Basic Concepts of Management Information System: Because It Facilitates
Basic Concepts of Management Information System: Because It Facilitates
▪ Network is a connecting system (wire line or wireless) that permits different computers
to share resources.
▪ Procedures are the set of instructions about how to combine the above components in
order to process information and generate the desired output.
▪ People are that individual who use the hardware and software, interface with it, or uses
its output which is called end user. The other kind of people is It specialist (System
developer, Programmer, database, administer, Web page designer, network engineer
and security officer and etc.)
What makes information system so important in our day to day lives?
Because it facilitates
Capturing of data
Processing of data
Sharing of data
Storing data etc.
Generally, an understanding of the effective and responsible use and management of
information systems and technologies is important for managers, business
professionals, and other knowledge workers in today’s internetworked enterprises.
Information systems play a vital role in the e-business and e-commerce operations,
enterprise collaboration and management, and strategic success of businesses that must
operate in an internetworked global environment. Thus, the field of information systems
has become a major functional area of business administration.
We categorize information system based on different levels of system
Operational-level systems
support operational managers by monitoring the day-today’s elementary activities and
transactions of the organization e.g. TPS.
Knowledge-level systems support knowledge and data workers in designing products,
distributing information, and coping with paperwork in an organization.
e.g. Knowledge Worker System, Office Automation System
Management-level systems support the monitoring, controlling, decision-making, and
administrative activities of middle managers. e.g. MIS, DSS
Strategic-level systems support long-range planning activities of senior management.
e.g. ESS
Fig 1.1 Kinds of information system
Until 1960s the role of information system was simple transaction processing, record
keeping, accounting and other electronic data processing. But later on (starting from
1970s on ward different roles have been practicing)
Fig 1.3 will give you high lights about some of the trend that was practiced until 2000
“Internet” time
Real time information transmission and retrieval. What used to take days and weeks of
research is now available with a few clicks of the “mouse”
Real time monitoring and communication: Capacity for real time response “Internet”
distance: Proximity and geographical location are no longer as important
4. Supervisors full access to the employee's activity Due to the development of ICT
➢ The supervisor can easily monitor every movement and communication of the
employee and this information can be downloaded in to a record of his/her work habit.
➢ What is on the employee's screen and where he/she wonders on the Internet can also be
monitored.
➢ The aspects of the personal life of employees can be monitored while using Internet &
e-mail.
1.6.2. Methods of protecting privacy in cyberspace
➢ Password
✓ Creating passwords with senseless combinations of upper- and lower-case letters,
numbers and symbols,
✓ Change your password often.
✓ take steps to secure your password.
➢ Privacy-enhancing technologies (PET)
a. Using encryption programs
➢ The privacy advantage of encryption is that anything encrypted is virtually inaccessible
to anyone other than the designated recipient.
➢ Thus, private information may be encrypted and then transmitted, stored, or distributed
without fear that it will be read by others.
➢ Strong encryption programs such as PGP (Pretty Good Privacy) are available online.
b. Anonymous remailers.
➢ Anonymous remailers are intermediaries that receive e-mail, strip off all identifying
information, then forward the mail to the appropriate address.
c. Anonymous surfing services.
➢ These ISP services mask your identity by acting as an agent to transfer data between an
Internet website and your browser.
d. Storage security and protection software.
➢ Software securities programs help prevent unauthorized access to files on your personal
computer.
➢ For example, one program encrypts every directory with a different password so only
the person who knows the password can open it.
➢ Privacy policy
➢ Most Internet Service Providers (ISP) has adopted privacy policies that they post on
their web sites.
➢ If you are not satisfied with the policy or if there is no policy, avoid using the site.
➢ Use only secure web sites when you transmit sensitive personal information over the
Internet.
➢ When you provide your credit card account number to a shopping site, for example, be
sure that the transmission is secure.
Chapter Two
2. Leadership Issues in Information System
2.1 Top IS Job
Management Information Systems (MIS) is a broad term for the technological systems
businesses use to manage their daily operations. Students in this major study how
organizations of all kinds can use these systems and the data they generate to make
better decisions. This degree provides students with a range of transferrable skills,
including computer programming, web analytics, social media, and more. Below, there
the list of IS job and their aspect.
❖ Systems Administrator
Professionals in this role oversee the day-to-day operations of an organization's
computer and network systems. They install, monitor, and organize wide area networks
(WANs), local area networks (LANs), intranets, and other data communication
processes. Computer systems administrators help businesses run more smoothly and
effectively.
