The document contains questions related to concepts of planning and control for information systems. It includes questions about total quality management, levels of management, importance of planning for information systems, organizational planning, business models, information technology architecture, system analysis and design, MIS development procedures, quality in information systems, acquisition of hardware/software, computer peripherals, software types, structured/unstructured decisions, information system audits, the planning process, computational support for planning, importance of control, feedback, factors for IS organization, Nolan's stage models of IS growth, and content of an IS master plan.
Management information System and its typesAbdul Rehman
Management information System
Difference between MIS and IS
Importance of MIS
Characteristics of MIS
Types of MIS: Expert System, Decision support system, Executive Information System
Management Information System (MIS) is a planned system of collecting, storing, and disseminating data in the form of information needed to carry out the functions of management. A Management Information System is an information system that evaluates, analyzes, and processes an organization's data to produce meaningful and useful information based on which the management can take right decisions to ensure future growth of the organization.
This presentation is about Management information system (MIS). It is a topic in Information Technology for Managers. It includes the meaning, definition, objectives , features, advantages and limitations and types of MIS
Management information System and its typesAbdul Rehman
Management information System
Difference between MIS and IS
Importance of MIS
Characteristics of MIS
Types of MIS: Expert System, Decision support system, Executive Information System
Management Information System (MIS) is a planned system of collecting, storing, and disseminating data in the form of information needed to carry out the functions of management. A Management Information System is an information system that evaluates, analyzes, and processes an organization's data to produce meaningful and useful information based on which the management can take right decisions to ensure future growth of the organization.
This presentation is about Management information system (MIS). It is a topic in Information Technology for Managers. It includes the meaning, definition, objectives , features, advantages and limitations and types of MIS
Designing for Beauty and Performance through DataNBBJDesign
NBBJ Principal Eric Phillips spoke at the Big Data & Analytics Innovation Summit in Hong Kong on April 22. See how NBBJ currently uses software tools that harvest public and private data sources to optimize the design, experience and performance of buildings—for clients including Google, Tencent, Amazon, Samsung and Microsoft—for the people who live, work, play and heal inside.
Big Data, Computational Biology & the Future of Strategic Planning for ResearchNBBJDesign
The advent of computational biology in the era of “big data” is triggering a dramatic change in the strategic capital planning process and metrics for space allocation and utilization for translational science. In this presentation, Andy Snyder - Principal and NBBJ's Science & Education Practice leader, and Bruce Stevenson, VP of Research Operations at Nationwide Childrens Hospital - chart new relationships between strategic planning, programming, facility planning and scientific workplace features for biomedical research and translational medicine. The presentation sets out new best practices for navigating limited funding resources while preparing for new science directions and workforce needs, research space requirements, and advancements in scientific equipment, and they identify new ways to leverage data, metrics, analytical processes, and tools for improved program/infrastructure alignment.
On February 23 at Healthcare Information and Management Systems Society (HIMSS) 2017 in Orlando, Partner Joan Saba spoke about the future of the patient room, which could resemble the micro-apartments increasingly popular in urban areas.
Design and Evaluation of Information Systems and Services: principles of designing information systems, strategies for Information system evaluation, Information Systems Effectiveness Measures.
Online auction system is web based application, in which the seller can sell the goods by sitting in his own house ,so the main advantage of this application is that there is no more system compatibility requirement problem. The main advantage of the online auction system is that the user can have the better choices for their investment and also it is time saving , and through this system user can invest in their own selected firm.
