MIS Improved
MIS Improved
INFORMATION SYSTEM
Information System
There are so many definitions for information system and they all basically
describe the same concept.
“Information systems (IS) is the study of complementary networks of hardware
and software that people and organizations use to collect, filter, process, create,
and distribute data.”
“Information systems are combinations of hardware, software, and
telecommunications networks that people build and use to collect, create, and
distribute useful data, typically in organizational settings.”
“Information systems are interrelated components working together to collect,
process, store, and disseminate information to support decision making,
coordination, control, analysis, and visualization in an organization.”
As you can see, these definitions focus on two different ways of describing
information systems: the components that make up an information system and the
role that those components play in an organization. Ultimately, the most
appropriate definition would be that an information system is a solution to a
business need. It includes the tools and processes to address a series of business
requirements.
Technology
Technology can be thought of as the application of scientific knowledge for
practical purposes. From the invention of the wheel to the harnessing of electricity
for artificial lighting, technology is a part of our lives in so many ways that we tend
to take it for granted. As discussed before, the first three components of
information systems – hardware, software, and data – all fall under the category of
technology. Each of these will get its own chapter and a much lengthier discussion,
but we will take a moment here to introduce them so we can get a full
understanding of what an information system is.
Hardware
Information systems hardware is the part of an information system you can touch –
the physical components of the technology. Computers, keyboards, disk drives,
iPads, and flash drives are all examples of information systems hardware. We will
spend some time going over these components and how they all work together.
2
Software
Software is a set of instructions that tells the hardware what to do. Software is not
tangible – it cannot be touched. When programmers create software programs,
what they are really doing is simply typing out lists of instructions that tell the
hardware what to do. There are several categories of software, with the two main
categories being operating-system software, which makes the hardware usable, and
application software, which does something useful. Examples of operating systems
include Microsoft Windows on a personal computer and Google’s Android on a
mobile phone. Examples of application software are Microsoft Excel and Angry
Birds.
Data
The third component is data. You can think of data as a collection of facts. For
example, your street address, the city you live in, and your phone number are all
pieces of data. Like software, data is also intangible. By themselves, pieces of data
are not really very useful. But aggregated, indexed, and organized together into a
database, data can become a powerful tool for businesses. In fact, all of the
definitions presented at the beginning of this chapter focused on how information
systems manage data. Organizations collect all kinds of data and use it to make
decisions. These decisions can then be analyzed as to their effectiveness and the
organization can be improved.
Networking Communication
Besides the components of hardware, software, and data, which have long been
considered the core technology of information systems, it has been suggested that
one other component should be added: communication. An information system can
exist without the ability to communicate – the first personal computers were stand-
alone machines that did not access the Internet. However, in today’s hyper-
3
connected world, it is an extremely rare occasion that computer does not connect to
another device or to a network. Technically, the networking communication
component is made up of hardware and software, but it is such a core feature of
today’s information systems that it has become its own category.
People
Steve Jobs and Bill Gates, when thinking about information systems, it is easy to
get focused on the technology components and forget that we must look beyond
these tools to fully understand how they integrate into an organization. A focus on
the people involved in information systems is the next step. From the front-line
help-desk workers, to systems analysts, to programmers, all the way up to the chief
information officer (CIO), the people involved with information systems are an
essential element that must not be overlooked.
Process
The last component of information systems is process. A process is a series of
steps undertaken to achieve a desired outcome or goal. Information systems are
becoming more and more integrated with organizational processes, bringing more
productivity and better control to those processes. But simply automating activities
using technology is not enough – businesses looking to effectively utilize
information systems do more. Using technology to manage and improve processes,
both within a company and externally with suppliers and customers, is the ultimate
goal. Technology buzzwords such as “business process reengineering,” “business
process management,” and “enterprise resource planning” all have to do with the
continued improvement of these business procedures and the integration of
technology with them. Businesses hoping to gain an advantage over their
competitors are highly focused on this component of information systems.
4
Types of Information Systems
There are different types of information systems.
1. Manual (pen and pencil) information system
2. Informal (word to mouth) information system
3. Formal (written-based) information system
4. Computer-based information system
Data is the bloodstream of any business entity. Everyone in an organization needs
information to make decisions. An information system is an organized way of
recording, storing data, and retrieving information.
Manual Information System
A manual information system does not use any computerized devices. The
recording, storing and retrieving of data is done manually by the people, who are
responsible for the information system.
The following are the major components of a manual information system
People –people are the recipients of information system
Business Procedures –these are measures put in place that define the rules
for processing data, storing it, analyzing it and producing information
Data –these are the recorded day to day transactions
Filing system – this is an organized way of storing information
Reports –the reports are generated after manually analyzing the data from
the filing system and compiling it.
The following diagram illustrates how a typical manual information system works
5
Advantages and Dis-advantages of a manual information
system
Advantages:
The following are the advantages of manual information systems
Cost effective – it is cheaper compared to a computerized system because
there is no need to purchase expensive equipment such as servers,
workstations, printers, etc.
Flexible –evolving business requirements can easily be implemented into
the business procedures and implemented immediately
6
Disadvantages:
The following are some of the disadvantages of a manual
information system.
Time consuming –all data entries need to be verified before filing, this is a
time-consuming task when done by humans. Retrieving data from the filing
system also takes a considerable amount of time
Prone to error – the accuracy of the data when verified and validated by
human beings is more prone to errors compared to verification and
validation done by computerized systems.
Lack of security – the security of manual systems is implemented by
restricting access to the file room. Experience shows unauthorized people
can easily gain access to the filing room
Duplication of data –most departments in an organization need to have
access to the same data. In a manual system, it is common to duplicate this
data to make it easy to accessible to all authorized users. The challenge
comes in when the same data needs to be updated
Data inconsistency – due to the duplication of data, it is very common to
update data in one file and not update the other files. This leads to data
inconsistency
Lack of backups – if the file get lost or mishandled, the chances of
recovering the data are almost zero.
7
Computerized Information System
Computerized systems were developed to address the challenges of manual
information systems. The major difference between a manual and computerized
information system is a computerized system uses a combination of software and
hardware to record, store, analyze and retrieve information.
8
Improved backup systems – with modern day technology, backups can be
stored in the cloud which makes it easy to recover the data if something
happened to the hardware and software used to store the data
Easy access to information – most business executives need to travel and
still be able to make a decision based on the information. The web
and Mobile technologies make accessing data from anywhere possible.
Disadvantages:
It is expensive to set up and configure – the organization has to buy
hardware and the required software to run the information system. In
addition to that, business procedures will need to be revised, and the staff
will need to be trained on how to use the computerized information system.
Heavy reliance on technology – if something happens to the hardware or
software that makes it stop functioning, then the information cannot be
accessed until the required hardware or software has been replaced.
Risk of fraud – if proper controls and checks are not in place, an intruder
can post unauthorized transactions such as an invoice for goods that were
never delivered, etc.
We are focused on the 4th type of information system. The type of information
system that a user uses depends on their level in an organization. The following
diagram shows the three major levels of users in an organization and the type of
information system that they use.
9
Fig 1.1 levels of management
The diagram above reveals the levels of management, the type of information
system they use and the type of decisions they take.
1. Transaction Processing Systems (TPS)
This type of information system is used to record the day to day transactions of a
business. An example of a Transaction Processing System is a Point of Sale (POS)
system. A POS system is used to record the daily sales. These daily sales recorded
ends up in a database which can be amassed much later and used for decision
making through a process known as data mining.
10
2. Management Information Systems (MIS)
Management Information Systems are used to guide tactic managers to make semi-
structured decisions. The output from the transaction processing system is used as
input to the MIS system.
1. People – this refers to people who use the information system. People have
an involvement in the capturing and the use of information, by highlighting the
value of the information that is being collected you can motivate those whose job it
is to collect this information. Those who use the information will analyse it and use
it to benefit factors like growth or the profit an organization makes in a period of
time.
