MIS Lecture Notes
MIS Lecture Notes
Management: Management is the art of getting things done through and with the people in
formally organised groups. Every business unit has some objectives of its own. These objectives
can be achieved with the coordinated efforts of several personnel. The works of a few persons
are properly coordinated to achieve the objectives through the process of management.
Management is a vital aspect of the economic life of man, which is an organised group activity.
It is considered as the indispensable institution in the modern social organisation marked by
scientific thought and technological innovations.
A manager is thus someone who defines, plans, guides, helps, and assesses the work of others.
The following mentioned management functions will involve creative problem solving.
Business Processes: A business process is a series of tasks that are completed in order to
achieve a specific goal for a business. Business processes can be simple or complex, and they
can involve one or more departments within an organization. Examples of business processes
include order processing, inventory management, and customer service.
Business processes and information systems are closely related. Information systems are
designed to support and enhance business processes. They provide tools and technologies to
automate routine tasks, improve operational efficiency, and support decision-making. Business
processes, on the other hand, provide the context and purpose for information systems. They
define the goals and objectives that information systems are designed to achieve.
1. Transaction Processing System (TPS): TPS is a type of MIS that supports the operational level
of an organization. It is used to process and record transactions, such as sales, payments, and
inventory updates. TPS is designed to handle large volumes of data and ensure data accuracy
and consistency. An example of TPS is a point of sale system used in a retail store.
2. Management Information System (MIS): MIS is a type of MIS that supports the middle level
of an organization. It is used to provide managers with information to monitor and control the
organization's performance. MIS analyzes data from TPS and other sources to produce reports
and summaries that managers use to make decisions. An example of MIS is a sales report that
shows the sales performance of a product over a period of time.
3. Decision Support System (DSS): DSS is a type of MIS that supports the upper level of an
organization. It is used to provide managers with tools to make strategic decisions. DSS uses
4. Office Automation System (OAS): OAS is a type of MIS that supports the knowledge level of
an organization. It is used to automate routine office tasks, such as email, word processing, and
scheduling. OAS improves productivity and efficiency by reducing manual work. An example of
OAS is a document management system that stores and organizes documents electronically.
5. Knowledge Work System (KWS): KWS is a type of MIS that supports the knowledge level of
an organization. It is used to support the work of professionals, such as engineers, scientists,
and designers. KWS provides tools and technologies to support knowledge creation, sharing,
and collaboration. An example of KWS is a computer-aided design (CAD) system used by
engineers to design products.
6. Executive Support System (ESS): ESS is a type of MIS that supports the strategic level of an
organization. It is used to provide executives with tools to make strategic decisions. ESS
provides high-level summaries and visualizations of data to support decision-making. An
example of ESS is a dashboard that shows key performance indicators (KPIs) of the organization.
Characteristics of MIS
Systems Approach: The information system follows a systems approach. Systems approach
means taking a comprehensive view or a complete look at the interlocking sub-systems
that operate within an organisation.
Management Oriented: Management oriented characteristic of MIS implies that the
management actively directs the system development efforts. For planning of MIS, top-
down approach should be followed. Top down approach suggests that the system
development starts from the determination of management’s needs and overall business
objective. To ensure that the implementation of systems polices meet the specification of
the system, continued review and participation of the manager is necessary.
Need Based: MIS design should be as per the information needs of managers at different
levels.
Exception Based: MIS should be developed on the exception based also, which means that
in an abnormal situation, there should be immediate reporting about the exceptional
situation to the decision –makers at the required level.
Future Oriented: MIS should not merely provide past of historical information; rather it
should provide information, on the basis of future projections on the actions to be
initiated.
2. Software: Software refers to the programs and applications that run on the hardware. It
includes operating systems, database management systems, enterprise resource planning (ERP)
software, and other specialized applications. Software enables the manipulation, analysis, and
presentation of data. For example, a customer relationship management (CRM) software is a
software component that helps manage customer data and interactions.
