SlideShare a Scribd company logo
INTRODUCTION TO INFORMATION SYSTEMS
UNIT III
Introduction to Information Systems: Definition, Concepts and Recognition of Information Systems
Information Systems and Society, Information Systems and Organization
Constraints and Limitations of Information System.
INFORMATION SYSTEM
 1. Information systems capture data from the organization (internal data) and its environment (external
data).
 2. They store the database items over an extensive period of time.
 3. When specific information is needed, the appropriate data items are manipulated as necessary, and
the user receives the resulting information.
 4. Depending on the type of information system, the information output may take the form a query
response, decision outcome, expert-system advice, transaction document, or a report.
INFORMATION SYSTEM
Quality information needs to possess several attributes. Notably, it has to be:
 1. Timely Available when needed and not outdated when made available
 2. Complete Includes all the user needs to know about the situation where the information will be used
 3. Concise Does not include elements unneeded by the user
 4. Relevant Has direct bearing on the situation
 5. Precise Offers quantitative information with a degree of exactness appropriate to the underlying data
 6. Form The level of detail, tabular versus graphic display, and quantitative versus qualitative form are
selected in accordance with the situation Internal and External Information
INFORMATION SYSTEM
Quality information needs to possess several attributes. Notably, it has to be:
 1. Timely Available when needed and not outdated when made available
 2. Complete Includes all the user needs to know about the situation where the information will be used
 3. Concise Does not include elements unneeded by the user
 4. Relevant Has direct bearing on the situation
 5. Precise Offers quantitative information with a degree of exactness appropriate to the underlying data
 6. Form The level of detail, tabular versus graphic display, and quantitative versus qualitative form are
selected in accordance with the situation Internal and External Information
COMPONENTS OF INFORMATION SYSTEMS
Information systems consist of the following general components:
 1. Hardware
 2. Software
 3. Databases
 4. Human resources
 5. Procedures
COMPONENTS OF INFORMATION SYSTEMS
Hardware
Multiple computer systems: microcomputers, minicomputers, mainframes, together with their peripherals.
Computer system components are: a central processor(s), memory hierarchy, input and output devices.
Computer processor: The central processor carries out the instructions of a program, translated into a
simple form.
Memories: Included in a computer system form a hierarchy. They range from the fast electronic units, such
as the main memory, to the slower secondary storage devices such as magnetic disks.
Moore's Law The increases in the number of transistors on chips correspond to the increase in the
microprocessor speed and memory capacity, and thus the growth of the processing power.
Downsizing In information systems, transferring some or all of the organization;s computing from
centralized processing on mainframes or minicomputers to systems built around networked
microcomputers (often in a client/server configuration).
COMPONENTS OF INFORMATION SYSTEMS
Software
Computer software falls into two classes: systems software and applications software.
Systems Software: Manage the resources of the computer system and simplifies programming. An
operating system is the principal system software. It manages all the resources of a computer system and
provides an interface through which the system's user can deploy these resources.
Application Software: Are programs that directly assist end users in doing their work. They are purchased as
ready-to-use packages. Applications software directly assists end users in doing their work.
COMPONENTS OF INFORMATION SYSTEMS
Databases
Databases are organized collections of interrelated data used by applications software. Databases are
managed by systems software known as database management systems (DBMS) and shared by multiple
applications
INFORMATION SYSTEMS FOR MANAGEMENT SUPPORT:
The objectives of the three levels of corporate management are:
 1. Operations Management: performed by supervisors of smaller work units concerned with planning
and control of short-term (typically, a week or six months) budgets and schedules.
 2. Tactical Management: performed by middle managers responsible for acquisition and allocation of
resources for projects according to tactical plans, set out for one or two years.
 3. Strategic Management: Carried out by top corporate executives and corporate boards responsible
for setting and monitoring long-term directions for the firm for three or more years into the future.
RECOGNITION OF INFORMATION SYSTEM
IMPACTS OF INFORMATION SYSTEMS
 Organizational impacts of information systems
 These systems provide support for business operations; for individual and group decision making; for new
product development; for relationships with customers, suppliers, and partners; for pursuit of competitive
advantage; and, in some cases, for the business model itself (e.g., Google).
 Information systems bring new options to the way companies interact and compete, the way organizations are
