EIS SM Booster Antim Prahar Charts 2022 23
EIS SM Booster Antim Prahar Charts 2022 23
EIS SM Booster Antim Prahar Charts 2022 23
com
EIS-SM
BOOSTER
CA INTERMEDIATE
May/November – 2022 Attempt
New Edition
www.eissmpendrive.in
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com
Preface
As an author, I am sensitive to your learning as well as examination needs. I believe that a quick and
super revision coupled with citation of the right content with right answers to questions and their
presentation in the examination is an effective tool that determines the success of a student.
For this very reason, I have taken your point of view into consideration. In writing each chapter, I have
taken every care to make the content informative as well as easy and interesting to read, write and
present in examination.
The aim of EIS-SM Booster: अंतिम-प्रहार is to help CA Intermediate (New Course) students by quickly
revising, clearly explaining, analyzing, and evaluating important EIS-SM concepts.
My approach in writing this book was essentially twofold: to write an accessible Chart-Book that students
feel comfortable with but without compromising on the academic rigour.
The examples and visuals herein, have been taken from contemporary world, ICAI literatures and leading
brands around us. These help to bridge the gap between theory to practice; aiming not only at a
comprehensive learning experience but also offering an interesting reading.
To supplement this, I have tried to adopt a user-friendly writing style that gives clear and concise
explanations to help students engage readily with the content and grasp complex strategic concepts easily.
I would be happy to get your feedback, comments and queries. You can get in touch with me at
omtrivedi@ymail.com or call me at 9958300572 (between 8 pm – 10 pm).
“Live as if you were to die tomorrow. Learn as if you were to live forever.”
― Mahatma Gandhi
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com
Synopsis
▪ Over 11 years of teaching experience in various CA, CS, CMA and MBA courses.
▪ Guided more than 45,000 CA, CS, and CMA students through Face to Face Classes and more
than 10,000 students through LIVE Virtual & Online Classes.
▪ Taken batches at NIRC and WIRC of ICAI, LVC of the BOS of ICAI, ETEN CA, Unacademy, IGP Institute,
Prime Academy, Rajesh Makkar Classes & Om Trivedi Classes Delhi.
▪ His student scored “Highest - 87 Marks” in this subject and more than 890 students scored
exemptions and more than 1200+ students scored 50+ marks.
▪ Done researches and projects in areas like competition studies, value creation, and competitive advantages,
MIS, and Process Improvement Techniques.
▪ Over 17 years of industry experience in Publishing, Content Development and Editing, Instructional
Design, Instructor’s Resource Development, Acquisitions of Businesses, Authors and Imprints, Sales and
Marketing, Publishing solution, and operations. Partner with LexisNexis India (A Reed Elsevier Company).
▪ Worked with Thomson Learning as Regional Head (East India, Nepal, Bangladesh, and Bhutan), with Tata
McGraw-Hills as Acquisition Editor (North, East, and West India), with Macmillan as Commissioning
Editor and with Firewall Media as Business Development Manager.
▪ Worked as a Consultant business head- HEP of Trinity Press (Formerly Macmillan India’s Higher
Education Programme) in 2013-14 and played an instrumental role in the acquisition of Macmillan India’s
Higher Education Programme by LPPL under the brand name Trinity Press.
▪ Worked as a consultant and business advisor on book publishing, content development, instructional design,
case study development, instructor’s resources, and copyright matters to several companies like Macmillan,
LexisNexis India, Vikas Publishing, Excel Books, Firewall Media, Biztantra and Taxmann.
E I S Hotne s s G ri d
(Based on Examination Pap ers Trend A nalysis)
12 11
10 9
0
Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5
16
14 14 13
14 13 13 12
12 12 12
12 10 10
10 10 10 9 9
10
8 8
7 8 7
8
6 6
4 4
2 2
0
0 0
Nov-18
Nov-19
Nov-20
Nov-21
Jan-21
Weightage
May-18
May-19
May-21
Nov-18
Nov-19
Nov-20
Nov-21
Jan-21
Weightage
May-18
May-19
May-21
Overall
Overall
8 6
6 4
4 2
2
0
0
Nov-18
Nov-19
Nov-20
Nov-21
Jan-21
Weightage
May-18
May-19
May-21
Overall
Nov-18
Nov-19
Nov-20
Nov-21
Jan-21
Weightage
May-18
May-19
May-21
Overall
0
Jan-21
Weightage
Nov-18
Nov-19
Nov-20
Nov-21
May-18
May-19
May-21
Overall
Enterprise System
“Life has got all those twists and turns. You’ve got to hold on tight and off you go.”
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com 2
EIS-SM BOOSTER
Business Process
➢ Business process is a set of steps of the co-ordinated and standardized
activities that you and the personnel providing services perform to
complete the transaction.
"To live a creative life, we must lose our fear of being wrong."
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com 3
EIS-SM BOOSTER
"If you are not willing to risk the usual you will have to settle for the ordinary."
DFD
Data flow diagram is a graphic representation of the flow of data through an information system.
Types of DFDs: 1. Logical DFD 2. Physical DFD
Logical DFD
A logical DFD focuses on the
business and how the business
operates.
Physical DFD
A physical DFD shows how the
system will be implemented.
Flowcharts
• Flowchart is a graphic representation of an algorithm.
• Flowcharts play a vital role in the programming of a problem and are quite helpful in understanding
the logic of complicated and lengthy problems.
BPMN
• Business Process Modelling Notation is a flow-chart based notation for defining business
processes. It is an extension of the traditional flowcharting mechanism.
• In BPMN, who performs each step and what is performed in each step is properly clarified and
Which department completes which one of the activities is also clarified.
Disadvantages of Flowcharts
The Memory’s Eye
i. Link between conditions and actions Link CARS
ii. Complex Logic
iii. Alterations and Modifications
iv. Reproduction
v. Standardization
"All our dreams can come true if we have the courage to pursue them."
RISK
• Effect of uncertainty on objectives.
• Uncertainty may be positive, negative or a deviation from the expected.
"If you do what you always did, you will get what you always got."
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com 6
EIS-SM BOOSTER
Vulnerability Attack
Inherent weakness in the system safeguards that • An attempt to gain unauthorized access to the
exposes the system to threats. system’s services or to compromise the system’s
Example: dependability.
• Poor access control method • Bug in Programs • Set of actions designed to compromise CIAT
• Leaving the front door • Inexperienced User (Confidentiality, Integrity, Availability &
unlocked • Bad Protocols Timeliness)
• Short passwords-easy to • Timing Window Likelihood
guess
Threat The estimation of the probability that the threat will
Any entity, circumstance, or event with the potential to succeed in achieving an undesirable event.
harm the software system or component through its
Counter Measures
unauthorized access, destruction, modification, and/or
denial of service. An action, device, procedure, technique or other
Types: • Internal • Structured measure that reduces the vulnerability of a component
• External • Unstructured or system is referred as Counter Measure.
Exposure Risk Management Strategies
The extent of loss the enterprise has to face when a ✓ Transfer/Share the risk
risk materializes. ✓ Tolerate/Accept the risk
Example: • Loss of reputation, ✓ Treat/Mitigate the risk The Memory’s Eye
• violation of privacy ✓ Terminate/Eliminate the SAME
• Loss of resources risk
Components of ERM
The Memory’s Eye
ROI related CRIME
ISO-31000
ERM system is based on the Establishes the entity’s risk culture Internal Environment
principle of the PDCA cycle
(Plan-Do- Check-Act). Sets the Enterprise Risk Objectives Objectives Setting
Sarbanes Oxley Act Identifies events that effect entity’s objectives Event Identification
Regulation passed by the US
Assesses risks based on likelihood and impact Risk Assessment
Congress in 2002 as a reaction
to different financial
Evaluates possible responses to risks Risk Response
scandals.
