MANAGEMENT INFORMATION SYSTEMS Notes
MANAGEMENT INFORMATION SYSTEMS Notes
MANAGEMENT INFORMATION SYSTEMS Notes
MANAGEMENT
INFORMATION
SYSTEMS
MODULE 3
tttttttt
DAN KOSGEI
MIS 2022
MIS
This is an organized grouping of components having certain interrelationships and working collectively to
achieve a set of objectives. The system approach is a method or framework which helps us to analyze and
explore the operations and interactions which exist in the systems around us.
Any given system possesses the follow characteristics or attributes:-
1. Organization – This is the arrangement of components that help to achieve objectives.
2. Central objective – Among the interacting components there has to be goals or objectives focused by all.
3. Interaction – This is the manner in which each component functions with other components of the
system.
4. Interdependence – This means that parts of the organization or system depend on one another.
5. Integration – This is concerned with how a system is tied together.
Elements of a System
1. INPUT – These are components that are required to be processed so as to give the output. This includes
raw materials, energy and human labor.
2. OUTPUT – This is the product of processing e.g. goods or a service.
3. PROCESSING – This is the transformation or conversion procedure of input into output. i.e. production
department or factory.
4. CONTROL – this element guides the system. In an organization this is the decision making body that
controls the pattern of activities, governs input, processing and output e.g the management of a
company.
5. FEEDBACK – Control in a dynamic system is achieved by feedback which is the measure of output
against the standard.
1|Page D. Kosgei
MIS
6. ENVIRONMENT – This is the source of external elements that interact with the system or exert
pressure e.g. customers, suppliers, government policies and competition.
7. BOUNDARY – This are the limits that identity its components, processes and interrelationships when it
interfaces with another system e.g. in a company the invoicing function could be undertaken by the sales
department whereas in another it’s undertaken by the Account department.
Meaning of MIS
MIS consists of three words, that is Management, Information and System. On the basis of these three words
MIS can be defined as a system, which supplies information to Management. Actually, MIS is a process of
providing necessary information to management. It helps in planning, controlling and in taking different
managerial decisions. MIS is the structured, formal, systematic part of communication system. MIS is an
assemblage of personnel and facilities, organized into an integrated system by which relevant, adequate and
timely information is supplied to the executives.
It is to be mentioned that in respect of a large enterprise, MIS can be built around electronic computers. MIS is
not new, but only its computerization is new. Before the invention of computer, MIS techniques had existed to
supply operations. The computer has added one or more dimensions such as speed, accuracy and increased
volume of data.
According to Kennevans, MIS is an organised method of providing past, present and projection information
relating to internal operations and external intelligence.
According to Gordon B. Davis, MIS is an integrated man/machine system for providing information to support
the operations management and decision making functions of an organization.
According to Robert G. Mardick, goel E Ross and gomes R.Claggett, MIS is the System intended to provide
information for decision making, planning, organizing and controlling the operations of the subsystems of the
firm and to provide a Synergistic organization in the process.
Definition of MIS
Any telecommunications and/or computer related equipment or interconnected system or sub-systems of
equipment that is used in the acquisition, storage, manipulation, management, movement, control, display,
switching, interchange, transmission or reception of voice and/or data, and includes software, firmware and
hardware.
2|Page D. Kosgei
MIS
Also, a MIS is an IS that provides information to the management to enable them plan, coordinate, control
monitor and make decision by providing routine, summarizes and exceptional report.
The focus is on the design and operation of the MIS which means that the information system is viewed as a
means of processing data, i.e. the routine facts and figures of the organization, into information which is then
used for decision making. It is changes in decision behavior which distinguish data from information.
MIS User
Data processes Information processes
flows Flows Decisions
Figure 1.1
This means that MISs are qualitatively different from data processing systems and that management
involvement and interaction between information specialists and management are the key features of successful
MIS design.
Therefore, MIS can be defined as:
A system to convert data from internal and external sources into information and to communicate that
information, in an appropriate form, to managers at all levels in all functions to enable them to make timely
and effective decisions for planning, directing and controlling the activities for which they are responsible.
To be successful an MIS must be designed and operated with due regard to organization and behavioral
principles as well as technical factors. Management must be informed enough to make an effective contribution
to systems design and information specialists (systems analysts, accountants, operations researchers and others)
must become more aware of managerial functions and needs so that, jointly, more effective MISs are
developed.
Characteristics of MIS
3|Page D. Kosgei
MIS
2) Management oriented: Under MIS, necessary information is provided to each manager at the right
time,in right form and a relevant one, which is required by the management by providing information in taking
effective managerial decision.
3) Future oriented: MIS is designed and developed keeping in view the future position of the
business.Therefore, MIS should provide useful information on the basis of projections based on which future
action can be taken.
4) Integrated: MIS is designed in taking a comprehensive view or looking at the complete picture of the
interlocking sub-systems that operate within the company. It considers all aspects of production, marketing,
accounting, financing, management etc.
5) Common-data followed: MIS deals with the common data that are available in the business. MIS
provides data and information for taking effective managerial decision, which must select the real picture of the
business.
6) Long term planning: MIS is prepared for long term planning of the business. So, the designer should
avoid the outdated data and information in designing and developing time of MIS. The designer should consider
the present situation and future trend of the business activities, when MIS is designed.
7) Control database: Another important characteristic of MIS is that it always based on centralized data and
information. It is because of this fact that MIS is to supply data and information in such a way so that the
management can take its important decision.
Functions of MIS
The main purpose of MIS is to provide the management with the necessary information for decision making. In
order to achieve this purpose MIS is to perform the following functions.
1) Collection of data: The first function of MIS is to collect necessary data from both internal and external
sources of the organization. The data of the organization which have already been gathered are kept in some
physical medium such as a paper form or entering it directly into computer system.
2) Processing data: After storing the data, the next important function of MIS is to process the same. In
theprocessing, the data are converted to require management information, calculating company, sorting,
classifying and summarizing etc. are the necessary activities to be done for processing the data.
3) Storage of information: Under the MIS, necessary data and information are carefully stored, so that it
can save time for searching the same. Generally, data and information are stored by reserving and organizing
them in the form of files, records and databases for future use
4|Page D. Kosgei
MIS
4) Retrieval of information: Another function of MIS is to retrieve the information to meet the exact
management information demands. So retrieval should be done as per the requirement of the management
users.
5) Disseminating: Disseminating is the last function or finished product of MIS. By disseminating the data
and information are divided and distributed to the users in an organization. This can be done through reports or
outline through computer terminals periodically.
Components of MIS and their relationship
A management information system is made up of five major components namely people, business processes,
data, hardware, and software. All of these components must work together to achieve business objects.
People – these are the users who use the information system to record the day to day business transactions. The
users are usually qualified professionals such as accountants, human resource managers, etc. The ICT
department usually has the support staff who ensure that the system is running properly.
Business Procedures – these are agreed upon best practices that guide the users and all other components on
how to work efficiently. Business procedures are developed by the people i.e. users, consultants, etc.
Data – the recorded day to day business transactions. For a bank, data is collected from activities such as
deposits, withdrawals, etc.
Hardware – hardware is made up of the computers, printers, networking devices, etc. The hardware provides
the computing power for processing data. It also provides networking and printing capabilities. The hardware
speeds up the processing of data into information.
Software – these are programs that run on the hardware. The software is broken down into two major
categories namely system software and applications software. System software refers to the operating system
i.e. Windows, Mac OS, and Ubuntu, etc. Applications software refers to specialized software for accomplishing
business tasks such as a Payroll program, banking system, point of sale system, etc.
5|Page D. Kosgei
MIS
Relevance
The information a manager receives from an MIS has to relate to the decisions the manager has to make. An
effective MIS takes data that originates in the areas of activity that concern the manager at any given time,
and organizes it into forms that are meaningful for making decisions. If a manager has to make pricing
decisions, for example, an MIS may take sales data from the past five years, and display sales volume and
profit projections for various pricing scenarios.
Accuracy
A key measure of the effectiveness of an MIS is the accuracy and reliability of its information. The accuracy
of the data it uses and the calculations it applies determine the effectiveness of the resulting information.
The sources of the data determine whether the information is reliable. Historical performance is often part
of the input for an MIS, and also serves as a good measure of the accuracy and reliability of its output.
Usefulness
The information a manager receives from an MIS may be relevant and accurate, but it is only useful if it
helps him with the particular decisions he has to make. For example, if a manager has to make decisions
6|Page D. Kosgei
MIS
on which employees to cut due to staff reductions, information on resulting cost savings is relevant, but
information on the performance of the employees in question is more useful. The MIS has to make useful
information easily accessible.
Timeliness
MIS output must be current. Management has to make decisions about the future of the organization based
on data from the present, even when evaluating trends. The more recent the data, the more these decisions
will reflect present reality and correctly anticipate their effects on the company. When the collection and
processing of data delays its availability, the MIS must take into consideration its potential inaccuracies
due to age and present the resulting information accordingly, with possible ranges of error.
Completeness
An effective MIS presents all the most relevant and useful information for a particular decision. If some
information is not available due to missing data, it highlights the gaps and either displays possible
scenarios or presents possible consequences resulting from the missing data. Management can either add
the missing data or make the appropriate decisions aware of the missing information. An incomplete or
partial presentation of information can lead to decisions that don't have the anticipated effects.
broad categories.
a). The pre-specific processing of day to day transactions ,known as data processing or transaction processing
and the production of regular reports analysis and information for planning control and decision making
directly by the computer.
b). the use of computers by the end –users themselves .They include managers, accountants, office staff, sales
people executive etc.
Both produce management information. The key difference is that the pre specified systems supply pre-
determined outputs and reports so there is less flexibility.
This means that great care must be taken in analyzing and determining management’s real information .On
the other hand, with the end user computing there is more flexibility and interaction so that the emphasis
becomes one of supporting the end user rather than the production of a specified report.
