SlideShare a Scribd company logo
1 of 97
Foundation of Information
System
MIS
Data
ī‚´ Unit of information in raw or unorganized forms (such as alphabets, numbers, or
symbols) that refers to, or represent, conditions, ideas, or objects.
ī‚´ Raw facts are called data that represents object, idea, place and other things.
(Organization hold data for the purpose of applying it, or there would be no
reason to hold it).
ī‚´ E.G no of students in BBA 6th semester is Data. The attendance whereas is
information.
Data Life Cycle
ī‚´ Goes through four stages:
ī‚´ Data origination:
ī‚´ Generated from variety of source like day to day activities of transaction level of
management.
ī‚´ Includes Employee hiring, Ordering supplies, selling, payments
ī‚´ Processing and immediate Use:
ī‚´ Processed to get information to meet the immediate needs of the decision maker.
ī‚´ Processing technique like Statistical analysis, Classification, Categorization.
ī‚´ Use of Information technologies for support.
Continuedâ€Ļâ€Ļ
ī‚´ Ready access storage:
ī‚´ Data are stored on Secondary storage like disc or magnetic tape.
ī‚´ Allowed to use data when needed.
ī‚´ Sometimes a type of data can be used to determine another type of data.
ī‚´ E.g. sales data determine sales commission
ī‚´ Data Destruction:
ī‚´ Data that are no longer needed are identified routinely and removed from storage.
ī‚´ Retention of data for indefinite period is costly and unnecessary for most of the
enterprise.
Data Processing
ī‚´ Operations performed on a given set of data to extract the required information in an appropriate form such
as diagrams, reports, or tables. See also electronic data processing.
ī‚´ Data processing is, generally, "the collection and manipulation of items of data to
produce meaningful information.
ī‚´ Data processing may involve various processes, including:
ī‚´ Validation – Ensuring that supplied data is correct and relevant.
ī‚´ Sorting – "arranging items in some sequence and/or in different sets."
ī‚´ Summarization – reducing detail data to its main points.
ī‚´ Aggregation – combining multiple pieces of data.
ī‚´ Analysis – the "collection, organization, analysis, interpretation and presentation of data.".
ī‚´ Reporting – list detail or summary data or computed information.
ī‚´ Classification – separates data into various categories.
Data processing methods
ī‚´ Manual
ī‚´ Mechanical
ī‚´ Electronic
Types of data Processing
ī‚´ Batch Processing:
ī‚´ Known as serial, sequential, offline or stacked processing.
ī‚´ Different jobs of different users are stacked or queued in their receiving order and
when batch of jobs is completed, they are given for processing.
ī‚´ Lower processing cost per transaction.
ī‚´ Credit Card bills are transacted at the end of month, electricity and sales bills,
Stock bills
Continuedâ€Ļ
ī‚´ Online Processing:
ī‚´ Direct or random access processing. A job is processed at the same time it is
received.
ī‚´ Features rapid and random input of transaction and immediate and direct access
to record content when needed.
ī‚´ E.G. Bar code reading, E- commerce website
Continuedâ€Ļ.
ī‚´ Real time Processing:
ī‚´ This processing method is used when it is essential that the input request is dealt
with quickly enough so as to be able to control an output properly. The is called the
'latency'.
ī‚´ Designed to allow to use the data as they become available.
ī‚´ Receiving and processing of transaction is performed simultaneously and no delay
in processing of job.
ī‚´ Traffic lights, Heart rate monitoring, Aircraft control
Continued
ī‚´ Multi Processing and multi programming
ī‚´ Multiprocessing is the use of two or more central processing units (CPUs) within
a single computer system.
ī‚´ The main objective is to increase the throughout by distributing the processing
load.
ī‚´ Speeds up the processing of the job, improves the efficiency of peripherals, and if
a CPU break down others can take the JOB.
ī‚´ When two or more than two task are concurrently processed by CPU it is multi
programming.
ī‚´ CPU is not busy with only one program and doesn’t remain idle.
Continuedâ€Ļ
ī‚´ Time Sharing
ī‚´ Allows to use same CPU resources simultaneously by dividing CPU time to all the
user on the schedule basis.
ī‚´ Multiple users access same CPU through terminals.
ī‚´ Used by mainframes and mini computers.
ī‚´ E.G. Bank’s ATM
Case
ī‚´ Visit your library and account section of your college. List out the data processing
system and suggest the best processing types for these section.
Information
ī‚´ Collection of raw data that has been verified to be accurate and timely, is specific
and organized for a purpose is known as information.
ī‚´ In order to be of any commercial value, data must become information.
ī‚´ The primary purpose of information is to facilitate decision making, coordination
and control and planning.
ī‚´ We can capture data in information, and then move it about so that other people
can access it at different times.
Use of Information
ī‚´ Planning
ī‚´ Recording
ī‚´ Controlling
ī‚´ Measuring
ī‚´ Decision Making
Information System
ī‚´ Information system is a system that accepts interrelated data process them
logically and generate some meaningful information.
ī‚´ Modern IS uses computer based system like Input device, Processing device,
networking system, database application and output devices.
ī‚´ An information system is a set of electronic component that collect analyze and
disseminate data and information to meet an objective.
Characteristics of IS
ī‚´ Good information is that which is used and which creates values. Experience and
research shows that good information has numerous qualities.
īļ Availability/ Accessibility: Information should be easy to obtain and access. Eg.
Telephone directory, Internet, Centralized computer system.
īļ Accuracy: Information should be accurate enough for the use. 100% accurate
result is usually unrealistic and expensive to produce on time.
īļ Reliability/ Objectivity: Reliability deals with the truth of information or the
objectivity with which it is presented. One can only use information that is reliable.
Continuedâ€Ļâ€Ļ..
īļ Relevance/ Appropriateness: Information should be relevant to the purpose for
which it is required. It must be suitable. What is relevant to one manager may not
be relevant to another.
īļ Completeness: Information should contain all the information required by the user,
otherwise it may not be useful as the basis for making decision.
īļ Level of details/ Conciseness: Information should be in short enough form to allow
for its examination and use. There should be no extraneous information.
īļ Presentation: The presentation of information is important to the user. The
presentation should be visually attractive and convey the correct amount of detail.
Continuedâ€Ļâ€Ļâ€Ļ.
īļ Timing: Information should be on time for the purpose of that it is required.
Information received too late will be irrelevant.
īļ Value of information: The relatively important information for decision making can
increase or decrease value of an organization. The information should be available
on time, within cost and be legally obtained.
īļ Cost of information: Information which is available within the cost levels may vary
depending upon the situation. If the cost are too high to obtain information, an
organization may decide to take slightly less comprehensive information
elsewhere.
Need of IS in Business
ī‚´ Speed
ī‚´ Efficiency
ī‚´ Multi- tasking
ī‚´ Low Cost
ī‚´ Entrepreneurship
ī‚´ Process Improvement
ī‚´ Cost reduction
ī‚´ Communication
ī‚´ Decisions
ī‚´ Operations
Resources of IS
ī‚´ The main components are people, hardware, software, data and network
Human Resource (people)
ī‚´ Primary purpose of IS is to provide valuable information to manager and users
within and outside company.
ī‚´ People are required for the operation of all information system.
ī‚´ Users sometimes called as end user include employees, customer, vendors and
others who interact with information system.
ī‚´ External users include customers who track their orders on the company’s web
site, suppliers who use a customer system to plan their manufacturing schedule,
employee who login to company intranet from home to check mails.
ī‚´ Successful IS requires the effort of skilled professionals, such as system analyst,
programmers and IT managers.
Hardware
ī‚´ Hardware refers to the physical layer of the information system.
ī‚´ Hardware includes computers, networks, communications equipment, scanner,
digital capture devices and other technology- based infrastructure.
Software
ī‚´ It includes all the set of information processing instructions.
ī‚´ Software consists of system software with utilities and application software.
ī‚´ System software controls the computer and include the operating system, device
drivers and utilities that handle task such as data conversion, virus protection,
backup.
ī‚´ Either the hardware manufacturer provides the system software or the company
purchase it fro the vendor.
ī‚´ Application software consists of the program that supports users and enables
companies to carry out business functions.
Data
ī‚´ Data is a valuable organization resources.
ī‚´ The data resources must be managed effectively to benefit all end users in an
organization.
ī‚´ An information system transforms data into meaningful information.
Processes
ī‚´ Processes or procedure include the task that IT manager or staff performs.
ī‚´ Processes necessary to support a specific business model are described and
written documentation manuals and online reference materials.
Network resources
ī‚´ System that interconnects multiple user and system components for sharing the
resources is called networking.
ī‚´ Telecommunication network consists of computers, communication, processors
and other communication software.
ī‚´ Network resources include communication media like Twisted pair cable, Fiber
optic cable, Microwave, cellular, satellite and people , Hardware, software, people,
data.
Risk of IS
ī‚´ Risk is the potential harm that may arise from some current process or from some
future events.
ī‚´ Risk management is the process of understanding and responding to factor that
may lead to failure in the confidentiality, integrity and availability of Information
system.
ī‚´ A threat, in the context of computer security, refers to anything that has the
potential to cause serious harm to a computer system. A threat is something that
may or may not happen, but has the potential to cause serious damage. Threats
can lead to attacks on computer systems, networks and more.
List of threats
ī‚´ Accidental disclosure: The unauthorized or by chance release of classified,
personal or sensitive information which cause serious disaster in an organization.
ī‚´ Acts of nature: All type of natural occurrence that may damage or affect the
system/ application.
ī‚´ Alternation of software: An intentional modification, insertion, deletion of operating
system or application system programs weather by an authorized user or not.
ī‚´ Bandwidth usage: the accidental or intentional use of communication bandwidth for
other then intended purpose by used application, staff, outsiders.
Continuedâ€Ļ.
ī‚´ Electrical Interference: Interference or fluctuation may occur as the result of a
commercial power failure. This may cause denial of service to authorised user or a
modification of data.
ī‚´ Intentional Alteration of data: An intentional modification, insertion, deletion of data
weather by an authorized user or not.
ī‚´ System configuration error: error in initial installment and upgrade of hardware,
software, network and system. Occurs due to illegal version, piracy and corruption.
ī‚´ Telecommunication Interruption: Failure in telecommunication devices and link the
to cause interruption of data transfer.
Vulnerability
ī‚´ A flaw or weakness in system security procedures, design, implementation or
internal controls that could be exercised and result in security breach or violation of
the system’s security policy.
ī‚´ Vulnerability can be a flaw or weakness in any aspect of the system.
Risk Management
ī‚´ The identification, analysis, assessment, control and avoidance, minimization, or
elimination of unacceptable risk is known as risk management.
ī‚´ The risk management strategies are:
ī‚´ Mitigation
ī‚´ Transference
ī‚´ Acceptance
ī‚´ Avoidance
Types of Information system
ī‚´ Every organization has different level, group of people having different interest and
specialist who demand information for their work.
ī‚´ Typical users are clerk as assistant, an officer, an executive or managers.
ī‚´ Each of them has specific task and role to play in the management of the
business.
ī‚´ Basically information system is categorized into two different types: Operational
support system and management support system which is further subdivided into
TPS, MIS. DSS, EIS, ES.
Transaction processing system
ī‚´ The primary purpose of TPS is to record, process, validate, and store transactions
that occurs in various functional areas of business.
ī‚´ When a department orders office supplies from the purchasing department internal
transaction occurs and when a customer order for a product external transaction
occurs.
ī‚´ TPS is the computerized system that that performs and records daily routine
transaction necessary to conduct of business.
ī‚´ These system includes order entry, inventory control, payrolls, accounts payable,
account’s revival, general ledger.
Continuedâ€Ļ
ī‚´ TPS plays vital role in supporting the operation of an organization.
ī‚´ TPS updates organizational files and databases and produce various information
products for internal and external use.
ī‚´ With TPS every single transaction is overseen and monitored so that the system
will recognize if entered data is authentic.
ī‚´ On organized TPS makes monitoring each and every transaction easier.
ī‚´ Transaction made will be accurate, secure, organized, recorded and authorized.
ī‚´ Disaster recovery system for data safety
Continued
ī‚´ With reliable TPS company will success in satisfying its customer and gain more
satisfied customer..
ī‚´ TPS examples range from ATM’s, airlines booking system, online ticketing and
many more transaction that include similar technology.
ī‚´ Any TPS goes through a five stage cycle:
1. DATA entry activities
ī‚´ 2. Transaction processing activities
ī‚´ 3. File and data processing