2. Data – the data that the information system records. The data collected must
be as accurate as possible and stored in a logical manner. The data will then be
summarized to create information which will then be used by the different
functional departments in the organization like the purchasing department who will
use information on stock levels and trends to determine what and how much of a
product should be bought.
3. telecommunication – organisations use telecommunication to distribute and
receiving information from vendors and business partners. This is usually done
11
over intranet or extranet and it is secured through the use of firewall. In some
cases, a separate and dedicated network is used to ensure complete security.
4. Hardware – these include servers, workstations, networking equipment,
printers, etc.
5. Software – these are programs used to handle the data. These include
programs such as spreadsheet programs, database software, etc.
12
Chapter 2
Overview of Management Information System
There exists a broad range of definitions of MIS in literatures. But on the other
hand, there is no standard or definite definition of MIS. Some authors use terms
MIS and IS interchangeably. A simple definition of MIS defines it as any
organized approach for obtaining relevant and timely information on which
managerial decision making is based. Nowadays the term MIS is almost
exclusively used and/or reserved for computerized systems. According to this fact,
MIS is a computer-based system that provides information and support for
managerial decision making. But on the other hand, common to various definitions
of MIS is that main purpose of the MIS is providing accurate and timely
information and thus supporting managerial decision making. This is due to the
fact, that manager could not perform decision activities effectively without relevant
information. The development and increased importance of MIS in business
practice is also due to the advancement of internet and information and
communication technology (ICT), which on the other hand make the foundation
for/of MIS (in broader sense). Another factor is also affordability of powerful
personal computers and other information technology equipment for almost every
organization. In modern business environment, organizations could not (anymore)
compete without accurate and timely information, which are in contemporary
organizations mainly provided by MIS.
An effective MIS must provide information with following characteristics:
- Timely and up-to date, outdated information is useless for decision making.
- Correct and accurate information.
- Concise/limited to the most necessary, due to the limited ability of manager to
absorb huge quantities of information at once.
13
- Relevant, because in a given situation only a small portion of given data is useful
information.
- Complete information. Information characteristics should (and also must) be
viewed as a system.
Therefore, information which lack of one of above-mentioned characteristics could
reduce the quality of decision-making process and in turn affect (most likely
decrease) effectiveness and efficiency of an organization. Most of the typologies
classify information systems according to the main organizational levels (top,
middle, low and operations) with the focus on the functions they perform and the
people they serve in organization.
According to above presented cognitions about manager’s information need we
can therefore assume that there are clear differences in information requirements
between managers at different organizational levels (e.g. top manager and first line
manager). Therefore, MIS are not the same at all managerial levels in
organizations. Managers at different organizational levels have/use different MIS,
due to the different information needs of managers at different levels in
organization. In Fig. 2 below, one among several typologies of MIS is presented In
Fig 2.
Figure 2. Relationship of information systems to organizational level.
14
According to Fig. 2 several type of information systems is used to provide
managers information they need. Management reporting systems help managers
monitor the operations and resources of an organization. Management reporting
system produces mainly detailed reports, summary reports, and exception reports.
A great proportion in management reporting systems are detailed reports, used
primarily by managers at operational level.
Summary reports are also used by middle and strategic management. A decision
support system is an information system which assists managers in evaluating the
impact of alternative decisions.
Therefore decision support system provides managers different models, analytic
tools, and the support for of ad-hoc queries. In that frame, decision support system
enable managers to analyze and/or predict the impact of current decisions on future
conditions. Manager can also model a complex set of circumstances and
manipulate various parameters in order to assess the impact of various solutions in
15
diverse conditions. From Fig. 2 is evident that in the frame of decision support
systems we also have
executive support systems, which are designed specifically for managers on the
strategic management level.
From Fig. 2 is seen that MIS is supported by organization’s transaction processing
systems and by internal and external databases. Very commonly used transaction
processing systems in contemporary organizations are enterprise resource planning
systems which pull together various types of information from operations (i.e.
operational level of organization) in order to ensure data for MIS database.
Therefore, enterprise resource planning systems are a backbone of the MIS.
However, using MIS in organizations also has several disadvantages that must be
addressed.
Experiences from business practice show that sometimes despite the fact, that MIS
uses advanced computer equipment, MIS have had relatively little success in
providing needed information to managers. Main reasons are:
- Lack of management involvement (i.e. users)in the design of MIS which will be
implemented in organization.
- Poor appreciation of management’s information requirements by MIS designers,
due to the lack of cooperation in the designing phase of MIS with users of MIS.
- Too much emphasis on the computer system and other needed equipment instead
on MIS design/creation process.
- Lack of top management support. MIS implementation is an ongoing process of
organizational change. One important consideration must be pointed out, because
the injection of technology in organization (in this case MIS) is not sufficient in
order to improve the performance of organization. Researchers started to focus on
human and organizational factors that affect the success or failure of implementing
MIS.
16
Since many MIS have not fulfilled manager’s information needs, MIS users’
involvement in creating and designing has become almost prerequisite for
successful implementation and usage of MIS. Issues about ensuring, that MIS
corresponds with manager’s information needs has been discussed heavily in
literature. In next chapter we make some suggestions how to more holistically
address the manager’s information needs in the frame of MIS design/creation
process in order to ensure that MIS will correspond with manager’s information
needs.
• Manual procedures
17
1. People – people who use the information system
2. Data – the data that the information system records
3. Business Procedures – procedures put in place on how to record,
store and analyze data
4. Hardware – these include servers, workstations, networking
equipment, printers, etc.
5. Software – these are programs used to handle the data. These include
programs such as spreadsheet programs, database software, etc.
18
Application of MIS
MIS is applied differently at different managerial levels. This gave rise to different
types of IS or MISs.
As can be seen above, there is not a simple answer to this. Depending on how you
create your classification, you can find almost any number of different types of
information system. However, it is important to remember that different kinds of
systems found in organizations exist to deal with the particular problems and tasks
that are found in organizations. Consequently, most attempts to classify
Information systems into different types rely on the way in which task and
responsibilities are divided within an organization. As most organizations are
hierarchical, the way in which the different classes of information systems are
categorized tends to follow the hierarchy. This is often described as "the pyramid
model" because the way in which the systems are arranged mirrors the nature of
the tasks found at various different levels in the organization.
For example, this is a three-level pyramid model based on the type of decisions
taken at different levels in the organization.
19
Three level pyramid model based on the type of decisions taken at different levels
in the organization
20
Five level pyramid model based on the processing requirement of different levels
in the organization
While there are several different versions of the pyramid model, the most common
is probably a four-level model based on the people who use the systems. Basing
the classification on the people who use the information system means that many
of the other characteristics such as the nature of the task and informational
requirements, are taken into account more or less automatically.
21
Four level pyramid model based on the different levels of hierarchy in the
organization
Using the four-level pyramid model above, we can now compare how the
information systems in our model differ from each other.
22
front line staff, which provide the key data required to support the
management of operations. This data is usually obtained through the
automated or semi-automated tracking of low-level activities and basic
transactions.
Functions of a TPS
TPS are ultimately little more than simple data processing systems.
o Payroll systems
o Order processing systems
o Reservation systems
o Stock control systems
o Systems for payments and funds transfers
23
o Cross boundaries (internal and external)
o Used by operational personnel + supervisory levels
o Efficiency oriented
2. Management Information Systems
Functions of a MIS
24
Some examples of MIS
25
Functions of a DSS
DSS manipulate and build upon the information from a MIS and/or TPS to
generate insights and new information.
26
4. Executive Information Systems
Functions of an EIS
EIS organizes and presents data and information from both external data
sources and internal MIS or TPS in order to support and extend the inherent
capabilities of senior executives.
27
The role of EIS
These reports take data from different categories and aggregate it. It could be from
different products, or different business units or geographical regions or accounting
periods.
28
The Trend Reports
When management uses trend reports, they can pinpoint problem areas and figure
out how to correct them. A business unit that’s not doing well may need for the
leadership in it to be changed, so it can improve. A product category that is
suffering may need to either be improved or scrapped altogether.