2. INFORMATION GATHERING.pptx Computer Applications in PharmacyVedika Narvekar
B.Pharm sem 2
Computer Applications in Pharmacy
requirement and feasibility analysis, data flow diagrams, process
specifications, input/output design, process life cycle, planning and
managing the project
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
· Processed on 09-Dec-2014 9:01 PM CST
· ID: 488406360
· Word Count: 1969
Similarity Index
47%
Similarity by Source
Internet Sources:
46%
Publications:
2%
Student Papers:
N/A
sources:
1
30% match (Internet from 27-Mar-2009)
http://www.isaca.org/Content/ContentGroups/Journal1/20023/The_IS_Audit_Process.htm
2
13% match (Internet from 29-Mar-2011)
http://www.scribd.com/doc/36655995/Chapter-1-the-Information-System-Audit-Process
3
2% match (publications)
Athula Ginige. "Web site auditing", Proceedings of the 14th international conference on Software engineering and knowledge engineering - SEKE 02 SEKE 02, 2002
4
1% match (Internet from 26-Feb-2012)
http://www.dc.fi.udc.es/~parapar/files/ai/The_IS_Audit_Process_isaca_sayana.pdf
5
1% match (Internet from 01-Apr-2009)
http://www.idkk.gov.tr/web/guest/it_audit_manual_isaca
paper text:
Running head: AUDITING INFORMATION SYSTEMS PROCESS Auditing information systems process Student’s Name University Affiliation Auditing information systems 2process Information systems are the livelihood of any huge business. As in past years, computer systems do not simply record transactions of business, but essentially drive the main business procedures of the enterprise. In such a situation, superior management and business managers do have worries concerning information systems. Auditing is a methodical process by which a proficient, independent person impartially obtains and assesses evidence concerning assertions about a financial entity or occasion for the reason of outlining an outlook about and reporting on the extent to which the contention matches to an acknowledged set of standards. Auditing of information systems is the administration controls assessment inside the communications of Information Technology. The obtained proof valuation is used to decide if systems of information are defensive assets, maintenance reliability of data, and also if they are efficiently operating in order to attain organization’s goals or objectives (Hoelzer, 2009). Auditing of Information Systems has become an essential part of business organization in both large and small business environments. This paper examines the preliminary points for carrying out and Information system audit and some of the, techniques, tools, guidelines and standards that can be employed to build, manage, and examine the review function. The Certified Information Systems Auditor (CISA) qualifications is recognized worldwide as a standard of accomplishment for those who assess, monitor, control and audit the information technology of an organization and business systems. Information Systems experts with a concern in information systems security, control and audit. At least five years of specialized information systems security, auditing and control work practice is necessary for certification. An audit contract should be present to evidently state the responsibility of the management, 2objectives for, and designation of authority to Information .
What is Information System?
The system is a collection of various elements or entities that are used to process input into an output. Inputs and outputs can be either raw or intact data into information — depending on the processing designed to work in the system.
Meanwhile, information is the result of data processing used for a particular purpose. As for what data means is raw facts that have not been processed and can not provide stimulus for users to take action.
Thus, an information system can be interpreted as a set of interconnected elements to process a given input into a particular output produced. The next stage of an information system is a MIS (Management Information System) which has a higher complexity with the final goal being used for the needs of analysis and decision making.
What is Information Systems Development?
As the name suggests, information system development or commonly known as SLC (Systems Life Cycle) or SLDC (Software Development Life Cycle) is a process of making and changing the system and the model and methodology used. In other words, an SDLC is the preparation of a new system to replace the old system, both in whole and only partially.
Development of information systems is generally done because of problems that cannot be accommodated by the old system. For example, the hospital where you work make an overhaul SIMRS (Sistem Informasi Manajemen Rumah Sakit/Hospital Management Information System) because of applications that previously could not do bridging with BPJS. Considering the fact that the government has required it, then inevitably the hospital must adjust the SIMRS it already has.
As for carrying out an information system development, the related team will consist of several personnel, namely the project coordinator, system analyst and design, network designer, programmer, technician (hardware), administrator, software tester, graphic designer, and documentary.
Information System Development Stages
An information system development consists of six important stages, it is system survey, needs analysis, design, implementation, testing, change and maintenance.
1) System Survey
The SLDC phase also consists of three main points: system identification, selection, and system planning.
1) System Identification
This process is to identify the problems facing the company and the system it has. The team will look for any opportunities that can be done to overcome this.
2) Selection
The selection phase will apply evaluation points to the development project to ensure the solutions are created in accordance with the company’s expected targets.
3) System Planning
This step is the step of developing a formal plan to start working on and implementing the information system development concept that has been chosen.
2) Needs Analysis
System requirements analysis is a technique for solving problems by decomposing the components of the system. The aim is none other than to find out more about how each component works and th
Running head AUDITING INFORMATION SYSTEMS PROCESS .docxjoellemurphey
Running head: AUDITING INFORMATION SYSTEMS PROCESS
1
AUDITING INFORMATION SYSTEMS PROCESS 2
Auditing information systems process
Student’s Name
University Affiliation
Process of Auditing information systems
Information system is the livelihood of every huge company. As it has been in the past years, computer systems don’t simply document transactions of business, rather essentially compel the main business procedures of the venture. In this kind of a situation, superior administration and company managers usually have worries concerning an information system. assessment is a methodical process in which a proficient, autonomous person impartially gets and assesses proof concerning affirmations about a financial unit or occasion with the intent to outline an outlook about and giving feedback on the extent in which the contention matches an acknowledged standards set. information systems auditing refers to the administration controls assessment inside the communications of Information Technology. The obtained proof valuation is used to decide if systems of information are defensive assets, maintenance reliability of data, and also if they are efficiently operating in order to attain organization’s goals or objectives (Hoelzer, 2009).