ī‚´ 4. Document and report generation
ī‚´ 5. Inquiry processing activities
Management Information system
ī‚´ MIS are designed for providing information to important personnel in the
organization.
ī‚´ Use already processed transaction data and generate information reports after
processing data. Example are personnel information system, marketing
information system, sales information system.
ī‚´ The output of MIS takes form of summary report and exception reports. A bank
manger gets summary report listing the total amount of deposits and withdraw
made.
ī‚´ Its main purpose is to draw attention of the middle management to any significant
difference between actual and performance and excepted performance.
Continuedâ€Ļâ€Ļâ€Ļ
ī‚´ MIS is an organized collection of people, procedure, software, databases and
devices used to provide routine information to the managers and decision makers.
ī‚´ Management use information may be done best in the context of the management
process, which is a cycle consisting following stages:
ī‚´ Planning
ī‚´ Organizing
ī‚´ Staffing
ī‚´ Coordinating
ī‚´ controlling
Decision Support System
ī‚´ Interactive, well integrated systems that provide managers with data, tools and
models to facilitate semi structured decisions or tactical decisions.
ī‚´ It provides the ability to what if analysis.
ī‚´ DSS are ideally suited for problems like location selection, identifying new products
to be marketed, scheduling personnel and analyzing the effect that price increases
for resources have on profits.
ī‚´ A DSS allows manager managers to perform goal seeking which specifies what
action a manager should take in order to accomplish a certain goal.
ī‚´ Individual or Group of individuals (GDSS) can also use them.
ī‚´ DSS provides Right now analysis than long term structured analysis of MIS.
DSS VS MIS
ī‚´ DSS and MIS differ in numerous ways.
ī‚´ DSS:
ī‚´ – DSS generally provide support for unstructured, or semi-structured decisions
(decisions that cannot be described in detail).
ī‚´ – DSS problems are often characterized by incomplete or uncertain knowledge, or
the use of qualitative data.
ī‚´ – DSS will often include modelling tools in them, where various alternative
scenarios can be modeled and compared.
ī‚´ – Investment decisions are an examples of those that might be supported by DSS
Continued
ī‚´ MIS:
ī‚´ MIS is generally more sophisticated reporting systems built on existing transaction
processing systems
ī‚´ Often used to support structured decision making (decisions that can be described
in detail before the decision is made)
ī‚´ Typically will also support tactical level management, but sometimes are used at
other levels
ī‚´ Examples of structured decisions supported by MIS might include deciding on
stock levels or the pricing of products
Executive Support System / Information
System
ī‚´ Strategic level of organization used by senior managers to make decisions.
ī‚´ ESS are forms of data retrieval systems that provides selected and summarized
information for senior executives, engaged in long- range planning, crisis
management and other strategic decisions.
ī‚´ It is user friendly interactive system having excellent menus and graphic
capabilities.
ī‚´ ESS works by exception reporting and drilling down to investigate the cause.
ī‚´ E.G. a director of an organization may be alerted that a particular department is
well over budget. The manager would then drill down the data by pursuing lower
and lower levels of data.
Continuedâ€Ļ
ī‚´ ESS includes Sales trend forecasting, budget forecasting and personnel planning.
ī‚´ ESS incorporates data from external data source such as new tax laws or
competitors as well as summarized information from internal MIS and DSS.
ī‚´ ESS addresses non- routine decisions requiring judgements, evaluation and
insight because there is no agreed- on procedure for arriving at a solution.
ī‚´ ESS provides output as desired by the end user in the form like customizable
graphical user interface, exception reports, trend analysis e.t.c.
Interrelationshipâ€Ļ.
ī‚´ Different types of system are closely linked to each other.
ī‚´ TPS are the major source of data for other system such as MIS and DSS.
ī‚´ TPS provides data required by office systems, KWS, MMS and DSS, although the
system may use external data.
ī‚´ Office system uses data not only from TPS but also from MIS.
ī‚´ DSS uses data from TPs, MIS, office system.
ī‚´ ESS obtain most of their internal data from MIS and DSS.
Difference DSS MIS AND EIS
Dimension DSS MIS EIS
Focus
Analysis, decision
Support
Information
processing
Status Access
Typical
UsersServed
Analysts,
professions,manag
ers (via
intermediaries)
Middle, lower
levels, sometime
senior executives
Senior Executives
Expediency
Impetus Effectiveness Efficiency
Application
Diversified Areas
where Managerial
Decisions are
made
Production control,
sales forecasts,
financial
analysis,human
resource
management
Environmental
scanning,
performanceevalu
ation, identifying
problems and
opportunities
Continued
Database(s) Special Corporate Special
Decision Support
Capabilities
Supports semi-
structured and
unstructured
decision making;
mainly ad-hoc, but
sometimes
repetitive
decisions
Direct or indirect
support,
mainlystructured
routine problems,
using standard
operations,
research and
other models
Indirect support,
mainly high level
andunstructured
decisions and
policies
Type
ofInformation
Information to
support specific
situations
Scheduled and
demand reports;
structured flow,
exception
reporting mainly
internal operations
News items,
external
information on
customers,
competitors and
the environment
Expert System
ī‚´ An expert system is a computer program that uses artificial
intelligence (AI) technologies to simulate the judgment and behavior of a human or
an organization that has expert knowledge and experience in a particular field.
ī‚´ An expert system is divided into two sub-systems: the inference engine and
the knowledge base.
ī‚´ The knowledge base represents facts and rules. The inference engine applies the
rules to the known facts to deduce new facts.
ī‚´ The knowledge base of expert systems contains both factual and heuristic
knowledge. Factual knowledge is that knowledge of the task domain that is widely
shared, typically found in textbooks or journals, and commonly agreed upon by
those knowledgeable in the particular field.
Continuedâ€Ļâ€Ļ.
ī‚´ Heuristic knowledge is the less rigorous, more experiential, more judgmental
knowledge of performance. In contrast to factual knowledge, heuristic knowledge
is rarely discussed, and is largely individualistic. It is the knowledge of good
practice, good judgment, and plausible reasoning in the field. It is the knowledge
that underlies the "art of good guessing.“
ī‚´ The inference engine is an automated reasoning system that evaluates the current
state of the knowledge-base, applies relevant rules, and then asserts new
knowledge into the knowledge base. The inference engine may also include
capabilities for explanation, so that it can explain to a user the chain of reasoning
used to arrive at a particular conclusion.
ī‚´ There are primarily two modes for an inference engine: forward
chaining and backward chaining.
Continued
ī‚´ The different approaches are dictated by whether the inference engine is being
driven by the antecedent (left hand side) or the consequent (right hand side) of the
rule. In forward chaining an antecedent fires and asserts the consequent.
ī‚´ Expert systems have played a large role in many industries including in financial
services, telecommunications, healthcare, customer service, transportation, video
games, manufacturing, aviation and written communication.
ī‚´ Two early expert systems broke ground in the healthcare space for medical
diagnoses: Dendral, which helped chemists identify organic molecules, and
MYCIN, which helped to identify bacteria such as bacteremia and meningitis, and
to recommend antibiotics and dosages.
ī‚´ A more recently developed expert system, ROSS, ROSS relies on self-learning
systems that use data mining, pattern recognition, deep learning and natural
language processing to mimic the way the human brain works.
Types Of System In Organization
ī‚´ Organization utilizes different types of information system to take their business
decisions for their operations. The hierarchy level of the organizations in general
are Operational, knowledge, management and strategic.
ī‚´ Operational level System: Monitors and support operational managers, keeping
track of the elementary activities and business transaction of the organization. E.g.
Sales, receipts, Cash deposits, payrolls.
ī‚´ Management- level system: serves the monitoring, controlling, decision making
and administrative activities of middle managers.
ī‚´ Strategic- level system: support long range planning activities of senior
management.
Objectives of MIS
ī‚´ MIS have become the main tool used by the managers in decision making.
Managers perceive information as the driving source to achieve success in any
business.
ī‚´ MIS is useful for very efficient and effective planning and controlling functions of
the management.
ī‚´ Reports give an idea about the performance of men, materials, machinery, money
and management.
ī‚´ MIS is helpful in controlling cost by giving information about idle time, labor
turnover, wastages and losses and surplus capacity.
Continuedâ€Ļâ€Ļ
ī‚´ By making the comparison of actual performance with the standard and budgeted
performance, variance are brought to the notice of the management by MIS.
ī‚´ MIS brings to notice of the management strength of the organization, to take
advantage of opportunities available.
ī‚´ MIS reports on production statistics regarding rejection, defective and spoilage and
their effect on costs and quality of the products.
Characteristics of MIS
ī‚´ Management- oriented: must address management needs, mission and goals of
the business organization.
ī‚´ Integrated: development of information must be integrated so that all the
operational and functional information sub system should be worked together as a
single entity.
ī‚´ Common data flow: The integrated approach towards data management will result
in avoiding the duplication of data, data redundancy, and will help to simplify
operations.
ī‚´ Strategic planning oriented: It ensures MIS being built serve the organization for
next five to ten years.
Continuedâ€Ļ..
ī‚´ System approach: System approach implies holistic approach to study the system
and its performance to achieve the objective for which it was formed.
ī‚´ Need based: MIS design and development must be as per the information needs
of managers at different levels.
ī‚´ Understandable: The summarized information must be understood by the receiver
so that he will interpret it correctly.
ī‚´ Relevant: information should be pertinent and meaningful to the decision makers
and should be in his area of responsibility.
ī‚´ Complete: Should contain all the facts necessary for the decision makers.
Continuedâ€Ļ.
ī‚´ Available: Must be accessible in the desired form, when it is needed.
ī‚´ Reliable: Information should be accurate, consistent with facts and verifiable.
ī‚´ Concise: Information should be to the point and just enough, no more, no less.
ī‚´ Timely: Information must be delivered at the right time and the right place to the
right person.
ī‚´ Cost- effective: The cost of gathering and processing information must be weighted
against the benefits derived from using such information.
ī‚´ Accuracy: Accuracy of information determines the usefulness of information.
Application Of MIS
ī‚´ Planning: To plan need specific information which is available from the specific
MIS.
ī‚´ Recording: It helps to produces regular reports for every level of management in a
company and recorded accordingly.
ī‚´ Controlling: with the help of information it is easy to move between securely in
each and every operation in a control manner.
ī‚´ Measuring: Business measures the performance metrics by collecting and
analyzing given data, cost of manufacturing and profit earned.
ī‚´ Decision making: Managerial decision making needs information.
ī‚´ Analyzing: from the numerous data we can process and analyze to obtain different
operational information for specific use.
Continuedâ€Ļ..
ī‚´ Policy making: Different information is needed to form the policy of the
organization.
ī‚´ Strategy forming: MIS supports the formation of organizational strategic planning
of an organization to be competitive, effective and efficient among different
organization.
ī‚´ Managing: MIS helps top level management to manage the organization
successfully.
Benefits of MIS
ī‚´ Facilitates Planning
ī‚´ Minimize information overload
ī‚´ MIS encourages decentralization
ī‚´ Bring coordination
ī‚´ Makes control easier
ī‚´ MIS is a process
ī‚´ MIS increases Productivity
ī‚´ MIS enhances the quality of Decision making
ī‚´ MIS improves communication and helps to develop team work
ī‚´ MIS can facilitates organizational transformation
Limitation of MISâ€Ļâ€Ļâ€Ļ
ī‚´ Improper Design does not serve the management and hence is irrelevance.
ī‚´ MIS cannot replace managerial judgement in decision making. It is just a tool.
ī‚´ The quality of output of MIS is directly proportional to the quality of input and
processes.
ī‚´ It is required to analyze the information before decision making.
ī‚´ In fast changing and complex environment MIS may not have enough flexibility to
update itself quickly.
ī‚´ MIS only takes only quantities factor in account.
ī‚´ MIS is less useful in non programmed decisions.
Continuedâ€Ļ..
ī‚´ MIS is less effective in organization where information is not being shared with
others.
ī‚´ Less effective due to frequent changes in top management, organizational
structure and operational staff.
ī‚´ MIS implementation can be very expensive for organizations looking to mange
their operation more effectively
ī‚´ Highly sensitive requires constant monitoring
ī‚´ Lots of time required to construct or prepare MIS.
Approach of MIS development
ī‚´ Top Down Approach:
ī‚´ Define the objective of organization, the kind of business it is in, the activities or
function for which information is required.
ī‚´ The crucial strategic and tactical decisions are also defined and the decisions
necessary to operate the activities are specified.
ī‚´ This approach develops a model of information flow in the organization, which acts
