Management Information System
Management Information System
Management Information System
SYSTEMS
COURSE WRITER
Prof. Jayant K.Oke
EDITOR
Mr. Yogesh Bhosle
Acknowledgement
Every attempt has been made to trace the copyright holders of materials reproduced in this book. Should any
infringement have occurred, SCDL apologises for the same and will be pleased to make necessary corrections
in future editions of this book.
PREFACE
It is indeed my pleasure and privilege to offer this book on ‘Management Information Systems’ (MIS)
to the students of SCDL.
The course structure has been devised keeping in view the student profile and the fact that this is a
distance-learning programme. Accordingly, while the course material begins with the need and evolution
of MIS, it also discusses the related topics in a lucid manner, without in any way compromising the
basic basics. Due focus has also been bestowed on the emerging trends, particularly in the context of
increasing and intensifying global competition.
The student-readers would find repeated references to competitiveness, competitive battlefield and
to MIS as “Facilitator towards gaining the competitive advantage to survive, succeed and prosper in
today’s dynamic and competitive corporate environment”.
The course structure has also been designed viewing MIS from a generalist, practicing manager’s
perspective, who should be able to ask the right questions, know the wrong answer and arrive at the
most optimum decisions, by understanding and utilising computers and Information Technology from
a strategic control perspective. Suitable examples and case studies have also been incorporated.
It must be mentioned that while preparing the course material, I have drawn on materials from a
variety of Books, Journals, Seminar Papers etc. I acknowledge my profound intellectual debt to all
those authors and contributors. Their ideas have shaped my thinking on the subject over the years.
While I trust that the course material would be of real use and value to the student-readers, being a firm
believer in “Kaizen”, I would welcome suggestions and constructive criticism to ensure continuous
improvement.
My sincere thanks to SCDL for providing me an opportunity to share my experiences and knowledge
with a large number of distant learners.
iii
ABOUT THE AUTHOR
A Government Open Merit Scholar, Prof. Jayant Oke has done his masters in both Economics and
Management. He has also studied for the Post-Graduate Diploma in Laws and Post-Graduate Diploma
in Computer Applications and Systems Analysis.
He has around three decades of professional experience and credentials, initially as a Banker (selected
as a Probationary Officer for the State Bank Group and was later selected as Economist for the
Corporation Bank by the B.S.R.B., Southern Region, Bangalore) and presently as a Management
Consultant and Corporate Trainer.
As a Banker, Prof. Jayant Oke had a special association with and expertise in Project Management/
Financing, Strategic Planning and Management Information and Control Systems. It was during this
phase that he first encountered and realised the pivotal role of information in the corporate world. He
was instrumental in bringing out an MIS Compendium for the Bank’s operations during the seventies.
The relationship with information and control systems has since continued unabated. It was this
expertise, which helped him to branch off into Project and Management Consultancy during the Post-
1991 Liberalisation, Privatisation and Globalisation (LPG) Era.
Prof. Jayant Oke has been associated with Management education since 1993-94, as a Guest Faculty.
He is a recognised PG Teacher for Management Courses of the University of Pune since 1994.
He was also the former Director of Padmashri Dr. D.Y. Patil Institute of Management and Research, Pune
during 1994-95. He is currently associated as a Guest/ Visiting Faculty with the leading Management
Institutes in Pune, including University of Pune and Symbiosis Institutions.
Prof. Jayant Oke has been, inter alia, associated with a number of Corporate Organisations and with
prestigious Institutes in Pune viz. the Reserve Bank of India, VAMNICOM and YASHADA, as a
Guest Faculty.
Prof. Jayant Oke’s other current interests include Entrepreneurial Development and International
Business Management.
iv
CONTENTS
vi
Unit No. TITLE Page No.
vii
Unit No. TITLE Page No.
viii
Unit No. TITLE Page No.
Appendix I 278
Glossary 279
ix
Management Information System
UNIT
1
Structure:
1.1 Introduction
1.2 Concept of MIS
1.3 Role of MIS
1.4 Characteristics and Pre-requisites of MIS
1.4.1 Pre-requisites of MIS
1.5 Contemporary Approaches to MIS
1.6 Information as a Strategic Resource
1.6.1 Use of Information for Competitive Advantage
1.7 Porter-Millar Postulates
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
---------------------- Today, we have an unquenchable thirst for information. The society has
changed significantly from the barbarian to the agrarian society, from agrarian
---------------------- to the industrial society and from the industrial society to a society dominated
by the service sector.
----------------------
This structural transformation has brought about discernible changes in
---------------------- the way people think. We are all living, not in an agrarian or industrial society
but in an Information Society. In fact, we generally refer to the present times as
----------------------
the IT Age or the Information Era.
---------------------- Underneath this is a tacit acceptance of the fact that not since the advent
of the automobile and the introduction of the telephone, an invention had such
----------------------
wide-spread impact on our society as the computer, which has ushered in the
---------------------- Information Era.
Many a times, we really do not have the information we want and then ----------------------
there is a dilemma. The dilemma is beautifully expressed in the following
words, generally referred to as Finagle’s Law of Information: ----------------------
---------------------- T. Lucey has defined MIS as “a system to convert data from internal
and external sources into information, to communicate that information, in
---------------------- an appropriate form to managers at all levels, in all functions to make timely
and effective decisions for planning, directing and controlling the activities for
---------------------- which they are responsible”.
---------------------- According to Henry C. Lucas, “MIS is a set of organized procedures
which when executed provide information to support decision-making.”
----------------------
Donald W Kroeber and Hugh J. Watson have defined MIS as “an organized
---------------------- set of processes that provide information to managers to support the operations
and decision-making within an organisation”.
----------------------
From the various definitions quoted above, we can state that MIS is an
---------------------- integrated system, which transforms the data (inputs) into reports (outputs) for
facilitating decision-making through processing and using various components
----------------------
of the information system, viz., hardware, software, database, procedures and
---------------------- personnel.
----------------------
----------------------
Fig. 1.1 : MIS Concept
Thus, in our discussions we will always consider MIS, which is based on making ----------------------
use of computers for processing and providing information.
----------------------
----------------------
Fill in the blank.
1. MIS is a set of ___________, which when executed, provide ----------------------
information to support decision-making. ----------------------
2. In MIS, information is utilized to improve ______________and
achieve improved organizational effectiveness. ----------------------
Multiple Choice Multiple Response. ----------------------
1. A formal system should be able to take care of:
----------------------
i. Mass storage
----------------------
ii. Handling of voluminous data
iii. Confirmation of the validity of data and transaction ----------------------
iv. Hardware and software ----------------------
---------------------- Activity 1
----------------------
Using the Internet as your resource, find out more about Management
---------------------- Information System.
----------------------
1.3 ROLE OF MIS
----------------------
The role of MIS in an organization can be compared to the role of heart in
---------------------- the body. Information is the blood and MIS is the heart. The system ensures that
appropriate data is collected from the various sources, processed and sent further
---------------------- to all the needy destinations. The system is expected to fulfill the information
---------------------- needs of everyone the organization. MIS has become necessary due to increased
business and management complexities. These complexities demand not only
---------------------- quantitative but also qualitative decision-making. All managers, as we know,
have to take decisions under conditions of risk, certainty or uncertainty.
----------------------
A good manager/decision-maker is one who minimizes, if not eliminates
---------------------- altogether, the elements of risk and uncertainty in decision-making. MIS is
helpful in doing precisely this.
----------------------
Hence, MIS is required to enable managers to take qualitative decisions
---------------------- and ensure success for their respective organisations. MIS also enables the
managers to minimise the element of surprise.
----------------------
MIS enables decision-makers to come out with appropriate response to
---------------------- a business situation. It enables decision-makers to give either a re-active or
a proactive response. MIS generates information, communication, problem
----------------------
identification and helps in the process of decision-making.
---------------------- As the decisions are also futuristic, MIS facilitates pro-active decision-
making − it enables the managers/organisations to be ready for tomorrow. MIS,
----------------------
thereby, can act or function both as an instrument of defence as well as a weapon
---------------------- for offence, with strong strategic planning base.
Impact of MIS
----------------------
MIS creates an information-based work culture in an organisation. Since
---------------------- MIS plays a very important role in the organisation, it creates an impact on
---------------------- the organisational functioning, performance and productivity. MIS impacts
the management function of an organisation. With a good MIS support, the
---------------------- management of marketing, finance, production and personnel can become more
efficient. The tracking and monitoring of the functional targets become easy.
----------------------
The functional managers are informed about the progress, achievements
---------------------- and shortfalls in the activity and targets. The manager can alter certain decisions
with the help of information indicating the probable trends in various aspects
---------------------- of business. This helps in forecasting and long-term perspective planning. The
---------------------- manager’s attention is brought to a situation, which is exceptional in nature,
inducing him to take action or a decision in the matter.
6 Management Information Systems
A disciplined information reporting system creates a structured database Notes
and a knowledge base for all the people in the organisation. The information
is available in such a form that it can be used straight away or by blending and ----------------------
analysis, saving the manager’s valuable time.
----------------------
MIS affects the organisation by making it convenient to understand the
business better. MIS begins with the definition of data, entity and attributes ----------------------
respectively, designed for information generation in the organisation. Since all
----------------------
information systems use the dictionary, understanding terms and terminology
becomes easier, thereby bringing clarity in communication and understanding ----------------------
of an event in the organisation.
----------------------
MIS calls for systemisation of the business operations for an effective
system design. This leads to streamlining of the operations. It improves the ----------------------
administration of the business by bringing a discipline in its operations, as
everybody is required to follow and use the systems and the procedure. The ----------------------
process brings a high degree of professionalism in the business objects.
----------------------
Since the goals and objectives of MIS are the product of business goals
and objectives, it helps indirectly to pull the entire organisation towards the ----------------------
corporate goals and objectives by providing relevant information to the people
----------------------
of the organisation.
A well-designed system with a focus on the managers makes an impact on ----------------------
managerial efficiency. The use of computers helps managers to use the tools and ----------------------
techniques, which are impossible to use manually. The ready-made packages
make this task simpler. ----------------------
MIS positively impacts the managerial ability to perform. It also improves ----------------------
the decision-making ability considerably.
----------------------
Check your Progress 2 ----------------------
----------------------
----------------------
Activity 2
----------------------
Visit an organisation and discuss the impact of MIS in that organisation ----------------------
with the manager. Prepare a report on the same. Compare working to the
organization before MIS and after installing MIS ----------------------
----------------------
---------------------- 1. Management Oriented :- The system is designed from the top to work
downwards. It does not mean that the system is designed to provide
---------------------- information directly to the top management. Other levels of management
are also provided with relevant information.
----------------------
2. Management directed :- Because of management orientation of MIS
---------------------- , it is necessary that management should actively direct the system
development efforts. In order to ensure the effectiveness of system
---------------------- designed, management should continuously make reviews.
---------------------- 3. Integrated :- MIS should cover functional areas of an organization. so as
to produce more meaningful MIS, with a view to achieve the objectives
----------------------
of the organization. It has to consider various sub systems and their
---------------------- objectives.
4. Common data flow :- Because of the integration concept of MIS, common
----------------------
data flow concept avoids repetition and overlapping in data collection and
---------------------- storage, combining similar functions and simplifying operations wherever
possible.
----------------------
5. Flexibility and ease of use :- A feature that often goes with flexibility is
---------------------- ease of use.
----------------------
----------------------
----------------------
----------------------
Processing
Finance &
Marketing
Personnel
Accounts
Logistics
Activities ----------------------
R&D
----------------------
Management Control
----------------------
----------------------
Operational Control
----------------------
Technical Managerial Institutional
Changes Control Core ----------------------
Activities
----------------------
Time 1950s 1960s 1970s 1980s 1990s ----------------------
---------------------- ●● Procedures: These are the commands for combining the components
above to process information and produce the preferred output.
---------------------- In the end of all this, it is the people who are the ones using these hardware
and software to interface with it and make use of its output.
----------------------
The evolution of CBIS is shown in the figure below.
----------------------
To
---------------------- TPS
To
OAS
----------------------
To To
1950
---------------------- EIS GDSS
1960
1970
----------------------
1980
---------------------- To
To To 1990
MIS DSS To
ES
---------------------- AI
----------------------
Fig. 1.5 : Evolution of CBIS
----------------------
EDP Focus on Data
---------------------- OAS Focus on Communication
---------------------- MIS Focus on Information
DSS Focus on Decision Support for a specific business problem
----------------------
EIS Focus on Decision Support for Top Management
----------------------
ES Focus on Consultation
---------------------- AI Focus on self-learning/thinking systems
----------------------
----------------------
----------------------
----------------------
----------------------
OAS
Office
Automation
----------------------
System
----------------------
TPS ----------------------
Transaction
Processing
System ----------------------
----------------------
1950s 21st Century
----------------------
Fig. 1.6 : Evolution of MIS ----------------------
Consequently, the users and the characteristics of MIS have also undergone
----------------------
changes over the years as can be seen from the Table 1.4.
Table 1.4 Changes in MIS ----------------------
Type of Information Processing Information Users ----------------------
System Inputs Outputs
ESS/EIS Aggregate data, Graphics, Projections, response Senior managers
external, internal simulations, to queries ----------------------
interactive
DSS Low volume Interactive, Special reports, Professionals, staff ----------------------
data, analytic simulations, decision analysis, managers
models analysis response to queries
----------------------
MIS Summary Routine reports, Summary and Middle managers
transaction data, simple models, low exception reports
high volume level analysis ----------------------
data, simple
models ----------------------
KWS Design Modelling, Models, graphics Professionals,
specifications, simulations technical staff
knowledge base ----------------------
OAS Documents, Document Document, Clerical workers
schedules management, schedules, mail ----------------------
scheduling,
communication ----------------------
TPS Transactions, Sorting, listing, Detailed reports, Operations
events merging, updating lists, summaries personnel,
supervisors ----------------------
----------------------
Activity 3
----------------------
---------------------- How would the implementation of MIS facilitate the working of any
organisation? Prepare a report for the same by visiting an organisation.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Activity 4
----------------------
---------------------- Surfing the Internet, find out more about the technical approach to MIS.
----------------------
----------------------
1.6 INFORMATION AS A STRATEGIC RESOURCE
----------------------
Fill in the blanks.
----------------------
1. ______________ is the gathering of data and information.
2. Ability to access and use _____________ effectively has been an ----------------------
important source of _____________ for a number of organisations. ----------------------
----------------------
Activity 5
----------------------
Visit an organisation and find out how information plays an important ----------------------
role and why it is considered a strategic resource. Also understand how
information is collected from various sources. ----------------------
----------------------
1.7 PORTER-MILLAR POSTULATES
----------------------
According to Michael E. Porter and Victor E. Millar, Information
Technology affects competition in three vital ways: ----------------------
1. It changes industry structure, and in so doing, alters the rule of competitions. ----------------------
----------------------
Activity 6
----------------------
Visit an organisation and find out the competitive forces, which determine
----------------------
profitability as per Porter and Millar.
----------------------
----------------------
Summary
----------------------
Keywords
----------------------
●● Resource: Material or other asset that is transformed to produce benefit
and in the process may be consumed or made unavailable. ----------------------
●● Decision-making: The mental process (cognitive process) resulting in ----------------------
the selection of a course of action among several alternative scenarios.
●● Decision support system: A computer-based information system that ----------------------
supports business or organisational decision-making activities. ----------------------
●● Data: Data in computing are often represented by a combination of items
organized in rows and multiple variables organized in columns. ----------------------
●● Data Processing: Any process that a computer program does to enter data ----------------------
and summarise, analyse or otherwise convert data into usable information.