Auditing of Information Systems has become an essential part of business organization in both large and small business environments. This paper examines the preliminary points for carrying out and Information system audit and some of the, techniques, tools, guidelines and standards that can be employed to build, manage, and examine the review function. The Certified Information Systems Auditor (CISA) qualifications is recognized worldwide as a standard of accomplishment for those who assess, monitor, control and audit the information technology of an organization and business systems. Information Systems experts with a concern in information systems security, control and audit. At least five years of specialized information systems security, auditing and control work practice is necessary for certification. An audit contract should be present to evidently state the responsibility of the management, purpose for, in addition to designation of power to audit of Information System . The audit contract should also summarize the general right, responsibilities and scope of the purpose of audit. The uppermost level of management should endorse the contract and on one occasion it is set up, this contract is supposed to be distorted merely if the amendment is and might be meticulously defensible.
The process of auditing information systems involves;-
Audit Function Management; this process includes assessment which is systematic of policies and methods of management of the organization in managemen ...
Defining an IT Auditor,
IT Auditor Certifications & ISACA,
IT Audit Phases,
Preparing to be Audited,
How IT auditor audits an Applications,
Auditing technology for Information System.
Cracking the Workplace Discipline Code Main.pptxWorkforce Group
Cultivating and maintaining discipline within teams is a critical differentiator for successful organisations.
Forward-thinking leaders and business managers understand the impact that discipline has on organisational success. A disciplined workforce operates with clarity, focus, and a shared understanding of expectations, ultimately driving better results, optimising productivity, and facilitating seamless collaboration.
Although discipline is not a one-size-fits-all approach, it can help create a work environment that encourages personal growth and accountability rather than solely relying on punitive measures.
In this deck, you will learn the significance of workplace discipline for organisational success. You’ll also learn
• Four (4) workplace discipline methods you should consider
• The best and most practical approach to implementing workplace discipline.
• Three (3) key tips to maintain a disciplined workplace.
Skye Residences | Extended Stay Residences Near Toronto Airportmarketingjdass
Experience unparalleled EXTENDED STAY and comfort at Skye Residences located just minutes from Toronto Airport. Discover sophisticated accommodations tailored for discerning travelers.
Website Link :
https://skyeresidences.com/
https://skyeresidences.com/about-us/
https://skyeresidences.com/gallery/
https://skyeresidences.com/rooms/
https://skyeresidences.com/near-by-attractions/
https://skyeresidences.com/commute/
https://skyeresidences.com/contact/
https://skyeresidences.com/queen-suite-with-sofa-bed/
https://skyeresidences.com/queen-suite-with-sofa-bed-and-balcony/
https://skyeresidences.com/queen-suite-with-sofa-bed-accessible/
https://skyeresidences.com/2-bedroom-deluxe-queen-suite-with-sofa-bed/
https://skyeresidences.com/2-bedroom-deluxe-king-queen-suite-with-sofa-bed/
https://skyeresidences.com/2-bedroom-deluxe-queen-suite-with-sofa-bed-accessible/
#Skye Residences Etobicoke, #Skye Residences Near Toronto Airport, #Skye Residences Toronto, #Skye Hotel Toronto, #Skye Hotel Near Toronto Airport, #Hotel Near Toronto Airport, #Near Toronto Airport Accommodation, #Suites Near Toronto Airport, #Etobicoke Suites Near Airport, #Hotel Near Toronto Pearson International Airport, #Toronto Airport Suite Rentals, #Pearson Airport Hotel Suites
What is the TDS Return Filing Due Date for FY 2024-25.pdfseoforlegalpillers
It is crucial for the taxpayers to understand about the TDS Return Filing Due Date, so that they can fulfill your TDS obligations efficiently. Taxpayers can avoid penalties by sticking to the deadlines and by accurate filing of TDS. Timely filing of TDS will make sure about the availability of tax credits. You can also seek the professional guidance of experts like Legal Pillers for timely filing of the TDS Return.