as a guide for designing the information system.
ī‚´ By using the model of information flow, various information sub-systems may be
defined.
Continue
ī‚´ top management takes the initiative in formulating major objectives, policies and
plans in a comprehensive manner and communicates them down the line to middle
and supervisory management levels for translating them into performance results.
ī‚´ Managers other than those at top levels have little role in planning, they have to
only concentrate on implementation and day to day control.
Bottom Up approach
ī‚´ The development of information system under this approach starts from the
identification of life stream systems.
ī‚´ Life stream systems are those systems, which are essential for the day to day
business activities. The examples of life stream systems include payroll, sales
order, inventory control and purchasing etc.
ī‚´ The next step is towards the integration of data kept in different data files of each
information system.
ī‚´ The next step under bottom up approach may be the addition of decision model
and various planning models for supporting the planning activities involved in
management control.
Integrative approach
ī‚´ It is for overcoming the limitations of the above two approaches.
ī‚´ Top level management identifies the structure and design the MIS suitable to the
concern.
ī‚´ This design id further presented to lower level management for their views and
modifications.
ī‚´ The revised design is drawn and evaluated by the top level and sent down again
in a modified form for further considerations if required.
ī‚´ This evaluation, modifications, and approval process continues until a final design
is achieved, that is suitable for all levels.
Implementation of MIS
ī‚´ Implementation of a system is as much important as the creation of it.
Implementation can easily destroy the good work done in the earlier phases and
bring the system to a standstill.
ī‚´ Implementation is also a process that has a series of sequential steps which
culminates in making operational the new system.
ī‚´ In order to help them perform this task of implementation smoothly, a series of
predefined steps are followed. These implementation tasks are as follows:
Implementation Plan
ī‚´ t is the series of action-oriented steps planned for making the implementation
smooth. It normally involves the following steps:
ī‚´ Creating a master schedule of the implementation activities
ī‚´ Setting timelines for critical and non-critical activities
ī‚´ Identifying major bottlenecks and their solutions
ī‚´ Communication of the plan.
Organizing the MIS Department
ī‚´ The MIS department will be the custodian of the new system.
ī‚´ Organization of the department is therefore necessary before the new system
becomes operational.
ī‚´ The roles of each member of the MIS department have to be clearly laid out
before the new system becomes operational.
ī‚´ Effort is made to ensure that the role of the MIS staff is understood by each
member of the organization.
ī‚´ Training is provided to those who need training on the new system so that they in
turn can help others.
Selection and Procurement of Hardware
ī‚´ This step of the implementation process is an important step as it involves huge
investments.
ī‚´ Proper care is taken to ensure that the organization gets the best deal from such
selection and procurement of the hardware.
ī‚´ -a list of reliable vendors is prepared.
ī‚´ the implementation team must prepare the request for proposal document based
on their understanding of the hardware requirement of the new system.
ī‚´ after the RFP is prepared it is sent by some mode of communication to the
enlisted set of vendors.
ī‚´ based on the evaluation a single vendor or a select set of vendors are chosen for
delivery of hardware.
Procurement of Software
ī‚´ The new system being implemented will have been created based on assumptions
of operating environment of the organization.
ī‚´ Procurement of system software is done on similar lines as the procurement of
hardware.
ī‚´ The implementation team need not prepare the specification for the system
software. They only need to procure the system software that the new system is
designed to run on.
Creating the Database
ī‚´ In modern systems, data stores are databases. These databases are relational
database management systems, which is a separate application software
package.
ī‚´ The database has to be created and structures inside the database have to be
created in order to enable it to store data.
ī‚´ The implementation team creates the database, its structures and rules so that
the application system being implemented can be plugged into the database and
start working.
Training of Users
ī‚´ The new system may get installed but without proper training of users, it may not
be of good use.
ī‚´ A training program is planned and the required training given to users. This is an
important part of the implementation process and helps in reducing the resistance
to change related behavior among the user community.
ī‚´ The training also helps users to appreciate the new features of the new system
and helps build trust and appreciation for the new system.
Creating Physical Infrastructure
ī‚´ The new system being implemented may require a physical infrastructure.
ī‚´ The implementation team must ensure that the system performance must not
suffer due to infrastructure bottlenecks.
ī‚´ The implementers will have to use their persuasive skills and convince the
management of the organization to create the required physical infrastructure so
that it does not affect the performance of the new system.
Transition to the New System
ī‚´ The transition if done wrongly leads to a lot of pain. Hence, it is necessary to
move slowly on the transition front.
ī‚´ Normally, after the new system is installed and ready, the new system and the old
system are both used for a period to ensure that the company performance does
not suffer due to transition problems.
ī‚´ Slowly when the users gain more capability to handle the new system the old
system is phased out.
ī‚´
System development Life Cycle
SDLC
SDLC
ī‚´ System: an organized collection of independent task and process that is designed
to work together in order to accomplish specific objectives.
ī‚´ SDLC refers to methodology for developing the system. It is a life span of a
Information system from its initiation until it is removed or redesigned.
ī‚´ It provides a consistent framework of task and deliverables needed to develop
systems.
ī‚´ SDLC has different phases:
Requirement Specifications
ī‚´ An information system requirement specification (SRS) is a description of a system
to be developed, lying a functional and non- functional requirements.
ī‚´ Information system requirement specification establishes the basis for agreement
between the customer and contractors or suppliers on what the information
product is to do as well as what it is not expected to do.
ī‚´ To derive the requirements we need to have thorough understanding of the
products to be developed or being developed.
ī‚´ Detailed and continuous planning between project team and customer is required.
Planning
ī‚´ Once the project is initiated and gathered all relevant information, project planning
begins.
ī‚´ At the end of planning a clear project plan or schedule, from which everyone will
follow their assigned task is delivered.
ī‚´ Project planning software such as Microsoft projects are used for aid in planning
process.
ī‚´ To develop a project plan a list of task to be done, relationship between them and
priority of each task is understood.
Analysis
ī‚´ System analysis is the process of collecting factual data, understanding the
processes involved, identifying the problems and recommending feasible
suggestions for improving the system functioning.
ī‚´ It is more of a thinking process and involves the creative skill of the system
analyst.
ī‚´ It attempts to give birth to a new efficient system that satisfies the current need of
the user and has scope for further growth within organizational constraints.
ī‚´ The result is a logical system design.
Feasibility Study
ī‚´ Analysis of proposed system from different aspects so that it clears how practical
and beneficial the system will be for the organization.
ī‚´ It deals with economical aspect, technical aspect, operational aspect, behavioral
aspect, schedule aspect, legal aspect about the system.
ī‚´ It determines the future prospective about the new system.
ī‚´ Feasibility study is the study of whether the system is feasible or not to design.
Continuedâ€Ļ.
ī‚´ The type of feasibility study are:
ī‚´ Legal feasibility
ī‚´ Operational feasibility
ī‚´ Economic feasibility
ī‚´ Technical feasibility
ī‚´ Schedule Feasibility
Design
ī‚´ Based on the user requirements and the detailed analysis of a new system, the
new system must be designed.
ī‚´ The logical system design arrived at as a result of system analysis and is
converted into physical system design.
ī‚´ A detailed description of what is needed to solve original problem, Input , Output,
databases, forms, files and processing specifications are drawn in detail.
ī‚´ Programming language, Hardware, software platform in which new system run are
decided.
ī‚´ Tools and techniques like Algorithm, flowchart, Data flow diagram, data dictionary,
Decision table, decision tree are used in system design.
Development
ī‚´ The system design must be implemented to make it workable system.
ī‚´ It is a programming phase in which the programmer converts the program
specifications to computer instructions.
ī‚´ Programming tools like compilers, interpreters and language like C++, VB, PHP
and java etc. are used for coding with respect to the type of application with the
right choice of programming language.
Documentation
ī‚´ It is written in local understandable language explaining in details about the
system.
ī‚´ This ensures the continuity of a system.
ī‚´ Generally following two types of documentations are prepared for any system.
ī‚´ User or Operator documentation
ī‚´ System documentation
Implementation
ī‚´ Implementation involves testing the installed system, converting from the old
system to the new system to the one and training the users.
ī‚´ This phase consists of implementation of the system into a production
environment, and the resolution of the problem identified in testing phase.
ī‚´ The major steps involved in this phase are:
ī‚´ Installation of hardware and software
ī‚´ Conversion
ī‚´ User training
ī‚´ Documentation
Maintenance and review
ī‚´ When the system is implemented, maintenance and modification begins.
ī‚´ If a system is inconsistent with the design specifications, them changes have to be
made.
ī‚´ The software and hardware also requires periodic maintenance so as to keep In
tune with design specification and to innovate new ideas into system.
Types of SDLC Models
ī‚´ The development models are the various processes or methodologies that are
being selected for the development of the project depending on the project’s aims
and goals.
ī‚´ It may be required to choose the SDLC phases according to the specific needs of
the project.
ī‚´ These different requirements and needs gives us various software development
approaches to choose from during software implementation.
ī‚´ There are various software development methologies.
Waterfall Model
ī‚´ It is referred to as linear- sequential model. It is simple to use and understand.
ī‚´ Each phase must be completed before the next phase and there is no overlapping.
ī‚´ The phases of waterfall model are:
Requirement gathering and analysis: All the possible requirements of the system to be
developed are captured in this phase and documented in a requirement specification
documents.
System Design: system design helps in specifying hardware and system requirements
and also helps in defining overall system architecture.
Continuedâ€Ļâ€Ļ.
ī‚´ Implementation: The design is implemented and converted into specific
programming language known as coding. The system is first developed into small
programs called units, tested individually which is integrated in next phase.
ī‚´ Integration and testing: All the units developed in the implementation phase and
integrated into a system after testing of each unit.
ī‚´ Deployment of system: once the functional and non functional testing is done, the
product is deployed in the customer environment or released into market.
ī‚´ Maintenance: there are issues which comes into clients environment. These issues
are fixed and to enhance the product better version are released.
Waterfall model
Spiral Model
ī‚´ It is combination of iterative development model and sequential linear development
model. i.e. waterfall model with high emphasis on risk analysis.
ī‚´ In each iteration of the spiral approach, software development process follow the
phase- wise linear approach.
ī‚´ The spiral phases are:
Customer communication: it includes understanding the system requirements by
continuous communication between the customer and system analyst.
Planning: it includes estimating schedule, cost, and resource for the iteration.
continued
ī‚´ Risk analysis: it includes identifying, estimating, and monitoring technical and
management risk, such as schedule slippage and cost overrun.
ī‚´ Engineering: it includes requirement gathering and design of the software system.
ī‚´ Construction and release: it includes coding, testing, and deploying software at the
customer site and providing user- support document.
ī‚´ Customer evaluation: it includes evaluation of software by the customer and
implementing feedback in the next iteration of the software development.
Spiral model
Prototyping
ī‚´ Creates prototype that looks and acts like the desired product in order to test its
usefulness.
ī‚´ The prototype is essential part of the requirements determination phase and may
be created using tools different from those used in final product.
ī‚´ Once the prototype is approved it is discarded and the real software is written.
Prototype model
Iterative model
ī‚´ It allows the developer to take a small segment of the application and develop it in
a fashion that, at each recursion, the application is improved.
ī‚´ Each of three main sections: requirements definition, system design, and coding
and testing are improved with each cycle through the process.
Iterative model
The factors of failure and success of MIS.

