SlideShare a Scribd company logo
1 of 24
INTRODUCTION TO INFORMATION SYSTEMS
UNIT III
Introduction to Information Systems: Definition, Concepts and Recognition of Information Systems
Information Systems and Society, Information Systems and Organization
Constraints and Limitations of Information System.
INFORMATION SYSTEM
 1. Information systems capture data from the organization (internal data) and its environment (external
data).
 2. They store the database items over an extensive period of time.
 3. When specific information is needed, the appropriate data items are manipulated as necessary, and
the user receives the resulting information.
 4. Depending on the type of information system, the information output may take the form a query
response, decision outcome, expert-system advice, transaction document, or a report.
INFORMATION SYSTEM
Quality information needs to possess several attributes. Notably, it has to be:
 1. Timely Available when needed and not outdated when made available
 2. Complete Includes all the user needs to know about the situation where the information will be used
 3. Concise Does not include elements unneeded by the user
 4. Relevant Has direct bearing on the situation
 5. Precise Offers quantitative information with a degree of exactness appropriate to the underlying data
 6. Form The level of detail, tabular versus graphic display, and quantitative versus qualitative form are
selected in accordance with the situation Internal and External Information
INFORMATION SYSTEM
Quality information needs to possess several attributes. Notably, it has to be:
 1. Timely Available when needed and not outdated when made available
 2. Complete Includes all the user needs to know about the situation where the information will be used
 3. Concise Does not include elements unneeded by the user
 4. Relevant Has direct bearing on the situation
 5. Precise Offers quantitative information with a degree of exactness appropriate to the underlying data
 6. Form The level of detail, tabular versus graphic display, and quantitative versus qualitative form are
selected in accordance with the situation Internal and External Information
COMPONENTS OF INFORMATION SYSTEMS
Information systems consist of the following general components:
 1. Hardware
 2. Software
 3. Databases
 4. Human resources
 5. Procedures
COMPONENTS OF INFORMATION SYSTEMS
Hardware
Multiple computer systems: microcomputers, minicomputers, mainframes, together with their peripherals.
Computer system components are: a central processor(s), memory hierarchy, input and output devices.
Computer processor: The central processor carries out the instructions of a program, translated into a
simple form.
Memories: Included in a computer system form a hierarchy. They range from the fast electronic units, such
as the main memory, to the slower secondary storage devices such as magnetic disks.
Moore's Law The increases in the number of transistors on chips correspond to the increase in the
microprocessor speed and memory capacity, and thus the growth of the processing power.
Downsizing In information systems, transferring some or all of the organization;s computing from
centralized processing on mainframes or minicomputers to systems built around networked
microcomputers (often in a client/server configuration).
COMPONENTS OF INFORMATION SYSTEMS
Software
Computer software falls into two classes: systems software and applications software.
Systems Software: Manage the resources of the computer system and simplifies programming. An
operating system is the principal system software. It manages all the resources of a computer system and
provides an interface through which the system's user can deploy these resources.
Application Software: Are programs that directly assist end users in doing their work. They are purchased as
ready-to-use packages. Applications software directly assists end users in doing their work.
COMPONENTS OF INFORMATION SYSTEMS
Databases
Databases are organized collections of interrelated data used by applications software. Databases are
managed by systems software known as database management systems (DBMS) and shared by multiple
applications
INFORMATION SYSTEMS FOR MANAGEMENT SUPPORT:
The objectives of the three levels of corporate management are:
 1. Operations Management: performed by supervisors of smaller work units concerned with planning
and control of short-term (typically, a week or six months) budgets and schedules.
 2. Tactical Management: performed by middle managers responsible for acquisition and allocation of
resources for projects according to tactical plans, set out for one or two years.
 3. Strategic Management: Carried out by top corporate executives and corporate boards responsible
for setting and monitoring long-term directions for the firm for three or more years into the future.
RECOGNITION OF INFORMATION SYSTEM
IMPACTS OF INFORMATION SYSTEMS
 Organizational impacts of information systems
 These systems provide support for business operations; for individual and group decision making; for new
product development; for relationships with customers, suppliers, and partners; for pursuit of competitive
advantage; and, in some cases, for the business model itself (e.g., Google).
 Information systems bring new options to the way companies interact and compete, the way organizations are
