UGBS 303 Computer Applications in Management
UGBS 303 Computer Applications in Management
Reginald
2015/2016
INFORMATIO
DATA N
PRIMARY
MEMORY
SECONDARY
STORAGE
• Supercomputers
• Mainframes
• Mini computers
• Microcomputer or Personal Computer (PC)
systems
• Servers
• Microcontrollers / Embedded Systems
Supercomputer
COMPUTER
: Typical features
• is used to describe large computer systems
• Traditionally been used for decades
• Have vast processing and data handling systems
• Incorporate a number of Central Processing Units
(CPUs)
• Large organizations use them
• In most cases, are the central computer of a
national network
• Need high professional technical support
desktop
Laptop / Notebook
COMPUTER
•
• – flat based system unit
➢ these are small computers with system units that
can fit next to a desk, on a desktop, or can be
carried around.
• – tall system unit
➢ they have system units that are higher than they
are wide and can be placed on the floor.
•
➢ this is a portable PC, may be either AC-powered,
battery powered, or both.
➢ These computers are ideal for users who have to
work away from home.
➢ Combines PC power with mobility.
COMPUTER
•
➢ they are smaller notebooks with less display/monitor and
keyboard capabilities to enable less weight.
➢ they typically have an external floppy disk drive.
•
➢ they are much smaller than subnotebooks.
➢ they combine pen input, writing recognition, personal
organizational tools, and communication capabilities in a
very small package (palmtops / electronic organizers)
•
➢ PCs are now found in most businesses either used as
machines or connected to a as Local
Area Network (LAN)
➢ A LAN connects, usually by special cable, a group of PCs
and peripheral devices in an office or a building
COMPUTER
Flat based System
Unit Tower System Unit
Basic Personal
Computer
•
– The speed of computers is seen when we consider that
problems which require days, weeks, or years to solve
by man
– This is conceivable when we consider that a single
arithmetic operation(e.g. 40 + 7) can be solved and
stored by a computer in few milliseconds whereas a
mathematician will need a few seconds to do same
and record( or store ) on paper
COMPUTER
•
– Once a computer is provided with the correct
instructions, the planned operations can be repeated
millions of times without a single error.
– Computers make errors only when there is a breakdown
in the computing system, or when there is human error in
the prepared instructions.
– Once the human errors get corrected, the computer
again operates without error.
COMPUTER
•
– Computer systems can store tremendous amounts of data,
making it possible to
efficiently sort data
find data
retrieve data
at lightning speed.
– The capability to store volumes of data is especially
important in an information age.
COMPUTER
•
• The three already discussed
- speed
- accuracy and
- storage capability,
are the fundamental capabilities of computers.
• But there are by-products of computers that are just as
important, especially for business organizations :-
COMPUTER
•
•
•
COMPUTER
•
•
– computers can increase productivity, especially where
dangerous, boring, or routine tasks are involved.
– In offices, the first hoped-for change, with the introduction
of computers, is increasing productivity as workers learn
to use computers to do their jobs better and faster
•
– to make essential business, scientific and governmental
decisions, managers need to take into account a large
variety of financial, geographical, logistical and other
factors.
– Using problem-solving techniques originally developed by
humans, the computer helps decision makers things
out, the and make better choices
COMPUTER
•
•
– because it improves productivity and aids decision
making, computers help to eliminate wasteful
practices and hold down the cost of labour, energy
and paperwork.
– Portability of systems enables the user to make
greater use of the system therefore reducing the cost
per process
include
• internal sources
( data generated by the activities done within the
organization and available in the organization )
• external sources
( data from stakeholders and statutory organizations
available to the organization)
•
The keyboard is the most common type of input method;
although users often find them time consuming,
uncomfortable and prone to error.
•
the user places the input onto scanner and an optical
device will scan the document that will then be entered
onto the system
Mr. Joseph Ecklu (DCS)
•
software will be required and it is supplied with the
hardware to allow this process to take place.
The computer has the ability to read and decipher
individual characters, therefore can successfully edit like a
word processor reducing the time required to enter text.
• –
this is a system where data is encoded onto a magnetic
strip This information cannot be seen by the human eye.
The only way that the information can be read is when it is
swiped through a machine known as a
. This type of data capture device is used
extensively in the payment system such as debit and
credit cards and also as an
•
these items of hardware allow the user to input large volumes of data
by voice; i.e. the user speaks in to the , the system inputs
the speech and turns it into words, which can then be viewed on
screen.
The enables the user to play back the recording and edit as
required.
