Management Information System: .Santhiya.,M.Sc Assistant Professor
Management Information System: .Santhiya.,M.Sc Assistant Professor
S.Santhiya.,M.Sc
Assistant professor
1
Part-1
IT Trends:
Information technology (IT) consists of all the hardware and software that a
firm needs to use in order to achieve its business objectives. This includes not only
computer machines, storage devices, and handheld mobile devices, but also
software, such as the Windows or Linux operating systems, the Microsoft Office
desktop productivity suite, and the many thousands of computer programs that can
be found in a typical large firm. “Information systems” are more complex and can
best be understood by looking at them from both a technology and a business
perspective.
Information system:
An information system can be defined technically as a set of interrelated
that components collect (or retrieve), process, store, and distribute information to
support decision making and control in an organization. In addition to supporting
decision making, coordination, and control, information systems may also help
managers and workers analyze problems, visualize complex subjects, and create
new products.
Information systems contain information about significant people, places,
and things within the organization or in the environment surrounding it. By
information we mean data that have been shaped into a form that is meaningful and
useful to human beings. Data, in contrast, are streams of raw facts representing
2
events occurring in organizations or the physical environment before they have been
organized and arranged into a form that people can understand and use.
A brief example contrasting information and data may prove useful. Supermarket
checkout counters scan millions of pieces of data from bar codes, which describe
each product. Such pieces of data can be totaled and analyzed to provide meaningful
information, such as the total number of bottles of dish detergent sold at a particular
store, which brands of dish detergent were selling the most rapidly at that store or
sales territory, or the total amount spent on that brand of dish detergent at that store
or sales region (see Figure 1).
Three activities in an information system produce the information that
organizations need to make decisions, control operations, analyze problems, and
create new products or services.
These activities are input, processing, and output (see Figure 2). Input captures or
collects raw data from within the organization or from its external environment.
Processing converts this raw input into a meaningful form. Output transfers the
processed information to the people who will use it or to the activities for which it
will be used. Information systems also require feedback, which is output that is
returned to appropriate members of the organization to help them evaluate or correct
the input stage.
For example, in Disney World’s systems for controlling crowds, the raw input
3
consists of data from airline bookings and hotel reservations, satellite weather data,
historic attendance data for the date being analyzed, and images of crowds from
video cameras stationed at key locations throughout the park. Computers store these
data and process them to calculate projected total attendance for a specific date as
well as attendance figures and wait times for each ride and restaurant at various times
during the day.
The systems indicate which rides or attractions are too overcrowded, which have
spare capacity, and which can add capacity. The system provides meaningful
information such as the number of raw data from a supermarket checkout counter
can be processed and organized to produce meaningful information, such as the total
unit sales of dish detergent or the total sales revenue from dish detergent for a
specific store or sales territory. An information system contains information about
an organization and its surrounding environment.
Three basic activities—input, processing, and output—produce the information
organizations need. Feedback is output returned to appropriate people or activities
in the organization to evaluate and refine the input. Environmental actors like
customers, suppliers, competitors, stockholders, and regulatory agencies interact
with the organization and its information systems.
4
Information system-concepts:
An IS is a powerful tool that can bring many different functions together. By
connecting system components, it enables IT departments to collect, store and
process information in an efficient way and distribute it for a variety of purposes.
The system can also produce reporting in different formats and to a variety of
devices. Reports can include text files, spreadsheets, graphics and complex data
visualizations. This comprehensive platform streamlines internal operations and
allows businesses to access data quickly and accurately.
5
Characteristics of IS:
Classification of IS:
• Transaction Processing System (TPS)
• Decision-Support
systems(DSS)
• Management Information System
(MIS)
• Executive Support System (ESS).
6
FIGURE-3 The four major types of information systems
7
Examples are sales order entry, hotel reservation systems, payroll, employee record
keeping, and shipping.
At the operational level, tasks, resources, and goals are predefined and highly
structured.
The decision to grant credit to a customer, for instance, is made by a lower-level
supervisor according to predefined criteria.
All that must be determined is whether the customer meets the criteria.
8
Other typical TPS applications are identified in Figure 5 The figure shows
that there are five functional categories of TPS: sales/marketing,
manufacturing/production, finance/accounting, human resources, and other types of
TPS that are unique to a particular industry. The United Parcel Service (UPS)
package tracking system described in Chapter 1 is an example of a manufacturing
TPS. UPS sells package delivery services; the TPS system keeps track of all of its
package shipment transactions.
FIGURE-5 Typical applications of TPS
9
Typically, MIS are oriented almost exclusively to internal, not environmental
or external, events. MIS primarily serve the functions of planning, controlling, and
decision making at the management level.
Generally, they depend on underlying transaction processing systems for
their data MIS summarizes and reports on the company’s basic operations.
The basic transaction data from TPS are compressed and are usually presented
in long reports that are produced on a regular schedule.
Figure-6 shows how a typical MIS transforms transaction level data from
inventory, production, and accounting into MIS files that are used to provide
managers with reports.
FIGURE-6 How managementinformation systems obtain their data from
the organization’s TPS
10
FIGURE-7 A sample MIS report
This report showing summarized annual sales data was produced by the MIS in
Figure -7. MIS usually serve managers primarily interested in weekly, monthly, and
yearly results, although some MIS enable managers to drill down to see daily or
hourly data if required. MIS generally provides answers to routine questions that
have been specified in advance and have a predefined procedure for answering them.
For instance, MIS reports might list the total pounds of lettuce used this quarter by
a fast-food chain or, as illustrated in Figure-7, compare total annual sales figures for
specific products to planned targets. These systems are generally not flexible and
have little analytical capability. Most MIS use simple routines such as summaries
and comparisons, as opposed to sophisticated mathematical models or statistical
techniques.
11
internal information from TPS and MIS, they often bring in information from
external sources, such as current stock prices or product prices of competitors.
Clearly, by design, DSS has more analytical power than other systems. They
use a variety of models to analyze data, or they condense large amounts of data into
a form in which they can be analyzed by decision makers. DSS are designed so that
users can work with them directly; these systems explicitly include user-friendly
software. DSS are interactive; the user can change assumptions, ask new questions,
and include new data.
The system can answer questions such as the following: Given a customer
delivery schedule and an offered freight rate, which vessel should be assigned at
what rate to maximize profits? What is the optimal speed at which a particular vessel
can optimize its profit and still meet its delivery schedule? What is the optimal
loading pattern for a ship bound for the U.S. West Coast from Malaysia? Figure-6
illustrates the DSS built for this company. The system operates on a powerful
desktop personal computer, providing a system of menus that makes it easy for users
to enter data or obtain information.
12
FIGURE-8 Voyage-estimating decision-support system
This voyage-estimating DSS draws heavily on analytical models.
Other types of DSS are less model-driven, focusing instead on extracting useful
information to support decision making from massive quantities of data.
For example, Intrawest—the largest ski operator in North America—collects
and stores vast amounts of customer data from its Web site, call center, lodging
reservations, ski schools, and ski equipment rental stores.
It uses special software to analyze these data to determine the value, revenue
potential, and loyalty of each customer so managers can make better decisions on
how to target their marketing programs.
The system segments customers into seven categories based on needs, attitudes,
and behaviors, ranging from “passionate experts” to “value-minded family
vacationers.”
The company then e-mails video clips that would appeal to each segment to
encourage more visits to its resorts.
13
Executive support system:
Senior managers use executive support systems (ESS) to help them make
decisions. ESS serves the strategic level of the organization. They address no routine
decisions requiring judgment, evaluation, and insight because there is no agreed-on
procedure for arriving at a solution.
ESS are designed to incorporate data about external events, such as new tax laws
or
competitors, but they also draw summarized information from internal MIS and
DSS. They filter, compress, and track critical data, displaying the data of greatest
importance to senior managers. For example, the CEO of Liner Health Products, the
largest manufacturer of private-label vitamins and supplements in the United States,
has an ESS that provides on his desktop a minute-to-minute view of the firm’s
financial performance as measured by working capital, accounts receivable,
accounts payable, cash flow, and inventory.
ESS employs the most advanced graphics software and can present graphs and data
from many sources. Often the information is delivered to senior executives through
a portal, which uses a Web interface to present integrated personalized business
content from a variety of sources.
Unlike the other types of information systems, ESS are not designed primarily to
solve specific problems. Instead, ESS provides a generalized computing and
communications capacity that can be applied to a changing array of problems.