structured, and the way workplaces are designed. In general, use of Web-based information systems can
significantly lower the costs of communication among workers and firms and cost-effectively enhance the
coordination of supply chains or webs.
 The use of information systems has enabled new organizational structures. In particular, so-called virtual
organizations have emerged that do not rely on physical offices and standard organizational charts. Two notable
forms of virtual organizations are the network organization and the cluster organization.
IMPACTS OF INFORMATION SYSTEMS
 Information systems in the economy and society
 The development of the Web-based ecosystem, accompanied by the low cost of hardware and
telecommunications and the availability of open-source software, has led to a flowering of entrepreneurial activity
and the emergence to prominence and significant market value of numerous firms based on new business
models. Among the examples are electronic auction firms, search-engine firms, social network platforms, and
online game companies.
 As the use of information systems has become pervasive in advanced economies and societies at large, several
societal and ethical issues have moved into the forefront. The most important are issues of individual privacy,
property rights, universal access and free speech, information accuracy, and quality of life.
 Intellectual property, such as software, books, music, and movies, is protected, albeit imperfectly, by patents, trade
secrets, and copyrights. However, such intangible goods can be easily copied and transmitted electronically over
the Web for unlawful reproduction and use. Combinations of legal statutes and technological safeguards,
including antipiracy encryption and electronic watermarks, are in place, but much of the abuse prevention relies
on the ethics of the user.
 Consumers can use the Web for shopping, networking, and entertainment—but at the risk of contending with
spam (unsolicited e-mail), interception of credit card numbers, and attack by computer viruses.
IMPACTS OF INFORMATION SYSTEMS
 Social Impact of Information Systems
 This affects our society in two ways: On an individual basis it means that any person in possession of some kind of
a computer has the capacity to store every document they will ever need in a single compact machine. This
connotes that computer allows people to set up businesses and work from home on a scale never seen before,
not to mention taking the human progress a step beyond that of the printing press by removing the need forhand
writing for the first time in our history.
 . Another effect of information systems is the rise in computer games. This has caused serious worries over how
they affect those who use them, and especially their effects on youth. The debate still rages over whether the large
number of violent computer games available influences those who play to imitate such behavior, with a host of
scientific research being done on the issue. Yet almost worrying are the statistics which seem to be highly
addictive to the quality of such games - most notably internet based ones. In contrast many have begun to see
the potential computers held as a means of education, since, unlike other traditional forms of teaching tools,
computer game based learning has a propensity to entertain the student. Businesses and organizations are
already using computers as educational devices and technology development tools, especially in the field of
virtual reality games and more would still follow. Whatever one's feelings on the growth of these video games, in
both recreational and educational formats they are becoming ever more of a reality, for instance the United States
military uses one of such game as a recruitment device.
IMPACTS OF INFORMATION SYSTEMS
 . Another interesting and undeniable effect is the use of internet in the societies worldwide; in fact, it
could be said to connect and eliminate differences between geographically and culturally separated
societies.
 The technology field has been overtaken with other types of behavior that can affect anyone who uses
technology such as computer crime. Computer crime is another prevalent social impact of information
system in our society.
LIMITATIONS TO INFORMATION SYSTEMS
 Loss of the human element: information systems cannot present all kinds of information accurately.
 Thick information, which is rich in meaning and not quantifiable, is best suited to human analysis.
Example: employee evaluations need face-to-face communication to convey all information.
 Difficult installations: Information systems can be hard to develop. To avoid problems:
 list major organization goals.
 build support for the system with workers.
 create formal training programs.
 emphasize that face-to-face contact is important.
TYPES OF CONSTRAINTS
 Equipment: The way equipment is currently used limits the ability of the system to produce more
salable goods/services.
 People: Lack of skilled people limits the system. Mental models held by people can cause behavior that
becomes a constraint.
 Policy: A written or unwritten policy prevents the system from making more.
TYPES OF CONSTRAINTS
 The major constraints of a new Information System (IS) project development are Scope, Time and
Budget (Cost). These constraints are also known as project management triangle.
PROJECT SCOPE