The Exception Reports
An exception is anything outside of the norm. An exception report will collect
every single instance of these abnormal occurrences and then put them in one place
where management has easy access to it. An exception report
allows management to see what’s not going right and then prioritize
whatneeds to be solved immediately. If, for example, inventory levels are well
below the norm, then management can order more supplies. If a business unit is
making much less revenue than the norm, then management can take action.
On-Demand Reports
On-demand reports are produced on demand. The way they look and what is
contained in them depend on both the r*equirements of
the* manager that needs them and on the prevailing circumstances.
29
The management information format can either be a standard format or a custom
one as required by the requester.
For example, the business owner might want a sales report for a specific product
category to see how well it is selling in a particular location during
a given holiday season, or at a specific price. A manager may want to know how a
change in the price of a product or service will affect the profitability of that
product or service.
30
Chapter 3
Management
Management can be defined as the process of administering and controlling the
affairs of the organization, irrespective of its nature, type, structure and size. It is
an act of creating and maintaining such a business environment wherein the
members of the organization can work together, and achieve business objectives
efficiently and effectively.
Management acts as a guide to a group of people working in the organization and
coordinating their efforts, towards the attainment of the common objective.
In other words, it is concerned with optimally using 5M’s, i.e. men, machine,
material, money and methods and, this is possible only when there are proper
direction, coordination and integration of the processes and activities, to achieve
the desired results.
Levels of Management
31
Figure 3.1 Levels of management
1. Top-Level Management: This is the highest level in the organizational
hierarchy, which includes Board of Directors and Chief Executives. They
are responsible for defining the objectives, formulating plans, strategies and
policies.
2. Middle-Level Management: It is the second and most important level in
the corporate ladder, as it creates a link between the top and lower level
management. It includes departmental and division heads and
managers who are responsible for implementing and controlling plans and
strategies which are formulated by the top executives.
3. Lower Level Management: Otherwise called as functional or operational
level management. It includes first line managers, foreman, supervisors.
As lower level management directly interacts with the workers, it plays a
crucial role in the organization because it helps in reducing wastage and idle
time of the workers, improving quality and quantity of output.
32
Functions of Management
33
Planning: It is the first and foremost function of management, i.e. to decide
beforehand what is to be done in future. It encompasses formulating policies,
establishing targets, scheduling actions and so forth.
Organizing: Once the plans are formulated, the next step is to organise the
activities and resources, as in identifying the tasks, classifying them,
assigning duties to subordinates and allocating the resources.
Staffing: It involves hiring personnel for carrying out various activities of
the organization. It is to ensure that right person is appointed to the right job.
Directing: It is the task of the manager to guide, supervise, lead and
motivate the subordinates, to ensure that they work in right direction, so far
as the objectives of the organization are concerned.
34
Controlling: The controlling function of management involves a number of
steps to be taken to make sure that the performance of the employees is as
per the plans. It involves establishing performance standards and comparing
them with the actual performance. In case of any variations, necessary steps
are to be taken for its correction.
Coordination is an important feature of management which means the
integration of the activities, processes and operations of the organization and
synchronisation of efforts, to ensure that every element of the organization
contributes to its success.
36
37
Table 1. Several important information characteristics at different levels of
managerial decision making.
At all three levels of managerial decision making exist mainly two types of
decisions:
- Structured decisions – such decisions are repetitive, routine and have a
definite procedure for handling them. Therefore, structured decisions do not
have to be treated each time as if they were new. A great proportion of
structured decisions are at operational level in organization; and
- Unstructured decisions – decision maker must provide judgment,
evaluation, and insight into the problem. Since each of these decisions is
novel, important and nonroutine, there is no definite and/or agreed procedure
in advance for decision making.
Qualities of Information
38
Availability: relates to information being available when required by the
business process now and in the future. It also concerns the safeguarding of
necessary resources and associated capabilities.
39
Chapter Four
However, there are times when off the shelf software does not meet the business
requirements. The solution to this problem is custom made software.
This section will focus on the methodologies used to develop custom software.
40
Information Systems Development Stakeholder
Users – Users are the ones who use the system after it has been developed to
perform their day to day tasks.
Project sponsors - this category of the stakeholders is responsible for the
financial aspect of the project and ensuring that the project is completed.
Developers – this category is usually made up of systems analysts and
programmers. The system analysts are responsible for collecting the user
requirements and writing system requirements.
The most important stakeholders in a project are users. For a project to be accepted
as being completed, the users must accept it and use it. If the users do not accept
the system, then the project is a failure.
The following image shows a sample UML diagram that shows users interacting
with a point of sale system
42
MIS Systems Development Life Cycle (SDLC)
The system development life cycle refers to the process of planning, creating,
testing, and deploying an information system. The main objective of system
development life cycle is to produce high-quality information systems that meet or
exceed the expectations of the users within the stipulated budget and time frame.
Waterfall Model
The waterfall model uses a sequential design model. The next stage starts only
after the completion of the previous stage. The first stage is usually drawn on the
top and the subsequent stages below and to the left bottom. This forms a waterfall
like structure, and it's where the name came from.
43
The main objective of the waterfall model is
Planning
Time scheduling
Budgeting and
Implementing an entire system at once
The waterfall model is ideal when the user requirements are clearly understood and
are not expected to change radically during the development of the information
system. The waterfall model is ideal in situations where a project has a fixed-
scope, fixed time frame, and fixed price.
The biggest challenge of the waterfall model is adoption to change. It is not easy to
incorporate new user requirements.
Agile Development
The traditional development method, waterfall model is rigid and has no room for
a change in the agreed requirements. The software industry is a highly competitive
market due to the fact that software is something that can be continuously
upgraded. This means that developers need to constantly improve on their products
44
in order to keep up but the linear, sequential approach of the waterfall makes this
difficult.
Most times, at the end of the software development, users end up having something
to complain about. In 2001, a team of 13 developers created what is now known as
the Agile Manifesto. The agile manifesto is a declaration of the values and
principles expressed in Agile Methodology. It is made up of 4 foundational values
and 12 key principles. It aims to help uncover better ways of developing software
by providing a clear and measurable structure that promotes iterative development,
team collaboration, and change recognition.
The values and principles of the ‘Manifesto for Agile Software Development’ are:
Values
Principles
45
7. Working software is the primary measure of progress
8. Agile processes to support a consistent development pace
9. Attention to technical detail and design enhances agility
10.Simplicity
11.Self-organizing teams encourage great architectures, requirements, and
designs
12.Regular reflections on how to become more effective
Those who apply any type of Agile methodology adhere to these values and
principles. The manifesto offers a good overview of what is expected when it
comes to the Agile development life cycle practices.
The deliverables
1. Product vision statement: A summary that articulates the goals for the
product.
2. Product roadmap: The high-level view of the requirements needed to
achieve the product vision.
3. Product backlog: Ordered by priority, this is the full list of what is needed
to be done to complete your project.
4. Release plan: A timetable for the release of a working product.
46
5. Sprint backlog: The user stories (requirements), goals, and tasks linked to
the current sprint.
6. Increment: The working product functionality that is presented to the
stakeholders at the end of the sprint, and could potentially be given to the
customer.
There are various frameworks within Agile project management that can be used to
develop and deliver a product or service. While they each have their own set of
characteristics and terminology, they share common principles and practices.
47
The following diagram illustrates how agile development methodologies are
implemented.
Prototyping
Prototyping makes it easy for users to specify their requirements and developers
understanding the requirements of the users because of the prototypes. A
prototyping methodology stands with identifying the basics system requirements
especially the input and output from the system. These requirements are then used
to create a simulation model that users can interact with and provide feedback. The
user feedback is used to enhance the prototype and make other important decisions
such as project costing and feasible time schedules.
48
The following diagram illustrate the stages of prototyping
Summary:
The methodology chosen depends on the nature of the project and user
requirements.