Although many DSS are designed to be highly analytical, ESS tend to make less use
of analytical models.
14
often have little, if any, direct contact or experience with computer-based
information systems, they incorporate easy-to-use graphic interfaces.
This system pools data from diverse internal and external sources and makes them
available to executives in an easy-to-use form
Figure-10 illustrates how the systems serving different levels in the organization
are to one another.
TPS are typically a major source of data for other systems, whereas ESS are
primarily a recipient of data from lower-level systems.
The other types of systems may exchange data with each other as well.
Data may also be exchanged among systems serving different functional areas.
15
FIGURE-10 Interrelationships among system
The various types of systems in the organization have interdependencies. TPS are
major producers of information that is required by the other systems, which, in turn,
produce information for other systems. These different types of systems have been
loosely coupled in most organizations.
Components of IS:
Computer hardware:
User interact with hardware and command to perform specific task
Physical equipment used for input, processing and outputs activities in
an information system
Computer hardware includes the physical parts of a computer, such as
the case, central processing unit (CPU), random access memory (RAM),
monitor, mouse, keyboard, computer data storage, graphics card, sound
card, speakers and motherboard.
16
Computer software:
● Computer instructions or data, anything that can be stored
electronically is called software
● Programmed instructions that control and coordinate the computer
hardware components in an information system.
● Software depends upon hardware and hardware also depends upon
software.
➢ System software example: MS Windows, Android, Linux,
Interpreter, compiler, Assembler, Antivirus, etc.,
➢ Software example: MS Word, MYSQL, VLC ,Adobe Photoshop,
Google Chrome, Microsoft edge, etc.,
17
Interface between end-user
Provides high level of security
Large database maintenance
storage space and cost Duplication
and redundancy.
DBMS Types:
Relational database management system:
Stores data in separate tables consisting of rows and columns. All tables are linked
using data relationships.
Object-oriented database management system:
Stores data in the form of objects and offers high data control when
connecting the DBMS with other business applications.
Hierarchical database management system:
Organizes data into a hierarchical structure, with each level representing a
different category of information.
Network databases management system:
Stores, retrieves and manages data within a networked environment. It ensures data
is
consistent across network-connected devices.
Advantages:
● Minimum data redundancy
● Improve data security
● Lower updating error
18
Disadvantages:
● Many individuals using the same application simultaneously lead to
data loss.
● Software and hardware are expensive.
Internet technologies:
19
● Fiber is truly the faster, most reliable and high-tech internet around.
● The invention of fiber optic cables made a revolutionary impact on the
technology of the internet world wide for Instant messaging,
communication via electronic mail, voice over internet protocol
(VOIP), telephone calls, and video calls were made possible at the
beginning of the 21st century.
● Fiber optic: up to 10Gbps (at a data transfer rate of up to 10 billion bits
per second) Copper cable: 25-300 Mbps (at a data transfer rate of up to
300 million bits per second)
Advantages of internet:
● online Banking and Transaction
● Education, online jobs, freelancing
● Entertainment
● New job roles
● Best communication medium
● Comfort to humans
● GPS tracking and Google maps.
● E-Commerce
● Abundant information
● Communicate forum.
Disadvantages of internet:
● Time wastage
● Bad impact of health
● Cyber crimes
● Effects on children
● Internet addiction disorder
● Social Alienation
● Spam
● Virus/malware.
20
Trends in network computing:
5G and Wi-Fi 6 technology
5G is the fifth generation of mobile network technology that promises
faster speeds, lower latency, higher capacity, and more reliability than
previous generations.
It also enables new applications and services such as cloud computing,
edge computing, Internet of Things (IoT), and augmented reality.
However, 5G is not the end of the road. Researchers and developers are
already working on 6G and beyond, which aim to achieve terabit-level
data rates, sub-millisecond latency, massive connectivity, and intelligent
network management.
Artificial Intelligence (AI) and Machine Learning (ML)
AI and ML may solve complex network and business issues in real-
time.
A wide range of application cases is covered, including anything from
tiny towns to industrial plants to government agencies. ML and AI can
produce predictions based on network data, and these predictions may
be used to execute intelligent actions.
21
IoT is all about connecting the unconnected. Majority of objects are
unconnected however with IoT devices are acquiring capabilities to
communicate and connect with other devices and people changing the
way we work.
Data security
Usability and integrity of the network is crucial to security. Effective
network security manages network access effectively and stops a
variety of threats entering or spreading within the network.
Devops
DevOps is tied up to software development and IT. DevOps improve
relationship between network service designers and engineers to make
operational changes to the services.
Intent- Based networking
This approach bridges the gap between business and IT. Business intent
is captured and continuously aligned to end to end networks related to
application service levels, security policies, compliance, operational
and business processes.
Virtual segmentation of IoT devices from the remaining network will be
one of the major tasks for Networking teams.
The creation of secure zones called Microsegments which will allow IoT
devices to operate on the same corporate network and reduce the risks to
other parts of the network.
22
• This also supports the usage of add-on features like smiley or emoticons
with the text message.
• Examples of instant messaging applications include Facebook, We Chat,
Twitter, LinkedIn, etc.
• Collaboration occurs when two or more people work together to achieve
common Goals and Results.
Types of collaboration:
○ Team collaboration
○ Community collaboration
○ Network collaboration
○ Cloud collaboration
○ Video collaboration
○Internal collaboration
o External
collaboration
○ Strategic collaboration.
23
● Cloud: Cloud computing business is quick and flexible and access
important data. Infrastructure, platform and services Amazon Web
Service.
24
UNIT - 2
Organizational Application
MIS software is used to track sales, inventory, equipment and related business
information. In the past, these applications ran on mainframe computers. However, as
computing systems evolved, organizations began to run MIS software on client-server
systems.
1
· Increased Speed
· Increased Accuracy
· Increased Customer Service
· Increased Data for Decision Making
2
the customer. This system provides sales tax data to the general ledger system for
posting to taxing agency accounts, stock data to the inventory sys-tem for updating
inventory balances, and sales data to the accounts receivable system for posting to
customer accounts.
Accounts Receivables System allows you to enter, update, and delete customer
information such as sales made on account, credit terms, cash payments received,
credit memorandums, and account balances. Inputs to the accounts receivab1e system
include sales invoices, credit memorandums, and cash received from customers.
Typical outputs of this system are monthly customer statements of account and a
schedule of accounts receivable listing each ac-count and its balance.
Accounts Payable System processes much the same routine, repetitive information as
the accounts receivable system, except that in this case the information is about the
organization’s creditors rather than about its customers.
Inventory Control System provides input to the general ledger system and receives
input from the purchase order and the sales order systems. The basic purpose of the
system is to
keep track of inventory levels and inventory costs. The system maintains information
about each stock item, such as stock numbers and stock descriptions, receipts and
issues of stock,
stock damage, and stock balances.
Purchase Order Processing System processes purchase orders and tracks which
purchase orders have been filled, which stock items ordered are on backorder, which
stock items have been damaged or do not meet the specifications of the original order,
and which orders are still on order and when those orders are expected to arrive. The
purchase order system provides information to the accounts payable and inventory
systems. The system produces a variety of reports, including a list of all stock on
backorder and an open-order report that lists
all purchase orders not yet received and their expected arrival dates.
Payroll System processes wage and salary information such as payments to
employees; deductions from employee paychecks; and payments to federal, state, and
other taxing agencies for taxes used. The payroll system produces such repoft4 as the
weekly payroll summary report, overtime reports, forms for taxing agencies such as
wage and tax statements (Forms W-2), payroll checks, and checks for payroll taxes
owed to taxing agencies.
3
planning and developing new products; advertising, promoting, selling, storing, and
distributing goods and services; providing financing and credit to customers’ and
conducting market research.
Functional marketing information systems include systems such as sales systems,
advertising systems, sales promotion systems, warehousing systems, and pricing
systems. The systems collect data that describe marketing operations, process those
data, and make marketing information available to marketing managers to help them
make decisions
Computer information systems have been widely applied to Functional
management-level marketing tasks. Information technology has increased the
productivity of sales people; helped firms manage customers better, locate prospective
customers, customize marketing efforts to specific groups and individuals, and reduce
costs; and vastly widened the reach of many organizations in terms of the geographic
territory they serve.
