0% found this document useful (0 votes)
12 views19 pages

Chapter - 2 (IT Systems)

Uploaded by

Stellaissangya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views19 pages

Chapter - 2 (IT Systems)

Uploaded by

Stellaissangya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Value – Ed, December 2020, PM Batch

Chapter - 2
Information, technologies and
systems for organizational
performance
Concept of data and information

Data

Facts or figures in a raw and unprocessed format. It includes numbers, letters, symbols, raw facts,
events and transactions

Information

To become useful for a decision maker, data must be transformed into information
Characteristics of good information – ‘Concept of ACCURATE’

Accurate

Complete

Cost effective

Understandable

Relevant

Accessible

Timely

Easy to use
Data processing

Data processing - Conversion of data into information by classifying, sorting or producing total
figures, manually or by automated means

Data may be transformed into information by:

❖ bringing together related pieces of data


❖ summarizing data
❖ basic processing of data
❖ using tabulation and diagrammatic techniques
❖ using statistical analysis
❖ financial analysis
Sources and types of management information

Types of Information –

❖ Internal information and

❖ External information (for eg - competitor information, customer and supplier information)

Sources of information –

❖ Internal sources (Sales ledger system, Purchase ledger system, Payroll system, Non-current
asset system, Production, Sales and marketing

❖ External sources (Suppliers, newspapers and journal, government, customers, employees,


banks, business enquiry agents, internet, etc.)
Information technology and information systems

Information Technology (IT) - equipment concerned with the capture, storage, transmission or
presentation of information.

Information Systems (IS) - refers to the provision and management of information to support
the running of the organization. These are a valuable strategic source which help an
organization gain competitive advantage by:

❖ linking the organization to customers or suppliers


❖ effectively integrating the use of information in a value-adding process
❖ developing, producing, marketing and delivering new products and/or services based on
information
❖ giving information to senior management to help develop and implement strategy
What is the need of information?

❖ Documentation of transactions can be used as evidence in a case of dispute

❖ There may be a legal requirement to record transactions

❖ Information on production costs is used to assess the profitability of a business


Costs of a new systems
Cost-benefit analysis must be used to assess the expected costs and benefits of the new Information System
i.e. Benefit of management information > cost of obtaining information

The costs of a new system

Initial costs Running costs

❖ Costs to design and develop the system (in case ❖ Cost of labour time to run the system
of bespoke software)
❖ Cost of materials
❖ Purchase price of software if it is not bespoke
❖ Cost of service support, e.g. IT helpdesk
❖ Purchase cost of new hardware

❖ Cost of testing and implementation of the new


system

❖ Training costs
Cost classification

Costs of internal information Costs of external information

❖ Direct data capture costs ❖ Direct costs


❖ Processing costs ❖ Indirect costs (e.g. wasted time finding useful
❖ Indirect costs information)
❖ Management costs
❖ Infrastructure costs

Indirect costs of producing information - Cost of labour and cost of


training staff on new or changed system
Other indirect costs of providing information

❖ Loss of staff morale


❖ Delays caused in other projects of the business
❖ General dislocation caused by system change
❖ Upsetting customers from system change
❖ Incompatibility with other systems
❖ Unexpected costs of software amendments, tailoring and maintenance
❖ Cost of failure due to inappropriate systems or faulty implementation
❖ Reduced quality of information, due to information overload
❖ Poor decision making, due to information overload
❖ Too many areas to focus on
❖ Focus on the wrong things
Systems architecture and data flows

Network (LANs) – Organizations use LANs to enable them to share data (e.g. via email) and devices
(such as printers)

Wide area networks (WANs) - Used to connect LANs together, so that computer users in one location
can communicate with computer users in another location

Intranet - An internal, private network, contained within an organization, which is used to share
information among employees
Other Concepts

Firewall – It consist of a combination of hardware and software located between the company’s intranet (private
network) and the public network (Internet).

Cloud computing - Cloud computing is the practice of using a network of remote servers hosted on the internet to
store, manage, and process data, rather than a local server or a personal computer. Cloud computing allows on-
demand access to data.

Extranet - A collaborative network which uses internet technology to join organisations, for example to link
businesses with their suppliers. It acts as a private and secure extension of an Intranet.

Internet - A global system of interconnected networks carrying a vast array of information and resources

WiFi (wireless fidelity) - facilitates the mobile use of laptop computers and handheld devices

Data encryption - Encryption is a technique of disguising information to preserve its confidentiality It is a method
of scrambling the data in a message or file so that it is unintelligible unless it is unscrambled (or decrypted)
Direct data capture - Design of the data collection method
Points to consider:

• How to economize on the use of manpower


• How to prevent or detect errors in the source data
• How to achieve data capture at the lowest possible cost
• How to achieve input sufficiently quickly
• How data gets into the system

Input devices

Using a keyboard Using direct input of


the data
Methods of data capture

Optical Character Recognition (OCR) – used to insert financial data into a spreadsheet, or to scan articles
into a word processor

Optical Mark Recognition (OMR) – used to mark multiple-choice questions, to process student enrolment
forms or to process questionnaires

Magnetic Ink Character Recognition (MICR) - used mainly to clear bank cheques

Bar codes - used to check out items at supermarkets, to track stocks in a warehouse, to process the
borrowing and returning of books in a library or to track passenger luggage of an airline

Magnetic strip cards - used to withdraw money at ATMs and to pay goods by credit cards

Voice recognizer – a software that understands spoken commands


Privacy and security - Controls

General controls Application or program controls

Ensure that the organization has Performed automatically by the


overall control over its information system. It includes completeness
systems (for e.g.: Personnel checks, validity checks,
controls, access controls, computer identification and authorization
equipment controls, business checks, problem management
continuity planning) facilities
Potential Threats and their solutions

❖ Fire procedures ❖ Anti-virus software


❖ Insurance cover ❖ Formal security policy and procedures
❖ Choice of proper location ❖ Regular audits to check for unauthorized
❖ Physical environment software
❖ Back up procedures

❖ Firewall software
❖ Passwords and user names
❖ Formal security policy and
❖ Network design to cope with periods procedures
of high volumes ❖ Risk awareness training to
❖ Proper back up procedures employees
❖ Data encryption
Potential Threats and their solutions

Human resource risk (e.g. repetitive strain injury


(RSI), headaches and eye strain from computer
screens, tripping over loose wires)

❖ Data encryption ❖ Ergonomic design of Workstations


❖ Passwords and user names ❖ Anti-glare screens reduce eye strain
❖ Cables should be in ducts

Training to staff
Controls over processing and output

Controls over processing

Passwords and software audit trails so that it can be tracked what processing was carried out
No alteration to programmes without authorization and testing

Controls over output

Keeping password systems


Proper safeguards for sensitive printed output
Value – Ed, December 2020, PM Batch

THANK YOU

You might also like