COSO I & II Establishes policies, procedures and controls Control Activities
COSO is the combination of Enables information exchange Information and Communication
tasks and components of an
internal control system. Evaluates effectiveness of the ERM Program Monitoring
Controls
Policies, procedures, practices and organization structure, Designed to provide reasonable assurance
that business objectives are achieved and Undesired events are prevented or detected and
corrected.
"Just when the caterpillar thought the world was ending, he turned into a butterfly."
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com 8
EIS-SM BOOSTER
Internal External
Procure to Pay/P2P Risks and Controls Inventory Cycle: Risks and Controls
Stages: Stages:
• User Department • Vendor • Ordering • Finished Goods
• Procurement Department • Stores • Production • Delivery
• A/c Payable Transactions:
• Raw Material Received • Quality Check
Transactions: • Vendor Invoice
from Procurement • Approved Customer
• Purchase Requisition • Purchase Returns
Department (PO) Orders
(PR) • Credit Notes
• Inventory Price and • Shipments to
• Quotation • Material Issue Note
Quantity Customers
• Purchase Order (PO) • A/c Payable
• Defective Raw Material • Shipment Cost
• Goods Receipt Note • Disbursements
• Direct and Indirect • Cost of Sales
(GRN) • System Access
Expenses • FG Returned by
Master: • Finished Goods Customers
• Supplier/Vendor Master • System Access Inventory • System Access
Order to Cash (O2C) – Risks and Controls Master:
Stages: • Inventory Management Master • System Access
• Sales and Marketing • Manufacturing Human Resources – Risks and Controls
• Order Fulfilment • Receivables
Stages:
Transactions: • Recruiting and on boarding • Career Development
• Orders • Shipping • Orientation and Career • Termination or
• Credit Limit • Sales Return Planning Transition
• Recording of Orders • Credit Note Configuration:
• Discounts • Cash Discount • Rule based system Access
• Cancellation of Orders • Accounts Receivable • Role based system Access
• Pick and Release • System Access
• Invoicing Master: (Payroll Master)
Master: • Employees • Terminated Employees
• Customer Master • System Access • New Employees
"I have not failed. I've just found 10,000 ways that won't work."
Non-Master Data
➢ Non-permanent data, Expected to change frequently.
➢ Amounts recorded in each transaction shall be different every time and expected to change again and again.
➢ Date recorded in each transaction is expected to change again and again and will not be constant in all the
transactions.
Voucher Ledger
Voucher is a documentary evidence of a transaction. Types of Voucher:
1. Ledger having Debit Balance
1. Accounting Voucher Sales, Purchase, Payment, Receipt, Contra, Journal,
Credit Note, Debit Note; etc. 2. Ledger having Credit Balance
2. Inventory Voucher PO, SO, Stock Journal, Physical Stock, Delivery Note,
Receipt Note; etc.
3. Payroll Voucher Attendance, Payroll; etc.
Application Software
➢ Installed Application Installed on the hard disc of the user’s computer.
Example: Electronic spreadsheets, MS Excel, MS Word, Internet Explorer,
Mozilla Firefox, Google Chrome, Safari, Windows Media Player, iTunes,
Solitaire, etc. The Memory’s Eye
➢ Web Application Installed on a web server, accessed by using a browser Basis of Web vs. Installed Application
and internet connection. Define Installation MAP of DFD
Example: Google Docs, Web versions of Visual Studio or Open Office, with Example
webmail, online retail sales, online auctions, wikis, instant messaging
services; etc. • Definition • Performance
➢ Cloud Application A Hybrid application. A software program where cloud- • Installation • Data Storage
based and local components work together. • Mobile Application • Flexibility
Example: LinkedIn, Boomerang, Zomato, Salesforce, Dropbox, NetSuite, • Accessibility • Data Security
and Zoho.com. etc. • Example
"No one can make you feel inferior without your consent."
Accessibility As software is installed on the hard disc of the user’s As software is available through online access, to
computer, user needs to go the computer only, i.e., use the software a browser and an internet
the computer where software is installed, to use the connection is needed. It can be used from any
software. It cannot be used from any computer. computer in the world. Access to the software
becomes very easy. Also, it can be used 24 x 7.
Mobile Using the software through mobile application is Mobile application becomes very easy as data is
Application difficult in this case. available 24x7. As technology evolves mobile
technology is becoming an industry norm. That makes
cloud-based application future oriented.
Data Storage Data is physically stored in the premises of the Data is not stored in the user’s server computer. It is
user, i.e., on the hard disc of the user’s server stored on a web server. Ownership of data is
computer. Hence, user will have full control over defined in Service Level Agreement (SLA). SLA
the data. defines the rights, responsibilities and authority of
both service provider and service user.
Data Security As the data is in physical control of the user, user Data security is a challenge in case of cloud-based
shall have the full physical control over the data, and application as the data is not in control of the user or
he/she can ensure that it is not accessed without owner of data. As time evolves; SLAs provides for
proper access. details of back-up, disaster recovery alternatives
being used by service provider.
Performance A well written installed application shall always be Access is dependent on speed of internet. Slow
faster than web or cloud application, reason being internet slows access to information and may slow
data is picked from local server without internet. operations.
Flexibility It shall have more flexibility and controls as The success of cloud-based applications is that they
compared to cloud application. It is very easy to allow flexibility against both capital expenditure
write desktop applications that take advantage of the (CAPEX) and Operating Expense (OPEX) to the
user’s hardware (such as: scanners, cameras, Wi-Fi, user. User can scale up operations as per need.
serial ports, network ports, etc.). Installed
applications have this disadvantage of higher
capital expenditure (CAPEX) in comparison to
cloud-based application.
Advantages of ERP
Change Change will occur in the employee’s job profile. Proper training of the users with well documented
Management Changing the scope of the project. manuals during transition from old system to ERP.
Training Since the greater part of the raining takes place Training is a project-managed activity and shall be
towards the end of the ERP implementation cycle, imparted to the users in an organization by the
management may curtail the training due to skilled consultants and representatives of the
increase in the overall cost budget. hardware and package vendors.
Consultants These are experts in the implementation of the ERP The consultants should be assigned a liaison officer
package and might not be familiar with the internal - a senior manager - who can familiarize them with
workings and organizational culture. the company and its working.
Staff Employee turnover – qualified and skilled This can be controlled and minimized by allocation
Turnover personnel leaving the company – during the of employees to tasks matching their skill-set;
implementation and transition phases can affect fixing of compensation package and other
the schedules and result in delayed implementation benefits accordingly- thus keeping the employees
and cost overrun. happy and content and minimizing the staff turnover.
Business Process BPR means not just change – but dramatic change New organizational structures, management
Reengineering and dramatic improvements. systems, job descriptions, performance
(BPR) measurements, skill development, training, etc.
Enhancement and ERP Systems are not upgraded and kept up- Care must be taken while selecting the vendor
Upgrades to date. and upgrade/support contracts should be signed.
Application Portfolio Focus on the selection of new business Reduce duplication and complexity of applications
Management applications and the projects. in the current portfolio
Technological Advent of more efficient technologies. Technology, architecture of the product, ease of
Obsolescence enhancements, upgrading, quality of vendor support.
Lengthy ERP projects are lengthy that takes anywhere between Care must be taken to keep the momentum high,
implementation 1 to 4 years. The business and technological and enthusiasm live amongst the employees.