Computer technology applied to Functional management-level marketing systems also
captures data useful for tactical and strategic decisions.
4
Other sales force automation systems: May also provide support for many other routine,
repetitive salesperson activities, for example, travel expense reports, appointment
calendars,
telephone and address rolodexes, sales letter creation and distribution, e-mail, and fax.
Internet access may also be provided so that salespeople can keep current on business
news
at any hour, especially news about the industry, competitors, and customers.
Micromarketing and Data Warehouse Systems: Pitching sales or advertising
campaigns to very narrowly defined customer targets is called micromarketing.
Computer systems have made micromarketing possible. They can be used to identify
and target specific customers or prospects from large databases
Telemarketing systems: Usually include support for the automatic dialing of parties
and/or delivering voice messages to the answering party under the control of a
computer system.
Some systems allow you to make notes about the calls, to generate follow-up letters,
and to view a customer file while a call to that customer is in progress.
Direct Mail Advertising Systems: Many organizations generate sales by mailing sales
brochures and catalogs directly to customers using direct mail advertising systems. To
distribute sales documents rapidly to large numbers of potential customers, most
marketing departments maintain customer mailing lists that are used for mass mailings.
The ‘lists may be drawn from customer files; accounts receivable records; prospect files;
commercial databases of households, businesses, and organizations; or they can be
purchased from other firms.
Point of Sale System: Systems provide immediate updates to sales and inventory
systems and allow firms to monitor sales trends minute by minute. They also allow firms
to capture customer data and preferences and add the information to their data
warehouses.
Delivery Tracking and Routine Systems: Customers like to receive their merchandise
on time. In a manual system, customers called in to a customer representative to check
on the delivery of their merchandise. The customer rep would then have to call the
delivery vehicle driver who uses a cell phone to tell the rep where he or she is and how
soon the merchandise might be delivered. That process took time, frequently frustrated
the customer, and cost the firm money to support.
Electronic Shopping and Advertising: Firms have been able to advertise and
customers to shop via TV; radio, and the telephone for many years. The computer age,
however, has made
other avenues for shop-ping and advertising available, the most dramatic of which is
clearly the Internet
5
Virtual shopping: When people view, select, and purchase products and services from
a store in another location using electronic means, they are virtually shopping at that
store.
Virtual shopping, or electronic shopping, allows organizations to present information
about goods and services to potential customers who are connected to their electronic
“store.” Selecting and buying goods using an electronic kiosk (described in the next
section), from an organization’s Internet site, and from a “virtual mall” of Internet Web
“stores'’ are all examples of virtual or electronic shopping.
6
production processes meet the standards set for those materials. The systems also
monitor quality during the production cycle.
Shipping Systems: At the other end of the production process, finished goods are
placed in inventory and/or shipped to customers. Many records and documents are
used to assist
and monitor in the inventorying and shipping processes-for example, shipping reports
and packing slips. The information from the shipping system affects the inventory and
accounts
receivable systems.
Cost Accounting Systems: Many Functional management-level financial accounting
systems collect and report information about the resources that are used in the
production processes so that managers can obtain accurate costs of production on
products and services. Cost accounting systems monitor the three major resources
used in production: human resources, materials, and equipment and facilities.
Materials management systems provide information on current inventory levels of
production materials, use of these materials in the production processes and their
locations, and specifications of how these materials are employed in products. The
lat-ter system is usually called a bill-of-materials (BOM) system. A bill-of-materials
system produces a list of the raw materials, subassemblies, and component parts
needed to complete each product. It provides, in essence, a list of ingredients for the
end product
Inventory Control System: Maintaining inventories at their proper levels eliminates
production shutdowns from lack of raw materials and lost sales from lack of finished
goods.
However, maintaining inventories also represents a number of costs to the organization,
including the costs of procuring and carrying the inventory, and stock out costs, or those
costs that result when the right amount of the right item is not on hand at the right time.
Automated Material Handling Systems track, control, and otherwise support the
movement of raw materials, work in process and finished goods from the receiving
docks to the shipping docks.
Computer Aided Design and Manufacturing Systems are aiding product engineers
design new products and improve old products.
Image Management Systems are designed to manage the storage and retrieval of
engineering and architectural drawings using optical disk storage media.
Material Selection Systems aid in choosing the materials for the product under design.
Shop-Floor Scheduling Systems help in scheduling production jobs. The tasks include
scheduling the time, building and rooms, tools and equipment, inventory, and personnel
to
complete factory orders.
7
IV.Human Resource Information Systems
Human resource departments are responsible for many facets to human resource
management, including recruiting, assessment, selection, placement, training,
performance appraisal, compensation and benefit management, promotion, termination,
occupational health and safety, employee services, complaints with legal constraints,
helping managers with human resource problems, and providing top management with
information
for strategic planning.
Human Resource Information Systems provide managers with data to support the
routine, repetitive human resource decisions that occur regularly in the management of
organization’s human resources. There are many Functional management level human
resource information systems including systems that help managers keep track of the
organization’s positions and employees, conduct performance evaluation, provide
alternative or flexible scheduling, recruit new employees, place employees, train
employees, relocate employees, terminate employees, provide employment benefits
and provide reports
to governmental agencies.
Position Control Systems is to identify each position in the organisation, the job title in
which the position is classified, and the employee currently assigned to the position.
Reference to the position control systems allows a human resource manager to identify
the details about unfilled positions.
Employee Information Systems is a set of employee profile records, or employee
inventory. An employee profile usually contains personal and organization-related
information, such as
name, address, sex, minority status, marital status, citizenship, years of service or
seniority data, education and training, previous experience, employment history within
the organization, salary rate, salary or wage grade, and recruitment and health plan
choices. Employee Skills Inventory contains information about every employee’s work
experience, work preferences, test scores, interests, and special skills or proficiencies.
Performance Management Systems: Many organizations review the work of
employees on a regular basis to make decisions regarding merit pay, pay increases,
transfer or promotion.
Typically, a new employee is evaluated at the end of the first six months of employment,
and other employees are evaluated annually. These reviews are often called
performance appraisals. The data for performance appraisals are frequently collected
by asking each employee’s immediate superior to complete an employee appraisal
8
form. The form may be also given to peers, the employees themselves, and even
customers
or clients.
Government Reporting Systems: Data Secures from the payroll, position control,
employee profiles, performance management, and other human resource information
systems can be used to produce reports required by myriad governmental laws and
regulations, including affirmative action and equal employment opportunity laws and
regulations.
Applicant Selection and Placement Systems After jobs and the employee
requirements for those jobs have been identified and after a pool of suitable job
candidates has been recruited,
candidates must be screened, evaluated, selected, and placed in the positions that are
open. The primary purpose of the application selection and placement system is to
assist the
human resources staff in these tasks.
Training Systems: A great deal of software available today providing on-line training for
employees, including management training software, sale training software,
microcomputer
training software, and word processing software.
9
Classification of DSS
There are several ways to classify DSS. Hoi Apple and Whinstone classifies DSS as
follows:
Text Oriented DSS: It contains textually represented information that could have a
bearing on decision.It allows documents to be electronically created, revised and
viewed as needed.
Database Oriented DSS: Database plays a major role here; it contains organized and
highly structured data.
Spreadsheet Oriented DSS: It contains information in spreadsheet that allows create,
view, modify procedural knowledge and also instructs the system to
execute self- contained instructions. The most popular tools are Excel and Lotus 1-2-3.
Solver Oriented DSS: It is based on a solver, which is an algorithm or procedure
written for performing certain calculations and particular program types.
Rules Oriented DSS: It follows certain procedures adopted as rules.
Rules Oriented DSS: Procedures are adopted in rules oriented DSS. Export system is
the example.
Compound DSS: It is built by using two or more of the five structures explained above.
Types of DSS
Following are some typical DSS:
Status Inquiry System: It helps in taking operational, management level, or
middle level management decisions, for example daily schedules of jobs to machines or
machines to operators.
Data Analysis System: It needs comparative analysis and makes use of formula
or an algorithm, for example cash flow analysis, inventory analysis etc.
Information Analysis System: In this system data is analyzed and the
an information report is generated. For example, sales analysis, accounts receivable
systems, market analysis etc.
Accounting System: It keeps track of accounting and finance related information, for
example, final account, accounts receivables, accounts payables, etc. that keep track of
the major aspects of the business.
Model Based System: Simulation models or optimization models used for decision-
making are used infrequently and creates general guidelines for
operation or management.