❖ Database Administrator
Database administrator is another common job for an MIS major. These skilled
professionals use specialized software to store, protect, and organize data. They oversee
all aspects of data administration, including database design, security, troubleshooting,
and more.
❖ Data Scientist
In this profession, they'll help businesses collect valuable customer data, then clean,
organize, store, and analyze it. By presenting their findings in clear, compelling ways,
they can help organizations of all kinds make more strategic, informed business
decisions.
❖ Software Engineer
Software engineers help create everything from computer games to network control
systems. They use their coding and programming skills to design, test, and improve
these software products. For someone with an inventive personality and a love of new
technology, a career in software can be fun, exciting, and intellectually challenging.
2.2 Strategic uses of IT/IS
Let’s look at several key strategies that can also be implemented with information
technology. They include locking in customers or suppliers, building switching costs,
raising barriers to entry, and leveraging investment in information technology.
-Locking in customers and Suppliers
Investments in information technology can allow a business to lock in customers and
suppliers (and lock out competitors) by building valuable new relationships with them.
These business relationships can become so valuable to customers or suppliers that they
deter them from abandoning(discard) a company for its competitors or intimidate them
into accepting less profitable business arrangements. Early attempts to use information
systems technology in these relationships focused on significantly improving the
quality of service to customers and suppliers in a firm’s distribution, marketing, sales,
and service activities.
-Create switching costs
A major emphasis in strategic information systems has been to find ways to create
switching costs in the relationships between a firm and its customers or suppliers. In
other words, investments in information systems technology, such as those mentioned
in the Boeing example, can make customers or suppliers dependent on the continued
use of innovative, mutually beneficial inter-enterprise information systems. They then
become reluctant to pay the costs in time, money, effort, and inconvenience that it
would take to switch to a company’s competitors.
-Raise barriers to entry
By making investments in information technology to improve its operations or promote
innovation, a firm could also raise barriers to entry that would discourage or delay other
companies from entering a market. Typically, these barriers increase the amount of
investment or the complexity of the technology required to compete in an industry or a
market segment. Such actions tend to discourage firms already in the industry and deter
external firms from entering the industry.
-Leverage investment in IT
Investing in information technology enables a firm to build strategic IT capabilities so
that they can take advantage of opportunities when they arise. In many cases, this
happens when a company invests in advanced computer-based information systems to
improve the efficiency of its own business processes. Then, armed with this strategic
technology platform, the firm can leverage investment in IT by developing new
products and services that would not be possible without a strong IT capability.
An important current example is the development of corporate intranets and extranets
by many companies, which enables them to leverage their previous investments in
Internet browsers, PCs, servers, and client/server networks.
Fig.2.2. Examples of how, over time, companies have used information technology to
implement five competitive strategies for strategic advantage.
- These changes have brought new pressures as well as challenges for management of
information, information systems and technologies from which potential benefits can
be derived.
- Trends in business have created new roles for information and information systems,
creating opportunities but also complexities.
Thus, managing information systems and service have been giving a great emphasis
and have the following importance;
• Information systems are main sources of capital management; trends have showed
that investments in IT double as a percentage of total investments since 1980s. Now,
for instance, it accounts for 1/3 of the capital investment in USA.
• Information systems are foundations of doing business; this is because all business
currently depends on information technology to conduct their business activities, design
strategies, and to become competent and profitable.
Example: restaurants may use handheld devices to communicate menu orders during
busy hours and a rental car company may use information technology to track customer
orders and may use global positioning systems that relay the exact position of every car
wherever it is.
• Information systems increase productivity: Simply put managing organization’s
information systems and resources will increase productivity and effectiveness of a
company.
• Information systems create opportunities and advantages
Business and organizations simply cannot stick their head in the sand and ignore all of
the improvements and innovations that are available now days. Rather they should
improve current processes that are available and grasp the opportunities for new
products and services that the business can take the advantages with information
technology.
Definition of Information system
An information system consists of any organized combination of people, hardware,
software, communications networks, data resources, and policies and procedures that
stores, retrieves, transforms, and disseminates information in an organization.
People rely on modern information systems to communicate with one another using a
variety of physical devices (hardware) , information processing instructions and
procedures(software),communications channels (networks) , and stored data (data
resources) .
An information system is a set of inter related elements or components that collect
(input), manipulate (process), and disseminate (output) data and information, and
provides feedback mechanism to meet an objective.
- Input: refers to the act of gathering and capturing raw data. It could be a manual or
automated process. But regardless of the method used, the accuracy of the input is
critical in order to achieve the desired result.
- Processing: Involves the conversion or transformation of data into useful output.
