Information Technology Notes PDF
Information Technology Notes PDF
Six Sigma is a set of strategies, techniques, and tools for process improvement. It
seeks to improve the quality of process outputs by identifying and removing the
causes of defects and minimizing variability in manufacturing and business processes.
It was developed by Motorola in 1986.
Business Process Management (BPM): BPM may be defined as: “The achievement of
an organization’s objectives through the improvement, management and control of
essential business processes”.
Page | 1
Organization: The organization in this context refers to an enterprise
or parts of an enterprise.
Objectives: The objectives of a BPM implementation range from the
strategic goals of the organization. BPM is not an objective in itself, but
rather a means to achieving an objective.
Improvement: It is about making the business processes more efficient and
effective.
Management: It refers to the process and. By this we mean arranging
the people, their skills, motivation, performance measures, rewards, the
processes themselves and the structure and systems necessary to support
a process.
Control: It has been said that BPM is about managing our end-to-
end business and If we cannot measure something, we cannot control
and manage it.
Essential: Not every process in an organization contributes towards the
achievement of the organization’s strategic objectives. Essential processes
are the ones that do.
BPM Principles:
1. BPM’s first principle is processes are assets that create value for
customers. They are to be continuously improved. Core processes
and processes that generate the most value to customers, should be
carefully managed.
2. A managed process produces consistent value to customers.
Page | 2
Management of processes entails the tasks of measuring, monitoring,
controlling, and analyzing business processes. Measuring of
business processes provides information regarding these business
processes. Process information allows organizations to predict,
recognize, and diagnose process deficiencies, and it suggests the
direction of future improvements.
3. The third principle is continuous improvement of processes. The
business environment usually dictates that organizations need to
improve to stay competitive.
BPM Practices:
Some of the key Business Processes pertaining to accounting, sales and purchase are
explained below:
Accounting:-
Accounting covers the business processes involved in recording and processing accounting
events of a company, which will include the following transactions:
(a) Source Document: a document the capture data from transactions and
events (eg. Invoice, Cash Receipt).
(b) Journal: transactions are recorded into journals from the source document.
Page | 3
(c) Ledger: entries are posted to the ledger from the journal.
(d) Trial Balance: unadjusted trial balance containing totals from all
account heads is prepared.
(e) Adjustments: appropriate adjustment entries are passed.
(f) Adjusted Trial balance: the trial balance is finalized post adjustments.
(g) Closing entries: appropriate entries are passed to transfer
accounts to financial statements.
Sales:-
The typical life cycle of a sales transaction which may include the following
transactions:
(i) Customer Order: a purchase order received from a customer specifying
the type, quantity and agreed prices for products.
(ii) Recording: availability of the items is checked and customer order is booked.
(iii) Pick release: the items are moved from the warehouse to the staging area.
Page | 4
(iv) Shipping: the items are loaded onto the carrier for transport to the customer.
(v) Invoice: invoice of the transaction is generated and sent to the customer.
(vi) Receipt: money is received from the customer against the invoices.
Purchase:-
Typical life cycles of a purchase transaction which may include the following
transactions are stated below:
(a) Purchase requisition: a document is prepared requesting the purchase
department to place an order with the vendor specifying the quantity
and time frame.
(b) Request for quote: an invitation is sent to the vendors to join a
bidding process for specific products.
(c) Quotation: the vendors provide cost quotations for the supply of products.
(d) Purchase order: a commercial document is issued to the vendor
specifying the type, quantity and agreed prices for products.
(e) Receipts: the physical receipt of goods and invoices.
(f) Payments: the payments are made against the invoices.
Page | 5
processes. Organizational business process to manage incoming raw
materials provided by a set of suppliers is an example of an
organizational business process.
The strategy of a company, its goals, and its organizational business
processes can be described in plain text, enriched with diagrams.
Operational Business Processes: These are the processes that constitute the core
business and create the primary value stream. Few examples of Operational Processes
are purchasing, manufacturing, advertising, marketing and sales.
BPM Implementation
Factors to consider in implementing BPM:
Scope: A single process, a department, the entire company
Goals: Process understanding, improvement, automation, re-engineering,
optimization
Methods to be used: Six Sigma, BPM Life Cycle Method, TQM, Informal methods
Skills Required: Consultants, Train Employees, Formal Certification, Basic
Education, Existing Skill sets
Tools to be used: White-Boards, Sticky Notes, Software For Mapping, Software for
Simulation
Investments to Make: Training, Tools, Time
Page | 6
Need for a BPM implementation:
Create the long-term future positioning of the business and enhance its
future capability;
Create short-term cost effectiveness and improvement to current
customer service;
Initiate continuous improvement from the base of the current, but
improved, processes;
Introduce a knowledge of product and customer profitability;
Re-engineer the business radically and provide clear future competitive
differentiation;
Address the cultural barriers that prevent effective cross-functional and
hierarchical working;
Introduce leadership and a role for managers and empowered staff.
BPM Technology
BPM = Process and Organization (including people) + Technology
By including Technology in BPM, the organization can manage the flow of activities along
different applications, and the people involved and also reduce execution time.
Page | 7
Six business functions of the value chain are as follows :
(i) Research and development
(ii) Design of products, services, or processes
(iii) Production
(iv) Marketing and Sales
(v) Distribution
(vi) Customer service
Benefits:-
Saving on costs: Automation leads to saving in time and labour costs.
Staying ahead in competition: Today, in order to survive, businesses
need to adopt automation
Fast service to customers: Business managers realized that
automation could help them to serve their customers faster and
better.
Risks:-
Risk to jobs: Jobs that were earlier performed manually by several
employees would post-automation would be mechanized, thereby
posing a threat to jobs.
False sense of security: Automating poor processes will not gain
better business practices.
