SlideShare a Scribd company logo
1 of 22
MuhammadDanish| www.knowledgedep.blogspot.com
M.I.S
MuhammadDanish
Roll No. 119467, Section: A,
3rd semester,
M.Com
1st Assignment
Q: 1- Why is information system so essentialfor running and managing
a business today?
Answer:
INFORMATION SYSTEM:
A special form of information system is a management information system (MIS), which
provides information for managing an enterprise. IS (information services) is a common name
for an organization within an enterprise that is responsible for its data processing and information
system or systems.
“A combination of hardware, software, infrastructure and trained personnel organized to
facilitate planning, control, coordination, and decision making in an organization.”
ESSENTIAL OF INFORMATION SYSTEMFOR A BUSINESS
1. To Reduce Operating Costs.
Record keeping requires administrative dollars, space in offices, and staffing to
maintain an organized filing system. It costs considerably less per linear foot to
store inactive records in an Information System.
2. To Improve Efficiency and Productivity.
Time spent searching for missing or misfiled records are non-productive; a good
Information System helps any organization upgrade its recordkeeping systems so that
information retrieval is enhanced.
3. To Minimize Litigation Risks.
Business organizations implement management Information Systems and
programs in order to reduce the risks associated with litigation and potential penalties,
especially government agencies.
4. To Safeguard Vital Information.
Every organization, public or private, needs a comprehensive program for
protecting its vital records and information from catastrophe or disaster, because every
organization is vulnerable to loss; PLAN to protect records.
5. To Support BetterManagement Decision Making.
A good Information System can help ensure that managers and executives have
the information they need when they need it; Likewise, implementing a good ERP system
to take account of all the business' processes, both financial and operational will give an
organization more advantages than one who was operating a manually based system.
6. To Preserve the Corporate Memory.
This is an irreplaceable asset that is often overlooked; every business day, you
create the records, which could become background data for future management
decisions and planning
7. Day to Day survival
Business invests in these systems to make their jobs as easy as possibly. An
example is Citibank introduced the first ATM machine to make it easier for customers to
access their money and to cut down queues in their banks.
8. New product services and business models
I.S systems play a major role for businesses in creating new products and
services. New business models can be created and these can describe how a company
produce, create and sell there products.
9. Customer and Supplier intimacy
The better services a company provides its consumers with more likely they are
too come back to them and as result the more they will buy off the supplier therefore
creating a good relationship with both parties.
10. Competitive advantage
If companies achieve any above reasons to use I.S they will generally create a
competitive advantage over their rivals.
Q: 2- What exactly is an information system? How does it work? What
are its management, organizationand technologycomponents?
Answer:
INFORMATION SYSTEM:
An information system as a set of interrelated components that work together to collect,
process, store, and disseminate information to support decision making, coordination, control,
analysis, and visualization in an organization.
A special form of information system is a management information system (MIS), which
provides information for managing an enterprise. IS (information services) is a common name
for an organization within an enterprise that is responsible for its data processing and information
system or systems.
INFORMATION SYSTEM WORKING:
Three activities in an information system produce the information that organizations need
to make decisions, control operations, analyze problems, and create new products or services.
These activities are input, processing, and output.
1. Input
Input captures or collects raw data from within the organization or from its
external environment.
2. Process
Processing converts this raw input into a meaningful form for make decisions,
control operations, analyze problems, and create new products or services.
3. Output
Output transfers the processed information to the organization or people who will
use it or to the activities for which it will be used.
4. Feedback
Feedback is the output that is returned to appropriate members of the organization
to help them evaluate or correct the input stage for develop the goodwill as well
as possible.
MANAGEMENT, ORGANIZATION AND TECHNOLOGY COMPONENTS OF
INFORMATION SYSTEM
1. Management Components:
The management dimension of information systems involves issues such as;
 Leadership,
 Strategy,
 And management behavior.
2. Organization Components:
The organization dimension of information systems involves issues such as;
 The organization’s hierarchy,
 Functional specialties,
 Business processes,
 Culture,
 And political interest groups.
3. Technological components:
The technology dimension consists of;
 Computer hardware,
 Software,
 Data management technology,
 And networking/telecommunications technology (including the
Internet).
Q: 3- How do systems serve the different management groups in a
business?
Answer:
SYSTEMS SERVE THE DIFFERENT MANAGEMENT GROUPS
A business firm has systems to support different groups or levels of management. These
systems include transaction processing systems and systems for business intelligence.
1. Transaction Processing Systems:
Operational managers need systems that keep track of the elementary activities
and transactions of the organization, such as sales, receipts, cash deposits, payroll, credit
decisions, and the flow of materials in a factory. Transaction processing systems (TPS)
provide this kind of information. A transaction processing system is a computerized system
that performs and records the daily routine transactions necessary to conduct business, such
as sales order entry, hotel reservations, payroll, employee record keeping, and shipping.
The principal purpose of systems at this level is to answer routine questions and
to track the flow of transactions through the organization. How many parts are in inventory?
What happened to Mr. Smith’s payment? To answer these kinds of questions, information
generally must be easily available, current, and accurate.
At the operational level, tasks, resources, and goals are predefined and highly
structured. The decision to grant credit to a customer, for instance, is made by a lower-level
supervisor according to predefined criteria. All that must be determined is whether the
customer meets the criteria.
2. Systems for business intelligence:
Firms also have business intelligence systems that focus on delivering information to
support management decision making. Business intelligence is a contemporary term for data
and software tools for organizing, analyzing, and providing access to data to help managers
and other enterprise users make more informed decisions. Business intelligence addresses the
decision-making needs of all levels of management.
Business intelligence systems for middle management help with monitoring,
controlling, decision-making, and administrative activities. Management information systems
as the study of information systems in business and management. The term management
information systems (MIS) also designates a specific category of information systems
serving middle management. MIS provide middle managers with reports on the
organization’s current performance. This information is used to monitor and control the
business and predict future performance.
MIS summarize and report on the company’s basic operations using data supplied by
transaction processing systems. The basic transaction data from TPS are compressed and
usually presented in reports that are produced on a regular schedule. Today, many of these
reports are delivered online.
Other types of business intelligence systems support more non-routine decision making.
Decision-support systems (DSS) focus on problems that are unique and rapidly changing, for
which the procedure for arriving at a solution may not be fully predefined in advance. They try to
answer questions such as these: What would be the impact on production schedules if we were to
double sales in the month of December? What would happen to our return on investment if a
factory schedule were delayed for six months?
Although DSS use internal information from TPS and MIS, they often bring in information
from external sources, such as current stock prices or product prices of competitors. These
systems are employed by “super-user” managers and business analysts who want to use
sophisticated analytics and models to analyze data.
Q: 4- How do systems that link the enterprise improve organizational
performance?
Answer:
SYSTEMS FOR LINKING THE ENTERPRISE
Manager might wonder how a business can manage all the information in these different
systems. He might also wonder how costly it is to maintain so many different systems. And he
might wonder how all these different systems can share information and how managers and
employees are able to coordinate their work. In fact, these are all important questions for
businesses today.
1. ENTERPRISE APPLICATIONS:
Enterprise applications help businesses become more flexible and productive by
coordinating their business processes more closely and integrating groups of processes so
they focus on efficient management of resources and customer service. There are four major
enterprise applications:
a) Enterprise system:
Firms use enterprise systems, also known as enterprise resource planning (ERP)
systems, to integrate business processes in manufacturing and production, finance and
accounting, sales and marketing, and human resources into a single software system.
Information that was previously fragmented in many different systems is stored in a
single comprehensive data repository where it can be used by many different parts of the
business.
For example, when a customer places an order, the order data flow automatically
to other parts of the company that are affected by them. The order transaction triggers the
warehouse to pick the ordered products and schedule shipment. The warehouse informs
the factory to replenish whatever has been depleted. The accounting department is
notified to send the customer an invoice. Customer service representatives track the
progress of the order through every step to inform customers about the status of their
orders. Managers are able to use firm wide information to make more precise and timely
decisions about daily operations and longer-term planning.
b) Supply Chain Management Systems:
Firms use supply chain management (SCM) systems to help manage relationships
with their suppliers. These systems help suppliers, purchasing firms, distributors, and
logistics companies share information about orders, production, inventory levels, and
delivery of products and services so they can source, produce, and deliver goods and
services efficiently. The ultimate objective is to get the right amount of their products
from their source to their point of consumption in the least amount of time and at the
lowest cost. These systems increase firm profitability by lowering the costs of moving
and making products and by enabling managers to make better decisions about how to
organize and schedule sourcing, production, and distribution.
c) Customer Relationship Management Systems
Firms use customer relationship management (CRM) systems to help manage
their relationships with their customers. CRM systems provide information to coordinate
all of the business processes that deal with customers in sales, marketing, and service to
optimize revenue, customer satisfaction, and customer retention. This information helps
firms identify, attract, and retain the most profitable customers; provide better service to
existing customers; and increase sales.
d) Knowledge Management Systems
Some firms perform better than others because they have better knowledge about