Time environment during the start and completion of the
project will never be the same. The Memory’s Eye
Employee turnover is another problem. SLIDE for Data Access
Insufficient Lack of funds may stop the Implementation mid-way. It is necessary to allocate necessary funds.
Funding
Data Safety If this data is lost, business may come to stand still. Back up arrangement needs to be very strong.
Speed of As data is maintained centrally, gradually the data size This can be controlled by removing redundant
Operation becomes more and more and it may reduce the speed data, using techniques like data warehousing
[Efficiency] of operation. and updating hardware on a continuous basis.
Data Access Data is stored centrally, and all the departments access Access rights need to be defined very carefully
the central data. This creates a possibility of access to and to be given on “Need to know” and “Need
non-relevant data. to do” basis only.
Definition • A control to safeguard software systems, procedures are developed and implemented for protecting
them from unauthorized modification, disclosure or destruction.
Functions • Identity Management • Authorization The Memory’s Eye
• Authentication • Accountability
IAAA
Approaches 1. Role Based Access Control (RBAC) 2. Rule Based Access Control (RAC)
• Mandatory Access Control (MAC)
• Discretionary Access Control (DAC).
3. Sales and • Setting up Organization Structure • Setting up Sales Document Types Integration Point:
Distribution • Assigning Organizational Units • Setting up Customer Master Data FA+CO+MM+PP+
Module • Defining Pricing Components Records and Configuration SCM
• Procurement • Customer
10. SCM Module The Memory’s Eye
• Operations • Consumer POD to Customer
• Distribution
Data Analytics
• The process of examining data sets to draw conclusions about the information they contain with the aid of
specialized systems and software.
Quantitative Data Analysis (QDA): It involves analysis of numerical data with quantifiable variables that can be compared
or measured statistically.
Qualitative Data Analysis (QDA): It is more interpretive- it focuses on understanding the content of non-numerical data like
text, images, audio and video, including common phrases, themes and points of view.
Tagging Users
• Accountants
• Period • Units of Measure • AS/IND-AS • Companies • Regulators • Data providers
• Currency • Meaningful Terms • Laws • Analysts • Governments • Investors
Join Us"Noon
masterpiece
Telegram was ever created by a lazy artist."
http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com
Chapter 3 Unit 1 Information System Components
HARDWARE
Used to provide data & instructions to computer. E.g., keyboard, mouse Used to provide required output from computer. E.g., Printer, VDU
Keyboard Mouse Track Ball Light Pen Joy-Stick Voice Input Devices
SCANNER
MICR OCR OMR Image Scanner Bar Code Reader Smart Card Reader
PROCESSING DEVICES
MEMORY UNIT
Memory Unit Read Only Memory Random Access Memory
(ROM) (RAM)
Primary Secondary Virtual • It is only readable memory. • RAM is temporary and is
Memory Memory Memory
• The data written on it cannot erased when computer is
be modified. switched off.
RAM ROM CMOS • The instructions required • RAM is read/write type of
Internal External
Memory Memory during booting of a system are memory, and thus, can be
retrieved from ROM. written by user.
Virtual Memory
• VM is not a separate device; but an imaginary memory area
• Supported by operating systems in conjunction with the hardware.
• If a computer lacks RAM, needs to run a program or operation, Windows uses virtual memory to compensate.
• Virtual memory combines computer’s RAM with temporary space on the hard disk.
• When RAM runs low, virtual memory moves data from RAM to a space called a paging file.
• Moving data to and from the paging file frees up RAM to complete its work.
• Virtual memory is an allocation of hard disk space to help RAM.
Software
System Software Application Software
• A computer software designed to operate the • Application software has been created to perform a
computer hardware and to provide and maintain a specific task for a user.
platform for running any application software.
"Nothing in the world is more common than unsuccessful people with talent."
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com 19
EIS-SM BOOSTER
Data
Mining
Auditing in IT Environment
Audit in IT Manual Tools and Importance of IT Risk of IT in
Environment Audit Techniques of in CIS Audit
Audit in CIS CIS Audit
Environment
• Computerized Env. • Manual Env. Approaches: • Processes Large • Unauthorized
• IT enabled • Manual compilation • Black Box Volume of Data Access
compilation process process of BOA • White Box • Security is • False Sense of
of BOA and Docs. and Docs. CAAT: improved Security
• Automated • Manual Processes • BI Tools • SAS • Monitoring the • Privilege
Processes • Manual Reporting • ACL • SPSS Performance Violations
• (BPMS/ERP/TPS/CB • Auditors don’t • IDEA • Lindo • Analysis is • Process becomes
S/Tally, etc.) require Concurrent Audit enhanced (DA) wrong
• Automated IT/IS/BPMS and Tools: • Reduced Risk • Malware
Reporting CAAT Knowledge. • Snapshots and better • Manual
• Auditors require • ITF Controls Intervention
IT/IS/BPMS • SCARF
• Timeliness and
Knowledge. • CIS
CIAT
• Tools: CAAT • Audit Hooks.
Objectives of Controls
Causes of the Exposure to Potential Loss Critical controls lacking in a CIS Environment
Technical Exposure
Data Diddling Change of data before or after they entered the system.
Christmas Card Trojan that was detected on internal E-mail of IBM system.
Worms A program that copies itself to another machine on network. Ex.: Existential Worm, Alarm clock Worm etc.
Bomb A piece of bad code deliberately planted by an insider or supplier of a program. Logical time based bomb.
Trap Doors Allow insertion of specific logic, such as program interrupts that permit insertion of unauthorized logic.
Rounding Down Rounding of small fractions of a denomination and transferring them into an authorized account.
Salami Techniques This involves slicing of small amounts of money from a computerized transaction or account.
Asynchronous Attack
• They occur in many environments where data can be moved asynchronously across telecommunication lines.
• Data that is waiting to be transmitted are liable to unauthorized access called Asynchronous Attack.
• These attacks are hard to detect because they are usually very small pin like insertions.
Data Leakage Subversive Attacks Wire-tapping Piggybacking
This involves leaking These can provide This involves This is the act of following an authorized person
information out of intruders with important spying on through a secured door or electronically
the computer by information about messages information attaching to an authorized telecommunication
means of dumping being transmitted and the Being link that intercepts and alters transmissions.
files to paper or intruder may attempt to transmitted over This involves intercepting communication
stealing computer violate the integrity of some Communication between the operating system and the user and
reports and tape. components in the sub-system. network. modifying them or substituting new.
User Access Management User Responsibilities Application & Monitoring System Access Control
• Privilege management • Password Use The Memory’s Eye
• Monitor System Use
• User Password Management • Unattended user • Information Access
• User’s Access Review Equipment Restriction MICES
• User Registration
• Clock Synchronization
The Memory’s Eye • Event Logging
User’s Privilege @ PAR • Sensitive System isolation
Managerial Controls
Application Controls
Boundary Control
❖ Access Controls ❖ Cryptographic Controls The Memory’s Eye
❖ PIN
❖ Biometric Devices ❖ Digital Signature ❖ Plastic Card ABCD is PIN of Card
Input Control
❖ Source Document Control ❖ Batch Controls The Memory’s Eye
❖ Data Coding Controls ❖ Validation Controls Valid batch and Source Data Code
Database Control
❖ Application Software Controls
❖ Access Control ❖ Concurrency Controls
❖ Integrity Control ❖ File Handling Controls
Audit Trail
Concurrent Audit
Real-time auditing to provide continuous 1. Snapshot Tools
assurance about the quality of the data that is 2. ITF – Integrated Test Facility
continuous auditing, through: 3. SCARF – System Control Audit Review File
1. Embedded Modules 4. CIS – Continuous and Intermittent Simulation
2. Special Audit Records 5. Audit Hooks
ITF
SCARF
Transaction File Input Master File
Update Reports Output Master File SCARF Reporting System Audit Reports
CIS
“Failure is so important. We speak about success all the time. It is the ability to resist
failure or use failure that often leads to greater success. I've met people who don't
want to try for fear of failing.”