7|Page D. Kosgei
MIS
That is, information systems that support managers at different levels of the organization. This classifies IS as
transaction processing systems (TPS, to support operational level), management information systems (MIS, to
support middle/tactical level), and Executive information system (EIS, to support the senior level
management).
They are classified according to the support they provide. They include:
They are designed to help senior management make strategic decisions. An ESS gathers analyses and
summarizes the key internal and external information used in the business. ESS typically involves lots
of data analysis and modeling tools, such as "what-if" analysis, to help strategic decision-making.
A good way to think about an ESS is to imagine the senior management team in an aircraft cockpit, with
the instrument panel showing them the status of all the key business activities.
They are primarily concerned with internal sources of information. MIS usually take data from the
transaction processing systems (see below) and summarize it into a series of management reports.
Specifically designed to help management make decisions in situations where there is uncertainty about
the outcomes of those decisions.
8|Page D. Kosgei
MIS
DSS use tools and techniques to help gather relevant information and analyze the options and
alternatives. DSS often involves use of complex spreadsheet and databases to create "what-if" models.
Exist to help businesses create and share information. They are typically used in businesses where
employees create new knowledge and expertise, which can then be shared by other people in the
organization to create further commercial opportunities. Good examples include firms of lawyers,
accountants and management consultants.
KMS are built around systems which allow efficient categorization and distribution of knowledge. For
example, the knowledge itself might be contained in word processing documents, spreadsheets,
PowerPoint presentations. Internet pages etc. To share the knowledge, a KMS would use group
collaboration systems, such as an intranet.
Try to improve the productivity of employees who need to process data and information.
Perhaps the best example is the wide range of software systems that exist to improve the productivity of
employees working in an office (for example, Microsoft Office XP), or systems that allow employees to
work from home or while on the move.
Social-technical Systems
The socio-technical view of organizations was developed by Trist and the Tavistock Institute and arose from
consideration that any production system requires both a technological organization, i.e. the equipment,
processes, methods, etc. and a work organization relating to those who carry out the necessary tasks to each
9|Page D. Kosgei
MIS
other, i.e. the social system. Based on this view an organization is not just a technical or social system but is the
structuring of human activities round various technologies.
The technologies involved determine the technical sub-systems and vary widely. Consider, for example, the
differing skills, procedures, machinery, equipment and the layout of facilities required in an electronics
company, a car manufacturer, a hospital or a computer bureau.
In addition to the technical sub-system, every organization has a social subsystem which consists of the
aspirations, expectations, interactions and value systems of the members. The two sub-systems - the technical
and the social -cannot be looked at separately but must both be considered as interrelating within the
10 | P a g e D. Kosgei
MIS
organization. Socio-technical theory suggests that the organization consists of four interrelated elements - tasks,
people, structure and technology as shown in Figure below:
Technology
Structure People
Tasks
More traditional approaches to Organizations and their problems have tended to concentrate on one or other of
the sub-systems with little or no recognition of the other.
Social-Technical View of IS
Contemporary Approaches to Information Systems
The study of information systems deals with issues and insights contributed from technical and behavioral
disciplines.
The technical approach emphasizes mathematically based, normative models to study information systems, as
well as the physical technology and formal capabilities of these systems. The behavioral approach, a growing part
of the information systems field, does not ignore technology, but tends to focus on non-technical solutions
concentrating instead on changes in attitudes, management and organizational policy, and behavior.
11
MIS
MIS combines the work of computer science, management science, and operations research with a practical
orientation toward developing system solutions to real-world problems and managing information technology
resources. It is also concerned with behavioral issues surrounding the development, use, and impact of
information systems, which are typically discussed in the fields of sociology, economics, and psychology
In the sociotechnical view of systems, optimal organizational performance is achieved by jointly optimizing
both the social and technical systems used in production. Adopting a sociotechnical systems perspective helps to
avoid a purely technological approach to information systems.
Technology must be changed and designed, sometimes even "de-optimized," to fit organizational and individual
needs. Organizations and individuals must also be changed through training, learning, and planned organizational
change to allow technology to operate and prosper.
Information systems are sociotechnical systems. Although they are composed of machines, devices, and "hard"
physical technology, they require substantial social, organizational, and intellectual investments to make them
work properly. Since problems with information systems—and their solutions—are rarely all technical or
behavioral, a multidisciplinary approach is needed. A Sociotechnical Perspective on Information Systems
In a sociotechnical perspective, the performance of a system is optimized when both the technology and the
organization mutually adjust to one another until a satisfactory fit is obtained.
TALL FLAT
2. Specialization: This is the division of labor in an organization. Its usually based on the different functions
such as marketing, accounting, production and distribution.
GENERAL MANAGER
3. Formulation: Extent to which rules and procedures exist to handle organizational activities. An indication
of formalization is the extent to which decisions can be programmed.
4. Centralization: This refers to the organizational structure where decision making occurs either at the top
level or low level.
13
MIS
Information system
Information system has been defined in terms of two perspectives: one relating to its function; the other relating
to its structure. From a functional perspective; an information system is a technologically implemented medium
for the purpose of recording, storing, and disseminating linguistic expressions as well as for the supporting of
inference making.
From a structural perspective; an information system consists of a collection of people, processes, data, models,
technology and partly formalized language, forming a cohesive structure which serves some organizational
purpose or function. The functional definition has its merits in focusing on what actual users - from a
conceptual point of view- do with the information system while using it. They communicate with experts to
solve a particular problem. The structural definition makes clear that IS are socio-technical systems, i.e.,
systems consisting of humans, behavior rules, and conceptual and technical artifacts.
An information system can be defined technically as a set of interrelated components that collect (or retrieve),
process, store, and distribute information to support decision making and control in an organization. In addition
to supporting decision making, coordination, and control, information systems may also help managers and
workers analyze problems, visualize complex subjects, and create new products.
The main purpose of Information System is to provide the management the necessary information for decision
making. In order to achieve this purpose MIS is to perform the following functions.
14
MIS
Collection of data: The first function of MIS is to collect necessary data from both internal and external sources
of the organization. The data of the organization which have already been gathered are kept in some physical
medium such as a paper form or entering it directly into computer system.
(i) Processing data: After storing the data, the next important function of MIS is to process the same. In the
processing, the data are converted to require management information, calculating company, sorting,
classifying and summarizing etc. are the necessary activities to be done for processing the data.
(ii) Storage of information: Under the MIS, necessary data and information are carefully stored, so that it can
save time for searching the same. Generally, data and information are stored by reserving and organizing
them in the form of files, records and databases for future use.
(iii) Retrieval of information: Another function of MIS is to retrieve the information to meet the exact
management information demands. So retrieval should be done as per the requirement of the management
users.
(iv) Disseminating: Disseminating is the last function or finished product of MIS. By disseminating the data
and information are divided and distributed to the users in an organization. This can be done through
reports or outline through computer terminals periodically.
An Organization as a System
ENVIRONMENT Standard
Customers Polices & decision
Suppliers making
Competitors Management
Govt. Policies
Control
15
MIS
There are basically two types of control system: the open loop system and the closed loop control systems.
This is a simple open loop control system. Its operation is very simple, when an input signal directs the control
element to respond, an output will be produced. Examples of the open loop control systems include washing
machines, light switches, gas ovens, etc.
The drawback of an open loop control system is that it is incapable of making automatic adjustments. Even
when the magnitude of the output is too big or too small, the system will not make the appropriate adjustments.
For this reason, an open loop control system is not suitable for use as a complex control system. Sometimes it
may even require monitoring and response from the user.
Feedback
This is the gathering of information on past performance from the output of a system, department or process
and using it to govern future performance by adjusting the input size of the system.
This causes a system to amplify an adjustment or an action. It acts in the same direction as the measured
deviation i.e. this reinforces the way the system is moving and if thought to be beneficial.
If an advertisement increased the sales further advertisements may be considered.
One advantage of using the closed loop control system is that it is able to adjust its output automatically by
feeding the output signal back to the input.
In a closed loop control system, the controlled variable (output) of the system is sensed at every instant of
time, feedback and compared with the desired input resulting in an error signal. This error signal directs the
control elements in the system to do the necessary corrective action such that the output of the system is
obtained as desired. The feedback control system takes into account the disturbances also and makes the
corrective action.
These control systems are accurate, stable and less affected by noise. But these control systems are
sophisticated and hence costly. They are also complicated to design for stability, give oscillatory response and
feedback brings down the overall gain of the control system
Feedback Loops
Low-level
Controller
Standard
Effector Comparator
17
MIS
1. SENSOR- This is the measuring and recording device for example automatic metering or some kind of
paper work.
2. COMPARATOR – This is he means by which comparisons of actual results and the plan are achieved
e.g. A clerk or a computer program.
3. EFFECTOR – This could be a manager or supervisor acting on the report to make adjustments.
The procedure outlined above, i.e. input - process - output - monitor and compare - adjustment, requires what is
known as a feedback control loop and such a loop is a common feature of many aspects of MIS, for example,
stock control, budgetary control, production control and so on. It will be realized that the basic system described
is relatively mechanistic and is therefore not necessarily suitable for all facets of the organization’s activities.
Feed Forward
Where a self-regulating feedback system is not able to control a process adequately it may be feasible to use
feed forward. This is where monitoring at some early stage of a system or process may indicate that an
adjustment should be made at a later stage of the process, prior to the final output. Feed forward is not an
automatic process and requires management intervention for it to operate successfully and, consequently, it
does not have the degree of 'automatic' control inherent in a feedback system.
Timing of Control
Control is most effective when the time rank between the output and the corrective action is minimal. The
speed of control is influenced by organization structure and the reporting period. Managers may be unable to
effect control due to the following reasons:-
1. The subject covered is outside manager’s control.
2. The information comes too late for effective action to be taken.
3. Insufficient details are provided.
4. The information that is provided is in a form that isn’t understood.
PLANNING
18
MIS
Strategic Level
-
EIS or -
ESS
-
1. Operational System
They monitor elementary activities and transactions of the organization e.g. sales, receipts, cash deposits,
payroll and flow of materials in the factory.
