Unit 2 Introduction To Information System
Unit 2 Introduction To Information System
This unit discusses information systems and their development, capabilities, and security. It
includes explanations on how computer-based information systems contribute to the success of
business organizations. Furthermore, it describes how information systems improve the
processes and operations of businesses. Real-world scenarios and examples are included to
further discuss information systems.
UNIT OUTLINE
2.1 Information Systems and Their Capabilities
2.2 Computer-based Information System
2.3 Developing Information Systems
2.4 Information System Security
LEARNING ONJECTIVES
At the end of this unit, the student should be able to:
1. understand the basic concepts of an information system and explain its contributions to
business organizations;
2. describe the nature and scope of computer-based information systems and explain how
they are used in a business;
3. identify appropriate system development methodologies in designing and developing
information systems; and
4. provide a clear overview of the concepts, issues, and
approaches in information system security.
The diagram shows the cycle of a computer system, which consists of a program, input, process,
output, storage, feedback, and control. In today's modern understanding of a computer system,
after the set of outputs has been generated, it can proceed to three stages: storage (to store the
output in a specific storage location, i.e., database or cloud), getting appropriate feedback from
users, and control (to correct problems that occur during the process and make sure that the
system fulfills its purpose).
Input
The fundamental idea of a computer system is that in every input, there is an expected output.
Users are required to input data into a specific program or computer system using input devices
such as a keyboard, mouse, scanner, and so on. The data could be text, graphics, audio, or even
videos. Then, the data will be processed.
For example, a user enters data in a Microsoft Word program using a keyboard. The text will
automatically appear on the monitor. In this example, the keyboard serves as the input device.
Process
Every computer has a microprocessor. The central processing unit or the CPU is considered the
brain of a computer and the one responsible for controlling all activities and handling input/output
(I/O) operations within a computer system. Data inputted into a system is processed by the CPU.
Output
The output is the result after data processing. It is usually presented externally from the computer
system. The output can be presented using an output device. Output devices include printers,
monitors, and speakers.
Storage
Storage devices help users keep data, information, and instructions from specific programs.
Storage devices are primarily divided into two types: (1) primary storage device and (2) secondary
storage device. Primary storage devices include random-access memory (RAM) and read-only
memory (ROM).
These devices are also called internal memories located insidethe CPU, which can easily be
accessed by the processor anytime. On the other hand, secondary storage devices are known as
any alternative storage. It allows users to store data, information, files, and programs temporarily
for future use.
An information system (IS) is a man-made system that collects, stores, retrieves, processes,
manages, disseminates, and analyzes information needed to facilitate a business organization's
operational functions and support its management in making decisions. IS is essential for
business firms as it manages and organizes their operations.
Like any other system, it operates within a specific environment. It includes inputs, processes,
and outputs. Data and instructions are part of the input; these are processed in a specific IS to
produce valuable outputs such as reports, analyses, or calculations that will be sent later on to
the concerned users or other systems. A feedback mechanism is also included.
Take an IS used to maintain and manage student records in a university as an example. The
possible inputs are a student's ID, name, program, subjects, subject schedule, and tuition fees.
An IS processes these to update a student's registration records in the database (storage), and it
gives a valuable output: the list of registered students in a particular subject or program.
Assume that while users enter data about registration, they must also enter related information
such as who will register the subject, how the student will pay his/her tuition fees, and why the
student has decided to be part of the program. These data will be stored in a storage location
(master data) of the IS and can produce outputs such as annual reports in the future. It could also
help an organization analyze the available data for future reference or improvements.
Master data are relatively permanent data that are stored in the IS for a long time. These data
may include customer master data (complete customer information), employee master data
(complete details of an employee), and subject master data (including information related to the
subject, i.e., subject name, description, schedule, and so on).
There are two (2) types of updates that can be made in the master data of an IS: (a) information
processing (IP) and (b) data maintenance (DP).
Information processing refers to data processing functions that are commonly related to internal
operations (e.g., manufacturing) and economic and financial activities.
Data maintenance refers to a system's functional activities such as adding, saving, deleting,
updating, retrieving, and editing data from the master data.
An IS is more concerned about the organization's business processes. The following are the three
(3) logical components of a business process within the scope of an IS:
a. Information process
b. Operations process
c. Management process
Information users for this particular process include the staff, employees, management, and
customers. Maintaining customer data and receiving a customer's complete order from an e-
commerce website are examples of this process.
Operation process refers to a man-made IS that consists of people, policies, procedures, and
equipment whose main objective is to accomplish a certain goal of a particular business
organization. The people involved in this process include those from human resources and those
who are tasked with product distribution. Attaching shipment details and including the tracking
information about a product are examples of this process.
Management process refers to a man-made IS that consists of people, policies, procedures, and
equipment whose main objective is to plan, manage, and control the overall operations of a
business organization. These processes include activities concerning planning and decision-
making. Creating new policies and procedures on delivering products to customers is an example
of this process.
IT refers to any technological or computer-based tool primarily used for supporting the needs of
business organizations. On the other hand, an IS collects, stores, retrieves, processes, manages,
disseminates, and analyzes information needed to facilitate business organizations' operational
functions and support management in making decisions. An IS is used by a business organization
to attain its common goal.
