Sunteți pe pagina 1din 95

HHRIM 2104: Information Systems and Technology in Health Care

Contact hours: 42hrs



Purpose
This course is designed to equip the Health Records and Information Management
learner with necessary knowledge; skills to enable them use a computer in managing
health information services

Expected Learning Outcomes
By the end of the course unit the learners should be able to: -
i. Describe the concept of computers
ii. Differentiate between manual and electronic data processing
iii. Discuss systems applications in health records management
iv. Describe telemedicine

Content
Computer technology: Introduction to computer hardware, CPU architecture, input
devices. Operating systems: Windows, NT, Windows servers, Unix, multitasking,
peripheral components. Storage devices: magnetic and optical media
Systems applications: Application software: word processors, database management,
spreadsheets, power points, statistical packages SPSS, Epi Info, Stata, SAS, User
Interfaces.
Electronic Health Records: Radiology Picture Archiving and Collection (PAC) system,
VTP, Electronic appointment systems.

References
i) Barasa M.K. and Wambugu. S 2004, Strengthening the health information system:
Kenyan experience
ii) Ministry of health 1999, Health Information Management System report
iii) Ministry of Medical Services 2009, Health Information Management Unit

Chapter 1: Introduction to computers

Definition of Electronic computer
A computer is a collection of electronic devices used to process data. Earlier computers were massive,
special-purpose machines that only big institutions such as governments and universities could afford.
They were used to perform complex numerical computations, such as planning the missile trajectories.
Although computers were certainly quite effective in such operations, it soon became clear that they
could be helpful for performing a number of tasks.
In 1964, IBM introduced its mainframe computer (system/360). This became very popular and as a
result, IBM became the standard against which other computer manufactures and their systems would
be benchmarked for many years to come. By 1980s, introduced the personal computer (PC)

Organization of a computer system
Any computer, regardless of its size, shape, or usage, is related to four logical parts:
Hardware
Software
Data
People

a. Hardware is the part of the computer that can be touched and seen. Its made up of
interconnected electronic devices that control the operations of the computer.
b. Software is a group of instructions that tell the hardware what to do. These instructions are also
known as programs. Each program is written for a specific purpose. E.g. Ms Outlook is popular
software used for managing e-mails, calendar, etc.
c. Data is the unprocessed set of information, which the computer can manipulate. When
processed, data becomes information. E.g. the pay details for all employees are data. After a
computer processes them and generates pay slips, this becomes information. A computer file is
simply a set of data or program instructions.
d. People interacting with computers can be end users, programmers, system analysts etc.

Computer Hardware
The internal components of a computers hardware can be classified into the following categories:
Processor
Memory
Input and output devices
Storage devices

a. Processor
Its conceptually the brain of the computer. It organizes and carries out instructions that initiate
either from the user or from the software. The processor usually consists of one or more
microprocessors, which are made up of silicon or other material. The processor is often known by
the name of the central processing unit (CPU).
b. Memory
The area of memory can be visualized as the computers electronic scratchpad. A computer loads a
program into the memory, where it is executed. Data used by the program used by the program is also
loaded into the memory.
The most typical example of a computers memory is the Random Access Memory (RAM). RAM is
volatile i.e. it needs a constant power supply and its contents vanishes when the computer is shut down.
The amount of memory a computer has greatly affects the speed of the computer. The higher the
memory, generally the better is the computer performance. The amount of memory is measured in bits
or bytes. Bit stands for binary digit which means either a 0 or a 1. A byte is a group of 8 bits.
Types of memory
a. Cache memory
This is a high speed memory whose speed compares to that of the C.P.U. Its used to interface
the slow communicating main memory to the C.P.U. It acts as a buffer that receives the data,
instructions and/or information from the main memory, at the speed of the main memory and
remits them to the C.P.U at the speed of the C.P.U and vice versa. The cache memory is usually
used in large computer systems, which ever the case it speeds up the rate of processing by
easing communication between the CPU and the main memory, i.e. movement of data and
instructions to the CPU and remitting back to the main memory of the immediate results.
b. Bubble Memory
This type of memory represents data and instructions within it in terms of magnetic principles
i.e. polarized spots (bubbles) to give binary representation of data, instructions and/or
information. A bubble represents a 1 while the absence of a bubble represents a 0.
The bubble memories are very expensive with limited but can withstand adverse conditions e.g.
dust and the memory cells do not loose data when they are de-energized by switching off the
power. They are convenient and easy to develop.
They are suitable where the internal (main) memory is to be expanded limitlessly, i.e. the virtual
storage technique, where high speed access is necessary for transferring small manageable data
or program segments, what is described as pages, into the main memory in turn for execution
by the C.P.U.


c. Holographic Memory
This memory uses the principles of light to store data, instructions and information; hence its
also described as optical memory. The data, instructions and or information stored are in terms
of smear of dots on light sensitive plate. These memories are non-volatile and have got vast
storage capacity.
d. Core memory
This is an internal store, which is made up of small magnetic rings, which are magnetic rings,
which are magnetized by the wires threaded on them. This ferrite core forms the memory cells
that are the basis of storage. The polarity of these magnets are set using currents to represent
data, instruction or information in terms of 1s and 0s. The core store are permanent, the set
polarities do not change even if the power is switched off, unless current is passed in the
opposite direction.
e. Semi-conductor Memory
Are the most used memory by current computers. They are cheaper and faster than magnetic
core memory. They are also available in a small board. The drawback of semi-conductor memory
is that it is volatile and loses its contents in the event of power failure but this can be overcomed
by having back-up power units.

Semi-conductor memories have greatly replaced the core memories because: -
They are small and occupy comparatively less space
Their access time is low i.e. they are fast for they operate purely on electronic principles
and hence reliable
They are inexpensive to produce hence lower cost
Generally, consume comparatively less power

Main Memory Classification
The main memory can be classified into two memory sections the RAM and the ROM.
a. RAM (Random Access Memory)
RAM is volatile i.e. it needs constant power supply and loses its contents when the computer is
shut down.
Functions of RAM
It stores data and instruction awaiting processing
Stores the instructions being obeyed or whose parts have been obeyed by the computer
Stores the immediate results, the results of computer working/calculations, before
being communicated to their recipients (computer users) through the output unit
b. ROM (Read Only Memory)
The ROM is non-volatile i.e. its contents remain intact even if the power is switched off.


Functions of ROM
Its stores the data and instructions that is necessary for the normal functioning of the computer
system hardware. (ROM stores system data and interactions)
It stores the control programs that are necessary for the initial activation of the hardware on
power switch on.

Concept of Virtual Storage
Computers memory is used to store data and instruction. Often user data and instructions may
overcome the RAM capacity. One common solution to this problem is to design the program and/or
data, in such a way that the programs and data are subdivided into small manageable units described as
segments, modules or pages that can be conveniently maintained in the memory.
The pages are then stored in a direct access store from where these pages can be swapped into the
main memory automatically under the operating system routine known as the paging supervisor.
Individual segments are called into memory obeyed by the computer and the next segment from the
direct access store swapped with the completed segment in memory i.e. when a segment is transferred
from the direct access store it replaces the segment that previously occupied the memory.
The process continues until all the modules in the direct store are executed by the computer. One the
part of the user (programmer, the program developer) the computer memory is expanded limitlessly,
and their big programs can run within the available internal memory without the memory size
limitation. This is the concept known as virtual storage.










Operating
System




Available
Memory
S1

S2

S3

S4

S5

Program
Segments
(DAS) e.g.
disk
Buffers:
This is a special purpose temporary memory location, used during input/output (I/O) or processing to
hold data and/or instruction temporarily between communicating devices/ elements. They are used to
counterbalance the speed differences between the communicating elements, because buffers accept
data instruction or information at the speed of the sending module/element and remit them at the
speed of the receiving module.
Registers:
These are temporary storage location within the CPU. They are used to hold data and instructions
temporarily during processing. They are more costly than the memory and their contents can be
handled by the computer in faster mode as compared to the main memory. The registers are special
purpose storage locations usually used by the control units, during the fetch and execute cycle, to store
control influences and instructions and by the ALU to store data.

Computer Input devices
Input devices accept data and instructions from the user.
Keyboard
The keyboards are used to type in data and/or instructions to the computer as input in a form that the
computer can understand i.e. in terms of electronic signals representing the digital bits, the 1s and 0s.
Document readers
These are input devices that directly sense the data and/or instructions from some documents and then
convey them to go as computer input directly in terms of electronic signals and with no requirement for
verification because the transcription process is not involved.
Optical Character Reader
Characters are formed on to the document using a typewriter or computer printer in a special
type font. Characters such as alphabetic, numeric or special characters are formed in a manner
which is both human and machine sensible.
Optical character recognition (OCR) is a data capture technique which enables the computer to
read printed or handwritten documents-directly.
Optical Mark Reader (OMR)
The documents are preprinted with predefined data positions. These positions can then be
marked by e.g. pencil shade. The marked position can then be sensed by the OMR to transfer
the pre-determined data value to go as computer input.

The OMR use the principle of light to sense the positional marks, i.e. the marks are interpreted
using reflected light by these positional marks, and conveys them to go as computer input in
terms of electronic signals. The OMR are used in marking multiple choice questions,
questionnaires, insurance premium collection etc.
Magnetic Ink Character Reader (MICR)
The document characters are typed or printed using ink containing particles of iron II oxide,
which gives them magnetic property. After forming the characters onto the document, the
magnetic ink encoded characters are magnetized by passing the document under a strong
magnetic field.
Mouse
This is an input device used as alternative to a keyboard, to provide a direct on-line input. The
mouse is a box like device with sensor buttons and a ball that slides it on the flat surface. It
controls the cursor to move about the screen as desired.
Light pen
Its like a pen like device, which is light sensitive and is hand held. They are used as design aids.
It provides a direct input mode. The light pen can be used in conjunction with a graphic VDU,
which is able to sense light shining on the screen using special hardware.
Touch Sensitive Panels
Is used as input method to replace the use of a light pen i.e. the touch sensitive panels are an
alternative to light pen. The finger is used to select the options instead of the light pen. This
method is used in conjunction to the VDU, which is able to sense the touched points on the
screen.
Joystick
This is used to play computer games on domestic computers. The game is played by joystick
controlling the cursor movement on the screen.
Digitizers
These are input devices that convert graphical drawings or images on the paper or other
material into digital data and convey them to as computer input.


Bar codes
In bar codes, data is represented by bars of different breadth that alternate the bar and spaces
to represent data in terms of 1s and 0 are using some character codes, which represents data in
terms of binary notation.
Other input devices include: scanners, voice input, badge readers etc.
Voice recognition
The facility to control a computer program or carry out data entry through spoken commands
via a microphone connected to a sound card.
Video capture card
The video capture card records and stores video sequences (motion video)]
Digital camera
A digital camera captures and stores still images in a cameras memory until they can be
transferred to a personal computer.
Touch screen
The touch screen is a transparent; pressure-sensitive covering that is attached to the screen of
the monitor. Uses make selections and control programs by pressing on the screen. Although
touch screens are simple to use, they are comparatively expensive and require special software
to operate
Selecting input devices
It is appropriate to select an appropriate means of data entry in order to ensure that any
computerized system works as efficiently as possible. The collection of data on a very large
scale, for example, usually requires an approach that involves automating the process as far as
possible.
The selection of input depends on: -
Volume-some input devices are unsuitable for dealing with large volumes of data.
Speed if large volume of data needs to be entered, speed and accuracy may be an important
consideration for many business applications.
Accuracy-it is essential to ensure that data entry is completely accurate.
Complexity of data-some methods are unsuitable for entering data of a complex nature
Cost-although some methods offer high levels of speed and accuracy, an organization may be
unwilling or unable to purchase the hardware and software required. In such cases an
alternative means of data entry may be required
Frequency of data entry. Some types of data entry may be carried out on an infrequent or ad
hoc basis. In these cases, the acquisition of new or specialized input devices may not be
justifiable.

Computer Output
The result of any computer processing is known as output. Output from a process may be of two forms;
it may be in a form that is human readable/understandable i.e. either printed or drawn, or if the
information is required for subsequent process run, it may be stored temporarily on machine-readable
media.

The quality of a computer system can be accessed by the quality of the output it generates. The essence
of designing and implementing a data processing system is to generate desirable output. The quality,
validity and usefulness of the output is influenced by the output facility used.
Factors that determine the actual choice of a computer output
Suitability to the application
The speed at which the output is required
Whether a printed version is required
The volume of data
Cost of the method chosen as compared with the benefits to be derived.

Output devices
i) Printers
This is a device that provides the hard copy output, which is permanent and hence desirable for the
information or results of the computer working can be maintained for future reference and/or the
information conveniently distributed to reach many recipients.
Classification of printers
The printers can be classified as character, line and page printers depending on how they produce the
document prints
Character printers
These provide one character print at a time hence comparatively slow. They are less costly as compared
to line or page printers. They are used with the slow communicating terminals or stand-alone systems,
which serve single users at a time.

Line printers
These printers provide one whole line print at a time, hence relatively more expensive than character
printer but less costly as compared to the page printers. They are faster than character printers but
slower than the page printers. They are mostly connected to the mini computers and mainframe
computers where the speed of printing is a real necessity for it is a shared resource in such instances.
i) Page printers
These provide one whole page print at a time hence faster than both character and line printers. The
page printers are the most expensive type of printers for their speed and are usually connected to the
mainframe computers where a variety of the computer users are to be served when producing their
information from the computer memory at an appreciable time scales.
ii) Graph plotters
These are output devices that produce graphical output e.g. diagrams, maps etc. The commonly
available plotters are the flat bed plotter and drum plotter. Graph plotters are applied basically in
Computer Aided Design (CAD) and architectural designs.
iii) Magnetic media
The computer output/information from the computer memory can also be directed into magnetic
storage media e.g. the tape or disk, instead of being printed or displayed.
Such output directed to any of the magnetic storage media is thus magnetically coded. This method is
used where such results/ output of processing is to be stored for future retrieval /or further processing.
iv) Voice Output
The information from the computer memory which is in electronic form is transformed to wave forms,
through various specialized additional circuitry, for the recipients of such information to hear. Voice is
useful where reading is not necessary or is impossible and fast output is required, though the output is
non-permanent and may be boring for prolonged output. Voice output is applied e.g. as learning aids, in
emergency situations for messages, in answering services e.g. post office talking clock
v) Microform
Computer output to microfilm (COM), also known as computer output microform, is often used to
achieve large quantities of information for future reference. Information is processed via a personal
computer and sent directly to a device that produces microfilm negatives.
A related technology is known as document image processing (DIP). Documents are treated as pictures
or images and stored directly to compact disc or tape.
v) Visual Display Unit
This is an output device in the form of a cathode ray tube which can display readable information on the
tube.
CLASSIFICATION OF COMPUTERS
The most common classification of computers is as follows: -
Supercomputer
Mainframe
Minicomputer
Microcomputer or personal computer
i) Supercomputer
These are the most powerful type of computers. They can process huge amounts of data very fast
(supercomputers can perform about one trillion calculations per second). Scientists construct models for
complex processes and simulate them on a supercomputer. Supercomputers are very expensive and
consume heavy amounts of electricity.
ii) Mainframe
These are used in large organizations, which need frequent access to common information.
Supercomputers are rarely used by private organizations or for common use. Mainframes are the largest
commonly used e.g. in banks, airlines, insurance companies, stock exchanges, foreign exchange markets,
etc.
Typically, employees work at computer terminals. (A terminal is a keyboard and screen connected to the
mainframe. A terminal does not have its own CPU or storage (Dumb terminal)). All terminals are
controlled by a mainframe computer that handles the input, output and processing needs of all the
terminals connected to it. They are quite big in size and can occupy entire rooms or even a floor of a
building.
They are mainly used by governments for maintaining peoples demographic data, tax information etc.
Many big stores use mainframes to track sales, update inventory position etc.
iii) Minicomputer
These are called mini, because they were smaller in size as compared to computers of those days (e.g.
Mainframes). However, by todays standards, we can call them giants. Minicomputers are considered to
be somewhere between mainframes and personal computers.
Similar to mainframes, minicomputers can process large inputs and outputs as compared to personal
computers. They are well suited to the needs of quite a few organizations and companies because they
are cheaper than mainframes, but have some features of mainframes.
iv) Personal computers
These computers are also referred to as microcomputer. The term refers to computers, which are
usually found at homes, workplaces and classrooms. Personal computers appear in many forms, sizes,
and brands. The popularity of the PCs is due to many reasons, chief of these being their economical
nature, ease of use and availability, and rapidly declining costs of hardware devices, such as memory,
I/O etc. The capability of the PC continuously increases, with simultaneous decrease in costs. This
makes the PC an extremely viable option for individuals as well as all kinds of organizations.