19
MIS
The main purpose of these systems is to answer routine questions and track the flow of information in the
organization. To answer this information must be available, it should be current and accurate e.g. a bank
deposit query from a bank A.T.M.
20
MIS
the operations. They may focus on the less structures decisions for which information requirements
aren’t always clear and attempt to answer the ‘what if’ questions.
4. Strategic Level Systems
These support the long-range planning activities of the senior level management both from the
environment and internally. Their main concern is maintaining changes in the external environment with
the existing information and activities.
Level of Typical Planning Decision type Accuracy Source of
management responsibility Horizon information
1. Strategic Setting Organization Non-structured Very low
goals, long-term Normacy takes & subject to Mostly from
Accuracy
plans and policies period of 5-10 many changes outside the
years depending organization
on the project and internal
2. Tactical Usually takes 1 Semi-structured Reasonable A mixture of
to and based on the accuracy e.g. internal and
Setting and 3 years managerial when setting external sources
monitoring org. experience budgets and e.g. what is
budgets, meeting the targets happening to the
strategic goals & competitors.
developing
operations objectives
and policies
3. Operational Usually a week or Structures and High accuracy Captured from
Effective use of less day to day hardly require required e.g. source
existing facilities human tracking the documents.
and resources. intervention. cost to a cent
Concerned with
dayto-day running of
the organization
Types of Information Systems
21 | D. Kosgei
MIS
TPS are central to an organization such that if there is a failure it can bring the organization to a standard
still. The information inputs for the TPS are in the form of transactions and events. Processing involves
sorting, listing, merging and updating. The information output are detailed reports which are given to the
operational staffs and supervisors.
It provides the input data for many other systems. T.P.S is critical to the success of any organization since
they support the law level operations such as purchasing o raw materials. Billing customers and preparing
the payroll etc.
The objectives of T.P.S are:
1. To provide all information needed by law or by the organization policy to keep the business running
properly and efficiency.
2. Provide timely documents and reports.
3. Increase the competitiveness of the organization.
4. Provide necessary data for tactical and strategic systems e.g. the DSS.
5. To assure accuracy and integration of data and information.
6. To safeguard assets and security of information.
NB: T.P.S is the most likely candidates for re-engineering and usually yield the most tangible benefits of I.T.
investments.
22 | P a g e D. Kosgei
MIS
1. Batch processing
Business transactions are corrected as they occur and are accumulated over a period of time and
prepared for input as a single unit or batch. This is normally processed periodically e.g. monthly,
examples include the payroll and the general ledger.
5. Payroll
This monitors the salaries and has the primary output as checks and pay slips to be distributed to the
employees and provides a payroll register which is a summary of all the transactions.
6. Human Resources
This system gives the information about the employees for personnel planning and government
reporting and also the management of the company to benefit from other programmes. These include
information on the employee’s e.g. net pay, deductions e.t.c.
23 | P a g e D. Kosgei
MIS
7. General ledger
This is a record of the monetary transactions e.g. payment to suppliers, receipts from customers and
payments to employees. It will give financial statements such as the trading and profit and loss
account, the trial balance and the balance sheet.
24 | P a g e D. Kosgei
MIS
COMPONENTS OF A D.S.S
25 | P a g e D. Kosgei
MIS
Retrieval Extraction
of data from Internal
and External sources Menus, icons, natural
Dialogue language and graphics
management
system
system by voice. The windows capability enables the user to maintain several activities at the same time.
Extensive computer graphics are also utilized and the kind of dialogue will take the following form:-
a) Who is the biggest?
b) How do circumstances change over a given time?
c) How will one fact predict another?
d) What is typical or exceptional?
Classifications of DSS
They can be classified by the manager’s level i.e. operational tactical or functional area e.g. marketing,
finance and personal among others.
1. Data Access System
They provide a user friendly interface and adhoc access to the database. This is similar to what is offered
by database management through a quarry language. These systems are meant for operational control.
2. Data Analysis System
They help to analyze historical and current data either on demand or periodically e.g.
comparing the performance with that of the competitors.
3. Forecast-oriented Data Analysis systems
They assist in developing product plans including market segment forecast, sales forecast and analysis of
competitive actions. Their operation is based on access to a variety of internal and external sources,
marketing and product databases including a series of historical data.
4. Systems based on Accounting Models
They consider alternative options for planning purposes based on accounting deviations and
relationships. They produce estimated income statement and balance sheet and they use the “what if”
mode of alternatives.
2. They focus on specific They use routine flows of data to assist in the
decisions general control.
3. They are aimed at all managers They are largely dominated by professional e.g.
accountants and HR experts.
Prototype /DSS
Evaluation
Are current
Yes Validation and
tn requirements
em documentation of DSS
met?
p
o
le
ve
D DSS is ready
No
for use
Prototype /DSS modification
29 | P a g e D. Kosgei
MIS
These are information system at the strategic level to address the non-structured decision making through
advanced graphics and communication. It combines internal and external data to create a generalized
computing and communications environment and thereby assist the senior executives monitor the
organization performance, tracks the activities of competitors, spot problems, identity opportunities and
focus trends.
ROLE OF E.I.S:
1. Executive are bound to receive fixed formats of reports e.g. weekly or monthly which can easily lead to
data over-load.
EIS solves the problem by supplying easy to use desktop analytical tools and online data displays. These
tools help to drill down the information i.e. being able to more from summarizes to the details.
2. Provide managers with minimum computers experience with a common user friendly software tool e.g. a
spreadsheet for analytical purposes.
3. To solve the limitation of having to use data from systems designed for different purposes e.g. data from
a sales TPS should provide essential information for marketing purposes.
4. Provide managers with external data e.g. current stock market news, industry trends and competitor
information. These data can be illustrated as follows:-
Characteristics of E.I.S
They provide immediate and easy access to information reflecting the key
success factors of the company and its subsidiaries.
They use user-seductive interface e.g. color graphics and video which help the
user to grasp trends at a glance.
Provide access to a variety of databases both from internal and external
sources through a uniform standard interface.
Provide both the current status and the projection of
30 | P a g e D. Kosgei
MIS
data.
Allow easy tailoring to the preferences of a particular user or group of
users e.g.
Windows XP.
They have the capabilities of drilling down the data.
They create a generalized computing and communication environment rather
than providing any fixed application of a specific capability.
They are designed to incorporate data about external event. e.g. new tax data
on competitors but also use summarized information from the DSS and the MIS.
They filter/compress and track critical data emphasizing the reduction of time
and effort required to obtain executive information.
Information is the average of internal and external data which are highly
summarized.
The processing involves the production of graphics and simulations whereas the information
outputs are projections and responses to the queries of the senior managers. Developing E.I.S
Executive need change rapidly and so high level executive expect success the first time.
This implies that the developers of E.I.S must consider the following:
1. Using prototyping techniques to develop a user-friendly system.
2. Including a facility for environmental scanning that uses internal and external data to detect problems
in organizational environment, strategic trends and opportunities.
3. Developing a system that is going to neutralize resistance that is likely to occur due to the E.I.S
potential of giving top executives the capabilities of examining manager’s work without their
knowledge.
4. Developing a system whose benefits can be quantified after it becomes operational. This is because
there is a problem of justifying the cost of a system that primarily supports unstructured work.
31 | P a g e D. Kosgei
MIS
8. Data analysis – This should include abroad range of functionalities from a simple calculation to
sophisticated modeling software.
9. Executive mail – This allows managers to incorporate Emails and attachments with minimum
keyboard interactions.
10. Time management – The time management component of an E.I.S should provide a calendar and a
suspense file for keeping track of important dates and timers.
11. Data retrieval – It should provide access to corporate files and databases which are linked to public
databases.
Benefits associated with E.I.S
1. Help to save the staff and executive time.
2. Help executive improve their understanding of the company and its environment.
3. They eliminate communication bottlenecks between the staffs, the management and the executives
which can show down the decision making process.
4. They provide executive with summarized and custom tailored data.
5. Their ability to analyze, compare and highlight trends ensure clearer and up to date information.
6. Flexibility in their use in that they put the data and the tool in the hands of executives without
addressing specific problems or imposing solutions.
Decision making is an integral part of management and occurs in every function and at all levels. Naturally the
type of decisions taken varies enormously but all decision makers have to go through a similar process. All of
them must decide by some means to choose the outcome or outcomes which are considered necessary or
desirable to them and to do so after some form of appraisal of the situation.
H.A. Simon, a leading authority on management decision making, considers that decision making comprises
four principal phases: finding occasions for making decisions, finding possible courses of action (i.e.
alternatives), choosing among courses of action, and evaluating past choices.
32 | P a g e D. Kosgei
MIS
Phase 1 Intelligenc Searching the environment for conditions calling for decisions.
e
Phase 2 Design Inventing, developing and analyzing possible courses of action.
This involves processes to understand the problem, to generate
solutions and the testing of solution for feasibility.
Intelligent
1. Is there a problem?Individuals collect information to identify problems
or
Design
Choice
Implementation
opportunities. This requires exceptional reporting and uses MRS & TPS.
33 | P a g e D. Kosgei
MIS
2. What are the alternatives?As you design you may make use of simulation and
prototyping which utilizes DSS and KWS
34 | P a g e D. Kosgei
MIS
which is likely to be taken at the highest level and for which decision rules are available using replacement
analysis and investment appraisal techniques.
Levels of decision making
Decision making takes place at each level of management in an organization although there are markedly
different characteristics at each level. Each level has substantially different information requirements. The
figure below summarizes the main characteristics and information requirements of the various levels.
Tactical
Figure below gives examples of decision making at the three levels with typical information requirements.
In practice, decisions should be taken at the level where they are most effective.