These elements of hardware have also become the basis of systems
such as
• 1. Database processing
• A database is a collection of common records that can be searched,
accessed, and modified
• Examples of such records - bank account records, school transcripts, and
income tax data
• In database processing, a computerized database is used as the central
source of reference data for computations
• 2. Transactional processing
• refers to interaction between two computers in which one computer
initiates a transaction and another computer provides the first with the data
or computation required to function.
Mr. Joseph Ecklu (DCS)
•
• Most modern data processing uses one or more databases at one
or more central sites.
• Transaction processing is used to access and update the
databases when users need to immediately view or add
information
• other data processing programs are used at regular intervals to
provide summary reports of activity and database status.
• Examples of systems that involve all of these functions are
Automated Teller Machines (ATM), Credit Sales Terminals, and
Airline Reservation Systems.
• :
This is the physical output from the system and a printer is required this
hard copy can then be used as the evidence of the output.
•
This is when the user receives the information on screen
this type of communication is quick and easy when the user has only a small
amount of information to use e.g. email message confirming a meeting.
•
This may be used effectively to communicate the response from a task that
has been performed such as the confirmation of a ticket payment or ATM
(automatic teller machine) cash withdrawal.
• :
This is the most widely used type of communication within the organisation as
it will provide evidence to the decisions made by staff
Examples include reports, letters, agenda, minutes and memos; to improve the
communication of written information a word processing package such as
Microsoft Word may be used
•
This method of communication enables people to pass on verbal information
for example a telephone conversation.
Mr. Joseph Ecklu (DCS)
•
Communication will occur when staff meet together physically to discuss
issues either formally or informally.
This type of communication will allow important body language to be
interpreted such as the reaction to a proposal at a meeting.
•
This is perhaps the most important type of communication; it does not replace
the above types but helps to improve their efficiency.
For example a system of teleconferencing may be used to enable staff to hold
a meeting without staff having to travel long distances. This can increase the
speed of decision-making and reduce costs.
Other examples of electronic communication include email, voice mail, word
processing and Internet (chat rooms or message boards)
2015/2016
Session Overview
• You have learnt from the previous topic that IT describes
the equipment used to capture, store, process and
transmit or present information. In this topic, I shall help
you to understand ways in which the manager makes
use of the information provided within the organisation.
In addition, sources and qualities of organisational
information shall be discussed.
• –
– the recorded information will then enable the
manager to evaluate the performance of the decision
that resulted from having that information
– the evaluation process is vital for the success of the
business, where the expected objectives are
compared to the actual performance.
Mr. Joseph Ecklu (DCS)
Basically two sources of information
•
•
• Internet –
– the Internet is a global network of millions of business and
individual users who wish to gain access to shared
information and communicate with each other
– a search engine will need to be used to allow the user to
search through the information on the Internet to allow the
manager to complete their research, an example is google.
com.
• Specialised databases –
– the information provided on the Internet may be too general for the
manager and may take too long to source therefore the
organisation may subscribe to specialist database services.
– An example could be DataStream who is a provider of financial
information to the service sector allowing the user to search
information relating to competitors and markets.
– Example Jstor.com, Ebsco,
include:
• Accuracy
• Timely
• Cost effective
• Communicated to the right person
• Communicated via the right channel
• Concise
• Clear
• Complete
•
– this is where the person who needs to use the information to
make a decision is the person who actually receives it
– If for example the accounts manager is expecting an email
concerning the payment of an outstanding customer debt
and the email goes to the sales manager then the information
has no value to either of the managers
Q2.
2015/2016
Topic Overview
• From Topic 2, you have learnt about organisational
information and the importance of such information. In
this topic I shall discuss with you Systems Theory and its
concepts. We shall also discuss the relevance of the
systems theories to organizations and information.
include
• Environment
• Boundary
• Inputs, Transformation Process and Outputs
• Objectives
• Control and
• Feedback Loops
What the
INPUTS system does OUTPUT
(PROCESS)
Feed- Forward
Feedback
CONTROL
How the
system is
CONTROLLED
Boundary Internal
System Environment
External
System Theory and Concepts
•
As soon as we identify a system, our area of interest
– a boundary is automatically defined
– what is inside the boundary belongs to the system
– everything outside the boundary is not part of the
system
– most systems do not exist in isolation
– Systems, or their components, inter-act with the world
outside their boundary
– The part of the outside world with which the system
interacts is called the system’s environment.