how to create, produce, and deliver products and services. This firm knowledge is unique,
difficult to imitate, and can be leveraged into long-term strategic benefits.
Knowledge management systems (KMS) enable organizations to better manage
processes for capturing and applying knowledge and expertise. These systems collect all
relevant knowledge and experience in the firm, and make it available wherever.
2. INTRANETS AND EXTRANETS:
Enterprise applications create deep-seated changes in the way the firm conducts
its business, offering many opportunities to integrate important business data into a single
system. They are often costly and difficult to implement. Intranets and extranets deserve
mention here as alternative tools for increasing integration and expediting the flow of
information within the firm, and with customer’s ad suppliers.
Intranets are simply internal company Web sites that are accessible only by
employees. The term “intranet” refers to an internal network, in contrast to the Internet,
which is a public network linking organizations and other external networks. Intranets use the
same technologies and techniques as the larger Internet, and they often are simply a private
access area in a larger company Web site. Likewise with extranets. Extranets are company
Web sites that are accessible to authorized vendors and suppliers, and are often used to
coordinate the movement of supplies to the firm’s production apparatus.
For example, Six Flags, which operates 19 theme parks throughout North
America, maintains an intranet for its 2,500 full-time employees that provide company
related news and information on each park’s day-to-day operations, including weather
forecasts, performance schedules, and details about groups and celebrities visiting the parks.
The company also uses an extranet to broadcast information about schedule changes and park
events to its 30,000 seasonal employees.
Q: 5- What is the role of the information systems function in a business.
Answer:
THE INFORMATION SYSTEMS DEPARTMENT
The information systems department consists of specialists, such as:
 Programmers are highly trained technical specialists who write the software instructions
for computers.
 Systems analysts constitute the principal liaisons between the information systems
groups and the rest of the organization. It is the systems analyst’s job to translate business
problems and requirements into information requirements and systems.
 Information systems managers are leaders of teams of programmers and analysts,
project managers, physical facility managers, telecommunications managers, or database
specialists. They are also managers of computer operations and data entry staff. Also,
external specialists, such as hardware vendors and manufacturers, software firms, and
consultants, frequently participate in the day-to-day operations and long-term planning of
information systems.
 Chief information officer (CIO) is a senior manager who oversees the use of
information technology in the firm. Today’s CIOs are expected to have a strong business
background as well as information systems expertise and to play a leadership role in
integrating technology into the firm’s business strategy. Large firms today also have
positions for a chief security officer, chief knowledge officer, and chief privacy officer,
all of whom work closely with the CIO.
 The chief security officer (CSO) is in charge of information systems security for the
firm and is responsible for enforcing the firm’s information security policy (Sometimes
this position is called the chief information security officer [CISO] where information
systems security is separated from physical security). The CSO is responsible for
educating and training users and information systems specialists about security, keeping
management aware of security threats and breakdowns, and maintaining the tools and
policies chosen to implement security.
 The chief knowledge officer (CKO) is responsible for the firm’s knowledge
management program. The CKO helps design programs and systems to find new sources
of knowledge or to make better use of existing knowledge in organizational and
management processes.
 End users are representatives of departments outside of the information systems group
for whom applications are developed. These users are playing an increasingly large role
in the design and development of information systems.
ORGANIZING THE INFORMATION SYSTEMS FUNCTION
There are many types of business firms, and there are many ways in which the IT
function is organized within the firm. A very small company will not have a formal information
systems group. It might have one employee who is responsible for keeping its networks and
applications running, or it might use consultants for these services. Larger companies will have a
separate information systems department, which may be organized along several different lines,
depending on the nature and interests of the firm. Our Learning Track describes alternative ways
of organizing the information systems function within the business.
Q: 6- How does porter’s competitive forces model help companies
develop competitive strategies using information systems?
Answer:
PORTER’S COMPETITIVE FORCES MODEL:
This model provides a general view of the firm, its competitors, and the firm’s
environment. Porter’s model is all about the firm’s general business environment. In this model,
five competitive forces shape the fate of the firm.
1. Traditional Competitors
All firms share market space with other competitors who are continuously
devising new, more efficient ways to produce by introducing new products and services, and
attempting to attract customers by developing their brands and imposing switching costs on
their customers.
2. New Market Entrants
In a free economy with mobile labor and financial resources, new companies are
always entering the marketplace. In some industries, there are very low barriers to entry,
whereas in other industries, entry is very difficult. For instance, it is fairly easy to start a
pizza business or just about any small retail business, but it is much more expensive and
difficult to enter the computer chip business, which has very high capital costs and requires
significant expertise and knowledge that is hard to obtain. New companies have several
possible advantages: They are not locked into old plants and equipment, they often hire
younger workers who are less expensive and perhaps more innovative, they are not
encumbered by old worn-out brand names, and they are “more hungry” (more highly
motivated) than traditional occupants of an industry. These advantages are also their
weakness: They depend on outside financing for new plants and equipment, which can be
expensive; they have a less-experienced workforce; and they have little brand recognition.
3. Substitute Products and Services:
In just about every industry, there are substitutes that your customers might use if
your prices become too high. New technologies create new substitutes all the time. Even oil
has substitutes: Ethanol can substitute for gasoline in cars; vegetable oil for diesel fuel in
trucks; and wind, solar, coal, and hydro power for industrial electricity generation. Likewise,
the Internet telephone service can substitute for traditional telephone service, and fiber-optic
telephone lines to the home can substitute for cable TV lines. And, of course, an Internet
music service that allows you to download music tracks to an iPod is a substitute for CD-
based music stores. The more substitute products and services in your industry, the less you
can control pricing and the lower your profit margins.
4. Customers
A profitable company depends in large measure on its ability to attract and retain
customers (while denying them to competitors), and charge high prices. The power of
customers grows if they can easily switch to a competitor’s products and services, or if they
can force a business and its competitors to compete on price alone in a transparent
marketplace where there is little product differentiation, and all prices are known instantly
(such as on the Internet). For instance, in the used college textbook market on the Internet,
students (customers) can find multiple suppliers of just about any current college textbook. In
this case, online customers have extraordinary power over used-book firms.
5. Suppliers
The market power of suppliers can have a significant impact on firm profits,
especially when the firm cannot raise prices as fast as can suppliers. The more different
suppliers a firm has, the greater control it can exercise over suppliers in terms of price,
quality, and delivery schedules. For instance, manufacturers of laptop PCs almost always
have multiple competing suppliers of key components, such as keyboards, hard drives, and
display screens.
Q: 7- How do the value chain and value web models help business
identify opportunities for strategic information system
applications?
Answer:
VALUE CHAIN:
This model identifies specific, critical leverage points where a firm can use
information technology most effectively to enhance its competitive position. The value chain
model views the firm as a series or chain of basic activities that add a margin of value to a firm’s
products or services. These activities can be categorized as either primary activities or support
activities. Value Chain Model
views the firm as a series of
activities that add value to
products and services. Then,
these activities which can be
primary or support activities are
highlighted where competitive
strategies can best be applied. At
each stage, it is determined how
information systems can
improve operational efficiency
and improve customer and
supplier intimacy. Using the
business value chain model will
cause the organization to utilize
benchmarking and best
practices. I work in retail and we
actually use best practices, we
are always brain storming with other venue locations and sharing our "best practices" we use to
drive sales, capture more guests, and how to up a sale.
Primary activities
Primary activities are most directly related to the production and distribution of the firm’s
products and services, which create value for the customer. Primary activities include inbound
logistics, operations, outbound logistics, sales and marketing, and service. Inbound logistics
includes receiving and storing materials for distribution to production.
Support Activities
Support activities make the delivery of the primary activities possible and consist of
organization infrastructure (administration and management), human resources (employee
recruiting, hiring, and training), technology (improving products and the production process),
and procurement (purchasing input).
Using the business value chain model will also cause you to consider benchmarking your
business processes against your competitors or others in related industries, and identifying
industry best practices. Benchmarking involves comparing the efficiency and effectiveness of
your business processes against strict standards and then measuring performance against those
standards. Industry best practices are usually identified by consulting companies, research
organizations, government agencies, and industry associations as the most successful solutions or
problem-solving methods for consistently and effectively achieving a business objective.
VALUE WEB:
Value Web Models is a collection of independent firms using highly synchronized IT to
coordinate value chains to produce or service collectively. It is more customers driven and works
in a less linear operation than value chain. The book uses Amazon as an example making your
system more effective and efficient overall as a website retailer, and internet technology has
made it possible through the value web models. The Value Web is a global network of
passionate individuals who want to help you affect positive change. We design and facilitate
collaboration around the world.
The Value Web Model is made up of four major components - each in themselves a network
which can be Value Web architecture on anther level of recursion. They are:
1. The user (customer) network;
2. The producer network (including supply chain);
3. the investor network (including social investors)
4. And, the system integrator (management).
No matter the size of a Value Web, these four components have to be in relative balance