 Project scope is the work that needs to be accomplished with the specified features and functions in a
project. We can also say that the project scope is the goals that need to be fulfilled in order to complete
a project. Without proper project scope, the development team can go out of the track and produce the
final deliverable that is not intended by their clients. This will result in loss of time, resource to the
company whom develops the application. On the other hand, the cost will increase since they have to
recode the developed system to suit the client’s needs
TIME
 Time is a period measurement that is used in project scheduling to estimate the project duration. The
time here can be either in days, weeks, months or years depending on the complexity and size of the
project. The project duration should be carefully planned and enough time should be provided for each
stages. Without allocating proper time amount the system produced may not be at an optimum quality.
This is because the development team might need to rush to finish the project within the time frame
which results in poorly designed and coded system which is prone to error and bugs.
BUDGET (COST)
 Budget (Cost) provides a forecast of revenues and expenditures in the project. By evaluating budget, the
profit and loss can also be estimated. This will help to decide whether to undertake the project or not.
The budget estimation is a difficult task since it involves analysing skills and numerical values. Without
proper budget plan, the development can exceed or over spend which will lead into higher production
cost and lower profit margin.
THE MANAGEMENT LEVELS AND ITS CHARACTERISTICS
 1. Top level / Administrative level
 2. Middle level / Executory
 3. Low level / Supervisory / Operative / First-line managers
THE MANAGEMENT LEVELS AND ITS CHARACTERISTICS
1. Top Level of Management
It consists of board of directors, chief executive or managing director. The top management is the ultimate
source of authority and it manages goals and policies for an enterprise. It devotes more time on planning
and coordinating functions. The role of the top management can be summarized as follows -
 a. Top management lays down the objectives and broad policies of the enterprise.
 b. It issues necessary instructions for preparation of department budgets, procedures, schedules etc.
 c. It prepares strategic plans & policies for the enterprise.
 d. It appoints the executive for middle level i.e. departmental managers.
 e. It controls & coordinates the activities of all the departments.
 f. It is also responsible for maintaining a contact with the outside world.
 g. It provides guidance and direction.
 h. The top management is also responsible towards the shareholders for the performance of the
enterprise.
THE MANAGEMENT LEVELS AND ITS CHARACTERISTICS
2. Middle Level of Management
The branch managers and departmental managers constitute middle level. They are responsible to the top
management for the functioning of their department. They devote more time to organizational and directional
functions. In small organization, there is only one layer of middle level of management but in big enterprises,
there may be senior and junior middle level management. Their role can be emphasized as -
a. They execute the plans of the organization in accordance with the policies and directives of the top
management.
b. They make plans for the sub-units of the organization.
c. They participate in employment & training of lower level management.
d. They interpret and explain policies from top level management to lower level.
e. They are responsible for coordinating the activities within the division or department.
f. It also sends important reports and other important data to top level management.
g. They evaluate performance of junior managers.
h. They are also responsible for inspiring lower level managers towards better performance.
THE MANAGEMENT LEVELS AND ITS CHARACTERISTICS
3. Lower Level of Management
Lower level is also known as supervisory / operative level of management. It consists of supervisors, foreman, section officers, superintendent etc.
According to R.C. Davis, “Supervisory management refers to those executives whose work has to be largely with personal oversight and direction of
operative employees”. In other words, they are concerned with direction and controlling function of management. Their activities include -
a. Assigning of jobs and tasks to various workers.
b. They guide and instruct workers for day to day activities.
c. They are responsible for the quality as well as quantity of production.
d. They are also entrusted with the responsibility of maintaining good relation in the organization.
e. They communicate workers problems, suggestions, and recommendatory appeals etc to the higher level and higher level goals and objectives
to the workers.
f. They help to solve the grievances of the workers.
g. They supervise & guide the sub-ordinates.
h. They are responsible for providing training to the workers.
i. They arrange necessary materials, machines, tools etc for getting the things done.
j. They prepare periodical reports about the performance of the workers.
k. They ensure discipline in the enterprise.
l. They motivate workers.
m. They are the image builders of the enterprise because they are in direct contact with the workers.