Managemen Decision examples Information requirements
t level
35 | P a g e D. Kosgei
MIS
Strategic Mergers and acquisitions, Market and economic forecasts, political and
new product planning, social trends, legislative, environmental and
capital investments, financial technological constraints and opportunities
structuring.
Peter Drucker says decisions should be made at the lowest possible level which accords with their nature, and
as close to the scene of action as possible. They should always be taken at the level which ensures none of the
activities and objectives affected is forgotten.
There is increasing evidence that many decisions are being taken at lower levels in the hierarchy. Authority to
take decisions is being delegated down the line/ especially in modern service industries. This process is called
empowerment and means that the organization is able to answer queries and take a variety of decisions more
quickly thus providing a better and more flexible service. Empowerment is also one of the reasons why some
middle management jobs are disappearing.
Decision-making involves a number of steps which need to be taken in a logical manner. This is treated as a
rational or scientific 'decision-making process' which is lengthy and time consuming. Such lengthy process
needs to be followed in order to take rational/scientific/result oriented decisions. Decision-making process
prescribes some rules and guidelines as to how a decision should be taken / made. This involves many steps
logically arranged. It was Peter Drucker who first strongly advocated the scientific method of decision-making
in his world famous book 'The Practice of Management' published in 1955. Drucker recommended the
scientific method of decision-making which, according to him, involves the following six steps:
36 | P a g e D. Kosgei
MIS
1. Identifying the Problem: Identification of the real problem before a business enterprise is the first step in
the process of decision-making. It is rightly said that a problem well-defined is a problem half-solved.
Information relevant to the problem should be gathered so that critical analysis of the problem is possible.
This is how the problem can be diagnosed. Clear distinction should be made between the problem and the
symptoms which may cloud the real issue. In brief, the manager should search the 'critical factor' at work. It
is the point at which the choice applies. Similarly, while diagnosing the real problem the manager should
consider causes and find out whether they are controllable or uncontrollable.
2. Analyzing the Problem: After defining the problem, the next step in the decision-making process is to
analyze the problem in depth. This is necessary to classify the problem in order to know who must take the
decision and who must be informed about the decision taken. Here, the following four factors should be kept
in mind:
37 | P a g e D. Kosgei
MIS
4. Developing Alternative Solutions: After the problem has been defined, diagnosed on the basis of relevant
information, the manager has to determine available alternative courses of action that could be used to solve
the problem at hand. Only realistic alternatives should be considered. It is equally important to take into
account time and cost constraints and psychological barriers that will restrict that number of alternatives. If
necessary, group participation techniques may be used while developing alternative solutions as depending
on one solution is undesirable.
5. Selecting the Best Solution: After preparing alternative solutions, the next step in the decision-making
process is to select an alternative that seems to be most rational for solving the problem. The alternative thus
selected must be communicated to those who are likely to be affected by it. Acceptance of the decision by
group members is always desirable and useful for its effective implementation.
6. Converting Decision into Action: After the selection of the best decision, the next step is to convert the
selected decision into an effective action. Without such action, the decision will remain merely a declaration
of good intentions. Here, the manager has to convert 'his decision into 'their decision' through his leadership.
For this, the subordinates should be taken in confidence and they should be convinced about the correctness
of the decision. Thereafter, the manager has to take follow-up steps for the execution of decision taken.
7. Ensuring Feedback: Feedback is the last step in the decision-making process. Here, the manager has to
make built-in arrangements to ensure feedback for continuously testing actual developments against the
expectations. It is like checking the effectiveness of follow-up measures. Feedback is possible in the form of
organized information, reports and personal observations. Feedback is necessary to decide whether the
decision already taken should be continued or be modified in the light of changed conditions.
38 | P a g e D. Kosgei
MIS
The term "Information Resources" incorporates three broad categories of "information stuff" essential to the
modern business enterprise: the large mass of stored data (DATA); the huge volume of application system
program code (APPLICATION SOFTWARE); and the numerous networked hardware components, along
with the operating programming that makes it all work (TECHNOLOGY). These three components, working
together, allow the enterprise to produce and use the information required to effectively operate, compete, and
manage on a daily basis. The information resources of most large enterprises represent a significant cost
factor, yet interestingly, most enterprises do not manage these critical and expensive resources like they do all
other resources. All of the "Big Five" resources (human, financial, equipment, material, and facilities) have
very effective management discipline, based on several universal resource management principles:
• Responsibility and authority must be clearly designated to manage the limited resource on behalf of the
enterprise.
• The resource is not free; limitations must be recognized, and managed so there is enough when and
where needed, but waste and unused excess are costly mistakes.
39 | P a g e D. Kosgei
MIS
• The resource must be controlled, and allocated so it is available when and where needed, and should
serve the highest priorities first.
• The resource must be constantly tracked: the enterprise must always know how much of the resource it
has, where it is located, what condition it is in, how to access it when needed, etc.
• The resource must be properly stored and maintained so that it is ready and usable when needed.
• The resource must be forecast - the enterprise must think and plan ahead to ensure it will have
adequate supply of the resource when needed.
So, the term "Information Resource Management" simply means changing the way typical IS/IT is
implemented within the enterprise, so that it manages the information resources (DATA, APPLICATION
SOFTWARE, and TECHNOLOGY) like any other enterprise resource - the principles of how to properly and
effectively manage it are exactly the same.
Information Systems Resources (ISR) enables the use of information systems in administrative functions so
that those functions may be conducted in the most effective way possible. Information Systems Resources
includes Networks, Hardware, Software, Data & People
People
People are essential ingredient for the successful operation of all information systems. It includes end users
also called clients are people who use information system or the information it produces.
Hardware
It includes all physical devices and materials used in information processing. Example include computer
system which consists of CPU containing microprocessors
Software
It includes all set of information processing instructions. It includes not only the set of operating instructions
called programs System Software- such as operating system e.g windows, Ubuntu e.t.c Application software-
which are programs that direct processing for a particular use of computers by end users
40 | P a g e D. Kosgei
MIS
Data
Data resources of information systems are typically organized, stored and accessed by a variety of data
resources technologies into database that holds processed and organized data
Network
Telecommunications technologies and networks like the internet, intranets and extranets Communication
media-includes twisted pair cable, coaxial and fibre optic cable. Network infrastructure-this generic category
emphasizes that many hardware,software and data technologies are needed to support the operations.
Understanding Data
We've established that an information system is the combining of users, technology and processes to
complete a specific goal. A stakeholder isn't only a user but is someone who has any type of interest in a
particular process. These people utilize hardware and software, typically in a network format, to process raw
data into usable information.
Data is one piece of a record. Individually, some of your datum might be your first name, middle name, last
name, address, city, state, zip, phone number and occupation. When put together, we see a record.
The components of the system you can physically touch - the system unit (tower, desktop, laptop), internal
devices and peripheral devices (keyboards and monitors) - are called hardware.
Specifics of peripheral devices are provided in many other ways, but think of them as hardware that
surrounds the system unit.
41 | P a g e D. Kosgei
MIS
Few organizations have developed a comprehensive IRM strategy. Those that have started with some of its
key processes of information audit, and information mapping cite the following benefits:
• Identifies gaps and duplication of information
• Clarifies roles and responsibilities of owners and users of information
• Provide costs saving in the procurement and handling of information
• Identifies cost/benefits of different information resources
• Actively supports management decision processes with quality information
Information Society
Definition;
An information society is a society where the creation, distribution, uses, integration and manipulation of
information is a significant economic, political, and cultural activity. The aim of the information society is to
gain competitive advantage internationally, through using information technology (IT) in a creative and
productive way. The knowledge economy is its economic counterpart, whereby wealth is created through the
economic exploitation of understanding. People who have the means to partake in this form of society are
sometimes called digital citizens. This is one of many dozen labels that have been identified to suggest that
humans are entering a new phase of society.
The markers of this rapid change may be technological, economic, occupational, spatial, cultural, or some
combination of all of these. Information society is seen as the successor to industrial society.
The characteristics of information societies
Information societies have three main characteristics.
1. Information is used as an economic resource. Organizations make greater use of information to
increase their efficiency, to stimulate innovation and to increase their effectiveness and competitive position,
often through improvements in the quality of the goods and services that they produce. There is also a trend
towards the development of more information- intensive organizations that add greater amounts of value and
thus benefit a country’s overall economy.
2. It is possible to identify greater use of information among the general public. People use
information more intensively in their activities as consumers: to inform their choices between different
products, to explore their entitlements to public services, and to take greater control over their own lives. They
also use information as citizens to exercise their civil rights and responsibilities. In addition, information
systems are being developed that will greatly extend public access to educational and cultural provision.
42 | P a g e D. Kosgei
MIS
3. The development of an information sector within the economy. The function of the information
sector is to satisfy the general demand for information facilities and services. A significant part of the sector is
concerned with the technological infrastructure: the networks of telecommunications and computers.
Increasingly, however, the necessity is also being recognized to develop the industry generating the
information that flows around the networks: the information-content providers. In nearly all information
societies, this information sector is growing much faster than the overall economy.
The creation of individual information societies is taking place within a much greater, international process of
change. Partly this is because the developing information systems are global, or at least international, in their
reach: satellite broadcasting systems do not recognize national boundaries; telecommunication networks
provide connections between countries and continents, while the Internet is perhaps the ultimate example of a
global system.
Both developed and developing countries are being transformed into information societies. Most of them are
concerned to use information to improve their relative competitiveness or, at least, to retain their position in an
increasingly competitive global market. The development of information societies represents a series of
attempts to achieve more general economic and social advance.
There is a concern, however, that the shift towards information societies will increase the gap between the
developed and the developing countries. To counter this, the World Bank has recently launched its
Information for Development initiative.
43 | P a g e D. Kosgei
MIS
information, unlike most other goods, does not decrease as it is consumed; indeed, the value may
increase as one piece of information is added to others.