structured, and the way workplaces are designed. In general, use of Web-based information systems can
significantly lower the costs of communication among workers and firms and cost-effectively enhance the
coordination of supply chains or webs.
 The use of information systems has enabled new organizational structures. In particular, so-called virtual
organizations have emerged that do not rely on physical offices and standard organizational charts. Two notable
forms of virtual organizations are the network organization and the cluster organization.
IMPACTS OF INFORMATION SYSTEMS
 Information systems in the economy and society
 The development of the Web-based ecosystem, accompanied by the low cost of hardware and
telecommunications and the availability of open-source software, has led to a flowering of entrepreneurial activity
and the emergence to prominence and significant market value of numerous firms based on new business
models. Among the examples are electronic auction firms, search-engine firms, social network platforms, and
online game companies.
 As the use of information systems has become pervasive in advanced economies and societies at large, several
societal and ethical issues have moved into the forefront. The most important are issues of individual privacy,
property rights, universal access and free speech, information accuracy, and quality of life.
 Intellectual property, such as software, books, music, and movies, is protected, albeit imperfectly, by patents, trade
secrets, and copyrights. However, such intangible goods can be easily copied and transmitted electronically over
the Web for unlawful reproduction and use. Combinations of legal statutes and technological safeguards,
including antipiracy encryption and electronic watermarks, are in place, but much of the abuse prevention relies
on the ethics of the user.
 Consumers can use the Web for shopping, networking, and entertainment—but at the risk of contending with
spam (unsolicited e-mail), interception of credit card numbers, and attack by computer viruses.
IMPACTS OF INFORMATION SYSTEMS
 Social Impact of Information Systems
 This affects our society in two ways: On an individual basis it means that any person in possession of some kind of
a computer has the capacity to store every document they will ever need in a single compact machine. This
connotes that computer allows people to set up businesses and work from home on a scale never seen before,
not to mention taking the human progress a step beyond that of the printing press by removing the need forhand
writing for the first time in our history.
 . Another effect of information systems is the rise in computer games. This has caused serious worries over how
they affect those who use them, and especially their effects on youth. The debate still rages over whether the large
number of violent computer games available influences those who play to imitate such behavior, with a host of
scientific research being done on the issue. Yet almost worrying are the statistics which seem to be highly
addictive to the quality of such games - most notably internet based ones. In contrast many have begun to see
the potential computers held as a means of education, since, unlike other traditional forms of teaching tools,
computer game based learning has a propensity to entertain the student. Businesses and organizations are
already using computers as educational devices and technology development tools, especially in the field of
virtual reality games and more would still follow. Whatever one's feelings on the growth of these video games, in
both recreational and educational formats they are becoming ever more of a reality, for instance the United States
military uses one of such game as a recruitment device.
IMPACTS OF INFORMATION SYSTEMS
 . Another interesting and undeniable effect is the use of internet in the societies worldwide; in fact, it
could be said to connect and eliminate differences between geographically and culturally separated
societies.
 The technology field has been overtaken with other types of behavior that can affect anyone who uses
technology such as computer crime. Computer crime is another prevalent social impact of information
system in our society.
LIMITATIONS TO INFORMATION SYSTEMS
 Loss of the human element: information systems cannot present all kinds of information accurately.
 Thick information, which is rich in meaning and not quantifiable, is best suited to human analysis.
Example: employee evaluations need face-to-face communication to convey all information.
 Difficult installations: Information systems can be hard to develop. To avoid problems:
 list major organization goals.
 build support for the system with workers.
 create formal training programs.
 emphasize that face-to-face contact is important.
TYPES OF CONSTRAINTS
 Equipment: The way equipment is currently used limits the ability of the system to produce more
salable goods/services.
 People: Lack of skilled people limits the system. Mental models held by people can cause behavior that
becomes a constraint.
 Policy: A written or unwritten policy prevents the system from making more.
TYPES OF CONSTRAINTS
 The major constraints of a new Information System (IS) project development are Scope, Time and
Budget (Cost). These constraints are also known as project management triangle.
PROJECT SCOPE