- J.K. Rowling
"The only place where success comes before work is in the dictionary."
Benefits of E-Business
Benefits to Users Benefits to Sellers/Vendors
✓ Convenience The Memory’s Eye ✓ Customer Base
The Memory’s Eye
✓ Reviews ✓ Reduced Cost
CR TO CA CREDIT of Payment
✓ Time Saving ✓ Efficiency
✓ Options to New Market
✓ Dynamic Markets
✓ Coupons and Delas
✓ Instant Transactions
✓ Anytime Access
✓ Less Time Delay
Benefits to Government ✓ Payment Made Easy
✓ Reduction in Corruption ✓ New Market Development and Entry
✓ Green Computing
Disadvantages of E-Commerce
"It's not what you look at that matters, it's what you see."
Payment Gateway
✓ Payment gateway is fundamentally a service
used to process credit card transactions
when orders are accepted online from clients.
✓ It is a physical POS (Point-of-sale) terminal,
which is set in every retail outlet these days.
✓ Payment gateways use a special code for
acquiring sensitive information like credit
card numbers, so that information passes
securely.
"The road to success and the road to failure are almost exactly the same."
Trends in E-Commerce
Content
Predictive
Biometric
Analysis
The Memory’s Eye
CBS MAP
Artificial Social
Intelligence Commerce
Mobile
Communication
"Success is liking yourself, liking what you do, and liking how you do it."
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com
Chapter 4 Unit 2 Emerging Computing Technologies
Virtualization
✓ Virtualization means to create a virtual version of a
device or resource, such as a server, storage
device, network or even an operating system.
✓ The core concept of Virtualization lies in
Partitioning, which divides a single physical
server into multiple logical servers.
✓ Once the physical server is divided, each logical
server can run an operating system and
applications independently.
Benefits of Virtualization
✓ Less Power Consumption
✓ Cost Effective
✓ Efficiency
✓ Interoperability
✓ Resources Pooling
✓ Resources Balancing
✓ Resources Optimization
✓ Back-up & Recovery
✓ BCP and DRP
✓ Minimized Risk
✓ Maximization of Controls
✓ Better Security
✓ Value Creation
✓ Competitive Advantages
"A real entrepreneur is somebody who has no safety net underneath them."
CLOUD COMPUTING
➢ Cloud computing refers to the delivery of computing resources
over the Internet.
➢ Cloud services allow individuals and businesses to use software
and hardware that are managed by third parties at remote
locations.
➢ The third party is called CSP-Cloud Services Provider.
Characteristics of IaaS
Web access
to resources
Metered Centralized
Services Management
Cloud Service
Controlled by Organization Community CSP and User, Both
Provider
"Don't let the fear of losing be greater than the excitement of winning."
"You must expect great things of yourself before you can do them."
Applications of Grid
✓ Civil Engineering Research
✓ Large scale Science and Engineering Researches
✓ Shake-table Experiments
✓ Data mining by Insurance Companies and
Hospitals
✓ To support e-business workloads
Resources of Grid
1. Special Devices, Equipment, Policies
2. Communication
3. Software and Licence
4. Computation The Memory’s Eye
5. Storage Spl. Com. Sw. for CS
Benefits of Grid
1. Parallel Computing
2. Resource Pooling
3. Virtualization
The Memory’s Eye
4. Security of
Parallel Res. VS. Rel.
Data Resources & Mgt. of Addll. Res.
1. Reliability
2. Management
3. Additional Resource Access
4. Resource balancing
Security over Grid ❖ Support for secure group comm. ❖ Data Management
❖ Interoperability with local security solutions ❖ Support for multiple implementations ❖ Standardization
❖ Single Sign-on ❖ Resources Mgt. The Memory’s Eye
❖ Protection of Credentials ❖ Exportability ISP’s Support for REDS
GREEN COMPUTING
✓ Green Computing refers to the study and practice of environmentally sustainable
computing.
✓ The study and practice of designing, manufacturing, using, and disposing of
computers, servers, and associated subsystems—such as monitors, printers,
storage devices, networking and communications systems—efficiently and effectively
with minimal or no impact on the environment.
Advantages Disadvantages
✓ Promote the recyclability or biodegradability. 1. Conserve Energy The Memory’s Eye
✓ Reduce the use of hazardous materials. 2. Reduce Paper Consumption
3. Recycle
CRP
✓ Implement energy-efficient CPU, servers and
peripherals. 4. Develop a Sustainable Green Computing Plan
✓ Maximize energy efficiency. 5. Make Environmentally Purchasing Decisions
BYOD
✓ BOYD is a business policy that allows employees to use their preferred
computing devices, like smart phones and laptops for business purposes.
✓ BYOD policy has rendered the workspaces flexible, empowering employees to
be mobile and giving them the right to work beyond their required hours.
"Motivation is what gets you started. Habit is what keeps you going."
Web 3.0/4.0
✓ Web 3.0 is an advancement over Web 2.0.
Web 3.0 is an extension of the World Wide
Web.
✓ It can be linked to an artificial intelligence
assistant that understands its user and
personalizes everything.
Components of Web 3.0
1. Semantic Web
2. Web Services
Web 4.0 or “Intelligent Web”
✓ Proposed to be autonomous, proactive, content-
exploring, self-learning, collaborative, and
content-generating agents
✓ Based on fully matured semantic and reasoning technologies as well as Artificial Intelligence. These services will
support adaptive content presentation and use the Web database via an intelligent agent.
Example: Services interacting with sensors and implants, natural-language services or virtual reality services.
Artificial Intelligence
✓ Artificial intelligence (AI) is a field of science and technology based on disciplines such
as computer science, biology, psychology, linguistics, mathematics, and
engineering.
✓ Artificial Intelligence (AI) The effort to develop computer-based systems that can behave
like humans, with the ability to learn languages, accomplish physical tasks, use a
perceptual apparatus, and emulate human expertise and decision making.
"People rarely succeed unless they have fun in what they are doing."
Machine Learning
Definition Applications Risk
Machine Learning is a 1. Autonomous vehicles (Ex.: drones and 1. AI relies heavily on the data it
type of Artificial self-driving cars). gets. Incorrect data can lead to
Intelligence (AI). Machine 2. Medical diagnosis, in cancer research. incorrect conclusions.
learning focuses on the 3. Predicting the chances of an individual 2. AI (robots) carries a security
development of computer getting ill by a disease. threat.
programs that can change 3. AI, in the long term may kill
4. Playing games (Chess or Go), and
when exposed to new human skills of thinking the
predicting the outcomes.
data. The process of unthinkable.
machine learning is 5. Search engines (Google search).
similar to that of data 6. Online assistants (Siri).
mining.
Blockchain
✓ Blockchain, also referred as Distributed Ledger Technology (DLT) is
✓ a shared,
✓ peer-to-peer, and
✓ decentralized
✓ open ledger of transactions system with no trusted third parties in between.
✓ This ledger database has every entry as permanent as it is an append-only database which cannot be changed.
