercial gain. As an example, the name of a well-known company might
be embedded into a special web page so that the page receives a high ranking in a search
engine. Users searching for the name of the company are then likely to be diverted to the
special web page where they are offered a competitor‘s goods instead.
Extortion and bribing: Various approaches can be used to extort money from companies
such as cybersquatting and the threat of divulging customer information. Cybersquatting
involves registering an Internet domain that a company or celebrity is likely to want to own.
Although merely registering a domain is not illegal in itself, some individuals attempt to
extort money from companies or celebrities in various ways. Typically, the owner of the
domain will ask for a large sum in order to transfer the domain to the interested party.
Sometimes, however, demands for money may be accompanied by threats, such as the threat
the domain will be used in a way that will harm the victim‘s reputation unless payment is
forthcoming. Although there is an established mechanism for dealing with disputes over
domain names, many victims of cybersquatting choose not to use these procedures since they
do not wish to attract negative publicity.
Abuse of resources: Organisations have always needed to ensure that employees do not take
advantage of company resources for personal reasons. Whilst certain acts, such as sending
the occasional personal e- mail, are tolerated by most companies, the increased availability of
Internet access and e-mail facilities increases the risk that such facilities may be abused. Two
examples of the risks associated with increased access to the Internet involve libel and
cyberstalking. Cyberstalking is a relatively new form of crime that involves the harassment
of individuals via e-mail and the Internet. Of interest to business organisations is the fact that
many stalkers make use of company facilities in order to carry out their activities. There have
also been cases of ‗corporate stalking‘ where an organisation has used its resources to harass
individuals or business competitors. For an organisation, the consequences of cyberstalking
can include a loss of reputation and the threat of criminal and civil legal action.
Other risks: This section provides a discussion of two additional examples of emerging
threats: cyberterrorism and stock fraud. Cyberterrorism describes attacks made on
information systems that are motivated by political or religious beliefs. Organisations
involved in the defence industries are often the victims of such attacks. However, many other
companies are also at risk from politically motivated attacks. For example, companies
trading in countries that are in political turmoil or companies with business partners in these
countries also face the risk of such attacks. A number of recent cases have highlighted the
danger of allowing inaccurate or misleading information to propagate across the Internet.
Online stock fraud involves artificially increasing or decreasing the values of stocks by
spreading carefully designed rumours across bulletin boards and chat-rooms. Whilst such
activities may seem relatively harmless, companies can suffer significant losses. Incidences
of online stock fraud highlight an extremely important issue: organisations are at risk from
the distribution of false information across the Internet. It is important to note that the effects
of online stock fraud are not limited only to influencing stock prices. Imagine, for example,
what might happen if bogus press releases began to appear when a company was in the
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
81
Management must:
Communicate to staff that protecting the system is not only in the organisation"s interests, but
also in the best interest of users.
Increase staff awareness of security issues.
Provide for appropriate staff security training.
Monitor user activity to assess security implementation.
Physical security is a vital part of any security plan and is fundamental to all security efforts--
without it, information security, software security, user access security, and network security are
considerably more difficult, if not impossible, to initiate. Physical security refers to the protection of
building sites and equipment (and all information and software contained therein) from theft,
vandalism, natural disaster, manmade catastrophes, and accidental damage (e.g., from electrical
surges, extreme temperatures, and spilled coffee). It requires solid building construction, suitable
emergency preparedness, reliable power supplies, adequate climate control, and appropriate
protection from intruders.
The reasoning behind such an approach is extremely simple: if access to rooms and equipment is
restricted, risks of theft and vandalism are reduced. Furthermore, by preventing access to
equipment, it is less likely that an unauthorised user can gain access to confidential information.
Locks, barriers and security chains are examples of this form of control.
One of an organisation's most valuable assets is its information. Government laws, common sense
and good practice require and suggest that certain types of information (e.g., individual student
records) be protected. Both confidential and non-confidential information in a system should be
protected from unauthorized release as much as from unauthorized modification and unacceptable
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
82
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
83
Software is the means by which users control what they are doing on a computer system.