Variations of the PC are the notebooks (also called as laptops), and handheld computers (also called as
palmtops).
Applications of computers
These days, computers are such flexible tools that most people use them everyday. Some examples of
this are:
Office workers use computers to write emails/memos, maintain employee records, create
budgets, communicate with co-workers, find information, manage projects etc.
Almost all business people who work away from office also use computers. For instance,
salespeople use computers to manage accounts and make presentations.
The banks, post offices, government offices, telephone companies and so many other parties
use computers extensively.

Science
Scientists use computers to develop theories, gather data and test results, and exchange information
with colleagues. Scientists also use computers for simulating complicated events, such as predicting
rainfalls or change in weather patterns. Computers help tremendously in space exploration. Satellites
have beamed back to the earth a great amount of information about the solar system and the cosmos.
Education
Computers have truly revolutionized the area of education. Computers can be found everywhere-from
classrooms to museums and from libraries to labs. Students use computers to create science projects,
project reports and gather information from the internet.
In the libraries, computers are used to read articles and other materials of interest from magazines and
journals hosted on the computer. They can be used for distance education programs as well.
Medicine
Computers are used extensively in this area and healthcare. The usage spans from diagnosing diseases
to and monitoring patients to controlling the robotic movements of surgical assistants.
Legal practice
The lawyers, attorneys and all others concerned with the legal profession also make extensive use of
computers. Attorneys can quickly browse through huge collections of information for previous
judgments and historical evidences. Attorneys working on portable computers (called laptops or
notebooks) can make their own notes.

Manufacturing
Factories use robotic arms to carry out physical work, which is dangerous or monotonous.
Manufacturing with computer and robotics is called Computer-Aided Manufacturing (CAM). Computers
take over the entire production process, from design to manufacturing.
Entertainment
Computers are heavily used in all the areas of entertainment, such as movies, live shows, and dramas,
creating and recording music.
History and Generations of Computers
The term computer generation is used quite frequently. This term refers to the historical classification
and the milestones that have occurred during the development of the computing devices over the last
few decades.
Zeroth Generation of computers (1642-1945)
Blaise Pascal (1623-1662) is credited with the distinction of building a working calculator. Pascal had
devised this calculator when he was only 19 to help his father, who worked as a tax collector. This
calculator could only perform additions and subtractions.Later, the famous German mathematician
Baron Gottfried Wilhelm Von Leibniz
(1646-1716) developed another mechanical calculator, which could perform multiplication and division.
In 1834, Charles Babbage (1792-1871) built a machine called difference engine. This machine had a
mechanical design where wheels, gears, cogs, were used. This computer was slow and unreliable. Later
Babbage improved on his basic ideas to come up with another machine, called the analytical engine. The
analytical engine was a far much superior, general purpose, computing machine. It provided five
important components, which are a part of even the modern computer: an input unit, a processor, a
memory unit, a control unit, and an output unit.
First generation computers (1945-1955)
The worlds first real computer was the Electronic Numerical Integrator and Calculator (ENIAC) built in
1946 in Pennsylvania, USA. ENIAC used vacuum tube devices. The main purpose behind ENIAC was to
predict the missile trajectories.
ENIAC had a lot of limitations, including a very small amount of memory, slow operations. The
programming was only done in machine language, which could be termed the first generation language.
These computers used big physical devices in their circuitry and hence were very big in physical size.
They consumed a lot of power generating a lot of heat and hence non-reliable as the circuitry
components were prone to failure.

Second Generation of Computers (1955-1965)
Although the first generation computers demonstrated that they could perform arithmetic and logical
operations successfully, there were major problems associated with them. Most notably, these
computers were large in size, generated a lot of heat, were slow and needed programming in machine
language, which was quite cumbersome to learn and use.
The second generation computers used transistors (invented at the Bell Labs USA in 1948). Transistors
offered an alternative, which was both cheap and effective. Transistors are quite small compared with
the vacuum tubes, and work far more efficiently without generating heat.
The PDP-1 computer was the first major machine based on the transistor, and was launched in 1961 by
Digital Equipment Corporation (DEC). PDP-1 was called as minicomputer, because it was small compared
to other computers of those times.
International Business Machines (IBM) came up with their computers, most notably, the 1401 and the
7094. Popular computer programming languages such as ALGOL, FORTRAN and COBOL emerged during
this generation.
Third Generation Computers (1965-1980)
The integrated circuit (IC) was the major milestone in the third generation of computer history. An IC
contains a number of transistors on a single silicon chip. Thus a single IC can perform the job of dozens
of transistors (these days, millions of transistors). This meant additional processing power with
reduction in the overall size of the computer.
IBM soon integrated their two highly successful computers, the 7094 and the 1401 and bought them
under the umbrella of system/360. The major achievement of system/360 was the possibility of
multiprogramming i.e. allowing multiple programs to reside in the memory of the computer at the same
time, and executing them one after the other.
Fourth Generation of Computers
The fourth generation computers were a modification of the third generation computers technology.
They use complex circuitry, an enhancement of the IC technology of the third generation computers.
The design of this generation computer is based on large scale integration (LSI) of circuitry and very
large scale integration (VLSI) of circuitry.
Fifth Generation Computers
The design of these computers was based on the VLSI technology, the microchip technology that gave
rise to smaller computers, known as the micro computers in use today. Examples of microcomputers are
IBM PCs (IBM personal computers), BBC micro etc. The micro computers are usually described as PCs or
stand alone or desk top computers because they were designed to primarily serve single person at a
time, though the trend is to have micro computers that can support more than one person at a time.

NB:
Research shows that the trend in the computers technological revolution is that there is: -
Continual decrease in computer size
Improved speed and power of processing
Decrease in computer and its related facilities cost
Number of components per circuit (IC) greatly increased, over 500000 physical elements e.g.
transistors, capacitors, diodes etc per chip. (IC)
Types of computers
There are a variety of computers, with a variety of their operational characteristics. The computers can
be classified in many useful ways. These can be classified as under: -
a) By the types of data which they can manipulate: -
i) Digital computers
ii) Analogue computers
b) By the purpose for which they are designed: -
i) General purpose computers
ii) Special purpose or dedicated computers
c) A mixture of data handling types: -
i) Hybrid computers
d) Scientific and business computers
e) On the basis of price, size and capabilities
i) Mainframe
ii) Minicomputers
iii) Micro computers
iv) Personal computers (pcs)


Chapter 2: Computer software











Software
Software is defined, as series of detailed instructions that control the operation of computer system.
Software exists as programs that are developed by computer programmers.
There are two main categories of software
System software
Application software
System software
Manages and controls the operation of the computer system as it performs tasks on behalf of
the user
This is a set of programs that coordinates the activities and functions of the hardware and other
programs throughout the computer system.
The combination of a hardware configuration and systems software is known as a computer
system platform
System software consists of three basic categories
- Operation system
- Development programs
- Utility programs

Software
Systems
Software

Applications
software
Operating
System
Utility
Programs
Development
Programs
General
Purpose
software
Application
specific
software
Operating systems
Software that interacts with the h/w of the computer in order to manage and direct the
computers resources
This is a set of programs that controls the computer hardware and acts as an interface with
applications
The operating system can control one or more computers, or they can allow multiple users
interact with one computer.

Combinations of OS
Single computer with single user:- this system is commonly used in a person computer or a
handheld computer that allows one user at a time
Single computer with multiple users:- This is a typical of larger, mainframe computers that can
accommodate hundreds or thousands of people, all using the computer at the same time\
Multiple computers:-this is typical of a network of computers, such as a home network with
several computers attached or a large computer network with hundreds of computers attached
around the world
Special purpose computers:- This system is typical of a number of special purpose computers,
such as those that control sophisticated military aircraft, the space shuttle, and some home
appliances
The basic functions of the operating system include: -
Control access to storage devices for example disk drives
Co-ordinate and control peripheral devices e.g printers.
Allow users to input data and issue instructions e.g allowing data to be entered via keyboard.
Co-ordinate and control the operation of programs e.g by scheduling processor time
Manage the computer memory.
Perform file management e.g by allowing users to create and delete files
Deal with errors e.g by displaying a message to the user if a fault is detected within a h/w
component.
Providing networking capability
Operating system can be described as text based or graphical. A text-based operating system uses a
command line interpreter (CLT) to accept instructions from the user. Command line interpreter (CLT)
Passes instructions from a user to a computer program as instructions from a user in the form of brief
statements entered via keyboard.

Graphical user interpreter (GUI) - Provides a means for a user to control a computer program using a
mouse to issue instructions using menus and icons.


Network software (NOS)
In general the network operating system (NOS) used by an organization will provide the majorities of
facilities required to support workgroup computing.e.g the n o s will allow a network manager to
define to define a group of users belonging to a particular workgroup.
Services of N O S
A centralized storage space can be created on the network system for exclusive use of workgroup
members. The security features of NOS can be used to restrict access to documents and other data by
those outside of the workgroup. The workgroup can be given network privileges that allow individual
member to access to resources and facilities that are not normally available to others
Examples: - windows N T, UNIX, NOVELL NETWARE
Utility programs
These provide a range of tools that support the operation and management of a computer system.
Programs that monitor system performance or provide security controls are examples of utility
programs.
Application software
This consists of programs that help users solve particular computing problems.
These are a set of programs that enable users to perform specific information processing
activities. Application software can be divided into two broad categories
General purpose
Application specific
General purpose
General-purpose applications describe programs that can be used to carry out a wide range of common
tasks. A word processor for example, is capable of producing a variety of documents that are suitable for
many different purposes. This type of application is often referred to as productivity software, since it
helps improve efficiency.
Business tasks carried out in the office
1. Document production and graphics software- This involves the creation of various internal and
external documents, including letters, reports, invoices, notes and minutes of meetings e.g text
editors, word processors, and desktop publishing packages.
2. Processing numerical information using spreadsheets All organizations require the means to
store, organize and Analyze numerical data. The spreadsheet program represents the most
common means of carrying out these tasks
3. Storage and retrieval of using database: - All organizations require the means to store, organize
and retrieve information. Electronic databases packages represent the most common means of
carrying out these tasks
4. Multimedia software: - Multimedia involves the user interacting with a computer using media such
as text, sound, animation and video. Its main business applications are computer-based training and
customer service in retail applications
5. Sending and retrieving information using the internet and intranets: - This describes the activities
involving internal and external communications such as email and the use of web browsers to find
information on the World Wide Web.
Application specific
Describes programs intended to serve a specific purpose or carry out a clearly defined processing task.
E.g. payroll
Document production software
One of the most common activities in a business organization is the production of documents for
external and internal use.
Internal documents can include inter-office memos, reports and summaries such as minutes of meetings
External documents can include invoices, sales, brochures and correspondence. A modern view of
document production sees technology as used in three basic ways:
Word processing
Desktop publishing
Document management

Word-processing: - is concerned with entering or editing text, with emphasis on the content of the
document. It allows the production of simple documents but gives limited control over layout.
Desktop publishing: -is concerned with the overall appearance of documents, placing a great deal of
emphasis on features that provide control over the layout and presentation of a document
Document management: -involves documents such as company procedures, which are circulated to a
large number of people in an organization.
Word-processing
A word processor provides the ability to enter, edit, store and print text. Word processing packages
allow users to alter the layout of documents and often provide a variety of formatting tools
Features
a) Editing text:- all word processing programs allow users to enter, edit, copy, move, and delete text.
This process of entering or correcting text is known as editing
b) Word wrap:- as users type text and move towards the end of a line, the program automatically
moves to the beginning of a new line. The spacing between words and characters is also adjusted so
that the appearance of the text is improved.
c) Justification: - a word processor allows the user to control text alignment, that is, the layout of the
margins on the page.
d) Block operations: - all word processors (packages) allow users to manipulate blocks of text in a
number of ways. Once a block of text has been marked, it can be moved, deleted, copied or
formatted. Word processors also allow these blocks to be cut and pasted
e) Search and replace: -programs such as word for windows allow the user to search an entire
document for a specific word or phrase. Once the text has been located, it can be deleted or
replaced with something else. Searches can be conditional, where the word or phrase must appear
exactly as specified or unconditional, where any occurrence of the text will be found.
f) Type/font styles: - Most word processing packages allow users to specify the style, font and point
size of text. Style refers to text effects such as bold, italics and underlined. The type face used in a
document is referred to as the font
g) Page layout: - word processing packages allow users to specify the layout of the pages in the
document. This is done by setting the sizes of the top, bottom and left and right margins of the page
and by selecting the size of the paper that will be used
h) Headers and footers: - a header is a piece of text that appears at the top of every pages of the
document. Headers are typically used to print a chapter heading or title at the top of each page.
Footer appears at the bottom of each page. Footers are typically used to print page numbers at the
bottom of every page. Headers and footers can be seen in many publications, including newspapers,
books and magazines.
i) Mail merge: - packages such as word for windows allow sets of personalized letters to be produced
by merging information taken from a separate data file with a standardized form document.
Example a database could be used to hold the names and addresses a number of business clients. A
standard letter could be produced with blanks where the name and address of the client are meant
to appear. When the mail merge process begins, each name and address would be inserted in the
document and printed. Mail merge is not restricted to names and addresses; any kind of data can be
merged into a standard document. This allows mail merge to be used for applications ranging from
the production of invoices to personalized newsletters.
j) Import/export of data: - many word processors allow documents to be saved in a number of
formats. This allows users to produces a document, save it to disk and then load into, for example, a
desktop publishing program for further enhancement.
a) Exporting: -The process of saving a file in a format compatible with another software package
b) Importing: -the process of loading a file created with another package.
k) Graphics and tables: - Modern word processors allow users to incorporate graphics and tables of
figures into their documents. E.g. word can import pictures from a range of sources e.g. GIF, TIFF,
PIC, GEM and PCX
l) Columns:- Many packages allow users to generate columns within their documents. These can be
used in a number of ways, including producing a newspaper- like layout for newsletters and other
documents.
m) Spellchecker and thesaurus: - Most packages allow users to check spelling of every word in a
document. When an error is detected, the program can suggest alternative spellings and make any
corrections automatically. The thesaurus function found in most modern packages can be used to
suggest synonyms and antonyms for a highlighted word or phrase.
n) Multiple windows: -the majority of packages allow users to work on more than one document at a
time. Each document is displayed in a window on the screen and the user can move between
windows using the mouse or by pressing special keys. This allows users to carry out a number of
useful activities, such as copying a block of text from one document to another, without having to
open and then close the documents in order.
o) Macros: -a macro is a sequence of instructions that can be used to automate a complex or repetitive
task.
p) Auto correct: - this feature attempts to correct the spelling as the user types. This corrects common
misspelling mistakes.
q) Tabs:-special markers, known as tabs, can be set so that users can move to specific columns in the
document with the use of the TAB key. This allows tables of numbers or columns of text to be
created quickly and easily.
r) Print preview:- the print preview feature displays a document exactly as it will be printed, enabling
users to check and correct the document without making unnecessary printouts.
s) Drawing and graphics:- many packages provide a variety of drawing tools, allowing users to add
lines, shapes or graphic files to their documents.
t) Tables: - many packages allow users to produce tables containing a specified number of rows and
columns. Tables created in this way often provide some of the functionality of a spreadsheet
program, although this is often limited.

Graphics programs

Graphics packages can be divided into the following basic categories: -
Drawing (or paint) packages
Design packages
Presentation packages
Diagramming packages
Photo-editing programs

Drawing programs
Paint programs serve the same purpose as a sketchpad or easel and enable users to produce drawing
using a variety of different techniques. A combination of tools allows users to create drawings made up
of freehand lines and regular shapes. Among the tools available are the following: -
A palette of drawing tools can be used to mimic the effects of drawing with different materials,
including pens, spray cans, brushes and charcoal.
Selection tools can be used to copy, erase or resize sections of a drawing
Painting tools let users apply shading and colors to areas or shapes
Text tools allow users to add text to drawing. Users specify the typeface, size, color and style of
the text
Special tools provide a range of sophisticated features. A color replacement tool, for example,
can be used to change one color for another within specified section of the image.
Diagramming software
The need to produce a wide variety of business-related charts and diagrams has resulted in the
emergence of numerous diagramming packages. Majority of these packages assume little technical
knowledge and rely on menus, icons and palettes of tools in order to construct diagrams.
In order to produce a chart or diagram, users select shapes and symbols from a library of prepared
materials.