Page | 8
Accounting Systems Automation
An Accounting Information System which is known as AIS is defined as a system of
collection, storage and processing of financial and accounting data that is used by
decision makers. An accounting information system is generally a computer-based method
for tracking accounting activity
Page | 9
Ledger. It involves capturing and recording of customer orders; shipment of the
goods; and recording of the cost of goods sold. The billing process and the
recording of sales and accounts receivable; the capturing and recording of
cash receipts.
(vi) Data Processing Cycle: It may be noted, that all the above cycles
of processing involves data processing activities which has been
updated and stored. The stored information has details about the
resources affected by the event and people / personnel who
participated in the activity.
Page | 10
Impact of IT on BPM and Risks of failure of IT
BPM Systems or suites (BPMS) are a new class of software that allows enterprises to devise
process centric IT solutions.
Benefits of BPMS
BPMS, as a technology, can deliver endless benefits to any sized organization but more
importantly these benefits are unique to a company:
Page | 11
are seeing the need to manage compliance as part of their everyday
business activities. The BPM is ideally suited to help support
companies in their quest for process improvement and
compliance/governance certification. It gives full control over
process and document change, clarity of inherent risks, and
ease with which process knowledge is communicated across the
company.
Page | 12
Business Process Reengineering
This has a few important key words, which need clear understanding:
Dramatic achievement means to achieve 80% or 90% reduction (in say,
delivery time, work in progress or rejection rate) and not just 5%, 10%
reduction. This is possible only by making major improvements and
breakthroughs, and not small incremental changes like in Total Quality
Management (TQM).
Radical redesign means BPR is reinventing and not enhancing or
improving. In a nutshell, a “clean slate approach” of BPR says that
“Whatever you were doing in the past is all wrong”, do not get biased
by it or reassemble, the new system is to be redesigned afresh.
Fundamental rethinking means asking the question “why do you do
what you do”, thereby eliminating business processes altogether if it
does not add any value to the customer. There is no point in
simplifying or automating a business process which does not add any
value to the customer.
Page | 14
3. Computer Networks & Network Security
Classifications of Networks:
Page | 15
Private Network Private Network is used by particular organization, particular
campus or particular enterprise only. This is a network that is not
available to the outside world. Intranet is an example of it.
Virtual Private A Virtual Private Network (VPN) is a network that uses a public
Network (VPN) network, such as the Internet, to provide secure access to
organization's private network. A key feature of a VPN is its
Leased Network ability to work
Dedicated over both
or leased linesprivate networks
exist to support as well as public
network
networks like the Internet. Using a method called tunneling, a
communication.
VPN use the same hardware infrastructure as existing Internet or
Intranet links.
5 Class V Media-based Classification
Page | 16
A MAN can support both data and voice. Cable television networks are examples
of MANs that distribute television signals. A MAN just has one or two cables and
does not contain switching elements.
Network Architecture
Network architecture refers to the layout of the network, consisting of the hardware,
software, connectivity, communication protocols and mode of transmission, such as
wired or wireless. Every computer network supports two basic network architectures:
Client-Server and Peer-to-Peer.
Page | 17
Advantages:
(i) A client server can be scaled up to many services that can also be
used by multiple users.
(ii) A client server enables the roles and responsibilities of a computing
system. This means that it can update all the computers connected to
it. An example of this would be software updates or hardware updates.
(iii) All the data is stored on the servers, which generally have far greater security
controls than most clients.
Disadvantages:
(i) When the server goes down or crashes, all the computers connected to it
become unavailable to use.
(ii) Simultaneous access to data and services by the user takes little more time for
server to process the task.
Advantages:
(i) Peer to Peer Networks are easy and simple to set up and only require a
Hub or a Switch to connect all the computers together.
(ii) It is very simple and cost effective.
(iii) If one computer fails to work, all other computers connected to it continue to
work.
Page | 18
Disadvantages:
(i) There can be problem in accessing files if computers are not connected
properly.
(ii) It does not support connections with too many compute rs.
(ii) The data security is very poor in this architecture.
Components of a Network
Page | 19
permitting the board to be mounted in a diskless workstation.
(ii) Switch and Router: These are hardware devices used to direct messages
across a network. Switches create temporary point to point links between
two nodes on a network and send all data along that link. Router is a kind of
connecting device which makes forwarding decisions of data packet on the
basis of network addresses.
The primary purpose of a router is to examine the source and destination IP
addresses of data packets it receives and to direct those packets out the
appropriate port and over the best path available at the time.
(iii) Hub: A hub is a multi port connecting device that is used to interconnect LAN
devices. Each node is connected to the hub by means of simple twisted pair wires. The
hub then provides a connection over a higher speed link to other LANs, the company’s
WAN, or the Internet. A hub can be used to extend the physical length of a network. Hubs
can be active or passive.
(iv) Bridges, Repeaters and Gateways: Workstations in one network often need
access to computer resources in another network or another part of a WAN.
For example, an office manager using a local area network might want to
access an information service that is offered by a WAN over the public phone
system. In order to accommodate this type of need, bridges and routers are often
Page | 20
necessary.
Bridges: The main task of a bridge computer is to receive and pass data
from one LAN to another. In order to transmit this data successfully, the
bridge magnifies the data transmission signal. This means that the bridge
can act as a repeater as well as a link.
Repeaters: These are devices that solve the snag of signal degradation
which results as data is transmitted along the various cables. The
repeater boosts or amplifies the signal before passing it through to the
next section of cable.
Gateways: Gateways are also similar to bridges in that they relay data
from network to network. They do not, as a rule, possess the management
facilities of routers but like routers they can translate data from one
protocol to another. Gateways are usually used to link LANs of different
topologies, e.g., Ethernet and Token Ring, so enabling the exchange of data.
(v) MODEM: MODEM stands for Modulator/Demodulator. In the simplest form, MODEM
is defined as an encoding as well as decoding device used in data transmission.