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...Kumar Satyam
According to TechSci Research report, “India Orthopedic Devices Market -Industry Size, Share, Trends, Competition Forecast & Opportunities, 2030”, the India Orthopedic Devices Market stood at USD 1,280.54 Million in 2024 and is anticipated to grow with a CAGR of 7.84% in the forecast period, 2026-2030F. The India Orthopedic Devices Market is being driven by several factors. The most prominent ones include an increase in the elderly population, who are more prone to orthopedic conditions such as osteoporosis and arthritis. Moreover, the rise in sports injuries and road accidents are also contributing to the demand for orthopedic devices. Advances in technology and the introduction of innovative implants and prosthetics have further propelled the market growth. Additionally, government initiatives aimed at improving healthcare infrastructure and the increasing prevalence of lifestyle diseases have led to an upward trend in orthopedic surgeries, thereby fueling the market demand for these devices.
The world of search engine optimization (SEO) is buzzing with discussions after Google confirmed that around 2,500 leaked internal documents related to its Search feature are indeed authentic. The revelation has sparked significant concerns within the SEO community. The leaked documents were initially reported by SEO experts Rand Fishkin and Mike King, igniting widespread analysis and discourse. For More Info:- https://news.arihantwebtech.com/search-disrupted-googles-leaked-documents-rock-the-seo-world/
Explore our most comprehensive guide on lookback analysis at SafePaaS, covering access governance and how it can transform modern ERP audits. Browse now!
As a business owner in Delaware, staying on top of your tax obligations is paramount, especially with the annual deadline for Delaware Franchise Tax looming on March 1. One such obligation is the annual Delaware Franchise Tax, which serves as a crucial requirement for maintaining your company’s legal standing within the state. While the prospect of handling tax matters may seem daunting, rest assured that the process can be straightforward with the right guidance. In this comprehensive guide, we’ll walk you through the steps of filing your Delaware Franchise Tax and provide insights to help you navigate the process effectively.
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...PaulBryant58
This article provides a comprehensive guide on how to
effectively manage the convert Accpac to QuickBooks , with a particular focus on utilizing online accounting services to streamline the process.
"𝑩𝑬𝑮𝑼𝑵 𝑾𝑰𝑻𝑯 𝑻𝑱 𝑰𝑺 𝑯𝑨𝑳𝑭 𝑫𝑶𝑵𝑬"
𝐓𝐉 𝐂𝐨𝐦𝐬 (𝐓𝐉 𝐂𝐨𝐦𝐦𝐮𝐧𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬) is a professional event agency that includes experts in the event-organizing market in Vietnam, Korea, and ASEAN countries. We provide unlimited types of events from Music concerts, Fan meetings, and Culture festivals to Corporate events, Internal company events, Golf tournaments, MICE events, and Exhibitions.
𝐓𝐉 𝐂𝐨𝐦𝐬 provides unlimited package services including such as Event organizing, Event planning, Event production, Manpower, PR marketing, Design 2D/3D, VIP protocols, Interpreter agency, etc.
Sports events - Golf competitions/billiards competitions/company sports events: dynamic and challenging
⭐ 𝐅𝐞𝐚𝐭𝐮𝐫𝐞𝐝 𝐩𝐫𝐨𝐣𝐞𝐜𝐭𝐬:
➢ 2024 BAEKHYUN [Lonsdaleite] IN HO CHI MINH
➢ SUPER JUNIOR-L.S.S. THE SHOW : Th3ee Guys in HO CHI MINH
➢FreenBecky 1st Fan Meeting in Vietnam
➢CHILDREN ART EXHIBITION 2024: BEYOND BARRIERS
➢ WOW K-Music Festival 2023
➢ Winner [CROSS] Tour in HCM
➢ Super Show 9 in HCM with Super Junior
➢ HCMC - Gyeongsangbuk-do Culture and Tourism Festival
➢ Korean Vietnam Partnership - Fair with LG
➢ Korean President visits Samsung Electronics R&D Center
➢ Vietnam Food Expo with Lotte Wellfood
"𝐄𝐯𝐞𝐫𝐲 𝐞𝐯𝐞𝐧𝐭 𝐢𝐬 𝐚 𝐬𝐭𝐨𝐫𝐲, 𝐚 𝐬𝐩𝐞𝐜𝐢𝐚𝐥 𝐣𝐨𝐮𝐫𝐧𝐞𝐲. 𝐖𝐞 𝐚𝐥𝐰𝐚𝐲𝐬 𝐛𝐞𝐥𝐢𝐞𝐯𝐞 𝐭𝐡𝐚𝐭 𝐬𝐡𝐨𝐫𝐭𝐥𝐲 𝐲𝐨𝐮 𝐰𝐢𝐥𝐥 𝐛𝐞 𝐚 𝐩𝐚𝐫𝐭 𝐨𝐟 𝐨𝐮𝐫 𝐬𝐭𝐨𝐫𝐢𝐞𝐬."
chapter 10 - excise tax of transfer and business taxation
Unit Iii
1. Extra Questions
Unit III
Concepts of planning and control
Ques 1.What is Total quality management (TQM)?