More Related Content

What's hot

Information system infrastructure
Information system infrastructureInformation system infrastructure
Information system infrastructureAssignmentPartner
 
The role of computer in modern business
The role of computer in modern businessThe role of computer in modern business
The role of computer in modern businessTuhin Parves
 
Information Management chapter 2
Information Management chapter 2Information Management chapter 2
Information Management chapter 2KaleemSarwar2
 
Importance of Information Technology - MIT School of Distance Education
Importance of Information Technology - MIT School of Distance Education  Importance of Information Technology - MIT School of Distance Education
Importance of Information Technology - MIT School of Distance Education MIT School
 
It seminar isr
It seminar isrIt seminar isr
It seminar isrASNA p.a
 
Understand issues related to use of information system
Understand issues related to use of information systemUnderstand issues related to use of information system
Understand issues related to use of information systemRajesh Khadka
 
development of information system
development of information systemdevelopment of information system
development of information systemsowmya cn
 
3 softwares and elements of information system
3 softwares and elements of information system3 softwares and elements of information system
3 softwares and elements of information systemMrQaz996
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issuesRownel Cerezo Gagani
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
Lesson 1
Lesson 1Lesson 1
Lesson 107Deeps
 

What's hot (20)

Information system infrastructure
Information system infrastructureInformation system infrastructure
Information system infrastructure
 
E- business how businesses use information systems
E- business how businesses use information systemsE- business how businesses use information systems
E- business how businesses use information systems
 
Information system
Information systemInformation system
Information system
 
The role of computer in modern business
The role of computer in modern businessThe role of computer in modern business
The role of computer in modern business
 
Information systems
Information systemsInformation systems
Information systems
 
Information Management chapter 2
Information Management chapter 2Information Management chapter 2
Information Management chapter 2
 
Importance of Information Technology - MIT School of Distance Education
Importance of Information Technology - MIT School of Distance Education  Importance of Information Technology - MIT School of Distance Education
Importance of Information Technology - MIT School of Distance Education
 
Chapter 4 MIS
Chapter 4 MISChapter 4 MIS
Chapter 4 MIS
 
It seminar isr
It seminar isrIt seminar isr
It seminar isr
 
Office automation sysmtems
Office automation sysmtemsOffice automation sysmtems
Office automation sysmtems
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Understand issues related to use of information system
Understand issues related to use of information systemUnderstand issues related to use of information system
Understand issues related to use of information system
 
development of information system
development of information systemdevelopment of information system
development of information system
 
3 softwares and elements of information system
3 softwares and elements of information system3 softwares and elements of information system
3 softwares and elements of information system
 
Acc 310
Acc 310Acc 310
Acc 310
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
 
Mis model
Mis modelMis model
Mis model
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 

Similar to Unit iii FMIS

MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEMShehanperamuna
 
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILUREINFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILURELibcorpio
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxsherni1
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxdeanmtaylor1545
 
information of system technology
information of system technologyinformation of system technology
information of system technologybilal anjum
 
Navigating the Digital Nexus.docx
Navigating the Digital Nexus.docxNavigating the Digital Nexus.docx
Navigating the Digital Nexus.docxgreendigital
 
ICT in the Context of global communication
ICT in the  Context of global communicationICT in the  Context of global communication
ICT in the Context of global communicationKAYJOANNELIWANAGAN
 
Autonomic Computing: Vision or Reality
Autonomic Computing: Vision or RealityAutonomic Computing: Vision or Reality
Autonomic Computing: Vision or RealityIvo Neskovic
 
Information Technology, The Internet, and You
Information Technology, The Internet, and YouInformation Technology, The Internet, and You
Information Technology, The Internet, and YouAjboyDiog
 
Tugas bahasa inggris
Tugas bahasa inggrisTugas bahasa inggris
Tugas bahasa inggrisKevinLimsky
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
 
Management Information System(UNIT 1).pptx
Management Information System(UNIT 1).pptxManagement Information System(UNIT 1).pptx
Management Information System(UNIT 1).pptxSURBHI SAROHA
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)ChristopherAntonius
 

Similar to Unit iii FMIS (20)

MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
 
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILUREINFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docx
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docx
 
information of system technology
information of system technologyinformation of system technology
information of system technology
 
Navigating the Digital Nexus.docx
Navigating the Digital Nexus.docxNavigating the Digital Nexus.docx
Navigating the Digital Nexus.docx
 
5517
55175517
5517
 
ICT in the Context of global communication
ICT in the  Context of global communicationICT in the  Context of global communication
ICT in the Context of global communication
 
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATIONHOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
 
Mis lecture 3
Mis lecture 3Mis lecture 3
Mis lecture 3
 
Management Information Systems MGMT205
Management Information Systems MGMT205Management Information Systems MGMT205
Management Information Systems MGMT205
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 
Hightech
Hightech Hightech
Hightech
 
Autonomic Computing: Vision or Reality
Autonomic Computing: Vision or RealityAutonomic Computing: Vision or Reality
Autonomic Computing: Vision or Reality
 
Information Technology, The Internet, and You
Information Technology, The Internet, and YouInformation Technology, The Internet, and You
Information Technology, The Internet, and You
 