----------------------
●● Information: A sequence of symbols that can be interpreted as a message.
----------------------
Self-Assessment Questions
----------------------
1. State the difference between typical data processing and management
information system. ----------------------
2. “Business complexities led to development of MIS.” Do you agree with ----------------------
this statement? Justify your answer.
3. What is MIS? Explain its role and impact. ----------------------
----------------------
----------------------
----------------------
2. Ability to access and use information effectively has been an important ----------------------
source of competitive advantage for a number of organisations.
----------------------
Check your Progress 6
----------------------
Multiple Choice Multiple Response.
1. A firm can use four basic competitive strategies to deal with the competitive ----------------------
forces:
----------------------
i) Product differentiation
----------------------
ii) Focused differentiation
iv) Becoming a low-cost product ----------------------
Fill in the blanks. ----------------------
1. Information and IT help organisations to acquire strategic flexibility.
----------------------
Suggested Reading ----------------------
1. Davis, G and M. Olson. 1985. Management Information Systems. New ----------------------
York: McGraw Hill)
----------------------
2. Jawadekar, Waman. 2009. Management Information Systems: Text &
Cases. New Delhi: Tata McGraw Hill. ----------------------
3. Prasad, L.M. and Usha Prasad. 2003. Management Information Systems.
----------------------
New Delhi. Sultan Chand & Sons.
4. Sadagopan, S. 1998. Management Information Systems. New Delhi: ----------------------
Prentice Hall India.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
2
Structure:
2.1 Introduction
2.2 Impact of Information Technology
2.3 Understanding a Computer
2.4 Generations of Computer
2.5 Categories of Computer
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
Information Technology 27
Notes
Objectives
----------------------
After going through this unit, you will be able to:
----------------------
●● Discuss Information Technology and its impact
---------------------- ●● Define a computer, its hardware and software
---------------------- ●● Identify the generations of computer
---------------------- ●● Describe various categories of computer
----------------------
2.2 IMPACT OF INFORMATION TECHNOLOGY
---------------------- IT has changed the way business organisations function and carry out their
activities. People like Bill Gates today talk and write about “Business @
---------------------- Speed of Thought” and information. Most of us today routinely talk about and
some of us actually deal in e-business, e-commerce, etc.. IT has transactional,
---------------------- geographical, automational, analytical, informational, sequential, knowledge
---------------------- management, tracking and disintermediation capabilities.
----------------------
Fill in the blanks.
----------------------
1. _______________ is the term used to describe technologies, which
enable the users to record, store, process, retrieve, transmit and ----------------------
receive information.
----------------------
2. IT has changed the way _________________ function and carry out
their activities. ----------------------
----------------------
----------------------
----------------------
Information Technology 29
Notes
Activity 1
----------------------
Visit a manufacturing company and analyse the impact of Information
----------------------
Technology on the company.
----------------------
----------------------
2.3 UNDERSTANDING A COMPUTER
---------------------- According to the Information Technology Act, 2002, “Computer means any
electronic, magnetic, optical or other high speed data processing device or system
---------------------- which performs logical, arithmetical and memory functions by manipulation
of electronic, magnetic or optical impulses, and includes all inputs, output,
---------------------- processing, storage, computer software or communication facilities which
---------------------- are connected or related to the computer in a computer system or computer
network.”
---------------------- A computer is an electronic device, which accepts input, processes it according
---------------------- to a set of instructions provided and generates the desired output. It operates on
data. It can store, process and retrieve data as and when desired. A computer
---------------------- system is a combination of the following different elements:
---------------------- ●● Hardware: All physical devices that the computer is made of.
●● Software: Instructions that tell the hardware what and how to perform.
----------------------
●● Data/Information: Data is facts collected and given as input to the
---------------------- computer and information is processed data, i.e, data is processed into
useful information.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 2.1 A Computer System
----------------------
Characteristics of a computer
----------------------
1. Automatic: Computers are automatic machines because once a job
---------------------- starts, it continues until the job is finished, normally without any human
assistance.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 2.2 Basic Organisation of a Computer System
The computer hardware consists of: ----------------------
1. Central Processing Unit (CPU): The CPU consists of the Arithmetic ----------------------
Logic Unit and the Control Unit. It is at the CPU that the manipulation of
----------------------
symbols, numbers and letters takes place. The CPU also controls the other
parts of the computer system. It is like the human brain. ----------------------
i. Arithmetic Logic Unit (ALU): The ALU in the CPU performs
----------------------
both arithmetic and logical operations. On the arithmetic side, the
ALU adds, subtracts, multiplies and divides, determining whether ----------------------
Information Technology 31
Notes a number is positive, negative or zero. On the logical side, it
distinguishes between letters as well as numbers logically, and also
---------------------- determines whether a given quantity is greater than or less than or
equal to another quantity. The type and number of arithmetic and
---------------------- logical operations, which a computer can perform, is determined
---------------------- by the engineering design of the ALU. Most ALU’s are designed to
perform the four basic arithmetic operations (add, subtract, multiply
---------------------- and divide) and logical operations or comparisons.
---------------------- ii. Control Unit (CU): The CU selects and interprets program
instructions and then checks their execution. It has some special-
---------------------- purpose registers and a decoder to perform these activities. The
special-purpose registers help the control unit in instruction
----------------------
selection, namely the instruction register and the program control
---------------------- register, which hold the current instruction and the next instruction
to be executed respectively.
----------------------
The decoder has the necessary circuitry to decode and interpret the
---------------------- meaning of ever instruction supported by the CPU. Each instruction is
accompanied by microcode (very basic direction), which tells the CPU
---------------------- how to execute the instruction.
---------------------- In spite of the fact that the control unit does not perform any actual
processing of the data, it still acts as the central nervous system for the
---------------------- other components of the computer by managing and coordinating the
entire computer system including the input and output units. The control
----------------------
unit receives instructions from the program stored in the main memory,
---------------------- interprets the instructions and issues signals, which cause other units of
the system to execute them.
----------------------
2. Input unit: Data and instructions must be entered into the computer
---------------------- system before any computation can be performed. This task is performed
by the input unit, which links the external environment with the computer
---------------------- system.
---------------------- Data and instructions enter input units in various forms, which depend
upon the particular input device used. Regardless of the form in which
---------------------- input is received, all input devices must transform the input data into
---------------------- binary codes, which the primary memory of a computer is designed
to accept. This transformation is accomplished by units called input
---------------------- interfaces. The functions performed by an input unit are:
---------------------- ●● It accepts/reads the instructions and data from the outside world.
●● It converts these instructions and data in computer acceptable form.
----------------------
●● It supplies the converted instructions and data to the computer
---------------------- system for further processing.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig 2.4 Output Units ----------------------
Information Technology 33
Notes 4. Storage device: The storage devices are used to store data. The various
types of storage devices are discussed below.
----------------------
i. Primary storage: Also referred to as the main/core memory,
---------------------- primary storage is where data and storage instructions are
stored for a temporary period till the processing is completed.
---------------------- There are three different types of primary storage, viz.,
the Register (in ALU or CU), the Cache and the RAM.
----------------------
The linkage between CPU, primary storage and the other
---------------------- devices is provided by three buses, viz., Data Bus, Address
Bus and Control Bus. The Data Bus moves data to and
---------------------- from primary storage. The Address Bus transmits signals for
locating a given address in primary storage. The Control Bus
----------------------
transmits signals specifying whether to read or write data to/from a
---------------------- given primary storage address, input device or output device.
ii. Secondary storage: This device is used for relatively long-term,
----------------------
non-volatile storage of data outside the CPU and primary storage.
---------------------- Also called auxiliary memory (supplementary, backup), it is low in
cost and can store large volume of data on permanent basis. Hard
---------------------- disk, high-density diskette, magnetic tape, optical disk are some of
the secondary storage devices used.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Arithmetic Logic
Unit Primary ----------------------
Storage ----------------------
Control Unit
----------------------
----------------------
DATA BUS ----------------------
ADDRESS BUS
CONTROL BUS
----------------------
----------------------
----------------------
Fig. 2.6 Physical Media to link Various Devices
----------------------
Check your Progress 2
----------------------
Information Technology 35
Notes
Activity 2
----------------------
List down the configuration of your computer along with the operating
----------------------
system and other software installed on your machine.
---------------------- List down the steps that you would follow if you find your computer not
---------------------- working properly or work slower than usual.
Information Technology 37
Notes The cumulative effect was the emergence of extremely compact, yet
powerful, computers. Computer memories expanded to 2 MB of RAM
---------------------- and processing speed of CPU went up to 5 Million Instructions per Second
(MIPS).
----------------------
The improved/increased CPU capabilities led to development of time-
---------------------- shared operating systems, made online systems feasible and led to the
emergence of Integrated Database Management Systems.
----------------------
There were further improvements in high-level languages. It was
---------------------- during this period/generation that it became possible for people without
extensive technical training to make use of computers, making it possible
----------------------
for computers to enlarge their role in business, thanks to newly developed
---------------------- systems like dynamic production control systems, airlines reservation
systems, interactive query systems, etc.
----------------------
Table 2.4 Third-Generation Computers
---------------------- Computer Characteristics Trends and Development in
and Capabilities Computer Hardware
----------------------
Disk size mini computer Integrated semi-conductor circuits
----------------------
Thousands components per circuit Magnetic core
----------------------
Millions instructions per second Magnetic Drum, Magnetic Tape
----------------------
Failure of circuits in weeks Key to tape and disk (input media)
----------------------
Hundreds of thousands capacities Printed reports/video displays (output media)
----------------------
Cost lower than second generation
----------------------
4. Fourth generation: The computers, which we handle today, belong to
---------------------- fourth generation, which extends from 1980 to the present. The fourth
---------------------- generation computers are characterised by the use of Very Large Scale
Integrated Circuits (VLSICs) which are packed with as many as 2,00,000
---------------------- to over 3 million circuits per chip.
---------------------- As a result, the power of a computer that once took up a large room, now
became as small as a desktop/tower top/laptop and even palmtop.
----------------------
The VLSIC technology has fuelled a growing movement towards micro-
---------------------- processors and micro-miniaturisation − the proliferation of computers
that are so small, fast and cheap that they have become ubiquitous.
----------------------
Computer memory size has accelerated/gone up to over 2 gigabytes in
---------------------- large commercial machines, processing speeds having exceeded 200
MIPS.
----------------------
The fourth-generation computers have been instrumental in:
---------------------- ●● Making possible/available extremely powerful Personal Computers (PCs)
---------------------- at relatively lower costs.
----------------------
Information Technology 39
Notes
Check your Progress 3
----------------------
---------------------- Activity 3
----------------------
By surfing the Internet, collect more information about the various
---------------------- generations of computers and prepare a report on the same.
---------------------- You are planning to buy a computer. What would be your decision criteria
and why?
----------------------
2.5 CATEGORIES OF COMPUTER
----------------------
As seen earlier, each generation of computer is characterised/distinguished
----------------------
by application of a new technology related with the processing speed,
---------------------- processing capability, memory and utilities among others. Just as computers
differ in technology, computers also differ in terms of size and processing
---------------------- speed/capability. It is based on these aspects that computers are divided into the
following four categories:
----------------------
1. Supercomputer: A supercomputer is a highly expensive, sophisticated
---------------------- and powerful machine with huge primary storage. It is designed
for applications requiring very high speed, extremely rapid and
----------------------
complex computations involving hundreds or thousands of variables.
---------------------- Supercomputers process instructions not one at a time in sequential mode,
but in the parallel processing mode.
----------------------
The use of supercomputers has been traditionally confined to scientific/
---------------------- military research, weather forecasting and engineering applications,
where complex mathematical models and simulations have to be used.
---------------------- With the increasing complexity of business due to globalisation and
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
2. Mainframe computer: A mainframe computer has very powerful CPU, ----------------------
highly sophisticated operating system and very large secondary storage
capabilities. “It is a powerhouse with massive memory and extremely ----------------------
rapid processing speed/ability. It is used for very large commercial,
----------------------
scientific or military applications where a computer must handle massive
amounts of data or many complicated processes. A mainframe can support ----------------------
multiple jobs being executed concurrently and online processing from
many remote locations at once.” ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Information Technology 41
Notes 3. Minicomputer: A minicomputer is a middle-range computer, less than
the size of an office desk and relatively less expensive. It may support
---------------------- online processing from multiple remote locations. It is often used in major
academic institutions, universities, factories or research laboratories.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fill in the blanks.
----------------------
1. Each generation of computer is characterised/distinguished by
application of a new technology, related with the ___________, ----------------------
processing capability, _______________ and utilities among others.
----------------------
2. A ____________ has very powerful CPU, highly sophisticated
operating system and very large secondary storage capabilities. ----------------------
3. A microcomputer could be easily carried from one place to another ----------------------
and is used as a __________ machine as well as in office/workplace
and _______________. ----------------------
4. The use of supercomputers has been traditionally confined to ----------------------
_____________, ______________ and ___________________.
----------------------
----------------------
Activity 4
----------------------
Gather more information about the various categories of computer systems
and write the characteristics and distinctive features of each of them in your ----------------------
own words.
----------------------
Compare a desktop and laptop. Write down pros and cons of both
----------------------
Summary ----------------------
Information Technology 43
Notes ●● The second-generation computers used transistors made of germanium
semi-conductor material instead of the vacuum tubes, for storing and
---------------------- processing data.
---------------------- ●● The third-generation computers emerged with the introduction of a newer
technology—the integrated circuits/chips.
---------------------- ●● The fourth-generation computers are characterised by the use of Very
---------------------- Large Scale Integrated Circuits (VLSICs) which are packed with as many
as 2,00,000 to over 3 million circuits per chip.
---------------------- ●● Fifth-generation computers are expected to use artificial intelligence.
---------------------- ●● A supercomputer is a highly expensive, sophisticated and powerful
machine with huge primary storage.
----------------------
●● A mainframe computer has very powerful CPU, highly sophisticated
---------------------- operating system and very large secondary storage capabilities.
●● A minicomputer is a middle-range computer, less than the size of an office
----------------------
desk and relatively less expensive.
---------------------- ●● A microcomputer, often termed as, or considered synonymous with a
Personal Computer (PC), is a very compact and small computing machine.
----------------------
Keywords
----------------------
●● Information technology: It deals with the use of computers and
----------------------
telecommunications equipment to store, retrieve, transmit and manipulate
---------------------- data
●● Computer generations: The history of computer development is often
----------------------
referred to in reference to the different generations of computing devices.
---------------------- A generation refers to the state of improvement in the product development
process.
----------------------
●● Hardware: It is the collection of physical elements that comprise a
---------------------- computer system.
●● Software: It is a collection of computer programs and related data that
----------------------
provides the instructions for telling a computer what to do and how to do
---------------------- it.
●● Diligence: The ability of a computer to perform repetitive tasks with the
---------------------- same accuracy consistently without tiredness.
---------------------- ●● Input device: Any peripheral (piece of computer hardware equipment)
used to provide data and control signals to an information processing
---------------------- system such as a computer or other information appliance.
---------------------- ●● Output device: Any piece of computer hardware equipment used to
communicate the results of data processing carried out by an information
---------------------- processing system (such as a computer) which converts the electronically
---------------------- generated information into human-readable form.
----------------------
1. Diligence is the ability of a computer to perform repetitive tasks with the ----------------------
same accuracy consistently without tiredness.
----------------------
2. The CPU consists of the ALU and the CU.
----------------------
3. Output interfaces are designed to match the unique physical or electrical
characteristics of output devices. ----------------------
4. Secondary storage devices are used for relatively long-term, non-volatile
----------------------
storage of data outside the CPU and primary storage.