In other words, MODEM is a device that converts a digital computer signal into an
analog telephone signal (i.e. it modulates the signal) and converts an analog telephone signal
into a digital computer signal (i.e. it demodulates the signal) in a data communication system.
Modems are used for handling data flow from an input device to the CPU and vice versa
through the common carrier network. MODEMs are required to tele-communicate computer
data with ordinary telephone lines because computer data is in digital form but telephone lines
are analogue.
(vi) Protocol converters: Dissimilar devices cannot communicate with each other unless a
strict set of communication standards is followed. Such standards are commonly referred to
as protocols. A protocol is a set of rules required to initiate and maintain communication
between a sender and receiver device. Thus, a protocol converter is a device that
provides interoperability amongst networking devices by converting protocols of one device
to another.
Page | 21
(vii) Multiplexer (MUX): This device enables several devices to share one
communication line. The multiplexer scans each device to collect and transmit data on a
single line to the CPU. It also communicates transmission from the CPU to the
appropriate terminal linked to the Multiplexer. This process of continuously scanning by
multiplexer is called Polling. The devices are polled and periodically asked whether there is
any data to transmit.
(i) Guided Media: Guided Transmission Media uses a "cabling" system that guides the data
signals along a specific path. The types of guided media are described as follows:
Twisted-Pair Cables: These are most commonly used transmission media to transmit
electrical signals. Twisted-Pair cables contain pairs of insulated copper wires twisted
together. Twisting reduces the impact of interferences. There are two types of twisted-
pair cables called Unshielded Twisted-Pair (UTP) cable and Shielded Twisted-Pair
(STP) cable. Main difference between both cables is that, Shielded Twisted-Pair
(STP) cables are surrounded by an additional shielding, which makes STP cables more
secure, less prone to interferences but expensive.
Cost of these cable are comparably very low. Twisted-Pair cables can carry data at a
speed of 10 Mbps, 100 Mbps and 1000 Mbps and can transmit data up to 100 meters.
Co-axial cables: Also called as coax, these contain central copper wire as its core that is
surrounded by two layers of protective shielding. This shielding reduces
electromagnetic interference. Co-axial cables used in computer networks are of two
Page | 22
type thick co-axial and thin co-axial cable. Coax can transmit data at a maximum
speed of 10 Mbps up to 500 meters.
Optical Fiber : An optical fiber (or fiber) as shown in Fig 3.4.3.3 is a glass or plastic fiber
that carries light along its length. Fibers are used instead of metal wires because
signals travel along them with less loss, and they are immune to electromagnetic
interference. Optical Fiber cables permits transmission over longer distances and at
higher data rates (called bandwidth), than other forms of communications.
(ii) Unguided Media: Unguided Transmission Media consists of a means for the data
signals to travel but nothing to guide them along a specific path. The data signals are not
bound to a cabling media and as such are often called Unbound Media. Some of the
common examples of unguided media are Radio wave, Microwave and Infrared wave.
Page | 24
They are used extensively for high-volume as well as long-distance communication of both
data and voice. It is cost-effective method for moving large quantities of data over long
distances. However, satellites are very expensive to develop and place in orbit and have
an age limit of 7-10 years. Signals weaken over long distances; weather conditions and
solar activity can also cause noise interference.
Client: A client is a single-user workstation that provides a presentation services and the
appropriate computing, connectivity and the database services relevant t the business
need. Client computers can be classified as Fat Client, Thin Client or Hybrid Client.
Fat / Thick Client: A fat client or thick client is a client that performs the bulk of
any data processing operations itself, and does not necessarily rely on the
server. In, thick clients do not rely on a central processing server, but the
server is accessed primarily for storage purposes.
Thin Client: Thin clients use the resources of the host computer. A thin client
generally only presents processed data provided by an application server,
which performs the bulk of any required data processing. A thin client machine is
going to communicate with a central processing server, meaning there is little
hardware and software installed on the user's machine.
Hybrid Client: A hybrid client is a mixture of the above two client models.
Similar to a fat client, it processes locally, but relies on the server for storing
persistent data. This approach offers features from both the fat client
(multimedia support, high performance) and the thin client (high manageability,
flexibility). Hybrid clients are well suited for video gaming.
Page | 25
Multi-Tier Architecture
A single computer that contains a database and a front-end (GUI) to access the
database is known as Single Tier System. Generally, this type of system is
used in small businesses.
Page | 26
-By having simple structure, it is easy to setup and maintain entire system
smoothly.
n-Tier Architecture
Page | 27
Dynamic load balancing: If problems in terms of performance occur,
the server process can be moved to other servers at runtime.
Change management: It is easy and faster to exchange a component on
the server than to furnish numerous PCs with new program versions.
Page | 28
Network Computing
This type of arrangement does have some disadvantages. The central computer
performs the computing functions and controls the remote terminals. This type of system
relies totally on the central computer. Should the central computer crash, the entire system
will "go down" (i.e. will be unavailable).
Network Topologies
Four basic topologies used in wide area and local area telecommunications
networks are the:
1. Star network (Refer Notes)
2. Ring network
3. Bus network
4. Mesh Network
1. If one of the microcomputers fails, it will not affect the entire network.
2. Requires the least amount of cable to connect the computers together and
therefore is less expensive than other cabling arrangements.
3. Is easy to extend. Two cables can be easily joined with a
connector, making a longer cable for more computers to join the
network.
Ring Network:
A ring network is much like a bus network, except the length of wire, cable, or
optical fiber connects to form a loop. A ring network has a decentralized approach.When
one computer needs data from another computer, the data is passed along the ring.
1. Ring networks do not require a central computer to control activity nor does
it need a file server.
2. Each computer connected to the network can communicate directly with
the other computers in the network by using the common communication
channel, and each computer does its own independent applications
processing.
3. Ring networks are easily extendable.
4. Ring networks offer high performance for a small number of workstations
Page | 30
Disadvantages of ring network are:
Mesh Network:
1. Yields the greatest amount of redundancy in the event that if one of the
nodes fails, the network traffic can be redirected to another node.