with one another else the web will be distorted and start acting in strange and unstable ways. The
Networks themselves and made up of sectors (we call them “clamshells”) each with its own
unique function. In all, there are 22 distinct types of components and sub-components that make
up a mature Value Web. Each will “play” differently in any particular Value Web. Nevertheless,
understanding the basic nature of these components is all that is required to start discovering how
Value Webs work and to engage in the design process of making one.
Q: 8- How does information system help business use synergies, core
competences, and network based strategies to achieve competitive
advantage?
Answer:
A large corporation is typically a collection of businesses. Often, the firm is organized
financially as a collection of strategic business units and the returns to the firm are directly tied
to the performance of all the strategic business units. Information systems can improve the
overall performance of these business units by promoting synergies and core competencies.
SYNERGIES:
The idea of synergies is that when the output of some units can be used as inputs to other
units, or two organizations pool markets and expertise, these relationships lower costs and
generate profits. Recent bank and financial firm mergers, such as the merger of JPMorgan Chase
and Bank of New York as well as Bank of America and Countrywide Financial Corporation
occurred precisely for this purpose.
One use of information technology in these synergy situations is to tie together the operations of
disparate business units so that they can act as a whole. For example, acquiring Countrywide
Financial enabled Bank of America to extend its mortgage lending business and to tap into a
large pool of new customers who might be interested in its credit card, consumer banking, and
other financial products. Information systems would help the merged companies consolidate
operations, lower retailing costs, and increase cross-marketing of financial products.
ENHANCING CORE COMPETENCIES:
Core competency is an activity for which a firm is a world-class leader. Core
competencies may involve being the world’s best miniature parts designer, the best package
delivery service, or the best thin-film manufacturer. In general, a core competency relies on
knowledge that is gained over many years of practical field experience with a technology. This
practical knowledge is typically supplemented with a long-term research effort and committed
employees.
Any information system that encourages the sharing of knowledge across business units
enhances competency. Such systems might encourage or enhance existing competencies and help
employees become aware of new external knowledge; such systems might also help a business
leverage existing competencies to related markets.
NETWORK-BASED STRATEGIES
Network economics refers to business economics that benefit from the network effect. It
is also known as Netromix. This is when the value of a good or service increases when others
buy the same good or service. The network economy is the emerging economic order within the
information society. The name stems from a key attribute - products and services are created and
value is added through social networks operating on large or global scales.
Virtual Company Model: Virtual Business Model (not to be confused with Virtual
Business), is a way to organize an innovative startup company and facilitates increased
flexibility in the utilization of both financial and human resources and can promote
development of new ideas and inventions.
Business Ecosystems: The network of organizations including suppliers, distributors,
customers, competitors, government agencies and so on involved in the delivery of a
specific product or service through both competition and cooperation.
Q: 9- Why do contemporary information systems technology and the
internet pose challenges to the protection of individual privacy
and intellectual property?
Answer:
CONTEMPORARY INFORMATION SYSTEMS TECHNOLOGY
Contemporary data storage and data analysis technology enables companies to easily
gather personal data about individuals from many different sources and analyze these data to
create detailed electronic profiles about individuals and their behaviors.
PRIVACY:
Privacy is the claim of individuals to be left alone, free from surveillance or interference
from other individuals or organizations, including the state. Claims of privacy are also involved
at the workplace.
FAIR INFORMATION:
Fair information practices are a set of principles governing the collection and use of
information about individuals. FIP principles are based on the notion of a mutuality of interest
between the record holder and the individual.
INTERNET CHALLENGES TO INDIVIDUAL PRIVACY
Internet technology has posed new challenges for the protection of individual privacy.
Information sent over this vast network of networks may pass through many different computer
systems before it reaches its final destination. Each of these systems is capable of monitoring,
capturing, and storing communications that pass through it.
Cookies are small text files deposited on a computer hard drive when a user visits Web
sites. Cookies identify the visitor’s Web browser software and track visits to the Web site. When
the visitor returns to a site that has stored a cookie, the Web site software will search the visitor’s
computer, find the cookie, and know what that person has done in the past. It may also update
the cookie, depending on the activity during the visit. In this way, the site can customize its
content for each visitor’s interests. For example, if you purchase a book on Amazon.com and
return later from the same browser, the site will welcome you by name and recommend other
books of interest based on your past purchases. Double Click, described earlier in this chapter,
uses cookies to build its dossiers with details of online purchases and to examine the behavior of
Web site visitors.
CHALLENGES TO INTELLECTUAL PROPERTY RIGHTS
Traditional copyright laws are insufficient to protect against software piracy because
digital material can be copied so easily. Internet technology also makes intellectual property even
more difficult to protect because digital material can be copied easily and transmitted to many
different locations simultaneously over the Net. Web pages can be constructed easily using
pieces of content from other Web sites without permission.
Contemporary information technologies, especially software, pose severe challenges to
existing intellectual property regimes and, therefore, create significant ethical, social, and
political issues. Digital media differ from books, periodicals, and other media in terms of ease of
replication; ease of transmission; ease of alteration; difficulty in classifying a software work as a
program, book, or even music; compactness—making theft easy; and difficulties in establishing
uniqueness.
The proliferation of electronic networks, including the Internet, has made it even more
difficult to protect intellectual property. Before widespread use of networks, copies of software,
books, magazine articles, or films had to be stored on physical media, such as paper, computer
disks, or videotape, creating some hurdles to distribution. Using networks, information can be
more widely reproduced and distributed.
Q: 10- What are the stages and technology drivers of IT infrastructure
evolution?
Answer:
An IT infrastructure consists of a set of physical devices and software applications that
are required to operate the entire enterprise. But an IT infrastructure is also a set of firm wide
services budgeted by management and comprising both human and technical capabilities.
Technologies that characterize one era may also be used in another time period for other
purposes. For example, some companies still run traditional mainframe systems or use
mainframe computers as massive servers supporting large Web sites and corporate enterprise
applications.
1st Stage - General-Purpose Mainframe and Minicomputer Era: (1959 to Present):
Mainframe computers (colloquially referred to as "big iron") are computers used
primarily by large organizations for critical applications, bulk data processing, such as census,
industry and consumer statistics, enterprise resource planning, and transaction processing.
The introduction of the IBM 1401 and 7090 transistorized machines in 1959 marked the
beginning of widespread commercial use of mainframe computers. In 1965, the mainframe
computer truly came into its own with the introduction of the IBM 360 series. The 360 was the
first commercial computer with a powerful operating system that could provide time sharing,
multitasking, and virtual memory in more advanced models.
2nd Stage - Personal Computer Era: (1981 to Present):
A personal computer (PC) is a small, relatively inexpensive computer designed for
an individual user. In price, personal computers range anywhere from a few hundred dollars to
thousands of dollars. All are based on the microprocessor technology that enables manufacturers
to put an entire CPU on one chip.
Although the first truly personal computers (PCs) appeared in the 1970s (the Xerox Alto,
the MITS Altair 8800, and the Apple I and II, to name a few), these machines had only limited
distribution to computer enthusiasts. The appearance of the IBM PC in 1981 is usually
considered the beginning of the PC era because this machine was the first to be widely adopted
by American businesses. At first using the DOS operating system, a text-based command
language.
3rd stage - Client/Server Era (1983 to Present):
In client/server computing, desktop or laptop computers called clients are networked to
powerful server computers that provide the client computers with a variety of services and
capabilities. Computer processing work is split between these two types of machines. The client
is the user point of entry, whereas the server typically processes and stores shared data, serves up
Web pages, or manages network activities. The term “server” refers to both the software
application and the physical computer on which the network software runs. The server could be a
mainframe, but today, server computers typically are more powerful versions of personal
computers, based on inexpensive chips and often using multiple processors in a single computer
box, or in server racks.
4th stage - Enterprise Computing Era (1992 to Present):
In the early 1990s, firms turned to networking standards and software tools that could
integrate disparate networks and applications throughout the firm into an enterprise-wide
infrastructure. As the Internet developed into a trusted communications environment after 1995,
business firms began seriously using the Transmission Control Protocol/Internet Protocol
(TCP/IP) networking standard to tie their disparate networks together.
The resulting IT infrastructure links different pieces of computer hardware and smaller
networks into an enterprise-wide network so that information can flow freely across the
organization and between the firm and other organizations. It can link different types of
computer hardware, including mainframes, servers, PCs, and mobile devices, and it includes
public infrastructures such as the telephone system, the Internet, and public network service.
5th Stage - Cloud and Mobile Computing Era (2000 to Present)
Mobile Cloud Computing (MCC) is the combination of cloud computing, mobile
computing and wireless networks to bring rich computational resources to mobile users, network
operators, as well as cloud computing providers. Cloud computing refers to a model of
computing that provides access to a shared pool of computing resources (computers, storage,
applications, and services) over a network, often the Internet. These “clouds” of computing
resources can be accessed on an as-needed basis from any connected device and location.
IBM, HP, Dell, and Amazon operate huge, scalable cloud computing centers that provide
computing power, data storage, and high-speed Internet connections to firms that want to
maintain their IT infrastructures remotely. Software firms such as Google, Microsoft, SAP,
Oracle, and Salesforce.com sell software applications as services delivered over the Internet.
How IS Systems Improve Organizational Performance