 Project scope is the work that needs to be accomplished with the specified features and functions in a
project. We can also say that the project scope is the goals that need to be fulfilled in order to complete
a project. Without proper project scope, the development team can go out of the track and produce the
final deliverable that is not intended by their clients. This will result in loss of time, resource to the
company whom develops the application. On the other hand, the cost will increase since they have to
recode the developed system to suit the client’s needs
TIME
 Time is a period measurement that is used in project scheduling to estimate the project duration. The
time here can be either in days, weeks, months or years depending on the complexity and size of the
project. The project duration should be carefully planned and enough time should be provided for each
stages. Without allocating proper time amount the system produced may not be at an optimum quality.
This is because the development team might need to rush to finish the project within the time frame
which results in poorly designed and coded system which is prone to error and bugs.
BUDGET (COST)
 Budget (Cost) provides a forecast of revenues and expenditures in the project. By evaluating budget, the
profit and loss can also be estimated. This will help to decide whether to undertake the project or not.
The budget estimation is a difficult task since it involves analysing skills and numerical values. Without
proper budget plan, the development can exceed or over spend which will lead into higher production
cost and lower profit margin.
THE MANAGEMENT LEVELS AND ITS CHARACTERISTICS
 1. Top level / Administrative level
 2. Middle level / Executory
 3. Low level / Supervisory / Operative / First-line managers
THE MANAGEMENT LEVELS AND ITS CHARACTERISTICS
1. Top Level of Management
It consists of board of directors, chief executive or managing director. The top management is the ultimate
source of authority and it manages goals and policies for an enterprise. It devotes more time on planning
and coordinating functions. The role of the top management can be summarized as follows -
 a. Top management lays down the objectives and broad policies of the enterprise.
 b. It issues necessary instructions for preparation of department budgets, procedures, schedules etc.
 c. It prepares strategic plans & policies for the enterprise.
 d. It appoints the executive for middle level i.e. departmental managers.
 e. It controls & coordinates the activities of all the departments.
 f. It is also responsible for maintaining a contact with the outside world.
 g. It provides guidance and direction.
 h. The top management is also responsible towards the shareholders for the performance of the
enterprise.
THE MANAGEMENT LEVELS AND ITS CHARACTERISTICS
2. Middle Level of Management
The branch managers and departmental managers constitute middle level. They are responsible to the top
management for the functioning of their department. They devote more time to organizational and directional
functions. In small organization, there is only one layer of middle level of management but in big enterprises,
there may be senior and junior middle level management. Their role can be emphasized as -
a. They execute the plans of the organization in accordance with the policies and directives of the top
management.
b. They make plans for the sub-units of the organization.
c. They participate in employment & training of lower level management.
d. They interpret and explain policies from top level management to lower level.
e. They are responsible for coordinating the activities within the division or department.
f. It also sends important reports and other important data to top level management.
g. They evaluate performance of junior managers.
h. They are also responsible for inspiring lower level managers towards better performance.
THE MANAGEMENT LEVELS AND ITS CHARACTERISTICS
3. Lower Level of Management
Lower level is also known as supervisory / operative level of management. It consists of supervisors, foreman, section officers, superintendent etc.
According to R.C. Davis, “Supervisory management refers to those executives whose work has to be largely with personal oversight and direction of
operative employees”. In other words, they are concerned with direction and controlling function of management. Their activities include -
a. Assigning of jobs and tasks to various workers.
b. They guide and instruct workers for day to day activities.
c. They are responsible for the quality as well as quantity of production.
d. They are also entrusted with the responsibility of maintaining good relation in the organization.
e. They communicate workers problems, suggestions, and recommendatory appeals etc to the higher level and higher level goals and objectives
to the workers.
f. They help to solve the grievances of the workers.
g. They supervise & guide the sub-ordinates.
h. They are responsible for providing training to the workers.
i. They arrange necessary materials, machines, tools etc for getting the things done.
j. They prepare periodical reports about the performance of the workers.
k. They ensure discipline in the enterprise.
l. They motivate workers.
m. They are the image builders of the enterprise because they are in direct contact with the workers.