Model of Decision Support System:-
10
Knowledge Management System:
A knowledge management system comprises a range of practices used in an organization to
identify, create, represent, distribute, and enable adoption to insight and experience. Such
insights and experience comprise knowledge, either embodied in individual or
embedded in organizational processes and practices.
Purpose of KMS
● Improved performance
● Competitive advantage
● Innovation
● Sharing of knowledge
● Integration
Continuous improvement by:
Driving strategy
Starting new lines of business
Solving problems faster
Developing professional skills
Recruit and retain talent
Activities in Knowledge Management:
Start with the business problem and the business value to be delivered first.Identify
what kind of strategy to pursue to deliver this value and address the KM
problem.Think about the system required from a people and process point of view.
11
Finally, think about what kind of technical infrastructure are required to support the
people and processes.
Implement system and processes with appropriate change management and iterative
staged release.
Enterprise systems:
Enterprise systems also known as enterprise resource planning
(ERP)systems—provide integrated software modules and a unified database that
personnel use to plan, manage, and control core business processes across multiple
locations. Modules of ERP systems may include finance, accounting, marketing, human
resources, production, inventory management, and distribution.
ERP is an integrated, real-time, cross-functional enterprise application, an
enterprise-wide transaction framework that supports all the internal business processes
of a company.
It supports all core business processes such as sales order processing, inventory
management and control, production and distribution planning, and finance.
Scope of ERP
●Finance − Financial accounting, Managerial accounting, treasury management, asset
management, budget control, costing, and enterprise control.
●Logistics − Production planning, material management, plant maintenance, project
management, events management, etc.
●Human resource − Personnel management, training and development, etc.
●Supply Chain − Inventory control, purchase and order control, supplier scheduling,
planning, etc.
●Workflow − Integrate the entire organization with the flexible assignment of tasks and
responsibility to locations, position, jobs, etc.
Features of ERP
The following diagram illustrates the features of ERP
● Accommodating variety
12
● Seamless integration
● Resource management
● Integration management information
● Supply chain management
● Integration data model.
Advantages of ERP
●Reduction of lead time
●Reduction of cycle time
●Better customer satisfaction
●Increased flexibility, quality, and efficiency
●Improved information accuracy and decision making capability
●One Time shipment
●Improved resource utilization
●Improve supplier performance
●Reduced quality costs
●Quick decision-making
●Forecasting and optimization
●Better transparency.
Disadvantage of ERP
●Expense and time in implementation
●Difficulty in integration with other system
●Risk of implementation failure
●Difficulty in implementation change
●Risk in using one vendor.
Expert System:
An expert system is the highest form of automation of the management computing office
which allows document communication and manipulation. Decision support systems
help with problem-solving by allowing data and model manipulation. Expert systems go
beyond conventional manipulation of this kind, as they allow experts to 'teach'
computers about their fields so that fewer expert decision-makers can support the
system more of the decision-making process.
Expert systems are one of the most cutting-edge information technology facts. That is,
in some of the most complex and least-understood human information handling tasks,
i.e. decision-making, problem-solving, diagnosis and learning, they help people. We do
this by holding a large amount of factual information on a subject area, along with lines
of reasoning employed in that field by human experts.
13
Expert System Components
The key components of Expert System are as followings,
User Interface:
It contains a computerized system between the user and the machine for friendly
communication. This system provides an interface to the user in a graphical way.
Interference Engine:
It regains & determines the data process. It performs this task to deduce new facts
which are subsequently used to draw further conclusions. This component is associated
with an expert system as the brain of the expert system.
Knowledge Base:
This is the most important element of an expert system because it holds the expert's
knowledge of problem-solving. It is here that the expert's elicited knowledge is stored. It
contains the rules, facts and object descriptions, etc. The knowledge base is always
stored in the data with the newest expert system products. The knowledgebase
information is all that is needed to understand & formulate the problem, and then solve
it.
Data Acquisition Subsystem:
The specialist has to learn the information reflected in the knowledge base. Information
acquisition software is used by a person who has problem experience to build,
incorporate or modify the base of knowledge. Potential knowledge sources include
human experts, research reports, textbooks, databases and the experience of the user
himself.
Advantages of Expert System
● Expert System (ES) gives clear responses for routine actions, procedures and
activities .
RFID:
Radio frequency identification (RFID) provides a way to locate and track individual
items and collect data about them. It is the technology at the heart of the internet of
things (IOT), and has made it possible to design systems that link automatically to the
world around them and create new ways of working.
14
Features of RFID:
● RFID has a number of unique features that set it apart from other technologies.
● Our short guide will help you understand its capabilities and why it is an ideal
choice for such a wide range of applications.
15
Uses:
RFID systems use radio waves at several different frequencies to transfer data. In
health care and hospital settings, RFID technologies include the following applications:
● Inventory control
● Equipment tracking
● Out-of-bed detection and fall detection
● Personnel tracking
● Ensuring that patients receive the correct medications and medical devices
● Preventing the distribution of counterfeit drugs and medical devices
● Monitoring patients
● Providing data for electronic medical records systems.
Classification and types:
RFID systems can be broken down by the frequency band within which they
operate:
● low frequency
● high frequency
● ultra-high frequency
16
There are also two broad categories of systems:
● passive RFID
● active RFID
In the sections below we will explore the frequencies and types of RFID systems.
17
The read range of passive UHF systems can be as long as 12 m, and UHF RFID
has a faster data transfer rate than LF or HF.
UHF RFID is the most sensitive to interference, but many UHF product
manufacturers have found ways of designing tags, antennas, and readers to
keep performance high even in difficult environments.
Passive UHF tags are easier and cheaper to manufacture than LF and HF tags.
Active RFID systems typically operate in the ultra-high frequency (UHF) band and offer
a range of up to 100 m. In general, active tags are used on large objects, such as rail
cars, big reusable containers, and other assets that need to be tracked over long
distances.
18
Transponders are “woken up” when they receive a radio signal from a reader, and then
power on and respond by transmitting a signal back. Because transponders do not
actively radiate radio waves until they receive a reader signal, they conserve battery life.
Beacons are often used in real-time locating systems (RTLS), in order to track the
precise location of an asset continuously. Unlike transponders, beacons are not
powered on by the reader’s signal. Instead, they emit signals at preset intervals.
Depending on the level of locating accuracy required, beacons can be set to emit
signals every few seconds, or once a day. Each beacon’s signal is received by reader
antennas that are positioned around the perimeter of the area being monitored, and
communicates the tag’s ID information and position.The wireless ecosystem for
customers is very large and growing daily, there are use cases where Active RFID and
Passive RFID are deployed simultaneously for an additive approach to asset or sensor
management.
Passive RFID systems can operate in the low frequency (LF), high frequency (HF) or
ultra-high frequency (UHF) radio bands. As passive system ranges are limited by the
power of the tag’s backscatter (the radio signal reflected from the tag back to the
reader), they are typically less than 10 m. Because passive tags do not require a power
source or transmitter, and only require a tag chip and antenna, they are cheaper,
smaller, and easier to manufacture than active tags.
Passive tags can be packaged in many different ways, depending on the specific RFID
application requirements. For instance, they may be mounted on a substrate, or
sandwiched between an adhesive layer and a paper label to create smart RFID labels.
Passive tags may also be embedded in a variety of devices or packages to make the
tag resistant to extreme temperatures or harsh chemicals.
19
UNIT- 3
Whatever their scope and objectives, new information systems are an outgrowth
of a process of organizational problem solving. A new information system is built
as a solution to some type of problem or set of problems the organization perceives
it is facing. The problem may be one in which managers and employees realize
that the organization is not performing as well as expected, or it may come from
the realization that the organization should take advantage of new opportunities
to perform more successfully.
Systems Analysis:
Systems analysis is the analysis of the problem that the organization will try to
solve with an information system. It consists of defining the problem, identifying
its causes, specifying the solution, and identifying the information requirements
that must be met by a system solution.
The systems analyst creates a road map of the existing organization and
systems, identifying the primary owners and users of data along with existing
hardware and software. The systems analyst then details the problems of existing
systems. By examining documents, work papers, and procedures; observing
system operations; and interviewing key users of the systems, the analyst can
identify the problem areas and objectives a solution would achieve. Often the
solution requires building a new information system or improving an existing one.