Tugas bahasa inggris
Tugas bahasa inggrisTugas bahasa inggris
Tugas bahasa inggris
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
Case study no 2
Case study no 2Case study no 2
Case study no 2
 
Management Information System(UNIT 1).pptx
Management Information System(UNIT 1).pptxManagement Information System(UNIT 1).pptx
Management Information System(UNIT 1).pptx
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
 

More from Arnav Chowdhury

Startup Funding and Strategies for Future
Startup Funding and Strategies for FutureStartup Funding and Strategies for Future
Startup Funding and Strategies for FutureArnav Chowdhury
 
Marketing Management Introduction.pptx
Marketing Management Introduction.pptxMarketing Management Introduction.pptx
Marketing Management Introduction.pptxArnav Chowdhury
 
Marketing Management Product.pptx
Marketing Management Product.pptxMarketing Management Product.pptx
Marketing Management Product.pptxArnav Chowdhury
 
Institutional Support to Entrepreneurship
Institutional Support to EntrepreneurshipInstitutional Support to Entrepreneurship
Institutional Support to EntrepreneurshipArnav Chowdhury
 
New Venture Expansion and Exit Strategies
New Venture Expansion and Exit StrategiesNew Venture Expansion and Exit Strategies
New Venture Expansion and Exit StrategiesArnav Chowdhury
 
Creating a Business Plan
Creating a Business PlanCreating a Business Plan
Creating a Business PlanArnav Chowdhury
 
Business Research Methodology ( Data Collection)
Business Research Methodology ( Data Collection)Business Research Methodology ( Data Collection)
Business Research Methodology ( Data Collection)Arnav Chowdhury
 
Business Research Methods (Introduction)
Business Research Methods (Introduction)Business Research Methods (Introduction)
Business Research Methods (Introduction)Arnav Chowdhury
 
Planning and organizing Entrepreneurial Venture
Planning and organizing Entrepreneurial VenturePlanning and organizing Entrepreneurial Venture
Planning and organizing Entrepreneurial VentureArnav Chowdhury
 
Fundamentals of Entrepreneurship
Fundamentals of EntrepreneurshipFundamentals of Entrepreneurship
Fundamentals of EntrepreneurshipArnav Chowdhury
 
Unit v: Cyber Safety Mechanism
Unit v: Cyber Safety MechanismUnit v: Cyber Safety Mechanism
Unit v: Cyber Safety MechanismArnav Chowdhury
 
UNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement StrategiesUNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement StrategiesArnav Chowdhury
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesArnav Chowdhury
 
Information Technology and Modern Gadgets
Information Technology and Modern GadgetsInformation Technology and Modern Gadgets
Information Technology and Modern GadgetsArnav Chowdhury
 
Unit v: Device Management
Unit v: Device ManagementUnit v: Device Management
Unit v: Device ManagementArnav Chowdhury
 

More from Arnav Chowdhury (20)

Startup Funding and Strategies for Future
Startup Funding and Strategies for FutureStartup Funding and Strategies for Future
Startup Funding and Strategies for Future
 
Marketing Management Introduction.pptx
Marketing Management Introduction.pptxMarketing Management Introduction.pptx
Marketing Management Introduction.pptx
 
Marketing Management Product.pptx
Marketing Management Product.pptxMarketing Management Product.pptx
Marketing Management Product.pptx
 
Institutional Support to Entrepreneurship
Institutional Support to EntrepreneurshipInstitutional Support to Entrepreneurship
Institutional Support to Entrepreneurship
 
New Venture Expansion and Exit Strategies
New Venture Expansion and Exit StrategiesNew Venture Expansion and Exit Strategies
New Venture Expansion and Exit Strategies
 
Creating a Business Plan
Creating a Business PlanCreating a Business Plan
Creating a Business Plan
 
Business Research Methodology ( Data Collection)
Business Research Methodology ( Data Collection)Business Research Methodology ( Data Collection)
Business Research Methodology ( Data Collection)
 
Business Research Methods (Introduction)
Business Research Methods (Introduction)Business Research Methods (Introduction)
Business Research Methods (Introduction)
 
Planning and organizing Entrepreneurial Venture
Planning and organizing Entrepreneurial VenturePlanning and organizing Entrepreneurial Venture
Planning and organizing Entrepreneurial Venture
 