•
– The interactions of a system with its environment can take
the form of inputs or outputs
– Inputs take the form of material objects, energy and/or
information flowing from the environment into the system
– Outputs are released or sent from the system back into its
environment. This output can either be useful (to some
outside system) or waste.
– Within the system, the inputs usually undergo some kind of
transformation process so that the outputs are different from
the inputs.
– Often, inputs and outputs undergo further specific
transformations at the system boundary; the system
components responsible for these transformations are called
the interfaces.
Q2.
2015/2016
Reading List
• ADMN303 – Computer Applications In Management by
Afari-Kumah E. (Unit 1 Session 1 to 6)
•
• . Some people think of these two groups as
being the same, but they are not.
• are people who gain unauthorized
access to a computer system for fun and
challenge of it.
• do the same thing but for malicious
purposes.
• They may intend to steal technical information or
to introduce what they call a bomb- a destructive
computer programe into the system.
•
• An increasing problem often associated with
remote access is that of viruses.
• Viruses can be transmitted via a network system
when emails are sent with a file attached; also the
Internet is becoming an increasing source.
• Many recent worldwide virus infections have
increased the profile and awareness of both
companies and users. We can never be 100%
certain of never obtaining a virus unless the
computer system can be completely isolated.
• Sources of viruses include the use of floppy disks to
transfer data, Internet (a number of web sites have
been created specifically for the purpose of
transmitting viruses) and games as these types of
software are rapidly transferred within the
organization.
• To reduce the risks a number of controls may be
implemented including:
– All incoming mail, web files
and floppy disks are scanned to determine if a
virus has infected them. If a virus is detected
then the software will identify the file, repair
and destroy the virus.
– The organization will need to update the software
regularly as the scans will only detect 'known'
viruses, therefore by updating newer viruses can
then be identified and destroyed.
– the organization may have a
policy of no games use within the organization and,
anyone found to be using a game or copying one
might face disciplinary procedures.
– There are two main reasons for this control one, to
reduce the chance of a virus being introduced
through the use of a game and also to reduce the
amount of that staff may waste playing them
during office hours.
– this control is quite difficult
to implement and may rely on the removal of
all drives from pcs.
– As you can imagine this may be a problem as
there may be occasions where there is a need
to make use of floppy disks to install software
and access data.
•
• A scam is a fraudulent or deceptive act or
operation designed to trick individuals into
spending their time and money from little or no
return.
2015/2016
Session Overview
• In order to be responsible with information people
must understand the importance of ethics in the
ownership and use of information, the importance
of personal privacy and the ways in which it can
be compromised the impact on society that the
growing volume and accessibility of information
has had, threats to information and the security
measures that can be undertaken to protect
against them.
• These topics would be discussed in detail in this
unit.
2015/2016
Reading List
• ADMN303 – Computer Applications In Management by
Afari-Kumah E. (Unit 1 Session 1 to 6)
•
• Physical threats to security may be natural or man made.
They include fire, flooding, weather, lightning; terrorist
activity and accidental damage. These are risks that
threaten the physical environment in which the
information system is located. A physical threat may
cause damage either to the computer system itself or
to the building in which it is contained.
•
• For an individual or organization to be able to
control a physical threat information system, they
have to implement any of the following controls
• .
•
• Theft is becoming an increasing issue for
organizations as equipment becomes more
portable (downsized equipment such as PCs
and Notebooks) making them easier to remove.
Some of the ways protect your equipment
against theft are discussed below:
• . The main reason for theft is
that the organization is unable to keep an
accurate inventory on the location of its
equipment, i.e. an employee leaves the
organization and they fail to hand over the
machine, as there are no controls in place there
is little chance of recovering the hardware.
• . Smaller more valuable pieces are locked
away requiring the entry of a physical security a
swipe card etc.
• . Make the
equipment more difficult to remove by making the
equipment physically larger.
• . This is an expensive method of
security therefore most useful to more expensive
pieces of equipment, when they are removed an
alarm sounds.
• Such as electronic entry
systems to reduce the unauthorized physical access
to the information system.
•
• A risk to equipment and resources within the
organization may come from people, either employees
or people who independently find their way into the
organization.
2015/2016
Session Overview
• The organization must assess the potential
threats to the organization assets and data
resources. To help the organization to plan
security procedures it may use .
• 1. Risk-Assessment
• The organization assesses and identifies the main risks to
the information system and, analyses the probability and
expected frequency of the occurrence of each identified risk.
• Risks will vary depending on the type of system
the organization uses; for example if the
organization has a decentralized information
system with the use of the internet and a wide
area network the possible risk of hacking and
viruses increases.