Diagramming tools such as Visio tend to offer relatively limited number of stencils from which users can
select. However, all packages cater for a range of common business diagrams. A typical package will
provide stencils that enable users to produce flow charts, office layouts, organizational charts, network
diagrams, project timelines and block diagrams
Photo-editing software
The growth in the use of optical scanners and video capture devices has resulted in a need for tools that
can be used to manipulate photographic images. Photo-editing packages enable users capture, view,
edits scanned images.
Although the majority of photo-editing programs provide many of the features found in paint packages,
most provide more sophisticated tools intended especially for use with scanned images. Two typical
examples include:
Capture features enable users to acquire images directly from an optical scanner attached to the
computer system, removing the need for the user to control two separate programs
Filters can be used to apply a range of special effects to an image. E.g. they can sharpen a
blurred image or alter brightness and contrast.
Processing Numerical Information Using Spreadsheets
A spreadsheet is a program designed to store and manipulate values, numbers and text in an efficient
and useful way.
Modeling:
Applications of spreadsheets
Financial application. Common applications include the production of cashflow forecasts,
accounting statements, invoices, purchase orders, sales orders, quotations, managing expenses
and project management
Modeling and simulation. Modeling involves creating a representation of an existing situation
or set of circumstances, while simulation involves predicting new situations or circumstances. In
both cases, a model is produced that provides a numerical representation of the situation or
circumstances being studied.
o What if? Analysis: this describes the ability to see the predicted effect of a change made
to a numerical model
Statistical analysis. All spreadsheet programs provide a wide range of tools that can be used to
analyze numerical information in a number of ways. Examples
o Goal seeking: in a spreadsheet, goal seeking describes a way of automatically changing
the values in a formula until a desired result is achieved.
o Many programs offer a descriptive statistics feature that can be used to generate
various summaries relating to a block of data. The spreadsheet performs a simple
analysis and automatically creates a set of descriptive statistics.
Features of a spreadsheet
Automatic formulas: many programs allow users to enter part of a formula, completing the rest
of it automatically. The auto sum feature for example is found in a number of different
programs and automates the generation of totals.
Formatting: all spreadsheet programs provide a variety of tools that can be used to enhance the
appearance of worksheets. A built-in range of numeric formats, for example, allows users to
display values as currency or to a fixed number of decimal places. Users may also adjust the
width and height of rows and columns, use different typefaces and make use of shading, colour
and lines
Functions: all spreadsheet contain a number of built-in functions that can be used to simplify
the construction of a worksheet. Functions are normally divided into a number of different
categories so that users can locate them easily. Some typical categories include:
o Date and time: these allow users to perform calculations dealing with dates, e.g.
calculating the number of working days between two dates.
o Database: typical functions include the ability to sort rows or columns into specified
order.
o Financial: these provide a variety of financial and accounting functions, e.g. the ability
to calculate loan repayments based on factors such as the interest rate and the amount
borrowed.
o Logical: these allow users to create formulas that perform calculations according to
whether or not specific conditions have been met.
o Lookup and reference: these provide a range of functions that can be used to create
more sophisticated worksheets. E.g. a user might wish to create a formula that looks up
a value from a table
o Mathematics: these include mathematical and trigonometry functions, such as
factorials, exponential numbers and square roots
o Statistical: these allow users to produce statistical information, such as frequency
distributions.
o Text: these provide various methods for manipulating text, such as converting a piece of
text into a value.
Charts: an integral feature of spreadsheet programs is the ability to create a variety of different
charts based on the data held in the worksheet. These include bar charts, line graphs, area
charts. The charts created by spreadsheet programs are often described as live or dynamic,
meaning that if the data in the worksheet is altered, the chart will be updated automatically in
order to reflect the changes.
Workbooks and multiple worksheets: modern packages enable a user to organize groups of
worksheets within a single workbook. In addition, several workbooks can be opened at the same
time. This facility allows users to carry out large or complex tasks more easily and quickly.
Views and scenarios: modern spreadsheet packages is the ability to create views on the data
held in a worksheet or workbook. The use of views enables to focus on specific sections of the
worksheet by displaying data in a predetermined way. E.g. a manager might wish to view only
the summary information held in a worksheet. In order to cater for this, a view could be created
that displays only the required information, hiding all other data from sight.
Database functions: the way in which data is organized within a worksheet, by rows and
columns, means that all spreadsheet programs are capable of being used to perform simple
database operations. Although spreadsheet programs are clearly unable to offer the
functionality of a specialized database program, all programs offer the basic functions of
queries, filters and sorting.
Data analysis tools: the majority of modern spreadsheet packages contain a number of tools
designed to automate common data analysis tasks. These tools remove the need for users to
memorize complex formulae and perform all calculations automatically.
Import/export of data: spreadsheet programs are able to deal with data drawn from a variety of
different sources. In many cases, files produced by other packages can be imported directly into
a worksheet with no loss of data.

Storage and retrieval of information using databases
Prior to the introduction of electronic database systems, almost all of the information an organization
needed to store was organized using manual filling systems. Typical methods included filing cabinets and
card index records. Although manual filing systems are used widely are still used widely, electronic
databases are also commonplace and are considered to provide a number of important benefits to
business organizations.
Disadvantages of manual filing
The way in which information is organized largely determines the uses to which it can be put.
For example, if a list of customers is stored in alphabetical order by name, it is difficult to view
customers by location.
It is often difficult to retrieve specific items of information quickly
It might not be possible to add, amend or delete the information held in a manual record
without creating a new copy of the record
It is sometimes difficult to classify information so that it can be stored in the correct location.
This makes it difficult to locate specific items of information at a later date.
If information is used regularly by a number of different individuals or departments, multiple
copies of manual files may need to be maintained. This alone can introduce a number of
difficulties arising from the duplication of data e.g.
o Extra expense is incurred in terms of the additional storage space and labour power
required to maintain files
o Changes made to one set of files may not be reflected in all copies. This can mean that
some files contain outdated information, while others may contain new additional
details.
o If a standardized filing system is used, this may not suit the needs of all users. On the
other hand, the use of different filing systems creates problems in maintaining files and
location information.
Advantages of electronic databases
A database will allow users to organize information in a variety of different views. The
information can be reorganized quickly. This allows an organization to maximize its usage of
information it holds, through techniques such as data mining.
The powerful search facilities provided by electronic database programs can be used to locate
and retrieve information many thousands of times faster than by manual methods.
An electronic database provides facilities for users to add, amend or delete records as required.
Additional facilities simplify data entry and assist in managing the information held.
Sophisticated indexing features mean that the same basic information can be stored under a
number of different categories. This provides great flexibility and allows users to locate, retrieve
and organize information needed.
Databases used throughout a company are usually accessed by many different users across a
network system. Some advantages of this approach include:
o Since the unnecessary duplication of information is minimized, the costs involved in
maintaining records are reduced
o Any changes made to the information held in the database are reflected to all users,
ensuring consistency at all times
o Although information is held in a structured manner, the database software will
normally provide sufficient flexibility to meet the different requirements of individual
users and departments.

An overview of the types of database
Database: a collection of related information stored in an organized way so that specific items can be
selected and retrieved quickly. A database need not involve the use of technology examples of manual
databases include telephone directories, address books, diaries and card index files.
Database Management Systems
One or more computer programs that allow users to enter, store, organize, manipulate and retrieve
data from a database.
Field
Fields and records organize the data in an electronic database. A field is a single item of information,
such as a name or a quantity
Record
This is a collection of related fields
Table
In an electronic database, data is organized within structures known as tables. A table is a collection of
many records.
Databases management systems
The introduction of database management systems altered the way in which organizations managed
their data resources.
Characteristics of DBMS approach
Programs include a range of general purpose tools and utilities for producing reports or
extracting data.
The availability of general purpose tools enabled not-technical users to access data, extract
records and produce reports with little support from technical staff
The use of DBMS encouraged organizations to introduce standards for developing and operating
their databases.
Approaches to file processing
Three basic approaches have become popular for design of electronic databases:
File processing
Database management systems
Relational database management systems
File processing
Early data processing systems were based around numerous files containing large amounts of data
related to daily business transactions. As a result, many organizations found themselves in a position
where they held large amounts of valuable data but were unable to maximize their use of it. A major
problem stemmed from the fact that the data held was often stored in different formats, for example
completely different structures might be used to store details of sales and purchases.
Characteristics of file processing
Data was held separately from the programs that made use of it
Programs were limited in functionality as they were often created to perform a single task-
carrying out new tasks often resulted in a need to create a completely new program.
Since a relatively high degree of technical knowledge was needed to create and operate
programs, non-technical users often found it difficult to access the information they needed.
The process of developing new programs each time new requirements needed to be addressed
was considered expensive, time consuming and inefficient

This type of database is sometimes described as having a flat file structure (a self-contained database
that only contains one type of record or table and cannot access data held in other database files). Flat
file databases are suited to relatively small applications where the data held does not need to be cross-
referenced with other data files. Since the structure of a flat file tends to be quite simple, data can be
processed very quickly. E.g. an address book
Free form database
A free form database allows users to store information in the form of brief notes or passages of text.
Each item can be placed within a category or assigned to one or more keywords. Information is
organized and retrieved by using categories or keywords
A modern variation of free-form databases comes in hypertext databases. In a hypertext database
information is stored as a series of objects and can consist of text, graphics, numerical data and
multimedia data. Any object can be linked to any other, allowing storing disparate information in an
organized manner.
Both free form and hypertext databases provide great flexibility in terms of the type and content of the
information stored. However they are unsuitable for certain applications, e.g. those involving complex
data from across an organization.
An example of a free form database is in the help files found within most software packages. An
example of a hypertext database could be the pages available via the World Wide Web.

Database Management Systems
The introduction of database management systems altered the way in which organizations managed
their data resources. Although data was still held separately from the programs that made use of it, this
new approach offered greater flexibility while reducing development and operating costs.
Characteristics of DBMS
Programs included a range of general-purpose tools and utilities for producing reports for
extracting data. This meant that comparatively little development was needed in order to
undertake new tasks
The availability of general-purpose tools and utilities enabled non-technical users to access data.
Users were able to analyze data, extract records and produce with little support from technical
staff.
The use of DBMS encouraged organizations to introduce standards for developing and operating
their databases. E.g. many organizations developed standards governing the structure of any
new data files created.

Main Types of DBMS
Relational Database Management Systems (RDBMS)
The popularity of the RDBMS approach grew from a need to share data resources across the entire
organization. Relational databases enable data to be stored within a number of different tables. They
are the most widely used type of database. Separate record designs can be used to store data dealing
with different subjects e.g. a database used for stock control might use separate record designs to store
information concerning items stocked, re-order levels and supplier details.
Primary Key:
The tables within a relational database can be linked together using one or more record keys. All records
must contain a unique record key called a primary key. Its used to identify a specific record.
Relationship: in a relational database, data can be combined from several different sources by defining
relationships between tables.
Compound key: in a relational database, it is possible to retrieve data from several tables at once by
using record keys in combination, often known as a compound key.
Object-oriented databases
An object oriented approach to database design employs the concept of reusable objects in order to
develop sophisticated or complex applications. An object combines data structures with any functions
needed to manipulate the object or data it holds.
Object-oriented database is made up of objects combining data structures with functions needed to
manipulate the object or the data it holds. As an example, an object called Employee might be created
to store details such as name, address, and age etc. to be stored. In addition, the object would also
contain facilities that allow various actions to be performed, such as changing an employees address:
Advantages of object-oriented databases

Since objects are self-contained, they are easy to manage, for example changes can be made to an
individual object without necessarily altering any other part of the system.
New objects can be created quickly and easily from existing ones.
Objects can be copied or transferred into new systems with little difficulty
Features of relational database management systems
Multiple tables. The majority of modern database programs support the creation of relational
databases containing several linked tables.
Forms. All major database programs enable to create and modify data entry forms. A data entry
form provides a convenient means of viewing, entering, editing and deleting records.
Indexes. An index stores information concerning the order of records in the database. The index
lists the location of records but does not alter the actual order of the database. They are used to
increase the speed with which records can be located or sorted. Multiple indexes can be created
so that the records in the database can be sorted in a variety of ways.
Security. All modern database programs provide a range of sophisticated security features.
Examples of some of the most common features available include:
o Encryption. Data can be encoded so that it appears meaningless until decoded.
Passwords provide control over the encryption and decryption process
o Recovery. Many programs contain tools that allow damaged database files to be
repaired. In the event that a file cannot be repaired, additional tools may be available
that allow users to retrieve as much data as possible from the damaged file.
o Passwords. Access to specific files or tables can be restricted through the use of
passwords. Several passwords can be used to limit what parts of the database different
users can view or alter.
Reports. All major database packages allow users to generate a wide variety of reports. Many
programs are capable of creating simple reports automatically. In addition, many programs
allow users to perform calculations and other actions as the report is produced. This enables
additional information, such as subtotals, to be calculated and included in the report whenever
required.
Queries. A query enables a user to locate, sort, update or extract records from a database. Its
used to extract data according to a set of conditions specified by the user. Users a design query
by specifying the conditions that must be met in order for a record to be selected.
Filters. A filter allows users to view the information held in a database in variety of ways. Filters
can be used to sort data into different orders, display only selected fields or display only
selected records
Structured query language. This provides a standardized method for retrieving information from
databases. Although traditionally used to manage large databases held on mainframes and
minicomputers, it has become a widely used popular tool for personal computer databases.
Macros. This is a programming tool that can be used to handle extremely complex tasks.
Data analysis tools. The majority of modern database programs contain a number of tools
designed to automate common data analysis tasks. The ability to generate charts and graphs,
for example is a common feature.
Import/export of data. Database programs are able to deal with data drawn from a variety of
different sources. In many cases, files produced by other packages can be imported directly into
a database with no loss of data.
Electronic Mail
E-mail can be defined as the transmission of a message over a communications network.

Typical Applications

Internal Communications: many organizations use e-mail instead of internal memos or telephone calls.
This has the advantage of the messages being stored automatically until the user comes to access it.
Teleworking: this refers to working from geographically dispersed locations e.g working from home
using technology as a means of communicating with employers, clients and other persons.
Advantages of e-mail
Speed. E-mail messages can be transmitted very fast
Cost. The cost of sending and receiving messages is considered very low. Hundreds of messages can
be sent or received for the cost of a brief telephone call, making e-mail far cheaper than the postal
service.
Multiple copies. E-mail allows multiple copies of the same basic message to be created and
transmitted.
Auditing. Even the simplest e-mail package will provide a number of features that allow users to
audit their messages. Most programs allow users to keep copies of any messages they produce,
automatically marking them with the date and time they were created.
Sharing data. E-mail messages can be used to transmit data files to other users. Files can be
attached to messages and transmitted in the actual way.
Multimedia. The latest e-mail packages allow users to include multimedia elements, including
graphics, video, and hyperlinks to information on the Internet and sound files.
Group work. E-mail supports group work and remote working. Group work involves several people
working on the same project, using IT to help them communicate with each other and share data
files. Remote working (teleworking) involves people working away from a central office-perhaps at
home-but staying in contact through e-mail and other methods.
Flexibility. The hardware and software used for handling e-mail can also be used for a variety of
other purposes. A typical modem, for example, can also be used to send or receive fax messages.
Disadvantages
Routing. E-mail messages seldom take the most direct route to their destinations. This can lead to a
number of difficulties:
o The time taken to receive the message can be very long
o The are more opportunities for the message to become lost or garbled
o There are more opportunities for messages to be intercepted
Cost. In order to send or receive e-mail, organizations must have access to the correct hardware and
software. The expense of buying new equipment, such as a PC with modem, can mean that it is
beyond the reach of smaller companies.
Technical issues. Since using an e-mail service requires a certain level of technical knowledge, novice
users may find it difficult to operate the hardware and software involved. This can place a burden on
an organization in terms of training and technical support requirements.
Spam. Most e-mail users receive unwanted messages, such as advertisements. The act of sending
out these messages is usually called spamming. Dealing with unwanted or unnecessary e-mail
messages can place a great burden on an organizations resources.
Security. Unless they are encrypted, e-mail messages can be intercepted relatively easily. This makes
e-mail unsuitable for sending confidential information unless special precautions are taken.