Check your Progress 3 ----------------------
Fill in the blanks. ----------------------
1. The first generation of computers refers to those computers, which relied ----------------------
on and used vacuum tubes for storing and processing data.
----------------------
----------------------
Information Technology 45
Notes 2. The full form of ENIAC is Electronic Numerical Integrator and Calculator.
3. The full form of MIPS is Million Instructions per Second.
----------------------
4. Fifth-generation computers are expected to use parallel processing and
---------------------- massively parallel processing.
---------------------- State True or False.
---------------------- 1. False
2. False
----------------------
3. True
----------------------
4. True
---------------------- 5. False
---------------------- Check your Progress 4
----------------------
----------------------
----------------------
----------------------
3
Structure:
3.1 Introduction
3.2 Functions and Categories of Software
3.2.1 Software Categories
3.2.2 Leading Microcomputer Operating Systems
3.3 Data Communication
3.4 Data Processing Modes
3.4.1 Other Data Processing Modes
3.5 Data Transmission
3.6 Network
3.6.1 Network Topologies
3.6.2 Types of Network
3.7 Internet
3.8 IT Enabled Services
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
Application Software
----------------------
----------------------
System Software
----------------------
Hardware
----------------------
----------------------
----------------------
----------------------
System Software
---------------------- 2. Same hardware can have different software to make the computer system
perform different types of job.
---------------------- 3. Except for upgrade, hardware is normally one-time cost, whereas software
---------------------- cost can be recurring.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
---------------------- Activity 1
----------------------
In a computer, both hardware and software are essential and they complement
---------------------- each other. Do you agree with this statement? Justify your answer.
File ----------------------
Blocks ----------------------
Records ----------------------
Fields ----------------------
----------------------
Item
Characters ----------------------
----------------------
Bytes
----------------------
Bits
----------------------
Fig. 3.2 Data Hierarchy
----------------------
Data processing involves a number of operations, similar to those in a
manufacturing unit, to convert the basic raw material − data − into a finished ----------------------
product, i.e., Information. The typical data processing steps would include,
among others, the following activities. ----------------------
Table 3.2 Data Processing Steps ----------------------
Read Sort Collate Compare Store
----------------------
Write Merge Delete Decide Display
----------------------
Print Copy Enter Compute Etc. ----------------------
Plot Transfer Create Perform ----------------------
Data processing also involves carrying out a number of data operations as ----------------------
mentioned in Table 3.3.
----------------------
----------------------
----------------------
----------------------
Fill in the blanks.
1. Before processing a transaction, the relative data item has to be ----------------------
________, verified and found _________ as regards to its quality ----------------------
specification. This process is called data ____________.
2. Data processing involves a number of operations, similar to those ----------------------
in a manufacturing unit, to convert the basic raw material, i.e., ----------------------
_______________ into a finished product, i.e., ________________.
----------------------
Activity 2 ----------------------
----------------------
Surf the Internet and read more about data transmission modes and discuss
the same in your own words. ----------------------
During the pandemic, every organization moved from offline to online ----------------------
platforms. Visit any organization and make a report on the transition
procedure ----------------------
----------------------
3.4 DATA PROCESSING MODES
----------------------
As stated earlier, computers are used for the processing of data, analysing
it and getting the necessary information for facilitating decision-making. It is, ----------------------
therefore, imperative that the data be processed in keeping with the specific
needs, demands and requirements of the organisation. ----------------------
It would not be out of place to state that demands of the business determine ----------------------
the type of data processing modes/methods. Broadly, there are four different
----------------------
methods used for data processing and updating as shown in Figure 3.4.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 3.5 Batch Processing
----------------------
A batch processing system is one where data is collected together in a
---------------------- batch before processing starts. Data entry for early computers was done
by using punched cards, which were handled in batches, and hence the
---------------------- term batch processing. Each piece of work for a batch processing system
is called a job. Batch processing is most suitable for tasks where a large
----------------------
amount of data has to be processed on a regular basis. Examples of batch
---------------------- processing systems include payroll systems and examination report card
systems.
----------------------
Advantages of a batch processing system include:
---------------------- ●● Once the data is submitted for processing, the computer may be left
---------------------- running without human interaction.
●● The computer is only used for a certain period of time for the batch job.
----------------------
●● Jobs can be scheduled for a time when the computer is not busy.
---------------------- Disadvantages of a batch processing system include:
---------------------- ●● There is always a delay before work is processed and returned.
●● Batch processing usually involves an expensive computer and a large
----------------------
number of trained staff.
56 Management Information Systems
●● While batch processing may be useful in enhancing control of transaction Notes
processing, it must be remembered that one major disadvantage of
periodic batch processing is the delay in detecting and correcting err ----------------------
2. Online processing system: The online processing system of transactions ----------------------
has now become a way of life. In this system, the user has access to a
terminal for input of transactions and output of results. The user enters ----------------------
transactions into a device that is directly connected to the computer
system. The transaction is taken for processing directly and is validated ----------------------
immediately before being taken up for further processing. ----------------------
After validation, the data is accepted but processing itself may be
performed either immediately or at a subsequent time. For online ----------------------
processing, the files must be available on direct access storage devices for ----------------------
immediate access to the data, so that records could be added to or deleted
from the file. Thus, in online processing, the processing of data, from ----------------------
input to computation and updation of status on various files is carried out
immediately. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 3.6 Online Processing
However, a user responsible for processing data in an online system ----------------------
must ensure proper security protocol. He must sign on properly, enter
----------------------
transactions in the proper laid-down format, respond to error messages
with corrected input, review control information and sign off after the ----------------------
transaction processing is complete, to prevent unauthorised use/access.
----------------------
3. Online real-time processing system: The online real-time processing
system is similar to the online processing system in as much as in both the ----------------------
systems, a transaction is entered directly into the computer and validated
immediately. ----------------------
However, while under the online system, the transaction may be processed ----------------------
later, once a transaction is found to be valid, it is processed immediately
and the results are also made available immediately, as the master data is ----------------------
always up-to-date. ----------------------
Needless to add, the real-time processing concept is used where stored
data needs to be updated simultaneously as the transaction takes place. ----------------------
The points to be considered are the higher costs of online processing, ----------------------
greater computer power and often data communication, as also the
----------------------
extra procedures required to produce adequate control information and
----------------------
----------------------
----------------------
----------------------
----------------------
Check your Progress 3
----------------------
Fill in the blanks. ----------------------
1. A ___________ system is one where data is collected together in a
----------------------
batch before processing starts.
2. The _____________ of data processingallows several users to ----------------------
simultaneously share the processing capability of the computer
----------------------
system.
3. Multiprogramming is one of the most important capability of the ----------------------
operating system used for sharing computer resources and facilitating
----------------------
________________.
4. When one of the jobs in memory is finished, another job is taken from ----------------------
the __________ of jobs and put into the ___________for execution. ----------------------
----------------------
Activity 3
----------------------
Analyse the examples of online processing and online real-time processing ----------------------
by visiting relevant sites and prepare a report on the same.
----------------------
----------------------
----------------------
----------------------
---------------------- 2. Digital signal: It is a discrete waveform that transmits data coded into
two discrete states as 1bits and 0 bits, which are represented as on-off
---------------------- electrical pulses. Digital signal is very useful in data communications.
Now we are, indeed, moving into the “Digital Era” using the digital
---------------------- signal.
----------------------
0 0 0 0 0
----------------------
Fig 3.9 Digital Signal
----------------------
Modem: Modem is an abbreviation of MOdulation/DEModulation. A
modem is a device that performs the translation from analog to digital ----------------------
or from digital to analog form of signal. The functions of the modem are
illustrated as follows. Refer to Fig. 3.10. ----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 3.10 Modem ----------------------
Communication/Transmission channels
----------------------
Communication channels are the links/means by which data is transmitted
from one device in a network to another. A channel can make use of various ----------------------
media like: ----------------------
1. Physical connection lines
----------------------
i. Twisted pair of copper wires
----------------------
ii. Coaxial cables
iii. Optical fibre ----------------------
2. Microwave lines ----------------------
i. “Line of sight” earth microwave (tower to tower) ----------------------
ii. Radio/wireless transmission waves (AM/FM)
----------------------
iii. Satellite
----------------------
Characteristics of communication channels
The communication channels, mentioned earlier, have the following ----------------------
characteristics:
----------------------
1. Transmission speed: It is the total amount of information that can be
transmitted through any telecommunication channel and is measured in ----------------------
Bits Per Second (BPS). This speed is sometimes also referred to as “baud
----------------------
rate”.
----------------------
----------------------
----------------------
----------------------
Activity 4
----------------------
Using the Internet as your resource, find out the difference between analog ----------------------
and digital signals.
----------------------
3.6 NETWORK ----------------------
The changes and developments in computer science, telecommunications ----------------------
and connectivity, which have been made possible, in turn, gave rise to the
networks, which have now become a routine. ----------------------
Computers and telephone, along with the Industrial Revolution and ----------------------
automobile, have changed and are changing the way business will be done. In
the 20th century, in particular, telecommunication and computers have changed ----------------------
dreams into reality.
----------------------
The development of powerful microprocessors and telecommunication
networks has forced the emergence of a new information architecture based ----------------------
on multi-tasking, multi-programming utilities of computers and digitised
----------------------
communication networks.
The technological advances in computer science and telecommunication, ----------------------
coupled with globalisation of corporate activities, necessitated effective ----------------------
networking facilities for ensuring effective and efficient functioning/
management of organisations. The networks now enable the business ----------------------
organisations to communicate with practically everybody − be it customers or
vendors or competitors or outside database sources − on a global and almost ----------------------
online real-time basis. ----------------------
----------------------
----------------------
Computer 1 ----------------------
Computer 2 ----------------------
----------------------
----------------------
----------------------
Terminal 2 ----------------------
Terminal 3
----------------------
Fig. 3.11 Star Network ----------------------
2. Bus network: The bus network is basically a peer-to-peer network. It
links a number of computers by a single circuit. There is no central host/ ----------------------
hub computer to control the network. All the signals are transmitted to ----------------------
the total network, with special software to help in identifying which
components receive messages. ----------------------
As such, the bus network is never affected totally and is not vulnerable ----------------------
like the star network. This is because even if one of the computers in
the bus network becomes inoperable or stops functioning, the remaining ----------------------
network remains unaffected.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Computer 2 Terminal Computer 4
----------------------
----------------------
----------------------
----------------------
Computer with
---------------------- Computer 3
Hard Disk Drive
---------------------- Printer
----------------------
Fig. 3.13 Ring Network
----------------------
Now, a variant of the ring network, known as token ring network, is also
---------------------- available. In this network, a “token” is used by all the computers/devices
connected for communicating. The “token” is a predefined packet of data
---------------------- indicating the sender, receiver and also indicating whether the packet is in use.
---------------------- The token ring network is considered to be more useful for transmitting
large volumes of data between microcomputers or for transmissions between
---------------------- microcomputer and larger computer/s.
----------------------
----------------------
----------------------
----------------------
----------------------
Client Server PC
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 3.14 Local Area Network
----------------------
LANs can also be connected to larger backbone network, which allows
message transmission around the world. ----------------------
2. Backbone Network: It is a large central network in which everything ----------------------
within the organisation is connected. It usually is a network that
interconnects everything on a single company site. It also can be similar ----------------------
to a Metropolitan Area Network (MAN); but for a single organisation
----------------------
such as a company or university only, in which all the terminals, micro-
computers, mainframe, LANs and other communication equipments are ----------------------
connected.
----------------------
----------------------
Activity 5
----------------------
Visit an organisation and find the type of network topology being used. ----------------------
----------------------
3.7 INTERNET
----------------------
Internet is a collection of networks—literally an inter-network. It is ----------------------
also a collection of servers connected by common protocols and agreed-upon
standards. ----------------------
To put it simply and succinctly, Internet is the global connection between ----------------------
computers that allows individuals to send e-mail, make travel bookings, order
books, etc. between people and companies all around the world. Internet is a ----------------------
worldwide network of computers holding vast quantities of data that the user
can access directly from a personal computer. Internet has emerged as the single ----------------------
largest “Information Superhighway” in the world. ----------------------
Internet is commonly referred to as “the network of the networks”. The
Internet (with the capital “I”) is a public resource. It means that any user or ----------------------
server on the Internet can connect to any other user or server. No one “owns” ----------------------
the Internet, and this feature gives individual and corporate organisations
tremendous capabilities. Internet has proved to be a powerful tool for corporates ----------------------
in particular as it helps, inter alia, bring in customers, generates revenue and
saves money. ----------------------
----------------------
----------------------
----------------------
----------------------
Record Record
----------------------
----------------------
----------------------
---------------------- Activity 6
---------------------- Surf the Internet and find out the limitations and future of ISDN and also
give relevant example for the same.
----------------------
----------------------
Some of the major GIS applications are in the areas of: ----------------------
a. Advertising ----------------------
b. Archeology
----------------------
c. Education (location of institutes, etc.)
----------------------
d. Cartography (mapmaking)
----------------------
e. Site selection (real estate, optimal railway route, etc.)
f. Election administration (locating booths) ----------------------
g. Insurance ----------------------
h. Routing/distribution network ----------------------
i. Oil, gas and mineral exploration
----------------------
---------------------- In addition to the above-mentioned reasons, some of the other reasons for
outsourcing ITES as indicated by Michael F. Corbett and Associates are:
---------------------- 1. Need to create a variable cost structure.
---------------------- 2. Need to increase revenue.
3. Need to foster innovation.
----------------------
4. Need to conserve capital.
---------------------- 5. Need to improve quality.
---------------------- 6. Need to increase speed to market.
The Snags
----------------------
The ITES in India face certain problems which need to be looked into and
---------------------- set right forthwith on a top priority. Some of the problems are:
---------------------- 1. Relatively poor quality of basic infrastructure including transport, power,
housing and bandwidth (notwithstanding recent improvements).
----------------------
2. Department of Telecommunications (DoT) regulations hampering
---------------------- sufficient/unrestricted interconnectivity.
----------------------
---------------------- 3. The analog signal is in the form of waves of different frequencies and
subject to distortion.
---------------------- 4. Digital signal is generated by microprocessor based or controlled device.
---------------------- 5. Transmission speed is the total amount of information that can be
transmitted through any telecommunication channel and is measured in
----------------------
Bits per Second.
---------------------- Check your Progress 5
---------------------- Fill in the blanks.
---------------------- i. - c.
ii. - d.
---------------------- iii. - b.
---------------------- iv. - a.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
4
Structure:
4.1 Introduction
4.2 Management
4.3 Decision-Making
4.4 Decision-Making Process
4.5 Decision-Making Tools
4.6 Principles for Decision-Making
4.7 Decision-Making Models
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
---------------------- Management is “the art of getting things done through people”. A manager
is defined as a person who achieves the organisational goals by motivating
---------------------- others to perform and not only by performing himself. Modern management in
the environment of technology is becoming more of science than an art.
----------------------
Management, which is defined as “the process of planning, leading,
---------------------- organising and controlling the resources of an organisation in the effective and
efficient pursuit of specified organisational goals”, is responsible for survival,
----------------------
success and prosperity of organisations. However, in discharging its functions,
---------------------- it faces lot of problems in today’s dynamic and fiercely competitive world.
Modern management system relies and depends on MIS. The complexity
----------------------
of business management and competitive nature of business requires handling
---------------------- of business operations with skills and foresight to avoid crisis. Modern business
management requires shift from the traditional controls to managerial controls.