More Related Content

What's hot

Information system infrastructure
Information system infrastructureInformation system infrastructure
Information system infrastructure
AssignmentPartner
 
E- business how businesses use information systems
E- business how businesses use information systemsE- business how businesses use information systems
Information system
Information systemInformation system
Information system
Rao Majid Shamshad
 
The role of computer in modern business
The role of computer in modern businessThe role of computer in modern business
The role of computer in modern business
Tuhin Parves
 
Information systems
Information systemsInformation systems
Information systems
Manahari Darshika Pemarathna
 
Information Management chapter 2
Information Management chapter 2Information Management chapter 2
Information Management chapter 2
KaleemSarwar2
 
Importance of Information Technology - MIT School of Distance Education
Importance of Information Technology - MIT School of Distance Education  Importance of Information Technology - MIT School of Distance Education
Importance of Information Technology - MIT School of Distance Education
MIT School
 
It seminar isr
It seminar isrIt seminar isr
It seminar isrASNA p.a
 
Understand issues related to use of information system
Understand issues related to use of information systemUnderstand issues related to use of information system
Understand issues related to use of information system
Rajesh Khadka
 
development of information system
development of information systemdevelopment of information system
development of information system
sowmya cn
 
3 softwares and elements of information system
3 softwares and elements of information system3 softwares and elements of information system
3 softwares and elements of information systemMrQaz996
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
Rownel Cerezo Gagani
 
Mis model
Mis modelMis model
Mis model
JananiSelvaraj10
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
Lesson 1
Lesson 1Lesson 1
Lesson 107Deeps
 

What's hot (20)

Information system infrastructure
Information system infrastructureInformation system infrastructure
Information system infrastructure
 
E- business how businesses use information systems
E- business how businesses use information systemsE- business how businesses use information systems
E- business how businesses use information systems
 
Information system
Information systemInformation system
Information system
 
The role of computer in modern business
The role of computer in modern businessThe role of computer in modern business
The role of computer in modern business
 
Information systems
Information systemsInformation systems
Information systems
 
Information Management chapter 2
Information Management chapter 2Information Management chapter 2
Information Management chapter 2
 
Importance of Information Technology - MIT School of Distance Education
Importance of Information Technology - MIT School of Distance Education  Importance of Information Technology - MIT School of Distance Education
Importance of Information Technology - MIT School of Distance Education
 
Chapter 4 MIS
Chapter 4 MISChapter 4 MIS
Chapter 4 MIS
 
It seminar isr
It seminar isrIt seminar isr
It seminar isr
 
Office automation sysmtems
Office automation sysmtemsOffice automation sysmtems
Office automation sysmtems
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Understand issues related to use of information system
Understand issues related to use of information systemUnderstand issues related to use of information system
Understand issues related to use of information system
 
development of information system
development of information systemdevelopment of information system
development of information system
 
3 softwares and elements of information system
3 softwares and elements of information system3 softwares and elements of information system
3 softwares and elements of information system
 
Acc 310
Acc 310Acc 310
Acc 310
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
 
Mis model
Mis modelMis model
Mis model
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 

Similar to Unit iii FMIS

MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
Shehanperamuna
 
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILUREINFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
Libcorpio
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docx
sherni1
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docx
deanmtaylor1545
 
information of system technology
information of system technologyinformation of system technology
information of system technology
bilal anjum
 
Navigating the Digital Nexus.docx
Navigating the Digital Nexus.docxNavigating the Digital Nexus.docx
Navigating the Digital Nexus.docx
greendigital
 
5517
55175517
5517
janpra10
 
ICT in the Context of global communication
ICT in the  Context of global communicationICT in the  Context of global communication
ICT in the Context of global communication
KAYJOANNELIWANAGAN
 
Management Information Systems MGMT205
Management Information Systems MGMT205Management Information Systems MGMT205
Management Information Systems MGMT205
Morenike Adekale, PMP, PMI_SP
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
AjayKumar73315
 
Hightech
Hightech Hightech
Hightech
Saimir Dine
 
Autonomic Computing: Vision or Reality
Autonomic Computing: Vision or RealityAutonomic Computing: Vision or Reality
Autonomic Computing: Vision or Reality
Ivo Neskovic
 
Information Technology, The Internet, and You
Information Technology, The Internet, and YouInformation Technology, The Internet, and You
Information Technology, The Internet, and You
AjboyDiog
 
Tugas bahasa inggris
Tugas bahasa inggrisTugas bahasa inggris
Tugas bahasa inggris
KevinLimsky
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
Konstantinos Demertzis
 
Management Information System(UNIT 1).pptx
Management Information System(UNIT 1).pptxManagement Information System(UNIT 1).pptx
Management Information System(UNIT 1).pptx
SURBHI SAROHA
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
ChristopherAntonius
 

Similar to Unit iii FMIS (20)

MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
 
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILUREINFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docx
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docx
 
information of system technology
information of system technologyinformation of system technology
information of system technology
 
Navigating the Digital Nexus.docx
Navigating the Digital Nexus.docxNavigating the Digital Nexus.docx
Navigating the Digital Nexus.docx
 
5517
55175517
5517
 
ICT in the Context of global communication
ICT in the  Context of global communicationICT in the  Context of global communication
ICT in the Context of global communication
 
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATIONHOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
 
Mis lecture 3
Mis lecture 3Mis lecture 3
Mis lecture 3
 
Management Information Systems MGMT205
Management Information Systems MGMT205Management Information Systems MGMT205
Management Information Systems MGMT205
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 
Hightech
Hightech Hightech
Hightech
 
Autonomic Computing: Vision or Reality
Autonomic Computing: Vision or RealityAutonomic Computing: Vision or Reality
Autonomic Computing: Vision or Reality
 