Systems Design:
The systems designer details the system specifications that will deliver the
functions identified during systems analysis. These specifications should address
all of the managerial, organizational, and technological components of the system
solution. Table 14-3 lists the types of specifications that would be produced during
systems design.
We need MIS flexible enough to deal with, changing information needs of the
organisation. It should be conceived as an open system to interact with the
business environment, with a built in mechanism to provide desired information
as per the new requirement. The designing of such open information is
complex. Therefore the planning of MIS is necessary. The MIS plan is
concurrent to the business plan of organisation. The development plan of MIS
is linked with the steps of implementation in business development plan in the
form of short range plan, long range plan
.
Business Plan MIS Plan
1 Business Goals and Consistent with the business. objectives
2 Business plan & Business supports to
. strategy.
Strategy in MIS.
3 Strategic planning & decisions. MIS itself is responsible for
decision making.
4 Management plan for the execution MIS provides system
& development. development schedule & plan
execution.
5 Operational plan for execution Hardware & software plan for
the procurement & the
implementation.
Organisational information:
Information Manager
Entity Personnel Production Administration A/C
Employee
Attendance n n n y
Salary
Ages/
Overtime n n y y
Human
Resource
Information n n n y
Functional information:
Functional information is defined as a set of information required by the
functional head in conducting the administration and management function. It
is purely local to that functional organisation and by the definition it does not
has any use elsewhere except for the manager. Functional information is largely
factual, statically and detail in multidimensional functional information is
normally generated at equal time interval for understanding the trends and
making the comparison against time scale.
The functional information can be accessed on the following 3
parameters:
Working design
Responsibility
Functional Objective
Knowledge information:
It shows the trend of the activity or the result against the time scale. It creates
an awareness of those aspects of the business where the manager is forced to
think, decide and act. It highlights the deviation from non-standards and also
the abnormal level. The knowledge information supports the function of middle
and top management. It is recorded in the graphical format for quick grasp. If
the sales are declining the trend is likely to continue. The product is
continuously failing the reason can be process of manufacture.
Decision-support information:
The information doesn‘t act as a direct i/p to the decision making information.
Information issued in decision-support system & model building & problem
solving in two ways justifying the need of decision. It aids in decision making:
eg: The information on non-moving inventory justifies the decision of disposal
of item.
The demand forecast information aids in the decision on determining the orders
quantity for orders & sales. The source of this information may be internal or
external.
Operational information:
This information is required by the operator and the lower level of the
management . the main purpose of this information is fact finding and taking
such action and decision which wil affect this operator at macro level.
The source of such information is largely internal through the transaction
processing and the information relate to the small time span which is mostly
current status.
Asking & interviewing, determine the information requirement when the user
have to select one answer from finite set of answer. A closed question should
be asked instead of open question which are the raw material used for making
a product indicates a closed question, which are the raw materials used for a
product indicates an open ques. the experts or the expertise users are suppose
to give their best answers. This approach is called as Delphi method where the
system designer has to check the validity separately.
DEVELOPMENT OF MIS:
When the system is complex the development strategy is prototyping the
system. It is the progress of the information needs, development methodology
trying it out in a smaller scale with respect to the data and complexity ensuring
that it specifies the needs of the user and access the problem in development.
This process identifies the problem area inadequacies in prototype the designer
then takes the steps to remove inadequacies. The prototype approach brings the
multiple users on same platform & changing their attitude towards a corporate
goal is the managerial task of the system designer.
LIFE CYCLE:
There are many systems which have a life cycle that is starting and ending step
which indicates that the system is very much structured and rule based. They
have 100% clarity of input & their resources, definite set of o/p in terms of the
contents and formats. This system can be developed in systematic manner eg;
accounting , payroll etc…
IMPLEMENTATION OF MIS:
For the successful implementation of the system. The system designer should
i] Satisfy all the information needs of the user ii] Offer the services to the
user. iii] Respect the demands of the user iv] Not to recommend the
modification of the needs unless technically feasible. v] Explain the nature of
the system to the user to realise the information requirement of the current
system. vi] Have a better decision making capability vii] Not expect the
perfect understanding from the user as he may be the user of non-
computerized system. viii] Conduct a periodical user meeting on system where
it is easier to get the opportunities to know the ongoing difficulties of the user.
ix] Lewin‘s model suggest 3 aspects in implementation of MIS
Unfreezing: organisation to make people more receptive and interested in
change.
Choosing: A course of action where the process begins & reaches to the
desired level.
Refreezing: Where the changes are consolidated and equilibrium is
reinforced.
PARAMETERS OF MANAGEMENT OF QUALITY IN MIS
i ] Complete data of all the transaction achieves the integrity of data with respect
to the period. ii] Valid transaction input data ensures the validity of data and in
turn assumes the valid information. iii] Accuracy & precision assures that
results are accurate & precisely correct based on rules. iv] Relevance to user is
appropriate in the quality of decision making. v] If the information is received
late it becomes useless with the view of decision making.
vi] Information should be complete & meaningful. It should be represented in
proper format with references.
Normal Forms
This article is an effort to provide fundamental details of database
normalization.
The concept of normalization is a vast subject and the scope of this article is to
provide enough information to be able to understand the first three forms of
database normalization.
Second Normal Form and Third Normal Form are all about the relationship
between the columns that are the keys and the other columns that aren’t the key
columns.
The table must be already in 1 NF and all non-key columns of the tables must
depend on the PRIMARY KEY
The partial dependencies are removed and placed in a separate table
Note: Second Normal Form (2 NF) is only ever a problem when we’re using a
composite primary key. That is, a primary key made of two or more columns.
The following example, the relationship is established between the Employee and
Department tables.
This example, the Title column is functionally dependent on Name and Date
columns. These two keys form a composite key. In this case, it only depends on
Name and partially dependent on the Date column. Let’s remove the course
details and form a separate table. Now, the course details are based on the entire
key. We are not going to use a composite key.
In order to bring the table to 3 NF, we split the employee table into two.
Now, we can see the all non-key columns are fully functionally dependent on the
Primary key.
Although a fourth and fifth form does exist, most databases do not aspire to use
those levels because they take extra work and they don’t truly impact the
database functionality and improve performance.
UNIT – 4
BUSINESS INTELLIGENCE(BI):
The term ‘Business Intelligence’ has evolved from
the decision support systems and gained strength with the
technology and applications like data warehouses, Executive
Information Systems and Online Analytical Processing
(OLAP).
Business Intelligence System is basically a system used for
finding patterns from existing data from operations.
Characteristics of BI:
• It is created by procuring data and information for use
in decision-making.
• It is a combination of skills, processes, technologies,
applications and practices.
• It contains background data along with the reporting
tools.
• It is a combination of a set of concepts and methods
strengthened by fact-based support systems.
• It is an extension of Executive Support System or
Executive Information System.
• It collects, integrates, stores, analyzes, and provides
access to business information
• It is an environment in which business users get
reliable, secure, consistent, comprehensible, easily
manipulated and timely information.
• It provides business insights that lead to better, faster,
more relevant decisions.
Benefits of BI:
• Improved Management Processes.
• Planning, controlling, measuring and/or applying
changes that results in increased revenues and reduced
costs.
• Improved business operations.
• Fraud detection, order processing, purchasing that
results in increased revenues and reduced costs.
• Intelligent prediction of future.
Approaches to BI:
• Improving reporting and analytical capabilities
Using scorecards and dashboards
• Enterprise Reporting
• On-line Analytical Processing (OLAP) Analysis
• Advanced and Predictive Analysis
• Alerts and Proactive Notification
• Automated generation of reports with user
subscriptions and “alerts” to problems and/or
opportunities.
Capabilities of BIS:
• Data Storage and Management
• Data ware house
• Ad hoc analysis
• Data quality
• Data mining
• Information Delivery
• Dashboard
• Collaboration /search
• Managed reporting
• Visualization
• Scorecard
• Query, Reporting and Analysis
• Production reporting
• OLAP analysis
Data warehousing:
A data warehouse is a central repository of
information that can be analyzed to make more informed
decisions. Data flows into a data warehouse from
transactional systems, relational databases, and other
sources, typically on a regular cadence. Business analysts,
data engineers, data scientists, and decision makers access
the data through business intelligence (BI) tools, SQL
clients, and other analytics applications.