2. Network problems are easier to diagnose.
Disadvantage of mesh network is its high cost of installation and maintenance
(more cable is required than any other configuration).
Network architecture refers to the layout of the network, consisting of the hardware,
software, connectivity, communication protocols and mode of transmission, such as
wired or wireless.
Protocols: A protocol is the formal set of rules for communicating, including rules for timing
of message exchanges, the type of electrical connection used by the communications
Page | 31
devices, error detection techniques, means of gaining access to communications channels,
and so on. The goal of communications network architectures is to create more
standardization and compatibility among communications protocols.
Layer 6 or Presentation Layer: This layer at times referred as Syntax Layer also, is
usually a part of an operating system, that converts incoming and outgoing data from one
presentation format to another (for example, from a text stream into a popup window with
the newly arrived text). Encryption, data compression can also be undertaken at this layer
level.
Page | 32
Layer 3 or Network Layer: The Network Layer provides the functional and
procedural means of transferring variable length data sequences from a source to a
destination via one or more networks, while maintaining the quality of service
requested by the Transport Layer. The Network Layer makes a choice of the
physical route of transmission.
Layer 2 or Data Link Layer: The Data-Link layer ensures that an initial
connection has been set up, divides output data into data frames, and handles
the acknowledgements from a receiver that the data arrived successfully. The Data
Link Layer responds to service requests from the Network Layer and issues service requests
to the Physical Layer. Data Link Layer detects and possibly correct errors that may occur in
the Physical Layer.
Layer 1 or Physical Layer: This includes the layout of pins, voltages, cable
specifications, Hubs, repeaters, network adapters etc. It is the hardware layer which specifies
mechanical features as well as electromagnetic features of the connection between the
devices and the transmission.
The major functions and services performed by the Physical Layer are:
Internet’s TCP/IP
Many companies and other organizations are also converting their client/server networks to
TCP/IP
Page | 33
Five levels of TCP/IP include:
Threat: A threat is anything that can disrupt the operation, functioning, integrity, or
availability of a network or system. Network security threats can be categorized into four
broad themes:
For example, if a company’s external web site is hacked; the company’s integrity is
damaged. Even if the external web site is separate from the internal information that sits
behind a protective firewall, the public does not know that. All they know is that if the
company’s web site is hacked, then it is an unsafe place to conduct business.
Structured Threats- These originate from individuals who are highly motivated and
technically competent. They can understand as well as create hacking scripts to penetrate
those network systems. Usually, these hackers are hired by industry competitors, or
state-sponsored intelligence organizations.
Page | 34
External Threats - These originate from individuals or organizations working outside an
organization, which does not have authorized access to organization’s computer systems or
network. They usually get access into a network from the Internet or dialup access servers.
Internal Threats - These threats originate from individuals who have authorized access to
the network. These users either have an account on a server or physical access to the
network. An internal threat may come from a discontented former or current employee. It
has been seen that majority of security incidents originate from internal threats.
The following facts are responsible for occurrence of vulnerabilities in the software:
Software Bugs: Some bugs might not have serious effects on the
functionality of the program and may remain undetected for a long time. A
program might crash when serious bugs are left unidentified. Another
category of bugs called security bugs may allow a malicious user bypass
access controls and obtain unauthorized privileges.
Timing Windows - This problem may occur when a temporary file is exploited by
an intruder to gain access to the file, overwrite important data, and use the file as a
gateway for advancing further into the system.
Page | 35
End users - Generally, users of computer systems are not professionals and are
not always security conscious. For example, when the number of passwords of
an user increases, user may start writing them down, in the worst case to places
from where they are easy to find. In addition to this kind of negligence towards
security procedures users do human errors.
(i) Preparing project plan for enforcing security: The project plan components
includes the objectives of the review, scope of the review and tasks to be
accomplished, assigning tasks to the project team after organizing it, preparing
resources budget.
(ii) Asset identification: Assets which need to be safeguarded can be identified
and subdivided into Personnel, Hardware, Facilities, Data, Software.
(iii) Asset valuation: This step of valuation of assets can pose a difficulty. The
process of valuation can differ depending on who is asked to render the
valuation, the way in which the asset can be lost and the period for which it is
lost and how old is the asset.
(iv) Threat identification: The source of a threat can be external or internal and the
nature of a threat can be accidental / non-deliberate or deliberate.
(v) Threats probability of occurrence assessment: This step is an assessment of
the probability of occurrence of threats over a given time period.
(vi) Exposure analysis: This step is the Exposures Analysis by first identifying the
controls in the place, secondly assessing the reliability of the existing controls,
thirdly evaluating the probability that a threat can be successful and lastly
assessing the resulting loss if the threat is successful.
(vii) Controls adjustment: The involves the adjustment of controls which means
whether over some time period any control can be designed, implemented and
Page | 36
operated such that the cost of control is lower than the reduction in the
expected losses.
(viii) Report generation outlining the levels of security to be provided for
individual systems, end user, etc.: This is the last step that involves report
generation documenting, the findings of the review.
Page | 37
Some of the popular network security protocols include:
SSH - Secure Shell is a program to log into another computer over a network, to
execute commands in a remote machine, and to move files from one
machine to another. An attacker cannot hijack the connection when
encryption is enabled. During ssh login, the entire login session,
including transmission of password, is encrypted; therefore it is almost
impossible for an outsider to collect passwords.
SFTP – The SSH File Transfer Protocol (also known as Secure FTP and SFTP) is a
computing network protocol for accessing and managing files on remote file
systems. Unlike standard File Transfer Protocol (FTP), SFTP encrypts commands
and data both, preventing passwords and sensitive information from being
transmitted in the clear over a network.