Information Technology, The Internet, and You
Information Technology, The Internet, and YouInformation Technology, The Internet, and You
Information Technology, The Internet, and You
 
Tugas bahasa inggris
Tugas bahasa inggrisTugas bahasa inggris
Tugas bahasa inggris
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
Case study no 2
Case study no 2Case study no 2
Case study no 2
 
Management Information System(UNIT 1).pptx
Management Information System(UNIT 1).pptxManagement Information System(UNIT 1).pptx
Management Information System(UNIT 1).pptx
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
 

More from Arnav Chowdhury

Startup Funding and Strategies for Future
Startup Funding and Strategies for FutureStartup Funding and Strategies for Future
Startup Funding and Strategies for Future
Arnav Chowdhury
 
Marketing Management Introduction.pptx
Marketing Management Introduction.pptxMarketing Management Introduction.pptx
Marketing Management Introduction.pptx
Arnav Chowdhury
 
Marketing Management Product.pptx
Marketing Management Product.pptxMarketing Management Product.pptx
Marketing Management Product.pptx
Arnav Chowdhury
 
Institutional Support to Entrepreneurship
Institutional Support to EntrepreneurshipInstitutional Support to Entrepreneurship
Institutional Support to Entrepreneurship
Arnav Chowdhury
 
New Venture Expansion and Exit Strategies
New Venture Expansion and Exit StrategiesNew Venture Expansion and Exit Strategies
New Venture Expansion and Exit Strategies
Arnav Chowdhury
 
Creating a Business Plan
Creating a Business PlanCreating a Business Plan
Creating a Business Plan
Arnav Chowdhury
 
Business Research Methodology ( Data Collection)
Business Research Methodology ( Data Collection)Business Research Methodology ( Data Collection)
Business Research Methodology ( Data Collection)
Arnav Chowdhury
 
Business Research Methods (Introduction)
Business Research Methods (Introduction)Business Research Methods (Introduction)
Business Research Methods (Introduction)
Arnav Chowdhury
 
Planning and organizing Entrepreneurial Venture
Planning and organizing Entrepreneurial VenturePlanning and organizing Entrepreneurial Venture
Planning and organizing Entrepreneurial Venture
Arnav Chowdhury
 
Fundamentals of Entrepreneurship
Fundamentals of EntrepreneurshipFundamentals of Entrepreneurship
Fundamentals of Entrepreneurship
Arnav Chowdhury
 
ICT tools in Education
ICT tools in EducationICT tools in Education
ICT tools in Education
Arnav Chowdhury
 
Unit v: Cyber Safety Mechanism
Unit v: Cyber Safety MechanismUnit v: Cyber Safety Mechanism
Unit v: Cyber Safety Mechanism
Arnav Chowdhury
 
UNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement StrategiesUNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement Strategies
Arnav Chowdhury
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
Arnav Chowdhury
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Arnav Chowdhury
 
Information Technology and Modern Gadgets
Information Technology and Modern GadgetsInformation Technology and Modern Gadgets
Information Technology and Modern Gadgets
Arnav Chowdhury
 
Unit ii FMIS
Unit ii FMISUnit ii FMIS
Unit ii FMIS
Arnav Chowdhury
 
Unit iv graphics
Unit iv  graphicsUnit iv  graphics
Unit iv graphics
Arnav Chowdhury
 
Unit v: Device Management
Unit v: Device ManagementUnit v: Device Management
Unit v: Device Management
Arnav Chowdhury
 
Unit iii: Audio
Unit iii: AudioUnit iii: Audio
Unit iii: Audio
Arnav Chowdhury
 

More from Arnav Chowdhury (20)

Startup Funding and Strategies for Future
Startup Funding and Strategies for FutureStartup Funding and Strategies for Future
Startup Funding and Strategies for Future
 
Marketing Management Introduction.pptx
Marketing Management Introduction.pptxMarketing Management Introduction.pptx
Marketing Management Introduction.pptx
 
Marketing Management Product.pptx
Marketing Management Product.pptxMarketing Management Product.pptx
Marketing Management Product.pptx
 
Institutional Support to Entrepreneurship
Institutional Support to EntrepreneurshipInstitutional Support to Entrepreneurship
Institutional Support to Entrepreneurship
 
New Venture Expansion and Exit Strategies
New Venture Expansion and Exit StrategiesNew Venture Expansion and Exit Strategies
New Venture Expansion and Exit Strategies
 
Creating a Business Plan
Creating a Business PlanCreating a Business Plan
Creating a Business Plan
 