Business Analytics:
✓ Business analytics is the process of transforming data
into insights to improve business decisions. Data
management, data visualization, predictive modeling,
data mining, forecasting simulation, and optimization
are some of the tools used to create insights from data.
Yet, while business analytics leans heavily on
statistical, quantitative, and operational analysis,
developing data visualizations to present your findings
and shape business decisions is the end result. For this
reason, balancing your technical background with
strong communication skills is imperative to do well in
this field.
✓ At its core, business analytics involves a combination
of the following:
✓ Identifying new patterns and relationships with data
mining;
✓ Using quantitative and statistical analysis to design
business models;
✓ Conducting A/B and multi-variable testing based on
findings;
✓ Forecasting future business needs, performance, and
industry trends with predictive modeling; and
✓ Communicating your findings in easy-to-digest reports
to colleagues, management, and customers.
OLAP:
✓ Online analytical processing (OLAP) is software
technology you can use to analyze business data from
different points of view.
✓ Organizations collect and store data from multiple data
sources, such as websites, applications, smart meters,
and internal systems.
✓ OLAP combines and groups this data into categories to
provide actionable insights for strategic planning.
✓ For example, a retailer stores data about all the
products it sells, such as color, size, cost, and location.
✓ The retailer also collects customer purchase data, such
as the name of the items ordered and total sales value,
in a different system.
✓ OLAP combines the datasets to answer questions such
as which color products are more popular or how
product placement impacts sales.
✓
Importance of OLAP:
❖ Faster decision making:
Businesses use OLAP to make quick and accurate decisions
to remain competitive in a fast-paced economy. Performing
analytical queries on multiple relational databases is time
consuming because the computer system searches through
multiple data tables. On the other hand, OLAP systems
precalculate and integrate data so business analysts can
generate reports faster when needed.
OLAP operations:
To facilitate this kind of analysis, data is collected from
multiple sources and stored in data warehouses, then
cleansed and organized into data cubes. Each OLAP cube
contains data categorized by dimensions (such as customers,
geographic sales region and time period) derived by
dimensional tables in the data warehouses. Dimensions are
then populated by members (such as customer names,
countries and months) that are organized hierarchically.
OLAP cubes are often pre-summarized across dimensions to
drastically improve query time over relational databases.
• Data Understanding
After getting to know the purpose of data mining
it is time to get a touch and feel for your data. There could be
just as many ways to store and monetize data as there are
businesses. How you create, curate, categorize, and
commercialize your data is upto your enterprise IT strategy
and practices.
• Data Preparation
Considered one of the most important stages in the
course of nurturing data mining for business intelligence,
company data needs expert handling. Data engineers convert
data into a readable format that non-IT professionals can
interpret in addition to cleansing and modeling it as per
specific attributes.
• Data Modeling
Statistical algorithms are deployed to decipher
hidden patterns in data. A lot of trial and error goes into
finding relevant trends that can enhance revenue metrics.
• Data Evaluation
The steps involved in data modeling should be
evaluated microscopically for inconsistencies. Remember, all
roads (must) lead to streamlining operations and augmenting
profits.
• Implementation
The final step is to act on the findings in an
observable way. Field trials of the recommendations should
be piloted at a smaller scale and then expanded onto branch
outlets upon validation.
Classification:
Classification
This is a complex procedure that uses data attributes to
compartmentalize information to draw understandable
collusions. As a reference to this, an example of data mining
in business could be using supermarket data to group
information into categories such as groceries, dairy products,
etc. Tagging and studying this data can help users understand
customer preferences for each line item.
Clustering
Although it may sound similar to the previous step yet there
are differences. Cluster groups are not as defined in structure
as Classification groups. An example could be edible items,
non-edible items, perishable products, etc. instead of specific
groceries, dairy products in the earlier case.
Association Rules
Here, we use link variables to track patterns. Continuing on
our supermarket example, this could mean customers who
purchase a grocery item (edible), are more likely to purchase
fruits (perishable) as well. Upon validating this fact, store
owners can itemize the shelves in accordance with customer
choices.
Regression Analysis
Regression helps miners determine the relationship between
different variables in a set. It is used to foresee the
probability of a future event. In the case of a supermarket
store, business owners can set price points based on seasonal
demand, competition, and supply chain issues.
Anomaly Detection
The last of the data mining techniques includes identifying
outliers. There will always be anomalies in the data which
have to be accounted for. For instance, the majority of buyers
in the supermarket happen to be females but for a week in
(say) January they are displaced by men. Why? Such outliers
have to be studied for a balanced approach.
BPM:
Business performance management is a continuous cycle
of planning, tracking, analyzing performance, and making
adjustments. The cycle begins with defining strategic
business goals, which are then translated into operational
plans and goals for individual departments within the
organization. These departmental plans may include detailed
descriptions of targets, timelines and budgets. By defining
and monitoring KPIs and metrics, each department — from
finance and production to marketing and human resources —
continuously assesses whether its performance is on track to
meet those goals. Analyzing the business data underlying the
KPIs helps the organization determine whether it needs to
adjust its strategy or tactics.
Better alignment:
The company’s goals are translated into specific objectives
and metrics for each group within the organization. This
helps ensure that all employees are working toward the same
goals. Each department, by managing performance based on
these business metrics, contributes to the organization’s
success.
Automation:
Software that automates the steps of gathering KPIs and
presenting them in dashboards and reports reduces the effort
and time required to manage the business — and makes it
feasible for all employees to continuously track their
progress.
• Develop strategy:
This initial stage consists of identifying the
organization’s overall goals and developing strategies to
reach those goals. This stage may include defining the
company’s vision, values and strategic objectives in addition
to identifying revenue and profitability targets. Strategy
development is typically carried out by the organization’s
CEO and other top managers, based on input from experts
across the company.
Dashboard:
Dashboards are one of the most frequently used business
analysis tools in modern companies. They are used for
visualizing large sets of data through graphs, charts, maps,
and other visual features, all in one place.
Scorecard:
A scorecard is a performance management reporting
tool that is used for comparing the current activities in your
company with the planned objectives and results.
In essence, companies use scorecards to align their
strategies with the objectives by tracking important metrics
related to customer information, projected growth, financial
data, and business activities.
Scorecards are also the perfect solution in case you
need to fine-tune the points of control, sharpen the
organization’s processes, or optimize any current strategies.
This tool focuses more on providing a static overview
of the organization at a specific moment, which means it
isn’t really suitable for automatic analyses, real-time updates,
or showcasing more granular details.
To better understand just how beneficial scorecards
can be, here is a brief list of some of the main reasons why
companies incorporate them:
They can help you understand whether you are
producing the right products, see how profitable they are,
and check if they are in line with the current trends.
They showcase which call center scripts are functioning
properly and whether there is any room for improvement in
customer experience.
They analyze the current safety standards and help
you figure out ways to make the manufacturing environment
more profitable.
In summary, scorecards track KPIs and analyze both
the current metric status and the overall target value. Once
you understand the gap between the two, you will have an
easier time managing performance and coming up with
better strategies to reach your company goals.
For best results, scorecards should be updated each
week or month, depending on the amount of data you are
dealing with.
Unit – 5
ECONOMIC OF IT AND MANAGING IT SECURITY:
Evaluating IT-investments:
IT-investments are more complex than other types
investments due to; their demand for great technical skills,
the problem to comprehend the expenditures in advance, the
fast technology development, to only name a few (Bannister,
2004). IT cannot either be seen as an isolated phenomenon
within the organisation. Leavitt (1965) claims that there are
in- terdependencies between the actors (employees),
technology, structure and the tasks to be performed. From
this, we can see that the organisational processes needs to be
adjusted along with the changes in IT, in order to realise all
the benefits of an investment. This im- plies that IT raises
different demands in terms of evaluation-models, compared
to other types of investments. A model for IT-evaluation has
to be able to capture this complexity and transform it into an
understandable and measurable result. A discussion about
how well PENG manages to deal with the inherent
complexity of IT will be discussed below.
PENG can and have certainly been used in all the above
mentioned situations. However, our first impression of
PENG was that it offered a specialised framework for
valuing and transforming all the aspects of IT into monetary
terms. This is true in that way, that all ra- tios of the model
are illustrated in actual amounts. However, the process of
getting the re- sults lacks a clear approach in how it shall be
performed. The model leaves much of the valuation work
into the hands of the evaluation team. Based on the
descriptions of PENG in our empirical chapter, PENG offers
a framework for evaluating IT-investments, but it does not
give sufficient instruction for how the evaluations should be
performed.