Features of an e-mail package
Message Editor: All packages provide a facility to allow users to enter the text of a new
message.
Message Reader: all e-mail programs are designed to collect new messages and allow users to
view them on the screen. Most programs also enable users to print the contents of a message or
copy the text into another program, such as a word processor.
Replying to messages: most packages will automatically include the e-mail address, subject and
the text of message being replied to. This enables a user to annotate a message that has been
received and return their comment to the sender.
Filters: filters provide the ability to mark messages for special attention. It searches for a
keyword or phrases in a message. Any messages matching the filter conditions can be dealt with
automatically. They can be used to highlight messages for special attention, delete messages
automatically, copy or move messages to another location or reply to incoming messages
automatically.
Mail boxes: most packages provide facilities for archiving, copying, moving, deleting and
grouping messages. Mailboxes can be created to hold messages from certain people or
concerning a particular subject.
Encryption: many programs provide the facility to encode messages so that only intended
recipients can read them.
File attachments: data files such as word-processing documents can be attached to messages
and sent to other users. Many packages have the ability to encode and decode files
automatically so that they can be sent and received with little difficulty.
Aliases and address books: the process of sending messages to specific individuals or groups
can be simplified by making use of aliases. An alias usually consists of a description and the e-
mail addresses of those grouped under the alias. Groups of aliases can be stored within the
address book tool found within most e-mail packages. The address book enables users to create,
delete, edit, and organize aliases.
Signatures: a signature file contains information that can be automatically added to the end of
an e-mail message. The signature file is normally a simple text file that can be created or edited
using a text editor or similar program.



Chapter 3: Adoption of Information Technology

Acquisition or procurement of a computer.
Introduction of computers into the business is an act that should be considered with great concern,
because it involves capital expenditure and therefore should be cost effective. The effects of introducing
the computer and its related facilities are investigated in great depth to ensure that adequate returns
are expected from such an investment.
Computer costs.
This depends on: -
Size
Nature
Application requirements of the organization

Big and complex organizations may require complex configuration and sophisticated related facilities
whereas small and simple organizations may require less sophisticated computer installations.
Classification of Computer Costs
i) Initial Costs
Are initial capital expenditures on the computer facilities when they are being acquired.
Are normally considerable
The costs are influenced by the method of acquiring the computer and its related facilities adopted and
o the type, nature and model of the facilities to be acquired.

Computer Initial Costs
Facility Examples
Hardware CPU and peripherals
Software System and Application programs
Media Tapes, Disks, Cassettes
Training Managers, Analysts, Programmers, operators
Computer room Construction, Environmental conditions equipments etc
Others Feasibility study, programming, changeover costs etc


ii) Recurrent Costs:
These are the operating costs which are met by the organization for the computer system after the
system becomes operational. The costs are influenced by the method of acquisition adopted.
Examples of operational costs
i) Depreciation costs e.g. Charges on depreciating machines and other equipments e.g. air
conditioning facilities
ii) Wages for staff e.g. Analysts, programmers, operators.
iii) Administrative expenses e.g. telephone bills, insurance cover, and consumable items etc.
iv) Other general expenses e.g. conducting seminars, on job training staff etc.

Functions of Computer
The main functions or purposes of computers are: -
To maintain control of business operations
To provide the required information more effectively and accurately.

Main uses of computers in organization
i) Preparation of payroll
It calculates gross pay, PAYE, social contributions like NSSF, NHIF etc and after these deductions, the net
pay of the employees is determined.
ii) Stock Control
The records of stock in respect of goods purchased and sold are maintained by the computer. The
computer contains the information regarding the items purchased, sold. Price, stock reference and the
re-order-level.
iii) Records of Debtors
The computers maintain the records of debtors to ensure that they pay in time. Over-due debtors are
pin-pointed by computer.
iv) Budgetary controls:
Computers are used to prepare the budgets and ensure the proper implementation of these budgets.
The computer can alert the management when the actual performance of the organization varies from
the planned program.

v) Production Control
The computers are used to control the production level thus computer help the management to make
correct decisions.
Advantages of a computer:
iii) Speedy processing of information hence may be cost saving e.g staff costs, equipment cost etc.
iv) Accurate results are obtained are obtained from computers
v) Computers can work continuously without getting bored or tired
vi) Computer can work on voluminous data items provided relevant instruction set is input
vii) Computer can operate in risky environment e.g volcanic e,g volcanic sites, lethal chemical plants,
where human life is feared.
viii) The computer is flexible i.e. can adapt to any work load without much strain.
ix) Computer produces reliable information
x) Large volume of data can be conveniently stored, assessed and altered.
xi) Computers can provide useful information to management for control and decision making
xii) Computers help to reduce paper works significantly
xiii) The number of persons required for performing various organizational activities will be reduced by
using a computer system.
xiv) The use of computer for office activities reduces the requirements of office space which otherwise is
required.

NB: The above benefits may be classified as cost saving, improved data processing quality and better
management information.
Disadvantages of Using a Computer
i) Computers are costly
ii) Due to the rapid change in the technology, the computer and related facilities can become outdated
very fast, hence posing a risk of capital loss
iii) Changing from the old system (The manual system) is a gradual process during which there is
interruption in the normal working environment.
iv) There is usually fear that installing the computer into an organization might result in replacing some
human employees.
v) Controlling the computer master files contents is difficult exercise due to the fact that the contents
of the master files of computer based systems are non human sensible. There is further fear also
that such contents may suffer from fraudulent acts by the people who know them.
vi) Manual systems, though slow, are more flexible as compared to the computerized systems.

Resistance from employees (Reasons)
i) Fear of change: people are creatures of habit and hence are afraid of change.
ii) Fear of losing their jobs: people usually associate the computer with loss of jobs and hence will be
afraid that they might end up losing their jobs.
iii) Fear of failure: Since the computer is very new in a given working environment the people will be
afraid that they might never adapt to it.
iv) Loss of control: The management will be afraid that once a computer is implemented they might
lose control of the organization.
v) Lack of understanding: The user may not understand the benefits of the computer system in their
jobs. Thus this will create resistance since the computer will be looked upon as an intruder.

Procedure for procurement of a computer
Computer acquisition necessitates the formation of a steering committee, whose purpose is to supervise
the computer feasibility study and subsequently to monitor the electronic data processing (EDP)
operations.
The committee is made up of personnel from the various departments at various levels that are affected
by the introduction of the computer into the organization. The computer feasibility study should
establish the following:-
The need to acquire the computer facilities
How to finance the equipments i.e. the methods of procuring the equipments needed.
The computer equipments implementation considerations e.g. user training, changeover, time
scales etc.
The reaction of the personnel within the data processing department e.g. their resistance.

Prior to feasibility study, preliminary study is conducted to judge the expected costs and benefits,
computer word load so as to determine whether carrying out feasibility is necessary and to specify its
objectives. A detailed investigation of the work area is carried out based on the objectives set out from
the preliminary survey and a schedule is drawn, which takes care of both present and future application
requirements of the EDP system. Once the schedule is drawn the suppliers are asked to give a detailed
quotation.
Using the schedule, the supplier should specify the facilities necessary e.g.
The required h/w and s/w and maintenance offered by the manufactures
The cost estimates, depending on the method to adopted in financing the facilities
Back up equipments or procedures provided and capital involved in maintaining such strategy.
Adaptability of the proposed system to enhance data processing operations.
Training advice or seminars offered by the manufacturer.
Delivery dates.

The replies are evaluated by the steering committee and the decisions taken are contained in the
feasibility study report, which contains the following.
The recommended h/w, s/w and other facilities
The method of procuring the recommended equipment
Cost benefit appraisal of the recommended equipments against rejected ones
Installation consideration and the expected growth in the work load
The effect of computerization to the organization
NB: The report is handed to the top management for a decision, to either acquire the facilities of a
particular model or to take no action.
Methods of procurement of a computer
There are four methods namely
Rental
Purchasing
Leasing
Using Bureau

i) Renting a computer
The computer facilities are acquired and installed for use within the aspiring users premises at fixed
periodic charges e.g. monthly charges payable to the manufacturer.
Advantages
i) Tax allowances are available
ii) There is no large initial capital expenditure
iii) The effects of technological changes are reduced, because during the agreement period, the charges
are fixed hence inflation and maintenance is by the manufacturer and obsolete equipments can be
returned to him.
iv) The user has more flexibility to change the equipment configuration.

Disadvantages
i) This method is expensive in the long term, i.e. with time more computer varieties and related
facilities may be in market hence prices fall, but the rental charges remain fixed.
ii) The computer and related facilities remain the assets of the manufacturer and hence can not be
used by the renting company as a security e.g. while seeking loan facilities.
iii) In breach of the rental agreement, the computer, the computer and related facilities may be
repossessed by the manufacturer.
iv) The renting company usually pays more for any extra work done by the computer and its facilities
that was not covered in the rental agreement.
v) Productivity of the machines comes down with time but rental charges remain the same.


ii) Purchasing a computer

The user, which is the aspiring company, pays the manufacturer or supplier an amount equivalent to the
computer and related facilities value and the purchasing company owns the computer and the related
facilities.
Advantages
i) The computer and the related facilities become the assets of the buying company
ii) It may be cheaper in the long term with tax advantages
iii) Frequent expenditure is not expected, where the manufacturer enters maintenance agreement with
the buying company.
iv) The company can decide to sell the computer and or and/ or related facilities to generate cash,
which will depend on the market value of the facility to be sold.
v) Since the company owns the computer and related facilities, there are no extra charges for
additional work done as in renting.

Disadvantages
i) In long term the computer and related facilities may become obsolete hence the organization
suffers the loss due to the advancement in technology.
ii) There is large initial capital outlay but the returns are usually slow.
iii) Capital committed in purchasing the computer and its related facilities may be spent on other higher
returning investments for the organization
iv) Several other competing investment opportunities would have to be forgone in making the big cash
outflow for purchasing the computer.

iii) Leasing a computer

The leasing company (Lessor), installs the computer and its facilities in the users (lessees) premises.
The lessee then pays leasing charges to the lessor, who acquires the computer and its related facilities
from the manufacture and meets all the payments of the equipments values.
Leasing contracts are similar to rental contracts but usually for longer periods than those of renting.
Leasing contract charges are low and renewable even at lower rates compared to rental agreements.
Advantages
iii) Leasing charges are lower than the rental charges, and contracts are renewable even at lower rates
unlike rental agreements.
iv) In leasing, the extra work load for the computer system is not charged for by the lessor
v) It does not require heavy initial investment
vi) Lease expenditure being a revenue expense may be charged to the profit and loss account
vii) Maintenance charges are included in the lease charges
viii) Lease charges generally decline after a specified period

Disadvantages
i) Fixed charges are to met
ii) The computer and the related facilities may be repossessed by the lessor incase the leasing contract
is breached
iii) The computer and related facilities remain the assets of the lessor
iv) Maintenance contracts may not be guaranteed
v) In this arrangement, the lessee has got no choice over such facilities, because the lessor acquires
such facilities from the manufacturer of his choice
vi) The primary period for leasing is usually much longer than the renting period

iv) Using a bureau
A bureau is an organization which renders computer services to other companies which depend on such
services, its clients.
Computer bureaus can be companies, manufacturers, or users, with extra time to hire out, who work
with an aim of rendering services to the other companies.
They render the following services: -
i) System analysis and design
ii) Developing computer programs
iii) Computer time hire out, and do it-it- yourself.
iv) Advice and consultancy

Advantages
i) A company that is considering acquiring a computer may find it extremely beneficial to use a bureau
because: -
a) It can evaluate the type of computer it is interested in.
b) It can test and develop its programs prior to the delivery of its own computer
c) Its staff will become familiar with the requirements of a computer system.

ii) Many companies cannot justify the installation of an in-house computer on cost benefit grounds and
the use of a bureau does not require a high capital outlay
iii) Some computer users find it convenient to employ a bureau to cope with peak loads arising e.g.
from seasonal variation in sales
iv) A bureau computer may be used in the event of a breakdown of an in-house machine
v) It enables data processing to be done the people who have the expertise.
vi) It avoids the responsibility of operating an in-house computer i.e. it eliminates the personnel and
management problems caused by the employment of a group of highly paid technical professionals
in a rapidly changing and highly technical field of computer.
Disadvantages
i) The users of the bureau services have got no control over their jobs once they are submitted to the
bureau.
ii) Periodic audit is necessary because transportation of data and/or information from the organization
to the bureaus premises or vice versa, may pose problems e.g. fraud
iii) Control by individual companies is difficult because processing goes on at a remote location
iv) Confidential informations security is at risk.

Factors to consider when selecting the procurement method
i) Economic factors
i) Cost comparisons
ii) Acquisition methods
iii) Return on investment
ii) Hardware factors
i) Hardware performance, reliability, capacity and price
ii) Firmness of delivery date
iii) Accessibility of back-up facilities
iv) Presence or absence of modularity
v) Effective life of proposed hardware
vi) Compatibility with existing systems
iii) Software factors
i) Software performance
ii) Firmness of delivery date on the proposed software
iii) Availability and reliability of available software
iv) Availability of useful and well documented packaged programs
v) Ease of use and modification
iv) Service factors
i) Maintenance terms and quality
ii) Training facilities offered and quality of training provided
iii) Programming assistance and conversion assistance offered
iv) Facilities provided by the manufacturer for checking new programs
v) Reputation of a manufacturer
i) Financial stability
ii) Record of keeping promises



Chapter 4: Data Processing modes

DATA PROCESSING MODES
This involves collection and processing of the organizations data. Individual data units in an organization
are described as transactions. The computer system processes data with speed, accuracy and efficiency.
In order to increase the efficiency of a computer system, many innovations, both in h/w and s/w have
been made. These include the facility for a number of users to use a computer simultaneously or a
number of programs to be executed simultaneously etc.

Data processing modes describe the ways these transactions are handled during processing. They are
also known as data processing systems.

Batch Processing (Or Off-Line Processing)
It describes a mode in which the transactions are accumulated over a period of time and then
processed at a pre specified time to produce a batch of output.
It formed the basis for the early computers dealing with the transactions. It is still found in many
computer system of today even though there has been advanced techniques of handling the
transactions.
Data collection is usually done off-line in isolation of the CPU, on special machines known as
data entry terminals. The data so collected is input after a fixed time, processed and results
obtained (e.g. in payroll preparation)

Advantages
i. Simple to develop system.
ii. Timing of the reports (information) not a necessity.
iii. The unit cost of processing is low.
Disadvantages
i. Time lag between origination of transactions and information availability.
ii. Late information is not suitable in situations where instant decisions are required.
iii. It is difficult to provide the desired priority scheduling.

On-Line Processing

It is a type of processing where the result of data processing transaction is available immediately.
Its a mode in which all the computer peripherals and/or the other equipments eg communication
equipments are under direct influence of the central processor.
In this mode of processing, as soon as the input transactions are available they can be processed to
produce the information sought for.
The files are held on-line and hence enquiries or file interrogation is possible at any time. The
transactions can be input and master files be directly updated on spot.
It allows a dialogue to be established between the user or operator and the computers operating
system. (This may be done by use of commands).
On-line does not always imply that the work stations are within the same geographical location with the
central computer. It is possible for the on-line work station to be connected to the central computer
through telecommunication links.
In such a configuration, the data (input transactions) are communicated from the work stations via
telecommunication links to the central computer for processing and results communicated back to the
work stations through the telecommunication links.


VDUs as terminals (work stations) are connected to a centrally computer through communication links.
The communication links are either the telecommunication or cable links depending on the distance
separating the central computer and the terminals.

Examples of on-line applications include:
i. Banking on-line systems are being used to inform bank customers of the status of their
accounts in response to an inquiry by accessing the relevant file using on-line terminal.

ii. Stock exchanges terminals located in major stock exchanges throughout the country and the
officers of participating brokerage firms enable the speedy processing of share dealings.

iii. Stock controlterminals located in warehouses provide the means for automatic re-ordering
of stock ,reservations, follow-up of outstanding orders and the printing of picking lists etc.
iv. Work progress control in plants.
v. Inventory status or ordering and reporting of geographically dispensed distributors

Advantages
Files are maintained up to date
The information is readily available for current decisions. This information is fed back to
the work stations where they are needed.
File enquiries possible through the terminals (work stations).

Disadvantages
These systems are complex to develop.
They are costly in terms of the hardware, software, storage media, operating system,
communication facilities etc.