Ques 2.What are the different levels of management?
Ques 3.Why is planning important for Information systems?
Ques 4.What is organizational planning?
Ques 5.What is a business model? What are the components of a business model?
Ques 6.What is Information technology architecture for any business?
Ques 7.Discuss system analysis and design
Ques 8.Discuss MIS development procedure
Ques 9.Discuss quality in Information systems
Ques 10.Discuss acquisition of hardware, software and services for Information systems
Ques 11.Discuss computer peripherals and storage devices available
Ques 12.Discuss software available for IS development
Ques 13.What are structured and unstructured decisions? What are programmable and un-
programmable decisions?
Ques 14.What is Information system audit?
Ques 15.Briefly discuss the planning process. Discuss the three stage model of the planning
process
Ques 16.Discuss computational support for planning
Ques 17.Why is control important for management
Ques 18.Discuss different types of control.
Ques 19.What is feedback and why is it important?
Ques 20.Discuss the factors to be considered for Information system organization?
Ques 21.Discuss NOLANs four and six stage model
Ques 22.Discuss the content of IS master plan
Ques 23.Discuss post audit evaluation of IS applications
3. Answers
1.9.Quality in Information Systems
An application has quality relative to its primary and secondary users, operations personnel, control
personnel, maintenance personnel, and so forth. Ensuring continuous quality in IS throughout
development process is called Total quality management. TQM is a strategic approach to business
improvement.
Quality in information systems has a number of characteristics. The importance of each depends on
the application and its context. The following are some of the characteristics included in the concept
of quality in information systems:
Complete Data All data items are captured and stored for use. Data items are
properly identified with time periods.
Accurate data The correct data values are recorded
Precise data Measurement of variables meets user needs for precision
Understandable output The output of the system is understandable
Timely output The output of the application is available in time for actions and
decisions
Relevant output The outputs are relevant to the actions and decisions to be taken
Meaningful output The format, labelling, data provided, and context in which data is
presented makes the output meaningful for actions and decisions
User friendly operation The system provides user interfaces that are understandable and
designed to confirm to human capabilities
Error resistant operations Suitable error prevention and detection procedures are in place.
There are procedures for reporting and correcting errors. Various
audit procedures are applied.
Authorized use Only authorized personnel have access to facilities, applications
and data
Protection system and The system and its operations are protected from various
operations environmental and operational risks. There are provisions for
recovery in the event of failure or destruction of part or all of the
system.
The role of top management in information system quality control is to establish the overall
organization structure, select the information system executive, approve the information system
plan and budget, and evaluate performance.
2. Top level-Strategic management
Middle management –Tactical
Operational management-Operating management
3-4. Planning is an ongoing organizational function that provides the framework for operational
activities and decision making. The organization mission is translated into operational objectives
through an organizational hierarchy of planning activities. Formal organizational planning focuses
the energies and activities of the organization on achievement of its objectives, to reconcile
4. differences in objectives and plans of subareas and individuals within the organization, and to
remove doubts about what organization should do. Thus planning can help in motivation
5. A business model is a conceptual framework that expresses the underlying economic logic and
system that prove how a business can deliver value to customer at an appropriate cost and make
money. Components of business model are:
Components Questions
Customer value How is the firm offering its customers something distinctive at lower
cost using IT
Scope To which customer is the firm offering this value
Pricing How does the firm price the value
Revenue resource Where do the revenues come from
Connected activities Set of activities to be performed
Implementation What organizational structure, people, systems and environment is
needed by people to carry out these activities
Capabilities What are the capabilities or lack in capabilities of firm
Sustainability What keeps the firm in a strategic advantage
It is a valuable tool because it focuses attention on how all the essential components of a business
fit into a complete system. On the basis of such business models, new strategies can be built during
the planning phase.
6. It architecture is created by the strategic/ IT planning process and includes the following major
components:
• Technology platform consists of the networks, computer systems, software, applications
• Data resources include databases, warehouses etc.
• Application architecture is the architecture of the implemented system which may be cross
functional such as ERP, CRM etc.
• IT organization is the organizational structure for IS specialists
7. System Analysis and design is performed before the system is actually implemented. It forms the
basis for implementation and gives direction to the system implementation.