More Related Content

What's hot

Information system in business functions unit iv
Information system in business functions unit ivInformation system in business functions unit iv
Information system in business functions unit ivlaiprabhakar
 
Business with Information Technology
Business with Information TechnologyBusiness with Information Technology
Business with Information TechnologyRafiqul Alam Khan
 
Information,Knowledge,Business intelligence
Information,Knowledge,Business intelligenceInformation,Knowledge,Business intelligence
Information,Knowledge,Business intelligenceHiren Selani
 
Executive Support System (ESS)
Executive Support System (ESS)Executive Support System (ESS)
Executive Support System (ESS)Arun Savera
 
MIS MANAGEMENT INFORMATION SYSTEM
MIS MANAGEMENT INFORMATION SYSTEM MIS MANAGEMENT INFORMATION SYSTEM
MIS MANAGEMENT INFORMATION SYSTEM rahulkumar00077
 
Information System & Business applications
Information System & Business applicationsInformation System & Business applications
Information System & Business applicationsShubham Upadhyay
 
Accounting information system
Accounting information systemAccounting information system
Accounting information systemSAKET KASHYAP
 
MIS and Digital Firms
MIS and Digital FirmsMIS and Digital Firms
MIS and Digital FirmsPulkit Sharma
 
Enterprise Information Systems
Enterprise Information SystemsEnterprise Information Systems
Enterprise Information SystemsGoutama Bachtiar
 
Planning, design and implementation of information systems
Planning, design and implementation of information systemsPlanning, design and implementation of information systems
Planning, design and implementation of information systemsOnline
 
Mis structure of digital firm
Mis structure of digital firmMis structure of digital firm
Mis structure of digital firmDr. Vardhan choubey
 
MIS Chapter 1
MIS Chapter 1MIS Chapter 1
MIS Chapter 1Dara Som
 
Information System and Information Technology
Information System and Information TechnologyInformation System and Information Technology
Information System and Information Technologymegat zainurul anuar
 
Six major types of information systems
Six major types of information systemsSix major types of information systems
Six major types of information systemsMohanraj V
 
Evolution of ERP Systems
Evolution of ERP SystemsEvolution of ERP Systems
Evolution of ERP SystemsPrince Mosquitor
 
Management Information System-MIS
Management Information System-MISManagement Information System-MIS
Management Information System-MISSarmad Ali
 
Management information system ( MIS )
Management information system ( MIS )Management information system ( MIS )
Management information system ( MIS )QualitativeIn
 

What's hot (20)

Information system in business functions unit iv
Information system in business functions unit ivInformation system in business functions unit iv
Information system in business functions unit iv
 
Business with Information Technology
Business with Information TechnologyBusiness with Information Technology
Business with Information Technology
 
Information,Knowledge,Business intelligence
Information,Knowledge,Business intelligenceInformation,Knowledge,Business intelligence
Information,Knowledge,Business intelligence
 
Executive Support System (ESS)
Executive Support System (ESS)Executive Support System (ESS)
Executive Support System (ESS)
 
MIS MANAGEMENT INFORMATION SYSTEM
MIS MANAGEMENT INFORMATION SYSTEM MIS MANAGEMENT INFORMATION SYSTEM
MIS MANAGEMENT INFORMATION SYSTEM
 
Information System & Business applications
Information System & Business applicationsInformation System & Business applications
Information System & Business applications
 
Accounting information system
Accounting information systemAccounting information system
Accounting information system
 
MIS and Digital Firms
MIS and Digital FirmsMIS and Digital Firms
MIS and Digital Firms
 
Managing data resources
Managing  data resourcesManaging  data resources
Managing data resources
 
Enterprise Information Systems
Enterprise Information SystemsEnterprise Information Systems
Enterprise Information Systems
 
Planning, design and implementation of information systems
Planning, design and implementation of information systemsPlanning, design and implementation of information systems
Planning, design and implementation of information systems
 
Mis structure of digital firm
Mis structure of digital firmMis structure of digital firm
Mis structure of digital firm
 
MIS Chapter 1
MIS Chapter 1MIS Chapter 1
MIS Chapter 1
 
Information System and Information Technology
Information System and Information TechnologyInformation System and Information Technology
Information System and Information Technology
 
Six major types of information systems
Six major types of information systemsSix major types of information systems
Six major types of information systems
 
Evolution of ERP Systems
Evolution of ERP SystemsEvolution of ERP Systems
Evolution of ERP Systems
 
MIS concepts
MIS conceptsMIS concepts
MIS concepts
 
Management Information System-MIS
Management Information System-MISManagement Information System-MIS
Management Information System-MIS
 
Management information system ( MIS )
Management information system ( MIS )Management information system ( MIS )
Management information system ( MIS )
 
Role of Information Technology in Business
Role of Information Technology in BusinessRole of Information Technology in Business
Role of Information Technology in Business
 

Similar to Foundation Of Information System

Information systems by checkmate...
Information systems by checkmate...Information systems by checkmate...
Information systems by checkmate...PaYal Umraliya
 
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdf
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdfSYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdf
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdfSTUDY2BCA
 
Information system
Information systemInformation system
Information systemAnjum Azika
 
System Analysis and Design chap 1 to 8.docx
System Analysis and Design chap 1 to 8.docxSystem Analysis and Design chap 1 to 8.docx
System Analysis and Design chap 1 to 8.docxAmdework Belay
 
Information System Development
Information System DevelopmentInformation System Development
Information System DevelopmentIamPe Khamkhum
 
ā¸ā¸˛ā¸Ŗā¸žā¸ąā¸’ā¸™ā¸˛ā¸Ŗā¸°ā¸šā¸šā¸Ēā¸˛ā¸Ŗā¸Ēā¸™āš€ā¸—ā¸¨
ā¸ā¸˛ā¸Ŗā¸žā¸ąā¸’ā¸™ā¸˛ā¸Ŗā¸°ā¸šā¸šā¸Ēā¸˛ā¸Ŗā¸Ēā¸™āš€ā¸—ā¸¨ā¸ā¸˛ā¸Ŗā¸žā¸ąā¸’ā¸™ā¸˛ā¸Ŗā¸°ā¸šā¸šā¸Ēā¸˛ā¸Ŗā¸Ēā¸™āš€ā¸—ā¸¨
ā¸ā¸˛ā¸Ŗā¸žā¸ąā¸’ā¸™ā¸˛ā¸Ŗā¸°ā¸šā¸šā¸Ēā¸˛ā¸Ŗā¸Ēā¸™āš€ā¸—ā¸¨Pe' KhumSae
 
Fundamental Information System.pptx
Fundamental Information System.pptxFundamental Information System.pptx
Fundamental Information System.pptxVincentSai2
 
Components of an information system
Components of an information systemComponents of an information system
Components of an information systemNareshBabu285920
 
MIS assignment for share
MIS assignment for shareMIS assignment for share
MIS assignment for sharehoneyshah
 
Mis for share
Mis for shareMis for share
Mis for sharehoneyshah
 
computerbasedinformationsystem.pptx
computerbasedinformationsystem.pptxcomputerbasedinformationsystem.pptx
computerbasedinformationsystem.pptxSTEPHANIESARAHJANEEN
 
computer based information system
computer based information systemcomputer based information system
computer based information systemDibyenduBiswas31
 
ITB - UNIT 1.pdf
ITB - UNIT 1.pdfITB - UNIT 1.pdf
ITB - UNIT 1.pdfSOMASUNDARAM T
 
Computer based information system
Computer based information systemComputer based information system
Computer based information systemshoaibzaheer1
 

Similar to Foundation Of Information System (20)

Information systems by checkmate...
Information systems by checkmate...Information systems by checkmate...
Information systems by checkmate...
 