- Output: is the production of useful information usually in the form of documents and
reports and
- Feedback: the term feedback is used to describe the output used to make changes to the
input or processing activities
Organization and the purpose of Information Systems
Definition of organization
Organization is a stable A, formal social structure that takes resources from the
environment and processes them to produce outputs.
Purposes of Information Systems
Information systems have become s integrated into our daily business activities as
accounting, finance, operation management, marketing, human resource management
or any other major business functions. Information systems and technologies such as e-
business and e-commerce have become vital components for successful businesses and
organizations.
Information systems can help all kinds of organizations and business to improve the
effectiveness and efficiency of their business processes, management decision making
and work group collaboration, which strengthens their competitive position in rapidly
changing market places. Generally, Information systems provide an organization with
support:
Business processes and operations
- Business decision making and
- Strategies for competitive advantage
Database Administrator
The database administrator (DBA) is responsible for the databases and data warehouses
of an organization—a very sensitive and powerful position. Since access to information
often connotes power, this person must be astute not only technologically but politically
as well. He or she must evaluate requests for access to data from managers to determine
who has a real “need to know.” The DBA is responsible for developing or acquiring
database applications and must carefully
Network Administrator
Among the many IT areas, the one that has seen the most exciting developments in
recent years is networks and telecommunications. Not surprisingly, this area has also
seen the greatest increase in corporate allocation of IT resources in many organizations.
The emergence of new technologies, such as Voice over Internet Protocol and Wi-Fi,
and “Business Networks and Communications,” is expected to sustain this trend for
some years, allowing network professionals to be in great demand and to command
high salaries.
The network administrator is responsible for acquiring, implementing, managing,
maintaining, and troubleshooting local area networks throughout the organization and
their interfaces with the wide area networks such as the Internet. He or she is also often
involved in selecting and implementing network security measures such as firewalls
and access codes.
System Administrator
A system administrator—often referred to as “sys admin”—is responsible for
managing an organization’s computer operating systems. System administrators often
manage and maintain several operating systems, such as UNIX and Microsoft Windows
Vista, and ensure that the operating systems work together, support end-users’ business
requirements, and function properly. System administrators are also responsible for the
day-to-day maintenance of an organization’s operating systems, including backup and
recovery, adding and deleting user accounts, and performing software upgrades.
Webmaster
The rapid spread of the Web, intranets, and extranets has increased the responsibility
and stature of the organizational Webmaster. A Webmaster is responsible for creating
and maintaining the organization’s Web site as well as its intranet and extranet.
Webmasters are increasingly involved in creatively deciding how to represent the
organization on the Web. These decisions involve elements of marketing and graphic
design. Since many organizations use the Web for commerce, Webmasters must also
be well-versed in Web transaction software, payment-processing software, and security
software. In small organizations, the Web site may be the responsibility of a single
person. In large organizations, the Webmaster often manages a crew of programmers
who specialize in developing and updating code specifically for Web pages and their
links with other organizational ISs.
Chief Security Officer
Because of the growing threat to information security, many organizations have created
the position of chief security officer (CSO), or chief information security officer
(CISO). In most Organizations, the person in this position reports to the chief
information officer (CIO) (see next section), but in some cases the two executives report
to the same person, usually the chief executive officer (CEO). The rationale is that
security should be a business issue, not an IT issue. A major challenge for CSOs is the
misperception of other executives that IT security is an inhibitor rather than an enabler
to operations.
Chief Information Officer and Chief Technology Officer
The fact that a corporation has a position titled chief information officer (CIO) reflects
the importance that the company places on ISs as a strategic resource. The CIO, who is
responsible for all aspects of an organization’s ISs, is often, but not always, a corporate
vice president. Some companies prefer to call this position chief technology officer
(CTO). However, you might find organizations where there are both a CIO and a CTO
and one reports to the other. There is no universal agreement on what the responsibility
of each should be. Yet, in most cases when you encounter both positions in one
organization, the CTO reports to the CIO.
Chapter three
2. Competing with Information Technology/Information Systems
Creating and maintaining competitive advantages
Organizations can create and maintain competitive advantage in different ways. Some
of these are:
1) Business process reengineering (BPR)
In today’s dynamic global business environment, forming a virtual company can be one
of the most important strategic uses of information technology. A virtual company is
an organization that uses information technology to link people, organizations, assets,
and ideas.
Why do people form virtual companies? It is the best way to implement key business
strategies and alliances that promise to ensure success in today’s turbulent business
climate.
The basic Strategies of Virtual companies are: Share infrastructure and risk with
alliance partners.