Steps in System Analysis and Design
1. Need for information (Nature of information)
2. Define the system (Nature of system)
3. Feasibility study (Technical, Economic, Operational)
4. Detailing the requirements (Precise requirements)
5. Conceptual System Design (Input, Process, Output)
6. Detailing the System design (DFDs, Data flows)
7. Structuring the system design (Hierarchy)
8. Conceptual model of computer system (processes)
9. Break the system in programmable modules
10. Develop the test data for checking the system ability
11. Install the system
12. Implementation
13. Review and maintenance
5. 8. Depending upon uncertainty level about the requirements gathered the development strategy is
selected. Following four strategies are discussed.
1. Acceptance assurance strategy is applied when the requirements are complete and correct.
Once the requirements are gathered they are implemented in the system.
2. Linear assurance process starts with requirement gathering and in each subsequent stage
there are assurance checks to confirm correct implementation
3. Iterative assurance process goes ahead like other methods, but whenever there is a need to
improve the requirements, it goes back to the first stage, thus being called iterative.
4. Experimental assurance process creates a prototype (a demo version) and then builds the
whole system on its basis, if it gets approved.
The implementation activities include:
1. Acquisition of hardware and software
2. Software development
3. End user training
4. System documentation
5. Conversion of system (Application in the organization)
10. Companies evaluate the hardware and software required for IS implementation, before they
acquire it. First the requirements are laid down in a request for quotation document. Basic
performance requirements are stated and quotations received for the product. Several companies
use a scoring system for evaluating multiple proposals. Independent hardware and software
information services can be used to gain detailed specifications. It should be ensured that hardware
is safe to use and technically competent. Software used should be reliable and compatible. Services
are generally provided with purchase of new hardware and software.
11. Review of Hardware and Software Technologies
Peripherals is the generic name given to all input, output and secondary storage devices that are
part of a computer system. Peripherals depend on direct connections or telecommunications links to
the central processing unit of a computer system.
Input technologies
1. Keyboard
2. Pointing devices
1. Electronic mouse
2. Trackball
3. Touchpad
4. Pointing stick
5. Touch screens use infrared beam, sound waves, or a slight electric current that is
broken when the screen is touched
3. Handwriting recognition through pen-based computing. PDAs have a pressure sensitive layer
like a graphics pad under their slate like liquid crystal display screen.
4. Speech recognition systems digitize, analyze, and classify your speech and its sound
patterns. The software compares your speech patterns to a database of sound patterns in its
vocabulary and passes recognized words to your application software.
5. Optical scanning devices read text or graphics and convert them into digital input for your
computer. Another technology is optical character recognition.
6. Magnetic stripe
7. Smart cards
6. 8. Digital cameras
9. Magnetic ink character recognition detects iron oxide-based ink
Output Technologies
1. Video output
1. Video monitors use a cathode ray tube technology
2. Liquid crystal displays (LCDs)
2. Printed output
1. Inkjet printers spray ink onto a page one line at a time.
2. Laser printers use an electrostatic process similar to a photocopying machine.
Storage
1. Magnetic tape records data in the form of magnetized spots on the iron oxide coating of the
plastic tape.
2. Magnetic disks contain metal disks that are coated on both sides with an iron oxide
recording material. Several disks are mounted together on which data is stored in the form
of tiny magnetized spots to form the binary digits
1. Floppy disks
2. Hard disk drives
3. RAID (redundant arrays of independent disks)
3. Optical disks are used by business for image processing
1. CD-ROM use a laser device to read the binary codes created by burning microscopic
pits in a spiral track by laser
2. CD-R records permanently
3. CD-RW use magneto optical technology
4. DVD
5. DVD-ROM
6. DVD-RAM
12.Software
Types of programming languages
1. Machine language/ Ist generation language: It is a series of 0s and 1s
2. Assembler language/ IInd generation language: It uses mnemonic names for
operations
3. High level language/ IIIrd level language: Instructions are in the form of statements
which are compiled or interpreted before being executed
4. Fourth level languages are more non-procedural with simpler syntax
5. Object oriented language
Classification of software
1. Application software which performs processing for end user
2. System software that supports operations of computer networks and systems
Types of software
1. Software suites are two or more packages bundled together e.g. Microsoft office, Lotus
notes suite
2. Software packages are a combination of some functions of several programs e.g. Microsoft
works
3. Web browsers enable easy use of internet
4. E-mail is a way of communicating with people
5. Word processors e.g. Microsoft word
6. Electronic spreadsheets e.g. Microsoft excel
7. 7. Presentation graphics e.g. Microsoft PowerPoint
8. Database management systems (DBMS)
9. Technologies for multimedia
10. Personal information managers e.g. lotus notes
11. Operating systems
12. Model generators facilitate the development of models and DSS. It includes programming
language, spreadsheets, and statistical packages. A good model generator should have easy
usability, access t o wide variety of data and analysis capability.