For instance, you might log into your bank account on the Web. You
will have to enter in a user name and password, and then after that
you'll see your account info. Pay attention the next time you do this,
and check the address bar at the top of your browser. It should
indicate that you are now in a secure session with the addition of
"https" at the front of the URL.
Page | 38
Network Security Techniques
Message authentication makes sure that a message is really from whom it original sender
and that it has not been tampered with. Regardless of a company’s individual needs,
clearly defined Internet security policies and procedures should always be part of any
corporate Internet security strategy.
Site Blocking is a software-based approach that prohibits access to certain Web sites
that are deemed inappropriate by management. For Example, certain orgnisations blocks
certain social networking sites like Facebook, Twitter etc. companies can also log activities
and determine the amount of time spent on the Internet and identify the sites visited.
Operation deals with keeping the network (and the services that the network
provides) up and running smoothly.
Administration deals with keeping track of resources in the network and how
they are assigned.
Maintenance is concerned with performing repairs and upgrades—for example,
when equipment must be replaced.
Provisioning is concerned with configuring resources in the network to support a
given service. For example, this might include setting up the network so that a new
customer can receive voice service.
Page | 40
Networks and the Internet
Internet Applications
Internet can be used as a very effective media for various applications such as:
Electronic commerce transactions between businesses and their suppliers
and customers
The Internet provides electronic discussion forums formed and managed by
thousands of special-interest newsgroups.
The Internet allows holding real-time conversations with other Internet users.
The Internet allows gathering information through online services using
web browsers and search engines.
Intranet
Page | 41
The Business Value of Intranets: Intranet applications support communications and
collaboration, business operations and management. These applications can be
integrated with existing IS resources and Applications, and extended to customers,
suppliers, and business partners.
Using an Intranet browser and workstation to send and receive e-mail, voicemail.
Using Intranet groupware features to improve team and project collaboration
with services such as discussion groups, chat rooms, and audio and
videoconferencing.
Business Operations and Management: Intranets are being used as the platform for
developing and deploying critical business operations like:
Extranets:
An extranet is a private network that uses Internet technology and the public
telecommunication system to securely share part of a business's information or
operations with suppliers, vendors, partners, customers, or other businesses. An
extranet can be viewed as part of a company's intranet that is extended to users outside
the company.
Page | 42
The business value of extranets is derived from several factors:
The extranets makes customer and supplier access of intranet resources a lot
easier and faster than previous business methods.
Extranets enable and improve collaboration by a business with its customers and
other business partners.
Extranets enable a company to offer new kinds of interactive Web-
enabled services to their business partners. Thus, extranets are another
way that a business can build and strengthen strategic relationships with
its customers and suppliers.
Extranets facilitate an online, interactive product development, marketing, and
customer-focused process that can bring better designed products to market faster.
Deploy in "Internet time": To deploy an extranet, companies shouldn't have to roll out a
new infrastructure. Enterprises must be able to deploy their extranet quickly, and
leverage their existing infrastructure to do so.
Protect the interests of the data owner: Extranet services need to be deployed in a fast
and flexible way, but with the complete assurance that only the correct users can access
the right services.
Serve the partner as a customer: An extranet presents a very important and delicate
balance: providing customer service to key partners (who might also be customers).
Partners should never be required to change their security policies, networks,
applications, and firewalls for the "good" of the extranet community.
Page | 43
measure progress, performance, and popularity. Business units deploying applications
need to understand which extranet content and applications are most successful.
Electronic Commerce
Benefits of e-Commerce
Problem of anonymity: There is need to identify and authenticate users in the virtual
global market where anyone can sell to or buy from anyone, anything from anywhere.
Data Loss or theft or duplication: The data transmitted over the Internet may be lost,
duplicated, tampered with or replayed.
Lack of audit trails: Audit trails in e-Commerce system may be lacking and the logs may be
incomplete, too voluminous or easily tampered with.
Page | 44
Problem of piracy: Intellectual property may not be adequately protected when such
property is transacted through e-Commerce.
Attack from hackers: Web servers used for e-Commerce may be vulnerable to hackers.
Repudiation of contract: There is possibility that the electronic transaction in the form of
contract, sale order or purchase by the trading partner or customer may be denied.
Types of e-Commerce
The Business-to-Consumer (B2C) model can save time and money by doing business
electronically but customers must be provided with safe and secure as well as easy-to-
use and convenient options when it comes to paying for merchandise.
Page | 45
(iii) Call centers can be integrated with the website.
(iv) Broadband telecommunications will enhance the buying experience.
B2G e-Commerce, also known as e-Government, refers to the use of information and
communication technologies to build and strengthen relationships between
government and employees, citizens, businesses, non-profit organizations, and other
government agencies.
F. Business-to-Employee (B2E) e-Commerce
B2E e-Commerce, from an intra-organizational perspective, has provided the means for a
business to offer online products and services to its employees.
Performing cost benefit analysis and risk assessment to ensure value delivery
Implementing the right level of security
Providing adequate user training
Page | 46
Implementing appropriate policies, standards and guidelines
Performing post implementation review
Mobile Commerce
Electronic Funds Transfer (EFT) represents the way the business can receive direct deposit
of all payments from the financial institution to the company bank account.
Page | 47
Automated Teller Machines (ATMs): Consumers can do their banking
without the assistance of a teller, or to make deposits, pay bills, or
transfer funds from one account to another electronically. These machines
are used with a debit or EFT card and a code, which is often called a
personal identification number or “PIN.”
Page | 48
4. Business Information Systems
(i) People, hardware, software, and data are four basic resources of information
systems;
(ii) Human resources consist of end users and IT specialists; hardware involves
machines and media; software resources consist of programs and procedures;
and data resources includes data, model;
(iii) A process is used to convert data into information for end users;
Strategic Level: These are senior managers or Top-level managers that hold the titles such
as Chief Executive Officers, Chief Financial Officers, Chief Operational Officers etc, who
take decisions that will affect the whole organization. Top Managers do not direct the day-
to-day activities of the firm; rather they set goals for the organization and direct the
company to achieve them.