The framework
In order to perform a PENG-evaluation ten steps has to be
covered. The steps serve as a guidance to help the evaluator
through the evaluation process. Our impression is that the
steps are relevant and useful in terms of the outline.
However, when going deeper into the different steps, no
clear guidelines for the procedures can be found. In addition
to this we have in the case study found that the PENG lacks a
final step, which gives propositions for how the work shall
go on after the evaluation is set. Based on this, a project
might fail to incorporate the results of the evaluation into the
continuing work. The extra step may therefore be a valuable
complement to the model. If this step shall belong to the
evaluation model or not can be discussed, nevertheless this is
a vital issue for the organisation. Our opinion is though that a
follow up meeting after any type of evaluation is essential, so
that an organisation can introduce the gathered information
into the project(s).
Timeframe
It is evident that a PENG-evaluation demands a great effort
of the persons involved and according to the case study, it
often takes 5-6 meetings during a period of at least six
weeks. In this aspect, PENG is very time-consuming
compared to other methods that are merely focused on
“measurable” aspects as Return On Investment (ROI) et
cetera. On the other hand, the result of PENG is much wider
and is probably better to mirror all the aspects of an IT-
investment, by not just focusing on costs and incomes. This
might, according to the case study, make the model
especially suited for evaluations within the public sector and
primary within health care, where “softer” aspects of IT are
the main reason behind most of the investments. In
organisation outside the health care area, the “softer” values
are important but merely in terms of attracting customers and
generating in savings or in- creased returns. Nevertheless,
this does not mean that other types of organisation cannot
find the PENG-model to be suitable for evaluating their
businesses.
Method
A method is a tool, a way to solve a problem and find new
knowledge (Holme & Solvang, 1997). Saunders, Lewis &
Thornhill (2007, p. 602) gives another definition of a method
and state that a method is “the techniques and procedures
used to obtain and analyse research data, including for
example questionnaires, observation, interviews, and
statistical and non statistical techniques”. The use of a
method will not in itself lead to new knowledge, it is
therefore important to bare in mind that the method is just at
tool to facilitate the work that needs to be done in order to
find new knowledge (Goldkuhl, 1998). This chapter will
describe the different methods and techniques used in this
thesis, but firstly we will talk about the research process.
Research process
Research is often illustrated as a process (Ghauri &
Grønhaug, 2005). This can be ex- plained by that all research
requires a lot of time and reflection. As a researcher, it is
useful to look at it as a process consisting of different stages
with different tasks (Ghauri & Grønhaug, 2005). For
example, as researchers we first have to decide in what area
we want to do our research in. Then we have to formulate
our research problem, before we can decide what data to
collect and how to collect the information. In the figure
below, you can see an example of how the research process
can be illustrated.
We have chosen to use this figure to illustrate that the thesis
work is not a linear process, rather a progress performed in
cycles. During the research process we will gain new
knowledge that further on will be added to the parts already
written. This will primarily occur after the different seminars
where we will get feedback on what we have performed so
far. Another reason for adding new information is that we
will be more versed In the subject of IT-evaluations during
the working progress. In the following section our research
methods will be described.
Case Study
According to Saunders et al. (2007, p. 139) a case study is “a
strategy for doing research which involves an empirical
investigation of a particular contemporary phenomenon
within its real life context using multiple sources of
evidence”. The case study can be useful when the concepts
and variables under the study are difficult to quantify
(Ghauri & Grønhaug, 2005). So why have we chosen to use
the case study strategy?
Literature review
According to Ghauri & Grønhaug (2005), a literature study
helps the researcher to discover relevant variables and
relationships between them and to put together these
variables in a new way. A critical review of the literature is
also necessary to help us develop thorough understanding of,
and insight into, previous research that relates to our research
questions and objectives (Saunders et al., 2007).
The sources for the literature review will mainly come from
scientific articles and books, collected both from libraries
and from the internet, videlicet different databases. We have
reviewed all literature according to Holme & Solvangs
(1997) four phases; source- observation, -origin, -
interpretation and -usability to increase the trustworthiness of
the theoretical framework. See the reference for more
information about this review.
Interview
We will use interviews to collect the main part of the data
used in this thesis. The reason for this choice is that it will
help us to get a deeper understanding about our case. The
first thing we have to consider is to decide what sort of
interview we are going to perform. There exist many types of
interviews, for example semi-structured, in-depth, and group
interviews.
Sample
The sample is often a critical task of a thesis, since much of
the research credibility (see chapter 2.5 Research credibility)
is linked to this. When using a qualitative method the se-
lection of respondent will be decisive. If we get the wrong
person from our sample, it can lead to that, the whole
interview will be worthless (Holme & Solvang, 1997). The
purpose with qualitative interviews is to increase the value of
the information and to create a base for deeper and more
complete understanding. This means that the sample will not
be random or temporary, but done in a more systematic way
based on predefined criteria (Holme & Solvang, 1997). This
involves that we will search for an “extreme” case, and not
the average, to get as large width in the material as possible
(Holme & Solvang, 1997).
Research credibility
All researchers endeavor to produce data or material that is
as close to the truth as possible. However, how can a
researcher be sure that what he/she writes is the truth? The
answer is of course that he/she cannot. All he/she can do is to
reduce the possibility of getting the answers wrong. This
means that we as researchers have to pay attention to two
particular emphases on research design: reliability and
validity (Saunders et al., 2007).
Reliability
The term reliability refers to the stability of the measurement
(Ghauri & Grønhaug, 2005) or it “refers to the extent which
your data collection techniques or analysis procedures will
yield consistent findings” (Saunders et al., 2007, p. 149).
Robson (2002) asserts that there may be four general threats
to reliability.
The last threat is observer bias. This threat deals with that
there might be many ways of interpreting the answers. As
mentioned above we were two persons taking notes from the
interview. These notes are then directly after the meeting
written down in a document, where we will discuss all the
answers so that all the received information is covered. This
document will then be send to the respondent so that he/she
could confirm, add or remove parts, which he/she believes
are incorrect. However, since the interview will be
performed in Swedish and then later on translated into
English, there is a possibility that some parts can be
mistranslated. This is a problem that we will take into
consideration when perform- ing the translation and which
will lead to us being extra careful in this process to avoid
errors.
Validity
“Validity is concerned with weather the findings are really
about what they appear to be about” (Saunders et al., 2007,
p. 149). It is here common to separate between inner and
outer validity, the later is often referred to as generalisability,
see the next section. As men- tioned before, our intention is
to interview the most “extreme” case, and not the average.
This means that we have to find a person that has “the right”
knowledge about PENG. We will then, based on our purpose,
create a number of interview questions that further on are
used to collect accurate data. Our intention is that these
measures will generate in a high validity.
Generalisability
This part of the research credibility is concerned with
whether the findings may be equally applicable to other
research settings (Ghauri & Grønhaug, 2005). In this thesis,
we will not be able to achieve a high generalisability. This
due to that we have performed a case study and from that we
are not able to draw general conclusions that will be the
same for all other settings where the PENG-model is used.
On the other hand, we think that our conclusions can be
applicable into similar settings, as the one we will use in this
case.
Benefits and costs of IT-investments
Lundberg (2004) argues that in order to see the total effect of
an investment you need to evaluate all the aspects of IT. He
further defines two kinds of IT-benefits; the ones that IT
creates within the business activities and the benefits that are
visible in terms of reduced costs. Both of these benefits are
important, especially within large corporations with a great
IT-dependency. The cost reduction is however often not as
great as the benefits within the business (Lundberg, 2004).
IT-benefits:
The costs of IT before the change, reduced by the cost
after. The different posts in the table above are used to
compare the costs, revenues and ratios before and after an
investment are accomplished. This results in an estimate of
the net- benefits of IT. From this, it becomes quite evident
that IT-investments can be reviewed from many different
standpoints and that persons from unlike divisions of the
organisation can come to poles apart conclusions when
evaluating the result of the investment. How- ever, in order
to get the total picture of an IT-investment, you need to
evaluate all the dif- ferent aspects of an investment
(Lundberg, 2004).