Fundamentals of Entrepreneurship
Fundamentals of EntrepreneurshipFundamentals of Entrepreneurship
Fundamentals of Entrepreneurship
 
ICT tools in Education
ICT tools in EducationICT tools in Education
ICT tools in Education
 
Unit v: Cyber Safety Mechanism
Unit v: Cyber Safety MechanismUnit v: Cyber Safety Mechanism
Unit v: Cyber Safety Mechanism
 
UNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement StrategiesUNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement Strategies
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Information Technology and Modern Gadgets
Information Technology and Modern GadgetsInformation Technology and Modern Gadgets
Information Technology and Modern Gadgets
 
Unit ii FMIS
Unit ii FMISUnit ii FMIS
Unit ii FMIS
 
Unit iv graphics
Unit iv  graphicsUnit iv  graphics
Unit iv graphics
 
Unit v: Device Management
Unit v: Device ManagementUnit v: Device Management
Unit v: Device Management
 
Unit iii: Audio
Unit iii: AudioUnit iii: Audio
Unit iii: Audio
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Unit iii FMIS

  • 1. INTRODUCTION TO INFORMATION SYSTEMS UNIT III Introduction to Information Systems: Definition, Concepts and Recognition of Information Systems Information Systems and Society, Information Systems and Organization Constraints and Limitations of Information System.
  • 2. INFORMATION SYSTEM  1. Information systems capture data from the organization (internal data) and its environment (external data).  2. They store the database items over an extensive period of time.  3. When specific information is needed, the appropriate data items are manipulated as necessary, and the user receives the resulting information.  4. Depending on the type of information system, the information output may take the form a query response, decision outcome, expert-system advice, transaction document, or a report.
  • 3. INFORMATION SYSTEM Quality information needs to possess several attributes. Notably, it has to be:  1. Timely Available when needed and not outdated when made available  2. Complete Includes all the user needs to know about the situation where the information will be used  3. Concise Does not include elements unneeded by the user  4. Relevant Has direct bearing on the situation  5. Precise Offers quantitative information with a degree of exactness appropriate to the underlying data  6. Form The level of detail, tabular versus graphic display, and quantitative versus qualitative form are selected in accordance with the situation Internal and External Information
  • 4. INFORMATION SYSTEM Quality information needs to possess several attributes. Notably, it has to be:  1. Timely Available when needed and not outdated when made available  2. Complete Includes all the user needs to know about the situation where the information will be used  3. Concise Does not include elements unneeded by the user  4. Relevant Has direct bearing on the situation  5. Precise Offers quantitative information with a degree of exactness appropriate to the underlying data  6. Form The level of detail, tabular versus graphic display, and quantitative versus qualitative form are selected in accordance with the situation Internal and External Information
  • 5. COMPONENTS OF INFORMATION SYSTEMS Information systems consist of the following general components:  1. Hardware  2. Software  3. Databases  4. Human resources  5. Procedures
  • 6. COMPONENTS OF INFORMATION SYSTEMS Hardware Multiple computer systems: microcomputers, minicomputers, mainframes, together with their peripherals. Computer system components are: a central processor(s), memory hierarchy, input and output devices. Computer processor: The central processor carries out the instructions of a program, translated into a simple form. Memories: Included in a computer system form a hierarchy. They range from the fast electronic units, such as the main memory, to the slower secondary storage devices such as magnetic disks. Moore's Law The increases in the number of transistors on chips correspond to the increase in the microprocessor speed and memory capacity, and thus the growth of the processing power. Downsizing In information systems, transferring some or all of the organization;s computing from centralized processing on mainframes or minicomputers to systems built around networked microcomputers (often in a client/server configuration).
  • 7. COMPONENTS OF INFORMATION SYSTEMS Software Computer software falls into two classes: systems software and applications software. Systems Software: Manage the resources of the computer system and simplifies programming. An operating system is the principal system software. It manages all the resources of a computer system and provides an interface through which the system's user can deploy these resources. Application Software: Are programs that directly assist end users in doing their work. They are purchased as ready-to-use packages. Applications software directly assists end users in doing their work.
  • 8. COMPONENTS OF INFORMATION SYSTEMS Databases Databases are organized collections of interrelated data used by applications software. Databases are managed by systems software known as database management systems (DBMS) and shared by multiple applications
  • 9. INFORMATION SYSTEMS FOR MANAGEMENT SUPPORT: The objectives of the three levels of corporate management are:  1. Operations Management: performed by supervisors of smaller work units concerned with planning and control of short-term (typically, a week or six months) budgets and schedules.  2. Tactical Management: performed by middle managers responsible for acquisition and allocation of resources for projects according to tactical plans, set out for one or two years.  3. Strategic Management: Carried out by top corporate executives and corporate boards responsible for setting and monitoring long-term directions for the firm for three or more years into the future.