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdf
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdfSYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdf
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdf
 
Information system
Information systemInformation system
Information system
 
Information system
Information systemInformation system
Information system
 
Itm 1
Itm 1Itm 1
Itm 1
 
mia .pdf
mia .pdfmia .pdf
mia .pdf
 
System Analysis and Design chap 1 to 8.docx
System Analysis and Design chap 1 to 8.docxSystem Analysis and Design chap 1 to 8.docx
System Analysis and Design chap 1 to 8.docx
 
Information System Development
Information System DevelopmentInformation System Development
Information System Development
 
ā¸ā¸˛ā¸Ŗā¸žā¸ąā¸’ā¸™ā¸˛ā¸Ŗā¸°ā¸šā¸šā¸Ēā¸˛ā¸Ŗā¸Ēā¸™āš€ā¸—ā¸¨
ā¸ā¸˛ā¸Ŗā¸žā¸ąā¸’ā¸™ā¸˛ā¸Ŗā¸°ā¸šā¸šā¸Ēā¸˛ā¸Ŗā¸Ēā¸™āš€ā¸—ā¸¨ā¸ā¸˛ā¸Ŗā¸žā¸ąā¸’ā¸™ā¸˛ā¸Ŗā¸°ā¸šā¸šā¸Ēā¸˛ā¸Ŗā¸Ēā¸™āš€ā¸—ā¸¨
ā¸ā¸˛ā¸Ŗā¸žā¸ąā¸’ā¸™ā¸˛ā¸Ŗā¸°ā¸šā¸šā¸Ēā¸˛ā¸Ŗā¸Ēā¸™āš€ā¸—ā¸¨
 
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATIONHOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
 
Fundamental Information System.pptx
Fundamental Information System.pptxFundamental Information System.pptx
Fundamental Information System.pptx
 
Information Systems
Information SystemsInformation Systems
Information Systems
 
ITB-I Unit-1 PPT.pdf
ITB-I Unit-1 PPT.pdfITB-I Unit-1 PPT.pdf
ITB-I Unit-1 PPT.pdf
 
Components of an information system
Components of an information systemComponents of an information system
Components of an information system
 
MIS assignment for share
MIS assignment for shareMIS assignment for share
MIS assignment for share
 
Mis for share
Mis for shareMis for share
Mis for share
 
computerbasedinformationsystem.pptx
computerbasedinformationsystem.pptxcomputerbasedinformationsystem.pptx
computerbasedinformationsystem.pptx
 
computer based information system
computer based information systemcomputer based information system
computer based information system
 
ITB - UNIT 1.pdf
ITB - UNIT 1.pdfITB - UNIT 1.pdf
ITB - UNIT 1.pdf
 
Computer based information system
Computer based information systemComputer based information system
Computer based information system
 

More from Nirajan Silwal

Internship presentation
Internship presentationInternship presentation
Internship presentationNirajan Silwal
 
Principles of marketing (Product)
Principles of marketing (Product)Principles of marketing (Product)
Principles of marketing (Product)Nirajan Silwal
 
Data resource management
Data resource managementData resource management
Data resource managementNirajan Silwal
 
Telecommunication and network
Telecommunication and networkTelecommunication and network
Telecommunication and networkNirajan Silwal
 
Hospitality information system
Hospitality information systemHospitality information system
Hospitality information systemNirajan Silwal
 
Business Application (MIS)
Business Application (MIS)Business Application (MIS)
Business Application (MIS)Nirajan Silwal
 
PRODUCT AND SERVICE IN BANKING
PRODUCT AND SERVICE IN BANKINGPRODUCT AND SERVICE IN BANKING
PRODUCT AND SERVICE IN BANKINGNirajan Silwal
 
Corporate social responsibility
Corporate social responsibilityCorporate social responsibility
Corporate social responsibilityNirajan Silwal
 
(Coffee shop business)Palpasa cafe
(Coffee shop business)Palpasa cafe(Coffee shop business)Palpasa cafe
(Coffee shop business)Palpasa cafeNirajan Silwal
 
fundamental of financial accounting.
 fundamental of financial accounting. fundamental of financial accounting.
fundamental of financial accounting.Nirajan Silwal
 
Interpersonal communication
Interpersonal communicationInterpersonal communication
Interpersonal communicationNirajan Silwal
 
Classification of computer on the basic of size
Classification of computer on the basic of sizeClassification of computer on the basic of size
Classification of computer on the basic of sizeNirajan Silwal
 

More from Nirajan Silwal (14)

Internship presentation
Internship presentationInternship presentation
Internship presentation
 
Principles of marketing (Product)
Principles of marketing (Product)Principles of marketing (Product)
Principles of marketing (Product)
 
Data resource management
Data resource managementData resource management
Data resource management
 
Telecommunication and network
Telecommunication and networkTelecommunication and network
Telecommunication and network
 
Hospitality information system
Hospitality information systemHospitality information system
Hospitality information system
 
Business Application (MIS)
Business Application (MIS)Business Application (MIS)
Business Application (MIS)
 
PRODUCT AND SERVICE IN BANKING
PRODUCT AND SERVICE IN BANKINGPRODUCT AND SERVICE IN BANKING
PRODUCT AND SERVICE IN BANKING
 
Corporate social responsibility
Corporate social responsibilityCorporate social responsibility
Corporate social responsibility
 
(Coffee shop business)Palpasa cafe
(Coffee shop business)Palpasa cafe(Coffee shop business)Palpasa cafe
(Coffee shop business)Palpasa cafe
 
psychology
psychologypsychology
psychology
 
fundamental of financial accounting.
 fundamental of financial accounting. fundamental of financial accounting.
fundamental of financial accounting.
 
Leadership
Leadership Leadership
Leadership
 
Interpersonal communication
Interpersonal communicationInterpersonal communication
Interpersonal communication
 
Classification of computer on the basic of size
Classification of computer on the basic of sizeClassification of computer on the basic of size
Classification of computer on the basic of size
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Foundation Of Information System