✓ All transactions are fully irreversible with any change in the transaction being recorded as new transaction.
✓ The decentralised network refers to the network which is not controlled by any bank, corporation, or
government.
✓ A blockchain generally uses a chain of blocks, with each block representing the digital information stored in
public database (“the chain”).
✓ A simple analogy for understanding blockchain technology is a Google Doc.
"Be miserable. Or motivate yourself. Whatever has to be done, it's always your choice."
Characteristics of CBS
➢ Common database in a central server located at a Data Centre
➢ Branches function as delivery channels
➢ CBS is centralized Banking Application software
➢ Supported by advanced technology infrastructure
➢ Customer is a customer of the bank and not only of the branch
➢ CBS software also enables integration of all third-party applications
"To accomplish great things, we must not only act, but also dream, not only plan, but also believe."
✓ Flexcube ✓ Regulatory
compliance
✓ BaNCS
✓ Resource
✓ BankMate optimization
Applications Functioning
Back Office Include settlements, clearances, record maintenance, regulatory compliance, accounting, and IT
services.
Data Warehouse Used to simplify and standardize the way they gather data - and finally get to one clear version of the
truth.
Credit-Card Provides credit card management, account management, customer information management and general
system ledger functions, online transaction authorization and service of the bank card.
ATM Allows customers to complete basic transactions without the aid of a branch representative or teller.
Central Server CORE banking applications supports customers operations by creating a Centralized Online Real-time
Exchange (or Environment) (CORE).
Internet Banking Conduct a range of financial transactions through the financial institution’s website.
Mobile and Phone It uses an app, provided by the financial institution for the purpose of Mobile banking on a 24*7 basis.
Banking
Branch Banking
Creating manual documents capturing data required for input into software; Internal authorization; Beginning-Of-Day (BOD)
operations; End-Of-Day (EOD) operations; and Reviewing reports for control and error correction.
CBS IT Environment
Servers
✓ Server is a system (software and/or hardware) that responds to requests across a computer network to provide, or
help to provide, a network service.
✓ Servers can be run on a dedicated computer, which is also often referred to as “the server”.
✓ From a hardware perspective, a server is a computer (Hardware) or device on a network dedicated to run one or
more services (as a host), to serve the needs of the users of other computers on a network.
Internet Banking Application Server (IBAS) Internet Banking Channel Server (IBCS)
▪ The Internet Banking Software which is stored in the ▪ Stores the user name and password of all the internet
IBAS authenticates the customer with the login details banking customers.
stored in the IBCS. ▪ It also contains the home branch details of each
▪ Authentication process is the method by which the internet banking customer.
details provided by the customer are compared with ▪ IBCS software stores the name and password of the
the data already stored in the data server to make sure entire internet banking customers.
that the customer is genuine and has been provided ▪ It also contains the details about the branch to which
with internet banking facilities. the customer belongs.
Automated Teller Machine (ATM) Server Database Server
▪ Contains the details of all ATM account holders and ▪ Contains the entire data of the bank.
temporarily holds data that is converted by the
▪ Accessed by the application server for processing.
middleware as requested by title ATM switch.
▪ ATM server and IBAS access the DB Server through
▪ When the Central Database is busy with central end-of-
their own channel of middleware and firewall.
day (EOD) activities, the file containing the account
balance of the customer is sent to the ATM switch. ▪ All customer transactions performed from branches or
internet or ATM are updated at this central database.
▪ Such a file is called Positive Balance File (PBF).
Antivirus Server Proxy Server
✓ It facilitates better ✓ Acts in conjunction with
administration as the the firewall and
antivirus software is provides network
updated in the central security by filtering
location and becomes malicious data from
available to all the entering the network.
systems in the Bank’s ✓ Secures IP addresses of
network unlike in the the Bank’s servers by
previous setup. performing a Network
Address Translation
(NAT).
"Don't let what you cannot do interfere with what you can do."
Points of Risks and Controls around CASA Points of Risks and Controls around Credit Cards
❖ Credit Line Set-up ❖ Interest Calculation ❖ Credit Line Set-up ❖ Interest Calculation
❖ Authorization ❖ Approval of CASA by ❖ Authorization ❖ Disbursement
Authorised Personnel Certificate
❖ As per Bank’s Policy ❖ SOD ❖ As per Bank’s Policy ❖ Accurate Accounting
❖ Customer Master ❖ Accurate Accounting ❖ Customer Master ❖ Balance Reconciliation
Risks Controls
✓ Unauthorized securities setup in systems such as ✓ Appropriate Segregation of duties and review
Front office/ Back office. controls around securities master setup/amendments.
✓ Inaccurate trade is processed. ✓ Appropriate SOD and review controls to ensure the
accuracy and authorization of trades.
✓ Unauthorized confirmations are processed. ✓ Complete and accurate confirmations to be obtained
from counter-party.
✓ Insufficient Securities available for Settlement ✓ Effective controls on securities and margins.
✓ Incomplete and inaccurate data flow between ✓ Inter-system reconciliations, Interfaces and batch
systems. processing controls.
✓ IInsufficient funds are available for settlements. ✓ Controls at CCIL/NEFT/RTGS settlements to ensure
the margin funds availability and the timely funds
settlements.
✓ Incorrect Nostro payments processed. ✓ Controls at Nostro reconciliation and payments.
"Little minds are tamed and subdued by misfortune; but great minds rise above it."
SM Hotne s s G ri d
(Based on Examination Pap ers Trend A nalysis)
SM Hotness Grid
(Based on Examination Papers Trend Analysis)
12
10 10
10
8 8 8
8
6
6 5 5
0
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
8 12
10
6
8
4 6
4
2
2
0 0
Nov-18
Nov-19
Nov-20
Nov-18
Nov-19
Nov-20
Jan-21
Jan-21
May-18
May-19
May-21
May-18
May-19
May-21
6 12
5 10
4 8
3 6
2 4
1 2
0 0
Nov-18
Nov-19
Nov-20
Jan-21
May-18
May-19
May-21
Nov-18
Nov-19
Nov-20
Jan-21
May-18
May-19
May-21
12 20
10
15
8
6 10
4
5
2
0 0
Nov-18
Nov-19
Nov-20
Jan-21
Nov-18
Nov-19
Nov-20
May-18
May-19
May-21
Jan-21
May-18
May-19
May-21
Chapter 5: Business Level Strategies Chapter 6: Functional Level Strategies
8 12
10
6
8
4 6
4
2
2
0 0
Nov-18
Nov-19
Nov-20
Nov-18
Nov-19
Nov-20
Jan-21
Jan-21
May-18
May-19
May-21
May-18
May-19
May-21
Chapter 7: Organisation and Strategic Leadership Chapter 8: Strategic Implementation and Control
Value Creation
Providing products and services to the customers
with more worth (Value).
“Victorious warriors win first and then go to war, while defeated warriors go to war first and then seek to win.”
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com 47
EIS-SM BOOSTER
Profitability Band
Price Offered = Rs. 15,500
✓ 2021 Model
Cost (Ind. Avg.)= Rs. 10,000
✓ 10 Features
✓ 10 Hr. Playtime
✓ No Waterproof
✓ 1 Year Warranty
Honda’s Strategy
❖ Business Plan of Honda Automobiles for Indian market to increase its market share through direct
marketing, advertising, sales promotions etc. with the help of dealers and showrooms.
❖ Further, Honda Automobiles started the use of digital marketing and emergence of social media,
dashboards and social websites to enhance a marketing plan.