More Related Content

What's hot

Management information system
Management information systemManagement information system
Management information systemRohit Mishra
 
Office Automation System (OAS)
Office Automation System (OAS)Office Automation System (OAS)
Office Automation System (OAS)Jaisha Jaikishan
 
Chapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case StudyChapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case Studymanagement 2
 
Executive information system ( eis )
Executive information system ( eis )Executive information system ( eis )
Executive information system ( eis )Puja Dhakal
 
information system in business today
information system in business todayinformation system in business today
information system in business todayshriya jha
 
Introduction to management information system
Introduction to management information systemIntroduction to management information system
Introduction to management information systemOnline
 
Six major types of information systems
Six major types of information systemsSix major types of information systems
Six major types of information systemsMohanraj V
 
Business Intelligence - A Management Perspective
Business Intelligence - A Management PerspectiveBusiness Intelligence - A Management Perspective
Business Intelligence - A Management Perspectivevinaya.hs
 
Chap10 Decision Support Systems
Chap10 Decision Support SystemsChap10 Decision Support Systems
Chap10 Decision Support SystemsAqib Syed
 
Lesson 5: Information Systems Presentation
Lesson 5: Information Systems PresentationLesson 5: Information Systems Presentation
Lesson 5: Information Systems PresentationKereen Tatham
 
Foundation of information system in business
Foundation of information system in businessFoundation of information system in business
Foundation of information system in businessAmrit Banstola
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information systemPROF.JITENDRA PATEL
 
What's Digital Transformation?
What's Digital Transformation?What's Digital Transformation?
What's Digital Transformation?Hải Phạm
 
Management information systems
Management information systemsManagement information systems
Management information systemsDheeraj Negi
 
Digital transformation
Digital transformationDigital transformation
Digital transformationAhmar Hasan
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing systemJayson Jueco
 

What's hot (20)

Cbis
CbisCbis
Cbis
 
Management information system
Management information systemManagement information system
Management information system
 
Office Automation System (OAS)
Office Automation System (OAS)Office Automation System (OAS)
Office Automation System (OAS)
 
Chapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case StudyChapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case Study
 
Executive information system ( eis )
Executive information system ( eis )Executive information system ( eis )
Executive information system ( eis )
 
information system in business today
information system in business todayinformation system in business today
information system in business today
 
Introduction to management information system
Introduction to management information systemIntroduction to management information system
Introduction to management information system
 
Six major types of information systems
Six major types of information systemsSix major types of information systems
Six major types of information systems
 
Business Intelligence - A Management Perspective
Business Intelligence - A Management PerspectiveBusiness Intelligence - A Management Perspective
Business Intelligence - A Management Perspective
 
Information Systems (Lecture 1)
Information Systems (Lecture 1)Information Systems (Lecture 1)
Information Systems (Lecture 1)
 
Chap10 Decision Support Systems
Chap10 Decision Support SystemsChap10 Decision Support Systems
Chap10 Decision Support Systems
 
Lesson 5: Information Systems Presentation
Lesson 5: Information Systems PresentationLesson 5: Information Systems Presentation
Lesson 5: Information Systems Presentation
 
INFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESSINFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESS
 
Foundation of information system in business
Foundation of information system in businessFoundation of information system in business
Foundation of information system in business
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information system
 
Decision Support System - Presentation Slides
Decision Support System - Presentation SlidesDecision Support System - Presentation Slides
Decision Support System - Presentation Slides
 
What's Digital Transformation?
What's Digital Transformation?What's Digital Transformation?
What's Digital Transformation?
 
Management information systems
Management information systemsManagement information systems
Management information systems
 
Digital transformation
Digital transformationDigital transformation
Digital transformation
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 

Similar to How IS Systems Improve Organizational Performance

Business process and is lecture 2
Business process and is lecture 2Business process and is lecture 2
Business process and is lecture 2Raphael Wanjiku
 
Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2sparkeyrob
 
Lectures 2-and-3-questions.qwerty
Lectures 2-and-3-questions.qwertyLectures 2-and-3-questions.qwerty
Lectures 2-and-3-questions.qwertyCeazar Nell Ambulo
 
MIS assignment for share
MIS assignment for shareMIS assignment for share
MIS assignment for sharehoneyshah
 
Mis for share
Mis for shareMis for share
Mis for sharehoneyshah
 
Management information system
Management information systemManagement information system
Management information systemParth Desani
 
Information Systems, Data and MIS
Information Systems, Data and MISInformation Systems, Data and MIS
Information Systems, Data and MISMohit Bansal
 
4. Fundamental MIS Information Systems Presentation
4. Fundamental MIS  Information Systems Presentation4. Fundamental MIS  Information Systems Presentation
4. Fundamental MIS Information Systems PresentationMirMdAkhiruggaman
 
MIS in businesses.pdf
MIS in businesses.pdfMIS in businesses.pdf
MIS in businesses.pdfElsaFarman2
 
MIS in businesses.pdf
MIS in businesses.pdfMIS in businesses.pdf
MIS in businesses.pdfElsaFarman2
 
Running head Key Factors in Computer Information Systems1Ke.docx
Running head Key Factors in Computer Information Systems1Ke.docxRunning head Key Factors in Computer Information Systems1Ke.docx
Running head Key Factors in Computer Information Systems1Ke.docxwlynn1
 
Chapter 6Systems6.1 Information Systems6.1.1 What
Chapter 6Systems6.1 Information Systems6.1.1 What Chapter 6Systems6.1 Information Systems6.1.1 What
Chapter 6Systems6.1 Information Systems6.1.1 What JinElias52
 
Ch01 The Information Sys (Accountant's Perspective).ppt
Ch01 The Information Sys (Accountant's Perspective).pptCh01 The Information Sys (Accountant's Perspective).ppt
Ch01 The Information Sys (Accountant's Perspective).pptkhawlamuseabd
 
Accounting information sysytem @ doms
Accounting information sysytem @ domsAccounting information sysytem @ doms
Accounting information sysytem @ domsBabasab Patil
 

Similar to How IS Systems Improve Organizational Performance (20)

Business process and is lecture 2
Business process and is lecture 2Business process and is lecture 2
Business process and is lecture 2
 
Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2
 
Lectures 2-and-3-questions.qwerty
Lectures 2-and-3-questions.qwertyLectures 2-and-3-questions.qwerty
Lectures 2-and-3-questions.qwerty
 
MIS assignment for share
MIS assignment for shareMIS assignment for share
MIS assignment for share
 