  • 2. Data ī‚´ Unit of information in raw or unorganized forms (such as alphabets, numbers, or symbols) that refers to, or represent, conditions, ideas, or objects. ī‚´ Raw facts are called data that represents object, idea, place and other things. (Organization hold data for the purpose of applying it, or there would be no reason to hold it). ī‚´ E.G no of students in BBA 6th semester is Data. The attendance whereas is information.
  • 3. Data Life Cycle ī‚´ Goes through four stages: ī‚´ Data origination: ī‚´ Generated from variety of source like day to day activities of transaction level of management. ī‚´ Includes Employee hiring, Ordering supplies, selling, payments ī‚´ Processing and immediate Use: ī‚´ Processed to get information to meet the immediate needs of the decision maker. ī‚´ Processing technique like Statistical analysis, Classification, Categorization. ī‚´ Use of Information technologies for support.
  • 4. Continuedâ€Ļâ€Ļ ī‚´ Ready access storage: ī‚´ Data are stored on Secondary storage like disc or magnetic tape. ī‚´ Allowed to use data when needed. ī‚´ Sometimes a type of data can be used to determine another type of data. ī‚´ E.g. sales data determine sales commission ī‚´ Data Destruction: ī‚´ Data that are no longer needed are identified routinely and removed from storage. ī‚´ Retention of data for indefinite period is costly and unnecessary for most of the enterprise.
  • 5. Data Processing ī‚´ Operations performed on a given set of data to extract the required information in an appropriate form such as diagrams, reports, or tables. See also electronic data processing. ī‚´ Data processing is, generally, "the collection and manipulation of items of data to produce meaningful information. ī‚´ Data processing may involve various processes, including: ī‚´ Validation – Ensuring that supplied data is correct and relevant. ī‚´ Sorting – "arranging items in some sequence and/or in different sets." ī‚´ Summarization – reducing detail data to its main points. ī‚´ Aggregation – combining multiple pieces of data. ī‚´ Analysis – the "collection, organization, analysis, interpretation and presentation of data.". ī‚´ Reporting – list detail or summary data or computed information. ī‚´ Classification – separates data into various categories.
  • 6. Data processing methods ī‚´ Manual ī‚´ Mechanical ī‚´ Electronic
  • 7. Types of data Processing ī‚´ Batch Processing: ī‚´ Known as serial, sequential, offline or stacked processing. ī‚´ Different jobs of different users are stacked or queued in their receiving order and when batch of jobs is completed, they are given for processing. ī‚´ Lower processing cost per transaction. ī‚´ Credit Card bills are transacted at the end of month, electricity and sales bills, Stock bills
  • 8. Continuedâ€Ļ ī‚´ Online Processing: ī‚´ Direct or random access processing. A job is processed at the same time it is received. ī‚´ Features rapid and random input of transaction and immediate and direct access to record content when needed. ī‚´ E.G. Bar code reading, E- commerce website
  • 9. Continuedâ€Ļ. ī‚´ Real time Processing: ī‚´ This processing method is used when it is essential that the input request is dealt with quickly enough so as to be able to control an output properly. The is called the 'latency'. ī‚´ Designed to allow to use the data as they become available. ī‚´ Receiving and processing of transaction is performed simultaneously and no delay in processing of job. ī‚´ Traffic lights, Heart rate monitoring, Aircraft control
  • 10. Continued ī‚´ Multi Processing and multi programming ī‚´ Multiprocessing is the use of two or more central processing units (CPUs) within a single computer system. ī‚´ The main objective is to increase the throughout by distributing the processing load. ī‚´ Speeds up the processing of the job, improves the efficiency of peripherals, and if a CPU break down others can take the JOB. ī‚´ When two or more than two task are concurrently processed by CPU it is multi programming. ī‚´ CPU is not busy with only one program and doesn’t remain idle.
  • 11. Continuedâ€Ļ ī‚´ Time Sharing ī‚´ Allows to use same CPU resources simultaneously by dividing CPU time to all the user on the schedule basis. ī‚´ Multiple users access same CPU through terminals. ī‚´ Used by mainframes and mini computers. ī‚´ E.G. Bank’s ATM
  • 12. Case ī‚´ Visit your library and account section of your college. List out the data processing system and suggest the best processing types for these section.
  • 13. Information ī‚´ Collection of raw data that has been verified to be accurate and timely, is specific and organized for a purpose is known as information. ī‚´ In order to be of any commercial value, data must become information. ī‚´ The primary purpose of information is to facilitate decision making, coordination and control and planning. ī‚´ We can capture data in information, and then move it about so that other people can access it at different times.
  • 14. Use of Information ī‚´ Planning ī‚´ Recording ī‚´ Controlling ī‚´ Measuring ī‚´ Decision Making
  • 15. Information System ī‚´ Information system is a system that accepts interrelated data process them logically and generate some meaningful information. ī‚´ Modern IS uses computer based system like Input device, Processing device, networking system, database application and output devices. ī‚´ An information system is a set of electronic component that collect analyze and disseminate data and information to meet an objective.
  • 16. Characteristics of IS ī‚´ Good information is that which is used and which creates values. Experience and research shows that good information has numerous qualities. īļ Availability/ Accessibility: Information should be easy to obtain and access. Eg. Telephone directory, Internet, Centralized computer system. īļ Accuracy: Information should be accurate enough for the use. 100% accurate result is usually unrealistic and expensive to produce on time. īļ Reliability/ Objectivity: Reliability deals with the truth of information or the objectivity with which it is presented. One can only use information that is reliable.
  • 17. Continuedâ€Ļâ€Ļ.. īļ Relevance/ Appropriateness: Information should be relevant to the purpose for which it is required. It must be suitable. What is relevant to one manager may not be relevant to another. īļ Completeness: Information should contain all the information required by the user, otherwise it may not be useful as the basis for making decision. īļ Level of details/ Conciseness: Information should be in short enough form to allow for its examination and use. There should be no extraneous information. īļ Presentation: The presentation of information is important to the user. The presentation should be visually attractive and convey the correct amount of detail.
  • 18. Continuedâ€Ļâ€Ļâ€Ļ. īļ Timing: Information should be on time for the purpose of that it is required. Information received too late will be irrelevant. īļ Value of information: The relatively important information for decision making can increase or decrease value of an organization. The information should be available on time, within cost and be legally obtained. īļ Cost of information: Information which is available within the cost levels may vary depending upon the situation. If the cost are too high to obtain information, an organization may decide to take slightly less comprehensive information elsewhere.
  • 19. Need of IS in Business ī‚´ Speed ī‚´ Efficiency ī‚´ Multi- tasking ī‚´ Low Cost ī‚´ Entrepreneurship ī‚´ Process Improvement ī‚´ Cost reduction ī‚´ Communication ī‚´ Decisions ī‚´ Operations
  • 20. Resources of IS ī‚´ The main components are people, hardware, software, data and network
  • 21. Human Resource (people) ī‚´ Primary purpose of IS is to provide valuable information to manager and users within and outside company. ī‚´ People are required for the operation of all information system. ī‚´ Users sometimes called as end user include employees, customer, vendors and others who interact with information system. ī‚´ External users include customers who track their orders on the company’s web site, suppliers who use a customer system to plan their manufacturing schedule, employee who login to company intranet from home to check mails. ī‚´ Successful IS requires the effort of skilled professionals, such as system analyst, programmers and IT managers.
  • 22. Hardware ī‚´ Hardware refers to the physical layer of the information system. ī‚´ Hardware includes computers, networks, communications equipment, scanner, digital capture devices and other technology- based infrastructure.
  • 23. Software ī‚´ It includes all the set of information processing instructions. ī‚´ Software consists of system software with utilities and application software. ī‚´ System software controls the computer and include the operating system, device drivers and utilities that handle task such as data conversion, virus protection, backup. ī‚´ Either the hardware manufacturer provides the system software or the company purchase it fro the vendor. ī‚´ Application software consists of the program that supports users and enables companies to carry out business functions.
  • 24. Data ī‚´ Data is a valuable organization resources. ī‚´ The data resources must be managed effectively to benefit all end users in an organization. ī‚´ An information system transforms data into meaningful information.
  • 25. Processes ī‚´ Processes or procedure include the task that IT manager or staff performs. ī‚´ Processes necessary to support a specific business model are described and written documentation manuals and online reference materials.
  • 26. Network resources ī‚´ System that interconnects multiple user and system components for sharing the resources is called networking. ī‚´ Telecommunication network consists of computers, communication, processors and other communication software. ī‚´ Network resources include communication media like Twisted pair cable, Fiber optic cable, Microwave, cellular, satellite and people , Hardware, software, people, data.
  • 27. Risk of IS ī‚´ Risk is the potential harm that may arise from some current process or from some future events. ī‚´ Risk management is the process of understanding and responding to factor that may lead to failure in the confidentiality, integrity and availability of Information system. ī‚´ A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system. A threat is something that may or may not happen, but has the potential to cause serious damage. Threats can lead to attacks on computer systems, networks and more.
  • 28. List of threats ī‚´ Accidental disclosure: The unauthorized or by chance release of classified, personal or sensitive information which cause serious disaster in an organization. ī‚´ Acts of nature: All type of natural occurrence that may damage or affect the system/ application. ī‚´ Alternation of software: An intentional modification, insertion, deletion of operating system or application system programs weather by an authorized user or not. ī‚´ Bandwidth usage: the accidental or intentional use of communication bandwidth for other then intended purpose by used application, staff, outsiders.
  • 29. Continuedâ€Ļ. ī‚´ Electrical Interference: Interference or fluctuation may occur as the result of a commercial power failure. This may cause denial of service to authorised user or a modification of data. ī‚´ Intentional Alteration of data: An intentional modification, insertion, deletion of data weather by an authorized user or not. ī‚´ System configuration error: error in initial installment and upgrade of hardware, software, network and system. Occurs due to illegal version, piracy and corruption. ī‚´ Telecommunication Interruption: Failure in telecommunication devices and link the to cause interruption of data transfer.
  • 30. Vulnerability ī‚´ A flaw or weakness in system security procedures, design, implementation or internal controls that could be exercised and result in security breach or violation of the system’s security policy. ī‚´ Vulnerability can be a flaw or weakness in any aspect of the system.
  • 31. Risk Management ī‚´ The identification, analysis, assessment, control and avoidance, minimization, or elimination of unacceptable risk is known as risk management. ī‚´ The risk management strategies are: ī‚´ Mitigation ī‚´ Transference ī‚´ Acceptance ī‚´ Avoidance
  • 32. Types of Information system ī‚´ Every organization has different level, group of people having different interest and specialist who demand information for their work. ī‚´ Typical users are clerk as assistant, an officer, an executive or managers. ī‚´ Each of them has specific task and role to play in the management of the business. ī‚´ Basically information system is categorized into two different types: Operational support system and management support system which is further subdivided into TPS, MIS. DSS, EIS, ES.
  • 33. Transaction processing system ī‚´ The primary purpose of TPS is to record, process, validate, and store transactions that occurs in various functional areas of business. ī‚´ When a department orders office supplies from the purchasing department internal transaction occurs and when a customer order for a product external transaction occurs. ī‚´ TPS is the computerized system that that performs and records daily routine transaction necessary to conduct of business. ī‚´ These system includes order entry, inventory control, payrolls, accounts payable, account’s revival, general ledger.
  • 34. Continuedâ€Ļ ī‚´ TPS plays vital role in supporting the operation of an organization. ī‚´ TPS updates organizational files and databases and produce various information products for internal and external use. ī‚´ With TPS every single transaction is overseen and monitored so that the system will recognize if entered data is authentic. ī‚´ On organized TPS makes monitoring each and every transaction easier. ī‚´ Transaction made will be accurate, secure, organized, recorded and authorized. ī‚´ Disaster recovery system for data safety
  • 35. Continued ī‚´ With reliable TPS company will success in satisfying its customer and gain more satisfied customer.. ī‚´ TPS examples range from ATM’s, airlines booking system, online ticketing and many more transaction that include similar technology. ī‚´ Any TPS goes through a five stage cycle: 1. DATA entry activities ī‚´ 2. Transaction processing activities ī‚´ 3. File and data processing ī‚´ 4. Document and report generation ī‚´ 5. Inquiry processing activities
  • 36. Management Information system ī‚´ MIS are designed for providing information to important personnel in the organization. ī‚´ Use already processed transaction data and generate information reports after processing data. Example are personnel information system, marketing information system, sales information system. ī‚´ The output of MIS takes form of summary report and exception reports. A bank manger gets summary report listing the total amount of deposits and withdraw made. ī‚´ Its main purpose is to draw attention of the middle management to any significant difference between actual and performance and excepted performance.