• The globalization of the information sector poses further problems. Someone working in Africa can
use the Internet to obtain information about a firm operating in Europe that has been compiled by an
American-owned information company based in Switzerland using a database that was compiled by
Eurostat, the statistical arm of the European Commission. Who regulates the information? Under
which set of laws is it collected, compiled, delivered and consumed. If the user has to pay for the
information, where does the revenue go? Which governments are entitled to levy a sales tax on the
information? To which set of national accounts should the financial transactions be credited? It is
possible to arrive at answers to most of these questions, but in doing so we raise further questions
about the ability of our economic and statistical systems to cope with the changes that are taking place.
Information systems planning (ISP) is a process of defining objectives for organizational computing and
identifying suitable potential information technology (IT) applicable to the company
1. Strategic Planning;
The purpose of this planning is to develop long-term objectives for the entire organization and for its
major business units and more so to specify the general strategies for acquisition of resources needed to
accomplish these objectives.
It includes the following:-
a) The establishment of broad long-term objectives for an enterprise.
44 | P a g e D. Kosgei
MIS
b) Accessing the company’s current position relative to these objectives and in particular
considering the threats and opportunities provided by the environment.
c) Considering alternative strategies for reaching the objectives in the competitive business
environment.
d) Outlining the organizational structure and the total resources needed to implement the plan.
e) The planning for the implementation process.
Planning can be TOP-DOWNS whereby the process starts with the senior management. This may ignore
what is going on at the bottom.
It can also be BOTTOM-UP where the junior staffs are encouraged to come up with their own
departmental
Define objective plans. However this may not align well with the strategic
objectives of the organization.
The Develop premises role that information systems play in the planning
process is to be used in developing plans such as
forecasting and identifying and comparing alternative
Identify alternative course of
causes of action. There is need therefore to make use of
actions
financial ratios to justify our various plans.
Formulate an implementation
plan
MIS
46 | P a g e D. Kosgei
MIS
Implementation and control
ii) In what environment will the plan be
carried out
iii) What are some of general ways of bridging the gap between the present and the objective
iv) How will the course of action be realized i.e. state the needed time, equipment, money,
labor etc.
v) Carryout the required activities and control the relevant premises.
The next major step in planning process is the assessment of the organization from an information
management perspective.
During these steps the major processes that are necessary to accomplish the mission successfully are needed to
support the process. This can be done by the following:-
47 | P a g e D. Kosgei
MIS
Once the study has been conducted the following would be the benefit:-
Conduct study D
Plan project D M M
Design project M D M
Construct project M D M
Operate project D
Maintain project M M D
49 | P a g e D. Kosgei
MIS
The business system plan should be reviewed and approved by all functional managers in organization, once
approved the plan is then passed into the next step that is process re-engineering.
50 | P a g e D. Kosgei
MIS
Project Management is a set of principles, methods and techniques for effective planning of objective-
oriented work, thereby establishing a sound basis for effective scheduling, controlling and re-planning in the
management of programs and projects.
In other words, it provides an organization with powerful tools that improve the organization's ability to
plan, organize, implement and control its activities and the ways it uses its people and resources.
A project is a non-repetitive one-of-a-kind activity normally with discrete time, financial and technical
performance goals. Normally a complex effort, usually less than 3 years in duration and it is made up of
interrelated tasks performed by various organizations.
The project management tools and principles provide the means for;
project breakdown into tasks and sub-tasks
finding interdependencies between the tasks
allocating resources, human and material and smoothing resources
estimation for total project duration and budget
monitoring more efficiently project progress
Project management ideas are equally applicable to small as well as very large projects (with small and large
number of tasks). However, the formal tools used are more appropriate for rather large projects.
There are many tools available to assist with accomplishing the tasks and executing the responsibilities. Some
require a computer with supporting software, while others can be used manually. Project managers should
choose a project management tool that best suits their management style. No one tool addresses all project
management needs. Program Evaluation Review Technique (PERT) and Gantt Charts are two of the most
commonly used project management tools and are described below
PERT is a planning and control tool used for defining and controlling the tasks necessary to complete a
project. PERT charts and Critical Path Method (CPM) charts are often used interchangeably; the only
difference is how task times are computed. Both charts display the total project with all scheduled tasks shown
in sequence. The displayed tasks show which ones are in parallel, those tasks that can be performed at the
same time. A graphic representation called a "Project Network" or "CPM Diagram" is used to portray
51 | P a g e D. Kosgei
MIS
graphically the interrelationships of the elements of a project and to show the order in which the activities
must be performed.
o Most likely time - the completion time having the highest probability.
From this, the expected time for each activity can be calculated using the following weighted average:
This helps to bias time estimates away from the unrealistically short timescales normally assumed.
5. Determine the critical path. The critical path is determined by adding the times for the activities in
each sequence and determining the longest path in the project. The critical path determines the total
calendar time required for the project. The amount of time that a non-critical path activity can be
delayed without delaying the project is referred to as slack time.
If the critical path is not immediately obvious, it may be helpful to determine the following four times
for each activity:
52 | P a g e D. Kosgei
MIS
These times are calculated using the expected time for the relevant activities. The earliest start and
finish times of each activity are determined by working forward through the network and
determining the earliest time at which an activity can start and finish considering its predecessor
activities. The latest start and finish times are the latest times that an activity can start and finish
without delaying the project. LS and LF are found by working backward through the network. The
difference in the latest and earliest finish of each activity is that activity's slack. The critical path then
is the path through the network in which none of the activities have slack.
6. Update the PERT chart as the project progresses. As the project unfolds, the estimated times can
be replaced with actual times. In cases where there are delays, additional resources may be needed to
stay on schedule and the PERT chart may be modified to reflect the new situation. An example of a
PERT chart is provided below:
<="">
53 | P a g e D. Kosgei
MIS
c Identification of repetitive planning patterns which can be followed in other projects, thus
simplifying the planning process.
d Ability to see and thus reschedule activities to reflect inter-project dependencies and resource
limitations following know priority rules.
e It also provides the following: expected project completion time, probability of completion
before a specified date, the critical path activities that impact completion time, the activities that
have slack time and that can lend resources to critical path activities, and activity start and end
dates.
Gantt charts
Gantt charts are used to show calendar time task assignments in days, weeks or months. The tool uses
graphic representations to show start, elapsed, and completion times of each task within a project. Gantt
charts are ideal for tracking progress. The number of days actually required to complete a task that reaches
a milestone can be compared with the planned or estimated number. The actual workdays, from actual
start to actual finish, are plotted below the scheduled days. This information helps target potential timeline
slippage or failure points. These charts serve as a valuable budgeting tool.
Sign of a failing information system project
Lack of User Input
Incomplete Requirements & Specifications
Changing Requirements & Specifications
Lack of Executive Support
Technical Incompetence
• Unclear objectives
• Unrealistic timeframes
• New or untested technology
Explaining control measures and technique of a failing information system project
An information system acquisition is the process of selecting and purchasing the hardware, software, and
services needed to create and maintain an information system. This process can be divided into three main
phases: planning, procurement, and implementation.
In the planning phase, organizations first identify their needs and then determine what type of system
would best meet those needs. They also create a budget and timeline for the project.
In the procurement phase, organizations solicit bids from vendors and select the vendor that will provide the
best value for the price.
In the implementation phase, organizations install the new system and train employees on how to use it.
The information system acquisition process is a critical part of ensuring that an organization has the right
tools in place to meet its information needs. By carefully planning and executing each phase of the process,
organizations can ensure that they get the best value for their investment and that the new system meets
their needs
1: Software Sustainability
Sustainability is a key component when assessing software. It speaks to both the stability of the software and
the vendor behind it. Companies seeking a I.S(Information System) application should be mindful that there
are hundreds of applications in the marketplace branded as the same information system the company is
looking for. Sometimes, it seems new vendor offerings appear daily. The technology employed provides
insight into how viable a product may be. Key questions to ask include: Is the product a “one-off”? Is it open
source? Can it support new platforms, such as Android, Apple and others?
2: System Features
Information System can provide a variety of features. Clearly, the core features encompass areas such as:
inventory management, lot or batch tracking, order processing functionality and product movement tracking.
Beyond these offerings, the application should run on multiple platforms.
3: Cost
Cost often is a more influential factor in smaller companies seeking Information System than in larger firms.
Still, the benefits a system provides should always carry more weight than the price tag.
4: Long-Term Supportability
Most experts estimate that annual system support costs average between 15 and 18 percent of the system
acquisition cost. Most companies are comfortable with this estimate. Cost is not the most important factor,
however. When it comes to supporting your firm, the more important questions are: Does the system vendor
want to learn about and understand my business? How dedicated is that provider to assuring that the system
keeps pace with my business as it grows and overall advancements in technology?
56 | P a g e D. Kosgei
MIS
1. SDLC: This is a methodology for developing an information system that partitions the system
development process into formal stages that must be completed sequentially with a very formal division
of labor between the user and the specialists.
The characteristics of this method are; i.
The development is in stage.
ii. Its advantages for large organizational systems e.g. T.P.S.
iii. Supports project planning and control organization of team development effort and the
production of a maintainable system.
iv. Relatively inflexible with respect to the user requirements that change during the
development cycle.
v. There is vigorous documentation.
vi. It can be costly and time consuming.
2. Prototyping: This is the provision of a model that is given to the users for them to clarify their
requirements and gain a measure of confidence in the general approach. In some cases the prototype is
upgraded through several iterations, thoroughly undergoing testing and documentation. In some cases
the prototype may be thrown away once the user requirements have been captured.
Characteristics
1. Development by gradually modifying an initial prototype based on feedback from the users.
2. It’s a relatively fast development with early availability of the first model of the system (the first
version).
3. Its advantageous when user requirements are uncertain.
4. It works well for project that are limited in size and for systems that are being computerized for the
first time. Typical application of this is the development of DSS.
