Your SlideShare is downloading. ×
0
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
MIS ppt 1
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

MIS ppt 1

3,192

Published on

Management Issues in MIS …

Management Issues in MIS

Published in: Business, Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,192
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1.  
  • 2. THE WORLD TRADE CENTER DISASTER WHO WAS PREPARED?
  • 3. WHY SYSTEMS ARE VULNERABLE ? <ul><li>When large amounts of data are stored in electronic form they vulnerable to many kinds of threats than when exist in manual form. </li></ul><ul><li>Advances in telecommunications and computer software have magnified these vulnerabilities. </li></ul>
  • 4. THREATS TO COMPUTERIZED INFORMATION SYSTEM <ul><li>Hardware Failure </li></ul><ul><li>Software Failure </li></ul><ul><li>Theft of Data, services, equipments </li></ul><ul><li>Fire </li></ul><ul><li>Electronic Problems </li></ul><ul><li>User Errors </li></ul><ul><li>Telecommunication Problems </li></ul>
  • 5. HACKERS AND COMPUTER VIRUSES <ul><li>Hacker – a person who gains unauthorised access to a computer network for profit, criminal mischief or personal pleasure. </li></ul><ul><li>Viruses – rogue software programs that are difficult to detect, which spread rapidly through computer system, destroying data and disrupting processing and memory status </li></ul>
  • 6. QUALITY <ul><li>“ Quality indicates the degree of excellence of a product or service” </li></ul><ul><li>Quality assurance </li></ul><ul><li>What Is Quality Assurance ? </li></ul>
  • 7. WHY QUALITY ASSURANCE <ul><li>Avoiding legal liability if software fails </li></ul><ul><li>Providing with due documentation, that the software was developed using the best practices techniques embodied in various standards </li></ul><ul><li>Convincing the users </li></ul><ul><li>Making software development more cost-effective </li></ul><ul><li>Being able to develop and deliver a good quality product </li></ul><ul><li>Taking the user/clientfrom customer satisfaction to customer delight. </li></ul>
  • 8. WHAT IS SOFTWARE <ul><li>Software is defined as a set of instruction </li></ul><ul><li>All instructions &amp; data are given as input in computer to cause it to function in any code </li></ul>
  • 9. SOFTWARE QUALITY <ul><li>Software quality is the inherent quality of a software to be used for a specified purpose as the software possesses certain features and characteristics and which enable it to be used for that purpose. </li></ul>
  • 10. MANAGEMENT ROLE IN SOFTWARE QUALITY ASSURANCE <ul><li>Establish &amp; maintain the requirement specifications. </li></ul><ul><li>Establish &amp; implement a process for developing a software. </li></ul><ul><li>Establish &amp; maintain an evaluation process </li></ul>
  • 11. ETHICAL &amp; SOCIAL DIMENSION <ul><ul><li>What is Ethics &amp; Ethical ? </li></ul></ul><ul><ul><li>Key Forces </li></ul></ul><ul><ul><li>Family Influences </li></ul></ul><ul><li>Peer Influences </li></ul><ul><li>Experiences </li></ul><ul><li>Values &amp; Morals </li></ul><ul><li>Situational Factors </li></ul>
  • 12. ETHICAL DIMENSIONS <ul><li>Obligation To Management. </li></ul><ul><li>Obligation To society. </li></ul><ul><li>Obligation To employer. </li></ul><ul><li>Obligation To Country. </li></ul>
  • 13. SOCIAL DIMENSIONS <ul><li>Favourable Dimensions. </li></ul><ul><li>Unfavourable Dimensions. </li></ul><ul><li>ETHICAL DILEMMAS </li></ul><ul><li>Criminal Hacking. </li></ul><ul><li>Unauthorised use of credit cards. </li></ul><ul><li>Privacy Encroachment. </li></ul>