Page | 49
Management Level: These are Middle Managers that are in the levels below top
managers and hold the job titles like General Manager, Regional manager etc. Middle-
level Managers are responsible for carrying out the goals set by Top Management. Because
Middle Managers are more involved in the day-to-day workings of a company, they may
provide valuable information to Top Managers to help improve the performance of an
organization.
Knowledge Level: These include knowledge and data workers who are selected,
recruited and trained in a special manner than the non-knowledge workers. The
knowledge resides in the heads of knowledge workers and these are the most precious
resource an organization possesses.
Strategic Level Systems: For strategic managers to track and deal with strategic issues,
assisting long-range planning. A principle area is tracking changes in the external
conditions (market sector, employment levels, share prices, etc.) and matching these with
the internal conditions of the organization.
Page | 50
Knowledge-Level Systems: These systems support discovery, processing and storage of
knowledge and data workers. These further control the flow of paper work and enable
group working.
Most of the Transaction Processing Systems include one or additional of the following
attributes:
Access Control - TPS: Most Transaction Processing Systems come with access control to put
a ceiling on users to only those allowed to accomplish so. Access Control ensures that
people who are not authorized to use the system are not permissible to influence or
modify the transaction process.
Equivalence - TPS: Transactions are processed in the similar format every time to
ensure that full effectiveness is achieved. The TPS Interfaces are designed to get hold of
identical data for each transaction, despite the source.
High Volume Rapid Processing - TPS: In most of the transaction processing, the
foremost issue is momentum. The instant processing of transactions is noteworthy
to the success of certain industry such as banking. TPS is designed to process
transactions in an immediate to make confident that the transaction data is available to
other users or processes that entail it.
Page | 51
Trustworthiness - TPS: A TPS system is designed to be robust and trustworthy. The
system is capable to process transactions very rapidly yet at the same time conduct
several checks to make certain that the data integrity is preserved.
Atomicity: This means that a transaction is either completed in full or not at all. TPS
systems ensure that transactions take place in their entirety. For example, if
funds are transferred from one account to another, this only counts as a bone fide
transaction if both the withdrawal and deposit take place. If one account is debited
and the other is not credited, it does not qualify as a transaction.
Consistency: TPS systems exist within a set of operating rules (or integrity
constraints). If an integrity constraint states that all transactions in a database
must have a positive value, any transaction with a negative value would be
refused.
Isolation: Transactions must appear to take place in seclusion. For example, when a
fund transfer is made between two accounts the debiting of one and the crediting
of another must appear to take place simultaneously. The funds cannot be credited
to an account before they are debited from another.
Durability: Once transactions are completed they cannot be undone. To ensure that
this is the case even if the TPS suffers failure, a log will be created to document all
completed transactions.
Page | 52
Office Automation Systems (OAS)
The expression Office Automation refers to the use of computer and software
to digitally generate, collect, store, manipulate, and relay office information
needed for accomplishing basic tasks and goals.
The Office Automation Systems (OAS) is amalgamation of hardware, software, and other
resources used to smooth the progress of communications and improve efficiency in an
organization.
Knowledge Management Systems (KMS) refer to any kind of IT system that stores and
retrieves knowledge, locates knowledge sources, and uses knowledge in some or other
way to enhance the KM process.
Explicit knowledge is that which can be created and stored easily and as a consequence is
easily available across the organization. Explicit knowledge is easy to communicate, store,
and distribute and is the knowledge found in books, on the web, and other visual and
oral means. The most common forms of explicit knowledge are manuals, documents,
procedures, and how-to videos. Knowledge also can be audio-visual.
Page | 53
Tacit knowledge, on the other hand, resides in a few or in just one person and hasn’t
been captured by the organization or made available to others. It is the hidden vast
storehouse of knowledge held by practically every normal human being, based on his or
her emotions, experiences, insights, intuition, observations and
internalized information. It is this tacit knowledge that differentiates between
organizations in tough times, and hence provides the strategic edge to any organization.
Knowledge is a sum total of “What everybody knows” about the community world. It is
a gathering of values, wisdom, education, experience, morals. The difference between the
normal and the abnormal handling of any task, process or interaction-between employees,
with the customers or with any other stake holder of the firm, has always been made
possible with the use of knowledge.
Globalization: It’s putting pressure on firms for innovation as markets are at the
present fast changing and competition is stiff. The meaning of goods and services has
changed. Now companies have started selling knowledge in addition. For a research lab or
software firm, not managing knowledge is similar to Wal-Mart not managing inventory.
Page | 54
Difference between Information and Knowledge
We all know that information is a vital factor for our existence. Just as our body needs air,
water and clothes, we are as much dependent upon information.
The term ‘Management Information System’ (MIS) refers to the data, equipment and
computer programs that are used to develop information for managerial use.
As the internet has developed, all of the foremost MIS solutions have now been written
to be accesses via web browsers.
Page | 55
Developing MIS – Dos And Don’ts:
Page | 56
Decision Support Systems (DSS)
DSS can be extremely beneficial to any organization’s overall performance. However, DSS
can also be the cause of great confusion, misperception and even inaccurate analysis –
these systems are not designed to eliminate “bad” decisions.
(a) The user: The user is usually a manager with a problem to solve and may be at
management - level of an organization.
(b) One or more databases: Databases contain both routine and non-routine data from
both internal and external sources.
(c) Planning languages: Planning languages can either be general-purpose or
special-purpose allowing users to perform routine tasks and specific tasks
respectively.
(d) Model Base: Model base is the brain of the DSS as it performs data manipulations
and computations with the data provided to it by the user and the database. The
planning language in DSS allows the user to maintain a dialogue with the model
base.