Application software affects all areas of computing. Its security, therefore, is essential to the overall
security of your information and system. Software security requires policies on software
management, acquisition and development, and pre-implementation training. Examples of Software
threats include: Natural events (e.g., aging and dirty media), intentional acts of destruction (e.g.,
hacking, creation of computer viruses, and copyright infringement), unintentionally destructive acts
(e.g., accidental downloading of computer viruses, losing instructions, and programming errors).
User access security refers to the collective procedures by which authorized users access a computer
system and unauthorized users are kept from doing so. user access security limits even authorized
users to those parts of the system that they are explicitly permitted to use (which, in turn, is based on
their "need-to-know").
Passwords: Because passwords are the most common method of user authentication, they
deserve special attention.
Password selection:
o Require that passwords be at least six characters in length (although eight to ten are
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
85
preferable).
o Prohibit the use of passwords that are words, names, dates, or other commonly
expected formats.
o Forbid the use of passwords that reflect or identify the account owner (e.g., no
birthdates, initials, or pet names).
o Require a mix of characters (i.e., letters/numbers and upper/lower case if the system is
case sensitive).
o One way to effectively create apparently random passwords that can be memorized
easily is to use the first letter of each word in a favorite quote, capitalize every other
letter, and add a number. For example, Longfellow's "One if by land, two if by sea"
(from Paul Revere's Ride) becomes the password "oIbLtIbS3".23
Password maintenance:
o Require the system administrator to change all pre-set passwords that are built into
software (e.g., supervisor, demo, and root), systematically require passwords to be
changed at pre-set intervals (e.g., once per month), maintain zero-tolerance for
password sharing.
o Forbid unsecured storage of personal passwords (e.g., they should not be written on a
note and taped to the side of a monitor), Never send a password as a part of an e-mail
message,
o Mask (or otherwise obscure) password display on the monitor when users type it in,
remind users that it is easy to change passwords if they think that theirs may have
been compromised, maintain an encrypted history of passwords to make sure that
users are not simply recycling old passwords when they should be changing them,
monitor the workplace to ensure that all regulations are being followed.
security cannot be verified, then additional precautions must be taken by installing firewalls
on the system at external access points
Biometric controls: These controls make use of the unique characteristics of individuals in
order to restrict access to sensitive information or equipment. Scanners that check
fingerprints, voice prints or even retinal patterns are examples of biometric controls. Until
relatively recently, the expense associated with biometric control systems placed them out of
reach of all but the largest organisations. Many organisations have now begun to look at
ways in which biometric control systems can be used to reduce instances of fraud.
Network security has emerged as one of today's highest-profile information security issues. Many
organisations have already connected their computing resources into a single network; others are in
the process of doing so. Network security goals fall within two major domains.
protecting your networks, information, and other assets from outside users who enter your
network from the Internet.
The second deals with safeguarding information as it is being transmitted over the network
especially the internet.
Perhaps the simplest and most effective control is the formulation of a comprehensive policy on
security. Amongst a wide variety of items, such a policy will outline:
what is considered to be acceptable use of the information system,
what is considered unacceptable use of the information system,
the penalties available in the event that an employee does not comply with the security policy
and the details of the controls in place, including their form and function and plans for
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
87
Once a policy has been formulated, it must be publicised in order for it to become effective. In
addition, the support of management is essential in order to ensure that employees adhere to the
guidelines contained within the policy.
Under normal circumstances, a set of procedures for the use of an information system will arise
from the creation of a formal security policy. Such procedures should describe in detail the correct
operation of the system and responsibilities of users. Additionally, the procedures should highlight
issues related to security, should explain some of the reasoning behind them and should also
describe the penalties for failing to comply with instructions.
In general, there are four major approaches that can be taken to ensure the integrity of an
information system. These are containment, deterrence, obfuscation and recovery.
Deterrence: A strategy based upon deterrence uses the threat of punishment to discourage
potential intruders. The overall approach is one of anticipating and countering the motives of
those most likely to threaten the security of the system. A common method involves
constantly advertising and reinforcing the penalties for unauthorised access. It is not
uncommon, for example, to dismiss an employee for gaining access to confidential data.