• To help assess the risk of threats or potential
threats the organization may develop risk
scenarios.
Card
Owner
Higher Security
Security
Security through
through
Digital
Biometrics
Certificates
Services for
Everyone
Access Capturing of
Life and Financial
Control and the Informal
Health Inclusion
Loyalty Economy
Insurance
Programs
Service Delivery Strategy
Biometric
Social POS
Services Banks
Mobile Franchise
Phones e
Network(s)
Governmen
t Services
Insurance,
and other
services
Benefits to Citizens and the State
Improvement of the Electoral Registrar
No No No
Missing Duplicate Inserted
Entries Entries Entries
No No
Duplicate Inserted
Entries Entries
Broadening the Tax Net
Using Data Mining Techniques
List of
know Taxpayer
n tax- profile
payer
s
NIA
Datawarehous
e
List of
people
Taxpayer who
should be
profile paying
taxes
LAW ENFORCEMENT AND NATIONAL SECURITY
Custom
s
Database
Smart
Registration Video
Books and Drivers Surveillance
Licenses
NADRA
Database
Advance
Passenger Passports
Informatio Database
n (SITA)
IBMS
Central
Server
ASF
Visa
Surveillanc
Database
e Feeds
Exit Control
Database
FORENSIC APPLICATIONS
2015/2016
Reading List
• ADMN303 – Computer Applications In
Management by Afari-Kumah E. (Unit 1 Session 1
to 6)
2015/2016
Reading List
• ADMN303 – Computer Applications In Management by
Afari-Kumah E. (Unit 1 Session 1 to 6)
•
(Gragg, 1954)
• The above limerick was used some years ago by
Professor Charles Gragg to characterize the plight of
business students who had no exposure to cases.
The truth is that the mere act of listening to lectures
and sound advice about managing information
technology does little for anyone's IT management
skills.
Mr. Joseph Ecklu (DCS)
• You are most welcome to the last Unit of this
important course. In this Unit, I shall
• discuss with Information Technology (IT) Case
analysis.
2015/2016
Reading List
• ADMN303 – Computer Applications In
Management by Afari-Kumah E. (Unit 1 Session 1
to 6)
2015/2016
Reading List
• ADMN303 – Computer Applications In
Management by Afari-Kumah E. (Unit 1 Session 1
to 6)
10/12/2021
Session Overview
• As noted earlier, a case study helps students
learn by immersing them in a real-world business
scenario where they can act as problem-solvers
and decision-makers. In this section, I shall teach
you the general steps you need to follow in order
to analyse a case.
10/12/2021
Session Objectives
• By the end of this section, you should be able to
– identify the general steps involved in case
analysis
10/12/2021
• While there is no one definitive or
approach, there are common steps that most
approaches recommend to be followed in
tackling a case Study.
10/12/2021
• . This variety is beneficial since it will show you
different ways of approaching decision making.
10/12/2021
• Beforehand (usually a week before), you will get:
10/12/2021
• Your work in completing the case can be divided
up into three components:
– what you do to prepare before the class
discussion, what takes place in the class
discussion of the case, and
– anything required after the class discussion
has taken place.
10/12/2021
•
• The case presents facts about a particular
organization.
•
• The case study analysis can be broken down into
the following ~ steps
• Identify the most important facts surrounding
the case: 10/12/2021
• Identify the most important facts surrounding
the case.
• Identify the key issue or issues.
• Specify alternative courses of action.
• Evaluate each course of action.
• Recommend the best course of action.
10/12/2021
Identify
10/12/2021
• One can assume the facts and figures in the
case are true, but statements, judgments, or
decisions made by individuals should be
questioned.
10/12/2021
• If key facts and numbers are not available, you
can make assumptions, but these assumptions
should be reasonable given the situation.
10/12/2021
• Read through the case again to
10/12/2021
• You should be able to describe the problem or
challenge in one or two sentences.
• You should be able to explain how this problem
affects the strategy or performance of the
organization
10/12/2021
• You will need to explain why the problem occurred.
10/12/2021
• To determine if a problem stems from management
factors, consider whether managers are exerting
appropriate leadership over the organization and
monitoring organizational performance.
10/12/2021
• To determine if a problem stems from
technology factors, examine any issues arising
from the organization's information technology
infrastructure: its hardware, software, networks
and telecommunications infrastructure, and the
management of data in databases or traditional
files. Consider also whether the appropriate
management and organizational assets are in
place to use this technology effectively.