Advantages/Need of DSS:
Page | 57
Executive Information Systems (EIS)
The typical information mix presented to the executive may include financial information,
work in process, inventory figures, sales figures, market trends, industry statistics, and
market price of the firm's shares. It may even suggest what needs to be done, but differs
from a Decision Support System (DSS) in that it is targeted at executives and not managers.
Alternative names of EIS are Enterprise Information Systems or Executive Support Systems
(ESS).
Components of an EIS
Hardware: Includes Input data-entry devices, CPU, Data Storage files and Output
Devices.
Software: Includes Text base software, Database, and Graphic types such as time series
charts, scatter diagrams, maps.
Page | 58
User Interface: Several types of interfaces can be available to the EIS structure, such as
scheduled reports, questions/answers, menu driven etc
Specialized Systems
Enterprise Resource Planning (ERP)
Enterprise Resource Planning (ERP) systems integrate internal and external management
information across an entire organization—taking on finance/accounting, manufacturing,
sales etc. ERP systems automate this activity with an integrated software application.
ERP Stages:-
Stage – 2 ABC Analysis: ABC analysis is that technique of material control in which we
divide our material into three categories and investment is done according to the value
and nature of that category’s materials.
Stage – 3 Economic order Quantity (EoQ): EoQ is used as part of inventory system in
which the level of inventory is scrutinized at all times and is ordered each time the
inventory level reaches a particular reorder point.
Stage – 8 Enterprise Resource Planning: ERP takes a customer order and provides a
software road map for fulfilling the order
Stage – 9 Money Resource Planning (MRP-III).: This has more emphasis on planning of
capital or managing the situation when surplus money arises.
Stage – 10 EIS-Web Enabled: Web browser software is the cheapest and simplest client
software for an EIS. Web enabled EIS is a final step in this direction.
Page | 60
Benefits of CRM:
In simple terms, SCM is a chain that starts with customers and ends with customers.
Supply Chain Management may be defined as the process of planning, implementing and
controlling the operations of the supply chain with the purpose of satisfying the
customer's requirement as efficiently as possible.
Components of SCM:
Integration - The last element of supply chain management is the need for integration. It is
critical that all participants in the service chain recognize the entirety of the service
chain.
Page | 61
Relationship between ERP, CRM and SCM:
CRM and SCM are two categories of enterprise software that are widely implemented
in corporations and non-profit organizations. While the primary goal of ERP is to improve
and streamline internal business processes.
CRM attempts to enhance the relationship with customers and SCM aims to facilitate
the collaboration between the organization, its suppliers, the manufacturers, the
distributors and the partners.
People are the most valuable asset of an enterprise. A Human Resources Management
System (HRMS) is a software application that group many human resources functions,
together with benefits administration, payroll, recruiting and training, and performance
analysis and assessment into one parcel.
Training Management: Training programs can be entered with future dates which
allow managers to track progress of employees through these programs
Page | 62
Core Banking System (CBS)
CORE stands for "Centralized Online Real-time Environment". The various elements of core
banking include:
Calculating interest
Managing customer accounts
Processing cash deposits and withdrawals
Processing payments and cheques
Core Banking System may be defined as the set of basic software components that
manage the services provided by a bank to its customers.
Normal core banking functions will include deposit accounts, loans, mortgages and
payments. Banks make these services available across multiple channels like ATMs,
Internet banking, and branches.
Examples of major core banking products include Infosys’ Finacle, Nucleus FinnOne and
Oracle's Flexcube application.
Page | 63
Wealth management: This creates new revenue streams by offering high net
worth individuals
Trade finance: This module presents an end-to-end solution for the trade finance
needs of a bank and is fully integrated with the payment system and exchange
rate setup
Islamic banking: This module offers a flexible and varied feature repertoire for
banks to design and deploy products for varying market segments, based on
different Islamic concepts.
(B) Nucleus FinnOne: The Nucleus FinnOne banking suite, made and marketed
by India-based Company Nucleus software, comes with a wide variety of
applications that cover different aspects of global web banking. These
applications include:
(C) Oracle's FLEXCUBE: Oracle FLEXCUBE helps banks transform their business model
from disparate operations towards centralization of key functions, such as
accounting, customer information, and management information.
Page | 64
Accounting Information System (AIS)
Benefits of AIS:
Artificial Intelligence
Although AI has been studied for more than half a century, we still cannot make a
computer that is as intelligent as a human in all aspects.
Page | 65
In some cases, the computer outfitted with AI technology can be even more intelligent
than us. The Deep Blue system which defeated the world chess champion is a well-know
example.
Expert systems, Pattern Recognition, Natural language processing, and many others are
some of the various purposes on which AI may be applied
Expert System
Page | 66
Rule-based systems are created by storing data and decision rules as if-then rules.
The system asks the user questions and applied the if-then rules to the answers
to draw conclusions and make recommendations.
Frame based systems organize all the information (data, description, rules etc.)
about a topic into logical units called frames, which are similar to linked records
in data files.
Business Intelligence
The term business intelligence (BI) represents the tools and systems that play a key role
in the strategic planning process of the corporation. These systems allow a company to
gather, store, access and analyze corporate data to aid in decision-making.
Simple Reporting and Querying: This involves using the data warehouse to
get response to the query: “Tell me what happened.” The objective of a BI
implementation is to turn operational data into meaningful knowledge.
Business Analysis: This involves using the data to get response to the query: “Tell
me what happened and why.” Business analysis allows the user to plot data in
row and column coordinates to further understand the intersecting points.
Dashboards: This involves using the information gathered from the data
warehouse and making it available to users as snapshots
Page | 67
Business Reporting through MIS and IT
Benefits for micro-businesses and small to medium enterprises
Paperless lodgement - eliminates the hassle of paper work and associated
costs;
Electronic record keeping – stores the reports securely in
the accounting or bookkeeping system;
Pre-filled forms - reports are automatically pre-filled with
information existing in the accounting or bookkeeping system.