Strategies:
To be in line with the market is usually not enough, the
organisation’s ambitions are also of great importance when
doing IT-investments. The organisation needs to be aware of
what they expect of the investment in relation to its
strategies. This can be exemplified with an organisation that
works on a market with a decreasing price level. The strategy
of the organisation is then to consolidate, save and reduce the
personnel. To start with large IT- investments to realise new
sophisticated services would be directly wrong and not in
line with the organisational strategies (Lundberg, 2004).
• Enterprise-Wide Compliance
The number of regulatory requirements can affect the
end product/service delivery. The ESM framework
aims to resolve conflicting business objectives, as
well as fulfill regulatory and internal compliance
requirements.
• Business-Focused Outcome
In a standard ESM framework, security risks and
company objectives drive the selection of security
implementations. As it is a top-down architecture, it
ensures the identification and control of all policies.
Flaws
A flaw is unintended functionality. This may either be a
result of poor design or through mistakes made during
implementation. Flaws may go undetected for a significant
period of time. The majority of common attacks we see
today exploit these types of vulnerabilities. Between 2014
and 2015, nearly 8,000 unique and verified software
vulnerabilities were disclosed in the US National
Vulnerability Database (NVD).
Vulnerabilities are actively pursued and exploited by the full
range of attackers. Consequently, a market has grown in
software flaws, with ‘zero-day’ vulnerabilities (that is
recently discovered vulnerabilities that are not yet publicly
known) fetching hundreds of thousands of pounds
Vulnerabilities are actively pursued and exploited by the full
range of attackers. Consequently, a market has grown in
software flaws, with ‘zero-day’ vulnerabilities (that is
recently discovered vulnerabilities that are not yet publicly
known) fetching hundreds of thousands of pounds
Zero-day vulnerabilities
Zero-days are frequently used in bespoke attacks by the more
capable and resourced attackers. Once the zero-days become
publicly known, reusable attacks are developed and they
quickly become a commodity capability. This poses a risk to
any computer or system that has not had the relevant patch
applied, or updated its antivirus software. The ability for an
attacker to find and attack software flaws or subvert features
depends on the nature of the software and their technical
capabilities. Some target platforms are relatively simple to
access, for example web applications could, by design, be
capable of interacting with the Internet and may provide an
opportunity for an attacker.
Features
• A feature is intended functionality which can be
misused by an attacker to breach a system. Features
may improve the user’s experience, help diagnose
problems or improve management, but they can also be
exploited by an attacker.
• When Microsoft introduced macros into their Office
suite in the late 1990s, macros soon became the
vulnerability of choice with the Melissa worm in 1999
being a prime example. Macros are still exploited
today; the Dridex banking Trojan that was spreading in
late 2014 relies on spam to deliver Microsoft Word
documents containing malicious macro code, which
then downloads Dridex onto the affected system.
• JavaScript, widely used in dynamic web content,
continues to be used by attackers. This includes
diverting the user’s browser to a malicious website and
silently downloading malware, and hiding malicious
code to pass through basic web filtering.
Threats:
Information System Threats
A threat is anything (man made or act of nature) that has the
potential to cause of harm. A threat is also defined as “A
potential for violation of security, which exists when there is
a circumstance, capability, action, or event that could breach
security and cause harm. That is, a threat is a possible danger
that might exploit vulnerability”.
1. Physical threats
2. Accidental error,
3. Unauthorized access
4. Malicious misuse.
1. PHYSICAL THREAT:
• Physical threat to a computer system could be as a
result of loss of the whole computer system,
• Damage of hardware,
2. ACCIDENTAL ERROR:
This is also an important security issue which computer
security experts should always put into consideration when
designing security measures for a system. Accidental errors
could occur at any time in a computer system but having
proper checks in place should be the major concern of the
designer. Accidental error includes corruption of data caused
by programming error, user or operator errors.
3. UNAUTHORIZED ACCESS:
Data stored on the computer system has to be accessed for it
to be translated into useful information. This also poses a
great security threats to the computer system due to
unauthorized person’s having access to the system. Not only
this, information can be accessed via a remote system in the
process of being transmitted from one point to the other via
network media which includes wired and wireless media.
Considering an example of an organization in which a
member of staff at a particular level of hierarchy within the
establishment is only allowed access to specific area
according to the policy of the organization. If these
employees by other means not set in the organization policy
gain access to the restricted data area on the computer, this
can be termed an unauthorized access.
4. MALICIOUS MISUSE#
Any form of tampering of the computer system which
includes penetration, Trojan horses, viruses and any form of
illegal alteration of the computer system which also includes
the generation of illegal codes to alter the standard codes
within the system can be termed as malicious misuse. This
could also lead to a great financial loss and should be
prevented in all cases access.
Network security :
• Network security is any activity designed to protect
the usability and integrity of your network and
data.
• It includes both hardware and software
technologies
• It targets a variety of threats
• It stops them from entering or spreading on your
network
• Effective network security manages access to the
network.
Email security
Email gateways are the number one threat vector for a
security breach. Attackers use personal information and
social engineering tactics to build sophisticated phishing
campaigns to deceive recipients and send them to sites
serving up malware. An email security application blocks
incoming attacks and controls outbound messages to prevent
the loss of sensitive data.
Network segmentation
Software-defined segmentation puts network traffic into
different classifications and makes enforcing security
policies easier. Ideally, the classifications are based on
endpoint identity, not mere IP addresses. You can assign
access rights based on role, location, and more so that the
right level of access is given to the right people and
suspicious devices are contained and remediated.
Access control
Not every user should have access to your network. To keep
out potential attackers, you need to recognize each user and
each device. Then you can enforce your security policies.
You can block noncompliant endpoint devices or give them
only limited access. This process is network access control
(NAC).
Application security
Any software you use to run your business needs to be
protected, whether your IT staff builds it or whether you buy
it. Unfortunately, any application may contain holes, or
vulnerabilities, that attackers can use to infiltrate your
network. Application security encompasses the hardware,
software, and processes you use to close those holes.
Behavioral analytics
To detect abnormal network behavior, you must know what
normal behavior looks like. Behavioral analytics tools
automatically discern activities that deviate from the norm.
Your security team can then better identify indicators of
compromise that pose a potential problem and quickly
remediate threats.
Top-Up Approach
The approach is created, initiated, or implemented by top-
level management. This approach implements data security
by instruction procedures, creating an information security
policy, and following procedures. The priority and liability of
project activities are taken by top-level management. The
top-level managers take help from other professionals in the
infosec system.
Device security
Security in the smartphone, app system is as follows –
• The software or device is up-to-date.
• The user credentials are secured with a
password and changing it on regular intervals.
• Maintenance of the system is important.
• Intrusion detection is required as also detect
possible threats.
• Patch Management is also essential to ensure
the security of the system.
Disadvantages of InfoSec
• The system is complex and time-consuming for a large
organization.
• It is costly to maintain and implement the
requirements.
• InfoSec system is difficult to change the usual system.
• Lack of adapting to new changing systems and rigid.
• Security may give false alerts causing them to
overlook control access.
Implementing security:
A solid information security program is an essential
component of running a business in the digital age—a time
when the number of data breaches and security incidents are
increasing exponentially. Without a security program, you
leave your company, customers, and data at risk. Let’s
explore the components of an information security program,
and walk through a step-by-step guide on how you can
implement one at your organization.
Look at the two lists you’ve created and find where threats
and vulnerabilities may intersect, showing you where your
greatest levels of risk exist. A high-impact threat with high
vulnerability becomes a high risk, for example. Contact us if
you need assistance putting together a risk analysis like this.
The firm can invest to have high or low security, and the
hacker can choose to hack less or more. If the firm invests
low in security and the hacker chooses to intrude less, the
payoff for the firm is -5, which includes the cost of
investment and the cost of undetected intrusions while the
hacker gets a payoff of 6, which is the utility from hacking
minus cost if the hack is detected by security controls. We
can interpret other payoffs in other cells in a similar fashion.
That is, the first element in a cell is the firm’s payoff and the
second element in the same cell is the hacker’s payoff
corresponding to an actions pair.
Suppose the firm does not act strategically, and assume that
the firm thinks the hacker will hack low. Then it will choose
to invest less because the cost of additional investment does
not justify the savings associated with prevention or
detection of possible security breaches (i.e. -5>-8).
Because the hacker always prefers high hack to low hack, the
game ends up in (low investment, high hack). Note that not
incorporating the strategic nature of the game makes the firm
actually worse off since it gets a payoff of -10, the worst case
among all cases.
HACKERS
Low High