Chapter - 2 (IT Systems)
Chapter - 2 (IT Systems)
Chapter - 2
Information, technologies and
systems for organizational
performance
Concept of data and information
Data
Facts or figures in a raw and unprocessed format. It includes numbers, letters, symbols, raw facts,
events and transactions
Information
To become useful for a decision maker, data must be transformed into information
Characteristics of good information – ‘Concept of ACCURATE’
Accurate
Complete
Cost effective
Understandable
Relevant
Accessible
Timely
Easy to use
Data processing
Data processing - Conversion of data into information by classifying, sorting or producing total
figures, manually or by automated means
Types of Information –
Sources of information –
❖ Internal sources (Sales ledger system, Purchase ledger system, Payroll system, Non-current
asset system, Production, Sales and marketing
Information Technology (IT) - equipment concerned with the capture, storage, transmission or
presentation of information.
Information Systems (IS) - refers to the provision and management of information to support
the running of the organization. These are a valuable strategic source which help an
organization gain competitive advantage by:
❖ Costs to design and develop the system (in case ❖ Cost of labour time to run the system
of bespoke software)
❖ Cost of materials
❖ Purchase price of software if it is not bespoke
❖ Cost of service support, e.g. IT helpdesk
❖ Purchase cost of new hardware
❖ Training costs
Cost classification
Network (LANs) – Organizations use LANs to enable them to share data (e.g. via email) and devices
(such as printers)
Wide area networks (WANs) - Used to connect LANs together, so that computer users in one location
can communicate with computer users in another location
Intranet - An internal, private network, contained within an organization, which is used to share
information among employees
Other Concepts
Firewall – It consist of a combination of hardware and software located between the company’s intranet (private
network) and the public network (Internet).
Cloud computing - Cloud computing is the practice of using a network of remote servers hosted on the internet to
store, manage, and process data, rather than a local server or a personal computer. Cloud computing allows on-
demand access to data.
Extranet - A collaborative network which uses internet technology to join organisations, for example to link
businesses with their suppliers. It acts as a private and secure extension of an Intranet.
Internet - A global system of interconnected networks carrying a vast array of information and resources
WiFi (wireless fidelity) - facilitates the mobile use of laptop computers and handheld devices
Data encryption - Encryption is a technique of disguising information to preserve its confidentiality It is a method
of scrambling the data in a message or file so that it is unintelligible unless it is unscrambled (or decrypted)
Direct data capture - Design of the data collection method
Points to consider:
Input devices
Optical Character Recognition (OCR) – used to insert financial data into a spreadsheet, or to scan articles
into a word processor
Optical Mark Recognition (OMR) – used to mark multiple-choice questions, to process student enrolment
forms or to process questionnaires
Magnetic Ink Character Recognition (MICR) - used mainly to clear bank cheques
Bar codes - used to check out items at supermarkets, to track stocks in a warehouse, to process the
borrowing and returning of books in a library or to track passenger luggage of an airline
Magnetic strip cards - used to withdraw money at ATMs and to pay goods by credit cards
❖ Firewall software
❖ Passwords and user names
❖ Formal security policy and
❖ Network design to cope with periods procedures
of high volumes ❖ Risk awareness training to
❖ Proper back up procedures employees
❖ Data encryption
Potential Threats and their solutions
Training to staff
Controls over processing and output
Passwords and software audit trails so that it can be tracked what processing was carried out
No alteration to programmes without authorization and testing
THANK YOU