Ease of sharing - between client, accountant, tax agent or bookkeeper for
checking;
Same-time validation - receive a fast response that any lodgement
has been received.
Page | 68
Importance of Access and Privilege Controls
Role-based Access Control (RBAC): Each person/subject is given a particular role and
certain rights and permissions. When an employee changes jobs, all previous access
is removed, and the rights and permissions of the new role are assigned.
Rules-based Access Control (RAC): RAC differs from RBAC methods because it is
largely context-based. RAC places certain rules based on a user’s role. A manager, for
example, has the ability to approve his/her employees’ hours worked.
However, when s/he attempts to approve his/her own hours, a rule built into
the application compares the employee record and the user, sees they are the
same, and temporarily removes approval privilege.
Page | 69
5. Business Process Automation through Application Software
The meaning of Business Application can be best understood by dividing the set of words
into their constituents. Business is defined as a person’s regular occupation or commercial
activity, a person’s concern. Application, in terms of computers, is defined as a computer
program to fulfill a particular purpose.
Nature of processing: This is the way an application updates data, for example
batch-processing, real-time processing.
Source of application: It tells the source from where application Is bought, for
example purchased (Tally), developed in-house.
Nature of business: This classification is based on the users for whom the application
has been developed. For example, for large businesses, small businesses etc.
Functions covered: A business application may be classified based on business
function it covers. For example DSS, MIS, KIS etc
(ii) Step 2: Understand the rules / regulation which enterprise needs to comply with?
Page | 70
This is established by a combination of internal corporate policies, external industry
regulations and local, state, and central laws.
Once the requirements have been document, ROI has been computed and top
management approval to go ahead has been received, BPA is developed.
Page | 71
Applications that help entity to achieve BPA (2 x 2 Marks):
TALLY:
SAP:
Attendance Systems:
A lot of applications have been developed that allow entity to track their goods
while in transit.
It has features such as GPS based location, GPRS connections.
Information is also sent through SMS & e-mail notifications
Page | 72
on-board memory to store location inputs during times when GPRS is not
available or cellular coverage is absent
Many business processes specific to this industry have been automated, including
ticket booking for air, bus, train, hotel, etc.
It has features such as, ‘safe return’ process for people tracking, traveler portal
for up to date information, online retrieval of e-tickets, management of entry visas
& medical requirements.
India probably produces maximum number of engineers, doctors, MBAs and CAs
across the world.
A lot of automation has been achieved, including student tracking and record
keeping.
ICAI, itself is a good example of this automation.
Page | 73
A student based on his/her registration number can file many documents online
including exam forms.
Delivery Channels
Delivery channels for information include:
E-mail: The most widely used delivery channel for information today
Social networking sites, like Facebook, whatsup, etc
Intranet: Network within the company/enterprise
More than just the intranet: Staff will (and should) use whichever methods are
easiest and most efficient to obtain information.
Understand staff needs & environment: This includes which systems do staff use,
their level of PC access, their amount of computer knowledge.
Traditional Channel need to be formalized: Instead of attempting to eliminate
existing information sources in favour of the intranet, it may be more beneficial to
formalize the current practices.
Controls in BPA
Control Objectives:
Page | 74
Validity - ensures that all recorded transactions fairly represent the economic events
that actually occurred
Physical Safeguards and Security - ensures that access to physical assets and
information systems are controlled
(i) Boundary Controls: Boundary control techniques include: The major controls of the
boundary system are the access control mechanisms. Boundary control techniques
include:
Cryptography: There are programs that transform data into codes that
appear meaningless to anyone who does not possess the
authentication/authorization.
Passwords: User Identification through personal characters like name, birth date
etc.
Personal Identification Numbers (PIN): The personal identification
number is similar to a password assigned to a user. The application
generates a random number.
Identification Cards: These cards that are used to identify a user.
(ii) Input Controls: These are responsible for ensuring the accuracy and
completeness of data that are input into the computer. Input control techniques
are:
Data Coding Controls: These controls are put in place to reduce user
error during data feeding. Few types of error may include:
Addition: Addition of an extra character in a code. e.g. 12345
coded as 712345;
Truncation: Omission of characters in the code. e.g. 12345 coded
as 2345;
Page | 75
Batch Controls: These controls are put in place at locations where
batch processing is being used. Batch processing is where there is a time
gap between occurrence and recording of transactions, that is,
transactions are not recorded at the time of occurrence but are
accumulated and a set (based on number/ time) is processed.
Validation Controls: hese controls validate the accuracy/correctness of
input data. For example, no pay where there is sick leave, physical
balance can never go below zero, etc.
(iii) Process Controls: Data processing controls perform checks to identify errors
during processing of data.
Exception Reports: Exception reports are generated to identify
errors in data processed.
Reasonableness Verification: Two or more fields can be
compared and cross verified to ensure their correctness. For
example, the statutory percentage of provident fund can be
calculated on the gross pay amount to verify if the provident fund
contribution deducted is accurate.
(iv) Output Controls: Output controls ensure that the data delivered to users
correctly.
Storage and Logging of Sensitive and Critical Forms: Pre-printed
stationery should be stored securely to prevent unauthorized
destruction or removal and usage.
Controls over Printing: It should be ensured that unauthorized
disclosure of information printed is prevented. must be trained to select
the correct printer
Page | 76
Retention Controls: Retention controls consider the duration for which
outputs should be retained before being destroyed.
Existence/Recovery Controls: These controls are needed to recover
output in the event that it is lost or destroyed.
Emerging Technologies
Grid Computing is a computer network in which each computer's resources are
shared with every other computer in the system.
An insurance company mines data from partner hospitals for fraud detection.
Large-scale science and engineering are done through the interaction
of people from different geographies.
Network Virtualization treats all servers and services in the network as a single
pool of resources that can be accessed without regard for
its physical components. The term network virtualization is often used to
describe many things including storage virtualization, and even grid computing.
Page | 77