---------------------- The manager becomes more efficient if he is well informed, has a knowledge
base, experience and analytical skills and is able to face the uncertainties or
----------------------
risks of business. All this is possible only if the management is supported by
---------------------- MIS.
----------------------
Activity 1
----------------------
Visit any organisation and try to find out the role of managers there and their ----------------------
decision making procedure
----------------------
4.3 DECISION-MAKING ----------------------
A decision is the choice out of several options made by the decision- ----------------------
maker to achieve some objective in a given situation.
----------------------
A number of experts consider decision-making as the single-most
important managerial function. Decisions are made at different levels in the ----------------------
organisation structure. The decisions made at different levels vary in their
content, risks involved, complexity and the implications. ----------------------
The information support required for the decision-making process also ----------------------
varies according to the type of decision and the level within the organisation at
which such decision is being made. ----------------------
Information Technology 85
Notes Decision-making environment
Decisions could be made under different types of environment, viz.,
----------------------
ambiguity, certainty, uncertainty and risk. An environment is ambiguous when
---------------------- the problem is not clear, the goal is not clear and hence the outcome also is not
clear.
----------------------
A certain environment is one where the relationship between inputs and
---------------------- outputs is known and hence the result is also known. The element of uncertainty
is there when there is unawareness about resources, input/output relations and
---------------------- the outcome is uncertain or unpredictable. The risk environment is one where
the result is unknown − it might result in profits, but it might lead to incurring
----------------------
losses as well.
---------------------- Decision types
---------------------- Decisions could be divided into two categories − programmed decisions
and non-programmed decisions.
----------------------
1. Programmed decisions: The major characteristics of the programmed
---------------------- decisions are:
---------------------- l They are routine/structured.
l They are repetitive/short-term.
----------------------
l Definite procedure is to be followed.
---------------------- l There are laid-down norms.
l The situations are known
----------------------
l They are taken at the lower/operating levels in an organisation
----------------------
The techniques used for taking programmed decisions are:
---------------------- l Habit
---------------------- l Standard Operating Procedure (SOP)
l Organisational Hierarchy/Structure
----------------------
l Operational Research
---------------------- l Computers
Programmed ----------------------
Fig. 4.1 Levels of Management and Types of Decisions ----------------------
This can also be illustrated by looking at the decision-making process
----------------------
from the organisational pyramidal point of view.
----------------------
Unstructured ----------------------
Policy
Planning
(Strategic) ----------------------
----------------------
Tactical
Planning ----------------------
----------------------
Operational Planning
----------------------
----------------------
Transaction Planning Structured
----------------------
----------------------
Fig. 4.2 Decision-Making at Different Levels of Organisation
----------------------
Check your Progress 2 ----------------------
----------------------
Fill in the blanks.
1. The certainty environment is one where the relationship between ----------------------
inputs and outputs is _______________ and hence the result is also ----------------------
____________.
2. Decisions are made at different ______________ in the organisation ----------------------
structure. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Certainty Risk Uncertainty
Conditions Conditions Conditions ----------------------
----------------------
Select Alternative
Revise ----------------------
Implement Decision
----------------------
Evaluate & Control ----------------------
The payoff matrix shows that the Activity “B” can give him the best ----------------------
possible return among the three alternatives.
----------------------
It must, however, be remembered that the payoff matrix has an obvious
weakness. It is dependent on the decision-maker’s judgement of the ----------------------
possible outcomes for each alternative and also the values the decision-
----------------------
maker assigns to each.
At the same time, it must also be remembered that the payoff matrix ----------------------
forces the decision-maker to make a firm judgment about what he thinks
----------------------
may happen and the worth to him of those outcomes.
The payoff matrix does not make a decision but it does force the decision- ----------------------
maker to be more realistic about possible outcomes. ----------------------
2. Decision tree: The decision tree technique is basically an extension
of the probability theory to decision-making. It is a simple technique, ----------------------
which mathematically factors the degree of risk into a business decision. ----------------------
It allows the decision-maker to work out the options, after taking into
account the “odds”, and then make a reasonably precise comparison ----------------------
among alternative courses of action.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 4.5 Left to Right
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 4.6 Top to Bottom ----------------------
The standard presentation of decision tree is as follows:
----------------------
----------------------
----------------------
Chance Node
----------------------
----------------------
2nd Decision Point
----------------------
----------------------
Initial Point ----------------------
(Decision Node)
----------------------
Fig. 4.7 Standard Presentation
----------------------
3. Decision rules: Decision rules and decision tables are used together.
Decision rules enable decisions to be made better and more economically. ----------------------
Decisions could also be faster and more accurate. Decision rules/tables
are to be used for programmable or routine/ operating decision. It is, ----------------------
therefore, imperative that decision rules are documented.
----------------------
4. Decision table: Decision table documents rules that select one or more
actions based on one or more conditions from a set of possible conditions. ----------------------
It is precise and compact. Decision table may include both qualitative and ----------------------
quantitative bases for decision-making.
Decision tables are in the form of “IF” listings and “THEN” listings. The ----------------------
“IF” listings stipulate the required conditions and the “THEN” listings ----------------------
provide the actions to be taken if the conditions exist.
----------------------
The “IF” LISTINGS form the ‘CONDITION STUB’ and the “THEN”
LISTINGS form the ‘ACTION STUB’. ----------------------
The decision table helps the analyst consider all options, conditions,
----------------------
variables and alternatives. It must, however, be remembered that this
technique has to be used in conjunction with other techniques. ----------------------
----------------------
----------------------
Activity 4
----------------------
---------------------- Draw a decision tree to show the fixed deposits schemes offered to customers
in a bank.
----------------------
4.6 PRINCIPLES FOR DECISION-MAKING
----------------------
---------------------- Apart from the various tools and techniques used for decision-making,
the following principles are also used in/for decision-making.
---------------------- 1. Principle of bounded rationality: While the decisions should normally
---------------------- be based on rationality, what is observed is that our rationality, in reality,
is conditioned by various factors/constraints like financial, technical,
---------------------- administrative, etc.
---------------------- In view of this reality of situation, the principle of bounded rationality
comes into existence. It implies that it is practically difficult, almost
---------------------- impossible, to take a completely rational decision. The principle of
bounded rationality, therefore, highlights the fact that as it is not possible
---------------------- to arrive at a scientific solution, it is worthwhile to carry on and arrive at
---------------------- workable decisions which fit into the principle of bounded rationality.
If a scientific decision either cannot be taken or cannot be implemented,
----------------------
it would remain only an ideal, hypothetical yet impracticable decision.
---------------------- Under these circumstances, a workable solution should be worked out
while still continuing to work on developing the scientific solution.
----------------------
In other words, workable decision is the starting point of a scientific
---------------------- solution, which is the ultimate goal that one must strive to achieve.
----------------------
----------------------
Activity 5 ----------------------
By visiting different websites, find out how the principles used for decision- ----------------------
making are effective.
----------------------
Every manager has to take decisions and, in a way, every manager is a ----------------------
model of decision-making himself. However, in the context of our discussions,
----------------------
we would note the following decision-making models:
1. The classical model: As per the classical model of decision-making, ----------------------
a manager, when confronted with a decision-making situation, would
----------------------
collect all the information that is required for that activity and would take
a decision, which would be in the best interest of the organisation. ----------------------
2. The administrative model: Under the administrative model, the ----------------------
manager is more concerned about himself. As such, when confronted
with a decision-making situation, the manager would collect whatever ----------------------
information could be available and take a decision, which may not be in
the best interests of the organisation but would certainly be in the best ----------------------
interests of the manager. ----------------------
---------------------- Design
----------------------
Choice
----------------------
----------------------
Activity 6
----------------------
---------------------- By visiting different websites, find out how the Simon Model is effective in
the decision-making process.
----------------------
---------------------- Summary
----------------------
●● A manager is defined as a person who achieves the organisational goals
---------------------- by motivating others to perform and not only by performing himself.
●● Managers, therefore, have to develop decision-making skills as managers
----------------------
are evaluated/ rewarded based on the importance, numbers and results of
---------------------- their decisions.
●● The information support required for the decision-making process
---------------------- also varies according to the type of decision and the level within the
---------------------- organisation at which such decision is being made.
●● Decisions could be made under different types of environment, viz.,
---------------------- ambiguity, certainty, uncertainty and risk. An environment is ambiguous
when the problem is not clear, the goal is not clear and hence the outcome
----------------------
also is not clear.
---------------------- ●● Payoff matrix is one of the more commonly used and essential quantitative
techniques of decision-making.
----------------------
●● The decision tree technique is basically an extension of the probability
---------------------- theory to decision-making. It is a simple technique, which mathematically
factors the degree of risk into a business decision.
---------------------- ●● Decision table documents rules that select one or more actions based on
---------------------- one or more conditions from a set of possible conditions.
●● The principle of bounded rationality highlights the fact that as it is not possible
---------------------- to arrive at a scientific solution, it is worthwhile to carry on and arrive at
---------------------- workable decisions which fit into the principle of bounded rationality.
Keywords ----------------------
----------------------
Answers to Check your Progress
----------------------
Check your Progress 1
----------------------
Fill in the blanks.
1. Quality of managerial decisions’ reach is the yardstick of their effectiveness ----------------------
and of their value to the organisation. ----------------------
2. Modern management system relies and depends on MIS.
----------------------
Check your Progress 2
Fill in the blanks. ----------------------
1. The certainty environment is one where the relationship between inputs ----------------------
and outputs is known and hence the result is also known.
----------------------
2. Decisions are made at different levels in the organisation structure.
---------------------- 2. The principle of bounded rationality highlights the fact that it is not
possible to arrive at a scientific solution.
----------------------
Check your Progress 6
---------------------- State True or False.
---------------------- 1. True
2. True
----------------------
3. False
---------------------- 4. True
---------------------- 5. True
----------------------
Suggested Reading
----------------------
1. Davis, G and M. Olson. 1985. Management Information Systems. New
---------------------- York: McGraw Hill)
2. Jawadekar, Waman. 2009. Management Information Systems: Text &
---------------------- Cases. New Delhi: Tata McGraw Hill.
---------------------- 3. Prasad, L.M. and Usha Prasad. 2003. Management Information Systems.
New Delhi. Sultan Chand & Sons.
----------------------
4. Sadagopan, S. 1998. Management Information Systems. New Delhi:
---------------------- Prentice Hall India.
----------------------
----------------------
----------------------
5
Structure:
5.1 Introduction
5.2 Information Process
5.3 Sources of Information
5.3.1 MIS and Information Concepts
5.3.2 Classification of Information
5.3.3 Types of Level-Wise Information
5.3.4 Attributes of Information
5.4 Human as Information Processor
5.4.1 The Newell−Simon Model
5.5 Information Requirement
5.5.1 Information Requirements at Different Levels
5.5.2 Techniques to Assess Information Requirement
5.6 Critical Success Factors
5.7 Business System Planning
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
Information 101
Notes
Objectives
----------------------
After going through this unit, you will be able to:
----------------------
●● Differentiate between data and information
---------------------- ●● Discuss information process and information presentation
---------------------- ●● Assess the importance of relevant information to the decision-maker
---------------------- ●● State the types of information
●● Explain human as an information processor
----------------------
●● Identify information requirement at different levels of management
---------------------- ●● Describe critical success factors and business system planning
----------------------
----------------------
5.1 INTRODUCTION
---------------------- Initially, while discussing about MIS, we have said that MIS is a system,
which provides information to the management. We have also said that we are
---------------------- living in an Information Age. Information is of critical importance for setting
up, running, survival and prosperity of a business organisation. Information is
---------------------- also imperative today as it enables an organisation to gain and retain competitive
---------------------- edge and emerge winner.
We will now discuss the concepts of information in more details as MIS
---------------------- is centred around information. So, what is information?
---------------------- Information is derived from data. Data is nothing but a random,
unorganised collection of indications or measurements of certain qualities
----------------------
or attributes relating to an entity, recorded either in alphabetical, numerical,
---------------------- alphanumerical, voice, image, text or any other form.
Data could also be described as unstructured raw facts, observations or
----------------------
unevaluated messages in isolation. Data, per se, does not convey much or is
---------------------- not of much use. It is like a material, which is simply available in an unfinished
form. Data means facts and figures, which are not currently being used in a
---------------------- decision process and usually takes the form of office/historical records that are
recorded and filed without immediate intent to retrieve for decision-making.
----------------------
It will, thus, be observed that for data to be converted into information, it ----------------------
has to undergo processing as illustrated hereunder.
----------------------
Stored Data
----------------------
Output (Information)
----------------------
Input (Data) Processing (Processor)
----------------------
Fig. 5.1 Data Processing
----------------------
As stated, data has to be processed before information could be available. Hence,
various operations have to be carried out in converting data into meaningful ----------------------
information.
----------------------
Table 5.1 Information Process
Capturing Data from an event/transaction has to be recorded ----------------------
----------------------
Information 103
Notes Information presentation and decision-maker
Presentation of the information is an art. The data may be collected in the
---------------------- best possible manner and processed analytically, brining lot of value in the
information; however, if it is not presented properly, it may fail to communicate
----------------------
anything of value to the receiver.
---------------------- The degree of communication is affected by the methods of transmission,
the manner of information handling and the limitations and constraints of a
----------------------
receiver as the information processor and the organisation as the information
---------------------- user.
Information should be summarised. The principle behind summarisation
---------------------- is that too much information causes confusion, misunderstanding and misses
---------------------- the purpose.
Another method of improving the degree of communication is through
---------------------- message routing. The aim here is to distribute information to all those who are
accountable for the subsequent actions or decisions in any manner.
----------------------
Information is not only relevant but also critical for the decision-maker as
---------------------- the quality of decision-making is dependent on the quality of information. More
specifically, information is useful for the decision-maker as:
----------------------
1. Information helps in minimising, if not eliminating altogether, the
---------------------- elements of risk and uncertainty in decision-making.
2. Information minimises the element of “surprise” and uncertainty in
----------------------
decision- making.
---------------------- 3. Information improves the quality of decision-making.
4. Information helps to achieve the most optimum results within given
----------------------
constraints.
---------------------- 5. Information affects the decision-making behaviour and makes the
difference.
----------------------
Information 105
Notes 2. Non-action information: The information, which communicates only
the status of a situation is a no-action information. For example, while
---------------------- watching a live cricket match you understand that India’s current run rate
is four per over whereas its required run rate is seven per over. You have
---------------------- this information but this a non-action information.
---------------------- 3. Recurring information: This information is generated at regular
intervals, for example,the monthly sales reports, accounts statement, etc.
----------------------
4. Non-recurring information: This information is non-repetitive in nature,
---------------------- for example, the financial analysis or the report on the market research.
---------------------- 5. Internal information: This information is generated through the internal
sources of the organisation.
----------------------
6. External information: This information is generated through external
---------------------- sources, for example, Government reports ,etc.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Information 107
Notes
Check your Progress 2
----------------------
---------------------- Activity 2
----------------------
1. Information minimises risk. Do you agree with this statement? Justify
---------------------- your answer with the help of examples.
---------------------- 2. Visiting some websites and find out the differences between the
various types of information levels.
----------------------
----------------------
----------------------
Input From Mental Output ----------------------
Sensory Recep- Channel Processing Channel Response
tors
Filter ----------------------
----------------------
Fig. 5.2 Human as Information Processor
However, human beings cannot go on accepting unlimited inputs and ----------------------
keep coming up with unlimited outputs, as the human capacity to accept inputs
----------------------
and offer outputs is rather limited. If there is too much of input, the human
capacity will simply be unable to accept the input and correspondingly, the ----------------------
output will also be reduced/restricted. This “too much of inputs” affecting the
output is considered as “overloading”. ----------------------
To avoid this eventuality, humans restrict input to a manageable quantity ----------------------
by being selective in accepting some inputs and blocking other inputs. This
process leads to creation of filters resulting from: ----------------------
i. Frame of reference of the person concerned, based on prior knowledge ----------------------
and experience.