The waterfall model is ideal when the project is not expected to change
much
49
While methodologies such as Agile, Prototyping, etc. are ideal when the
project is expected to change during the course of development and the
changes, have to be incorporated.
Criminals gaining access to credit card information can lead to financial loss to the
owners of the cards or financial institute. Using organization information systems
i.e. posting inappropriate content on Facebook or Twitter using a company account
can lead to lawsuits and loss of business.
This section will address such challenges that are posed by information systems
and what can be done to minimize or eliminate the risks.
Cyber-crime
Information system Security
Information system Ethics
Information Communication Technology (ICT) policy
Cyber-crime
50
and even the loss of human life. The growth of smartphones and other high-
end Mobile devices that have access to the internet have also contributed to the
growth of cyber-crime.
51
Types of cyber-crime
Identity theft
Once the information has been acquired by the cyber-criminal, it can be used to
make purchases online while impersonating himself to be someone else. One of the
ways that cyber-criminals use to obtain such personal details is phishing. Phishing
involves creating fake websites that look like legitimate business websites or
emails.
For example, an email that appears to come from YAHOO may ask the user to
confirm their personal details including contact numbers and email password. If
the user falls for the trick and updates the details and provides the password, the
attacker will have access to personal details and the email of the victim.
If the victim uses services such as PayPal, then the attacker can use the account to
make purchases online or transfer funds.
Other phishing techniques involve the use of fake Wi-Fi hotspots that look like
legitimate ones. This is common in public places such as restaurants and airports.
If an unsuspecting user logon into the network, then cyber-crimes may try to gain
access to sensitive information such as usernames, passwords, credit card numbers,
etc.
52
According to the US Department of Justice, a former state department employee
used email phishing to gain access to email and social media accounts of hundreds
of women and accessed explicit photos. He was able to use the photos to extort the
women and threatened to make the photos public if they did not give in to his
demands.
Copyright infringement
Piracy is one of the biggest problems with digital products. Websites such as the
pirate bay are used to distribute copyrighted materials such as audio, video,
software, etc. Copyright infringement refers to the unauthorized use of copyrighted
materials.
Fast internet access and reducing costs of storage have also contributed to the
growth of copyright infringement crimes.
Click fraud
Advertising companies such as Google AdSense offer pay per click advertising
services. Click fraud occurs when a person clicks such a link with no intention of
knowing more about the click but to make more money. This can also be
accomplished by using automated software that makes the clicks.
An email is sent to the target victim that promises them a lot of money in favor of
helping them to claim their inheritance money.
In such cases, the criminal usually pretends to be a close relative of a very rich
well-known person who died. He/she claims to have inherited the wealth of the late
53
rich person and needs help to claim the inheritance. He/she will ask for financial
assistance and promise to reward later. If the victim sends the money to the
scammer, the scammer vanishes and the victim loses the money.
Hacking
Install programs that allow the attackers to spy on the user or control their
system remotely
Deface websites
Steal sensitive information. This can be done using techniques such
as SQL Injection, exploiting vulnerabilities in the database software to gain
access, social engineering techniques that trick users into submitting ids and
passwords, etc.
Computer virus
Viruses are unauthorized programs that can annoy users, steal sensitive data or be
used to control equipment that is controlled by computers.
54
Information System Security
People as part of the information system components can also be exploited using
social engineering techniques. The goal of social engineering is to gain the trust of
the users of the system.
Let's now look at some of the threats that information system face and what can be
done to eliminate or minimize the damage if the threat were to materialize.
55
Computer viruses – these are malicious programs as described in the above
section. The threats posed by viruses can be eliminated or the impact minimized by
using Anti-Virus software and following laid down security best practices of an
organization.
56
powered mobile devices or send an SMS with a PIN number which should
supplement the username and password.
If the company does not have enough resources to implement extra security like
Google, they can use other techniques. These techniques can include asking
questions to users during signup such as what town they grew up in, the name of
their first pet, etc. If the person provides accurate answers to these question, access
is granted into the system.
Data loss – if the data center caught fire or was flooded, the hardware with the data
can be damaged, and the data on it will be lost. As a standard security best practice,
most organizations keep backups of the data at remote places. The backups are
made periodically and are usually put in more than one remote area.
Ethics refers to rules of right and wrong that people use to make choices to guide
their behaviors. Ethics in MIS seek to protect and safeguard individuals and society
by using information systems responsibly. Most professions usually have defined a
code of ethics or code of conduct guidelines that all professionals affiliated with
the profession must adhere to.
57
In a nutshell, a code of ethics makes individuals acting on their free will
responsible and accountable for their actions. An example of a Code of Ethics for
MIS professionals can be found on the British Computer Society (BCS) website.
An ICT policy is a set of guidelines that defines how an organization should use
information technology and information systems responsibly. ICT policies usually
include guidelines on;
Purchase and usage of hardware equipment and how to safely dispose them
Use of licensed software only and ensuring that all software is up to date
with latest patches for security reasons
Rules on how to create passwords (complexity enforcement), changing
passwords, etc.
Acceptable use of information technology and information systems
Training of all users involved in using ICT and MIS
Summary
With great power comes great responsibility. Information systems bring new
opportunities and advantages to how we do business but they also introduce issues
that can negatively affect society (cybercrime). An organization needs to address
these issues and come up with a framework (MIS security, ICT policy, etc.) that
addresses them.
58
Chapter 5
Systems and System Theory
In the Management Information Systems, the concept of the ‘Systems’ play a very
essential and a defining role and it can be surely referred to as the backbone of the
management Information Systems. The major concept of the systems involves
basically the pattern or a way in which one thinks about managing optimally. In
management Information Systems, it acts as the framework for the visualization
and the analysation of the internal as well as the external environments and the
factors that affect these particular environments in a very integrated way or pattern.
59
The word systems refer to as the arrangement or the way of organizing some
specific things in a particular way. So now a system can be defined as the regularly
interacting interdependent group of the items ultimately leading to the formation of
a united whole. Particularly for the management Information Systems, a system
consists of certain specific set of elements that can be identified as them belonging
together because of the common purpose, goal or the objectives.
The features defining the system usually act as its boundaries, so it can be said that
the system is inside the boundary and the environment is outside the boundary.
Each system is further made of the sub systems, which further consist of the other
subsystems and one very important point to be kept in mind here is that all of these
subsystems are defined specifically by its boundaries. Each subsystem itself
actually acts as the system. The Interconnections and the various interactions that
generally take place between the various subsystems are referred to as the
interfaces.
These interfaces are generally known to occur at the boundary and usually take the
form of the inputs and the outputs. A system is not at all arranged randomly but is
arranged with the help of certain logic, which are governed by the rules, the
regulations, the principles, the policies etc. Such an arrangement of a system is
generally influenced by the objective which the system always desires to achieve.
In the management Information Systems, the concept of the system is very much
important and one should have an in-depth knowledge of it as with the help of this,
one can easily have a look at the individual elements, subsystems in the larger
perspective of the whole system leading to the optimal solutions and the synergy.
60
There are different types of the system and are generally found to be present in all
the fields of the endeavor. There are systems like the social system, political
system, economic system, educational system, etc.
All the Systems must possess the following –
1. Goals
2. Components
3. Subsystems
4. Behavior
5. Boundaries
6. Life cycle
61
1. Organization: It implies structure and order. It is the arrangement of
components that helps to achieve objectives.
2. Interaction: It refers to the manner in which each component functions with
other components of the system.
3. Interdependence: It means that parts of the organization or computer system
depend on one another. They are coordinated and linked together according to
a plan. One subsystem depends on the output of another subsystem for proper
functioning.
4. Integration: It refers to the holism of systems. It is concerned with how a
system is tied together.
5. Central Objective: A system should have a central objective. Objectives may
be real or stated. Although a stated objective may be the real objective, it is not
uncommon for an organization to state one objective and operate to achieve
another. The important point is that users must know the central objective of a
computer application early in the analysis for a successful design and
conversion.