Mis for share
Mis for shareMis for share
Mis for share
 
All in one mis
All in one misAll in one mis
All in one mis
 
All in one mis
All in one misAll in one mis
All in one mis
 
MODULE - I.pptx
MODULE - I.pptxMODULE - I.pptx
MODULE - I.pptx
 
p22252ppt1.pptx
p22252ppt1.pptxp22252ppt1.pptx
p22252ppt1.pptx
 
Management information system
Management information systemManagement information system
Management information system
 
Information Systems, Data and MIS
Information Systems, Data and MISInformation Systems, Data and MIS
Information Systems, Data and MIS
 
4. Fundamental MIS Information Systems Presentation
4. Fundamental MIS  Information Systems Presentation4. Fundamental MIS  Information Systems Presentation
4. Fundamental MIS Information Systems Presentation
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
MIS in businesses.pdf
MIS in businesses.pdfMIS in businesses.pdf
MIS in businesses.pdf
 
MIS in businesses.pdf
MIS in businesses.pdfMIS in businesses.pdf
MIS in businesses.pdf
 
Running head Key Factors in Computer Information Systems1Ke.docx
Running head Key Factors in Computer Information Systems1Ke.docxRunning head Key Factors in Computer Information Systems1Ke.docx
Running head Key Factors in Computer Information Systems1Ke.docx
 
Chapter 6Systems6.1 Information Systems6.1.1 What
Chapter 6Systems6.1 Information Systems6.1.1 What Chapter 6Systems6.1 Information Systems6.1.1 What
Chapter 6Systems6.1 Information Systems6.1.1 What
 
MIS
MISMIS
MIS
 
Ch01 The Information Sys (Accountant's Perspective).ppt
Ch01 The Information Sys (Accountant's Perspective).pptCh01 The Information Sys (Accountant's Perspective).ppt
Ch01 The Information Sys (Accountant's Perspective).ppt
 
Accounting information sysytem @ doms
Accounting information sysytem @ domsAccounting information sysytem @ doms
Accounting information sysytem @ doms
 

More from Danish Saqi

Financial Management Assignment practicals
Financial Management Assignment practicalsFinancial Management Assignment practicals
Financial Management Assignment practicalsDanish Saqi
 
1st assignment of FM
1st assignment of FM1st assignment of FM
1st assignment of FMDanish Saqi
 
Organizational behaviour
Organizational behaviourOrganizational behaviour
Organizational behaviourDanish Saqi
 
Financial institution 1st assignment
Financial institution 1st assignmentFinancial institution 1st assignment
Financial institution 1st assignmentDanish Saqi
 
Fi 2st assignment
Fi 2st assignmentFi 2st assignment
Fi 2st assignmentDanish Saqi
 
2nd Assignment of Entrepreneurship
2nd  Assignment of Entrepreneurship2nd  Assignment of Entrepreneurship
2nd Assignment of EntrepreneurshipDanish Saqi
 
1st Assignment of Enterpreneurship
1st Assignment of Enterpreneurship1st Assignment of Enterpreneurship
1st Assignment of EnterpreneurshipDanish Saqi
 
1st assignment (investment)
1st assignment (investment)1st assignment (investment)
1st assignment (investment)Danish Saqi
 
Mis 2nd assignment final solved
Mis 2nd assignment final solvedMis 2nd assignment final solved
Mis 2nd assignment final solvedDanish Saqi
 
2nd assignment of OPM Free download
2nd assignment of OPM Free download 2nd assignment of OPM Free download
2nd assignment of OPM Free download Danish Saqi
 
1st assignment (opm)
1st assignment (opm)1st assignment (opm)
1st assignment (opm)Danish Saqi
 
International finance second assignment
International finance second assignmentInternational finance second assignment
International finance second assignmentDanish Saqi
 
International Finance 2nd assignment free download
International Finance 2nd assignment free download International Finance 2nd assignment free download
International Finance 2nd assignment free download Danish Saqi
 
IF 1st assignment
IF 1st assignmentIF 1st assignment
IF 1st assignmentDanish Saqi
 
Project Management 2nd assignment
Project Management 2nd assignmentProject Management 2nd assignment
Project Management 2nd assignmentDanish Saqi
 
Entrepreneurship second assignment, M.Com, Commerce
Entrepreneurship second assignment, M.Com, CommerceEntrepreneurship second assignment, M.Com, Commerce
Entrepreneurship second assignment, M.Com, CommerceDanish Saqi
 
1st Enterpreneurship, M.Com
1st Enterpreneurship, M.Com1st Enterpreneurship, M.Com
1st Enterpreneurship, M.ComDanish Saqi
 
2nd Assignment of organization Behavior, M.com
2nd Assignment of organization Behavior, M.com 2nd Assignment of organization Behavior, M.com
2nd Assignment of organization Behavior, M.com Danish Saqi
 
1st organizational behaviour
1st organizational behaviour1st organizational behaviour
1st organizational behaviourDanish Saqi
 

More from Danish Saqi (19)

Financial Management Assignment practicals
Financial Management Assignment practicalsFinancial Management Assignment practicals
Financial Management Assignment practicals
 
1st assignment of FM
1st assignment of FM1st assignment of FM
1st assignment of FM
 
Organizational behaviour
Organizational behaviourOrganizational behaviour
Organizational behaviour
 
Financial institution 1st assignment
Financial institution 1st assignmentFinancial institution 1st assignment
Financial institution 1st assignment
 
Fi 2st assignment
Fi 2st assignmentFi 2st assignment
Fi 2st assignment
 
2nd Assignment of Entrepreneurship
2nd  Assignment of Entrepreneurship2nd  Assignment of Entrepreneurship
2nd Assignment of Entrepreneurship
 
1st Assignment of Enterpreneurship
1st Assignment of Enterpreneurship1st Assignment of Enterpreneurship
1st Assignment of Enterpreneurship
 
1st assignment (investment)
1st assignment (investment)1st assignment (investment)
1st assignment (investment)
 
Mis 2nd assignment final solved
Mis 2nd assignment final solvedMis 2nd assignment final solved
Mis 2nd assignment final solved
 
2nd assignment of OPM Free download
2nd assignment of OPM Free download 2nd assignment of OPM Free download
2nd assignment of OPM Free download
 
1st assignment (opm)
1st assignment (opm)1st assignment (opm)
1st assignment (opm)
 
International finance second assignment
International finance second assignmentInternational finance second assignment
International finance second assignment
 
International Finance 2nd assignment free download
International Finance 2nd assignment free download International Finance 2nd assignment free download
International Finance 2nd assignment free download
 
IF 1st assignment
IF 1st assignmentIF 1st assignment
IF 1st assignment
 
Project Management 2nd assignment
Project Management 2nd assignmentProject Management 2nd assignment
Project Management 2nd assignment
 
Entrepreneurship second assignment, M.Com, Commerce
Entrepreneurship second assignment, M.Com, CommerceEntrepreneurship second assignment, M.Com, Commerce
Entrepreneurship second assignment, M.Com, Commerce
 
1st Enterpreneurship, M.Com
1st Enterpreneurship, M.Com1st Enterpreneurship, M.Com
1st Enterpreneurship, M.Com
 
2nd Assignment of organization Behavior, M.com
2nd Assignment of organization Behavior, M.com 2nd Assignment of organization Behavior, M.com
2nd Assignment of organization Behavior, M.com
 
1st organizational behaviour
1st organizational behaviour1st organizational behaviour
1st organizational behaviour
 

Recently uploaded

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Recently uploaded (20)