----------------------
ii. Normal decision procedure.
----------------------
iii. Decision-making under stress.
This process of filtering is illustrated in Figure 5.3 and Figure 5.4. ----------------------
----------------------
Input Mental Pro- ----------------------
Filter
Stimuli cessing
----------------------
Fig. 5.4 Filtering under Stress
----------------------
It may be noted that, filtering, apart from blocking unwanted data, may
also block data, which is not considered to be consistent with the established ----------------------
frame of reference. This, in turn, may result in errors of perception like omission, ----------------------
distortion, inferences, etc. These errors of perception may reduce information
content. ----------------------
----------------------
----------------------
Information 109
Notes Data Stored Frames
Storage of Reference
----------------------
----------------------
Input Data Mental Processing Decisions
----------------------
Fig. 5.5 Human Information Processing Mechanism and Decision-Making Process
----------------------
5.4.1 The Newell−Simon Model
----------------------
Allele Newell and Herbert Simon have proposed a model of human
---------------------- problem-solving and human information processing system. According to
---------------------- the model, the human information processing system consists of a processor,
sensory inputs, motor output and three different memories − Long-Term
---------------------- Memory (LTM), Short-Term Memory (STM) and External Memory (EM) as
illustrated hereafter.
----------------------
Long Term Memory
----------------------
Processor
----------------------
---------------------- Receptors
----------------------
Environment Processor
Memory
----------------------
---------------------- Effectors
----------------------
Fig. 5.7 Human Information Processing System
----------------------
----------------------
----------------------
Fig. 5.8 Computer Information Processing System
----------------------
Check your Progress 3 ----------------------
----------------------
Fill in the blanks.
1. Allele Newell and Herbert Simon have proposed a model of ----------------------
__________ and _____________.
----------------------
2. The computer information processing system consists of _________,
_________, _________ and _____________. ----------------------
----------------------
Activity 3 ----------------------
Visit an organisation and discuss with them regarding the importance ----------------------
of Computer Information Processing System. Also understand the
----------------------
dependability of managers on DSS
----------------------
5.5 INFORMATION REQUIREMENT
----------------------
Information today has become a strategic tool for organisations.
Information is now also considered as a resource, much like capital and ----------------------
labour. As such, it becomes imperative to analyse and assess the information
----------------------
requirement/needs of business organisations activity-wise, function-wise, level-
wise as well as for organisation as a whole, as the information required at each ----------------------
level is different.
----------------------
Obviously, then, defining the specific information requirements becomes
the most critical—and therefore the most difficult—task for the Systems ----------------------
Analyst. This is one area where many large system efforts could go wrong,
bringing the edifice of the organisational information system crumbling down ----------------------
as faulty requirements analysis is a leading cause of systems failure and high ----------------------
systems development costs.
Analysing and assessing information requirements/needs, therefore, must ----------------------
be given the attention and importance it deserves. ----------------------
----------------------
----------------------
----------------------
Information 111
Notes The information requirements within an organisation, hierarchy level-
wise, activity-wise and function-wise, could be presented as follows:
----------------------
Strategic Senior Man-
---------------------- Level agers
---------------------- Operational
Operational
Level Managers
----------------------
Manufacturing
Accounting
Resources
Human
Marketing
Sales &
Finance
----------------------
----------------------
----------------------
Advertising
Accounting
Personnel/
Inspection
Marketing
Corporate
Corporate
Reporting
Market &
Inventory
Insurance
Appraisal
Recovery
Planning
Analysis
Product
Admin
----------------------
Credit
Client
Audit
Legal
Sales
----------------------
Mgrs
Mgr A ----------------------
Mgr B ----------------------
Mgr C
----------------------
Mgr D
----------------------
.
. ----------------------
. ----------------------
Mgr N
----------------------
----------------------
Fig. 5.10 Subsystem Matrix
----------------------
Information 113
Notes c. Defining and evaluating information requirements for organisational
subsystem: At this stage, the information requirements of each
---------------------- subsystem of the organisation are obtained by conducting group
interviews of those managers having major decision-making
---------------------- responsibility for the subsystems.
---------------------- While conducting interviews, three sets of questions are asked to
improve the chances of obtaining a complete set of requirements.
----------------------
The three sets of questions are:
---------------------- 1. What problem do the managers have and what information
is needed for solving them? What decisions do the managers
----------------------
make and what information do they need for decision-making?
---------------------- 2. What factors are critical to the success of the managers’
activity and what information do they need to achieve success
---------------------- in them or monitor progress?
---------------------- 3. What are the outputs (ends) from managerial activities and
what information do they need to measure effectiveness in
---------------------- achieving the outputs? What resources are used in producing
the outputs and what information is needed to measure
----------------------
efficiency in using the resources?
---------------------- (These questions are derived from three approaches, viz.,
business system planning, critical success factors and means-
----------------------
end analysis, which are discussed later).
---------------------- 2. Database requirements: Database requirements arise both from applications
and ad hoc queries. The overall architecture for the database to meet
---------------------- these requirements is defined as part of the organisational information
---------------------- requirement. Major classes of data are then defined and associated with
organisational processes that require them.
---------------------- The process of obtaining and organising a more detailed database
requirements can be divided into defining data requirement as perceived by
----------------------
the users (conceptual or logical requirements) and defining requirements
---------------------- for physical design of the database.
3. Application-level information requirement: An application, basically
---------------------- a subsystem of the overall information system, provides information
---------------------- processing for a specific organisational unit/function/activity. The process
for the determination of information requirement at the application level
---------------------- defines and documents specific information content as also design and
implementation requirements.
----------------------
Application-level information requirement are mainly of two types:
---------------------- ●● Social or behavioural requirements
---------------------- ●● Technical requirements
The social/behavioural requirements, based on job design, specify
----------------------
objectives and assumptions like:
----------------------
One or more asking methods can be used either alone or in conjunction ----------------------
with other tools to assess information requirement.
----------------------
----------------------
Information 115
Notes 2. Deriving from an existing information system: Information systems,
currently in operation or having an operational history, can be used to
---------------------- arrive at information requirement for a proposed information system.
The types of existing information systems, which could be useful in this
---------------------- regards are:
---------------------- i. Existing system to be replaced by new system.
---------------------- ii. Existing system in another or similar organisation.
iii. Information available from handbooks, industry, specific studies or
----------------------
subject textbooks
---------------------- 3. Means-end analysis: The means-end analysis is a technique used
---------------------- for determining information requirements of the organisation at the
department and/or individual manager’s level.
---------------------- The technique separates the definition of ends (or outputs) generated by
---------------------- an organisational process, from the means (inputs) used to accomplish them. As
the end/output from one process is the input for next/some other process, the
---------------------- ends-means analysis brings out information requirement effectively.
---------------------- The ends-means analysis is based on the Systems Theory. A model of the
ends-means analysis is provided hereunder.
----------------------
Inputs
---------------------- Outputs
----------------------
----------------------
----------------------
Feedback - Effeciency
----------------------
Fig. 5.11 A Model of the Means-End Analysis
----------------------
----------------------
----------------------
Information 117
Notes
Check your Progress 5
----------------------
---------------------- Activity 5
----------------------
Visit an organisation and discuss its critical success factors. Analyse the
---------------------- same and write it in your own words.
----------------------
5.7 BUSINESS SYSTEM PLANNING
----------------------
The Business System Planning (BSP) method, also called enterprise analysis,
---------------------- is a comprehensive methodology developed by IBM in the 1960s explicitly for
---------------------- establishing the relationship among large system development projects.
This method encompasses an analysis of organisation-wise information
---------------------- requirements by looking at the entire organisation in terms of organisation’s
---------------------- units’ functions, processes and data elements. It helps identify the key entities
and attributes in the organisation’s data. The BSP is typically a top-down,
---------------------- process-based method of determining information requirements as also
information architectures.
----------------------
Table 5.5 Business Systems Planning: The Pros and Cons
----------------------
Pros Cons
---------------------- It gives a comprehensive view of It produces an enormous
the organization and of systems/ amount of data
---------------------- data uses/gaps.
---------------------- It is especially suitable for start- The data collection is
up or massive change situations. expensive
----------------------
It helps to produce an organiza- It is difficult to use/
---------------------- tion-wideconsensus by involving analyze all the data col-
a large number of managers and lected.
----------------------
users of data
---------------------- It helps managers think about Focus on use of existing/
information and its users available information
----------------------
rather than on critical
---------------------- objectives of manage-
ment.
----------------------
----------------------
Starting the Study
----------------------
Defining Business Processes
----------------------
Defining Data Classes
----------------------
Analysing current systems support ----------------------
----------------------
Defining findings and conclusions
----------------------
Reviewing Information Re- Defining Information Architecture ----------------------
source Management
----------------------
Developing recommendations & action plan ----------------------
----------------------
Fig. 5.12 Steps in defining a Proposed Information Architecture in
Business Systems Planning ----------------------
[Source: Business Systems Planning - Information Systems Planning Guide, ----------------------
Third Edition, GE20- 0527, IBM Corporation, 983, p. 25]
----------------------
Information 119
Notes In addition to the major methods discussed earlier, there are certain other
methods for determining information requirement as follows:
----------------------
●● Normative analysis
---------------------- ●● Decision analysis
---------------------- ●● Strategy set transformation
●● Socio-technical analysis
----------------------
●● Process analysis
---------------------- ●● Input-Process-Output Analysis
----------------------
Check your Progress 6
----------------------
---------------------- Summary
---------------------- ●● Data could also be described as unstructured raw facts, observations or
unevaluated messages in isolation. Data, per se, does not convey much or
---------------------- is not of much use.
---------------------- ●● Information, according to Davis and Olson, is “data that has been
processed into a form that is meaningful to the recipient and is of real or
---------------------- perceived value in current or prospective actions or decisions”.
---------------------- ●● Information should be summarised. The principle behind summarisation
is that too much information causes confusion, misunderstanding and
---------------------- misses the purpose.
●● Data is the raw material used for obtaining information. Data is derived
----------------------
from a number of sources, both internal as well as external. If the data
---------------------- is collected for the first time by the researcher, it is classified as primary
data.
---------------------- ●● Primary data could be gathered directly from the respondent.
---------------------- ●● Secondary sources of data/information include internal records as well as
external records.
----------------------
●● MIS should provide the information which has a surprise value and which
---------------------- reduces the uncertainty. It should simultaneously build the knowledge
base.
----------------------
●● For strategic decision-making, one needs strategic information, which is
---------------------- wholistic, unstructured and draws heavily from the external environment.
●● Tactical information would be used for medium/short-term planning by
---------------------- the middle management.
----------------------
Information 121
Notes
Self-Assessment Questions
----------------------
1. Explain information and its characteristics.
---------------------- 2. Why is presentation of information important?
---------------------- 3. Explain the relationship between information and decision-maker.
---------------------- 4. Operational level covers a specific product, specific activity and a smaller
group/number of people.
----------------------
2. CSF can be used at both the organisation as well as the application level. ----------------------
Check your Progress 6 ----------------------
Fill in the blanks.
----------------------
1. Business systems planning is also called enterprise analysis.
----------------------
2. The BSP is typically a top-down, process based method of determining
requirements as also information architectures. ----------------------
----------------------
----------------------
----------------------
----------------------
Information 123
Notes
Suggested Reading
----------------------
1. Davis, G, and M. Olson. 1985. Management Information Systems. New
---------------------- York: McGraw Hill.
2. Jawadekar, Waman. 2009. Management Information Systems: Text &
----------------------
Cases. New Delhi: Tata McGraw Hill.
---------------------- 3. Prasad, L.M., and Usha Prasad. 2003. Management Information Systems.
---------------------- New Delhi. Sultan Chand & Sons.
4. Sadagopan, S. 1998. Management Information Systems. New Delhi:
---------------------- Prentice Hall India.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
6
Structure:
6.1 Introduction
6.2 Components of DSS
6.2.1 Development of DSS and Desirable Characteristics of DSS
6.2.2 DSS Approach and Core Capabilities
6.3 Structure and Types of DSS
6.4 Group Decision Support System
6.5 Executive Information System/Executive Support System
6.6 Expert Systems
6.7 Artificial Intelligence
Summary
Key Words
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
----------------------
Behavioural Management Operations ----------------------
Model Science Model Research Model
----------------------
Fig. 6.1 Different Models of DSS ----------------------
i. Behavioural model: The focus of behavioural models of DSS
is on studying/understanding the behaviour/trends amongst the ----------------------
variables. Decision could then be arrived at with due regards to such ----------------------
behavioural relationships. Trend analysis, forecasting, co-relation,
regression are examples of behavioural models of DSS. ----------------------
ii. Management science model: These models are developed based ----------------------
upon the principles of management, management accounting and
econometrics, among others. Budgetary systems, cost accounting, ----------------------
capital budgeting, inventory management, etc. are examples of
management science model of DSS among others. ----------------------
iii. Operations research model: Operations research is basically ----------------------
application of mathematical formulae for arriving at optimum
solutions. As such, operations research models are mainly ----------------------
mathematical models. These models represent real-life problems/
----------------------
situations in terms of variables and parameters expressed in algebraic
equations form. Linear programming, ABC analysis, mathematical ----------------------
programming techniques, material requirement planning are some
of the examples of the operations research model. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fill in the blanks.
1. The DSS software system permits easy interaction between the ----------------------
________ of the system and the DSS database and _________ base.
2. A _____________ is an abstract representation that illustrates the ----------------------
components or relationships of a ____________. ----------------------
3. Decision support system helps to close the ____________ to enable
managers to improve quality of their ____________. ----------------------
4. ______________ is basically application of mathematical formulae
for arriving at optimum solutions. ----------------------
Match the following. ----------------------
i. Representations a. Logical and mathematical manipulations of data such as
assigning risksand values, simulating alternatives etc. ----------------------
ii. Operations b. Databases, views of data, work space, libraries and
other capabilitiesto refresh/update memory ----------------------
iii. Memory aids c. It allows user to control the DSS activities like
----------------------
software permitting user control of memory
representations, operations, training ----------------------
iv. Control aids d. Conceptualisation of information used in making
decisions, such as graphs, charts, lists, reports and ----------------------
symbols
----------------------
----------------------
----------------------
----------------------
Model
Management ----------------------
----------------------
----------------------
Dialogue ----------------------
Management
----------------------
----------------------
Data ----------------------
Management
----------------------
----------------------
----------------------
External
----------------------
DSS Enterprise
Database Data Source
Data
----------------------
Fig. 6.2 Fundamental DSS Program Structure ----------------------
Components of DSS Programs ----------------------
1. Dialogue management: It has three subsystems. The user interface
----------------------
subsystem manages the physical user interface. It controls the appearance
of the screen, accepts input from the user and displays the results. It ----------------------
also checks the user commands for correct syntax. The dialogue control
subsystem maintains a processing context with the user. ----------------------
----------------------
User Dialogue Request
c. Data Management
---------------------- Interface Control Translator
---------------------- Query/Database
Command
Interpreter
----------------------
Data
---------------------- Local DSS DBMS Dictionary
Management
---------------------- Interface to Data
Services
----------------------
Enterprise
Data
---------------------- External
Data
----------------------
Fig. 6.3 Components of DSS Program
----------------------
3. Database management: It stores and manipulates the database as directed
---------------------- by either the model management component or the dialogue management
---------------------- component. Secondly, it maintains an interface with data sources that are
external to the DSS, viz., TPS database, inter-enterprise systems, external
---------------------- data utilities and other DSS applications.