• Link complementary core competencies.
• Reduce concept-to-cash time through sharing.
• Increase facilities and market coverage.
• Gain access to new markets and share market or customer loyalty.
• Migrate from selling products to selling solutions.
4) Building a Knowledge Creating Company
Many companies today can only realize lasting competitive advantage if they become
knowledge-creating companies or learning organizations. That means consistently
creating new business knowledge, disseminating it widely throughout the company, and
quickly building the new knowledge into their products and services. Knowledge-
creating companies exploit two kinds of knowledge. One is explicit knowledge, which
is the data, documents, and things written down or stored on computers. The other kind
is tacit knowledge, or the “how-to” of knowledge, which resides in workers. This
knowledge represents the most important information of an organization.
Information Systems Planning
Overview of Planning
Systems planning, especially strategic systems planning, are becoming more difficult
and more important at the same time. Technology is changing so fast that it is seems
pointless to plan for it, yet the dependence on this technology makes planning its
effective use a matter of organizational life and death.
Definitions of Planning
-Planning is the determination of the goals and objectives of an enterprise and the
selection, through a systematic consideration of alternatives, of the policies, programs
and procedures for achieving them.
-Planning is an activity devoted to clearly identifying, defining, and determining
courses of action, before their initiation, necessary to achieve predetermined goals and
objective.
Importance of Planning
- It is a systematic approach in dealing with future uncertainties
- Focuses on efforts and resources on long-term, general objectives and yet provides a
foundation for short-term activities
- Provides a framework for action
Types of Planning
There are mainly three types of planning in any organizations.
✓ Strategic planning (3-5 years): deals with the development of organization’s mission,
goals, strategies and, policies.
✓ Tactical planning (1-2 years): involves the design of tactics, the setting of objectives,
and the development of procedures, rules, schedules, and budgets.
✓ Operational planning (6 months – 1 year): planning on the short-term basis to
implement and control day-to-day operations.
Key concepts used in organizational planning process are mission, goals, objectives,
strategies, tactics, policies, and rules and procedures.
-Strategy is the definition of the future directions and actions of the company defined
as approaches to achieving specific objectives.
Strategy is a specific action or pattern of actions that aligns the business with its
environment to create competitive advantage.
Successful strategies require defining and communicating the company’s unique
position, making tradeoffs, and creating (forging) fit among activities. Most
organizations use a hierarchy of strategies to support the business strategy. E.g.
marketing strategy, a personnel strategy, an Is/IT strategy,
Information systems planning (ISP)
Definition: ISP is a process of planning which brings together the business aims of the
organization, an understanding of the information needed to support those aims, and
the implementation of ICT to provide that information. It is a plan for the development
of systems towards some future vision of the role of information technology in the
organization.
ISP is a detained process and an integral part of deciding how to best deploy information
systems and technologies to help reach organizational goals. It is an orderly means of
assessing the information needs of an organization and defining the systems, databases
and technologies that will best satisfy those needs.
ISP involves identifying and modeling current and future organizational information
needs, and develop strategies and project plans to migrating the current information
systems and technologies to their desired future states.
ISP is also a process of deciding upon the optimal information, information systems,
and information technology architecture for an organization.
➢ Information architecture consists of activities involved in the collection, storage,
dissemination and use of information within the organization
➢ Information systems architecture is the basic blue print showing how the firm’s
information and communication technologies are integrated. It includes computing
platforms such as the basic types of computers, operating systems and networks. It also
incorporates legacy systems which are old and often obsolete systems that are still very
much in use.
Generally, information systems architecture consists of the information systems needed
to support organizational activity in the areas of collection, storage, dissemination and
use of information. The key characteristics of IS architecture are:
• Shows relationships between systems
• Does not specify time frame and
• Must be updated regularly
➢ Information technology architecture consists of the hardware, software,
communication facilities and IT knowledge and skills available to the organization.
Objectives of ISP
The key objectives of information systems include:
• To ensure that IS both complements and assists in the achievements of organizational
goals and competitive advantages
• To ensure that organizational IT/IS resources, including IS personnel, hardware,
software, data, and network resources are effectively and efficiently managed
• To achieve an integral view and approach to developing and implementing
organizational IS.
Characteristics of ISP
The key characteristics of ISP includes
• Cannot be considered independently of business strategy
• Must be continuous and dynamic, not a yearly or occasional activity
• Must be integrated at all levels of the managerial hierarchy
• Should lead in organizational innovation
• Uses top-down approach for identifying, developing and implementing IS, with the
following advantages;