Management Information System in Telecom Sector
Management Information System in Telecom Sector
Management Information System in Telecom Sector
GROUP: 8
RAHUL PANT
RAJENDER GULATI RAJIV PANI R. SUSHANT SINGH RAKESH DUTTA
INTRODUCTION :
Data integrity
Ease of use Modular growth
UPC
Product DB
BATCH PROCESSING
Transaction Data
Trans. File
Data Processing
Documents/ Reports
ON-LINE PROCESSING
Transaction Data
Transaction Data
Documents/ Reports
EXAMPLE OF AIRTEL
EXAMPLE OF AIRTEL
EXAMPLE OF AIRTEL
EXAMPLE OF AIRTEL
MIS
MIS IS MADE UP FROM THREE WORDS OR COMPONENTS Management: provide or develop strategies and goals and by selecting the best cause of action to achieve a plan. Information: processed form of data, the general constituents of information are processed data, data received, or data used for different purposed in an organization. System: collection of interrelated components used for achieving some predefined goal in an effective manner.
OBJECTIVE: IMPROVE THE OVERALL PERFORMANCE AND WORKING CAPACITY OF AN ORGANIZATION BY USING THE CONCEPT OF INFORMATION TECHNOLOGY IN AN EFFECTIVE WAY
Data
Information
Communication
Decisions
MIS
Use of MIS in daily routine task
To manage the data of customer verification in such a way that the required different reports can be formed in a flash
MIS REPORT
Different cases that are allocated from head office to regional office and further to agency to complete it
MIS REPORTS
The MIS executive on receiving the allocation, develops TAT (Time Allocation Table) in MIS to give predefine time to each customer verification executive to complete the case Time Allocation Table
MIS
Final MIS report developed. Executive or manager can easily check the status of performance of allocated cases from head office
MIS
MIS
Exception report
DSS
ICA Topological DATA Road & Railway networks
DSS
Model Driven
NETWORK
Coverage Conditions
Population Income Strategic Decisions
DSS
Data Driven
FUNCTIONS OF DSS
STRATEGY
PORTER'S GENERIC COMPETITIVE STRATEGIES
Cost Leadership Strategy Differentiation Strategy Focus Strategy
STRATEGY
MARKET SHARE OF BASIC SERVICES SEGMENT IN INDIA (2007-08)
Wireless Lines 14%
20
15 10 5 0
37.5 20 26
42
2005-06
2006-07
2007-08
2008-09
1- The progress cant be measured in any quantative manner. 2-Progress to implementing an infrastructure to support KM and what changes were necessary to ensure success . 3- Insufficient data. 4-As yet they are not using any specific knowledge-management tools.
KMS
Unresolved Problem Analyze Problem
KMS
Update System
Decision Support Instruction Reference Knowledge Acquisition Tacit Knowledge
Access System
Explicit Knowledge
Explicit Knowledge
Problem Resolved?
Develop Solution
SECURITY
THREAT
Compromise of the AuC or SIM used for storing the shared secret for the challenge-response mechanism. Deployment of malicious applications on devices with always-on capabilities like smart phones and Tablets. Intrusions into the operations networks. Compromises of network databases containing customer information Masquerading as authorized users, by gaining access to their credentials by means of malware, hacking tools, social engineering tools or other means
CAN RESULT IN
Identity theft (intruders masquerading as legitimate users)
Use of these compromised devices target the operators network (for example, by setting up botnets to carry out DDoS attacks)
Unauthorized changes to the users service profiles, billing and routing systems, resulting in toll fraud and unreliable Service Unauthorized access to personal and confidential data Gain unauthorized access or greater privileges to the network systems, which can then be used to launch other attacks Inference of activities that can be used against the company Unauthorized access to confidential information
Traffic analysis observing the calling and called numbers, and the frequency and length of the calls.
Social engineering attacks on operator employees.
SECURITY
Continuous monitoring & Reporting of Risk
Identification of Risk
SECURITY MANAGEMENT
ADOPTING A SECURITY FRAME WORK IMPLEMENTING SECURITY INFRASTRUCTURE CONDUCTING SECURITY TESTING Telecom Equipment Testing IT and Telecom Network Vulnerability Assessment Fuzz Testing Penetration Testing
THANK YOU