Elements of a System
1. Outputs and inputs: A major objective of a system is to produce an output that
has value to its user. In order to get a good output, inputs to system must be
appropriate. It is important to point out here that determining the output is a first
step in specifying the nature, amount and regularity of the input needed to operate
a system.
2. Processors: It is the element of a system that involves the actual transformation
of input into output. It is the operational component of a system. Processors may
modify the input totally.
62
Taxonomy of Systems
1. Deterministic systems: a deterministic system operates in a predictable manner.
The interaction among the parts is known with certainty. A deterministic system is
one in which the occurrence of all events is known with certainty. If the description
of the system state at a particular point of time of its operation is given, the next
state can be perfectly predicted.
A system has three basic elements input, processing and output. The other
elements include control, feedback, boundaries, environment and interfaces.
Input: Input is what data the system receives to produce a certain output.
Output: What goes out from the system after being processed is known as Output.
Processing: The process involved to transform input into output is known as
Processing.
Control: In order to get the desired results, it is essential to monitor and control
the input, Processing and the output of the system. This job is done by the control.
64
Feedback: The Output is checked with the desired standards of the output set and
the necessary steps are taken for achieving the output as per the standards, this
process is called as Feedback. It helps to achieve a much better control in the
system.
Boundaries: The boundaries are nothing but the limit of the system. Setting up
boundaries helps for better concentration of the actives carried in the system.
Environment: The things outside the boundary of the system are known as
environment. Change in the environment affects the working of the system.
Interfaces: The interconnections and the interactions between the sub-systems is
known as the Interfaces. They may be inputs and outputs of the systems.
Feedback
Proper feedback is very important in closed loop system.
Feedback is a value of output parameter given to the controller for comparison
process so that it can compare the output with the set value or set parameter.
For example:
Let’s take a process of temperature control of a simple tank having water in it. It is
having heater for maintaining the temperature of water. Temperature measurement
device is there for water temperature measurement. Now the desired temperature
of water is 60 degree Celsius. So, setting this value in controller as set value. As
the water is being heated temperature rises. Measuring device ie RTD measures
66
temp. And gives signal to controller as feedback. The controller compares this
feedback with set value and control the heater settings. So, the temperature is
controlled.
Types of Model
A Model is a representation and abstraction of anything such as a real system, a
proposed system, a futuristic system design, an entity, a phenomenon, or an idea.
1. Mathematical Model: is the one in which symbols and logic constitute the
model. The symbolism used can be a language or a mathematical notation.
Example includes mathematical formulas.
2. Physical Model: Physical model is a smaller or larger physical copy of an
object. The object being modeled may be small (for example, an atom) or
large (for example, the Solar System). A model of an airplane (scaled down),
a model of the atom (scaled up), a map, a globe, a model car are examples of
physical (iconic) models.
3. The Narrative model is created by verbal or written description. And as these
can be created anywhere without much resources hence, they are most
popular.
4. The Graphic model is diagram usually two dimensional which make
extensive use of graphical entities like graphs and charts.
Chapter Five
Concept of Transaction Processing
Data and Information
67
There is a subtle difference between data and information. Data are the facts or
details from which information is derived. Individual pieces of data are rarely
useful alone. For data to become information, data needs to be put into context.
Comparison chart
Data Information
Example Each student's test score is one The average score of a class or of the
piece of data. entire school is information that can be
derived from the given data.
68
Data vs. Information - Differences in Meaning
The history of temperature readings all over the world for the past 100 years is
data. If this data is organized and analyzed to find that global temperature is
rising, then that is information.
Data Capture
69
Data capture is the process of collecting data which will be processed and used
later to fulfil certain purposes. Ways of capturing data can range from high end
technologies (e.g. Synchrotron, sensor networks and computer simulation models)
to low end paper instruments used in the field. Data with good metadata attached at
the point of capture can expediate data sharing, publishing and citation.
Collecting data is a costly activity. Planning ahead will ensure captured data that
are valid and support reuse.
70
reproducible.
Data refers to the raw facts that do not have much meaning to the user and
may include numbers, letters, symbols, sound or images.
Information refers to the meaningful output obtained after processing the
data.
Data processing therefore refers to the process of transforming raw data
into meaningful output i.e. information. Data processing can be done
manually using pen and paper. Mechanically using simple devices like
typewriters or electronically using modern data processing tools such as
computers.
Data collection
In manual data processing, most tasks are done manually with a pen and a
paper. For example, in a busy office, incoming tasks (input) are stacked in
the “tray” (output). The processing of each task involves a person using the
72
brain in order to respond to queries. The processed information from the out
tray is then distributed to the people who need it or stored in a file cabinet.
73
Verification is a static practice of verifying documents, design, code and program.
It includes all the activities associated with producing high quality software:
inspection, design analysis and specification analysis. It is a relatively
objective process.
Verification will help to determine whether the software is of high quality, but it
will not ensure that the system is useful. Verification is concerned with whether the
system is well-engineered and error-free.
Validation
The process of evaluating software during or at the end of the development process
to determine whether it satisfies specified requirements.
Validation is the process of evaluating the final product to check whether the
software meets the customer expectations and requirements. It is a dynamic
mechanism of validating and testing the actual product.
The distinction between the two terms is largely to do with the role of
specifications.
Verification Validation
2. It does not involve executing the 2. It always involves executing the
code. code.
7. Target is requirements
specification, application and 7. Target is actual product-a unit, a
software architecture, high level, module, a bent of integrated modules,
complete design, and database and effective final product.
design etc.
75
the specifications in the SRS
involvement of testing team.
document.
76
would have to process it again. To them, it would be data and not
information.
Relevant – the information must be relevant to the recipient. The
information must be directly related to the problem that the intended
recipient is facing. If the ICT department wants to buy a new server,
information that talks about a 35% discount on laptops would not be relevant
in such a scenario.
Authoritative – the information must come from a reliable source. Let's say
you have a bank account and you would like to transfer money to another
bank account that uses a different currency from yours. Using the exchange
rate from a bureau de change would not be considered authoritative
compared to getting the exchange rate directly from your bank.
Timely – information should be available when it is needed. Let's say your
company wants to merge with another company. Information that evaluates
the other company that you want to merge with must be provided before the
merger, and you must have sufficient time to verify the information.
Chapter Six
Concept of Database Management System
77
The most important component of any computer-based information system is the
databases. A database can be defined as a collection of inter-related relevant data
stored together to serve multiple applications.
A DBMS is a collection of interrelated data and a set of programs to access those
data. The collection of data, usually called as database, contains about one
particular organization or enterprise.
Or
A database management system (DBMS) can be defined as a collection of software
packages for processing the database.
(or)
A data base management system (DBMS) can be defined as a collection of
programs that are used to define, manipulate, control and process database.
A DBMS is essentially a tool to build a database structure, store and operate on the
data contained in it. The main objective of designing any database management
system is to provide its users an appreciably higher level frame work ( as compared
to files access facilitates provided in high-level programming languages) such that
the relevant interrelated data can be collected and stored together to serve
multiple application. A DBMS creates and maintains a database, loads and
manipulates data within a database.
Purpose of Data Base Systems
One way to keep the information on a computer is to store it in permanent system
files. To allow users to manipulate the stored information, the system has a number
of application programs that manipulate the organized files. These application
programs are written by system programmers in response to the needs of the
organizations. New application programs are added to the system as the need
arises. Thus, as the time goes more files and more application programs are added
78
to the system. A typical file processing system described above is the system used
to store information before the advent of DBMS.
Keeping the information of an organization in a file processing system has a
number of disadvantages, namely
• Data Redundancy and Inconsistency: Since the files and application
programs are created by different programmers over a long period, the various files
are likely to have different formats and the programs may be written in several
programming languages. Moreover, the same information may be duplicated in
several places. This redundancy leads to higher storage and access cost. In
addition, it may lead to data inconsistency.
• Difficulty in Accessing Data: The file processing system does not allow
needed data to be retrieved in a convenient and efficient manner.