Similarly, it is not uncommon for organisations to bring private prosecutions against those
who have caused damage or loss to important information systems.
Obfuscation: Obfuscation concerns itself with hiding or distributing assets so that any
damage caused can be limited. One means by which such a strategy can be implemented is
by monitoring all of the organisation‘s activities, not just those related to the use of its
information systems. This provides a more comprehensive approach to security than
containment or deterrence since it also provides a measure of protection against theft and
other threats. A second method involves carrying out regular audits of data, hardware,
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
88
software and security measures. In this way, the organisation has a more complete overview
of its information systems and can assess threats more accurately. A regular software audit,
for example, might result in a reduction in the use of illegal software. In turn, this might
reduce the number of virus infections suffered by the organisation, avoid potential litigation
with software companies and detect illegal or unauthorised use of programs and data. The
dispersal of assets across several locations can be used to discourage potential intruders and
can also limit the damage caused by a successful attack. The use of other techniques, such as
backup procedures, can be used to reduce any further threats.
Recovery: A strategy based upon recovery recognises that, no matter how well defended, a
breach in the security of an information system will eventually occur. Such a strategy is
largely concerned with ensuring that the normal operation of the information system is
restored as quickly as possible, with as little disruption to the organisation as possible. The
most important aspect of a strategy based upon recovery involves careful organisational
planning. The development of emergency procedures that deal with a number of
contingencies is essential if a successful recovery is to take place. In anticipating damage or
loss, a great deal of emphasis is placed upon backup procedures and recovery measures. In
large organisations, a backup site might be created, so that data processing can be switched to
a secondary site immediately in the event of an emergency. Smaller organisations might
make use of other measures, such as RAID facilities or data warehousing services.
Technology can be a double-edged sword. It can be the source of many benefits but it can also
create new opportunities for invasion of privacy, and enabling the reckless use of that information in
a variety of decisions about an entity.
Ethics refers to the principles of right and wrong; that individuals, acting as free moral agents, use to
make choices to guide their behaviors. Basics concepts for ethical analysis include:
Responsibility: means that you accept the potential costs, duties, and obligations for the
decisions you make.
Accountability is a feature of systems and social institutions and means mechanisms are in
place to determine who took responsible action, and who is responsible.
Liability is a feature of political systems in which a body of laws is in place that permits
individuals to recover the damages done to them by other actors, systems, or organisations.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
89
Due process is a related feature of law-governed societies and is a process in which laws are
known and understood, and there is an ability to appeal to higher authorities to ensure that the
laws are applied correctly.
The major ethical, social, and political issues raised by information systems include the following
moral dimensions:
Privacy is the claim of individuals to be left alone, free from surveillance or interference
from other individuals or organisations, including the state. What information rights do
individuals and organisations possess with respect to themselves? What can they protect?
Informed consent can be defined as consent given with knowledge of all the facts needed to
make a rational decision.
Property rights and obligations. How will traditional intellectual property rights be protected
in a digital society in which tracing and accounting for ownership are difficult and ignoring such
property rights is so easy?
Accountability and Control: Who can and will be held accountable and liable for the harm
done to individual and collective information and property rights?
The software industry has not yet arrived at testing standards for producing software of
acceptable but not perfect performance. What standards of data and system quality should we
demand; to protect individual rights and the safety of society?
Balancing Power: Center Versus Periphery: Lower level employees many be empowered
to make minor decisions but the key policy decisions may be as centralized as in the past.
Rapidity of Change: Reduced Response Time to Competition: Information systems have
helped to create much more efficient national and international market. The now-more-
efficient global marketplace has reduced the normal social buffers that permitted businesses
many years to adjust to competition. We stand the risk of developing a ―just-in-time society‖
with ―just-in-time jobs‖ and ―just-in-time‖ workplaces, families, and vacations.
Maintaining Boundaries: Family, Work, and Leisure: The danger to ubiquitous
computing, telecommuting, nomad computing, and the ―do anything anywhere‖ computing
environment is that it is actually coming true. The traditional boundaries that separate work
from family and just plain leisure have been weakened. The work umbrella now extends far
beyond the eight-hour day.