5. Unless precautions are taken it may evolve into a quick and dirty system hampering maintenance.
Characteristics
i. It leads to increased user satisfaction and involvement.
ii. It reduces applications back-log (this is the queue of systems awaiting implementation)
iii. It requires tools such as the fourth generation languages which are user friendly.
iv. It leads to improve requirements determination.
v. It requires the involvement of information centers /helpdesk /hotlines.
57 | P a g e D. Kosgei
MIS
This concept of an organization centre was developed in Canada in 1974 by IBM to support end-user. Its part
and parcel of the corporate MIS function and its usually manned by technical people with extensive
knowledge of the business. It has the following functions.
a) Assisting the end-users in evaluating, selecting, installing and maintaining hardware and software i.e.
‘they help you choose the best’.
b) Provide assistance to end-users in accessing the data resource
c) It provides guidelines for system development and provides also modalities for preparing a prototype
using a 4th Generation language.
d) It supports all the installed software’s within the organization.
e) Acts as a nit to provide standards of end-user systems.
f) It also provides a hotline or helpdesk in giving assistance to users. If thus help keeping track for the
request and offer trouble shooting techniques.
g) Assist in setting standard and supports internal auditors in auditing the systems.
h) It trains end-users in operating systems that are to be introduced in the organization.
4. Off-the-shelf package
This is actually the purchase of a license to use the package. At times these packages may have to be
tuned to fit the needs of the user company. When purchasing an offthe-shelf package, requests for
proposals are sent to potential suppliers. This document outlines the requirements of the organization
and asks questions as to how the vendor systems may satisfy them.
The selection is based on the characteristics of the software package and the requirements that the user
organization wants.
Characteristics
i. They are more reliable and have better documentation than internally produced systems. ii. They often
need to adjust work within the organization to fit the needs of the package. iii. It may cost the company
to forego competitive advantages, if this was done internally. iv. It satisfies most user requirements due
to the fact that it has been developed by experts.
v. Due to its mass production its relatively cheaper to buyer and that the implementation is quick.
5. Outsourcing
This is the hiring of external firms known as the software houses or system integrators to develop and
install systems that can easily be executed. They also perform other services i.e. developing strategic
plans to carryout organizational functions. In the rather case we refer to this as facility management.
Outsourcing is necessary and appropriate in the following circumstances:1. When you want to reduce
development cost.
2. Relief the firm from the burden of developing the system.
3. When the firms existing information systems capabilities are limited, ineffective or technical inferior.
4. When the company needs to off-load some of pending workloads from the I.S. department.
58 | P a g e D. Kosgei
MIS
Problems of outsourcing
1. The firm may lose control over the I.S function i.e. No control over the type of software or hardware
being used.
2. There is total vendor dependency i.e. the firm may have to pay whatever the vendor charges and
accept whatever he does.
3. If the firm lacks expertise to negotiate a sound contractor, this dependency may eventually lead to
loose of control over the technical direction.
4. Trade secrets may leak to outsiders and the company may lose competitive advantage.
1. End-user End-User
2. M.I.S Developer
3. Management
Developers Management
END-USERS:- It’s the function of the end-user to prepare their information requirement and to ascertain the
working environment of the system developed by making sure that the system interfaces are proper.
M.I.S DEVELOPERS: - Their function is to implement system that satisfy user requirement as well as the
objectives of the management by establishing that they have adequate resources, develop a quality system
and meet the development constraints.
MANAGEMENT: - It’s the function of the management to control and allocate resources that go in the
development of the system and to approve the various stages in the process.
59 | P a g e D. Kosgei
MIS
60 | P a g e D. Kosgei
MIS
Technology
Procurement
Primary Inbound Operations Outbound Sales and Servicin g
activities logistics logistics marketin g
This model highlights the primary and support activities that add a margil of value to products or services
where information systems can be best applied to achieve competitive advantage.
Primary activities would include:
Inbound logistics
• Operations
• Outbound logistics
• Sales and marketing
• Servicing
Support activities make to delivery of the primary activities of a firm possible e.g. the organization
infrastructure, human resource management, technology and procurement. Competitive advantages when a
company provides more value to a customer or when they provide the same value at a lower cost. These can
be achieved in the following way.
(i) A business can save money in the primary activities by having suppliers stick to fight delivery
schedules.
(ii) A company can make use of technologies such as CAD/CAM thus reducing the cost of producing
better goods in a manufacturing firm.
(iii) By having electronic scheduling and massaging systems or making use of office automation
technology to improve the company image.
(iv) By making use of information system in sales and marketing a company can explore the
capabilities existing on the internet.
62 | P a g e D. Kosgei
MIS
Systems maintenance involves cleaning, changing and enhancing the systems to make it more useful in
achieving users and organizational goals.
Maintenance is the process of modifying an information system to continually satisfy organizational and user
requirements. There is a vast difference between hardware and software maintenance in costs as well as in
objectives. This means changing the application to adapt to a new hardware or software environment.
In some cases an organization will encounter major problems that will involve redesigning the entire system
development process.
Importance of IS maintenance
Whether the computer is new or old problems can pop up at any time. By using regular IT servicing one can get
the jump on problems and make arrangements so that the business isn’t impacted. Using regular IT servicing
one can also help reduce IT support costs by fixing during scheduled maintenance windows where other work is
scheduled.
Viruses and malware are a pain to any business, virus writers actively seek to disrupt the business and access
files the network. When the computer is infected a number of symptoms may be felt, from annoying slowdowns
to popup messages or contacts emails about strange email you apparently sent them. If your IT system is
compromised the business could be used as a launching pad to infect other businesses, which can have
consequences as companies start black listing your email address.
If antivirus software is kept up to date then it greatly reduces the chance of a virus infection as commonly
known IT loopholes are closed to hackers and virus writers.
Over time, files that are stored on the computer can become disorganized and fragmented, this results in slow
loading times and delayed access to programs and files. By regularly running speed checks and smart
optimization, we can speed up the computers loading times and take care of those annoying pauses when one is
busy and need quick and efficient access to the files and software.
Antivirus software is vital and every PC should be protected but having antivirus software installed isn’t the end
of your IT security – it needs to be up-to-date and working as intended .
63 | P a g e D. Kosgei
MIS
When it comes to making necessary changes, most companies modify their existing programs instead of
developing new ones. i.e. if new system needs are identified, then the old programs are repeatedly modified
to meet the even changing needs.
Over a period of time these modifications tend to interfere with the system overall structure, reducing its
efficiency and making it more difficult to modify future cases.
Types of maintenance
a) Adaptive maintenance refers to the changes made to a system to evolve its functionality to changing
business needs or technologies.
b) Corrective maintenance refers to changes made to a system to repair flaws in its design, coding, or
implementation.
c) Perfective maintenance refers to changes made to a system to add new features or to improve performance.
d) Preventive maintenance refers to changes made to a system to avoid possible future problems.
e) Predictive Maintenance: It pursues constantly know and report the status and operational capacity of the
installations by knowing the values of certain variables, which represent such state and operational ability.
To apply this maintenance, it is necessary to identify physical variables (temperature, vibration, power
consumption, etc.). Which variation is indicative of problems that may be appearing on the equipment. This
maintenance it is the most technical, since it requires advanced technical resources, and at times of strong
mathematical, physical and / or technical knowledge.
64 | P a g e D. Kosgei
MIS
f) Zero Hours Maintenance (Overhaul): The set of tasks whose goal is to review the equipment at scheduled
intervals before appearing any failure, either when the reliability of the equipment has decreased
considerably so it is risky to make forecasts of production capacity . This review is based on leaving the
equipment to zero hours of operation, that is, as if the equipment were new. These reviews will replace or
repair all items subject to wear. The aim is to ensure, with high probability, a good working time fixed in
advance.
g) Periodic maintenance (Time Based Maintenance TBM): the basic maintenance of equipment made by
the users of it. It consists of a series of elementary tasks (data collections, visual inspections, cleaning,
lubrication, retightening screws,…) for which no extensive training is necessary, but perhaps only a brief
training. This type of maintenance is the based on TPM (Total Productive Maintenance).
1. Emergency Maintenance:
This is due to the malfunction or “bug” in the system where maintenance is urgent and usually calls for
immediate attention.
The malfunction is because it has not been tested completely, even though the system must have run perfectly
for months or even years. The information system user usually identifies the malfunction. Then a team of
analysts and programmers should rectify it if the malfunction is in computer program and caused by a system
input.
2. Routine Maintenance:
Routine Maintenance is required to keep systems performance in order as it reflects the organization
environment. The activities may be rewriting manual procedures, conducting training sessions, altering report
formats and contents and forming new processing logic for computer programs.
These are periodic requests for tactical and strategic management information, which does not come under
routine production. These special requests can be satisfied directly by a user with a database management
system and the analyst assists in preparing the necessary procedures for the request, e.g. A special report on
selected products during a sales promotion or a special analysis of a particular vendor’s delivery performance.
65 | P a g e D. Kosgei
MIS
The personnel working in the information system do not wish to spend most of their time maintaining or trying
to patch up systems designed and implemented years ago. In some organizations, the programmers are rotated
once in a year.
By this the programmers will have new assignments, the experience base of the personnel is broadened, better
ideas are being proposed and evaluation of the personnel and the performance of two or more persons and the
several project leaders can be compared.
1. Maintenance programming causes more failure than the developing programming. If the maintenance
programmer is not familiar with the program, the management should assign complex maintenance
problems to the most knowledgeable people to avoid failure.
2. If the documentation is poor and changes will result in serious failure and to overcome this, the
management is responsible to ensure that all programs are properly documented.
3. Extra training cost will go up maintaining for older applications that use outdated programming languages
that run under primitive operating systems. The situations like facing inadequate documentation, a variety of
incompatible hardware/software configurations, outdated equipment and procedures will give rise to
manageable conditions with severe problems of maintenance that continue indefinitely.
Maintenance Costs
Several factors influence maintenance costs. Three of these are very important:
defects,
customers, and
Documentation quality.