Time Sharing Processing
This is a mode in which case the central processor serves two or more users with different
processing requirements (tasks).
The central computer is therefore available to a variety of users, connected to the central
computer via communication links, who may wish to process their data and receive information
or test their programs. The computer work upon the users request (task) and the results are
communicated back to the work station via communication links.
The processor time is divided out appropriately among the user tasks into time slices, which is
the time during which an active job (task) has got the sole access to the processors resources.
Control is switched from one job to another under the influence of the operating system, intern,
hence the processors idle time is removed.

Characteristics of a time sharing system.
i. Each user one or more input /output devices connected to the central computer by
communication lines.
ii. Each user acts independently of the others who are connected to the system.
iii. The central computer accepts data and instructions arriving simultaneously from many
users and, by giving each user a small but frequently repeated segment of computer
time.
iv. The users data files are maintained at the central computer center.
v. Each user has its own private set of programs plus access to a set of public programs.
vi. The data files, programs, and input /output devices are all directly connected to the
computer, so that processing can be performed at random as transactions occur and
request mode.

Application
In bureau who serve individuals or small companies who cannot afford the computer facilities. This can
be applicable in learning institutions where there are many users.

Advantages
i. Better services to users, for the information/ output is fast
ii. The problem of the processor idle time is solved for the processor has not to wait for the slower
communicating peripherals.
iii. Files are held on-line hence enquiries or files interrogations possible.
iv. Man computer dialogues are often in use through terminals connected to the host (central)
computer.
v. Helpful to small companies which cannot afford purchasing the computer and related facilities,
thus served at a fee through time sharing processing mode.
vi. It avoids duplication of s/w
vii. The user of the system can avail the facility of the computer through remote terminals.

Disadvantages
i. The users have got no control over the central computer.
ii. The response time high (i.e. slow response) when there are many tasks.
iii. Ti is not reliable as regards the security of data.

Real Time Processing
Is a data processing system in which the time interval required to process and respond to inputs is so
small that the response itself is useful for controlling the physical activity of a process.
It provides immediate transaction input capability from all input originating stations.
Essential Requirements For Real Time Processing
a) Direct connection (on-line) between input/output devices and the central processor.
b) Fairly fast response time, allowing two way communication (interaction between the user and
central processor)

Example
An on-line production data collection system that simply accepts an input from terminals in the factory
and utilizes it for payments and costing purposes later would not constitute real time data processing
but it would be termed real time if the system was designed to provide immediate information resulting
in prompt changes to the functioning of the production process as and when necessary.
Applications
Real time processing is for applications that require much rapid response eg in airline
reservation system, an individual cannot be booked before prior enquiry whether the seat, class,
etc is available. Note that such information is required on spot before a decision to book the
individual is undertaken. This implies that before the next transaction can be processed, the files
must have been updated by the previous transactions. (Others: hotel reservations, cinema
bookings etc).
Other application areas are for example in chemical plants, when the temperature is to be
regulated then a rise in temperature require immediate reaction for correction, missile control
etc.

Advantages
i. The information is readily available for instant decision
ii. Provides better service to users or customers.
iii. It is a fast and reliable mode of data processing.

Disadvantages
i. They are complex systems that use complex operating systems hence very expensive.
ii. They are not easy to develop systems.
iii. Real time systems usually use two or more computers, sharing up the work load, the process
described as multi-processing, which is expensive.

Distributing Processing
Is a data processing system consisting of various geographically dispersed computers, liked by
communication lines and all the computers linked belong to the same organization.
This implies that the computers are located at various departments or business sites for the individual
departments or the business site to be served individually by its own computer resources.
The computers at different departments or business sites may not be communicating to each other at
all, the computers of limited processing power e.g. micro computers may serve as terminals from the
various departments or sites connected to a central computer of enhanced processing ability e.g. the
mini or the main frame computer.
A typical application is in banks where all the branches have intelligent terminals (usually
microcomputers) linked to a big computer at the head office. Data from the branches is sent to the
master where it is processed.
Advantages
i. Reduction of the load on the host computer.
ii. Minimization of cost in data processing due to the use of low cost mini computers.
iii. Reduction of delays in data processing.
iv. Better service to the customers.
v. Less risk of system breakdown.
vi. Less complexity of system design and implementation due to decentralization.
vii. Level of expertise required is less.

Disadvantages
i. Expensive because of extra cost on communication equipment.
ii. Data duplication is very common.
iii. Programming problems occur with micro and mini computers.
iv. More training needed for the users involved.

MULTYPROGRAMMING
It is a concept of having more than one program resident in the computer memory and are
being processed or executed apparently or currently i.e. simultaneously.
Scheduling the job for run or execution is done automatically by the processor under the
influence of the control program, the operating system, which in this case is described as
multi-programming or multi-tasking operation system.

Advantages
i. Increases productivity of a computer.
ii. Reduces the CPU idle time
iii. Reduces the incidence of the peripheral bound operations

Disadvantages
i. Requires more expensive CPU.
ii. Operating system is complex and difficult to operate.
iii. Requires more expensive input/output facilities

CLIENT SERVER ARCHITECTURE (COMPUTING)
In computer terms, client and server are both computer programs which reside on
different computers.
If two or more programs have to interact with each other for performing a task, one
must wait for requests from the other.
In this context, the server program is a passive program that waits for requests from
clients. Therefore, a server program endlessly waits for requests from one or more
clients. A client on the other hand, is an active program that initiates a request for the
request for the services of that server.
When one computer requests for the services of another, it is known as client-server
computing. The participating computers are known as client and server computers.
Servers service or fulfill the client requests, e.g. a server computer could store files, in
which a client computer may be interested.

Factors to consider in selecting the data processing mode
i. The suitability of accumulating data (transaction) into batches for processing.
ii. The need for direct information retrieval and/or file interrogations.
iii. The optimization of the processing time.
iv. The time factor of the information for decision making by the managers.
v. The cost of acquiring the relevant h/w, s/w media etc and the cost of maintenance.
vi. The ease of development, use and subsequent maintenance.
vii. The control over the resources e.g. files I/O devices etc.
viii. The necessity of data communication equipment and/or facilities and the involved costs and
convenience.
ix. The need for the shared resources among several users, who may afford purchasing their own
facilities as in time showing configuration system.

Chapter 5: Information and Information systems

Data and Information
Data
Is a collection of non-random facts recorded by observation or research
It consists of raw facts or observations that are considered to have little or no value until they have been
processed and transformed into information. Unrelated items of data are considered to be essentially
without meaning and are often described as noise
There are several definitions for data in common use:
A series of non-random symbols, numbers, values or words
A series of facts obtained by observation or research
A collection of non-random facts
The record of an event or fact
Examples:
Today data, measurement taken on a production line; records of business transactions.
Naturally occurring data needs to be recorded in some way. The person recording the data tends to
have a little influence or control over the data itself, since it already exists in a form or another.
Information
Information can be defined as:
Data that has been processed so that they are meaningful.
Data that has been processed for a purpose.
Data that has been interpreted and understood by the recipient

There are important points that that can be drawn from this definition:
a) There is a clear and logical process that can be used to produce information. This process
involves collecting data and then subjecting it to transformation process in order to create
information.
b) Information involves placing data in some form of meaningful context, so that it can be
understood and acted on.
c) Information is produced for a purpose, to serve an information need of some kind.

Examples of information
i. A bank statement
ii. A sales forecast
iii. A telephone directory
NB: it is worth noting that information is subjective in nature; a piece of information found to be of
value to one person may be meaningless to another. Similarly, what might be regarded as information
by one person may be seen as data by another. A somewhat different view of information can be
examined by introducing an additional definition.
I.e. information acts to reduce uncertainty about a situation or event.
NB: information:
i. Involves transformation of data using a defined process.
ii. Involves placing data in some form of meaningful context.
iii. Is produced in response to an information need and therefore serves a specific purpose;
iv. Helps to reduce uncertainty, thereby improving decision behavior.

Creating information
A number of different data processes can be used to transform data into information.
Data processes
i. Classificationthis involves placing data into categories, for example categorizing an expense
and either a fixed or a variable cost.

Data Transformation process information

ii) Rearranging /sorting this involves organizing data so that items are grouped together or placed into
a particular order. Employee data for example might be sorted according to last name or payroll
number.
iii) Aggregating: this involves summarizing data, for example by calculating averages, totals or
subtotals.
iv) Performing calculations: an example might be calculating an employees gross pay by multiplying
the number of hours worked by the hourly rate of pay.
v) Selection. This involves choosing or discarding items of data based on a set of selection criteria. A
sales organization, for example, might create a list, of potential customers by selecting those with
incomes above a certain level.

Value of Information
When information is used effectively, it can bring about many of the improvements listed below.
i) Improved inventory control
ii) Enhanced customer service
iii) Increased production reduced administration costs
iv) Greater customer loyalty
v) Enhanced public image

Sources of Information
Formal communication
This involves presenting information in a structured and consistent manner. Since formal information
tends to be presented in a more structured manner, it is also more likely to present a more
comprehensive view of situations or circumstances it describes. Information transmitted by formal
communication tends to be presented in a consistent manner, e.g. company reports, will often use the
same basic format. Information transmitted this way is likely to be accurate and relevant, since it is
normally created for a specific purpose.
Disadvantages
a. The structure imposed on information is often inflexible, sometimes limiting its type, form and
content.
b. Formal communication often overlooks information obtained by informal means. This can lead to a
number of negative effects e.g. managers are less likely to be able to gain in-depth understanding
of a particular situation if they do not have access to all relevant information. In turn this can affect
the decision making process, reducing the quality and accuracy of any decision made.
c. Formal communication often ignores group and social mechanisms. A formal report e.g. might
marginalize or ignore staff opinions, causing offence and leading to reduced morale.
Informal communication
This describes less well-structured information that is transmitted by informal means, such as casual
conversation between members of staff. Informal communication tends to offer a high degree of
flexibility, since there is more freedom to choose how information is structured and presented.
Information obtained this way also tends to be highly detailed, although it may often contain
inaccuracies and may not be entirely relevant.
The scope of information obtained this way is often very narrow, relevant only to localized problem
solving and decision making, since it allows managers to gain a more detailed and in-depth
understanding of a given situation.
Disadvantages
a. It cannot deal with large volumes of information
b. Its relatively slow and inefficient
c. It can also be highly selectively e.g. a person taking part in a conversation may be able to restrict
what information is transmitted and who is able to receive it.
d. Informal communication is often ignored in favor of formal communication

Qualities of Information
Summary
Time Content Form Additional Characteristics
Timeliness Accuracy Clarity Confidence in source
Currency Relevance Detail Reliability
Frequency Completeness Order Appropriate
Time Period Conciseness Presentation Received by the correct person
Scope Media Sent by the correct channel

Time Horizon
The time dimension describes the time period with which the information deals and frequency with
which the information is received
Timeliness- The information should be available when needed. If information is provided too early, it
may not be relevant. If the information is provided too late, it will be of no use.
Currency- The information should reflect current circumstances when provided. In addition to being up
to date, the information should also indicate those areas or circumstances liable to change by the time
the information is used.
Frequency: information should also be available as often needed. This normally means that information
should be supplied at regular intervals e.g. some organizations may require weekly sales reports while
others need only monthly reports.
Time period: The information should cover the correct time period. A sales forecast e.g. might include
information concerning past performance, current performance and predicted performance so that the
recipient has a view of past, present and future circumstances.
Content Dimension
This describes the scope and content of information
Accuracy: information that contains errors has only limited value to the organization.

Relevance: The information supplied should be relevant to a particular situation and should meet the
information needs of the recipient. Extraneous detail can comprise other attributes of information
quality, such as scope and conciseness.
Completeness: All of the information required to meet the information needs of recipient should be
provided.
Conciseness: Only information relevant to the information needs of the recipient should be supplied.
Information should be provided in the most compact form possible. E.g. sales figures are normally
provided in the form of a graph or table- it would be unusual for them to be supplied as a descriptive
passage of text.
Scope: The scope of the information supplied should be appropriate to the information needs of the
recipient.
Form Dimension
Clarity: The information should be presented in a form that is appropriate to the intended recipient. The
recipient should be able to locate specific items quickly and should be able to understand the
information easily.
Detail: The information should contain the correct level of detail in order to meet the recipients
information needs e.g. In some cases highly detailed information will be required, while in others only a
summary will be necessary.
Order: Information should be provided in the correct order. E.g. Management reports normally contain
a brief summary at the beginning. This allows a manager to locate and understand the most important
aspects of the report before examining it at high level of detail.
Presentation: The information should be presented in a form that is appropriate to the intended
recipient. Different methods can be used to make information clearer and more accessible to the
recipient. E.g. it is common to present numerical information in the form of a graph or table.
Media: Information should be presented using the correct media. Formal information for example, is
often presented in the form of a printed report, whereas a presentation might make use of a slide
projector.
Additional Characteristics
Confidence in the source of the information received. Attempts should be made to obtain information
from sources considered to be reliable and trustworthy.

Reliability: Recipients should be confident that they can rely on information being available when that
and that the information will be of consistent quality in terms of other attributes of information quality,
such as accuracy and conciseness.

The Business environment
All business organizations operate within an environment that influences the way in which they operate
e g legislation will act to control some of the organization, activities.
The actions of an organization may also influence parts of the environment.


















Organization
Employee Relations
S
u
p
p
l
i
e
r

Competitors
Legislation
T
e
c
h
n
o
l
o
g
y

Economic Factors
P
u
b
l
i
c

O
p
i
n
i
o
n

Weather
Location
Physical
Environment
General
Environment
Specific
Environment
Customers
MANAGERIAL DECISION MAKING
In order for an organization to function effectively, all activities must be managed in an efficient and
organized manner.
The role of managers to forecast and plan, to command, to co-ordinate and to control.
Much of managers work involves making decisions about the best way to achieve the organizations
objectives.
A forecast, for example, is created to help managers decide what actions are necessary to prepare the
organization for the future.
The success of all of the activities of management depends on access to high quality information.
It is here that information system have a role, as a means of supporting managers work by providing the
information he or she needs.
DECISION BEHAVIOR
The way in which managers make decision and the factors that influence those decisions are often
described as decision behavior.
Decisions can be classified as structured or unstructured (sometimes referred to as programmable and
unprogrammable decisions).
Decision behaviordescribes the process and factors involved when people make decisions.
Structured decisionstend to involve situations where the rules and constrains governing the decision
are known. They tend to involve routine or repetitive situations where the number of possible actions is
relatively small.
Example
Stock controlthe decision to reorder a given item will be governed by a fairly simple set of rules and
constraints when the amounts of stock falls below a certain point, a fixed quantity of stock will be
ordered
Unstructured decisions
Tend to involve more complex situations where the rules governing the decision are complicated or
unknown. Such decisions tend to be made infrequently and rely heavily on the experience, judgment
and knowledge of the decision maker.
Example whether or not an organization should open a new branch in a particular area.

A model of decision making.
Intelligence stage involves gathering information concerning the decision to be made. It recognizes
that managers must be made aware that a problem exists before any action can be taken. Once a
problem has been identified, information is collected in order to achieve a thorough understanding of
the problem and circumstances in which it arose.
Design Stage: As many as possible of the potential solutions to the problem are identified and
evaluated. The decision maker begins to discard unsatisfactory solutions in order to reduce the number
of alternatives as far as possible. The solution to be implemented is then chosen.
Implementation Stage
Having made a decision, the action required to achieve a resolution to the problem is taken in the
implementation stage
Evaluation
Following implementation, the evaluation stage considers how successful the solution has been.
Summary
Stage Activities
Intelligence -Awareness that a problem exists
-Awareness that a decision must be made
Design -Identify all possible solutions
-Examine possible solutions
-Examine implications of all possible solution
Choice -Select best solution
Implementation -Implement solution
Evaluation -Evaluate effectiveness or success of decision


Levels of decision taking
The characteristics of decisions taken in an organization vary according to the level at which they are
taken.
Strategic level
Managers are largely concerned with long-term organizational planning
Decisions tend to be unstructured and are made infrequently
Decisions at this level have large impact on the organization as a whole and cannot be reversed
easily.
Example
A choice of new markets into which to move
Tactical level
Managers are concerned with medium term planning. They monitor the performance of the
organization, control budgets, allocate resources and set policies.
Decisions taken at this level are used to set medium term goals that form stages leading to the
accomplishment of the organizations strategic objectives.
Example
Setting a departmental budget
Operational Level
Managers deal with short term planning and day to day to control of the organizations activities.
The decisions taken at this level direct the organizations efforts towards meeting the medium-term
goals, abiding by the budgets policies and procedures set at the tactical level.
Decisions here tend to be highly structured and have little impact on the organization as a whole.
Example
Setting a daily or weekly production schedule


Decision Characteristics and Management levels

Management
Level
Type of Decision Time Scale Impact on
organization
Frequency of
Decisions
Strategic Unstructured Long Large Infrequent
Tactical Medium Medium
Operational Structured Short Small Frequent



Strategic
Tactical
Operational
Information Characteristics for decisions by management level

Management
Level
Time
Period
Frequency Source Certainty Scope Detail
Strategic Wide Infrequent External Less certain Wide Summarized
Tactical
Operational Narrow Frequent Internal More Certain Narrow Detailed









Chapter 6: Basic Concepts- An introduction to Information Systems

A system is composed of a group of related components that work towards a common goal. These
components include inputs, processes, outputs, feedback and control.
An information system converts data into information products. This information is used to support the
activities of managers. Information systems make use of people resources, hardware resources,
Business information systems take advantage of the benefits of information technology and are often
grouped into two broad categories
Operations information systems are concerned with process control, transaction processing
and productivity. These include Transaction processing systems, process control systems and
office automation systems.
Management information systems provide feedback on organizational activities and support
managerial decision-making. These include information reporting systems, decision support
systems and executive information systems.
Other categories of business information systems include expert systems, business information systems,
end user computing systems and strategic information systems.
NB: In order to gain strategic advantage, companies will often adopt one of the three basic competitive
strategies: cost leadership, product differentiation or business innovation. Strategic information systems
can be used to support attempts to gain competitive advantage through a number of different
approaches. These include improving operational efficiency, raising entry barriers, creating high
switching costs and gaining information leadership.