  • 11. IMPACTS OF INFORMATION SYSTEMS  Organizational impacts of information systems  These systems provide support for business operations; for individual and group decision making; for new product development; for relationships with customers, suppliers, and partners; for pursuit of competitive advantage; and, in some cases, for the business model itself (e.g., Google).  Information systems bring new options to the way companies interact and compete, the way organizations are structured, and the way workplaces are designed. In general, use of Web-based information systems can significantly lower the costs of communication among workers and firms and cost-effectively enhance the coordination of supply chains or webs.  The use of information systems has enabled new organizational structures. In particular, so-called virtual organizations have emerged that do not rely on physical offices and standard organizational charts. Two notable forms of virtual organizations are the network organization and the cluster organization.
  • 12. IMPACTS OF INFORMATION SYSTEMS  Information systems in the economy and society  The development of the Web-based ecosystem, accompanied by the low cost of hardware and telecommunications and the availability of open-source software, has led to a flowering of entrepreneurial activity and the emergence to prominence and significant market value of numerous firms based on new business models. Among the examples are electronic auction firms, search-engine firms, social network platforms, and online game companies.  As the use of information systems has become pervasive in advanced economies and societies at large, several societal and ethical issues have moved into the forefront. The most important are issues of individual privacy, property rights, universal access and free speech, information accuracy, and quality of life.  Intellectual property, such as software, books, music, and movies, is protected, albeit imperfectly, by patents, trade secrets, and copyrights. However, such intangible goods can be easily copied and transmitted electronically over the Web for unlawful reproduction and use. Combinations of legal statutes and technological safeguards, including antipiracy encryption and electronic watermarks, are in place, but much of the abuse prevention relies on the ethics of the user.  Consumers can use the Web for shopping, networking, and entertainment—but at the risk of contending with spam (unsolicited e-mail), interception of credit card numbers, and attack by computer viruses.
  • 13. IMPACTS OF INFORMATION SYSTEMS  Social Impact of Information Systems  This affects our society in two ways: On an individual basis it means that any person in possession of some kind of a computer has the capacity to store every document they will ever need in a single compact machine. This connotes that computer allows people to set up businesses and work from home on a scale never seen before, not to mention taking the human progress a step beyond that of the printing press by removing the need forhand writing for the first time in our history.  . Another effect of information systems is the rise in computer games. This has caused serious worries over how they affect those who use them, and especially their effects on youth. The debate still rages over whether the large number of violent computer games available influences those who play to imitate such behavior, with a host of scientific research being done on the issue. Yet almost worrying are the statistics which seem to be highly addictive to the quality of such games - most notably internet based ones. In contrast many have begun to see the potential computers held as a means of education, since, unlike other traditional forms of teaching tools, computer game based learning has a propensity to entertain the student. Businesses and organizations are already using computers as educational devices and technology development tools, especially in the field of virtual reality games and more would still follow. Whatever one's feelings on the growth of these video games, in both recreational and educational formats they are becoming ever more of a reality, for instance the United States military uses one of such game as a recruitment device.
  • 14. IMPACTS OF INFORMATION SYSTEMS  . Another interesting and undeniable effect is the use of internet in the societies worldwide; in fact, it could be said to connect and eliminate differences between geographically and culturally separated societies.  The technology field has been overtaken with other types of behavior that can affect anyone who uses technology such as computer crime. Computer crime is another prevalent social impact of information system in our society.
  • 15. LIMITATIONS TO INFORMATION SYSTEMS  Loss of the human element: information systems cannot present all kinds of information accurately.  Thick information, which is rich in meaning and not quantifiable, is best suited to human analysis. Example: employee evaluations need face-to-face communication to convey all information.  Difficult installations: Information systems can be hard to develop. To avoid problems:  list major organization goals.  build support for the system with workers.  create formal training programs.  emphasize that face-to-face contact is important.
  • 16. TYPES OF CONSTRAINTS  Equipment: The way equipment is currently used limits the ability of the system to produce more salable goods/services.  People: Lack of skilled people limits the system. Mental models held by people can cause behavior that becomes a constraint.  Policy: A written or unwritten policy prevents the system from making more.