----------------------
6.4 GROUP DECISION SUPPORT SYSTEM
----------------------
We have already discussed the various aspects of decision support system,
---------------------- where the respective executive/decision-maker arrives at effective decisions by
using a DSS. Thus, the DSS is designed for and used more by the individual
----------------------
decision-maker.
---------------------- It was, however, felt that in the contemporary business environment,
decision-makers have to increasingly work in groups as group-working/group
----------------------
decision-making has certain advantages like:
---------------------- i. More comprehensive consideration of the problems and related issues.
---------------------- ii. Better group understanding of the problem and rationale for the decision.
iii. Reduced likelihood of “quibbling” using “20/20 hindsight”.
----------------------
iv. Greater group commitment to the decision.
---------------------- v. Improved communication to/with the implementers ensuring better
implementation.
----------------------
Hence, the DSS application was suitably extended/expanded to facilitate
---------------------- group decision environment and the DSS for a group came to be known as
the Group Decision Support System (GDSS). It is also referred to as a Group
---------------------- Support System or a Computerised Collaborative Work System (CCWS). We
would, however, refer to this extended/expanded form of DSS as the GDSS.
----------------------
Under the GDSS environment, the members of the group utilise the DSS
---------------------- as a group and the user interface is expanded to include the computers, which
---------------------- are suitably connected/networked. In this way, under the GDSS, members of the
group can communicate using their computers with DSS or with other members
---------------------- of the group to facilitate optimal decision-making.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Activity 3
---------------------- Visit an organisation and find out how GDSS helps when more than one
decision-maker has to make a decision.
----------------------
----------------------
Check your Progress 4
----------------------
Fill in the blanks.
----------------------
1. The Executive Information System/Executive Support System is a
---------------------- relatively new _____________ technology.
---------------------- 2. ______________ facilitates the attainment of organisational
objectives.
----------------------
----------------------
Activity 4
----------------------
By visiting an organisation, try to find out how EIS/ESS helps them.
----------------------
Understand how do organizations actually distinguish amongst various DSS
---------------------- and ESS
----------------------
Expert systems were among the most exciting computer applications ----------------------
to emerge during the 1980s. The ES technology basically derives from the
----------------------
research discipline of Artificial Intelligence, a branch of computer science
concerned with the design and implementation of programs which are capable ----------------------
of emulating human cognitive skills such as problem-solving, visual perception
and language understanding. An expert system mimics human expertise in a ----------------------
narrow domain to solve specific problems in a well-defined area.
----------------------
Expert System: Definitions
----------------------
An expert system has been defined differently by different people. As
such, there is no precise definition of an expert system that is guaranteed to ----------------------
satisfy everyone.
----------------------
However, while in a narrower perspective, ES technologies make
computer programming easier and more effective, in a broader perspective, ES ----------------------
represents the first step in a process that will transform computing by moving
programming technologies beyond numerical programming into a realm of ----------------------
logical, symbolic programming. ----------------------
More specifically, the following definitions could be noted.
----------------------
According to Peter Jackson, “An expert system is a computer programme
that represents and reasons with knowledge of some subject specialist with a ----------------------
view to solving problems or giving advice”.
----------------------
Robert Bowerman and David Glover have defined expert system as “highly
specialised computer systems capable of simulating that element of a human ----------------------
specialist’s knowledge and reasoning that can be formulated into knowledge
----------------------
chunks, characterised by a set of facts and heuristic rules”. (Heuristic rules are
rules of thumb accumulated by a human expert through intensive problem- ----------------------
solving in the domain of a particular task).
----------------------
According to Bruce Buchanan and Reid Smith, an expert system is a
computer program that − ----------------------
i. Reasons with domain-specific knowledge that is symbolic as well as ----------------------
numerical.
ii. Uses domain-specific methods that are heuristic (plausible) as well as ----------------------
following procedures that are algorithmic (certain). ----------------------
iii. Performs well in the problem area.
----------------------
iv. Explains or makes understandable both what it knows and the reasons for
its answers. ----------------------
v. Retains “flexibility”. ----------------------
Expert system, according to Hossein Bidgoli, “is a series of computer ----------------------
programmes that attempt to mimic human thought, behaviour in a specific area
that has successfully been solved by human experts”. ----------------------
----------------------
----------------------
Experts
----------------------
----------------------
---------------------- 6. Will the system enable developing the solution faster than human experts?
----------------------
Activity 5
----------------------
---------------------- By visiting relevant websites, find out any two examples of expert systems.
----------------------
----------------------
Artificial Intelligence (AI) is an area, which has over half a century of ----------------------
history. AI began in earnest with the emergence of the computers during the late
----------------------
1940s. It was the ability of these machines to store large amount of data and
process it into information at very high speed, hitherto unimaginable, that gave ----------------------
researchers the vision of building systems which could imitate/emulate some, if
not all, human abilities. ----------------------
While some groundwork had already been initiated earlier, it was not until ----------------------
the 1980s that AI received popular economic and managerial acclaim. It was
during this period that AI went through the transition from a primary research ----------------------
area to potential commercial applications. It was only then that AI was accepted
as an emerging technology and as such attracted considerable attention. ----------------------
AI system does not replace people. They liberate experts from solving ----------------------
common/simple problems, leaving the experts to solve complex problems.
AI system helps to avoid making same mistakes and to respond quickly and ----------------------
effectively to a new problem situation. ----------------------
Artificial Intelligence: Meaning
Artificial Intelligence is a technology, which helps/facilitates the ----------------------
application of computers to areas that require knowledge, perception, reasoning, ----------------------
understanding and cognitive abilities, which distinguish the human behaviour
from machines like computers. ----------------------
It is the science and engineering of making intelligent machines, especially
----------------------
intelligent computer programs. It is related to the similar task of using computers
to understand human intelligence. ----------------------
Before moving into further discussion about AI, it would be desirable
to compare and understand the attributes of Natural (Human) Intelligence and ----------------------
Artificial (Machine) Intelligence. ----------------------
Table 6.6 Comparison between Natural Intelligence and Artificial Intelligence
----------------------
Attributes Natural Artificial
Intelligence Intelligence
----------------------
Ability to use sensors (eyes, ears, touch, smell) High Low
----------------------
Ability to be creative and imaginative High Low
Ability to learn from past experiences High Low ----------------------
Ability to be adaptive High Low ----------------------
Ability to afford the cost of acquiring intelligence High Low
----------------------
Ability to use a variety of information sources High High
Ability to acquire a large amount of external information High High ----------------------
Ability to make complex calculations Low High
----------------------
Ability to transfer information Low High
Ability to make a series of calculations, rapidly ----------------------
and accurately Low High
----------------------
----------------------
Modelling and
Heuristic Representation ----------------------
Search of Knowledge
Problem Solving
Computer
and Planning
Vision
----------------------
AI Language Common
and Tools Sense ----------------------
Reasoning
and Logic ----------------------
----------------------
----------------------
Fig. 6.6: The AI Onion Model
----------------------
Artificial Intelligence Applications
While the technology aspects of AI are almost in place by now, initial ----------------------
applications have clearly demonstrated that AI can provide great leverage for ----------------------
corporate organisations.
----------------------
Some of the illustrative AI applications are as follows:
1. Manufacturing/production planning and scheduling. ----------------------
2. Project management. ----------------------
3. Factory management.
4. Sales, distribution and field services. ----------------------
5. Diagnosis and trouble-shooting. ----------------------
6. Financial management.
----------------------
7. Currency/interest rates, SWAPs.
8. Portfolio management. ----------------------
9. Asset liability management. ----------------------
10. Reading/interpreting financials.
----------------------
11. Criminology.
12. Geology (drilling/oil exploration sites). ----------------------
Precautions ----------------------
Notwithstanding the advances in AI, it must be remembered that AI
----------------------
systems are not to replace human decision-making completely. They are meant
to replicate/emulate human decision-making for certain types of clearly and ----------------------
well-defined problems − the chess matches between Gary Kasporov (Natural
Intelligence) and Deep Junior (Artificial Intelligence) being a classic example ----------------------
of AI/ES.
----------------------
---------------------- Activity 6
----------------------
Who would perform an operation on a patient better, a doctor in flesh and
---------------------- blood or a robot with AI? Justify you answer.
---------------------- Summary
----------------------
●● Decision Support Systems (DSSs) are interactive information systems
---------------------- that rely on an integrated set of user-friendly hardware and software
tools to produce and present information that is targeted to support the
---------------------- management in the decision-making process.
---------------------- ●● DSS refers to a class of systems, which support in the process of decision-
making and does not always give a decision itself. These systems can be
---------------------- used to validate decision by performing sensitivity analysis on various
parameters of the problem.
----------------------
●● The DSS software system permits easy interaction between the users of
---------------------- the system and the DSS database and model base.
---------------------- ●● The Model Management component maintains and executes models of
business activity. Examples of such models are spreadsheets, financial
---------------------- models and simulation models.
----------------------
----------------------
---------------------- iii. – b.
iv. – c.
----------------------
Check your Progress 2
----------------------
Fill in the blanks.
---------------------- 1. In MIS, the focus is on structured tasks and routine decisions.
---------------------- 2. DSS establishes tools to be used for decision process.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
7
Structure:
7.1 Introduction
7.2 Systems
7.3 System Characteristics
7.4 Importance of Systems
7.5 Law of Requisite Variety
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
The empirical systems, on the other hand, are practical, specific and ----------------------
operational. They may be based upon conceptual system, but differ
from them in as much as one can see/experience the empirical system ----------------------
in operation. Production system, examination system, surgery can be ----------------------
referred to as examples of the empirical systems.
----------------------
2. Natural and artificial systems: Natural systems exist and abound in
nature and are not the result of human endeavours. Rivers, mountains, ----------------------
minerals are illustrations of natural systems.
----------------------
Artificial systems, on the other hand, are manufactured and hence man-
made. Thus, while river or oceans are natural systems, dams, canals, ----------------------
roads, machines and factories are artificial systems.
----------------------
3. Open and closed systems: Open system is that system which is always
interacting with the environment and exchanges information, material or ----------------------
energy with the environment. Open system is also open, self-organising
and adoptive/adaptive to the changing environment as it is flexible. ----------------------
Closed system, of course, is one, which shuns any kind of exchange with ----------------------
environment. It is rigid and is not amenable to change. It is self-contained
and relatively isolated as it has a well-defined boundary. It is also not ----------------------
adaptive. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Sub-System 1 Sub-System 2 Sub-System 3
----------------------
----------------------
----------------------
Fig. 7.1 System Details
System Facilitating Activities ----------------------
After studying about the concepts of systems, let’s discuss about some of ----------------------
the system facilitating activities. They are:
----------------------
1. Factoring: A system is organised in a particular manner. The various
elements or components have a distinctive role to play, which is assigned ----------------------
to them. A system for the sake of operational efficiency is divided into
subsystems. ----------------------
Each subsystem can then be further divided into lower level of subsystems ----------------------
---------------------- Activity 2
---------------------- Find out why should a system be divided into subsystems and on what basis
---------------------- should this division be done.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
6. Perform Work 4. Determine required resources
----------------------
----------------------
----------------------
Fig. 7.3 Feedback as an Integral Part of a System
The feedback may be positive or negative. Feedback is useful for ----------------------
exercising control in an organisation by the management as illustrated in ----------------------
Figure 7.4.
----------------------
Desired Performance Actual Performance
----------------------
Implement Course Actual Performance ----------------------
Correcting Programme Measurement
----------------------
Programme for Actual Vs Standard ----------------------
Corrective Action Performance Compared
----------------------
Analyse Causes for Identify Deviation ----------------------
Deviation
----------------------
Fig. 7.4 Usefulness of Feedback ----------------------
Control Systems ----------------------
The control systems based on feedback could be categorised into three types as
follows: ----------------------
1. Closed loop system: Under this system, feedback is based on output ----------------------
measurement. Appropriate feedback is passed on to the input so that
suitable corrections could be made at the input stage itself. Control is ----------------------
internalised. Inventory control, cost control, quality control, Inspection ----------------------
can be said to be examples of closed loop system.
---------------------- Activity 3
---------------------- Control and Feedback improves working standards of an organisation. Do
you agree with this statement? Justify you answer.
----------------------
---------------------- The Law of Requisite Variety implies that to control each possible state
of the system elements, there must be a corresponding control state. To put it
---------------------- another way, there must be at least as many variations of control to be applied as
there are ways for the system to get out of control. The law of requisite variety
---------------------- also means that for a system to be controlled, each controller − human and
---------------------- machine – must be provided with:
1. Enough control responses (what to do in each case) to cover all possible
---------------------- conditions the system may face.
---------------------- 2. Decision rules for generating all possible control responses.
---------------------- 3. The authority to become a self-organising system in order to generate
control responses.
162 Management Information Systems
These various methods for providing system control responses are Notes
presented hereafter. Refer to Table 7.2 and Figures 7.5 and 7.6.
----------------------
Table 7.2 Enough Control Responses
----------------------
State of Variable Element Control Response
----------------------
S1 C1
S2 C2 ----------------------
S3 C3
----------------------
: :
: : ----------------------
Sn Cn ----------------------
----------------------
----------------------
----------------------
Fig. 7.5 Decision Rules for Control Response
----------------------
----------------------
S1 S2 S3 ......Sn Decision Rules + Judgement C1, C2, C3,..... Cn
----------------------
----------------------
Fig. 7.6 Self-organising Control Response ----------------------
Table 7.2 and figures 7.5 and 7.6 show LRV responses.
----------------------
----------------------
Fill in the blanks.
----------------------
1. Murphy’s Law states that “if a thing can go __________, it will go
wrong and it will go wrong at a time you least ___________ it to go ----------------------
wrong”.
----------------------
2. The Law of __________ implies that to control each possible state of
the system elements, there must be a corresponding control state. ----------------------
----------------------
Activity 4
----------------------
Discuss how control is an integral function of Systems Theory. Give ----------------------
examples.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
8
Structure:
8.1 Introduction
8.2 Basic Concepts of System Development
8.3 System Development Process
8.4 Rapid System Development Tools
8.5 Object-Oriented Systems
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
----------------------
Feasibility Assessment
----------------------
Information Requirement Analysis
----------------------
Conceptual Design Cancellation possible at any stage ----------------------
----------------------
Physical System Design
----------------------
Physical Database Design
----------------------
Program Development ----------------------
----------------------
INSTALLATION & OPERATIONS
----------------------
Conversion ----------------------
----------------------
Post Audit
----------------------
Fig. 8.1 Systems Development Life Cycle Model by Davis and Olson ----------------------
----------------------
----------------------
----------------------
----------------------
Activity 1 ----------------------
Prepare requirements specification for Sales Order System and purchase ----------------------
order system ----------------------
The System Development Life Cycle (SDLC) Approach or the Product ----------------------
Life Cycle Approaches are relatively rigorous system development techniques.
----------------------
These techniques necessitate working out the problem identification, information
requirements, etc. and hence, could be time-consuming. ----------------------
However, the aforesaid traditional system development/design
----------------------
methodologies/techniques may not be useful in certain cases in view of the fact
that: ----------------------
●● The problem under investigation may not be always well defined. ----------------------
●● It may also not be possible to fully identify the input-output process.