Dependence and Vulnerability: Today our businesses, governments, schools, and private
associations, such as churches are incredibly dependent on information systems and are,
therefore, highly vulnerable if these systems fail. The absence of standards and the criticality
of some system applications will probably call forth demands for national standards and
perhaps regulatory oversight.
Computer Crime and Abuse: New technologies, including computers, create new
opportunities for committing crimes by creating new valuable items to steal, new way to steal
them, and new ways to harm others. Computer crime is the commission illegal acts through
the use of a computer or against a computer system. Simply accessing a computer system
without authorization or with intent to do harm, even by accident, is now a federal crime.
Computer abuse is the commission of acts involving a computer that may not illegal but
that are considered unethical. The popularity of the Internet and e-mail has turned one form
of computer abuse – spamming – into a serious problem for both individuals and businesses.
Spam is junk e-mail sent by an organisation or individual to a mass audience of Internet
users who have expressed no interest in the product or service being marketed.
Employment: Trickle-Down Technology and Reengineering Job Loss: Reengineering
work is typically hailed in the information systems community as a major benefit of new
information technology. It is much less frequently noted that redesigning business processes
could potentially cause millions of mid-level managers and clerical workers to lose their
jobs. One economist has raised the possibility that we will create a society run by a small
―high tech elite of corporate professionals…in a nation of permanently unemployed‖ (Rifkin,
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
91
1993). Careful planning and sensitivity to employee needs can help companies redesign
work to minimize job losses.
Increasing Racial and Social Class Gaps: Several studies have found that certain income
groups are less likely to have computers or online Internet access. Public interest groups want
to narrow this digital divide by making digital information services – including the Internet –
available to virtually everyone.
Health Risks: RSI, CVS, and Technostress: The most common occupational disease today
is repetitive stress injury (RSI). RSI occurs when muscle groups are forced through repetitive
actions often tens of thousands of repetitions under low-impact loads. The single largest
source of RSI is computer keyboards. The most common kind of computer-related RSI is
carpal tunnel syndrome (CTS), in which pressure on the median nerve through the wrist‘s
bony structure, called a carpal tunnel, produces pain. Millions of workers have been
diagnosed with carpal tunnel syndrome. Computer vision syndrome (CVS) refers to any
eyestrain condition related to display screen use in desktop computers, laptops, e-readers,
smart-phones, and hand-held video games. Its symptoms, which are usually temporary,
include headaches, blurred vision, and dry and irritated eyes. The newest computer-related
malady is technostress, which is stress induced by computer use. Its symptoms include
aggravation, hostility toward humans, impatience, and fatigue. Technostress is thought to be
related to high levels of job turnover in the computer industry, high levels of early retirement
from computer-intense occupations, and elevated levels of drug and alcohol abuse.
The Problem of Electronic Waste: Personal computers have been around for over thirty-
five years. Millions of them have been used and discarded. Mobile phones are now available
in even the remotest parts of the world and, after a few years of use, they are discarded.
Often, they get routed to any country that will accept them. Many times, they end up in
dumps in developing nations. These dumps are beginning to be seen as health hazards for
those living near them. Though many manufacturers have made strides in using materials
that can be recycled, electronic waste is a problem with which we must all deal.
Some Computer Waste Examples:
- Some companies discard old software and even complete computer systems when
they still have value.
- Some companies waste corporate resources to build and maintain complex systems
never used to their fullest extent.
- Employees may waste the amount of company time and money for playing
computer games, sending unimportant e-mail, or accessing the Internet. Junk e-
mail, also called spam, and junk faxes also cause waste.
Dependence and vulnerability to system errors: The doubling of computing power every 18
months has made it possible for most organisations to use information systems for their core
production processes. As a result, our dependence on systems and our vulnerability to system
errors and poor data quality have increased. Social rules and laws have not yet adjusted to this
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
92
dependence. Standards for ensuring the accuracy and reliability of information systems are not
universally accepted or enforced.