  • 14. INTELLECTUAL PROPERTY RIGHTS AS RELATED TO I.T. SERVICES / PRODUCT <ul><li>Intellectual Property </li></ul><ul><li>We can define in two way- </li></ul><ul><li>The Colloquial Way </li></ul><ul><li>The Legal Way </li></ul>
  • 15. AREA OF INTELLECTUAL PROPERTY <ul><li>Copy rights </li></ul><ul><li>Rights in Performance </li></ul><ul><li>The law of Confidence </li></ul><ul><li>Patents </li></ul><ul><li>Design law </li></ul><ul><li>Trade Marks </li></ul><ul><li>Passing off/Trade Libel </li></ul>
  • 16. NEEDS FOR IPR <ul><li>The laws a very important stimulus to innovative and creative work, </li></ul><ul><li>These laws also provide an incentive for people to search for novel, and mostly better,ways of doing things, </li></ul><ul><li>These laws ensure that their creativity is rewarded. </li></ul>
  • 17. THE IPR SCENARIO AND VIOLATIONS IN I.T. SERVICES / PRODUCTS <ul><li>The World Piracy Study indicated a decline during the the period 1995 to 2000-piracy rate from 47% to 37%. </li></ul><ul><li>The dollar losses, due to piracy, amounted to U.S. $ 11.75 billion- during the year 2000, the Asia Pacific Region alon accounting for US $ 4 billion losses. </li></ul><ul><li>Vietnam,China, and Pakistan were among top 10 countries by Piracy Rate, Vietnam topping the list 97%piracy rate, China with 94%, and Pakistan had 83% Piracy Rate. </li></ul><ul><li>Piracy Rate for India was 63%. </li></ul>
  • 18. SOFTWARE PIRACY BY REGION, (1999,2000)
  • 19. SOFTWARE PIRACY DOLLAR LOSSESS BY REGION,2000 26% 25% 3% 3% 7% 36%
  • 20. HOW TO PREVENT THE IPR VIOLATIONS /INFRINGEMENTS ? <ul><li>An important/international agreement ,The Paris Convention fo Protection of Industrial Property has been signed by 96 countries. </li></ul><ul><li>The World Trade Agreement to be implemented by the WTO was signed in 1994 by 117 countries. </li></ul><ul><li>The World Intellectual Property Organisation (WIPO) has been set up and made functional. </li></ul><ul><li>The Internet Corporation for Assigned Names and Numbers (ICANN) ,in September 1999, adopted the uniform dispute name resolution policy. </li></ul>
  • 21. IPR PROTECTION IN INDIA <ul><li>The provisions of the IPR laws prevalent in India in the context of the dealings in Cyberspace and the Information Technology Act, 2002. </li></ul><ul><li>The Copyright Act,1957 ,and further amendment has been done in 1983. </li></ul>
  • 22. GLOBAL INFORMATION SYSTEMS <ul><li>GLOBALISATION – resultant geographical diversification. </li></ul><ul><li>Lowering of trade restriction (QRs / Non-QRs) </li></ul><ul><li>www : Promise of tomorrow’s information- based global economy. </li></ul><ul><li>Glocalisation. </li></ul>
  • 23. OPERATIONS IMPERATIVES <ul><li>Global Efficiency. </li></ul><ul><li>Global Responsiveness. </li></ul><ul><li>Transfer Of Learning. </li></ul><ul><li>Global Alliance. </li></ul>
  • 24. CONTRIBUTIONS <ul><li>“ STRATEGIC FIT” </li></ul><ul><li>ENABLERS. </li></ul><ul><li>BUILDING A SHARED VISION. </li></ul><ul><li>PRO- ACTIVE PLANNING. </li></ul><ul><li>CREDIBILITY. </li></ul><ul><li>SENSITIVITY. </li></ul>
  • 25. CONCLUSION <ul><li>No wonder then that management of most of the organisations have been paying special attention to computerisation and introduction of the Information System to acquire information – knowledge which has been a critical organisational resources. It is therefore IT Applications and Implementations have been playing a dominant role in management decisions for respective corporate organisations. </li></ul>
  • 26. &nbsp;

×