----------------------
----------------------
The systems person develops the initial working/interactive prototype, which meets ----------------------
the user’s stated basic requirements. The prototype, performing only the basic
functions, is then handed over to the user. While developing the prototype, ----------------------
the systems person may use the latest software tools available to speed up ----------------------
application development.
Step 3: Use the prototype for further refinements ----------------------
The user has already received the initial prototype, which he now puts to use. ----------------------
This working with the prototype enables the user to gain hands-on experience
----------------------
with the proposed system and helps him to determine to what extent the
prototype meets the user needs/expectations/requirements. The user, rather ----------------------
than the systems person, decides the desired changes for further improving the
prototype. ----------------------
Step 4: Revise and enhance prototype ----------------------
The systems person takes due notice of the changes/modifications suggested ----------------------
by the user and revises, enhances and refines the prototype accordingly. The
prototype is then returned to the user and the process follows steps 3 and 4 in ----------------------
an iterative mode, till the prototype is finally approved by the user and becomes
operational prototype. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
---------------------- Yes
Step 3 User
---------------------- Satisfied
----------------------
No
----------------------
---------------------- c. Rapid prototyping can gross over essential steps in systems development.
d. Rapidly developed prototypes may be difficult to maintain and support in
---------------------- a regular production environment.
---------------------- e. The performance may be rather inefficient.
---------------------- f. As the system can be changed easily, documentation may not be kept up-
to-date.
----------------------
g. User must be willing and committed to providing ongoing and meaningful
---------------------- feedback.
---------------------- h. The interactive nature of prototyping demands that the size of the project
team be kept as small as possible. As such, each member may not be
---------------------- familiar with all facets of the system.
----------------------
----------------------
System Database System
Analysis Design Design ----------------------
Tools Tools Tools
----------------------
----------------------
System
Strategic CASE Construction
Encyclopedia Tool CODE/ ----------------------
Planning FORM/REPORT
Tools Generations
----------------------
----------------------
Process System
Project
Support Management ----------------------
Management Tools
Tools
----------------------
----------------------
Fig. 8.4 CASE Encyclopedia
----------------------
Further in certain quarters, CASE Tools are also referred to as “Toolsets”
and as stated by James O’brein, the Toolsets could be: ----------------------
a. Planning toolset: It helps begin the development process with information ----------------------
strategy planning from a high level business vantage point.
b. Analysis toolset: It focuses on correctly capturing detailed business ----------------------
requirements early in the development process. ----------------------
c. Design toolset: It provides detailed specifications of the system solution.
----------------------
d. Information integrator: It integrates system specifications, checks them for
consistency and correctness and records in local or central repositories. ----------------------
e. Code generation toolset: It produces a higher language programme code ----------------------
based on system specifications.
----------------------
f. Database generation toolset: It generates system control information
needed for data storage and access. ----------------------
g. Public interface: It provides for file transfers and query reporting. ----------------------
----------------------
4. Data moving openly around the system from Function To Function ----------------------
5. Functions transforming data from one form to another ----------------------
6. Top-down approach in program design
----------------------
Object-Oriented Programming Approach
----------------------
As against this, the Object-Oriented Programming treats data as a critical
element in program development and does not allow it to flow freely around the ----------------------
system. It ties data more closely to the functions that operate on it.
----------------------
---------------------- 4. Functions that operate on the data of an object are tied together in the data
structure.
---------------------- 5. Data is hidden and cannot be accessed by external Functions.
---------------------- 6. Objects can communicate with each other through Functions.
---------------------- 7. New data and Functions can be easily added whenever necessary.
8. “Bottom-up” approach in programming design.
----------------------
The OOP Concepts
----------------------
Some of the concepts used extensively in OOP include:
---------------------- 1. Objects: Objects are the basic run-time entities in object-oriented system.
---------------------- Each object contains data and code to manipulate the data.
2. Classes: Classes are user-defined data types and behave like the built-in
----------------------
types of a programming language.
---------------------- 3. Data abstraction and encapsulation: While “Abstraction” refers to the
art of representing essential features without including the background
----------------------
details or explanations, “Encapsulation” refers to the wrapping of data
---------------------- and functions into a single unit called “Class”.
4. Inheritance: It is the process by which objects of one class acquire the
----------------------
properties of objects of another class.
---------------------- 5. Polymorphism: It refers to the ability to take more from one form.
---------------------- 6. Dynamic binding: It is associated with polymorphism and inheritance.
Dynamic binding means that the code associated with a given procedure
---------------------- call is not known until the time of the call at run-time.
---------------------- 7. Message passing: Message passing involves specifying the name of the
object, the name of the function (message) and the information to be sent.
----------------------
The OOSD Approach
----------------------
The OOSD Approach combines the logic of the Systems Development
---------------------- Life Cycle with the power of Object-Oriented Modeling and Programming.
OOSD also follows a defined SDLC, the life cycle phases usually being
---------------------- completed with a number of iterations.
---------------------- OOSD typically consists of the following steps/activities:
The OOSD has now become a preferred System Design and Implementation ----------------------
tool of both the developers as well as the users. OOSD is now preferred mainly
due the benefits it confers upon the developers and users. ----------------------
However, most developers use OOP languages for the structure and ease ----------------------
they provide. The OOP languages are generally classified into Object-Based
Programming Languages and Object-Oriented Programming Languages, ----------------------
depending upon the features supported by these languages. ----------------------
----------------------
----------------------
----------------------
----------------------
---------------------- From the managerial perspective, OOSD and OOP help expedite project
completion within a shorter time and lesser costs. OOSD and OOP have also
---------------------- been instrumental in enhancing/improving productivity, which by itself is good
enough for increased future applications.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
9
Structure:
9.1 Introduction
9.2 Database Management System
9.3 DBMS Components
9.4 Database Model
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Characteristics of Data in DBMS
----------------------
1. Data sharing: Data should be shared amongst different users and
applications ----------------------
2. Data independence: Changes made in the schema at one level should not ----------------------
affect other levels.
3. Controlled redundancy: Data is not duplicated, however, any duplication ----------------------
is deliberate and controlled. ----------------------
4. Validity/Integrity/Correctness: Data entered should be correct with
respect of the real world entity that they represent. ----------------------
5. Security: Data should be protected from unauthorised users. ----------------------
Advantages of DBMS
----------------------
The following can be said to be the major advantages of the DBMS:
----------------------
1. The DBMS helps reduce the complexity in the systems’ environment due
to the central control/management of data, access, utilisation and security. ----------------------
2. As same data elements are not repeated in all the files, DBMS helps
----------------------
reduce/eliminate data redundancy and inconsistency and promotes data
integrity throughout the system/organisation. ----------------------
3. The DBMS provides for central control of data creation and definition,
thereby reducing/eliminating data confusion. ----------------------
4. DBMS helps bring about substantial reduction in the costs related with ----------------------
program development and maintenance.
5. DBMS helps separate logical view and physical arrangement, thereby, ----------------------
reducing program-data dependence. ----------------------
6. DBMS, particularly the RDBMS, permits ad-hoc queries, thereby
ensuring flexibility of information systems. ----------------------
7. DBMS helps increase access and availability of information. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Division A Division B Division C Division D ----------------------
----------------------
Region I Region II Region III
----------------------
----------------------
Manager
----------------------
Name Posted At Date of Join Performance ----------------------
----------------------
----------------------
Sales Person
----------------------
----------------------
----------------------
----------------------
Activity 1 ----------------------
----------------------
Find out the names of various database management system software
applications used in industries. ----------------------
Summary ----------------------
●● A DBMS is a collection of programs that enables you to store, modify and ----------------------
extract information from the database. ----------------------
●● Characteristics of data in DBMS are sharing, persistence,
validity/integrity/correctness, security, non-redundancy of data and data ----------------------
independence. ----------------------
●● Database changes over time as information is inserted and deleted. The
collection of information stored in the database at a particular moment is ----------------------
called an instance of the database. The overall design of the database is
----------------------
called the database schema.
●● The database provides two different types of languages. They are Data ----------------------
Definition Language and Data Manipulation Languages.
----------------------
●● The major components of DBMS are transaction management, concurrency
control, recovery management, security management, language interface, ----------------------
storage management, database catalog management. Data catalog or data
----------------------
dictionary is a system database that contains description of data in the
database (metadata). ----------------------
●● Database models are used for keeping track of entities, attributes and
----------------------
relationships. The database models are Hierarchical Database Model
(HDBM), Network Database Model (NDBM), Relational Database ----------------------
Model (RDBM) and the Object-oriented Data Model.
The Database Management System 201
Notes Keywords
----------------------
●● Database Management System (DBMS): A software system which
---------------------- performs the functions of defining, creating, revising and controlling the
database.
---------------------- ●● Data language: The database provides two different types of languages:
---------------------- Data Definition Language (DDL) to specify the database schema and Data
Manipulation Language (DML) to express database queries and updates.
---------------------- ●● Database models: They are used for keeping track of entities, attributes
---------------------- and relationships.
----------------------
Answers to Check your Progress
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
10
Structure:
10.1 Introduction
10.2 Data Warehousing
10.3 Data Warehouse Structure/Architecture
10.4 Data Mining
10.5 Applications of Data Mining
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
Subject-Driven ----------------------
A data warehouse is organised around major subjects and contains only ----------------------
the information necessary for the decision support processing. It is not organised
according to application (e.g., a data warehousing for bank would be organised ----------------------
by customer, deposit/advances, interest rate and not by different products).
----------------------
Non-Volatile
----------------------
A data warehouse is always a physically separate data store. The relative
data is transformed from the application data. As such, data warehousing does ----------------------
not require processing of transactions, recovery, etc. The data is not updated
or changed either after the data enters data warehouse. Data is only loaded, ----------------------
refreshed and accessed for queries. ----------------------
Time Varying
----------------------
Time-varying data in the data warehouse is collected from the corporate
data archives and could be 3 to 10 years old or even older. The data provide ----------------------
historical perspective and is used for comparisons, trends and forecasting.
----------------------
----------------------
10.3 DATA WAREHOUSE STRUCTURE/ARCHITECTURE
----------------------
We have, so far, discussed the definition of data warehouse. Before we
---------------------- proceed further, let us note:
---------------------- Data Warehouse Structure
---------------------- A typical data warehouse structure is illustrated in Figure 10.1.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 10.1 A Typical Data Warehouse Structure
208 Management Information Systems
It must, however, be noted that the data warehouse structure could vary Notes
from one business to another depending upon the business activity.
----------------------
Structure of Data inside the Data Warehouse
The structure of data inside the data warehouse is illustrated in Figure 10.2. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 10.2 Data Structure in Data Warehouse
Flow of Data inside the Data Warehouse ----------------------
The flow of data inside the data warehouse is illustrated hereafter. Refer ----------------------
to Figure 10.3.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig.10.3 Flow of Data inside the Data Warehouse
----------------------
What does a Data Warehouse do?
----------------------
The major functions/utilities of data warehouse could be stated as follows:
---------------------- 1. It helps integrate data from a number of diverse, heterogeneous sources.
---------------------- 2. It consolidates such data and stores it in a step-by-step fashion. Such
data can then be used for Informative Analytical Processing over a long
---------------------- historical time period.
---------------------- 3. It allows the management, mostly at the senior level using the Decision
Support System (DSS) and the Executive Information System/Executive
---------------------- Support System (EIS/ESS) for semi/unstructured decisions, to consider
---------------------- issues in context, by providing a consistent view of the enterprise.
4. It helps create an enterprise-wide integrated database of summarised,
----------------------
historical information and supports business analysis and decision-
---------------------- making.
5. It improves the optimisation efforts through consolidation, conversion,
----------------------
transformation and integration of operational data.
---------------------- In addition to the utilities/functions stated above, there are some other
benefits of data warehousing. Such benefits are illustrated hereafter.
----------------------
Benefits of Data Warehousing
----------------------
(Adapted from H. J. Watson & B. J. Haley, Managerial Considerations,
---------------------- Communication of the ACM 41 (9) 1998.)
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Activity 1
----------------------
Data warehousing requires investing a lot of money. What is the basis on
---------------------- which an organisation decides to go for data warehousing?
----------------------
10.4 DATA MINING
----------------------
In the corporate world, a lot of data gets collected in the course of their
---------------------- daily operations. This data collected is normally stored/accumulated in a data
---------------------- warehouse and data mart for analysis. The analysis is conducted, using the
stored data, to help managers in the decision-making process. The analysis
---------------------- becomes more meaningful using data mining, as it enables managers to establish
relationships between business elements and find out aspects and facts about
---------------------- their business that may not be evident otherwise.
---------------------- Data mining, thus, is an information analysis tool that involves the
automated discovery of patterns and relationships in a data warehouse. Data
----------------------
mining is a new, but powerful concept that has started to gain popularity in the
---------------------- world of Business Intelligence.
Data mining aims at extracting patterns, trends and rules from data
----------------------
warehouse to evaluate either predicted or scour-proposed business strategies,
---------------------- which in turn, will improve competitiveness, improve profits and transform
business processes.
----------------------
DM is the exploration and analysis of large quantities of data in order to
---------------------- discover meaningful patterns and rules.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fill in the blanks.
1. The extraction of hidden predictive information from large databases ----------------------
is called ____________________.
----------------------
Multiple Choice Multiple Response.
1. Data mining encompasses the following technical approaches: ----------------------
i Clustering ----------------------
ii Data summarisation
iii Data manipulation ----------------------
iv. Classification ----------------------
v. Finding dependency networks
----------------------
Match the following.
----------------------
i. Neural networks a. The extraction of useful if-then
rules from data based on statistical ----------------------
significance.
ii. Rule induction b. Tree-shaped structures that represent ----------------------
set of decisions.
----------------------
iii.Evolutionary programming c. Provides non-linear predictive models
iv. Decision trees d. Automatically formulates hypotheses. ----------------------
----------------------
----------------------
----------------------
Check your Progress 4
----------------------
Check your Progress 4
----------------------
Multiple Choice Multiple Response.
----------------------
1. Which of the following are the trends affecting Data Mining?
i. Data trends ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
11
Structure:
11.1 Introduction
11.2 Why Break IT System Security
11.3 Information System Security Threats
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
i. Revenge ----------------------
ii. Money ----------------------
iii. A shot at/of notoriety ----------------------
iv. Validating Information
----------------------
v. The challenge of doing “IT”
----------------------
11.3 INFORMATION SYSTEM SECURITY THREATS ----------------------
There are two different types of threats/problems: ----------------------
1. External threat
----------------------
2. Internal threat
----------------------
With the prevalence of remote access, the World Wide Web, intranets
and extranets, the distinction/difference between the external threats and the ----------------------
internal threats is more often blurred and hazy. Thus, the difference is more
logical than a physical one. ----------------------
1. External security threats: The external threats would be those emanating ----------------------
from outside the organisation. To provide security against these threats,
the following issues need to be addressed: ----------------------
a. Internet connections: Normally, in every organisation, there are ----------------------
relatively few, identifiable Internet connections. It is, therefore,
relatively easy to focus upon them and exercise control. This ----------------------
connection should be protected by a “Firewall”. ----------------------
Firewalls are hardware and software combinations that guard the
border between the corporate Inter/Intranet (private access) and the ----------------------
Internet (public access) as illustrated in Figure 11.1. ----------------------
----------------------
----------------------
----------------------
---------------------- Firewalls can control who can surf the Web, download files, etc.
Firewalls can also hide the organisational network’s identity from the
---------------------- rest of the world on the Internet, as the corporate internal IP address
is never used. It should be remembered that if the organisation’s
---------------------- Internet connections are n1st five characters in length. It should be
---------------------- neither the same as the user’s ID nor be a common word. It should
expire/change regularly and reuse of the older password should not
---------------------- be permitted. Some software, with the ability to disable an ID if too
many or specified failed attempts are made within a specified period
---------------------- of time should be installed.