Strategic Management
Definition 1 Definition 2
Strategic management is an ongoing process that: Strategic management is a process to determine
❖ Evaluates and controls the business and the industries mission, vision, values, goals, objectives, roles and
❖ Assesses its competitors and sets goals and responsibilities, timelines, etc.
strategies to meet all existing and potential
competitors; and
❖ Reassesses each strategy to determine how it has
been implemented.
Objectives of SM Benefits of SM
❖ To create competitive advantage. a. Proactive: Helps to become more proactive.
b. Decision-making: Provides decision-making framework.
❖ To guide the company successfully through all
c. Direction-setting for the company.
changes in the environment. d. Avoid costly mistakes.
Limitations of SM e. Competitive Advantages and Core competencies
f. Threat Identification:
i. Complex and turbulent environment. g. Reputation: Building of the organizations.
ii. Costly process. h. Longivity: Helps to enhance the longevity of the
iii. Time-consuming process. business.
iv. Competition analysis is a challenging task. i. Future Oriented: Prepare the corporation to face the
future.
The Memory’s Eye The Memory’s Eye
Complex CTC Analysis PD-2 Avoid and CTRL. Future
Reliance
Industries -
Future Group
deal
“Live as if you were to die tomorrow. Learn as if you were to live forever.”
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com 51
EIS-SM BOOSTER
Functional Strategy
❖ Strategy related to a single functional operation. Example: Human resources, purchasing, product
development, customer service, finance, R&D, etc.
❖ Strategy at this level is Tactical in Nature.
✓ EIs are adopting different ✓ Mis strategy for the future will ✓ Central, state, municipal
strategies for attracting best require renewed and agencies, Public Sector Units,
students. deepened collaboration with departments are responsible
physicians, who are central for formulating, implementing,
✓ EIs have also joined hands
to hospitals’ well-being and and evaluating strategies that
with industries in order to
a reallocation of resources use taxpayers’ money in the
deliver education to make
from acute to chronic care most cost-effective way to
graduates more employable.
in home and community provide services and
✓ The educational delivery programs.
settings.
system has also undergone
✓ Backward integration ✓ Government agencies and
considerable changes with
strategies that some Mis are departments and their
the introduction of computers
pursuing include acquiring employees participate in the
and internet technologies.
ambulance services, waste SM process and thereby have
✓ Online college degrees are an effect on the
disposal services, and
becoming common and organization’s mission,
diagnostic services.
represent a threat to objectives, strategies, and
traditional Colleges and ✓ Millions of persons research
policies.
universities. medical ailments online,
which is causing a dramatic ✓ Government agencies are
shift in the balance of using a SM approach to
power between doctor, develop and substantiate
patient, and hospitals. formal requests for additional
funding.
Competitive Landscape
➢ Competitive landscape is a business analysis which identifies competitors, either direct or indirect.
➢ It’s about identifying and understanding the competitors
➢ It permits the comprehension of their vision, mission, core values, niche market, strengths and weaknesses.
➢ Understanding of competitive landscape requires an application of “competitive intelligence”.
Example: Hyundai is a competitive company inside the Automobiles (car) market because they have achieved constant
success every year. This company is based on the development of new strategies that helps Hyundai to differentiate from
the competitors like Honda, Toyota, Suzuki, Ford, GM, etc.
A person who won’t read has no advantage over one who can’t read.
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com 53
EIS-SM BOOSTER
Intangible Resources
➢ Capabilities exist when resources have been
purposely integrated to achieve a specific task or
set of tasks.
IDT App.
Strategic Analysis
✓ Strategic analysis seeks to determine alternative course of
action that could best enable the firm - to achieve its mission
and objectives.
✓ Strategic analysis tries to find out:
✓ How effective has the present strategy been?
✓ How effective will that strategy be in the future?
✓ How effective will the selected alternative strategy be in the
future?
- Product Situation
- Market Situation
- Competitive Situation
- Distribution Situation
- Environmental Factors
Learning starts with failure; the first failure is the beginning of education.
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com 57
EIS-SM BOOSTER
Portfolio Analysis
Experience Curve
Globalization
ii. Emerging global markets ii. Foreign markets have grown enough to
justify foreign investment
iii. Changing global markets
iii. Availability of cheaper and reliable resources
iv. Cultural attributes of individual global in other countries
markets.
iv. Reduction in transportation cost for export to
v. Institutional attributes of individual global remote countries
markets.
v. Rapid shrinking of time and distance across
the globe
Characteristics of a Global Company Types of Global Companies
i. Common ownership i. MNC – Multi-national Company
Strategic
Strategic Strategic
Management Mission
Decision Making Uncertainty
Model
Operational Planning
➢ Deals with current deployment of resources. ➢ Makes modifications to the business
➢ Develops tactics rather than strategy. ➢ functions but not fundamental changes.
➢ Projects current operations into the future. ➢ Is the responsibility of functional managers.
Strategic Uncertainty
Meaning Impact How to Deal?
✓ The strategic uncertainty is ✓ Impact on present, i. Strategic Grouping of
represented by a future trend or proposed, and even Uncertainty
event that has inherent potential businesses. ii. Scenario Analysis
unpredictability.
✓ Impact on potential growth iii. Strategic Flexibility in
✓ It can be judged by Scenario as present market share, Organization.
Analysis. position, sales, profits, or
✓ Scenario analysis basically accepts costs may suffer. The Memory’s Eye
the uncertainty as given and uses it
to drive a description of two or 3S
more future scenarios.
Strategic Intent
A company must determine what directional
path the company should take and what
changes in the company’s product – market –
customer – technology – focus would improve
its current market position and its future
prospect.
Strategic Analysis
The diagnostic phase of strategic analysis. It
entails two types of analysis:
✓ Environmental scanning
✓ Organisational analysis
Strategic Formulation
✓ Strategy formulation is developing
strategic alternatives in the light of
organisation strengths and weaknesses and
opportunities and threats in the environment.
Strategic Implementation
To convert strategic plans into actions and
results, a manager must be able to direct
organisational change, motivate people, build
and strengthen company competencies and
competitive capabilities, create a strategy-
supportive work climate, and meet or beat
performance targets.
"There are no secrets to success. It is the result of preparation, hard work, and learning from failure."
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com 63
EIS-SM BOOSTER
The sole purpose of education is to open and show more windows for mankind than mirrors.
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com 66
EIS-SM BOOSTER
Stability Strategy
Definition Stability Approach
In stability strategy, the firm - ✓ Frequency
✓ Stays with its current businesses and product-market, ✓ Resources
postures and functions. ✓ Investment The Memory’s Eye
✓ Maintains the existing level of effort. ✓ Definition
✓ Remains satisfied with incremental growth. ✓ Growth FRIDGER
Objectives of Stability Strategy ✓ Efficiency
✓ Safeguard existing interests and strengths. ✓ Risk
✓ Continue the chosen path of business. Stability Approach
✓ Pursue well tried and tested objectives. ✓ Stable Environment
✓ Consolidate the reigning position. ✓ Less Risky The Memory’s Eye
✓ Maintain operational efficiency. ✓ Less Threatening
SRTC
✓ Optimize returns on resources invested. ✓ Consolidation
Expansion Strategy
Definition Expansion Approach
✓ It is one in which we are growing significantly ✓ Frequency
The Memory’s Eye
faster than the market or market segment is ✓ Resources
growing overall. ✓ Investment FRIDGER
✓ It implies that the company is willing to take on ✓ Definition
competitors in order to take market share from ✓ Growth
them, in addition to absorbing the growth in the ✓ Efficiency
market place itself. ✓ Risk
Growth
Market Share
and Position The Memory’s Eye
GAME
The more doors of educational institutions you open, the more prisons are closed.