13. Model Base Management Systems (MBMS) manage models and analysis programs in much
the same way as the DBMS manages data.
13. Structured decisions are the ones that involve a methodological process for decision making and
a lot of experience is available for such decision making. Established models can be followed for
making such decisions. But some decisions are not structured and require personal judgement and
intuition. These decisions are based on the decision maker’s values and perception. It is difficult to
build a system which can replicate such decision making.
Similarly programmable decisions can be modelled whereas non-programmable decisions cannot be
replicated.
14. Auditors evaluate the Information systems against the laid down standards. Auditors specializing
in IS audits are called EDPs. External auditors study and evaluate the internal control. Their
evaluation process consists of the following steps:
1. Preliminary phase of review which forms the guideline for the rest of the review
2. Complete the review with a detailed study of the other control system
3. Obtain evidence to the compliance of existing system
4. Evaluation of the evidence
Internal auditors are the employees of the company and provide the controlling activities for the
system. They report to the managers and participate in post audit evaluation, periodic tests of
security and backup procedures.
15. Three stage model of the planning process
• It clarifies the generic planning activities, the order of activities, and the alternative
techniques and methodologies that apply
8. 16. Computational support for planning
There are four types of computational support needed for the analysis preparatory to planning, the
preparation of plan, and the output of results.
1. An analysis of historical data
2. Projections and forecasts for estimating future values
3. Computations internal to the plan and computations required for outputs
4. Organized output of results
Historical data analysis
Time trend analysis states the past trend over time for a particular quantity such as sales growth
over the past 5 years. Correlation analysis finds the degree of association between two sets of data.
Data description and dispersion using mean, median, mode and standard deviation
Historical Extrapolation Techniques
It involves combining past data analysis with planning. Time series extrapolation would state that if
past growth rate of data has been 5%, then it will be the same the next year as well. Similarly on the
basis of regression analysis we can assume the past patterns to maintain themselves. Similarly
percentages and ratios can be calculated
Financial Planning Computations
Rate of return, Break even analysis etc can be calculated
17. Managerial control implies the measurement of accomplishment against the standard and the
correction of deviations to assure attainment of objectives according to plans.
It is a continuous process of verifying whether actions are being taken as planned and taking
corrective action to ensure that events conform to plans as closely as possible.
Planning is meaningless without control and control is aimless without planning. Control
helps understand the need for revision of plans if required.
18. Information feedback systems
Open and closed loop
Information feedback is essential to an understanding of the self regulating nature of systems in
general and how this attribute can be applied in a MIS to aid in decision making
9. Control and feedback
Feed-forward control
These models of control can be implemented in IS and the reports generated can be used to find
deviations from plans
19. Once the plan has been implemented, it is important to see if it is being implemented or
operated in the right manner and it serves the business purpose correct. For this we evaluate the
system frequently and send reports in the form of feedback to the system. Feedback is important
because it helps in knowing the current position of business. Feedback that helps dampen and
reduce fluctuations around the standard is termed negative feedback and the feedback that
reinforces the direction in which the system is moving is called positive feedback.