For business organizations to thrive in the modern business environment, they must take
competition seriously. They must expect powerful capabilities with regard to an IS. The following
are the capabilities of an IS.
e. Supporting decision-making
One of the most popular ISs is the decision support system or DSS. This system helps
users make decisions anytime at all levels of a business organization. The IS allows low-
level employees to participate in information sharing, which is necessary for decision-
making.
g. Uniting an organization through the coordination of its big and small groups
This capability allows organizations or parts of them to come together toward achieving a
common goal or objective.
The hardware and software are connected to each other, which means that a computer
will not work without either of them.
2. Software. Software refers to the set of computer programs that control the overall
operation of the computer system.
3. Database. It refers to a collection of related files and records that are stored in a special
location for easy access.
Examples: MS Access and Oracle
4. Networks. It refers to the connection of two or more computers established for the purpose
of sharing various data.
Examples: local area network (LAN), metropolitan area network (MAN), and wide area
network (WAN)
5. Procedures. These are the rules, policies, and methods that administer the operation of a
computer system. They are as significant as the people using the system. The procedures
state the appropriate software to use with the hardware and clarify the role of the
components in the CBIS.
6. People. They are the most crucial component of an IS. They are the people who work with
an IS to produce useful outputs.
Other Types of IS
In a TPS, there is no delay in batch processing, and the results of each transaction are
immediately available. In the case of a delay in batch processing, errors usually occur;
they are uncommon but acceptable and will not demand a shutdown of the entire system.
The MIS collects and gathers data, such as employee profile, project timeline, financial
status, inventory management, raw materials, and marketing and manufacturing; places
them in a data warehouse; and makes them ready for access at all times to managers and
higher-ups who want to evaluate the data from the reports generated.
The DSS is responsible for delivering information to managers who make assessments
about specific scenarios that are not well-managed. Other DSS applications include
medical diagnosis, business management, forest management, railroad projects, and
financial verification (for credit loan, credit card application, and so on).
As with other computer systems, the software is the one that controls the computer
hardware in terms of execution in an ElS. Telecommunication is the process of
transmitting data from one location to another and facilitating communication among
users. User interface (UI) refers to the means by which a person deals with a system, that
is, how he/she accesses the system or experiences it. A typical EIs has a user-friendly Ul,
which means that the operating system is easy to use, and the output is easy to interpret.
Early ElSs were built as programs for mainframe computers to help company
administrations provide information in terms of the company's profile and business
performance for the senior executives. EIS data that are available in a company are
assisted by technologies such as computers, machines, and workstations done through a
network known as LAN or the local area network, which is a type of network that consists
of a group of computers and associated devices that share common communication lines
or wireless links to a server. This network allows employees to deliver appropriate and
accurate information, as well as ideas, both to the company's higher and lower
management levels.
System Development Life Cycle (SDLC) is one of the methodologies used in software
development. However, many developed systems fail to meet the needs and requirements of a
business. One of the many reasons for such failure is that the systems are not fully functional or
not so flexible to adjust to the changing needs of the business. The DLC emphasizes that the
system can be developed in a series of phases. This simply means that each phase must be
completed first before other phase commences. In terms of programming, the development phase
(building the system) will only commence once the users' requirements have already been
determined, and the system design has been produced.
An SDLC is composed of multiple phases. In general, it follows the following: (1) planning, (2)
analysis, (3) design, (4) development, (5) testing, (6) implementation, and (7) maintenance. The
SDLC emphasizes that a system can be developed in a series of phases. It simply means that
each phase must be completed first before another phase commences. In terms of programming,
the development phase (building the system) will only commence once the users' requirements
have already been determined, and the system's design has been produced.
2. Analysis
The following are done in this phase:
Identifying and taking into account the risks that are related to how the technology
to be used for the project will be integrated into the standard operating procedures
Studying and gathering the functional and nonfunctional requirements of the
business process
Software applications (e.g., computer programming languages), files, and data flow must
not be considered yet during the system analysis stage.
3. Design
This phase aims to transform the system requirements that have been identified during
the previous stages into a more detailed system architecture that will be feasible, full.
bodied, and valuable to the organization.
4. Development
This phase aims to convert the approved system architecture and design into a working
system that is reliable and stable through the functional as well as technical and
nontechnical requirements that were identified and observed during the earlier stages of
the life cycle solutions.
5. Testing
This phase executes the system integration testing of the created and developed system.
It guarantees that the developed systems have brought together all the technical and non-
technical requirements with the necessary components and subsystems integrated.
The system test may require a series of tests depending on the scope and involvedness
of the requirements, including the six main quality characteristics: functionality, reliability,
usability, efficiency, maintainability, and portability.
The entire system must be prepared for the congregation before proceeding to the
integration and testing stage, meaning:
All hardware and software configurations must have been constructed and
tested successfully
All integration plans are ready and prepared
6. Implementation
The deployment or implementation phase first installs the system in the production
environment and makes it ready for operation. It then ensures that the system is fully
developed and free from system errors.
7. Maintenance
This phase involves making changes to the hardware, software, and documentation
process to support and sustain the system's operational effectiveness.
This is the phase where modifications are made to enhance the system's performance,
solutions to the problems or system errors encountered are derived, security
enhancements are performed, and user requirements are addressed.
Security enhancement during this phase is essential to ensure that information and the
entire system are free from malware or malicious software.
2.4 INFORMATION SYSTEM SECURITY
Information security means protecting information and ISs from malicious software and
unauthorized access, use, disclosure, modification, disruption, or destruction.
Information security management is the process of identifying the security controls to keep and
defend information assets.
The succeeding chapters will provide more information about IS security.