3. Data: Data is the raw facts and figures that are collected and processed by an information
system. It can be structured or unstructured and can come from various sources, such as
databases, documents, sensors, and external systems. Data is the foundation for generating
meaningful information. For example, customer sales data and inventory levels are examples of
data used in an information system.
4. People: People are the users, stakeholders, and personnel involved in the management and
use of the information system. They include system administrators, analysts, managers, and
end-users. People interact with the system, input data, make decisions, and use the
information generated by the system. For example, employees who input sales data into the
system or managers who use reports generated by the system are people components of MIS.
2. Needs Analysis: This stage involves determining the requirements of the MIS in the context
of the organization. It should keep pace with changes in the environment, changing demands of
the customers, and growing competition. For example, a company may determine that it needs
a new inventory management system that can handle larger volumes of data and provide real-
time updates.
3. Design: This stage involves designing the MIS based on the requirements identified in the
previous stage. It includes designing the hardware, software, and network components of the
system. For example, a company may design a new inventory management system that
includes a cloud-based database, a user-friendly interface, and real-time reporting.
4. Implementation: This stage involves installing and configuring the hardware and software
components of the MIS. It also involves training employees on how to use the system. For
example, a company may install the new inventory management system and provide training to
employees on how to use it.
5. Testing: This stage involves testing the MIS to ensure that it meets the requirements and
functions as intended. It includes testing the system for accuracy, reliability, and security. For
example, a company may test the new inventory management system to ensure that it
accurately tracks inventory levels and provides real-time updates.
Here are the most popular MIS tools used in an organization with relevant examples:
1. Enterprise Resource Planning (ERP) Systems:
- ERP systems are integrated software applications that automate and manage business
processes across an organization.
a) Proprietary Software
Proprietary software is software that is owned by an individual or a company (usually the one
that developed it). There are almost always major restrictions on its use, and its source code is
almost always kept secret (source code is the version of the software as it is originally written
by a developer in a plain text, readable in plane or alphanumeric characters). Sometimes these
are called “closed code software” which means, the source code is not for open access. Most
software is covered by copyright which, along with contract law, patents, and trade secrets,
provides legal basis for its owner to establish exclusive rights.
Open source software licenses promote collaboration and sharing because they allow other
people to make modifications to source code and incorporate those changes into their own
projects. Some open source licenses ensure that anyone who alters and then shares a program
with others must also share that program's source code without charging a licensing fee for it.
c) Shareware software
These softwares are generally downloaded from the Internet, which can be freely used and
distributed. However, it does require that if users would like to continue using it, they pay the
developer a fee. This is nearly always done by means of a credit card transfer across the
Internet. When payment is received, users get a serial number with which they can continue to
use the software. Shareware is not a totally free software, but you usually get a certain days
trial depending on the software or the company. After you have passed those days the software
expires and works no more. If the user would like to continue using that software, they must
pay a certain fee to get the original product. Shareware is not free software, or even semi free.
There are two reasons it is not free:
i. For most shareware, source code is not available; thus, you cannot modify the program at
all.
ii. Shareware does not come with permission to make a copy and install it without paying a
license fee.
d) Freeware
Freeware is software which can be freely copied and distributed. Usually there are certain
restrictions such as it may not be resold, or its source should be acknowledged. Examples of
freeware include PDF edit (Software that allows you to edit PDF files), YouTube Downloader
(Downloads & converts videos from YouTube), 3.GOM media player (Play video files of multiple
video formats).
i. The freedom to run the program as you wish for any purpose.
ii. The freedom to study how the program works and change it so that it does your
computing as you wish. Access to the source code is a precondition for this.
iii. The freedom to redistribute copies so you can help your neighbour.
iv. The freedom to distribute copies of your modified versions to others. By doing this you
can give the whole community a chance to benefit from your changes. Access to the
source code is a precondition for this.