1. The number of latent defects refers to the number of unknown errors existing in the system after it is
installed. Because corrective maintenance accounts for most maintenance activity, the number of latent
defects in a system influences most of the costs associated with maintaining a system. If there are no errors
in the system after it is installed, then maintenance costs will be relatively low. If there are a large number of
defects in the system when it is installed, maintenance costs will likely be high.
2. A second factor influencing maintenance costs is the number of customers for a given system. In general,
the greater the number of customers, the greater the maintenance costs.
3. A third major contributing factor to maintenance costs is the quality of system documentation. Without
quality documentation, maintenance efforts can increase exponentially.
Techniques of maintaining an information system
Software companies and many other organizations use the following 4 categories to signify the amount of
change. These would include;- 1. Slip steam maintenance
2. Patch
3. New release
4. A version
A Slip Stream
66 | P a g e D. Kosgei
MIS
This is a minor upgrade – Typically a code adjustment or a minor bug fix, not worthy announcement. It usually
requires recompiling of the code and in so doing it may create entire new bugs. These practice accounts for
the various variations that we notice on a software that is running or similar machine.
A Patch
This is a minor change to correct a problem. It’s usually an addition to an existing program i.e. the
programming code representing the system enhancement fix is usually patched into or added to the existing
system code e.g. Microsoft releases patches which they call service packs to correct the bugs that were in the
internet explorer and Windows 95.
In correcting the problem this opened a way for hackers and unscrupulous website operators to read the
contents of the files of the users.
A New Release
Is a significant program change that often requires changes in the documentation of the software?
A new version
Is a major program change that brings many new features?
2.
67 | P a g e D. Kosgei
MIS
Organization Change
Organizations in both the public and private sectors are faced with an apparently ever-increasing rate of change
and must learn to cope with this problem. Change occurs in many ways: competitive pressures (e.g. a
competitor introduces a new model or reduces prices), legislative changes (e.g. the introduction of the National
Curriculum in UK schools), the operating environment (e.g. the challenge of online share dealing to traditional
stock brokers), changing client/consumer preferences (e.g. the desire for more leisure or more environmentally
friendly products), the introduction of new technology (e.g. computer networks, third generation telephones)
and many more. In addition to dealing with the change itself, management must cope with the resistance to
change often encountered from staff, clients, customers or trade unions.
Organizations do not automatically adjust to change. Adaptation only occurs as a result of management actions.
These may cause changes in the way the organization takes decisions, in the processes used, in the services or
products, or in the structure of the organization itself. Only one thing is certain: the organization that clings to
rigid, traditional methods in the midst of rapid change will be an unsuccessful organization.
68 | P a g e D. Kosgei
MIS
• Lewin suggested that change, or the lack of it, is caused by the interaction of two sets of opposing
forces. One set is termed the driving forces i.e. the forces attempting to bring about change, the other set
being termed restraining forces which act in the opposite direction and seek to maintain the status quo.
Information systems have become integral, online, interactive tools deeply i nvolved in the minute-to-minute
operations and decision making of large organizations. Over the past decade, information systems have
fundamentally altered the economics of organizations and greatly increased the possibilities for organizing
work. Theories and concepts from economics and sociology help us understand the changes brought about by
IT.
1. Economic Impacts From the point of view of economics, IT changes both the relative costs of capital and
the costs of information. Information systems technology can be viewed as a factor of production that can be
substituted for traditional capital and labor. As the cost of information technology decreases, it is substituted for
labor, which historically has been a rising cost. Hence, information technology should result in a decline in the
number of middle managers and clerical workers as information technology substitutes for their labor. As the
cost of information technology decreases, it also substitutes for other forms of capital such as buildings and
machinery, which remain relatively expensive. Hence, over time we should expect managers to increase their
investments in IT because of its declining cost relative to other capital investments.IT also affects the cost and
quality of information and changes the economics of information. Information technology helps firms contract
in size because it can reduce transaction costs—the costs incurred when a firm buys on the marketplace what it
cannot make itself. According to transaction cost theory, firms and individuals seek to economize on transaction
costs, much as they do on production costs. Using markets is expensive because of costs such as locating and
communicating with distant suppliers, monitoring contract compliance, buying insurance, obtaining information
on products, and so forth (Coase, 1937; Williamson, 1985). Traditionally, firms have tried to reduce transaction
costs through vertical integration, by getting bigger, hiring more employees, and buying their own suppliers and
distributors, as both General Motors and Ford used to do. Information technology, especially the use of
networks, can help firms lower the cost of market participation (transaction costs), making it worthwhile for
firms to contract with external suppliers instead of using internal sources. As a result, firms can shrink in size
69 | P a g e D. Kosgei
MIS
(numbers of employees) because it is far less expensive to outsource work to a competitive marketplace rather
than hire employees. For instance, by using computer links to external suppliers, automakers such as Chrysler,
Toyota, and Honda can achieve economies by obtaining more than 70 percent of their parts from the outside.
Information systems make it possible for companies such as Apple Cisco Systems and Dell Inc. to outsource
assembly of iPhones to contract manufacturers such as Foxconn instead of making their products themselves.
2. Organizational and Behavioral Impacts Theories based in the sociology of complex organizations also
provide some understanding about how and why firms change with the implementation of new IT applications.
Behavioral researchers have theorized that information technology facilitates flattening of hierarchies by
broadening the distribution of information to empower lower-level employees and increase management
efficiency (see Figure 3.6). IT pushes decision-making rights lower in the organization because lower-level
employees receive the information they need to make decisions without supervision. (This empowerment is also
possible because of higher educational levels among the workforce, which give employees more capabilities to
make intelligent decisions.) Because managers now receive so much more accurate information on time, they
become much faster at making decisions, so fewer managers are required. Management costs decline as a
percentage of revenues, and the hierarchy becomes much more efficient. These changes mean that the
management span of control has also been broadened, enabling high-level managers to manage and control
more workers spread over greater distances. Many companies have eliminated thousands of middle managers as
a result of these changes.
3. The Internet and Organizations The Internet, especially the World Wide Web, has an important impact on
the relationships between many firms and external entities and even on the organization of business processes
inside a firm. The Internet increases the accessibility, storage, and distribution of information and knowledge
for organizations. In essence, the Internet is capable of dramatically lowering the transaction and agency costs
facing most organizations. For instance, a global sales force can receive nearly instant product price information
updates using the web or instructions from management sent by e-mail or text messaging on smartphones or
mobile laptops. Vendors of some large retailers can access retailers’ internal websites directly to find up-to-the-
minute sales information and to initiate replenishment orders instantly. Businesses are rapidly rebuilding some
of their key business processes based on Internet technology and making this technology a key component of
70 | P a g e D. Kosgei
MIS
their IT infrastructures. If prior networking is any guide, one result will be simpler business processes, fewer
employees, and flatter organizations than in the past.
4. Implications for the Design and Understanding of Information Systems To deliver genuine benefits,
information systems must be built with a clear understanding of the organization in which they will be used. In
our experience, the central organizational factors to consider when planning a new system are the following:
The structure of the organization: hierarchy, specialization, routines, and business processes
The principal interest groups affected by the system and the attitudes of workers who will be using the
system
71 | P a g e D. Kosgei
MIS
1. Put people first Successful change management prioritizes people. People fuel change and sustain its
momentum. Change initiatives fail when the people involved don’t understand, believe in or engage in the
change. Leaders make change easier when they engage employees in the change. Leaders accomplish this
through proactive change management communication that creates a desire to change across the
workforce. This aligns with the Prosci change methodology, Beehive’s change model of choice. Prosci’s
methodology is based on more than 20 years of research, with 45,000 people trained and certified
globally, making it a strong option for global businesses. Change initiatives will fail if people don’t believe
in the change and aren’t mobilized by others to act. Change Management: The essential guide to
transformational growth. Download this guide.
2. Work with a change management model Leaders are up against company culture, organizational
momentum and human psychology when enacting change. To make change happen, they need the right
tools to guide them. Change management models help leaders connect business strategy to action, which
increases the likelihood of success. There are a variety of change management models from which to
choose (e.g., Prosci’s ADKAR model, Lewin’s Change Management Model, Kotter’s Change Management
Model). Each model varies, but all follow similar core tenants of identifying needs and planning for and
implementing change. Prosci’s methodology is Beehive’s change management model of choice because it:
1) blends the psychology of individual change with organizational change, 2) is globally backed with more
than 20 years of research and 3) clearly addresses the role of communication in change.
72 | P a g e D. Kosgei
MIS
embrace change and participate in making it happen. Two-way communication also helps leaders identify
barriers to change before they become a problem. Proactively identifying barriers can enable the
organization to respond to and dissolve issues that create change resistance.
4. Activate leadership A recent Prosci survey cited “active and visible executive sponsorship” as the top
reason change initiatives succeed. Leadership’s impact on change is well-understood. The problem is that
many leaders don’t understand the vital role they play in change. Educate leaders on their roles, and you’ll
enable them to advance change successfully. Leaders: are responsible for achieving change goals from
start to finish. help the organization understand and interpret what the change means for their teams, the
organization and the marketplace. ensure those who enable organizational change stay actively involved.
keep the train on the tracks and are ready to switch directions, choose a new path or create a new
approach if necessary.
5. Make change compelling and exciting Employees can better understand the rationale behind a change
when organizations prioritize purposeful, clear and consistent communication. This targeted
communication strategy provides the context to understand the why, what and so what of the change.
Effective communication answers the most important question people are thinking: What does this mean
to me; how will it impact my work? With a deeper, clearer understanding of the change, employees are
much more likely to ask, “How can I help?” The shift from rote compliance to true engagement and belief
is powerful. Strong employee support deters change resistance that could hold the organization back.
73 | P a g e D. Kosgei
MIS
6. Pay attention to high and low points in momentum There will be both high and low points during
change initiatives. Leaders can proactively manage and leverage these points in time. During the high
points of change, leaders should celebrate wins to fuel momentum. At the low points, leaders can reset
communication strategies to listen to employee input and build trust and support. Being proactive helps
leaders manage momentum for the greatest success.