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 

How IS Systems Improve Organizational Performance

  • 1. MuhammadDanish| www.knowledgedep.blogspot.com M.I.S MuhammadDanish Roll No. 119467, Section: A, 3rd semester, M.Com 1st Assignment
  • 2. Q: 1- Why is information system so essentialfor running and managing a business today? Answer: INFORMATION SYSTEM: A special form of information system is a management information system (MIS), which provides information for managing an enterprise. IS (information services) is a common name for an organization within an enterprise that is responsible for its data processing and information system or systems. “A combination of hardware, software, infrastructure and trained personnel organized to facilitate planning, control, coordination, and decision making in an organization.” ESSENTIAL OF INFORMATION SYSTEMFOR A BUSINESS 1. To Reduce Operating Costs. Record keeping requires administrative dollars, space in offices, and staffing to maintain an organized filing system. It costs considerably less per linear foot to store inactive records in an Information System. 2. To Improve Efficiency and Productivity. Time spent searching for missing or misfiled records are non-productive; a good Information System helps any organization upgrade its recordkeeping systems so that information retrieval is enhanced. 3. To Minimize Litigation Risks. Business organizations implement management Information Systems and programs in order to reduce the risks associated with litigation and potential penalties, especially government agencies. 4. To Safeguard Vital Information. Every organization, public or private, needs a comprehensive program for protecting its vital records and information from catastrophe or disaster, because every organization is vulnerable to loss; PLAN to protect records. 5. To Support BetterManagement Decision Making. A good Information System can help ensure that managers and executives have the information they need when they need it; Likewise, implementing a good ERP system
  • 3. to take account of all the business' processes, both financial and operational will give an organization more advantages than one who was operating a manually based system. 6. To Preserve the Corporate Memory. This is an irreplaceable asset that is often overlooked; every business day, you create the records, which could become background data for future management decisions and planning 7. Day to Day survival Business invests in these systems to make their jobs as easy as possibly. An example is Citibank introduced the first ATM machine to make it easier for customers to access their money and to cut down queues in their banks. 8. New product services and business models I.S systems play a major role for businesses in creating new products and services. New business models can be created and these can describe how a company produce, create and sell there products. 9. Customer and Supplier intimacy The better services a company provides its consumers with more likely they are too come back to them and as result the more they will buy off the supplier therefore creating a good relationship with both parties. 10. Competitive advantage If companies achieve any above reasons to use I.S they will generally create a competitive advantage over their rivals.
  • 4. Q: 2- What exactly is an information system? How does it work? What are its management, organizationand technologycomponents? Answer: INFORMATION SYSTEM: An information system as a set of interrelated components that work together to collect, process, store, and disseminate information to support decision making, coordination, control, analysis, and visualization in an organization. A special form of information system is a management information system (MIS), which provides information for managing an enterprise. IS (information services) is a common name for an organization within an enterprise that is responsible for its data processing and information system or systems. INFORMATION SYSTEM WORKING: Three activities in an information system produce the information that organizations need to make decisions, control operations, analyze problems, and create new products or services. These activities are input, processing, and output. 1. Input Input captures or collects raw data from within the organization or from its external environment. 2. Process Processing converts this raw input into a meaningful form for make decisions, control operations, analyze problems, and create new products or services. 3. Output Output transfers the processed information to the organization or people who will use it or to the activities for which it will be used. 4. Feedback Feedback is the output that is returned to appropriate members of the organization to help them evaluate or correct the input stage for develop the goodwill as well as possible. MANAGEMENT, ORGANIZATION AND TECHNOLOGY COMPONENTS OF INFORMATION SYSTEM 1. Management Components: The management dimension of information systems involves issues such as;  Leadership,
  • 5.  Strategy,  And management behavior. 2. Organization Components: The organization dimension of information systems involves issues such as;  The organization’s hierarchy,  Functional specialties,  Business processes,  Culture,  And political interest groups. 3. Technological components: The technology dimension consists of;  Computer hardware,  Software,  Data management technology,  And networking/telecommunications technology (including the Internet).
  • 6. Q: 3- How do systems serve the different management groups in a business? Answer: SYSTEMS SERVE THE DIFFERENT MANAGEMENT GROUPS A business firm has systems to support different groups or levels of management. These systems include transaction processing systems and systems for business intelligence. 1. Transaction Processing Systems: Operational managers need systems that keep track of the elementary activities and transactions of the organization, such as sales, receipts, cash deposits, payroll, credit decisions, and the flow of materials in a factory. Transaction processing systems (TPS) provide this kind of information. A transaction processing system is a computerized system that performs and records the daily routine transactions necessary to conduct business, such as sales order entry, hotel reservations, payroll, employee record keeping, and shipping. The principal purpose of systems at this level is to answer routine questions and to track the flow of transactions through the organization. How many parts are in inventory? What happened to Mr. Smith’s payment? To answer these kinds of questions, information generally must be easily available, current, and accurate. At the operational level, tasks, resources, and goals are predefined and highly structured. The decision to grant credit to a customer, for instance, is made by a lower-level supervisor according to predefined criteria. All that must be determined is whether the customer meets the criteria. 2. Systems for business intelligence: Firms also have business intelligence systems that focus on delivering information to support management decision making. Business intelligence is a contemporary term for data and software tools for organizing, analyzing, and providing access to data to help managers and other enterprise users make more informed decisions. Business intelligence addresses the decision-making needs of all levels of management. Business intelligence systems for middle management help with monitoring, controlling, decision-making, and administrative activities. Management information systems as the study of information systems in business and management. The term management information systems (MIS) also designates a specific category of information systems serving middle management. MIS provide middle managers with reports on the
  • 7. organization’s current performance. This information is used to monitor and control the business and predict future performance. MIS summarize and report on the company’s basic operations using data supplied by transaction processing systems. The basic transaction data from TPS are compressed and usually presented in reports that are produced on a regular schedule. Today, many of these reports are delivered online. Other types of business intelligence systems support more non-routine decision making. Decision-support systems (DSS) focus on problems that are unique and rapidly changing, for which the procedure for arriving at a solution may not be fully predefined in advance. They try to answer questions such as these: What would be the impact on production schedules if we were to double sales in the month of December? What would happen to our return on investment if a factory schedule were delayed for six months? Although DSS use internal information from TPS and MIS, they often bring in information from external sources, such as current stock prices or product prices of competitors. These systems are employed by “super-user” managers and business analysts who want to use sophisticated analytics and models to analyze data.
  • 8. Q: 4- How do systems that link the enterprise improve organizational performance? Answer: SYSTEMS FOR LINKING THE ENTERPRISE Manager might wonder how a business can manage all the information in these different systems. He might also wonder how costly it is to maintain so many different systems. And he might wonder how all these different systems can share information and how managers and employees are able to coordinate their work. In fact, these are all important questions for businesses today. 1. ENTERPRISE APPLICATIONS: Enterprise applications help businesses become more flexible and productive by coordinating their business processes more closely and integrating groups of processes so they focus on efficient management of resources and customer service. There are four major enterprise applications: a) Enterprise system: Firms use enterprise systems, also known as enterprise resource planning (ERP) systems, to integrate business processes in manufacturing and production, finance and accounting, sales and marketing, and human resources into a single software system. Information that was previously fragmented in many different systems is stored in a single comprehensive data repository where it can be used by many different parts of the business. For example, when a customer places an order, the order data flow automatically to other parts of the company that are affected by them. The order transaction triggers the warehouse to pick the ordered products and schedule shipment. The warehouse informs the factory to replenish whatever has been depleted. The accounting department is notified to send the customer an invoice. Customer service representatives track the progress of the order through every step to inform customers about the status of their orders. Managers are able to use firm wide information to make more precise and timely decisions about daily operations and longer-term planning. b) Supply Chain Management Systems: Firms use supply chain management (SCM) systems to help manage relationships with their suppliers. These systems help suppliers, purchasing firms, distributors, and logistics companies share information about orders, production, inventory levels, and delivery of products and services so they can source, produce, and deliver goods and services efficiently. The ultimate objective is to get the right amount of their products from their source to their point of consumption in the least amount of time and at the