Business Research Methodology ( Data Collection)
Business Research Methodology ( Data Collection)Business Research Methodology ( Data Collection)
Business Research Methodology ( Data Collection)
 
Business Research Methods (Introduction)
Business Research Methods (Introduction)Business Research Methods (Introduction)
Business Research Methods (Introduction)
 
Planning and organizing Entrepreneurial Venture
Planning and organizing Entrepreneurial VenturePlanning and organizing Entrepreneurial Venture
Planning and organizing Entrepreneurial Venture
 
Fundamentals of Entrepreneurship
Fundamentals of EntrepreneurshipFundamentals of Entrepreneurship
Fundamentals of Entrepreneurship
 
ICT tools in Education
ICT tools in EducationICT tools in Education
ICT tools in Education
 
Unit v: Cyber Safety Mechanism
Unit v: Cyber Safety MechanismUnit v: Cyber Safety Mechanism
Unit v: Cyber Safety Mechanism
 
UNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement StrategiesUNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement Strategies
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Information Technology and Modern Gadgets
Information Technology and Modern GadgetsInformation Technology and Modern Gadgets
Information Technology and Modern Gadgets
 
Unit ii FMIS
Unit ii FMISUnit ii FMIS
Unit ii FMIS
 
Unit iv graphics
Unit iv  graphicsUnit iv  graphics
Unit iv graphics
 
Unit v: Device Management
Unit v: Device ManagementUnit v: Device Management
Unit v: Device Management
 
Unit iii: Audio
Unit iii: AudioUnit iii: Audio
Unit iii: Audio
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Unit iii FMIS