Categories of business information systems















Operational systems
Operational systems are used for tasks involved in the daily running of a business. Their performance is
often vital to an organization and they are sometimes are described as mission critical or strategic
information systems. The three most common types of information systems are: -
Transaction processing systems (TPS)-used to manage the exchange of information and funds
between a company and third parties such as customers and distributors
Office automation systems (OAS)- Used to manage the administrative functions in an office
environment and are often critical to service based industries.
Process control systems-are important in manufacturing industries for controlling the
manufacture of goods.


Strategic
Tactical
Operational
Transaction Processing
Competitor
Analysis
Cash flow
forecast
Sales order invoice
Executive Information Systems
Decision Support Systems
Information reporting systems
Office automation systems
Transaction processing systems
Processing control systems
Types of information Systems
Examples of Decisions made
Transaction processing systems (TPS)
These perform the frequent routine external and internal transactions, which serve the operational level
of the organization. Transactions involve recording events within or between a business and third
parties, which incorporate the exchange of information regarding different services.
Examples
Customer placing orders for products and services from a company such as making a holiday
booking
A company placing orders with a supplier for components from which to make its products
Payments for goods or services received by a third party
A customer visiting a supermarket to shop
A customer ringing a call center of a bank to pay her bills
A withdrawal of money from an auto-teller machine
Although the functions undertaken by TPS are routine and repetitive, they usually perform a vital
function in the organization.
Components of a TPS
Data- Is usually input by being keyed in to onscreen data entry forms such as those used when orders
are placed by phone. For retail applications, customer transactions are recorded through bar-code
technology.
Database-storage and retrieval are often handled by a database management system except where high
performance is required.
There are two main types of transaction processing systems in operation.
Batch systems-collect information on transactions in batches before it is processed at times of
lower transaction rates (Such as overnight)
Real-time-Process information immediately
Information from the transaction processing system is accessed in the branch and in head office using
online reporting e.g. to find stock availability, or offline reporting where information is stored in a
separate system for detailed analysis.
NB: Because the TPS gives direct contact with customers and suppliers beyond the boundary of an
organization, if it fails, it becomes immediately apparent to the organizations customers. Therefore
these are the mission critical systems that must be reliable and secure. Also data captured by TPS is used
to monitor the performance of the organization.
Office Automation systems (OAS)
These are information systems intended to increase the productivity of office workers. Examples
include: groupware, workflow and general purpose application such as word processors and
spreadsheets.
Role of OAS
They coordinate and manage the work of local, professional and information workers within the
organization
They link the work being performed across all levels and functions of the organization
They couple the organization to the external environment, including to its clients and suppliers;
when you call an organization, you call an office.
The roles emphasize the fact that the office should be seen as more than a typing area but rather as a
center for exchange of organizational knowledge.
Groupware
This is software that enables information to be shared by people collaborating on solving problems. This
could include activities such as the scheduling and running of meetings, sharing documents and
communicating over distance.
Groupware assists teams of people in working together because it provides the three Cs of
communication, collaboration, and coordination.
Communication- this allows information to be shared or sent to others using lectronic mail.
Groupware for conferencing is sometimes known as computer-mediated communication
software.
Collaboration-this is the act of joint cooperation in solving a business problem or undertaking a
task. It reduces problems of traditional meetings, such as finding a place and time to meet, lack
of available information or even dominance by one forceful individual in a meeting. It improves
the efficiency of decision-making and its effectiveness by encouraging contributions from all
group members.
Coordination-Is the act of making sure that a team is working effectively and meeting its goal.
This includes distributing tasks to team members, reviewing their performance or perhaps
steering an electronic meeting.

Main groupware functions
Groupware function Application
E-mail and Messaging E-mail, Electronic forms processing
Document management and information
sharing
Improved information dissemination
Collaborative authoring Team development of documents
Conferencing Text conferencing, video conferencing,
whiteboarding
Time management Calender and group scheduling
Groupware management and decision support Remote and distributed access to facilities
including replication and access control
Ad hoc workflow Loosely coupled collaboration
Structured workflow Structured management of tasks
Calendar and scheduling software
Calendar programs help organize meetings by allowing workgroup members to synchronize schedules.
E.g. a user willing to call a meeting can view the schedules of all other workgroup members. Having
picked a convenient date, time and location, the user enters this information into a calendar program.
The program can then automatically complete the rest of the process e.g. reserving resources such as a
meeting room, e-mail messages to remind users of the date of meeting.
Document conferencing software
This allows the members of a workgroup to work simultaneously on a given project. The program
automatically updates each users view of the document each time a change is made. The program will
also maintain a log containing the details of any changes or additions made by individual users.
Document imaging processing (DIP)
DIP systems attempt to alleviate the problems caused by paper-based systems, including the cost of
handling large amounts of paperwork and the time wasted searching for paper documents. DIP systems
convert documents (and images) into digital format, which allows storage, retrieval, and manipulation of
the document on computer. The document is converted using a scanner which can be either handheld
or passed over a document, or a flat-bed type where a document is placed on a glass sheet and scanner
reader passes under it.
Workflow Management Systems (WFMS)
Workflow is defined as the automation of a business process, in whole or part during which documents,
information or tasks are passed from one participant to another for action, according to a set of
procedural rules.
Workflow systems are used to automate business processes by providing a structured framework to
support the process. They help manage business processes by ensuring that tasks are prioritized to be
performed: as soon as possible, by the right people and in the right order.

Process control systems for operations management
Process control systems are used to manage manufacturing type processes. Operations management
involves the transformation of inputs, such as raw materials, equipment and labour, into outputs in the
form of goods and services.
The three main types of production facility that information systems can be used to support:
Repetitive: Production-line-type systems producing a standard product such as the model T Ford
car (this is equivalent of packaged software)
Job shop: production of individual jobs for individual customers according to the specific
requirements (this is equivalent to bespoke software)
Batch: intermediate between the two, a batch of identical products produced before changing
the production set up for the next batch of systems
Applications of process control systems
1) Managing material flows and production management.
a) Materials management.
There are three approaches to materials management.
Materials Requirements Planning (MRP): Aims to ensure that just the right amount of each
item is held at the right time in order to meet the manufacturing schedule.
Master Production Schedule (MPS): identifies what products are needed and when they are
needed on customers orders held and a forecast of future demand.
Bill of Materials (BOM): Is a file that provides a list of the components required to create
each product.
Inventory Status file (ISF): provides information on current stock level of each component.
b) Product /service design and development
Good design of products and services is an essential element in satisfying customer needs.
Information requirements are:
Market research to evaluate customer needs
Demand forecasts
Component costing
Technical specification of the product
c) Facility design: this concerns how capacity will be supplied by the organization to meet market
demand, that is, it involves the design of production facilities often using CAD/CAM software.
Information requirements are:
External sources on the state of competition and risks associated with not undertaking a
task in-house
Facility location needs to consider long-range demand forecasts and information on the cost
of land, the availability of appropriate skilled labour, transportation links and the quality of
local education and training services.

2) Software for operations management
a) Spreadsheets: Used in production planning applications
b) Statistical packages: can be used for applications such as inventory control and production levels
using linear programming.
c) Project management software: for project activities (e.g. development of new products). They
are useful for tactical management control. The PERT chart indicates the relationships between
activities in a project and the Gantt chart indicates the timing of activities.
d) Bar coding: this can scan a bar code on items delivered and components delivered within the
production system.
e) Programmable logic controllers: is a device that remembers a series of instructions and then
transmits them to a machine.
Management Information Systems
MIS are systems used to support tactical and strategic decision-making.
Decision-making theory

Management level Decision Types Information systems support
Strategic

Executive information systems
Tactical

Decision support systems
Expert systems
Operational

Transaction processing
systems

Example of decision types

Structured decision: operational planning
How should we process a sales order?
How do we perform quality control? E.g. measure conformance of product

Semi-structured decision: tactical planning
How do we target our most profitable customers and what are their characteristics?
Which foreign markets should we target?
What is the best pricing structure for this product?

S
t
r
u
c
t
u
r
e
d

S
e
m
i
-
s
t
r
u
c
t
u
r
e
d

U
n
s
t
r
u
c
t
u
r
e
d

Unstructured decision: Strategic planning
Which business area should the organization be in?
How should the organization be structured?
What should our distribution channels be?
Decision support systems (DSS)
These are systems that provide information and models in a form to facilitate tactical and strategic
decision-making. They support management decision-making by integrating:
Company performance data
Business rules based on decision tables
Analytical tools and models for forecasting and planning
An easy-to-use graphical user interface
They are often developed by end users and are departmental rather than corporate systems. DSS tend
to be used for ad hoc queries rather than regular reporting. The technology varies particularly rapidly in
this area and the newest developments such as data warehouses attest to this.
Applications
Forecasting sales through geodemographic analysis
Optimizing distribution networks, using a model to select the best retail locations
Optimizing product mixes.

When used by teams of people to make decisions, they are sometimes known as GDSS or group decision
support systems. They are often implemented as specialized types of information systems such as data
warehousing, expert systems, geographical information systems or even spreadsheet models.
Functions /Objectives
The DSS should provide support for decision-making, but in particular semi-structured and unstructured
decisions
The DSS should not focus on a single level of management decision-making, such as tactical. Rather, it
should integrate across all levels in recognition of the overlap between operational, tactical and
strategic decisions.
The DSS should support all phases of the decision-making process outlined above
The DSS should be easy to use.

Components of DSS
Dialog: This component is used for achieving interaction with the user so they can formulate
queries and models and review results.
Data: information may need to be collected from a range of sources such as operational
systems, financial accounting systems or document sources such as internal documents or those
available on the Internet.
Model: The model component provides an analysis capability for the DSS. A financial model, for
example, may predict for given inputs what the future profitability of a company will be if it
continues on the present course.
Types of Decision Support Systems
a) Artificial Intelligence (AI). This is the term given to research into how computers reproduce human
intelligence. A useful method of considering different types of DSS is to consider the different types
of problem they can solve. The problems are considered in terms of four elements:
The data
The problem solving procedures
The goals and constraints
The flexibility of strategies among the procedures
The types of problems are:
Type I problems are structured in all of the four elements above
Type II problems have some incomplete data and partly understood goals and constraints
Type III problems are those in which rules can be defined in a knowledge base and the software
can then solve problems of a similar type
Type IV problems have aspects of both type II and Type III problems.
b) Expert systems
These are used to represent the knowledge and decision-making skills of specialists so that non-
specialists can take decisions. They encapsulate the knowledge of experts by providing tools for the
acquisition of knowledge, representation of rules and their enactment as decisions. They need to
contain information relevant to taking the decision. This is often referred to as the knowledge base and
includes the rules on which the decisions are based.
Applications
Gold prospecting
Medical diagnosis
Credit decisions and insurance underwriting
Product design, management and testing
c) Executive Information Systems
These systems provide senior managers with a system to assist them in taking strategic and tactical
decisions. Their purpose is to analyze, compare and highlight trends to help them govern the strategic
direction of a company. They are commonly integrated with operational systems, giving managers the
facility to drill down to find out further information on a problem.

EIS are intended as decision support tools for senior managers. Since these strategic decisions are based
on a wide range of input information, they always need to be well integrated with operational systems
in a business.
Features of EIS
They provide summary information to enable monitoring of business performance. This is often
achieved through measures known as critical success factors or key performance indicators.
They are used mainly for strategic decision-making but also provide features, which relate to
tactical decision-making.
They provide drill down feature, which gives a manager the opportunity to find out more
information necessary to take decision or discover the source of problem.
They provide analysis tools
They must be integrated with other facilities to help manage the solving of problems and the
daily running of the business. These include electronic mail and scheduling/ calendar facilities
They integrate data from a wide variety of information sources, including company and external
sources such as market and competitor information
They have to be designed according to the needs of managers who do not use computers
frequently. They must be intuitive and easy to learn.
Functions of EIS may include: -
Financial reporting
TQM reporting
Management reporting
Profit management
Enterprise budgeting
Executive information
Marketing Information Systems
Marketing refers to the range of specialist marketing functions carried out within many organizations.
Such functions include market research, brand/product management, public relations and customer
service.
It also refers to an approach or concept that can be used as the guiding philosophy for all functions and
activities of an organization. Such a philosophy encompasses all aspects of a business. Business strategy
is guided by an organizations market and competitor focus and everyone in an organization should be
required to have a customer focus in their job.
Marketing Information Systems support decisions making at the operational, tactical and strategic
levels. At the operational level, distribution information systems and telemarketing systems offer
assistance in day-to-day activities and provide information to areas such as inventory and customer
credit systems. Tactical marketing systems provide assistance in such areas as product pricing and sales
management information systems. At the strategic level, information from sales forecasting, marketing
research and competitive tracking systems helps management plan and develop new products
Application areas for marketing information systems

Sales information systems: employees involved in the sales area are required to identify
potential customers, negotiate the sale of goods and services with those customers and provide
a follow-up service. Sales information systems are available to support each of these tasks
Distribution information systems: speed of delivery is often an important aspect of service to
the customer. In order to ensure this, it is important that tracking systems are in place, which
can locate products during distribution of products. These tracking systems incorporate
technology such as mobile and satellite communications and open-based computing
Sales order processing systems (SOP): are usually based on financial area and provides a variety
of data that can be used for marketing purposes.
Sales and campaign management information systems: Provides information in support of
decision making at the tactical level. It will hold information on such aspects as sales
performance by geographic area, by product group and sales person.
Product pricing information systems: the price of a good will be dependent on a variety of
factors e.g. cost of producing the product or providing service, the required profit margins and
the prices of competitor goods. The pricing information system will collate information on cost
and predicted market demand at different price points and discounts in order to support the
pricing decision.
Sales forecasting information systems: at a strategic level it is necessary to provide sales
forecast data in order to help the long range strategic plan
Marketing research and analysis information systems: in order to ensure there is a demand for
the organizations goods and services, it is necessary to undertake market research. For a new
product, this may include information on demographic changes and customer feedback from
questionnaires and interviews indicating customer preferences.
Competitive tracking: knowledge of competitor prices, products, sales, and promotion is an
important factor in the development of a marketing strategy.
Telemarketing software: this software is designed to dial the telephone numbers of potential
customers automatically based on customer files maintained in a database. The software will
also allow notes to be stored on customer requests, generate follow-up letters and display
information gathered on the customer for reference as the call is taking place. Call centers use
computer-integrated telephony (CIT) to sell direct product lines such as insurance and personal
finance




Chapter 7: Introduction to Health Informatics


Informatics includes the science of information, the practice of information processing, and the
engineering of information systems.
Informatics studies the structure, behavior, and interactions of natural and artificial systems that
store, process and communicate information.
It also develops its own conceptual and theoretical foundations. Since computers, individuals and
organizations all process information, informatics has computational, cognitive and social
aspects, including study of the social impact of information technologies.

What is health informatics?