  • 9. lowest cost. These systems increase firm profitability by lowering the costs of moving and making products and by enabling managers to make better decisions about how to organize and schedule sourcing, production, and distribution. c) Customer Relationship Management Systems Firms use customer relationship management (CRM) systems to help manage their relationships with their customers. CRM systems provide information to coordinate all of the business processes that deal with customers in sales, marketing, and service to optimize revenue, customer satisfaction, and customer retention. This information helps firms identify, attract, and retain the most profitable customers; provide better service to existing customers; and increase sales. d) Knowledge Management Systems Some firms perform better than others because they have better knowledge about how to create, produce, and deliver products and services. This firm knowledge is unique, difficult to imitate, and can be leveraged into long-term strategic benefits. Knowledge management systems (KMS) enable organizations to better manage processes for capturing and applying knowledge and expertise. These systems collect all relevant knowledge and experience in the firm, and make it available wherever. 2. INTRANETS AND EXTRANETS: Enterprise applications create deep-seated changes in the way the firm conducts its business, offering many opportunities to integrate important business data into a single system. They are often costly and difficult to implement. Intranets and extranets deserve mention here as alternative tools for increasing integration and expediting the flow of information within the firm, and with customer’s ad suppliers. Intranets are simply internal company Web sites that are accessible only by employees. The term “intranet” refers to an internal network, in contrast to the Internet, which is a public network linking organizations and other external networks. Intranets use the same technologies and techniques as the larger Internet, and they often are simply a private access area in a larger company Web site. Likewise with extranets. Extranets are company Web sites that are accessible to authorized vendors and suppliers, and are often used to coordinate the movement of supplies to the firm’s production apparatus. For example, Six Flags, which operates 19 theme parks throughout North America, maintains an intranet for its 2,500 full-time employees that provide company related news and information on each park’s day-to-day operations, including weather forecasts, performance schedules, and details about groups and celebrities visiting the parks. The company also uses an extranet to broadcast information about schedule changes and park events to its 30,000 seasonal employees.
  • 10. Q: 5- What is the role of the information systems function in a business. Answer: THE INFORMATION SYSTEMS DEPARTMENT The information systems department consists of specialists, such as:  Programmers are highly trained technical specialists who write the software instructions for computers.  Systems analysts constitute the principal liaisons between the information systems groups and the rest of the organization. It is the systems analyst’s job to translate business problems and requirements into information requirements and systems.  Information systems managers are leaders of teams of programmers and analysts, project managers, physical facility managers, telecommunications managers, or database specialists. They are also managers of computer operations and data entry staff. Also, external specialists, such as hardware vendors and manufacturers, software firms, and consultants, frequently participate in the day-to-day operations and long-term planning of information systems.  Chief information officer (CIO) is a senior manager who oversees the use of information technology in the firm. Today’s CIOs are expected to have a strong business background as well as information systems expertise and to play a leadership role in integrating technology into the firm’s business strategy. Large firms today also have positions for a chief security officer, chief knowledge officer, and chief privacy officer, all of whom work closely with the CIO.  The chief security officer (CSO) is in charge of information systems security for the firm and is responsible for enforcing the firm’s information security policy (Sometimes this position is called the chief information security officer [CISO] where information systems security is separated from physical security). The CSO is responsible for educating and training users and information systems specialists about security, keeping management aware of security threats and breakdowns, and maintaining the tools and policies chosen to implement security.  The chief knowledge officer (CKO) is responsible for the firm’s knowledge management program. The CKO helps design programs and systems to find new sources of knowledge or to make better use of existing knowledge in organizational and management processes.
  • 11.  End users are representatives of departments outside of the information systems group for whom applications are developed. These users are playing an increasingly large role in the design and development of information systems. ORGANIZING THE INFORMATION SYSTEMS FUNCTION There are many types of business firms, and there are many ways in which the IT function is organized within the firm. A very small company will not have a formal information systems group. It might have one employee who is responsible for keeping its networks and applications running, or it might use consultants for these services. Larger companies will have a separate information systems department, which may be organized along several different lines, depending on the nature and interests of the firm. Our Learning Track describes alternative ways of organizing the information systems function within the business.
  • 12. Q: 6- How does porter’s competitive forces model help companies develop competitive strategies using information systems? Answer: PORTER’S COMPETITIVE FORCES MODEL: This model provides a general view of the firm, its competitors, and the firm’s environment. Porter’s model is all about the firm’s general business environment. In this model, five competitive forces shape the fate of the firm. 1. Traditional Competitors All firms share market space with other competitors who are continuously devising new, more efficient ways to produce by introducing new products and services, and attempting to attract customers by developing their brands and imposing switching costs on their customers. 2. New Market Entrants In a free economy with mobile labor and financial resources, new companies are always entering the marketplace. In some industries, there are very low barriers to entry, whereas in other industries, entry is very difficult. For instance, it is fairly easy to start a pizza business or just about any small retail business, but it is much more expensive and difficult to enter the computer chip business, which has very high capital costs and requires significant expertise and knowledge that is hard to obtain. New companies have several possible advantages: They are not locked into old plants and equipment, they often hire younger workers who are less expensive and perhaps more innovative, they are not encumbered by old worn-out brand names, and they are “more hungry” (more highly motivated) than traditional occupants of an industry. These advantages are also their weakness: They depend on outside financing for new plants and equipment, which can be expensive; they have a less-experienced workforce; and they have little brand recognition. 3. Substitute Products and Services: In just about every industry, there are substitutes that your customers might use if your prices become too high. New technologies create new substitutes all the time. Even oil has substitutes: Ethanol can substitute for gasoline in cars; vegetable oil for diesel fuel in trucks; and wind, solar, coal, and hydro power for industrial electricity generation. Likewise, the Internet telephone service can substitute for traditional telephone service, and fiber-optic telephone lines to the home can substitute for cable TV lines. And, of course, an Internet music service that allows you to download music tracks to an iPod is a substitute for CD- based music stores. The more substitute products and services in your industry, the less you can control pricing and the lower your profit margins.
  • 13. 4. Customers A profitable company depends in large measure on its ability to attract and retain customers (while denying them to competitors), and charge high prices. The power of customers grows if they can easily switch to a competitor’s products and services, or if they can force a business and its competitors to compete on price alone in a transparent marketplace where there is little product differentiation, and all prices are known instantly (such as on the Internet). For instance, in the used college textbook market on the Internet, students (customers) can find multiple suppliers of just about any current college textbook. In this case, online customers have extraordinary power over used-book firms. 5. Suppliers The market power of suppliers can have a significant impact on firm profits, especially when the firm cannot raise prices as fast as can suppliers. The more different suppliers a firm has, the greater control it can exercise over suppliers in terms of price, quality, and delivery schedules. For instance, manufacturers of laptop PCs almost always have multiple competing suppliers of key components, such as keyboards, hard drives, and display screens.
  • 14. Q: 7- How do the value chain and value web models help business identify opportunities for strategic information system applications? Answer: VALUE CHAIN: This model identifies specific, critical leverage points where a firm can use information technology most effectively to enhance its competitive position. The value chain model views the firm as a series or chain of basic activities that add a margin of value to a firm’s products or services. These activities can be categorized as either primary activities or support activities. Value Chain Model views the firm as a series of activities that add value to products and services. Then, these activities which can be primary or support activities are highlighted where competitive strategies can best be applied. At each stage, it is determined how information systems can improve operational efficiency and improve customer and supplier intimacy. Using the business value chain model will cause the organization to utilize benchmarking and best practices. I work in retail and we actually use best practices, we are always brain storming with other venue locations and sharing our "best practices" we use to drive sales, capture more guests, and how to up a sale. Primary activities Primary activities are most directly related to the production and distribution of the firm’s products and services, which create value for the customer. Primary activities include inbound logistics, operations, outbound logistics, sales and marketing, and service. Inbound logistics includes receiving and storing materials for distribution to production. Support Activities
  • 15. Support activities make the delivery of the primary activities possible and consist of organization infrastructure (administration and management), human resources (employee recruiting, hiring, and training), technology (improving products and the production process), and procurement (purchasing input). Using the business value chain model will also cause you to consider benchmarking your business processes against your competitors or others in related industries, and identifying industry best practices. Benchmarking involves comparing the efficiency and effectiveness of your business processes against strict standards and then measuring performance against those standards. Industry best practices are usually identified by consulting companies, research organizations, government agencies, and industry associations as the most successful solutions or problem-solving methods for consistently and effectively achieving a business objective. VALUE WEB: Value Web Models is a collection of independent firms using highly synchronized IT to coordinate value chains to produce or service collectively. It is more customers driven and works in a less linear operation than value chain. The book uses Amazon as an example making your system more effective and efficient overall as a website retailer, and internet technology has made it possible through the value web models. The Value Web is a global network of passionate individuals who want to help you affect positive change. We design and facilitate collaboration around the world. The Value Web Model is made up of four major components - each in themselves a network which can be Value Web architecture on anther level of recursion. They are: 1. The user (customer) network; 2. The producer network (including supply chain); 3. the investor network (including social investors) 4. And, the system integrator (management). No matter the size of a Value Web, these four components have to be in relative balance with one another else the web will be distorted and start acting in strange and unstable ways. The Networks themselves and made up of sectors (we call them “clamshells”) each with its own unique function. In all, there are 22 distinct types of components and sub-components that make up a mature Value Web. Each will “play” differently in any particular Value Web. Nevertheless, understanding the basic nature of these components is all that is required to start discovering how Value Webs work and to engage in the design process of making one.