  • 37. Continuedâ€Ļâ€Ļâ€Ļ ī‚´ MIS is an organized collection of people, procedure, software, databases and devices used to provide routine information to the managers and decision makers. ī‚´ Management use information may be done best in the context of the management process, which is a cycle consisting following stages: ī‚´ Planning ī‚´ Organizing ī‚´ Staffing ī‚´ Coordinating ī‚´ controlling
  • 38. Decision Support System ī‚´ Interactive, well integrated systems that provide managers with data, tools and models to facilitate semi structured decisions or tactical decisions. ī‚´ It provides the ability to what if analysis. ī‚´ DSS are ideally suited for problems like location selection, identifying new products to be marketed, scheduling personnel and analyzing the effect that price increases for resources have on profits. ī‚´ A DSS allows manager managers to perform goal seeking which specifies what action a manager should take in order to accomplish a certain goal. ī‚´ Individual or Group of individuals (GDSS) can also use them. ī‚´ DSS provides Right now analysis than long term structured analysis of MIS.
  • 39. DSS VS MIS ī‚´ DSS and MIS differ in numerous ways. ī‚´ DSS: ī‚´ – DSS generally provide support for unstructured, or semi-structured decisions (decisions that cannot be described in detail). ī‚´ – DSS problems are often characterized by incomplete or uncertain knowledge, or the use of qualitative data. ī‚´ – DSS will often include modelling tools in them, where various alternative scenarios can be modeled and compared. ī‚´ – Investment decisions are an examples of those that might be supported by DSS
  • 40. Continued ī‚´ MIS: ī‚´ MIS is generally more sophisticated reporting systems built on existing transaction processing systems ī‚´ Often used to support structured decision making (decisions that can be described in detail before the decision is made) ī‚´ Typically will also support tactical level management, but sometimes are used at other levels ī‚´ Examples of structured decisions supported by MIS might include deciding on stock levels or the pricing of products
  • 41. Executive Support System / Information System ī‚´ Strategic level of organization used by senior managers to make decisions. ī‚´ ESS are forms of data retrieval systems that provides selected and summarized information for senior executives, engaged in long- range planning, crisis management and other strategic decisions. ī‚´ It is user friendly interactive system having excellent menus and graphic capabilities. ī‚´ ESS works by exception reporting and drilling down to investigate the cause. ī‚´ E.G. a director of an organization may be alerted that a particular department is well over budget. The manager would then drill down the data by pursuing lower and lower levels of data.
  • 42. Continuedâ€Ļ ī‚´ ESS includes Sales trend forecasting, budget forecasting and personnel planning. ī‚´ ESS incorporates data from external data source such as new tax laws or competitors as well as summarized information from internal MIS and DSS. ī‚´ ESS addresses non- routine decisions requiring judgements, evaluation and insight because there is no agreed- on procedure for arriving at a solution. ī‚´ ESS provides output as desired by the end user in the form like customizable graphical user interface, exception reports, trend analysis e.t.c.
  • 43. Interrelationshipâ€Ļ. ī‚´ Different types of system are closely linked to each other. ī‚´ TPS are the major source of data for other system such as MIS and DSS. ī‚´ TPS provides data required by office systems, KWS, MMS and DSS, although the system may use external data. ī‚´ Office system uses data not only from TPS but also from MIS. ī‚´ DSS uses data from TPs, MIS, office system. ī‚´ ESS obtain most of their internal data from MIS and DSS.
  • 44. Difference DSS MIS AND EIS Dimension DSS MIS EIS Focus Analysis, decision Support Information processing Status Access Typical UsersServed Analysts, professions,manag ers (via intermediaries) Middle, lower levels, sometime senior executives Senior Executives Expediency Impetus Effectiveness Efficiency Application Diversified Areas where Managerial Decisions are made Production control, sales forecasts, financial analysis,human resource management Environmental scanning, performanceevalu ation, identifying problems and opportunities
  • 45. Continued Database(s) Special Corporate Special Decision Support Capabilities Supports semi- structured and unstructured decision making; mainly ad-hoc, but sometimes repetitive decisions Direct or indirect support, mainlystructured routine problems, using standard operations, research and other models Indirect support, mainly high level andunstructured decisions and policies Type ofInformation Information to support specific situations Scheduled and demand reports; structured flow, exception reporting mainly internal operations News items, external information on customers, competitors and the environment
  • 46. Expert System ī‚´ An expert system is a computer program that uses artificial intelligence (AI) technologies to simulate the judgment and behavior of a human or an organization that has expert knowledge and experience in a particular field. ī‚´ An expert system is divided into two sub-systems: the inference engine and the knowledge base. ī‚´ The knowledge base represents facts and rules. The inference engine applies the rules to the known facts to deduce new facts. ī‚´ The knowledge base of expert systems contains both factual and heuristic knowledge. Factual knowledge is that knowledge of the task domain that is widely shared, typically found in textbooks or journals, and commonly agreed upon by those knowledgeable in the particular field.
  • 47. Continuedâ€Ļâ€Ļ. ī‚´ Heuristic knowledge is the less rigorous, more experiential, more judgmental knowledge of performance. In contrast to factual knowledge, heuristic knowledge is rarely discussed, and is largely individualistic. It is the knowledge of good practice, good judgment, and plausible reasoning in the field. It is the knowledge that underlies the "art of good guessing.“ ī‚´ The inference engine is an automated reasoning system that evaluates the current state of the knowledge-base, applies relevant rules, and then asserts new knowledge into the knowledge base. The inference engine may also include capabilities for explanation, so that it can explain to a user the chain of reasoning used to arrive at a particular conclusion. ī‚´ There are primarily two modes for an inference engine: forward chaining and backward chaining.
  • 48. Continued ī‚´ The different approaches are dictated by whether the inference engine is being driven by the antecedent (left hand side) or the consequent (right hand side) of the rule. In forward chaining an antecedent fires and asserts the consequent. ī‚´ Expert systems have played a large role in many industries including in financial services, telecommunications, healthcare, customer service, transportation, video games, manufacturing, aviation and written communication. ī‚´ Two early expert systems broke ground in the healthcare space for medical diagnoses: Dendral, which helped chemists identify organic molecules, and MYCIN, which helped to identify bacteria such as bacteremia and meningitis, and to recommend antibiotics and dosages. ī‚´ A more recently developed expert system, ROSS, ROSS relies on self-learning systems that use data mining, pattern recognition, deep learning and natural language processing to mimic the way the human brain works.
  • 49. Types Of System In Organization ī‚´ Organization utilizes different types of information system to take their business decisions for their operations. The hierarchy level of the organizations in general are Operational, knowledge, management and strategic. ī‚´ Operational level System: Monitors and support operational managers, keeping track of the elementary activities and business transaction of the organization. E.g. Sales, receipts, Cash deposits, payrolls. ī‚´ Management- level system: serves the monitoring, controlling, decision making and administrative activities of middle managers. ī‚´ Strategic- level system: support long range planning activities of senior management.
  • 50. Objectives of MIS ī‚´ MIS have become the main tool used by the managers in decision making. Managers perceive information as the driving source to achieve success in any business. ī‚´ MIS is useful for very efficient and effective planning and controlling functions of the management. ī‚´ Reports give an idea about the performance of men, materials, machinery, money and management. ī‚´ MIS is helpful in controlling cost by giving information about idle time, labor turnover, wastages and losses and surplus capacity.
  • 51. Continuedâ€Ļâ€Ļ ī‚´ By making the comparison of actual performance with the standard and budgeted performance, variance are brought to the notice of the management by MIS. ī‚´ MIS brings to notice of the management strength of the organization, to take advantage of opportunities available. ī‚´ MIS reports on production statistics regarding rejection, defective and spoilage and their effect on costs and quality of the products.
  • 52. Characteristics of MIS ī‚´ Management- oriented: must address management needs, mission and goals of the business organization. ī‚´ Integrated: development of information must be integrated so that all the operational and functional information sub system should be worked together as a single entity. ī‚´ Common data flow: The integrated approach towards data management will result in avoiding the duplication of data, data redundancy, and will help to simplify operations. ī‚´ Strategic planning oriented: It ensures MIS being built serve the organization for next five to ten years.
  • 53. Continuedâ€Ļ.. ī‚´ System approach: System approach implies holistic approach to study the system and its performance to achieve the objective for which it was formed. ī‚´ Need based: MIS design and development must be as per the information needs of managers at different levels. ī‚´ Understandable: The summarized information must be understood by the receiver so that he will interpret it correctly. ī‚´ Relevant: information should be pertinent and meaningful to the decision makers and should be in his area of responsibility. ī‚´ Complete: Should contain all the facts necessary for the decision makers.
  • 54. Continuedâ€Ļ. ī‚´ Available: Must be accessible in the desired form, when it is needed. ī‚´ Reliable: Information should be accurate, consistent with facts and verifiable. ī‚´ Concise: Information should be to the point and just enough, no more, no less. ī‚´ Timely: Information must be delivered at the right time and the right place to the right person. ī‚´ Cost- effective: The cost of gathering and processing information must be weighted against the benefits derived from using such information. ī‚´ Accuracy: Accuracy of information determines the usefulness of information.
  • 55. Application Of MIS ī‚´ Planning: To plan need specific information which is available from the specific MIS. ī‚´ Recording: It helps to produces regular reports for every level of management in a company and recorded accordingly. ī‚´ Controlling: with the help of information it is easy to move between securely in each and every operation in a control manner. ī‚´ Measuring: Business measures the performance metrics by collecting and analyzing given data, cost of manufacturing and profit earned. ī‚´ Decision making: Managerial decision making needs information. ī‚´ Analyzing: from the numerous data we can process and analyze to obtain different operational information for specific use.
  • 56. Continuedâ€Ļ.. ī‚´ Policy making: Different information is needed to form the policy of the organization. ī‚´ Strategy forming: MIS supports the formation of organizational strategic planning of an organization to be competitive, effective and efficient among different organization. ī‚´ Managing: MIS helps top level management to manage the organization successfully.
  • 57. Benefits of MIS ī‚´ Facilitates Planning ī‚´ Minimize information overload ī‚´ MIS encourages decentralization ī‚´ Bring coordination ī‚´ Makes control easier ī‚´ MIS is a process ī‚´ MIS increases Productivity ī‚´ MIS enhances the quality of Decision making ī‚´ MIS improves communication and helps to develop team work ī‚´ MIS can facilitates organizational transformation
  • 58. Limitation of MISâ€Ļâ€Ļâ€Ļ ī‚´ Improper Design does not serve the management and hence is irrelevance. ī‚´ MIS cannot replace managerial judgement in decision making. It is just a tool. ī‚´ The quality of output of MIS is directly proportional to the quality of input and processes. ī‚´ It is required to analyze the information before decision making. ī‚´ In fast changing and complex environment MIS may not have enough flexibility to update itself quickly. ī‚´ MIS only takes only quantities factor in account. ī‚´ MIS is less useful in non programmed decisions.
  • 59. Continuedâ€Ļ.. ī‚´ MIS is less effective in organization where information is not being shared with others. ī‚´ Less effective due to frequent changes in top management, organizational structure and operational staff. ī‚´ MIS implementation can be very expensive for organizations looking to mange their operation more effectively ī‚´ Highly sensitive requires constant monitoring ī‚´ Lots of time required to construct or prepare MIS.
  • 60. Approach of MIS development ī‚´ Top Down Approach: ī‚´ Define the objective of organization, the kind of business it is in, the activities or function for which information is required. ī‚´ The crucial strategic and tactical decisions are also defined and the decisions necessary to operate the activities are specified. ī‚´ This approach develops a model of information flow in the organization, which acts as a guide for designing the information system. ī‚´ By using the model of information flow, various information sub-systems may be defined.
  • 61. Continue ī‚´ top management takes the initiative in formulating major objectives, policies and plans in a comprehensive manner and communicates them down the line to middle and supervisory management levels for translating them into performance results. ī‚´ Managers other than those at top levels have little role in planning, they have to only concentrate on implementation and day to day control.