  • 1. INTRODUCTION TO INFORMATION SYSTEMS UNIT III Introduction to Information Systems: Definition, Concepts and Recognition of Information Systems Information Systems and Society, Information Systems and Organization Constraints and Limitations of Information System.
  • 2. INFORMATION SYSTEM  1. Information systems capture data from the organization (internal data) and its environment (external data).  2. They store the database items over an extensive period of time.  3. When specific information is needed, the appropriate data items are manipulated as necessary, and the user receives the resulting information.  4. Depending on the type of information system, the information output may take the form a query response, decision outcome, expert-system advice, transaction document, or a report.
  • 3. INFORMATION SYSTEM Quality information needs to possess several attributes. Notably, it has to be:  1. Timely Available when needed and not outdated when made available  2. Complete Includes all the user needs to know about the situation where the information will be used  3. Concise Does not include elements unneeded by the user  4. Relevant Has direct bearing on the situation  5. Precise Offers quantitative information with a degree of exactness appropriate to the underlying data  6. Form The level of detail, tabular versus graphic display, and quantitative versus qualitative form are selected in accordance with the situation Internal and External Information
  • 4. INFORMATION SYSTEM Quality information needs to possess several attributes. Notably, it has to be:  1. Timely Available when needed and not outdated when made available  2. Complete Includes all the user needs to know about the situation where the information will be used  3. Concise Does not include elements unneeded by the user  4. Relevant Has direct bearing on the situation  5. Precise Offers quantitative information with a degree of exactness appropriate to the underlying data  6. Form The level of detail, tabular versus graphic display, and quantitative versus qualitative form are selected in accordance with the situation Internal and External Information
  • 5. COMPONENTS OF INFORMATION SYSTEMS Information systems consist of the following general components:  1. Hardware  2. Software  3. Databases  4. Human resources  5. Procedures
  • 6. COMPONENTS OF INFORMATION SYSTEMS Hardware Multiple computer systems: microcomputers, minicomputers, mainframes, together with their peripherals. Computer system components are: a central processor(s), memory hierarchy, input and output devices. Computer processor: The central processor carries out the instructions of a program, translated into a simple form. Memories: Included in a computer system form a hierarchy. They range from the fast electronic units, such as the main memory, to the slower secondary storage devices such as magnetic disks. Moore's Law The increases in the number of transistors on chips correspond to the increase in the microprocessor speed and memory capacity, and thus the growth of the processing power. Downsizing In information systems, transferring some or all of the organization;s computing from centralized processing on mainframes or minicomputers to systems built around networked microcomputers (often in a client/server configuration).
  • 7. COMPONENTS OF INFORMATION SYSTEMS Software Computer software falls into two classes: systems software and applications software. Systems Software: Manage the resources of the computer system and simplifies programming. An operating system is the principal system software. It manages all the resources of a computer system and provides an interface through which the system's user can deploy these resources. Application Software: Are programs that directly assist end users in doing their work. They are purchased as ready-to-use packages. Applications software directly assists end users in doing their work.
  • 8. COMPONENTS OF INFORMATION SYSTEMS Databases Databases are organized collections of interrelated data used by applications software. Databases are managed by systems software known as database management systems (DBMS) and shared by multiple applications
  • 9. INFORMATION SYSTEMS FOR MANAGEMENT SUPPORT: The objectives of the three levels of corporate management are:  1. Operations Management: performed by supervisors of smaller work units concerned with planning and control of short-term (typically, a week or six months) budgets and schedules.  2. Tactical Management: performed by middle managers responsible for acquisition and allocation of resources for projects according to tactical plans, set out for one or two years.  3. Strategic Management: Carried out by top corporate executives and corporate boards responsible for setting and monitoring long-term directions for the firm for three or more years into the future.
  • 11. IMPACTS OF INFORMATION SYSTEMS  Organizational impacts of information systems  These systems provide support for business operations; for individual and group decision making; for new product development; for relationships with customers, suppliers, and partners; for pursuit of competitive advantage; and, in some cases, for the business model itself (e.g., Google).  Information systems bring new options to the way companies interact and compete, the way organizations are structured, and the way workplaces are designed. In general, use of Web-based information systems can significantly lower the costs of communication among workers and firms and cost-effectively enhance the coordination of supply chains or webs.  The use of information systems has enabled new organizational structures. In particular, so-called virtual organizations have emerged that do not rely on physical offices and standard organizational charts. Two notable forms of virtual organizations are the network organization and the cluster organization.
  • 12. IMPACTS OF INFORMATION SYSTEMS  Information systems in the economy and society  The development of the Web-based ecosystem, accompanied by the low cost of hardware and telecommunications and the availability of open-source software, has led to a flowering of entrepreneurial activity and the emergence to prominence and significant market value of numerous firms based on new business models. Among the examples are electronic auction firms, search-engine firms, social network platforms, and online game companies.  As the use of information systems has become pervasive in advanced economies and societies at large, several societal and ethical issues have moved into the forefront. The most important are issues of individual privacy, property rights, universal access and free speech, information accuracy, and quality of life.  Intellectual property, such as software, books, music, and movies, is protected, albeit imperfectly, by patents, trade secrets, and copyrights. However, such intangible goods can be easily copied and transmitted electronically over the Web for unlawful reproduction and use. Combinations of legal statutes and technological safeguards, including antipiracy encryption and electronic watermarks, are in place, but much of the abuse prevention relies on the ethics of the user.  Consumers can use the Web for shopping, networking, and entertainment—but at the risk of contending with spam (unsolicited e-mail), interception of credit card numbers, and attack by computer viruses.