  • 17. TYPES OF CONSTRAINTS  The major constraints of a new Information System (IS) project development are Scope, Time and Budget (Cost). These constraints are also known as project management triangle.
  • 18. PROJECT SCOPE  Project scope is the work that needs to be accomplished with the specified features and functions in a project. We can also say that the project scope is the goals that need to be fulfilled in order to complete a project. Without proper project scope, the development team can go out of the track and produce the final deliverable that is not intended by their clients. This will result in loss of time, resource to the company whom develops the application. On the other hand, the cost will increase since they have to recode the developed system to suit the client’s needs
  • 19. TIME  Time is a period measurement that is used in project scheduling to estimate the project duration. The time here can be either in days, weeks, months or years depending on the complexity and size of the project. The project duration should be carefully planned and enough time should be provided for each stages. Without allocating proper time amount the system produced may not be at an optimum quality. This is because the development team might need to rush to finish the project within the time frame which results in poorly designed and coded system which is prone to error and bugs.
  • 20. BUDGET (COST)  Budget (Cost) provides a forecast of revenues and expenditures in the project. By evaluating budget, the profit and loss can also be estimated. This will help to decide whether to undertake the project or not. The budget estimation is a difficult task since it involves analysing skills and numerical values. Without proper budget plan, the development can exceed or over spend which will lead into higher production cost and lower profit margin.
  • 21. THE MANAGEMENT LEVELS AND ITS CHARACTERISTICS  1. Top level / Administrative level  2. Middle level / Executory  3. Low level / Supervisory / Operative / First-line managers
  • 22. THE MANAGEMENT LEVELS AND ITS CHARACTERISTICS 1. Top Level of Management It consists of board of directors, chief executive or managing director. The top management is the ultimate source of authority and it manages goals and policies for an enterprise. It devotes more time on planning and coordinating functions. The role of the top management can be summarized as follows -  a. Top management lays down the objectives and broad policies of the enterprise.  b. It issues necessary instructions for preparation of department budgets, procedures, schedules etc.  c. It prepares strategic plans & policies for the enterprise.  d. It appoints the executive for middle level i.e. departmental managers.  e. It controls & coordinates the activities of all the departments.  f. It is also responsible for maintaining a contact with the outside world.  g. It provides guidance and direction.  h. The top management is also responsible towards the shareholders for the performance of the enterprise.
  • 23. THE MANAGEMENT LEVELS AND ITS CHARACTERISTICS 2. Middle Level of Management The branch managers and departmental managers constitute middle level. They are responsible to the top management for the functioning of their department. They devote more time to organizational and directional functions. In small organization, there is only one layer of middle level of management but in big enterprises, there may be senior and junior middle level management. Their role can be emphasized as - a. They execute the plans of the organization in accordance with the policies and directives of the top management. b. They make plans for the sub-units of the organization. c. They participate in employment & training of lower level management. d. They interpret and explain policies from top level management to lower level. e. They are responsible for coordinating the activities within the division or department. f. It also sends important reports and other important data to top level management. g. They evaluate performance of junior managers. h. They are also responsible for inspiring lower level managers towards better performance.
  • 24. THE MANAGEMENT LEVELS AND ITS CHARACTERISTICS 3. Lower Level of Management Lower level is also known as supervisory / operative level of management. It consists of supervisors, foreman, section officers, superintendent etc. According to R.C. Davis, “Supervisory management refers to those executives whose work has to be largely with personal oversight and direction of operative employees”. In other words, they are concerned with direction and controlling function of management. Their activities include - a. Assigning of jobs and tasks to various workers. b. They guide and instruct workers for day to day activities. c. They are responsible for the quality as well as quantity of production. d. They are also entrusted with the responsibility of maintaining good relation in the organization. e. They communicate workers problems, suggestions, and recommendatory appeals etc to the higher level and higher level goals and objectives to the workers. f. They help to solve the grievances of the workers. g. They supervise & guide the sub-ordinates. h. They are responsible for providing training to the workers. i. They arrange necessary materials, machines, tools etc for getting the things done. j. They prepare periodical reports about the performance of the workers. k. They ensure discipline in the enterprise. l. They motivate workers. m. They are the image builders of the enterprise because they are in direct contact with the workers.