10/12/2021
• To determine the role of organizational factors,
examine any issues arising from the organization's
structure, culture, business processes, work groups,
divisions among interest groups, relationships with
other organizations, as well as the impact of
changes in the organization's external environment-
changes in government regulations, economic
conditions, or the actions of competitors, customers,
and suppliers.
10/12/2021
• You will have to decide which of these factors -or
combination of factors -is most important in
explaining why the problem occurred.
• Remember, there is a difference between what an
organization and what that organization
actually do.
• Some solutions are too expensive or operationally
difficult to implement, and you should avoid solutions
that are beyond the organization's resources. Identify
the constraints that will limit the solutions available. Is
each alternative executable given these constraints?
10/12/2021
• List the courses of action the company can take to
solve its problem or meet the challenge it faces: For
information system-related problems, do these
alternatives require a new information system or the
modification of an existing system?
• Are new technologies, business processes,
organizational structures, or management behaviour
required? What changes to organizational processes
would be required by each alternative? What
management policy would be required to implement
each alternative?
10/12/2021
• State the risks as well as the rewards associated
with each course of action. Is your
recommendation feasible from a technical,
operational, and financial standpoint? Be sure to
state any assumptions on which you have based
your decision.
10/12/2021
• Evaluate each alternative using the facts and
issues you identified earlier, given the conditions
and information available.
10/12/2021
the best
10/12/2021
• Your final recommendation should flow logically
from the rest of your case analysis and should
clearly specify what assumptions were used to
shape your conclusion.
10/12/2021
• The various steps involved in Case Analysis were discussed. hope
you have enjoyed and understood case analysis
10/12/2021
Trial Question
• Briefly explain each of the steps in case analysis.
10/12/2021
Session
2015/2016
Reading List
• ADMN303 – Computer Applications In
Management by Afari-Kumah E. (Unit 1 Session 1
to 6)
•
• When you are ready, read through a case and
produce an answer according to the procedure
suggested above.
• Then compare this answer with the activity solution
and identify which points you managed to include -
and any that you missed
Summary
2015/2016
Reading List
• ADMN303 – Computer Applications In
Management by Afari-Kumah E. (Unit 1 Session 1
to 6)
• .
• But the PC industry and Dell's current major
business challenges have only made Dell's push
for efficiencies more urgent -the only way, really,
for its last-man-standing strategy to succeed. So
besides building automated factories, Dell is
determined to weave customers and supplies
into its production network. In addition, Dell is
experimenting with more exotic IT concepts
such as data warehousing, event tracking, and
demand shaping
• Ultimately, if Michael Dell is right, all these
systems will merge to produce what he and
several manufacturing gurus have come to call "
frictionless trade". That is when a Web enabled
business enterprise automatically reacts to
stimuli from hundreds of sources, makes
thousands of adjustments in real time, and gets
products to customers with whirlwind speed.
Nowadays, no one in the industry is betting
against Mr. Dell.
Trial Questions
1. What are the strategic benefits and challenges
of using the Web Methods technology for Dell
and its business customs?
2. Des Litton's use of the Dell e-procurement
system result in strategic or operational
business benefits for the company? Explain our
answer
3. How realistic is a frictionless trade goal for Dell
Computer? For other companies? Defend your
position
• On the business day of the new millennium, Duke
Energy initiated a guerrilla approach to e-business. A
small b and of advocates began to roam the utility,
living in the business units, seeding pilot projects,
assisting with implantations, coordinating resources,
and spreading success stories. Eighteen months later,
having launched more than a dozen successful
internet initiatives that saved the company $52 million
last year alone, the "e-team" is now handing off the
projects to the businesses.
• "Then," says senior vice president and chief e-
business officer A.R. Mullimax, "we will declare
victory. "Here's how they did it.
http://ocp.uni
passau.de/drupalf?q=node/19
is.pdf
David Robinson, September 2008. Notes on Case
Analysis
Erskine, Leenders, & Mauffette-Leenders,(1997);
Richard Ivey School of Business,
The University of Western Ontario, 1997
Thompson, A. A and A.J., Strickland (2001): Strategic
Management: concepts and cases. McGraw-Hill, New
York
Carthy, Joe PhD: Web lecture notes on Comp 1001,
Introduction to Information Technology & Computer
Architecture. http://www.cs.ucd.ie/staffijcarthy/home
David Robinson, Notes on http://faculty.
haas.berkeley.edu/ROBIN SON/Case%20Analys
• Laudon & Laudon Management Information
Systems, 14th Ed. 2014 Pearson Education
Limited 2014, England