INFORMATION SECURITY IN MANAGEMENT INFORMATION SYSTEMS
Information security in Management Information Systems (MIS) refers to the protection of
sensitive data and information assets from unauthorized access, use, disclosure, disruption,
modification, or destruction. Here are the details of information security in MIS with examples:
An effective ISMS, information security policy, information security measures, and addressing
information security challenges are crucial for ensuring information security in MIS.
1. Data Analytics and Business Intelligence: The ability to collect, analyze, and derive insights
from large volumes of data is a significant trend in MIS. Data analytics and business intelligence
tools allow organizations to make data-driven decisions, identify patterns, and gain valuable
insights into customer behavior, market trends, and operational efficiency.
Example: Companies using data mining tools to collect information on consumer purchases and
economic trends to translate it into goals and directions for future business operations.
2. Artificial Intelligence (AI) and Machine Learning (ML): AI and ML technologies are
increasingly being integrated into MIS to automate processes, improve decision-making, and
enhance customer experiences. AI-powered chatbots, predictive analytics, and
recommendation systems are examples of how AI and ML are transforming MIS.
Example: Implementing AI algorithms to analyze customer data and provide personalized
product recommendations.
4. Internet of Things (IoT): The IoT involves connecting devices and sensors to gather real-time
data, enabling organizations to monitor and control various processes. MIS leverages IoT data
to optimize operations, improve efficiency, and enable predictive maintenance.
Example: Using IoT sensors to monitor equipment performance and automatically trigger
maintenance requests when necessary.
5. Cybersecurity and Data Privacy: With the increasing threat of cyberattacks and data
breaches, organizations are prioritizing cybersecurity and data privacy in their MIS. This
includes implementing robust security measures, encryption, and compliance with data
protection regulations.
Example: Enhancing network security with advanced firewalls, intrusion detection systems, and
encryption protocols.
6. Mobile and Remote Access: The ability to access MIS applications and data remotely through
mobile devices is gaining importance. Mobile MIS applications enable employees to access
information on the go, collaborate, and make informed decisions regardless of their location.
Example: Using mobile MIS apps to track sales performance, access real-time inventory data,
and communicate with team members.
These emerging trends in MIS are shaping the way organizations collect, analyze, and utilize
information to gain a competitive edge, improve decision-making, and enhance operational
efficiency.
The Internet can be defined as a network of computers using standard protocols for sharing of
data. It binds computers running on different platforms into a Web to access information by
using a standard client programme, such as Web Browsers like Internet Explorer, Chrome,
Mozilla Firefox, Netscape and so on. The use of accessing information through Web Browsers
has become so popular over the last few years that an increasing number of Web-based
software programmes are being developed throughout the world. Almost all the software
producers such as Microsoft, SUN etc. are now designing their services, which could be easily
accessed through Web Browsers. The popularity of Web Browsers has also given birth to the
development of Intranets and Extranets. The Intranets and Extranets use Internet protocols and
Typically, larger organisations allow users within their intranet to access the public Internet
through firewall servers that could screen messages in both directions so that company security
is maintained. When part of an intranet is made accessible to its staff (working in branch
offices), customers, partners, suppliers, or others outside the organisation, that part becomes
part of an extranet. A firewall is a computer or several computers that sit between your
network and the greater Internet. Using filtering and specialised routing, as well as rules you
decide upon, firewalls keep out people who don't have permission to access your resources
internally. You, on the other hand, can access all the resources of the general Internet.
As intranet uses TCP/IP, HTTP, and other Internet protocols, it looks like a private version of the
Internet. With tunneling, companies can send private messages through the public network,
using the public network with special encryption/decryption and other security safeguards to
connect one part of their intranet to another. In some ways, the word "intranet" is a
portmanteau word, which logically combines the concepts in "internal internet between
An Extranet, or extended Intranet, can be defined as a private network of linking branch offices
or several cooperating organisations located outside the walls of any organisation. An Extranet
service uses existing Intranet interactive infrastructure, including standard servers, e-mail
clients and Web browsers. This makes Extranet far more economical than the creation and
maintenance of a proprietary network. It enables trading partners, suppliers and customers
with common interests to form a tight business relationship and a strong communication bond.