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com 67
EIS-SM BOOSTER
Reasons for
Diversification
Reasons for
Diversification
TCS
Horizontal Integration
Diversification
This involves addition or acquisition
of one or more similar businesses
at the same stage of the
production marketing chain
through:
✓ Production of Complementary
products
The Memory’s Eye
PEST
Concentric
Diversification
✓ Extends the firm’s distinctive
competence to the other lines of
business that are similar to the
firm’s initial base through:
✓ Process
✓ Technology The Memory’s Eye
✓ Marketing. PTM
Conglomerate Diversification
✓ It is a strategy that expands the firm’s operation into industries
and markets that are not similar or related to the firm’s initial
base. It does not involve sharing the firm’s distinctive competence
across different lines of business.
Expansion
SM IN GOVERNMENT through Mergers and Acquisitions
AND NOT-FOR-PROFIT
Horizontal Merger Vertical Merger Circular Merger Conglomerate Merger
ORGANISATIONS
A merger of two competing ✓ When two or more ✓ In Co-generic or circular ✓ It is the combinations of
firms which are engaged in companies involved in merger two or more companies engaged in
the production of similar different stages of merging organizations are unrelated businesses.
products or services. activities like production associated in some way or
✓ It helps to obtain or distribution combine the other related to the ✓ There are no linkages
economies of scale in with each other the production processes, with respect to
production by combination is called business markets, or customer groups,
✓ Eliminating duplication of Vertical merger. basic required customer functions and
facilities, technologies. technologies being used.
✓ Widening the product line, Forward Integration
✓ Such mergers include Such a combination helps
reduction in investment, in:
Example: A refinery getting the extension of the
✓ Elimination of i. Lowering of cost of
into petrol pumps (like RIL) or product line or acquiring
competition in product capital,
a film production house components that are
market, ii. Optimum utilization of
getting into distribution and required in the daily
✓ Increase market share, financial resources
subsequently, into running of operations.
✓ Reduction in advertising and
cinema halls.
costs etc. iii. Enlarging debt
Example: Organization in the
Example: Tata Steel Backward Integration capacity.
white goods categories such
acquiring Corus, Mittal Steel
as refrigerators can
acquiring Arcelor and Jet Example: Starting with Vimal
diversify by merging with
Airways acquiring Sahara range of fabrics, RIL went
another organization
Airlines. backward into manufacture of
having business in kitchen
polyester fiber and yarn.
appliances.
To be successful, you have to have your heart in your business, and your business in your heart.
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com 69
EIS-SM BOOSTER
Stage 5 Stage 2
•Return to Normal •Analyze the Situation and
Develop a Strategic Plan
Stage 4 Stage 3
•Restructure the •Implement an
Business Emergency Action Plan
✓ Finance mix: Prepare cash forecasts, analyze assets and debts. Includes human resource, financial, marketing
and operations actions to restructure debts,
✓ Product mix: Immediate attention over core products to remain
improve working capital, reduce costs,
competitive.
improve budgeting practices, prune product
✓ People mix : Rewards, compensation and change management. lines and accelerate high potential products.
Divestment Strategy Liquidation Strategy
Divestment strategy involves the sale or liquidation of a A retrenchment strategy considered as the most extreme
portion of business, or a major division or SBU. and unattractive is liquidation strategy, which involves
Compulsions for divestment in case of: closing down a firm and selling its assets.
▪ Obsolescence of product/process
▪ Business becoming unprofitable and unviable Major Reasons Liquidation Strategy
▪ Inability to cope up with cut throat competition
Same as Retrenchment Strategy.
▪ Industry overcapacity
▪ Failure of existing strategy Combination Strategy
Reasons of Divestment (Why to Divest?) An enterprise may seek stability in some areas of activity,
expansion in some and retrenchment in the others.
✓ Acquisition proves to be a mismatch.
✓ Persistent negative cash flows Major Reasons Combination Strategy:
✓ Severity of competition • Large Organizations
✓ Failure to do Technological upgradation • Complex Environment
✓ Availability of more profitable alternative
• Businesses in Multiple Industries
Whether it’s Google or Apple or free software, we’ve got some fantastic competitors and it keeps us on our toes.
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com
Chapter 5 Business Level Strategy
Failure doesn’t mean you are a failure, it just means you haven’t
succeeded yet.
Porter’s
5 Forces
Model
Porter’s Threat
Generic from the
Strategy New
Chapter - 5 Entrants
Business
Level
Bargaining Strategy
Threat from
Power of
Direct
Buyers and
Competition
Suppliers
Threat from
Indirect
Competition
+
Value
✓ Capital Requirements
Customer’s
Profitability Band
Margin
✓ Economies of Scale, EC and LC
Price
✓ Product Differentiation
Firm’s
✓ Brand Identity Margin
+
Bargaining Power of the Buyers
Value
Profitability Band
Margin
✓ Purchase Size
✓ Product Function
Price
✓ Buyer’s Concentration
✓ Product Differentiation
Firm’s
✓ Vertical Integration Margin
✓ Switching Cost
Cost
✓ Product Function
✓ Supplier’s Concentration
Price
✓ Product Differentiation
✓ Vertical Integration
Firm’s
✓ Switching Cost Margin
+
Cost
=
Value
✓ Real estate, insurance, bonds and
bank deposits for example are Customer’s
clear substitutes for common Margin
Profitability Band
stocks, because they represent
alternate ways to invest funds. Price
✓ Digital cell phones currently pose
this kind of threat to landline
telecommunications firms.
Firm’s
Margin
Cost
✓ Number of Competitors
✓ Type of Competition
Price
✓ Entry Barrier and Exit Barrier
✓ Fixed Cost
Firm’s
✓ Product Differentiation Margin
Cost
Focus Strategy
❖ The focus strategy concentrates on a particular group of customers or a particular product-
line segment and within that segment attempts to achieve either a cost advantage or
differentiation.
❖ The whole idea is that the needs of the group can be better serviced by focusing entirely on it.
ii. It is an extension of
Michael Porter’s
Generic
Strategies.
“The secret of success in battle lies often not so much in the use of one’s own strength but in the exploitation
of the other side’s weaknesses.”
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com
Chapter 6 Functional Level Strategy
Marketing
Strategy
Human
Resources Finance
Strategy Strategy
Chapter – 6
Functional
Level
Strategy Production
R&D and
Strategy Operations
Strategy
Logistics
Strategy
Functional Strategy
❖ Known as tactical strategies.
❖ Functional strategies operate below business-level strategies.
❖ Functional strategies are made within the higher level strategies.
❖ There might be several sub-functional areas, like sales, advertising, market research, etc.
Marketing
❖ Marketing is an organizational
process or a societal process.
❖ A set of processes for creating,
communicating, and delivering
value to customers for managing
customer relationships in ways
that benefit the organization and its
stakeholders.
Marketing Process
Marketing Strategy
Definition Issues Marketing Mix (4 Ps)
✓ Marketing strategy refers to ✓ Customers i. Product
actions for developing, ✓ Distribution network ii. Price
pricing, distributing, and ✓ Warranty iii. Place
promoting products that ✓ Remuneration/incentives
iv. Promotion
meet the needs of specific ✓ Advertising
customer groups. ✓ Pricing ✓ Personal Selling
✓ Advertising
✓ It analyses and selects target The Memory’s Eye ✓ Publicity
market, and develops
suitable marketing mix. CD-WRAP ✓ Sales Promotion
i. Marketing Analysis
ii. Swot Analysis
Financial Strategy
❖ The strategies related to several financial aspects of a business like acquiring capital,
sources of fund, developing projected financial statements/budgets, management and
usage of funds and evaluating the worth of a business etc. are called financial strategies.