• Data Isolation: In a file processing system, as the data are scattered in
various files, and files may be in different formats. It is very difficult to write new
application programs to retrieve the appropriate data.
• Integrity problems: The data values stored in the database must satisfy
certain types of consistency Constraints (Conditions). For example, the minimum
balance in a bank account may never fall below an amount of Rs. 500. Developers
enforce these constraints in the system by adding appropriate code in the
application programs. However, when new constraints are added, it is difficult to
change the application programs to enforce them.
• Security problems: Not every user of the database system should be able to
access all the data. In the file processing systems, as the application programs are
added to the system in an adhoc manner, it is difficult to enforce security.
The above disadvantages can be overcome by use of DBMS and it provides the
following advantages.
1. Provides for mass storage of relevant data.
79
2. Make easy access of the data to user.
3. Allows for the modification of data in a consistent manner.
4. Allows multiple users to be active at a time
5. Eliminate or reduce the redundant data.
6. Provide prompt response to the users request for data.
7. Supports Backup and recovery of data.
8. Protect data from physical hardware failure and unauthorized access.
9. Constraints can be set to database to maintain data integrity.
Database Languages
A database system provides two different types of Languages, one will specify
the schema, and other will express database queries and updates.
They are:
1. Data-Definition Languages (DDL)
2. Data-Manipulation Language (DML)
1. Data-Definition Languages (DDL): A database scheme is specified by set of
definitions which are expressed by special language called Data Definition
Language (DDL). The result of compilation of DDL statements is a set of tables
that is stored in a special file called ‘Data dictionary’ or “data directory.
A data dictionary is a file that contains metadata, i.e. Data about data. This file is
consulted before actual data are read or modified in the database system
The storage structure and access methods used by the database system are
specified by a set of definitions in a special type of DDL called a ‘data storage and
data definition language’. The result of consultation of these definitions is a set
instruction to specify the implementation details of the database schemas. Which
are usually hidden form the users.
The DDL commands are
80
2. Data-Manipulation Language (DML): A DML is language which enables
users to access or manipulate data as organized by appropriate data model. The
goal is to provide efficient human interaction with the system.
The DML allows following
(a) The retrieval information from the database
A DML is language which enables users to access or manipulate data. There are
basically two types.
• Procedural DML: This requires a user to specify what data are needed and
how to get those data from existing database.
• Non-procedural DML: Which require a user to specify what data are
needed ‘without’ specifying how to get those data.
Nonprocedural DMLs are usually easier to learn and use than procedural DMLs.
A user does not have to specify how to the data, these languages may generate
code that is not as that produced by Procedural DML. Hence, we can make
remedy this difficulty by various optimization techniques.
A Query is a statement, a request for retrieval information. The portion of a
DML, that involves information retrieval is called a ‘Query Language’.
81
A Database Manager is a program module which provides the interface between
the low level data stored in the database and the application program and queries
submitted to the system.
Responsibilities of Database Manager
1. Interaction with File Manager : The row data is stored on the disk using
the file system which is usually provided by conventional operating system.
2. Integrity Enforcement : The data values stored in the database must satisfy
certain types of consistency constraints.
3. Security Enforcement : Not every user of the database needs to have access
to the entire content of the database.
4. Backup and Recovery : It is the responsibility of database manager to
detect such failures and restore the database to a state that existed prior the
occurrence of the failure this is usually accomplished through the backup and
recovery processor.
5. Concurrency Control : It is necessary for the system to control the
interaction among the concurrent users, and achieving such control is one of the
responsibilities of database manager.
6. Authorization Control : This module checks that the user has necessary
authorization to carry out the required function.
7. Command Processor : Once the system has checked that the user has
authority to carry out the operation control satisfies all necessary integrity
constraints such as key constraints.
8. Integrity Checker : For an operation that changes the database the integrity
checker checks that the requested operation satisfies all necessary integrity
constraints such as key constraints.
9. Query Optimizer : This module determines on optional strategy for the
query execution.
82
10. Scheduler : This module is responsible for ensuring that concurrent
operations or transactions on the database proceed without conflicting with one
another.
11. Recovery Manager : This module ensures that the database remains in a
consistent state in the presence of failures. It is responsible for transaction commit
and abort that is success or failure of transaction.
12. Buffer Manager : It is responsible for the transfer of data between main
memory and secondary storage such as disk and tape. The recovery manager and
buffer manager are sometimes collectively referred to as data manager. The buffer
manager is sometimes known as cache manager.
13. Query Processor : This is responsible for receiving query language
statements and changing them form the English like syntax of the query language
to from the DBMS can understand. The query language processor usually consists
of two parts i.e. 1. The purser 2. Query Optimizer.
Database Administrator
A person who has central control of both the data and programs over the system is
called data base administrator. Or
Database administrator (DBA) is the person or group, who is responsible for the
supervision and control of the databases, within on organization.
The functions or responsibilities of DBA includes
1. Schema Definition: The DBA creates the original database schema by
writing a set of definitions which are translated by DDL compiler to a set of tables
that is stored permanently in the data dictionary.
2. Storage structure and access Method Definition: A DBA creates
appropriate storage structures and access methods by writing a set of definitions ,
which are translated by the data-storage and DDL compiler.
83
3. Schema Physical Organization and Modification : The DBA allows the
users to accomplish modifications in the database scheme or storage organization
through a set of definitions and make these modifications to be appropriate in the
internal system tables.
4. Granting of Authorization for data access : By granting different types of
authorization, the database administrator can regulate which of the database
various users can access.
5. Routine Maintenance : DBA is the final authority to regulate the daily
activities.
As a whole , the DBA jobs are
• Creating primary database storage structures
• Modifying the structure of the database
• Monitoring database performance and efficiently
• Transferring data between the database and external file
• Monitoring and reestablishing database consistency
• Controlling and monitoring user access to the database
• Manipulating the physical location of the database.
Database Users
The primary goal of any database is to provide its users an environment for
retrieving and storing new information into the database. An important aspect of
the DBA‘s working is that, it has liaison with users at all levels of the
organization. The DBA must be able to communicate effectively with the users
and must be conversant with the technical aspects of the system as well as the
working procedures of the organization.
Depending on the way that the users expect to interact with the database system,
the users are classified in to
84
1. Application Programmers: Application Programmers are computer
professionals interacting with the system through DML calls, embedded in a
program written in a language like high level languages like COBOL, C, etc.
2. Sophisticated users : These users interact with system without writing
programs. They form their request by writing queries in a database query language.
Those are submitted to a query processor that breaks a DML statement down in to
instructions for the database manager’s module.
3. Unsophisticated users : Who interact with the system by using permanent
applications. Ex ATM
4. Specialized users : These users write specialized database applications that
do not fir in to the traditional data processing frame work. These applications
include Computer –aided design (CAD) systems, Knowledge base expert systems
etc.
Chapter Seven
Office Automation
85
The word automation refers to a method of using a wide range of computer- and
machine-aided tasks to help improve productivity and create easier ways to do
business. Different types of automation are commonly used in different types of
industries.
The backbone of office automation is a LAN, which allows users to transfer data,
mail and even voice across the network. All office functions, including
dictation, typing, filing, copying, fax, Telex, microfilm and records
management, telephone and telephone switchboard operations, fall into this
category. Office automation was a popular term in the 1970s and 1980s as the
desktop computer exploded onto the scene.
Advantages are:
Businesses can easily purchase and stock their wares with the aid of technology.
Many of the manual tasks that used to be done by hand can now be done through
86
hand held devices and UPC and SKU coding. In the retail setting, automation also
increases choice. Customers can easily process their payments through automated
credit card machines and no longer have to wait in line for an employee to process
and manually type in the credit card numbers.
Office payrolls have been automated which means no one has to manually cut
checks, and those checks that are cut can be printed through computer programs.
Direct deposit can be automatically set up and this further reduces the manual
process and most employees who participate in direct deposit often find
their paychecks come earlier than if they'd have to wait for their checks to be
written and then cleared by the bank.