The Extranet can also be defined as “a network that links business partners to one another over
the Internet by tying together their corporate intranets”.
Extranets may be used to allow inventory database searches, for example, or to transmit
information on the status of an order. They are being used by businesses of all types such as
banks, airlines, railways, large corporate offices having several branches etc. An Extranet is a
private network that uses the Internet protocol and the public telecommunication system to
securely share part of an organisation's information or operations with its branches (located
within the same city or outside), partners, users, customers, suppliers or contacts. An extranet
can be viewed as part of an organisation's intranet that is extended to users outside the
organisation. An extranet requires security and privacy.
Advantages of Intranet
An increasing number of organisations throughout the world are now using almost all the
facilities/ provisions of Internet technology for internal communication. Access to internal
document collections, document management system, chat, file transferring, e-messaging and
video-conferencing are the popular usage of Intranet. Almost all the internal information of an
organisation such as newsletters, telephone directories, calendars, policy manuals, current
personnel lists, etc. are being made available through Intranets. The Intranets are becoming
quite popular due to the following reasons:
The interface is easy to use; it also encompasses access to multimedia formats such as
text, video, sound and graphical images.
A single interface to all formats of information using the Internet open standard
removes the requirement for an organisation's network to provide several dedicated
interfaces traditionally needed to interrogate proprietary systems such as databanks,
bibliographic information retrieval systems and management information systems. Also,
the user only needs to be familiar with one interface.
Concept of E-commerce:
- E-commerce involves the exchange of goods, services, funds, or data over electronic
networks, primarily the internet.
- It encompasses various activities such as online shopping, electronic banking, online auctions,
and digital content distribution.
- E-commerce can be conducted between businesses (B2B), businesses and consumers (B2C),
consumers and consumers (C2C), or consumers and businesses (C2B).
E-Commerce businesses may employ some or all the following:
Online shopping websites for retail sales direct to consumers.
Providing or participating in online marketplaces, which process third-party business-to-
consumer or consumer-to-consumer sales.
Business-to-business buying and selling.
Gathering and using demographic data through Web contacts and social media.
Business-to-business electronic data interchange.
Marketing to prospective and established customers by E-mail or fax (e.g., with
newsletters).
Engaging in the pretail for launching new products and services.
Pretail (also referred to as pre-retail, or pre-commerce) is a sub-category of E-Commerce and
online retail for introducing new products, services, and brands to market by pre-launching
online, sometimes as reservations in limited quantity before release, realisation, or commercial
Collaboration – the Web is a vast nexus, or network, of relationships among firms and
individuals. More or less formal collaborations are created or emerge on the Web to bring
together individuals engaged in knowledge work in a manner that limits the constraints of
space, time, national boundaries, and organisational affiliation.
Communication – as an interactive medium, the Web has given rise to a multiplicity of media
products. This universal medium has become a forum for self-expression (as in blogs) and self-
presentation. The rapidly growing M-Commerce enables connectivity in context, with location-
sensitive products and advertising. In communication domain, the Web also serves as a
distribution channel for digital products.
E-BUSINESS
E-business, or electronic business, refers to the use of the internet and other electronic means
to conduct business activities such as purchasing and selling goods and services, advertising,
and communicating with customers. Here is a detailed explanation of the concept, types,
advantages, and challenges of e-business:
Concept of E-business:
- E-business involves the use of electronic means to conduct business activities, including
buying and selling goods and services, advertising, and communicating with customers.
- It encompasses various activities such as online shopping, electronic banking, online auctions,
and digital content distribution.
- E-business can be conducted between businesses (B2B), businesses and consumers (B2C),
consumers and consumers (C2C), or consumers and businesses (C2B).
- Customer Trust: Building trust with customers is crucial in both E-commerce and E-business,
as customers need to feel confident in sharing their personal and financial information.