Imp. Fin. Strategy Decisions Financial Strategy Areas Evaluating the Worth
❖ To raise capital. ❖ Acquiring funds ❖ Net Worth Method
❖ To lease or buy FA. ❖ Preparing budgets and
❖ To determine appropriate Projected financial ❖ Capitalisation of Earnings
dividend pay-out ratio. statements ❖ Market Price Method
❖ To define the credit policy. ❖ Management and usage of
❖ To define discount policy. funds
❖ To determine the amount of ❖ Evaluating the Worth of a
cash in hand. Business
The cynic says, “One man can’t do anything”. I say, “Only one man can do anything.”
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com 82
EIS-SM BOOSTER
Logistics Strategy
Ensures that the right materials are available at the right place, at the right time, of the right quality,
and at the right cost.
Logistic strategy provides solutions to following questions:
✓ Which sources of raw materials and components are available?
✓ How many manufacturing locations are there?
✓ What products are being made at each manufacturing location?
✓ What modes of transportation should be used for various products?
✓ What is the nature of distribution facilities?
✓ What is the nature of materials handling equipment possessed? Is it ideal?
✓ What is the method for deploying inventory in the logistics network?
✓ Should the business firm own the transport vehicles or hire?
HR Strategy
Strategic HR= Pre-selection practices, Selection practices and Post-selection practices.
Concerns related to HRM:
i. Disruption of social and political structures
ii. Failure to match individuals’ aptitudes with implementation tasks
iii. Inadequate top management support for implementation activities
Areas where the HR Manager can play Strategic Role in Managing HR:
i. Providing purposeful direction
ii. Creating competitive atmosphere
iii. Facilitation of change
iv. Diversity of workforce
v. Empowerment of human resources
vi. Building core competency
vii. Development of work ethics and culture
Sometimes when you innovate, you make mistakes. It is best to admit them quickly and get on with improving
your other innovations.
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com
Chapter 7 Organizations and Strategic Leadership
Organisation
Structure
Entrepreneur-
-eship and Chandler’s
Intrapreneurshi Strategy-
p Structure
Chapter – 7
Organizations
and Strategic
Leadership
Strategy Types of
Supportive Organizational
Culture Structure
Strategic
Leadership
Organizational Structure
Organizational structure is typically hierarchical arrangement of lines of authority,
communications, rights and duties of an organization.
An organization is structured for two major reasons:
▪ Structure largely dictates how objectives and policies will be established.
▪ Structure dictates how resources will be allocated.
✓ Small firms are functionally structured (centralized).
✓ Medium sized firms are divisionally structured (decentralized).
✓ Large firms are in SBU or matrix structure.
❖ Changes in strategy
❖ Leads to Changes in Structure
❖ Structures follow the growth
strategies
❖ Growth strategies follow certain
patterns to achieve Goals & Obj.
Functional Structure
▪ Functional Organization
structure is a hierarchical type.
▪ People are grouped as per their
area of specialization.
▪ Supervised by a functional
manager with expertise in the
same field.
▪ Promotes specialization.
▪ Workers are very skilled and
efficient.
▪ Allows quick decision-making.
▪ Expert can manage each
department.
Divisional Structure
▪ More suited to every large enterprise.
▪ Independent divisions are created
under the overall control of the HO.
Types of Divisions:
✓ Divisional by geographic area
✓ Divisional by product
✓ Divisional by customer
✓ Divisional by process
Advantages:
✓ Promotes accountability
✓ Employee Morale
✓ Career Development opportunities
✓ Allows better control of local situations
✓ Competitive climate
The golden rule for every business man is this: “Put yourself in your customer’s place.
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com 85
EIS-SM BOOSTER
Matrix Structure
▪ Structure which aims at combining
the advantages of vertical and
horizontal flows of authority and
communication.
▪ Personnel who are deputed to
work full time in different projects;
sometimes in more than one
projects under the overall
guidance and direction of project
managers.
Employees have two superiors –
i. Functional Manager (vertical
flow) and
ii. Project or Product Manager
(horizontal flow)
Phases for Development of Matrix Structure (As per Davis and Lawrence)
The cynic says, “One man can’t do anything”. I say, “Only one man can do anything.”
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com 86
EIS-SM BOOSTER
Strategic Leadership
Corporate Culture
Corporate Culture Role of Culture Changing a problem culture
✓ Management practices ✓ Culture promotes good ✓ Diagnose the present strategy
✓ Ethical standards strategy execution. non-supportive cultures.
✓ Official policies ✓ Nurtures and motivates ✓ Role models for the desired
✓ Dealings and relationships people cultural behaviour.
✓ Traditions ✓ Employees are ✓ Replacing key executives who
✓ Employees’ passionate about are strongly associated with the
✓ Legends company’s vision. old culture
✓ Organization’s politics ✓ Taking every opportunity to
communicate to employees
Entrepreneur
An entrepreneur is an An intrapreneur is an
individual who conceives the entrepreneur who is an
idea of starting a new venture, employee of organisation, and
Intrapreneur
Strategic Imp.
And Strategic
Formulation
Relationship
Benchmarking Strategic
Change
Chapter – 8
Strategy
Implementation
and Control
Business Process Strategic
Reengineering Controls
Strategy Audit
Strategy Formulation
✓ Entrepreneurial activity ✓ Administrative task
✓ Focus on effectiveness ✓ Emphasizes on efficiency
✓ Rational process ✓ Operational process
✓ Coordination among few ✓ Co-ordination among
individuals many individuals
✓ Requires a great deal of ✓ Requires motivational and
initiative and logical skills leadership traits
Strategy Implementation
Operations Management
between inputs-outputs attainment of goals
✓ Links with internal ✓ Links with external
environment environment
✓ Responsibility for ✓ Responsibility for
efficiency lies with effectiveness lies with top
operational managers managers
✓ Implementation viewpoint ✓ Formulation viewpoint
Success in business requires training and discipline and hard work. But if you’re not frightened by these things, the
opportunities are just as great today as they ever were.
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com 89
EIS-SM BOOSTER
Strategic Change
Steps to Initiate Strategic Kurt Lewin’s Phases of
Change Strategic Change
Compliance
H C Kellman
Step 1: Recognize the need Step 1: Unfreezing the
for change Situation Identification
Step 2: Create a shared Step 2: Changing to new
vision to manage change Situation Internalization
Step 3: Institutionalize the Step 3: Refreezing
change
Strategic Control
Strategy Audit
Strategy Audit Why Strategy Audit? Richard Rumelt’s Criteria for
✓ How well is the current Strategy Audit
“A strategic audit is an
strategy working? ✓ Consistency
examination and evaluation of
✓ How well will the current ✓ Consonance
The Memory’s Eye
areas affected by the operation of strategy be working in future?
✓ How can this be evaluated in
✓ Feasibility C-2FA
a strategic management process
present and future? ✓ Advantages
within an organization”.
✓ How urgent is there a need to
change the strategy?
It is not enough to have great qualities; we should also have the management of them.
Join Us on Telegram http://t.me/canotes_ipcc
Downloaded From www.castudynotes.com 90
EIS-SM BOOSTER
Step 6: Evaluation
“If you are the master be sometimes blind, if you are the servant be sometimes deaf.”
Join Us on Telegram http://t.me/canotes_ipcc