20. Major issues are:
• Centralization and Decentralization
• Allocation of hardware and software
• Maintenance of the service level
• Fitting the organization of the MIS in corporate organization, its culture and management
philosophy
21. Information system growth models
Assumptions of NOLAN model
• Organizational learning
• Stages cannot be skipped
• Other than the natural process, these processes can be planned, coordinated, and managed
to move through the stages effectively and efficiently
• The NOLAN stage model
The organization must go through each stage of growth before it can progress to the next one, thus
giving an insight to planning regarding the stage of an IS
Stages of Information system growth
Stages of growth Description
10. Initiation Early use
Expansion Experimentation, rising cost
Formalization Organizational controls
Maturity Integration of applications
Stages
NOLAN six stage model
Stage Level of control or slack
I Low control. Some slack. No planning
II Greater slack due to encouraged use, integration and lack of planning
III High controls, planning given importance
IV Use of databases for integration
V Slack due to focus on strategically important systems
VI Application portfolio complete and matches organizational objectives
NOLAN alternative model
Due to technological changes the growth curve shifts as follows
11. Advantages and disadvantages of NOLAN model
• Advantages
– Evolutionist model as it focuses on development
• Disadvantages
– Lack of specificity as it does not define the mechanism for change
22. Content of Master development plan/ Information System plan/ Information Resource plan
The master plan has two components:- a long-range plan and a short-range plan. The long-
range plan provides general guidelines for direction and the short-range plan provides a
basis for specific accountability as to operational and financial performance. It consists of
the following subheadings:-
– Information system goals, objectives, and architecture
– Inventory of current capabilities
– Forecast of developments against the plan
– The specific plan
1. Information system goals, Objectives, and architecture
– Organizational goals, objectives, and strategies
– External environment (industry, government regulations, customers, and suppliers)
– Internal organizational constraints such as management philosophy
– Assumptions about business risks and potential consequences
– Overall goals, objectives, and strategy for the information system
– Architecture of the information system
2. Current capabilities
– Inventory of
– Hardware
– Software (System software, DBMS, etc)
– Application systems (classified on the basis of functional systems,
organizational strategy, maintenance need)
– Analysis of
– Expense
– Hardware utilization
– Software utilization
– Personnel utilization (further classification such as job, skill, functional area)
– Status of projects in progress
– Assessment of strengths and weaknesses
3. Forecast of developments Affecting plan
12. – Hardware and software technological availabilities should be forecasted with
expected impact on existing IS
– Methodology changes should be forecasted
– Environmental developments such as government regulations, tax laws and
competitors affecting IS should be stated
4. Specific plan
– Hardware acquisition schedule
– Purchased software schedule
• System Software
• Applications software
– Application development schedule
– Software maintenance and conversion schedule
– Personnel resources required and schedule of hiring and training
– Financial resources required by object of expenditure
The master plan is prepared from the CIO’s point of view and focuses on the planning strategy e.g. if
the planning strategy for consideration is the end-user computing, then the plan will highlight the
end users in the IS.
23. Post audit evaluation of IS Applications
The audit group reviews the objectives and cost-benefit representations made on behalf of the
project and compare them with actual performance and actual costs. It also reviews the operational
characteristics, documentation, backup and maintainability considerations. Control and security
provisions are examined. The results of post audit evaluation are used for improving profitability,
reference for future projects, replacing of application if no longer useful. The system is evaluated on
technical, operational and economic basis.
The existing hardware and software is also evaluated using monitors that detect performance, idle
resources, bottlenecks and load imbalance. Also system logs can be made that provide important
information for evaluation such as job times, problems with reruns etc.
24. Analysis of Organizational information requirements
• Information requirements are required at the organizational level for information system
planning, identifying applications, and planning an information system architecture.
• More detailed information requirements are required for detailed design of applications.
Strategy approach to the determination of Information requirements
• Constraints
– Humans as information processors
– Variety and complexity
– Complex patterns of interaction
– Unwillingness of some users
• Levels of requirements
– Organizational level requirements help in making the master plan. The overall
information architecture and the boundaries and interfaces of the individual
application subsystem are defined.
– Database level requirements define the data associated with organizational
processes.
– Detailed requirements for an application (social and technical) are based on the
needs of tasks or jobs.
13. Steps:
• Identify those characteristics of the four elements in the development process that affect
uncertainty in the determination of information requirements
– Utilizing system (Identify the existing business systems)
– Information system or application (Identify the existing information systems)
– Users (Identify the existing users)
– Analysis
• Evaluate the effect of the characteristics of the four elements in the development process
on three process uncertainties: (Which of these can be relied for collecting information)
– Existence and availability of a set of usable requirements
– Ability of users to specify requirements
– Ability of analysis to elicit and evaluate requirements
• Evaluate the combined effect of the process uncertainties on overall requirements
uncertainty
• Select a primary strategy for requirements determination based on the overall
requirements uncertainty.
– Asking
• Closed questions
• Open questions
• Brainstorming
• Guided brainstorming
• Group consensus
– Deriving from an existing information system
• Existing system being replaced by the new system
• Existing system in another , similar organization
• Proprietary system or commercial package
• Descriptions in textbooks, handbooks, industry studies etc.
– Synthesizing from characteristics of the utilizing system
• Normative analysis (normal or general requirements of any system)
• Strategy set transformation (organizational requirements)
• Critical factors analysis approach (critical success factors CSFs)
• Process analysis (Business systems planning BSP) studies the business
processes to understand the underlying requirements
• Ends-means analysis distinguishes inputs from outputs and identifies both
by interacting with the managers
• Decision analysis identifies the information required for decision making
• Socio-technical analysis
• Input-process-output analysis
– Discovering from experimentation with an evolving information system i.e. build a
sample program and understand from that system.
• Select one or more methods from the set of methods to implement the primary strategy