  • 62. Bottom Up approach ī‚´ The development of information system under this approach starts from the identification of life stream systems. ī‚´ Life stream systems are those systems, which are essential for the day to day business activities. The examples of life stream systems include payroll, sales order, inventory control and purchasing etc. ī‚´ The next step is towards the integration of data kept in different data files of each information system. ī‚´ The next step under bottom up approach may be the addition of decision model and various planning models for supporting the planning activities involved in management control.
  • 63. Integrative approach ī‚´ It is for overcoming the limitations of the above two approaches. ī‚´ Top level management identifies the structure and design the MIS suitable to the concern. ī‚´ This design id further presented to lower level management for their views and modifications. ī‚´ The revised design is drawn and evaluated by the top level and sent down again in a modified form for further considerations if required. ī‚´ This evaluation, modifications, and approval process continues until a final design is achieved, that is suitable for all levels.
  • 64. Implementation of MIS ī‚´ Implementation of a system is as much important as the creation of it. Implementation can easily destroy the good work done in the earlier phases and bring the system to a standstill. ī‚´ Implementation is also a process that has a series of sequential steps which culminates in making operational the new system. ī‚´ In order to help them perform this task of implementation smoothly, a series of predefined steps are followed. These implementation tasks are as follows:
  • 65. Implementation Plan ī‚´ t is the series of action-oriented steps planned for making the implementation smooth. It normally involves the following steps: ī‚´ Creating a master schedule of the implementation activities ī‚´ Setting timelines for critical and non-critical activities ī‚´ Identifying major bottlenecks and their solutions ī‚´ Communication of the plan.
  • 66. Organizing the MIS Department ī‚´ The MIS department will be the custodian of the new system. ī‚´ Organization of the department is therefore necessary before the new system becomes operational. ī‚´ The roles of each member of the MIS department have to be clearly laid out before the new system becomes operational. ī‚´ Effort is made to ensure that the role of the MIS staff is understood by each member of the organization. ī‚´ Training is provided to those who need training on the new system so that they in turn can help others.
  • 67. Selection and Procurement of Hardware ī‚´ This step of the implementation process is an important step as it involves huge investments. ī‚´ Proper care is taken to ensure that the organization gets the best deal from such selection and procurement of the hardware. ī‚´ -a list of reliable vendors is prepared. ī‚´ the implementation team must prepare the request for proposal document based on their understanding of the hardware requirement of the new system. ī‚´ after the RFP is prepared it is sent by some mode of communication to the enlisted set of vendors. ī‚´ based on the evaluation a single vendor or a select set of vendors are chosen for delivery of hardware.
  • 68. Procurement of Software ī‚´ The new system being implemented will have been created based on assumptions of operating environment of the organization. ī‚´ Procurement of system software is done on similar lines as the procurement of hardware. ī‚´ The implementation team need not prepare the specification for the system software. They only need to procure the system software that the new system is designed to run on.
  • 69. Creating the Database ī‚´ In modern systems, data stores are databases. These databases are relational database management systems, which is a separate application software package. ī‚´ The database has to be created and structures inside the database have to be created in order to enable it to store data. ī‚´ The implementation team creates the database, its structures and rules so that the application system being implemented can be plugged into the database and start working.
  • 70. Training of Users ī‚´ The new system may get installed but without proper training of users, it may not be of good use. ī‚´ A training program is planned and the required training given to users. This is an important part of the implementation process and helps in reducing the resistance to change related behavior among the user community. ī‚´ The training also helps users to appreciate the new features of the new system and helps build trust and appreciation for the new system.
  • 71. Creating Physical Infrastructure ī‚´ The new system being implemented may require a physical infrastructure. ī‚´ The implementation team must ensure that the system performance must not suffer due to infrastructure bottlenecks. ī‚´ The implementers will have to use their persuasive skills and convince the management of the organization to create the required physical infrastructure so that it does not affect the performance of the new system.
  • 72. Transition to the New System ī‚´ The transition if done wrongly leads to a lot of pain. Hence, it is necessary to move slowly on the transition front. ī‚´ Normally, after the new system is installed and ready, the new system and the old system are both used for a period to ensure that the company performance does not suffer due to transition problems. ī‚´ Slowly when the users gain more capability to handle the new system the old system is phased out. ī‚´
  • 73.
  • 75. SDLC ī‚´ System: an organized collection of independent task and process that is designed to work together in order to accomplish specific objectives. ī‚´ SDLC refers to methodology for developing the system. It is a life span of a Information system from its initiation until it is removed or redesigned. ī‚´ It provides a consistent framework of task and deliverables needed to develop systems. ī‚´ SDLC has different phases:
  • 76. Requirement Specifications ī‚´ An information system requirement specification (SRS) is a description of a system to be developed, lying a functional and non- functional requirements. ī‚´ Information system requirement specification establishes the basis for agreement between the customer and contractors or suppliers on what the information product is to do as well as what it is not expected to do. ī‚´ To derive the requirements we need to have thorough understanding of the products to be developed or being developed. ī‚´ Detailed and continuous planning between project team and customer is required.
  • 77. Planning ī‚´ Once the project is initiated and gathered all relevant information, project planning begins. ī‚´ At the end of planning a clear project plan or schedule, from which everyone will follow their assigned task is delivered. ī‚´ Project planning software such as Microsoft projects are used for aid in planning process. ī‚´ To develop a project plan a list of task to be done, relationship between them and priority of each task is understood.
  • 78. Analysis ī‚´ System analysis is the process of collecting factual data, understanding the processes involved, identifying the problems and recommending feasible suggestions for improving the system functioning. ī‚´ It is more of a thinking process and involves the creative skill of the system analyst. ī‚´ It attempts to give birth to a new efficient system that satisfies the current need of the user and has scope for further growth within organizational constraints. ī‚´ The result is a logical system design.
  • 79. Feasibility Study ī‚´ Analysis of proposed system from different aspects so that it clears how practical and beneficial the system will be for the organization. ī‚´ It deals with economical aspect, technical aspect, operational aspect, behavioral aspect, schedule aspect, legal aspect about the system. ī‚´ It determines the future prospective about the new system. ī‚´ Feasibility study is the study of whether the system is feasible or not to design.
  • 80. Continuedâ€Ļ. ī‚´ The type of feasibility study are: ī‚´ Legal feasibility ī‚´ Operational feasibility ī‚´ Economic feasibility ī‚´ Technical feasibility ī‚´ Schedule Feasibility
  • 81. Design ī‚´ Based on the user requirements and the detailed analysis of a new system, the new system must be designed. ī‚´ The logical system design arrived at as a result of system analysis and is converted into physical system design. ī‚´ A detailed description of what is needed to solve original problem, Input , Output, databases, forms, files and processing specifications are drawn in detail. ī‚´ Programming language, Hardware, software platform in which new system run are decided. ī‚´ Tools and techniques like Algorithm, flowchart, Data flow diagram, data dictionary, Decision table, decision tree are used in system design.
  • 82. Development ī‚´ The system design must be implemented to make it workable system. ī‚´ It is a programming phase in which the programmer converts the program specifications to computer instructions. ī‚´ Programming tools like compilers, interpreters and language like C++, VB, PHP and java etc. are used for coding with respect to the type of application with the right choice of programming language.
  • 83. Documentation ī‚´ It is written in local understandable language explaining in details about the system. ī‚´ This ensures the continuity of a system. ī‚´ Generally following two types of documentations are prepared for any system. ī‚´ User or Operator documentation ī‚´ System documentation
  • 84. Implementation ī‚´ Implementation involves testing the installed system, converting from the old system to the new system to the one and training the users. ī‚´ This phase consists of implementation of the system into a production environment, and the resolution of the problem identified in testing phase. ī‚´ The major steps involved in this phase are: ī‚´ Installation of hardware and software ī‚´ Conversion ī‚´ User training ī‚´ Documentation
  • 85. Maintenance and review ī‚´ When the system is implemented, maintenance and modification begins. ī‚´ If a system is inconsistent with the design specifications, them changes have to be made. ī‚´ The software and hardware also requires periodic maintenance so as to keep In tune with design specification and to innovate new ideas into system.
  • 86. Types of SDLC Models ī‚´ The development models are the various processes or methodologies that are being selected for the development of the project depending on the project’s aims and goals. ī‚´ It may be required to choose the SDLC phases according to the specific needs of the project. ī‚´ These different requirements and needs gives us various software development approaches to choose from during software implementation. ī‚´ There are various software development methologies.
  • 87. Waterfall Model ī‚´ It is referred to as linear- sequential model. It is simple to use and understand. ī‚´ Each phase must be completed before the next phase and there is no overlapping. ī‚´ The phases of waterfall model are: Requirement gathering and analysis: All the possible requirements of the system to be developed are captured in this phase and documented in a requirement specification documents. System Design: system design helps in specifying hardware and system requirements and also helps in defining overall system architecture.
  • 88. Continuedâ€Ļâ€Ļ. ī‚´ Implementation: The design is implemented and converted into specific programming language known as coding. The system is first developed into small programs called units, tested individually which is integrated in next phase. ī‚´ Integration and testing: All the units developed in the implementation phase and integrated into a system after testing of each unit. ī‚´ Deployment of system: once the functional and non functional testing is done, the product is deployed in the customer environment or released into market. ī‚´ Maintenance: there are issues which comes into clients environment. These issues are fixed and to enhance the product better version are released.
  • 90. Spiral Model ī‚´ It is combination of iterative development model and sequential linear development model. i.e. waterfall model with high emphasis on risk analysis. ī‚´ In each iteration of the spiral approach, software development process follow the phase- wise linear approach. ī‚´ The spiral phases are: Customer communication: it includes understanding the system requirements by continuous communication between the customer and system analyst. Planning: it includes estimating schedule, cost, and resource for the iteration.
  • 91. continued ī‚´ Risk analysis: it includes identifying, estimating, and monitoring technical and management risk, such as schedule slippage and cost overrun. ī‚´ Engineering: it includes requirement gathering and design of the software system. ī‚´ Construction and release: it includes coding, testing, and deploying software at the customer site and providing user- support document. ī‚´ Customer evaluation: it includes evaluation of software by the customer and implementing feedback in the next iteration of the software development.
  • 93. Prototyping ī‚´ Creates prototype that looks and acts like the desired product in order to test its usefulness. ī‚´ The prototype is essential part of the requirements determination phase and may be created using tools different from those used in final product. ī‚´ Once the prototype is approved it is discarded and the real software is written.
  • 95. Iterative model ī‚´ It allows the developer to take a small segment of the application and develop it in a fashion that, at each recursion, the application is improved. ī‚´ Each of three main sections: requirements definition, system design, and coding and testing are improved with each cycle through the process.
  • 97. The factors of failure and success of MIS.

Editor's Notes

  1. Should not be fast (eg traffic), fast (automatic engine control) Moving mouse real time Watching video online
  2. Photograph is information, what we look like is data. Data is always correct but information can be wrong.
  3. Once produced plan business one needs to monitor progress against plan and control resources. Information needen to identify weather things are going better or worse. Perfomance measuring. Collecting analyzing information on sales, costs and rofit.
  4. Census Library
  5. Market reaserach
  6. Is depends upon the above resources to perform input, processing, storage, control and output.
  7. Malicious codes, viruses
  8. Accept or Reject a Special Order Sell or Process Further Product Combination in Maximizing Scarce Resources
  9. R1: man(x)=> mortal (x) If X croaks and X eats flies - Then X is a frog If X chirps and X sings - Then X is a canary If X is a frog - Then X is green If X is a canary - Then X is yellow Fritz croaks Fritz eats flies Fritz is a frog Fritz is green If Fritz is a frog – Then Fritz is green Fritz is a frog- new goal If Fritz croaks and Fritz eats flies – Then Fritz is a frog