From the French informatique
Medical informatics, medical computing, computers in medicine,
Interdisciplinary field combining health sciences, computer science, statistics,
engineering, management sciences,
Many definitions.

an umbrella term referring to the application of the methodologies and techniques of information
science, computing, networking and communications to support health and health related
disciplines such as medicine, nursing, pharmacy, dentistry etc WHO

the field that concerns itself with the cognitive, information processing, and communication
tools of medical practice, education, and research including the information science and the
technology to support these tasks (Shortliffe)

Nursing informatics

Nursing informatics is the integration of nursing, its information, and information management
with information processing and communication technology, to support the health of people
worldwide.
Nursing Informatics is a specialty that integrates nursing science, computer science, and
information science to manage and communicate data, information, and knowledge in nursing
practice.



Who does health informatics serve?
Patient
Medical Profession
Government Bodies
Primary Care/GPs
National Agencies
Finance/Admin. Management in Hospitals
Tax Payers
General Population
The public
Policy makers (strategic management)
Regional managers/tactical management
Facility management/operational management
Health care providers
Healthcare researchers
Healthcare educators and their students
Will one solution suit all?

What services does Health Informatics involve?

Data processing (health is a data intense industry)
Includes collection, processing, transformation, presentation & use
Communication main emphasis should be on supporting communication between
people
Knowledge based services
Includes computerized bibliographic services, on-line collections on non-numerical
information such as practice guidelines, pharmacopoeias, essential drug lists, telephone
directories, expert, decision-support and reminder systems

What technologies does it employ?

Computers and networks

But dont forget paper-based information systems, including input to and output from the
computer

Applications of Health Informatics
For recording accurate data
To have data available in a timely manner
Support and inform managers to make better decisions
Resource allocation and planning
Email therapy
Risk management
Training
Support for shared care
Patient Assessment
Evaluation of patient care
Monitoring patients
Staff coordination
Tracking patients in hospital
Stock management
Tracking sterile supplies
Integration engines
Mobile computing
Drug control medication dispensing/ordering
Purchasing equipment
Payroll
Clinical Pathways
Labor management
Patient scheduling
Budget analysis
Research
Word processing
National database
Quality Assurance
Donor databases
Devices
Monitors
Analyzers
Imaging equipment


Imaging systems in Health
Impossible without the use of computers
Computers are used to:
Construct an image from measurements
Obtain an image reconstructed for optimal extraction of a particular feature from an
image
Present images
Improve image quality by image processing
Store and retrieve images
Ulstrasound, x-rays, computed tomography, MRI, nuclear imaging etc. .

Telehealth

Telehealth is the delivery of health-related services and information via telecommunications
technologies.
Telehealth delivery could be as simple as two health professionals discussing a case over the
telephone, or as sophisticated as using videoconferencing to between providers at facilities in
two countries, or even as complex as robotic technology.

Telehealth is an expansion of telemedicine, and unlike telemedicine (which more narrowly
focuses on the curative aspect) it encompasses preventive, promotive and curative aspects.
Originally used to describe administrative or educational functions related to telemedicine, today
telehealth stresses a myriad of technology solutions. For example, physicians use email to
communicate with patients, order drug prescriptions and provide other health services.



Clinical uses of telehealth technologies

Transmission of medical images for diagnosis (often referred to as store and forward
telehealth)
Groups or individuals exchanging health services or education live via videoconference
(real-time telehealth)
Transmission of medical data for diagnosis or disease management (sometimes referred
to as remote monitoring)
Advice on prevention of diseases and promotion of good health by patient monitoring
and follow-up


Nonclinical uses of telehealth technologies
Distance education including continuing medical education, grand rounds, and patient
education
Administrative uses including meetings among telehealth networks, supervision, and
presentations
Research
Online information and health data management
Healthcare system integration
patient movement and remote admission


Telehealth modes
Telenursing
Refers to the use of telecommunications and information technology for providing
nursing services in health care whenever a large physical distance exists between patient
and nurse, or between any number of nurses.
As a field it is part of telehealth, and has many points of contacts with other medical and
non-medical applications, such as telediagnosis, teleconsultation, telemonitoring, etc.


eHealth
eHealth (also written e-health) is a relatively recent term for healthcare practice which is
supported by electronic processes and communication. The term is inconsistently used: some
would argue it is interchangeable with health care informatics and a sub set of Health
informatics, while others use it in the narrower sense of healthcare practice using the Internet.
The term can encompass a range of services that are at the edge of medicine/healthcare and
information technology

Electronic Medical Records: enable easy communication of patient data between
different healthcare professionals (GPs, specialists, care team, pharmacy)
Telemedicine: includes all types of physical and psychological measurements that do not
require a patient to travel to a specialist. When this service works patients need to travel
less to a specialist or conversely the specialist has a larger catchment area.
Evidence Based Medicine: entails a system that provides information on appropriate
treatment under certain patient conditions. A healthcare professional can look up whether
his/her diagnosis is in line with scientific research. The advantage is that the data can be
kept up-to-date.
Consumer Health Informatics (or citizen-oriented information provision): both healthy
individuals and patients want to be informed on medical topics.
Health knowledge management (or specialist-oriented information provision): e.g. in an
overview of latest medical journals, best practice guidelines or epidemiological tracking.
Virtual healthcare teams: consist of healthcare professionals who collaborate and share
information on patients through digital equipment.


NB
Information Technology is now an integral and essential part of health delivery
IT systems are prevalent in society
Training and education in the appropriate application of IT in healthcare essential



Health sector today
Citizen Centered Care
Health and education are two major consumers of the public purse
Situation in the sector
Cost containment
Information overload (data doubles every five years)
Shared care (team based care)
Technological push vs. demand pull (users driving it)
Clinical focus - Should be driven by supporting clinical needs and not financial
management (otherwise solutions in search of problems)
Cost containment is major driving force planning resources (eg. cost of care for
diabetes)
Improving quality of care equally important
Distributed organizational structures (independent clinics/labs) strong local autonomy
Accountability
Increased dependence on automation
Emphasis is moving from administrative to clinical information systems
Public has more knowledge about healthcare (NLM, Medline, Web)
Tension between demand for increased quality of care vs. reduction in costs
Efficiency vs. cost-effectiveness
Information overload nos., text, x-rays, ultrasounds
Complex (narrative)
Distributed
Multi-vendor (heterogeneous) no one vendor can support all the processing needs of
all systems, GP, A&E
Strong autonomy (need to relinquish a certain amount of autonomy to share data)
Data intensive

Implications for healthcare organizations

Unnecessary duplication of tests and investigations
Valuable time wasted trying to track down relevant information
Studies have shown that at least 20% of healthcare professionals time is spent reading,
writing, sorting and searching through notes (up to 70% has been claimed by some)
Appropriate healthcare not provided as efficiently and cost effectively as possible

The strategy to improve the situation should include the following ideas..
Patient care requirements prime
Secure, reliable, on-line clinical information systems
Facilitate cost-effective use of IT
Establish stewardship for implementation of enterprise-wide solutions and standards
Connect and manage distributed information systems
Delivering healthcare today is no longer the sole responsibility of a single professional
Movement away from hospital (tertiary) to community (primary)


Implications
Ability to share information between care providers is key
The right information in the right place, in the right format and at the right time
IT is key-enabling technology for shared care
Tension between demand for increased quality of care vs. reduction in costs
Efficiency vs. cost-effectiveness




















Chapter 8: Introduction to computer networks

A computer network can be defined as a communications system that links two or more computers and
peripheral devices and enables transfer of data between the components.
Local Area Network (LAN)
This is a computer network that spans a limited geographic area, typically a single office or building.
Wide Area Network
Network covering a large area, which connects businesses in different parts of the same city, different
parts of the same city, parts of a country or different countries
Telecommunications
This refers to the method by which data and information are transmitted between different locations.
To transfer information electronically, companies create telecommunications systems. These systems
consist of both hardware and software necessary to set up these links. They enable a business, which
operates from different locations to run as a single unit.
The role of communications in business
Communications technologies are vital to a business. They are important for the cost savings and
improved communications that arise from an internal network.
Benefits networks give a business
Reduces cost compared to traditional communications-if information has to be sent to another
location, the cost of sending is very low compared to using a letter or even fax.
Reduces time for information transfer-its now possible for the global company to operate 24
hours a day by taking advantage of people working in different time zones.
Enables sharing and dissemination of company information. Opportunities to share information
are lost when it is locked in a filing cabinet or stored on an individuals PC. By placing
information on a server, either as a file or within a database, it can be made accessible to all
departments who need it or the flow of information in the company is improved.
Enables sharing of hardware resources such as printers, backup, processing power. It enables
the cost of equipment such as printers, faxes, modems or scanners to be shared within a
business.
Promotes new ways of working. As well as the tangible benefits, introducing networks can
enable different approach to running a business. Setting up an internal network makes it
possible to use group working tools, setting up a wide area network makes electronic data
interchange with suppliers possible
Operate geographically separate business as one. Through using wide area communications
technology, its possible to rationalize the operations of a company that originally operated as
separate business units in different geographic locations, perhaps with their own working
practices, procedures and reporting mechanisms.
Restructures relationships with partners. In the same way that different groups or businesses
within a company can work more effectively together, different companies can also collaborate
better.
Disadvantages of Networks
The initial setup cost may be high, and there may be a considerable period before the costs are
paid off.
When implementing or updating the network there may be considerable practical difficulties.
Deploying cabling can be very disruptive to staff doing their daily work
In the long term, companies become reliant on networks and breaks in service can be very
disruptive. For this reason investment in network maintenance is vital.
Security is reduced through introducing a network, since there are more access points to
sensitive data. Data may also be intercepted when its transferred from one site to another.

Business applications of networks
1) Collaboration and management within a business
Groupware tools can help collaboration within or between organizations. They include:
Electronic mail (e-mail)
Workgroup software enabling collaboration e.g. using a shared office diary
Voice mail
Facsimile (fax servers for desktop fax)
Teleconferencing and video conferencing
Within the retail sector, electronic point of sale (EPOS) systems allows information about sales in
each branch to be collected and analyzed at head office.
2) Business-to-business collaboration-Electronic Data Interchange
Electronic Data Interchange (EDI) is the exchange of information between business using wide area
networks. EDI includes transactions of structured data such as electronic payment and documents.
EDI is now widespread in supporting collaboration between different business partners and provides
a reliable method of electronic transactions between companies.
3) Business-to-customer interactions
For catalogue companies, phone links and the Internet provide what is now an essential means of
obtaining sales and providing customer services. Call centers provide an integrated phone and
computer network for answering customer queries or taking orders. Auto-Teller machines (ATMs)
used by bank customer are made available by a countrywide or international network.



Network Functions
Sharing Data-This enables managers to see customers and marketing data immediately as it is
collected. An employee in one department can easily share data with others in other
departments. It also facilitates the use of teams i.e it enables informal teams to spring up
throughout the company to solve problems as they arise. A LAN is commonly used to connect
computers and share data within a company
Transactions- one of the most important reasons for connecting computers is the ability to
share data. E.g. Consider a retail store with five checkout registers. Each register is actually a
computer. If these computers are not connected, it is difficult to compute the daily sales for the
stores. At the end of the day, someone would have to manually collect data from each computer
and enter it to another computer. E-commerce consists of a transaction system with the
Internet as the network and customer browsers as the client computers. The product data and
sales transactions are stored in the central database connected to the Internet. Using a central
database provides inventory data to customers. When a customer asks whether an item is in
stock, the website can provide the answer. Managers can get daily sales figures from any
location with a web browser and an Internet connection. Payments and bills can also be handled
directly online.
Decisions and Searches- Consider a situation in which a manager is told to close 3 out of 200
stores. Selecting those stores can be a tough decision. It requires knowing sales volume for
every store and projected future sales as well as operating costs. The manager will bring this
basic information to a person computer to create graphs and evaluate models. It is possible to
collect all of the data from each store by hand and enter into the computer. However, it would
be much more efficient if the manager could simply transfer the data directly from the central
database to the personal computer. This would be faster and prevents errors.
Messages- with e-mail, you can send a message to any person with a mail account. E-mail
messages are asynchronous since the sender and recipient do not have to participate at the
same time. A mail server holds the message until the user logs in and retrieves the e-mail. Users
can create mailing lists and send mail to many people at one time. Messages can be stored,
retrieved, and searched for later usage. Junk e-mail, or spam, is an increasingly annoying
problem. Many companies capture e-mail addresses and sell them to other companies that send
out unwanted messages. These massages take up space on company computers and make it
more difficult for users to deal with legitimate messages.
Websites, newsgroups, and chat rooms-websites are essentially bulletin boards that are used to
make information available to many people over the Internet. Intranet sites are similar in that
they use Internet technologies but use security methods to restrict access to internal users.
Websites can be interactive and retrieve customized information from a database. Discussion
sites and the chat rooms allow users to post information as well as search for specific topics.
Chat rooms do not usually store comments, but discussion sites provide databases and links so
users can maintain a string of related messages. Chat rooms are more interactive than e-mail,
since they display messages as they are written. A newsgroup is an Internet feature similar to a
discussion site in that it carries comments from many people. It is designed to be copied from
server to server so that the comments are available to a wide audience. Internet newsgroups
are useful when you are searching for people with experiences similar to your own. The purpose
for these systems is to enable people to send and retrieve electronic messages from others. The
difference lies in the level of control and monitoring. More monitored newsgroups are generally
more accurate and more valuable in business. E.g. the HRM department could run a newsgroup
to provide information benefits. Employee questions and answers could be posted in the
newsgroup or on a website, because answers to one person might be valuable to many other
employees.
Calendars and Scheduling- managers spend a great deal of time in meetings. Sometimes the
greatest challenge with meetings is finding a time when everyone can get together. Several
software packages use computer networks to solve this problem. Managers enter planned
meeting times and scheduled events into their personal electronic calendars file, where each
event is assigned a priority number. If the CEO wants to set up a meeting, the CEO tells the
computer which people are to be included, sets a priority level, and gives an appropriate time.
The computer then uses the network to check everyone elses schedule. When it finds an open
time (overriding lower priority events if needed), it enters the meeting into each persons
calendar. These systems can be useful when managers carry PDAs that are connected to a
wireless network.
Teamwork and Joint Authorship- in any job, it is rare for one person to work alone. Most
businesses are arranged as teams. Within the teams, individual people are given specific
assignments, and each team member contributes to the final product. For instance, the
marketing department might have to prepare a sales forecast for the next six months. Each
person could work on specific sales region or product category. These individual pieces would
then be merged into a single document. If computers are networked, the managers computer
can be given access to the others work to ensure that the reports use the same data and
assumptions. Groupware is software that enables several people to work on the same
document. Each individual computer has access to the master document. When one person
makes a change to the document, the change is highlighted for everyone to read and approve.
With existing international networks, each person might be located in a different country.
o Examples Lotus notes, Netmeeting
Backup-another important reason for sharing data over computer networks is that most people
are not very good at maintaining backup copies of their work-especially on personal computers.
If each computer is attached to a network, there are two ways to set up an automatic backup
system for individual personal computers.
o The older method relies on individual workers saving their data files to a central file
server. A few companies even provide this service over the Internet. For a fee you can
transfer your files to their server, giving you a backup copy-plus they keep backup tapes
for the server.
o A newer method is significantly safer because it is virtually automatic and does not
require users to remember to transfer their files. It does require the users to leave their
machines running. At a predetermined time, a central computer with a large backup
capacity connects to the individual machines and copies the files that have changed.
Sharing hardware- networks also enable workers to share expensive hardware. Networks are
used to provide access to special output devices, such as high-speed printers, plotters, or color
printers. Networks can be used to give people access to special computers such as when an
engineer needs to use high-speed supercomputer.
o Printers- a common use of networks is to give users access to high-quality printers.
Users can choose from among two or three different printers by selecting them on the
screen. If one printer breaks down, users can spend their jobs to another printer on the
network.
o Storage devices-financial data and stock prices for most U.S companies can be
purchased on CD-ROM disks. It would be expensive to buy copies of the data disks for
every person in the finance department. It makes more sense to connect the finance
computers and the CD-ROM drive together on a network, then whenever someone
wants to look up information in the database, the computer uses the network to
transfer the information from the optical disk.
o Special Processors- special computers that are relatively expensive can be attached to a
network to save costs and make it easier for users to access these machines. Parallel
processing computers and other supercomputers can perform calculations thousands of
times faster than ordinary computers but they are expensive.