---------------------- b. User terminations: When the user ceases to be an employee, intern,
temporary associate or consultant/contractor, the user security
---------------------- administrator must be informed immediately, so that the user ID
could be terminated.
----------------------
c. Special privilege IDs: Certain functionaries like Network/System
---------------------- Managers are allotted special IDs and passwords called Root,
Supervisor or Administrator ID/Passwords providing “Carte
---------------------- Blanche” access to the system.
---------------------- These passwords too should be changed regularly and changed
immediately when someone who knows them leaves the
---------------------- organisation.
---------------------- d. Access review: There are generally number of users and hundreds
of thousands, if not millions, of files on computer networks. Some
---------------------- type of user administrator review must be undertaken − twice or
thrice a year − to ensure that unauthorised users are not given access.
----------------------
e. Authorisation levels: It must be made clear as to who has authority
---------------------- over what. It must also be ensured that the requests for authorisation
permitting access to relative database files are received and issued
---------------------- in writing, usually via e-mail.
---------------------- Further, the user could be assigned several forms of authorisation
for access to parts of database. The authorisation could be:
---------------------- l Read authorisation
---------------------- l Insert authorisation
l Update authorisation
----------------------
l Delete authorisation
---------------------- l Index authorisation
----------------------
Check your Progress 2
---------------------- 1. An audit trail is a log of all changes to the database, along with
information such as which user performed the change and when the
---------------------- change was performed.
----------------------
---------------------- Activity 1
---------------------- Study any three recent antivirus software and list their features. Organizations
should make it compulsory for their employees to change password after
---------------------- every 15 days and the passwords should be strong. Do you agree with this
---------------------- statement? Justify your answer.
----------------------
Summary
----------------------
●● While one may never be able to eliminate altogether all the security
----------------------
hazards/risks, one can certainly be more aggressive about trying to
---------------------- minimise IT/System security.
----------------------
----------------------
Keywords
----------------------
●● External security threats: The external threats are those emanating from
outside the organisation. ----------------------
●● Firewalls: Hardware and software combinations that guard the border ----------------------
between the corporate Inter/Intranet (private access) and the Internet
(public access). ----------------------
●● VIRUS: Vital Information Resource Under Siege. Any type of ----------------------
programming code that intentionally causes a system disruption, shut
down or loss of data. ----------------------
----------------------
Self-Assessment Questions
----------------------
1. List down the reasons as to why people break into computer systems.
2. What is a firewall and how can it help to control threat to computer ----------------------
systems? ----------------------
3. What are the threats to Information System Security?
4. What are the different levels of authorisation? ----------------------
5. State various internal threats. ----------------------
Answers to Check your Progress ----------------------
Check your Progress 1 ----------------------
Fill in the blanks. ----------------------
1. The spread of Internet and the relative ease of access made the task of
information breach relatively easier. ----------------------
----------------------
----------------------
---------------------- 1. True
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
12
Structure:
12.1 Introduction
12.2 Need for Software Quality Assurance
12.3 Software Quality
12.4 Software Quality Assurance
12.5 Quality Assurance Standards or Models
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
----------------------
State True or False.
----------------------
1. Software Quality Assurance convinces the users or prospective clients
that the developer has a satisfactory Software Quality Assurance ----------------------
Program.
----------------------
12.3 SOFTWARE QUALITY ----------------------
Let us first discuss the two terms separately, before discussing Software ----------------------
Quality.
----------------------
Software
Generally, software is defined as a set of instructions. In the context of ----------------------
Software Quality Assurance, let us now view the software as “all instructions/ ----------------------
data put into a computer to cause it to function in any code”. It includes
“operating systems, supervisory systems, compilers and test routines as well as ----------------------
application programs. It also includes the documents used to define and describe
the program, including flow charts, network diagrams and program listings as ----------------------
well as specifications, test plans, test data, test results and user instructions”. ----------------------
Quality
----------------------
“Quality indicates the degree of excellence of a product or service.”
According to ISO 1986, quality means the totality of features and characteristics ----------------------
of a product or service that bear on its ability to satisfy stated or implied needs.
----------------------
As could be observed, the ISO definition clearly reflects the desire to define
quality in a way, which captures the current concept of quality as customer ----------------------
satisfaction in the broadest possible context.
----------------------
Now that we have noted the definitions of “Software” and “Quality”, let
us now move over to Software Quality. ----------------------
Software Quality ----------------------
Software quality is the inherent ability of software to be used for a ----------------------
specified purpose as the software possesses certain features and characteristics
and which enables it to be used for that purpose. ----------------------
---------------------- There are a set of quality criteria that help in determining the quality of
the software. If they are required and not present, they pose a risk to the success
---------------------- of the software. These are given below:
----------------------
Fill in the blanks.
1. ___________ indicates the degree of excellence of a product or ----------------------
service. ----------------------
Multiple Choice Multiple Response.
----------------------
1. Software quality is the ability of a software to be fit for its purpose
and capability to ensure: ----------------------
i. It is reliable. ----------------------
ii. It is not doing what it is supposed to do.
----------------------
iii. It is not performing according to its specifications.
iv. It is doing efficiently. ----------------------
v. It is working efficiently for the time for which it is predicted to ----------------------
work.
Match the following. ----------------------
----------------------
12.4 SOFTWARE QUALITY ASSURANCE ----------------------
Quality assurance is “a planned and systematic pattern of all actions ----------------------
necessary to provide adequate confidence that the item or project conforms to
established technical requirements”. ----------------------
Software Quality Assurance (SQA) is an umbrella activity that is applied ----------------------
through the software process. SQA is important as it reduces the amount of
rework that it must do, which results in lower costs and more importantly, ----------------------
improved time to market.
----------------------
Software quality assurance, accordingly, lays considerable stress on getting
the design right, prior to coding, although the increasing use of prototyping in ----------------------
systems development is reducing the differences between the production stages
----------------------
of hardware and software.
----------------------
Check your Progress 3
----------------------
Fill in the blanks.
----------------------
1. _________________________is an umbrella activity that is applied
through the software process. ----------------------
Multiple Choice Multiple Response. ----------------------
1. The Discipline Triangle consists of: ----------------------
i. Management Discipline
----------------------
ii. Team Development Discipline
----------------------
iii. Software Development Discipline
iv. Product Assurance Discipline ----------------------
----------------------
12.5 QUALITY ASSURANCE STANDARDS OR MODELS
----------------------
The formal Quality Assurance model would need to be woven around
the ISO 9000 Standard. The International Organisation for Standardization ----------------------
(ISO) developed the family of standards for software. The ISO 9000 framework
describes quality assurance elements, which includes organisational structure, ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
v. Optimising ----------------------
In the initial stage, processes are immature or ad hoc, which means these ----------------------
process are not clearly defined and the outcome of these processes largely
depends on the capability of the team and project leader. From level ----------------------
two to five, the key process areas are defined and these are more refined
and as we go up one scale, processes become more matured. In mature ----------------------
processes, each process is well defined and the outcome of the process ----------------------
does not depend on the team but on the process. More mature the process,
more quality we can expect. ----------------------
2. Six Sigma: The Six Sigma process was developed by Motorala. It is a ----------------------
quality management methodology, which focuses on achieving high
levels of quality by controlling the process and reducing defects. Six ----------------------
Sigma derived its name from the statistical term “standard deviation” and
----------------------
is denoted by letter ó sigma (a Greek notation) that defines the degree of
variance. ----------------------
Six Sigma puts a primary focus on quantifying, measuring and controlling
----------------------
quality of the product. Thus, it focuses on collecting data and analysing
the results in order to minimise the defects in the product. Six Sigma is ----------------------
an approach towards enhancing products as well as process quality. To
achieve Six Sigma certification, the process must not produce more that ----------------------
3.4 defects per million opportunities. The philosophy behind Six Sigma
----------------------
is that, if you can measure the defects, you can systematically define the
procedure to eliminate them and arrive at zero defects. ----------------------
----------------------
Multiple Choice Multiple Response.
----------------------
1. Which of the following are the levels of Capability Maturity Model
(CMM)? ----------------------
i. Initial
----------------------
ii. Repeatable
iii. Refined ----------------------
iv. Managed ----------------------
v. Optimising
----------------------
Fill in the blanks.
1. Six Sigma process was developed by ____________________. ----------------------
---------------------- Keywords
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
13
Structure:
13.1 Introduction
13.2 Accounts Payable System
13.3 Production Management System
13.4 Marketing Service System
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
---------------------- 8. Debit/credit note payments/deductions are made as and when the need
arises.
---------------------- 9. Cheques are issued as per bank payment vouchers for the entire invoice,
---------------------- advance or debit/credit note payments.
10. Balances of the creditors and those of the control accounts, as per above
----------------------
transactions, are maintained through double entry bookkeeping.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 13.1 B-Context Level Diagram ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 13.1 C-First Level Data Flow Diagram
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
2. Journal Entry
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
4. Accounts Master ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
2. Vendor Balances
----------------------
XYZ Co. Ltd.
---------------------- BANK BALANCE REPORT
----------------------
Ven. Invoice Trans. Trans. IDS BP Vchr Prev. Type of Trans. Current
Code Code No. Date Clode No. Balance Balance Amount Balance
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Activity 1 ----------------------
----------------------
Prepare Context Level Diagram for Billing System.
----------------------
13.3 PRODUCTION MANAGEMENT SYSTEM ----------------------
---------------------- 5. Various reports such as production plan report, daily product report,
production plan achievement status, inspection report are prepared. These
---------------------- reports are also sent to the management whenever required.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
13.2 Context Level Diagram
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Check your Progress 1
----------------------
----------------------
----------------------
----------------------
3. It will receive enquiries for the supply of cable joining kits from different ----------------------
contractors who apply for the tender for implementation of package
----------------------
works.
4. It will generate offers against the enquiries received. ----------------------
5. The system will store a comparative statement of the enquiries received ----------------------
by the company’s competitors for the supply of cable jointing kits. The
branch offices will provide this information. ----------------------
6. The system will record the orders received by the company’s competitors ----------------------
on the basis of comparative statement entries previously recorded. The
branch office of the company will provide this information. ----------------------
7. It will match the enquiries received and the orders received by the ----------------------
company as well as competitors and close enquiries as well as packages.
The branch offices will provide competitor order details. ----------------------
8. The system will also record direct enquiries received from distributors ----------------------
or end-customers belonging to the utilities market segment for supply of
materials for maintenance purposes. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Master Transaction Reports
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
13.3 B Context Level Diagram
----------------------
The numbers shown in the diagram represent:
----------------------
1. Competitor Details 12. Project Details
2. Category Details 13. Package Details ----------------------
3. Additional Customer Details 14. Order Kit Details ----------------------
4. Stage Details 15. Order Details ----------------------
5. Supplier Details 16. Kit Details
----------------------
6. Material Details 17. Customer Type Details
----------------------
7. Market Segment Details 18. Customer Details
8. Enquiry Reopen Details 19. Enquiry Details ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
The following are some output reports:
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Other Output Reports can be:
---------------------- 1. Detailed Project Report
---------------------- 2. Summary Project Report
---------------------- Activity 2
---------------------- Visit an organisation involved in sales and purchase of a product and study
their sales and purchase system. Based on your study, write the scope for
----------------------
that system.
----------------------
---------------------- Summary
---------------------- ●● In this unit, the scope of the system and design aspects such as Context
level diagram, data flow diagrams, functional decomposition diagram,
----------------------
input screens and report layouts for accounts payable system, production
---------------------- management system and marketing service system have been covered.
----------------------
----------------------
●● Dataflow Diagram: A graphical representation of the “flow” of data
through an information system, modeling its process aspects. A DFD is ----------------------
often used as a preliminary step to create an overview of the system,
which can later be elaborated. ----------------------
●● Functional Decomposition Diagram: The purpose of the functional ----------------------
decomposition diagram is to show on a single page the capabilities of an
organization that are relevant to the consideration of an architecture. ----------------------
----------------------
Self-Assessment Questions
----------------------
1. With the help of the Accounts Payable System, prepare a list of all the
files. ----------------------
2. Prepare the 1st level data flow diagram for Production Management ----------------------
system.
----------------------
3. Prepare 1st level data flow diagram for Marketing Service system.
----------------------
Answers to Check your Progress
----------------------
Check your Progress 1
----------------------
Multiple Choice Multiple Response.
----------------------
1. The Inspection Department inspects the processed batch and gives the
following details: ----------------------
i. Accepted quantity ----------------------
ii. Rework quantity
----------------------
iv. Rejected quantity
----------------------
v. Reason for rejection
----------------------
Suggested Reading ----------------------
1. Jawadekar, Waman. 2009. Management Information Systems: Text & ----------------------
Cases. New Delhi: Tata McGraw Hill.
----------------------
2. Laudon, Kenneth C., Jane P. Laudon and Rajanish Dass. 2010. Management
Information Systems: Managing the Digital Firm. New Delhi: Pearson ----------------------
Education.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
14
Structure:
14.1 Introduction
14.2 MIS Applications in Service Industry
14.2.1 Airlines
14.2.2 Hospitals
14.2.3 Banking
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
---------------------- l The name, address, contact numbers of all the medical staff
---------------------- The factors outrank the factors such as the location, interest rates, layout,
banking hours, etc.
---------------------- The bank has a wide range of customers like individuals, institutions,
---------------------- trusts, business organisations, Government and local bodies.
The banks deal with a number of transactions, which also vary widely
----------------------
in terms of length and complexity. The bank customer, like any other service
---------------------- industry, is interested in getting terminal results quickly. The distinctive service
in banking mostly means solving the customers’ problems in the financial
---------------------- matters, and the single most widely used measure of quick service is the elapsed
time of transaction execution. For example, the time taken for crediting the
----------------------
----------------------
Check your Progress 1
----------------------
Fill in the blanks. ----------------------
1. Creating a distinctive ____________ is a willful, conscious and
----------------------
deliberate management endeavour.
State True or False. ----------------------
1. A product and service both are tangible. ----------------------
----------------------
Activity 1 ----------------------
1. Visit a call centre and prepare a report on the service they provide. ----------------------
2. Prepare managerial and operational service goals for the hotel industry. ----------------------
3. Visit a hospital and understand how an efficient software helps work ----------------------
reduction and data redundancy
----------------------
Summary ----------------------
----------------------
●● The MIS in the service industry should focus on the evaluation of service
needs of the people. The needs should be continuously monitored/ ----------------------
scrutinised to ascertain the change in the service demand in terms of
scope and level. Unless this is monitored, it will not be possible to revise ----------------------
the service strategy. The perception of good service also needs frequent
----------------------
----------------------
Keywords
----------------------
●● Service: The service function essentially is a human interaction between
---------------------- the service receiver and the provider.
---------------------- ●● Service and product: A product is tangible, but a service is not.
---------------------- 5. What points should be taken care of while designing an MIS for a bank?
----------------------
----------------------
----------------------
Suggested Reading
----------------------
1. Jawadekar, Waman. 2009. Management Information Systems: Text &
Cases. New Delhi: Tata McGraw Hill. ----------------------
2. Laudon, Kenneth C., Jane P. Laudon and Rajanish Dass. 2010. Management ----------------------
Information Systems: Managing the Digital Firm. New Delhi: Pearson
Education. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
System Software: A set of generalised programs that manage the resources of the ----------------------
computers, such as the central processor, communication links and peripheral
----------------------
devices.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Glossary 279
Notes
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------