  • 16. Q: 8- How does information system help business use synergies, core competences, and network based strategies to achieve competitive advantage? Answer: A large corporation is typically a collection of businesses. Often, the firm is organized financially as a collection of strategic business units and the returns to the firm are directly tied to the performance of all the strategic business units. Information systems can improve the overall performance of these business units by promoting synergies and core competencies. SYNERGIES: The idea of synergies is that when the output of some units can be used as inputs to other units, or two organizations pool markets and expertise, these relationships lower costs and generate profits. Recent bank and financial firm mergers, such as the merger of JPMorgan Chase and Bank of New York as well as Bank of America and Countrywide Financial Corporation occurred precisely for this purpose. One use of information technology in these synergy situations is to tie together the operations of disparate business units so that they can act as a whole. For example, acquiring Countrywide Financial enabled Bank of America to extend its mortgage lending business and to tap into a large pool of new customers who might be interested in its credit card, consumer banking, and other financial products. Information systems would help the merged companies consolidate operations, lower retailing costs, and increase cross-marketing of financial products. ENHANCING CORE COMPETENCIES: Core competency is an activity for which a firm is a world-class leader. Core competencies may involve being the world’s best miniature parts designer, the best package delivery service, or the best thin-film manufacturer. In general, a core competency relies on knowledge that is gained over many years of practical field experience with a technology. This practical knowledge is typically supplemented with a long-term research effort and committed employees. Any information system that encourages the sharing of knowledge across business units enhances competency. Such systems might encourage or enhance existing competencies and help employees become aware of new external knowledge; such systems might also help a business leverage existing competencies to related markets. NETWORK-BASED STRATEGIES Network economics refers to business economics that benefit from the network effect. It is also known as Netromix. This is when the value of a good or service increases when others
  • 17. buy the same good or service. The network economy is the emerging economic order within the information society. The name stems from a key attribute - products and services are created and value is added through social networks operating on large or global scales. Virtual Company Model: Virtual Business Model (not to be confused with Virtual Business), is a way to organize an innovative startup company and facilitates increased flexibility in the utilization of both financial and human resources and can promote development of new ideas and inventions. Business Ecosystems: The network of organizations including suppliers, distributors, customers, competitors, government agencies and so on involved in the delivery of a specific product or service through both competition and cooperation.
  • 18. Q: 9- Why do contemporary information systems technology and the internet pose challenges to the protection of individual privacy and intellectual property? Answer: CONTEMPORARY INFORMATION SYSTEMS TECHNOLOGY Contemporary data storage and data analysis technology enables companies to easily gather personal data about individuals from many different sources and analyze these data to create detailed electronic profiles about individuals and their behaviors. PRIVACY: Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state. Claims of privacy are also involved at the workplace. FAIR INFORMATION: Fair information practices are a set of principles governing the collection and use of information about individuals. FIP principles are based on the notion of a mutuality of interest between the record holder and the individual. INTERNET CHALLENGES TO INDIVIDUAL PRIVACY Internet technology has posed new challenges for the protection of individual privacy. Information sent over this vast network of networks may pass through many different computer systems before it reaches its final destination. Each of these systems is capable of monitoring, capturing, and storing communications that pass through it. Cookies are small text files deposited on a computer hard drive when a user visits Web sites. Cookies identify the visitor’s Web browser software and track visits to the Web site. When the visitor returns to a site that has stored a cookie, the Web site software will search the visitor’s computer, find the cookie, and know what that person has done in the past. It may also update the cookie, depending on the activity during the visit. In this way, the site can customize its content for each visitor’s interests. For example, if you purchase a book on Amazon.com and return later from the same browser, the site will welcome you by name and recommend other books of interest based on your past purchases. Double Click, described earlier in this chapter, uses cookies to build its dossiers with details of online purchases and to examine the behavior of Web site visitors.
  • 19. CHALLENGES TO INTELLECTUAL PROPERTY RIGHTS Traditional copyright laws are insufficient to protect against software piracy because digital material can be copied so easily. Internet technology also makes intellectual property even more difficult to protect because digital material can be copied easily and transmitted to many different locations simultaneously over the Net. Web pages can be constructed easily using pieces of content from other Web sites without permission. Contemporary information technologies, especially software, pose severe challenges to existing intellectual property regimes and, therefore, create significant ethical, social, and political issues. Digital media differ from books, periodicals, and other media in terms of ease of replication; ease of transmission; ease of alteration; difficulty in classifying a software work as a program, book, or even music; compactness—making theft easy; and difficulties in establishing uniqueness. The proliferation of electronic networks, including the Internet, has made it even more difficult to protect intellectual property. Before widespread use of networks, copies of software, books, magazine articles, or films had to be stored on physical media, such as paper, computer disks, or videotape, creating some hurdles to distribution. Using networks, information can be more widely reproduced and distributed.
  • 20. Q: 10- What are the stages and technology drivers of IT infrastructure evolution? Answer: An IT infrastructure consists of a set of physical devices and software applications that are required to operate the entire enterprise. But an IT infrastructure is also a set of firm wide services budgeted by management and comprising both human and technical capabilities. Technologies that characterize one era may also be used in another time period for other purposes. For example, some companies still run traditional mainframe systems or use mainframe computers as massive servers supporting large Web sites and corporate enterprise applications. 1st Stage - General-Purpose Mainframe and Minicomputer Era: (1959 to Present): Mainframe computers (colloquially referred to as "big iron") are computers used primarily by large organizations for critical applications, bulk data processing, such as census, industry and consumer statistics, enterprise resource planning, and transaction processing. The introduction of the IBM 1401 and 7090 transistorized machines in 1959 marked the beginning of widespread commercial use of mainframe computers. In 1965, the mainframe computer truly came into its own with the introduction of the IBM 360 series. The 360 was the first commercial computer with a powerful operating system that could provide time sharing, multitasking, and virtual memory in more advanced models. 2nd Stage - Personal Computer Era: (1981 to Present): A personal computer (PC) is a small, relatively inexpensive computer designed for an individual user. In price, personal computers range anywhere from a few hundred dollars to thousands of dollars. All are based on the microprocessor technology that enables manufacturers to put an entire CPU on one chip. Although the first truly personal computers (PCs) appeared in the 1970s (the Xerox Alto, the MITS Altair 8800, and the Apple I and II, to name a few), these machines had only limited distribution to computer enthusiasts. The appearance of the IBM PC in 1981 is usually considered the beginning of the PC era because this machine was the first to be widely adopted by American businesses. At first using the DOS operating system, a text-based command language. 3rd stage - Client/Server Era (1983 to Present): In client/server computing, desktop or laptop computers called clients are networked to powerful server computers that provide the client computers with a variety of services and capabilities. Computer processing work is split between these two types of machines. The client
  • 21. is the user point of entry, whereas the server typically processes and stores shared data, serves up Web pages, or manages network activities. The term “server” refers to both the software application and the physical computer on which the network software runs. The server could be a mainframe, but today, server computers typically are more powerful versions of personal computers, based on inexpensive chips and often using multiple processors in a single computer box, or in server racks. 4th stage - Enterprise Computing Era (1992 to Present): In the early 1990s, firms turned to networking standards and software tools that could integrate disparate networks and applications throughout the firm into an enterprise-wide infrastructure. As the Internet developed into a trusted communications environment after 1995, business firms began seriously using the Transmission Control Protocol/Internet Protocol (TCP/IP) networking standard to tie their disparate networks together. The resulting IT infrastructure links different pieces of computer hardware and smaller networks into an enterprise-wide network so that information can flow freely across the organization and between the firm and other organizations. It can link different types of computer hardware, including mainframes, servers, PCs, and mobile devices, and it includes public infrastructures such as the telephone system, the Internet, and public network service. 5th Stage - Cloud and Mobile Computing Era (2000 to Present) Mobile Cloud Computing (MCC) is the combination of cloud computing, mobile computing and wireless networks to bring rich computational resources to mobile users, network operators, as well as cloud computing providers. Cloud computing refers to a model of computing that provides access to a shared pool of computing resources (computers, storage, applications, and services) over a network, often the Internet. These “clouds” of computing resources can be accessed on an as-needed basis from any connected device and location. IBM, HP, Dell, and Amazon operate huge, scalable cloud computing centers that provide computing power, data storage, and high-speed Internet connections to firms that want to maintain their IT infrastructures remotely. Software firms such as Google, Microsoft, SAP, Oracle, and Salesforce.com sell software applications as services delivered over the Internet.