87
2. A teleconference or teleseminar is the live exchange and mass articulation
of information among several persons and machines remote from one another
but linked by a telecommunications system. Terms such as audio
conferencing, telephone conferencing and phone conferencing are also
sometimes used to refer to teleconferencing. The telecommunications system
may support the teleconference by providing one or more of the following:
audio, video, and/or data services by one or more means, such
as telephone, computer, telegraph, teletypewriter, radio, and television.
88
4. Fax machine: Fax (short for facsimile), sometimes
called telecopying or telefax (the latter short for telefacsimile), is the
telephonic transmission of scanned printed material (both text and images),
normally to a telephone number connected to a printer or other output device.
The original document is scanned with a fax machine (or a telecopier), which
processes the contents (text or images) as a single fixed graphic image,
converting it into a bitmap, and then transmitting it through the telephone
system in the form of audio-frequency tones. The receiving fax machine
interprets the tones and reconstructs the image, printing a paper copy. Early
systems used direct conversions of image darkness to audio tone in a
continuous or analog manner. Since the 1980s, most machines modulate the
transmitted audio frequencies using a digital representation of the page which
is compressed to quickly transmit areas which are all-white or all-black.
Telecommuting
Telecommuting (also known as working from home, or e-commuting) is a work
arrangement in which the employee works outside the office, often working from
home or a location close to home (including coffee shops, libraries, and various
other venues).
Rather than traveling to the office, the employee “travels” via telecommunication
links, keeping in touch with coworkers and employers via telephone and email.
The worker may occasionally enter the office to attend meetings and touch base
with the employer. However, with many options for distance conferencing, there
may be no need to visit the office.
89
Benefits of Telecommuting
Often, working from home can make you more productive, because you do not
have the distractions of an office space.
Drawbacks of Telecommuting
Some people also find working from home to be a bit isolating, because you are
not around your coworkers.
90
According to http://www.progressiveautomations.com/, office automation is
extremely important because it help facilitate flow of information within an
organization. For instance, through teleconferencing, different individuals from
different departments or branches can communicate easily without travelling long
distances for meetings, as seen in the diagram below.
Office automation plays an important role in reducing the cycle time between
messages preparation and receipt, as individuals can compose message rapidly and
send to them to the recipients instantly. For instance, office automation platforms
such as E-mail permits sending of messages to large numbers of recipients located
in different regions across the globe as seen below.
Office automation systems such as Emails, therefore, are important because they
help improve flow of information within an organization.
91
organizing customer data. Automation platforms spreadsheets help store bulky
customer data; thus help reduce of paper works, as information is compiled once
and stored for future referencing. This help not only help improve volume of work,
but also help make office orderly as shown in the diagram below. Besides,
automation processes enable only a few workers to perform the duties or task of
many. For instance, a single employee can use one machine choose, pack, and
label products for transportation or shipping. This, therefore, help reduce cost of
operation because the organization will not spend more money in hiring more labor
to perform different tasks.
92
Chapter Eight
Decision making is thought process of selecting a logical choice from the available
options. Decision-making is an integral part of modern management. Essentially,
Rational or sound decision making is taken as primary function of management.
Every manager takes hundreds and hundreds of decisions subconsciously or
consciously making it as the key component in the role of a manager. Decisions
play important roles as they determine both organizational and managerial
activities. A decision can be defined as a course of action purposely chosen from a
set of alternatives to achieve organizational or managerial objectives or goals.
Decision making process is continuous and indispensable component of managing
any organization or business activities. Decisions are made to sustain the activities
of all business activities and organizational functioning.
93
Stages of Decision Making
Using a step-by-step decision-making process can help you make more deliberate,
thoughtful decisions by organizing relevant information and defining alternatives.
This approach increases the chances that you will choose the most satisfying
alternative possible.
94
Step 1: Identify the decision
You realize that you need to make a decision. Try to clearly define the nature of
the decision you must make. This first step is very important.
Collect some pertinent information before you make your decision: what
information is needed, the best sources of information, and how to get it. This step
involves both internal and external “work.” Some information is internal: you’ll
seek it through a process of self-assessment. Other information is external: you’ll
find it online, in books, from other people, and from other sources.
As you collect information, you will probably identify several possible paths of
action, or alternatives. You can also use your imagination and additional
information to construct new alternatives. In this step, you will list all possible and
desirable alternatives.
Draw on your information and emotions to imagine what it would be like if you
carried out each of the alternatives to the end. Evaluate whether the need identified
in Step 1 would be met or resolved through the use of each alternative. As you go
through this difficult internal process, you’ll begin to favor certain alternatives:
95
those that seem to have a higher potential for reaching your goal. Finally, place the
alternatives in a priority order, based upon your own value system.
Once you have weighed all the evidence, you are ready to select the alternative that
seems to be best one for you. You may even choose a combination of alternatives.
Your choice in Step 5 may very likely be the same or similar to the alternative you
placed at the top of your list at the end of Step 4.
You’re now ready to take some positive action by beginning to implement the
alternative you chose in Step 5.
In this final step, consider the results of your decision and evaluate whether or not
it has resolved the need you identified in Step 1. If the decision has not met the
identified need, you may want to repeat certain steps of the process to make a new
decision. For example, you might want to gather more detailed or somewhat
different information or explore additional alternatives.
Decision-Making Skills
96
Intuition - This encompasses an aptness to comprehend something instantly,
without the need for analyzing, thinking, or conscious reasoning. When
Amber was robbed at gunpoint, her intuition told her to throw her wallet and
run in the opposite direction.
Foresight - This is the ability to predict consequences of a particular action
or decision. Amber made the decision to study for her test instead of going
out with friends, because she could foresee that if she got a bad grade on her
math test, that it could impact her college admissions.
Critical thinking - This entails the capacity to think and reason clearly and
logically, and comprehend how concepts and ideas relate. It involves the
ability to gather, analyze and evaluate information. Amber used critical
thinking skills when making her college decision. She visited her top choices
and gathered all of the financial and other info she would need to make her
decision. Then she analyzed the information using a chart of pros and cons
for each college.
Emotional intelligence - This is an ability to read others' emotions, which
can aid in decision making involving people and to use emotional
information for making decisions. Arnold was able to notice cues that his
mom was getting irritated that he was taking so long to choose between a hot
dog and a hamburger, so he went ahead and chose a hot dog.
Self-control - This involves an emotional regulation that is useful to control
extreme emotions so that a person can use rationality in making decisions.
Arnold's mom used self-control and anger management techniques, like
taking deep breaths and taking a time out for herself, so that she wouldn't
yell at Arnold to get back in the car without dinner.
97
MINICASES
The following excerpts are from a news article in the Minneapolis Star and
Tribune, August 17, 1983, p. 58.
American Express Co. called off its acquisition of Investors Diversified Services,
Inc. (IDS), Tuesday, saying that $1 billion was too high a price." (IDS have
investment funds such as mutual funds and money market funds. It would therefore
allow American Express to expand its range of services to customers.)
Questions
98
b. What competitive advantages to a financial services company may be
provided by an information system?
Other system features aid management in the planning and control of their
restaurant business. The system provides up-to-the-minute information' on the food
items ordered and breaks out percentages showing sales of each item versus total
sales. This helps management plan menus according to customers' tastes. The
system also compares the weekly sales totals versus food costs, allowing planning
for tighter cost controls. In addition, whenever an order is voided, the reason for
the void is keyed in. This may help later in management decisions, especially if the
voids are consistently related to food or service.
99
Acceptance of the system by the users is exceptionally high since the waiters and
waitresses were involved in the selection and design process. All potential users
were asked to give their impressions and ideas about the various systems available
before one was chosen.
Based on Ann Dukes, "Side Order of (Computer) Chips Speeds Meals," MIS
Week, June 17, 1981, p.
14.
Questions
b. What information would you require from this system in order to aid
in making such decisions? (In other words, what would make this system
a more complete management information system rather than just doing
transaction processing?)