Ethics refers to the principles of rights and wrong that can be used by individuals acting as free moral agents
to make choices to guide their behavior. Information systems raise new ethical questions for both individuals
and society because they create opportunities for intense social change and they threaten existing distribution
of power, money, rights and obligations. These issues have 5 dimensions.
1. Information rights and obligations – what rights do individuals and organization posses with respect to
information about themselves?
What can they protect?
What obligation do individuals and organization have a conceiving this information?
74 | P a g e D. Kosgei
MIS
2. Property rights – How will traditional property rights be protected in a digital society in which trading
and accounting for ownership is difficult and ignoring such property rights is it so easy.
3. Accountability and control – who will be held responsible, accountable and reliable for the harm done
to individuals and their property rights.
4. System quality – what standards of data and system quality should we demand to protect the
individual rights and the safety of the society.
5. Quality of life – what values should be preserved in information and knowledge based society?
What institution should we protect from violation?
What actual values and practices are supported by the new technology?
Ethical Principles:-
1) The golden rule – do unto other as you would have them do unto you.
2) Kant’s categorical imperative – if an action is not right for everyone to take then it’s not right for anyone to
take.
3) Descarte’s rule of change – if an action can’t be taken repeatedly, then it’s not right to be taken at any
time.
4) Utilization principle – take the action that achieves the higher or greater value.
5) Risks aversion principle – take the action that products the lease lewd on the least potential cost.
75 | P a g e D. Kosgei
MIS
6) No free lunch – virtually all tangible and intangible objects are owned by someone unless there is a specific
declaration otherwise.
2. AT & T Telephone Company uses technology to monitor employees’ responses to customer. It hopes to
eliminate 3000 to 6000 employees by identifying speech that is unpractical and summary.
3. E-mail-privacy at Epson – in 1990 an employee of Epson sued the company for $75,000,000 for
unlawful termination. She was fired because of questioning the company’s policy of monitoring and
printing of employees.
4. Mails messages – many firms claim the right to open mail because they own the facility. They are
intended for the business only and create this facility for a business purpose.
Other ethical issues concerning technology include;
1. Employment – is have been known to lead to loss of jobs and hence a decline in quality of life.
76 | P a g e D. Kosgei
MIS
2. Equity Access and increasing ratio and social classes – Does everyone have an equal opportunity to
participate in the digital age? Will the gaps increase or reduce.
Support
Low Turnaround
Any of the organization in existence has to fall in any of the above four quadrants.
1. Strategic quadrant – information systems planning is critical to the current and future performance of
the firm. I.S planning must be closely linked to corporate planning.
2. Turn-round is – information systems planning is very importance to the future performance of the firm,
without I.S planning, performance will suffer significantly in the long-run I.S planning must be closely
linked to corporate planning.
3. Factory – I.S planning is needed for the information systems activity to be coordinated and to run
smoothly. It’s important to the current company performance, but it’s not expressed to be a critical
factor in the future.
4. Support – I.S planning is still needed for the I.S activity to be coordinated and to run smoothly. It’s not
critical to the current company performance and is very unlikely to be of strategic importance in the
future.
Example:
1. Support – this could be an organization that has developed a system to automate some of the clerical
procedures and it has no intention of investing in I.T in the near future.
2. Factory – this could be an organization that has developed a network which is quite useful in day-to-
day running of company activities and has no intention further in
I.T.
3. Turnaround – are organizations that one currently not using I.T. for nay strategic use but there future
survival will involve I.T. a lot, such as a university that is contemplating of having a virtual university i.e.
African Virtual University (A.V.U).
77 | P a g e D. Kosgei
MIS
4. Strategic – e.g a Bank that has invested in ATMs and any future survival in competing effectively is
alighted to I.T. e.g. loan portfolio management.
Maslow qualified human wants into a hierarchy of needs. Each lower want or need must be stratified before a
worker will seek rewards at the next higher level. Consider the levels starting with the most basic:-
1. Physiological needs – food, clothing and shelter. For the worker this means money. Many workers are
willing to work at relatively tedious jobs or at higher production rates given sufficient monetary
incentives.
2. Safety or security needs – for the worker this means overall job security. Also at the work site,
improving the safety environment will improve the working climate.
3. Social needs – worker seek “belonging” interms of work, this could mean having friendly co-workers,
comfortable interaction with management and being able to participate in company’s committees.
4. Self –esteem – workers strive for competence, desire some respect and seek to satisfy their egos. This
could be provided by making the work more challenging, adding more responsibility and providing
greater variety.
5. Self-fulfillment – when all other needs are fulfilled people become satisfied with life.
Computer crime
Information system control, threats to security, privacy and confidentiality in MIS operations
Electronic funds transfer systems, ICU (Intensive Care Unit) and air traffic control systems depend on
computers to function reliably and it’s estimated that they can’t survive a total failure of their information
systems processing capacity for longer than a day or two.
The relationship between threats to information systems control can be illustrated as follows:-
Identify the threats Some of the threats are due to human error, computer abuse,
natural and political disaster, hardware and software failure
Establish is control Ensure security, privacy and confidentiality via general and
application controls.
| P effectiveness
Check age and efficiency of systems and controls withJ . G A T A C H A financial and operational bodies.
Perform regular audit of 1S
78
MIS
Classes of threats
1. Human error – involves wrong input data, errors in program development or maintenance and
operator errors e.g. mislabeling the tapes.
2. Natural and political disasters – includes earthquakes, typhoons, tornados and hurricanes.
3. Failure to hardware and software – e.g. network and power failures and software maintenance.
4. Computer abuse and crime – using a computer to steal, sabotaging the system and authorized access
to a modification of data (hacking). Computer crime is any illegal act in which a computer is used as a
primary e.g. impersonification i.e. giving access to a system by identifying oneself as one person and
therefore enjoys privileges of the legitimate user.
TROJAN HORSE method i.e. conspiring within an authorized programme are routine of actions causing
unauthorized actions.
LOGIC BOMB i.e. programme who placed a logic bomb in his companies personnel system such that should his
name be upset from the personal file the entire file is erased.
• Computer viruses introduced deliberately.
• Data diddling i.e. changing of data during or before input often to change the contents of the database.
• Salami technique – this is diverting small amounts from large number of accounts maintained by a
system.
• Super-zapping – using a system program that can by pass regular system controls to perform
unauthorized act e.g. the IBM super-zap utility.
Super-zaps are provided to handle emergencies in systems such as restoring systems operations after a
multifunction that can’t be handled with a regular recovery method.
• Scavenging – its unauthorized access to information by searching via the residue after the job has been
run on the computer e.g. searching the waste paper basket for printouts etc.
• Wire tapping or carves-dropping
• Spoofing – collecting of confidential information from unsuspecting visitors to the website they visit.
Having defined controls as a set of policies, procedures and technological measures that are put
together an error or an attack of commuter systems from taking place detect the violation and correct
the exceptional situation. These controls can be categorized into general or application controls.
General controls:
1. Administrative – include separation of duties, constant supervision of staff, thorough screening of new
employees, published procedures and standards. These can also include disaster recovery planning or
contingency planning.
2. System development and maintenance control – systems should be secure and auditable.
Documentation should be maintained and should specify changes made to the system.
3. Operational controls – involve controlling access to system, maintenance of computer equipment and
storage and the day to day running of the company activities.
4. Physical protection of data centres – e.g. installation of air conditioning equipments, fire extinguishers
and UPS (uninterruptable power supply).
79 | P a g e D. Kosgei
MIS
5. Controlling access to computer system and information e.g. identification, authentification and
encryption. This may use the user’s knowledge e.g. the name, account number or password i.e. a smart
card with a microprocessor or a biometric control. This is the using of bodily features such as
fingerprints, hand geometry (chiromancy) , retrieval scanning and the signature.
6. Control as a last result e.g. adequate insurance for the residual risk or a disaster recovery plan.
Application controls
Implemented specifically for a particular information system e.g. a payroll system, account payable or order
processing system. They include;
1. Input control – this is to ensure accuracy, completeness and validation of input.
2. Processing control – e.g. cross-checking two computation which can also include reasonable checks
and rounding off.
3. Database controls – these include backups, recovery, file handling and authorization.
4. Communication controls – including encrypting and the use of digital signatures which should also be
encrypted.
5. Output controls .e.g. scheduling, handling(maintenance) and distribution.
80 | P a g e D. Kosgei
MIS
3. Validate totals contained in financial records. This is known as substantive testing. The extent of this
depends on the compliance results. If controls were operative their only a limited substantive testing
would be required.
4. Conclude the audit by reporting the findings to the corporate management with a detailed statement
of all the controls deficiencies discovered. The use of computer Aided Auditing Techniques (CAAT) can
be applied here.
Types of IS audit
1. System development audits: Audit staff advices members of development team to ensure that controls
are embedded in the original design.
2. Operational audits – they are periodically conducted on an I.S to ensure that proper system controls
exists and that they are being followed. They involve checking input data, processing and output.
3. Application audits – meant to validate the integrity of an I.S. It involves identifying all the controls that
govern individuals I.S and access their effectiveness. The auditor needs a thorough understanding of the
operations, physical facilities, telecommunication control systems, data security objectives, personnel,
organizational structure and manual procedures and individual applications.
81 | P a g e D. Kosgei
MIS
4. It eliminates the confusion, uncertainty and panic that results whenever a disaster happens by clearly
stating the actions to be undertaken in the event of such a disaster.
5. It facilitates the faster recovery from the disaster thereby reducing the impact.
3. Test plan – This includes drills and practices of what would happen in cases of emergency. It tests the
reliability of the back-up plans.
82 | P a g e D. Kosgei
MIS
4. Recovery plan – This includes arrangement on purchasing hardware and software to restore the original
company. This involves insurance arrangements, loans etc.
83 | P a g e D. Kosgei