  • 13. IMPACTS OF INFORMATION SYSTEMS  Social Impact of Information Systems  This affects our society in two ways: On an individual basis it means that any person in possession of some kind of a computer has the capacity to store every document they will ever need in a single compact machine. This connotes that computer allows people to set up businesses and work from home on a scale never seen before, not to mention taking the human progress a step beyond that of the printing press by removing the need forhand writing for the first time in our history.  . Another effect of information systems is the rise in computer games. This has caused serious worries over how they affect those who use them, and especially their effects on youth. The debate still rages over whether the large number of violent computer games available influences those who play to imitate such behavior, with a host of scientific research being done on the issue. Yet almost worrying are the statistics which seem to be highly addictive to the quality of such games - most notably internet based ones. In contrast many have begun to see the potential computers held as a means of education, since, unlike other traditional forms of teaching tools, computer game based learning has a propensity to entertain the student. Businesses and organizations are already using computers as educational devices and technology development tools, especially in the field of virtual reality games and more would still follow. Whatever one's feelings on the growth of these video games, in both recreational and educational formats they are becoming ever more of a reality, for instance the United States military uses one of such game as a recruitment device.
  • 14. IMPACTS OF INFORMATION SYSTEMS  . Another interesting and undeniable effect is the use of internet in the societies worldwide; in fact, it could be said to connect and eliminate differences between geographically and culturally separated societies.  The technology field has been overtaken with other types of behavior that can affect anyone who uses technology such as computer crime. Computer crime is another prevalent social impact of information system in our society.
  • 15. LIMITATIONS TO INFORMATION SYSTEMS  Loss of the human element: information systems cannot present all kinds of information accurately.  Thick information, which is rich in meaning and not quantifiable, is best suited to human analysis. Example: employee evaluations need face-to-face communication to convey all information.  Difficult installations: Information systems can be hard to develop. To avoid problems:  list major organization goals.  build support for the system with workers.  create formal training programs.  emphasize that face-to-face contact is important.
  • 16. TYPES OF CONSTRAINTS  Equipment: The way equipment is currently used limits the ability of the system to produce more salable goods/services.  People: Lack of skilled people limits the system. Mental models held by people can cause behavior that becomes a constraint.  Policy: A written or unwritten policy prevents the system from making more.
  • 17. TYPES OF CONSTRAINTS  The major constraints of a new Information System (IS) project development are Scope, Time and Budget (Cost). These constraints are also known as project management triangle.
  • 18. PROJECT SCOPE  Project scope is the work that needs to be accomplished with the specified features and functions in a project. We can also say that the project scope is the goals that need to be fulfilled in order to complete a project. Without proper project scope, the development team can go out of the track and produce the final deliverable that is not intended by their clients. This will result in loss of time, resource to the company whom develops the application. On the other hand, the cost will increase since they have to recode the developed system to suit the client’s needs
  • 19. TIME  Time is a period measurement that is used in project scheduling to estimate the project duration. The time here can be either in days, weeks, months or years depending on the complexity and size of the project. The project duration should be carefully planned and enough time should be provided for each stages. Without allocating proper time amount the system produced may not be at an optimum quality. This is because the development team might need to rush to finish the project within the time frame which results in poorly designed and coded system which is prone to error and bugs.
  • 20. BUDGET (COST)  Budget (Cost) provides a forecast of revenues and expenditures in the project. By evaluating budget, the profit and loss can also be estimated. This will help to decide whether to undertake the project or not. The budget estimation is a difficult task since it involves analysing skills and numerical values. Without proper budget plan, the development can exceed or over spend which will lead into higher production cost and lower profit margin.
  • 21. THE MANAGEMENT LEVELS AND ITS CHARACTERISTICS  1. Top level / Administrative level  2. Middle level / Executory  3. Low level / Supervisory / Operative / First-line managers
  • 22. THE MANAGEMENT LEVELS AND ITS CHARACTERISTICS 1. Top Level of Management It consists of board of directors, chief executive or managing director. The top management is the ultimate source of authority and it manages goals and policies for an enterprise. It devotes more time on planning and coordinating functions. The role of the top management can be summarized as follows -  a. Top management lays down the objectives and broad policies of the enterprise.  b. It issues necessary instructions for preparation of department budgets, procedures, schedules etc.  c. It prepares strategic plans & policies for the enterprise.  d. It appoints the executive for middle level i.e. departmental managers.  e. It controls & coordinates the activities of all the departments.  f. It is also responsible for maintaining a contact with the outside world.  g. It provides guidance and direction.  h. The top management is also responsible towards the shareholders for the performance of the enterprise.
  • 23. THE MANAGEMENT LEVELS AND ITS CHARACTERISTICS 2. Middle Level of Management The branch managers and departmental managers constitute middle level. They are responsible to the top management for the functioning of their department. They devote more time to organizational and directional functions. In small organization, there is only one layer of middle level of management but in big enterprises, there may be senior and junior middle level management. Their role can be emphasized as - a. They execute the plans of the organization in accordance with the policies and directives of the top management. b. They make plans for the sub-units of the organization. c. They participate in employment & training of lower level management. d. They interpret and explain policies from top level management to lower level. e. They are responsible for coordinating the activities within the division or department. f. It also sends important reports and other important data to top level management. g. They evaluate performance of junior managers. h. They are also responsible for inspiring lower level managers towards better performance.
  • 24. THE MANAGEMENT LEVELS AND ITS CHARACTERISTICS 3. Lower Level of Management Lower level is also known as supervisory / operative level of management. It consists of supervisors, foreman, section officers, superintendent etc. According to R.C. Davis, “Supervisory management refers to those executives whose work has to be largely with personal oversight and direction of operative employees”. In other words, they are concerned with direction and controlling function of management. Their activities include - a. Assigning of jobs and tasks to various workers. b. They guide and instruct workers for day to day activities. c. They are responsible for the quality as well as quantity of production. d. They are also entrusted with the responsibility of maintaining good relation in the organization. e. They communicate workers problems, suggestions, and recommendatory appeals etc to the higher level and higher level goals and objectives to the workers. f. They help to solve the grievances of the workers. g. They supervise & guide the sub-ordinates. h. They are responsible for providing training to the workers. i. They arrange necessary materials, machines, tools etc for getting the things done. j. They prepare periodical reports about the performance of the workers. k. They ensure discipline in the enterprise. l. They motivate workers. m. They are the image builders of the enterprise because they are in direct contact with the workers.