- customers
100
- waiters
- management
Chapter Nine
Project Management
101
Identify projects in the list of activities below:
1. Building a deck
4. Planning a wedding
5. Planning a fundraiser
102
Gantt Chart: A specific type of chart showing time and tasks. Usually created by a
Project Management program like MS Project.
Stakeholder: Any person or group of people who may be affected by your project
Milestones:
103
“Deck warming” completed 28 Jul
Tasks:
Tasks Subtasks
Draft 1 prepared
Distributed to stakeholders
Amendments made
Distributed to stakeholders
Sign-off obtained
104
WBS
Each task is broken into smaller tasks that can be managed and estimated
o Some tasks must begin at the same time, some must end at the same
time and some cannot start until the other tasks have finished.
105
Gantt chart
Project milestones
A successful Project Manager must simultaneously manage the four basic elements of
a project: resources, time, money, and most importantly, scope.
106
All these elements are interrelated. Each must be managed effectively. All must be
managed together if the project is to be a success. The resource that can be leveraged
to the greatest extent in all projects is the people involved.
initiating,
planning,
executing,
controlling,
monitoring,
Project Managers are essentially jugglers. They must make sure that everything keeps
to task, that potential issues are quickly eliminated and the project is delivered on time,
all the while making sure everyone knows what is happening and the project quality and
budget are acceptable. Specifically, they:
107
2. manage risk – scanning ahead for potential issues and resolving them before
they become a problem
CHARACTERISTICS OF PROJECTS
2. A project is carried out via a set of interdependent tasks. A project uses various
resources to carry out these tasks.
3. A project has a definite start date and an expected completion date. The actual
completion date may not always be the same as the expected date.
108
5. A project has a customer.
1. Scope.
2. cost.
3. Schedule (Time).
PROJECT CONSTRAINTS
• Project scope – Have all the project requirements (i.e., deliverables) been
completed?
• Project cost – Is the cost of the project close to the amount the customer has
agreed to pay?
• Customer satisfaction – Is the customer happy with the quality of the project?
Project Management
109
Project management is a composite activity with multiple dimensions. Depending on the
type and class of project, this management activity can be very complex. In a nutshell,
project management is the discipline of planning, organizing, securing, managing,
leading, and controlling resources to achieve specific goals.
The primary challenge of project management is to achieve all of the project goals and
objectives while honoring the pre-defined constraints. The primary constraints are
scope, time, quality, and budget. The secondary—and more ambitious—challenge is to
optimize the allocation of necessary inputs and integrate them to meet pre-defined
objectives.
In order to be successfully executed, every project or initiative should begin with the end
in mind. This is effectively accomplished by articulating the Vision and Mission of the
project so it is crystal-clear to everyone. Creating a vision and mission for the project
helps clarify the expected outcome or desired state, and how it will be accomplished.
The next step is to establish two to three goals or objectives for the project. Is it being
implemented to increase sales and profit, customer loyalty, employee productivity and
morale, or product/service quality? Also, it's important to specifically quantify the amount
of improvement that is expected, instead of being vague.
110
Simply put, this means establishing who will be part of the project team? What will be
the frequency of meetings? What are the meeting ground rules? Who is the project
owner? Who is designated to take notes, and distribute project meeting minutes and
action steps? This goes along with any other meeting protocol that needs to be clarified.
This is the meat of the project and includes using a gap analysis process to determine
the most suited intervention (solution) to resolve the issue you are working on. There
are many quality management concepts that can be applied ranging from a
comprehensive "root cause analysis" to simply "asking why five times." Once the best
possible intervention has been identified to resolve the issue, then we must map out our
execution strategy for implementing the intervention. This includes identifying who will
do what, when, how, and why?
To ensure the success and sustainability of the new initiative or process brought on by
this project, everyone it will directly impact must be onboard. To achieve organisational
alignment (or buy-in), ongoing communication must be employed in-person during team
meetings, electronically via email and e-learning (if applicable), and through training.
The message must include the WIIFM "what's in it for me" at every level; otherwise
most stakeholders will not be interested or engaged around the new initiative.
And last, how will we determine success? Well, a simple project scorecard that is
visually interesting is a great way to keep everyone updated and engaged. A scorecard
is an excellent resource for holding employees, teams, and leaders accountable for the
implementation, refinement, and sustainability of the new initiative or project.
Accountability means that consistently, top performers will be rewarded and recognised;
111
while those needing improvement will be coached with specific expectations and
consequences clearly outlined.
112
Review Questions
4. A project is _________.
9. ___________ ____________ work with the project sponsors, the project team, and
the other people involved in a project to meet project goals.
10.Every project is constrained in different ways by its scope, time, and cost goals and
are known as the ________ ________.
113
13.Good project managers do not assume that their definition of ________ is the same
as the sponsors'.
14.A _________ is "a group of related projects managed in a coordinated way to obtain
benefits and control not available from managing them individually."
15.A _______ ________ provides leadership and direction for the project managers
heading the projects within a program.
16.A _____ _____ is "an optimal way recognized by industry to achieve a stated goal
or objective."
17.Project managers often take on the role of both leader and ______.
18.A _______ _______ is a standard format for displaying project schedule information
by listening project activities and their corresponding start and finish dates in a calendar
format.
19._______ _______ is the longest path through a network diagram that determines
the earliest completion of a project.
A. 10%
B.25%
C.50%
114
D.75%
A.Program
B.Process
C.Project
D.Portfolio
115
D. Projects involve little uncertainty
25. Which of the following is not a part of the triple constraint of project management?
A.Project management
B. Program management
D.Requirements management
A. Strategic, tactical
B.Tactical, strategic
C.Internal, external
116
D. External, internal
28. Several application development projects done for the same functional group might
best be managed as part of a ________.
A. Portfolio
B. Program
C. Investment
D. Collaborative
29. Which of the following is not one of the top ten skills or compentencies of an
effective project manager?
A.People skills
B. Leadership
C. Integrity
D. Technical skills
30. What is the certification program called that the Project Management Institute
provides?
117
B.Project Management Professional (PMP)
31. _______ _______ describes this holistic view of carrying out projects within the
context of the organization.
34. A _________ organizational structure is the hierarchy most people think of when
picturing an organizational chart.
35. A __________ organizational structure also has a hierarchical structure, but instead
of functional managers or vice presidents reporting to the CEO, program managers
report to the CEO.
36. A ______ organizational structure represents the middle ground between functional
and project structures.
37. _________ culture is a set of shared assumptions, values, and behaviors that
characterize the functioning of an organization.
Discuss 38.
Some projects have a senior manager called a _______ who acts as a key proponent
for a project.
118
39. IT _________ addresses the authority and control for key IT activities in
organizations, including IT infrastructure, IT use, and project management.
41. The term _______ _______ ________ has become popular to describe new
approaches that focus on colse collaboration between programming teams and
business experts.
42. Which of the following is not part of the three-sphere model for systems
management?
A. Business
B.Information
C.Technology
D.Organization
43.Which of the four frames of organizations addresses how meetings are run,
employee dress codes, and expected work hours?
A. Structural
B.Human resources
C. Political
119
D. Symbolic
A. Functional
B. Project
C. Matrix
D. Hybrid
45. Project work is most successful in an organizational culture where all of the
following characteristics are high except ______.
A. Member identity
B. Group emphasis
C. Risk tolerance
D. Control
A. Deliverable
B.Product
120
C Work package
D.Tangible goal
47. Which of the following is not a phase of the traditional project life cycle?
Discuss
A. Systems analysis
B.Concept
C. Development
D.Implementation
48.What is the term used to describe a framework of the phases involved in developing
information systems?
D. Extreme programming
A.Review
B. Stage
121
C. Meeting
D.Kill
50.The nature of information technology projects is different from projects in many other
industries because they are very ______.
A.Expensive
B.Technical
C.Diverse
D. Challenging
51.What term is used to describe when an organization acquires goods and/or sources
from an outside source in another country?
A. Globalization
B.Offshoring
C. Exporting
D. Global sourcing
122