Increase in capacity to Collect and store data on individuals: Advances in data storage
techniques and rapidly declining storage costs have been responsible for the multiplying
databases on individuals—employees, customers, and potential customers—maintained by
private and public organisations. These advances in data storage have made the routine violation
of individual privacy both cheap and effective. Already massive data storage systems are cheap
enough for regional and even local retailing firms to use in identifying customers.
Advances in data analysis techniques for large pools of data are a third technological trend
that heightens ethical concerns because companies and government agencies are able to find out
much detailed personal information about individuals. With contemporary data management
tools companies can assemble and combine the myriad pieces of information about you stored
on computers much more easily than in the past. Credit card purchases can make personal
information available to market researchers, telemarketers, and direct mail companies. Advances
in information technology facilitate the invasion of privacy
o Profiling – the use of computers to combine data from multiple sources and create
electronic dossiers of detailed information on individuals.
o Non-obvious relationship awareness (NORA) – a more powerful profiling capabilities
technology, can take information about people from many disparate sources, such as
employment applications, telephone records, customer listings, and ―wanted‖ lists,
and correlated relationships to find obscure hidden connections that might help
identify criminals or terrorists.
Advances in networking, including the Internet, promise to reduce greatly the costs of moving
and accessing large quantities of data and open the possibility of mining large pools of data
remotely using small desktop machines, permitting an invasion of privacy on a scale and with a
precision heretofore unimaginable. The development of global digital superhighway
communication networks widely available to individuals and businesses poses many ethical and
social concerns. Who will account for the flow of information over these networks? Will you be
able to trace information collected about you? What will these networks do to the traditional
relationships between family, work, and leisure? How will traditional job designs be altered
when millions of ―employees‖ become subcontractors using mobile offices for which they
themselves must pay?
In order to carry out proper ethical analysis, one may follow 5 steps:
Identify and describe clearly the facts: Find out who did what to whom, and where, when,
and how.
Define the conflict or dilemma and identify the higher-order values involved: Ethical,
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018
93
social, and political issues always reference higher values. The parties to dispute all claim to
be pursuing higher values. Typically, ethical issue involves worthwhile values.
Identify stakeholders: Every ethical, social and political issue has stakeholders (people
interested in the outcome, who have invested in the situation, and usually who have vocal
opinions). We should find out the identity of these groups and what they want.
Identify the options that you can reasonably take: If none of the opinions satisfy all
interests involved, but some options do a better job than others, arriving at a good solution
may not be balancing consequences for stakeholders.
Identify the potential consequences of your options: Some options may be ethically
correct but could have disastrous consequences from other points of view. Ask yourself
―What if I choose this option consistently over time?‖
Do unto others as you would have them do unto you (Golden Rule): Putting yourself into the
place of others, and thinking of yourself as the object of the decision, can help you think
about fairness in decision making.
If an action is not right for everyone to take, it is not right for anyone (Immanuel Kant‘s
Categorical Imperative): Ask yourself if everyone did this could the organisation or society
survive?
If an action cannot be taken repeatedly, it is not right to take at all (Descartes‘ Rule of
Change): This is the slippery slope rule: an action may bring about a small change that is
acceptable now, but if it is repeated it may bring about unacceptable changes in the long run.
Take the action that achieves the higher or greater value (Utilitarian Principle): This rules
assumes you can prioritise values in a rank order and understand the consequences of various
courses of action.
Take the action that produces the least harm or least potential cost (Risk Aversion Principle):
Some actions have extremely high failure costs of very low probability eg building a nuclear
generating facility in an urban area, or extremely high failure costs of moderate probability
eg speeding and car accidents. Avoid these high failure cost actions and by paying greater
attention to high failure cost potential of moderate to high probability.
Assume that virtually all tangible and intangible objects are owned by someone unless there
is a specific declaration otherwise- Ethical ―no free lunch‖ Rule: if something someone else
has created is useful to you, it has value, and you should the creator wants compensation for
this work.
Business Information System –BAF1, BMS1, BBA1, BAS1, BBSED1, BPL1, BED1
APPROVED NOTES FOR SEMESTER II 2017 - 2018