Sharing Software-networks have been used at different times to share software. When disk
space was expensive, it was cheaper to put one copy on a server and download it to each
computer, as it was needed. Today, several firms have been working on a system that stores
software on Internet servers, where client computers use web browsers to connect to the
server and run the software.

The main advantages of running software on a central server are:
o It is easier to install and update
o The client computers can be small and low cost, which makes it particularly useful for
PDAs and cell phones.
The main drawback is network performance and reliability. If the network is slow or server
crashes, no one can use the software
Voice and Video Communication-
A major cost of telecommunications in business is for telephone calls. Despite the total
expenditures, there is little doubt about the value of communication and phones. Phone calls
are almost always cheaper than in-person visits. With rapidly declining costs of phone calls, cost
is less of an issue. Even cellular phone costs are dropping rapidly; some experts predict that
within a few years, almost all calls will be made over the cellular networks instead of traditional
phone lines.
Newer technologies are emphasizing the value of routing all communication over a single
Internet-based network, often called voice over Internet protocol (VoIP).
With this technology, your telephone becomes a device in the Internet and conversations are
digitized and sent over the Internet along with all traffic.
Components of a Network
As networks have become more important, the components are increasingly built into the machines.
Computers- virtually any type of computer device can be connected to a network. Computers
attached to the networks tend to perform one of two function: servers or clients:
o Servers- these are computers that store data to be used by other computers attached to
the network. A server is a powerful computer used to control management of a
network. It may have specific function such as storing user files or a database or
managing a printer.
The server and network operating systems perform the following functions
Maintain security-access to information in files is restricted according to the
user name and password issued to users of the network
Sharing of peripheral devices connected to the network, such as printers and
tape drives. These are often attached directly to the server.
Sharing of applications such as word processors, which do not then need to be
stored on the hard drive of the end-users computer. The cost of buying
applications can be reduced through buying a site license.
Sharing information-access to this data is maintained by the NOS and it is stored
within the hard drive of a server as files or as part of a database.

o Clients-computers used by individual people.
Network Interface Card (NIC) or LAN card-This is installed in each computer. These cards are
connected together by some transmission medium e.g. cable.
Transmission media- all communication requires a transmission medium. Common methods
include electric wires, light waves, and radio waves. Each method offers certain advantages and
disadvantages so they are designed for specific applications.
o Electric cables- the two basic types of electric cables are twisted pair and coaxial.
Twisted Pair. Its the oldest form of electrical wiring. Since electricity must
travel in a closed loop, electrical connections require at least two wires.
Twisted-pair wires are simply pairs of plain copper wires-typically a specific
version known as Cat 5 wiring consists of four pairs of wires, and generally two
pairs (4 wires) are used for most typical networks.

This kind of cable cannot carry much information at one time and data
transmitted on unshielded twisted-pair wires is subject to interference from
other electrical devices. Interference can distort or damage a
telecommunications signal.

Coaxial cables: these were designed to carry more information than twisted
pairs, with lower chances of interference. They consist of a central wire,
surrounded by a nonconductive plastic, which is surrounded by a second wire.
The second wire is actually a metallic foil or mesh that is wrapped around the
entire cable. This shielding minimizes interference from outside sources. Cable
television signals are transmitted on coaxial cables. Coax is cable of carrying
more information for longer distances than twisted pair.
Fiber optics: this technology uses light instead of electricity. Because light
generally travels in a straight line, it could be difficult to use for communication.
Fiber-optic cable allows light to travel in straight lines but still be bent around
corners. A fiber-optic cable consists of a glass or plastic core that is surrounded
by a reflective material. A laser light (typically infrared) is sent down the cable.
When the cable turns, the light is reflected around the corner and continues
down the cable. Fiberoptic cable provides the advantages of high capacity with
almost no interference. The limitation in using fiber is the high cost of the cable
and the cost of the connectors and interface cards that convert computer
electrical signals into light.
Radio, Micro, and Infrared Waves: these transmissions do not require cables.
These communication methods are called broadcasts. Any receiver or antenna
that lies in its path can pick up the signal. However, microwave and infrared
transmissions require clear line of sight transmission. The major advantage of
broadcast methods is portability. For example, computers can be installed in
delivery vehicles to receive information from corporate headquarters. On a
smaller scale, individuals can carry around laptops and PDAs and remain
connected to the central database via a broadcast network. For example,
physicians in hospitals could carry small computers that would automatically
receive information for each patient when the physician enters the room. Any
instruction could be sent directly from the physicians computer to the nursing
station.

Potential drawbacks include the importance to provide security for the
transmissions, and that the broadcast transmissions carry a limited amount of
data
Connection devices: To reduce overall traffic, larger organizations often fine it beneficial to
build the corporate network from a set of smaller networks. Both small and large companies use
similar techniques to connect their networks to the Internet
Computers within a building or smaller area are linked into a hub, switch, or router. This
interconnection device is then linked to the backbone, which is typically a fiber-optic line.
Hubs are the simplest connection devices. They essentially act like a giant junction box. Any
device connected to a hub shares all of the lines with the other devices. It is a mechanism to
plug several computers together.
Switches and routers actually examine every packet that passes through them and decide
where to send each packet. They are actually specialized computers that can be programmed to
identify network problems and intelligently route traffic to fastest route.
Bridges: These are used to connect different LANs and transfer data packets from one network
to the next. They can be used to connect similar types of LAN. They also offer filtering services
to restrict local traffic to one side of the bridge, thus reducing traffic overall.
Repeaters: over a long transmission distance, signal distortion may occur. Repeaters are
necessary to increase transmission distances by regenerating signals and retransmitting them.
Modem: (Short for modulation-demodulator): converts the digital signal sent from a computer
to the analogue signal, which is transmitted along, phone lines.

Transmission Methods
Transmission of data can be achieved in a variety of ways.
Signal type
The two alternate methods of transmission are analogue and digital.
An analogue signal represents a message by using a continuous waveform, which is carried by a cable
such as a phone line. Here analogue transmission is used to carry voice, data or fax. Analogue is less
suitable for higher capacity needs such as video, since its bandwidth is limited.
A digital signal is not continuous, consisting of binary data sent in pulses of ones and zeros. This is
achieved by varying the voltage of the line from high to low state. Digital transmissions are used to
where higher bandwidth is available. They have dual advantages that no conversion from digital to
analogue is necessary before sending, and quality is better since distortion does not occur when the
signal is boosted when long-distance transmission is required.
Communication method
Data transmission can occur in different modes according to how individual characters are transmitted.
Asynchronous communication occurs when transmission occurs one character at a time with control
bits to either side.
Synchronous communication occurs when groups of characters are sent as packets and both the
sending and receiving device synchronize data using timer.
Packets are units of data that are exchanged between different devices over communications media. An
entire message is broken down into smaller packets.
Transmission modes

Simplex- refers to a one-way transmission
Half duplex refers to a two-way transmission, but only one way at a given time
Full duplex refers to simultaneous two way transmission
NB: the terms have now dropped out of common usage since LANs became predominant and most
digital networks achieve full-duplex mode with simultaneous data flow in both directions.
Value added networks (VANs)

These are named so since they allow a company to minimize their investment in wide area
communications while still receiving all the benefits this can bring. The cost of setting up and
maintaining the network is borne by the service provider, which then rents out the network to a number
of companies. This works out more cheaply than if a company had leased its own point-to-point private
lines, but it is not secure.
Virtual Private Networks (VPNs)
This is a data network that makes use of the public telecommunications infrastructure and the
Internet, but information remains secure by use of what is known as a tunneling protocol and
security procedures such as firewalls.

Private branch exchange (PBX)
A PBX enables switching between phones or voice and data using existing telephone lines. This can be
used for printer sharing.
Layouts for company networks
The physical layout of a LAN is known as a network topology. Bus, star, ring and combinations are most
common.
Summary of the advantages and disadvantages of the main local area network topologies
Topology Advantage Disadvantage
Bus or Linear Easy to install and manage for small
workgroup
Breaks in the cable disrupts the whole
network
Star Provide protection from cable
breaks
Dependent on central host
Ring Suitable for large data volumes and
mission-critical applications
Higher initial cost and time for
installation.
Introduction To The Internet
Internet: This is a network that links computer across the globe. It consists of infrastructure of servers
and communication links between them.
Intranet: This uses web servers, browsers and e-mail within a company to share company information
and software application. The intranet is only accessible to company employees.
Advantages
Quick to set up
Cheap to maintain
Easy to use and popular with users
Disadvantages
Unauthorized access
Extranet
This is an intranet with restricted access, which is extended to suppliers, collaborators or customers. The
term extranet has been coined to describe an intranet that is extended beyond the boundaries of a
company. Authorized people outside the company, such as collaborators, suppliers or major customers,
can access the extranet but information is not available to everyone with an Internet connection only
to those with password can gain access.
Business uses of different Internet tools

Internet Tool
Business use
Electronic mail or
e-mail
The cost of communication within and between businesses has
been greatly reduced through the use of e-mail. Through using
file attachments, word processed documents and spreadsheets can
also be transmitted by e-mail
Internet relay chat
(IRC)
This is synchronous communications tool, which allows text-
based chat between different users who are logged on at the same
time. It is not used for many business application, since
asynchronous discussions are more practical not all team
members need to be present at the same time
Usenet newsgroups Usenet is mainly used by special Internet-groups, for example
people discussing their favorite such as fishing or archery. They
are not used much by businesses, unless it is as a means of
studying consumer behavior. There are newsgroups for
announcing the introduction of new products or staff vacancies
FTP file transfer The file transfer protocol is used as a standard for moving files
across the Internet. The most common use is for releasing fixes to
software applications. Documents can be transferred by this
means. FTP is available as a feature of the web for downloading
files
Gopher,Archie, and
WAIS
These tools were important before the advent of the web for
storing and searching documents on the Internet. They have
largely been superceded by the web, which provides better
searching and more sophisticated document publishing
Telnet This allows remote access to computer systems. For example a
system administrator on one site could log in to a computer
elsewhere to check that it is running successfully. Telnet is widely
used in retail industry. For example, a retailer could check to see
whether an item was in stock in a warehouse using a Telnet
application. Such telnet applications will not usually be run over
the public internet, but rather over secure lines
World wide web The web is widely used for publishing information and running
business applications over the Internet.

Communications software and protocols
Communications protocol is a set of rules that govern the exchange of information over a
communications channel.
The goal is to ensure fast, efficient, error free communications over an imperfect
communications channel.
Wireless communication protocols
With widespread wireless network technology to support devices such as PDAs, mobile computers and
cell phones, the telecommunications industry needed new protocols to connect these devices.
Wireless communication protocols are still evolving as the industry matures

Chapter 9: Data Analysis using SPSS

Types of Variables
Continuous variables:
Always numeric
Can be any number, positive or negative
Examples: age in years, weight, blood pressure readings, temperature,
concentrations of pollutants and other measurements
Categorical variables:
Information that can be sorted into categories
Types of categorical variables ordinal, nominal and dichotomous (binary)
Categorical Variables:

Ordinal Variables
An ordinal variable is any categorical variable with some intrinsic order or numeric value. For
example, we might categorize information on the educational status of a group of people into a
variable called EDUCATION. One person may not have graduated from high school, another
might have graduated from high school but received no further education, a third could have
some college education or have received some other post-secondary training, and another
might have graduated from college. The education levels of all members of the group will fit
neatly into these categories, and the categories have an intrinsic order. A college graduate has
more education than a high school graduate, and a high school graduate has more education
than someone who did not graduate from high school. Thus as the categories go from 1 to 5,
the level of education increases. Other examples of ordinal variables are:
agreement (for example, strongly disagree, disagree, neutral, agree, strongly agree)
rating (for example, excellent, good, fair, poor)
frequency (for example, always, often, sometimes, never) or any other scale (for example, On
a scale of 1 to 5, how much do you like peanuts?)

Ordinal variablea categorical variable with some intrinsic order or numeric value
Examples of ordinal variables:
Education (no high school degree, HS degree, some college, college degree)
Agreement (strongly disagree, disagree, neutral, agree, strongly agree)
Rating (excellent, good, fair, poor)
Frequency (always, often, sometimes, never)
Any other scale (On a scale of 1 to 5...)
Nominal Variables
A nominal variable is a categorical variable without any intrinsic order. For example, say we
have a variable called RESIDE that characterizes the part of the United States in which a person
livesthe Northeast, the South, the Midwest, the Southwest, or the Northwest. The categories
of this variable have no numeric value or order. Residence in the Northwest has no
quantitative value compared to the Northeast. Other examples of nominal variables include
sex (male, female), nationality (American, Mexican, French), race/ethnicity (African American,
Hispanic, White, Asian American), or favorite pet (dog, cat, fish, snake).
Examples of nominal variables:
Where a person lives in the U.S. (Northeast, South, Midwest, etc.)
Sex (male, female)
Nationality (American, Mexican, French)
Race/ethnicity (African American, Hispanic, White, Asian American)
Favorite pet (dog, cat, fish, snake)
Dichotomous Variables
A dichotomous or binary variable is a categorical variable that has only 2 levels or categories.
Many dichotomous variables represent the answer to a yes or no question. For example, Did
you attend the church picnic on May 24? or Did you eat potato salad at the picnic? A
variable does not have to be a yes/no variable to be dichotomousit just has to have only 2
categories, such as sex (male/female).
Often represents the answer to a yes or no question
For example:
Did you attend the church picnic on May 24?
Did you eat potato salad at the picnic?
Anything with only 2 categories
Coding
Coding process of translating information gathered from questionnaires or
other sources into something that can be analyzed
Involves assigning a value to the information givenoften value is given a label
Coding can make data more consistent:
Example: Question = Sex
Answers = Male, Female, M, or F
Coding will avoid such inconsistencies
Coding systems
Common coding systems (code and label) for dichotomous variables:
0=No 1=Yes
(1 = value assigned, Yes= label of value)
OR: 1=No 2=Yes
When you assign a value you must also make it clear what that value means
In first example above, 1=Yes but in second example 1=No
As long as it is clear how the data are coded, either is fine
You can make it clear by creating a data dictionary to accompany the dataset
Dummy Variables
A dummy variable is any variable that is coded to have 2 levels (yes/no,
male/female, etc.)
Dummy variables may be used to represent more complicated variables
Example: # of cigarettes smoked per week--answers total 75 different responses
ranging from 0 cigarettes to 3 packs per week
Can be recoded as a dummy variable:
1=smokes (at all) 0=non-smoker
This type of coding is useful in later stages of analysis

Attaching Labels to Values
Many analysis software packages allow you to attach a label to the variable
values
Example: Label 0s as male and 1s as female
Makes reading data output easier:
Without label: Variable SEX Frequency Percent
0 21 60%
1 14 40%
With label: Variable SEX Frequency Percent
Male 21 60%
Female 14 40%
Coding- Ordinal Variables
Coding process is similar with other categorical variables
Example: variable EDUCATION, possible coding:
0 = Did not graduate from high school
1 = High school graduate
2 = Some college or post-high school education
3 = College graduate
Could be coded in reverse order (0=college graduate, 3=did not graduate high
school)
For this ordinal categorical variable we want to be consistent with numbering
because the value of the code assigned has significance
Example of bad coding:
0 = Some college or post-high school education
1 = High school graduate
2 = College graduate
3 = Did not graduate from high school
Data has an inherent order but coding does not follow that orderNOT
appropriate coding for an ordinal categorical variable
Coding: Nominal Variables
For coding nominal variables, order makes no difference
Example: variable RESIDE
1 = Northeast
2 = South
3 = Northwest
4 = Midwest
5 = Southwest
Order does not matter, no ordered value associated with each response
Coding: Continuous Variables
Creating categories from a continuous variable (ex. age) is common
May break down a continuous variable into chosen categories by creating an
ordinal categorical variable
Example: variable = AGECAT
1 = 09 years old
2 = 1019 years old
3 = 2039 years old
4 = 4059 years old
5 = 60 years or older
May need to code responses from fill-in-the-blank and open-ended questions
Example: Why did you choose not to see a doctor about this illness?
One approach is to group together responses with similar themes
Example: didnt feel sick enough to see a doctor, symptoms stopped,
and illness didnt last very long
Could all be grouped together as illness was not severe
Also need to code for dont know responses
Typically, dont know is coded as 9
Coding Tip
Though you do not code until the data is gathered, you should think about how
you are going to code while designing your questionnaire, before you gather any
data. This will help you to collect the data in a format you can use.
Data Cleaning
One of the first steps in analyzing data is to clean it of any obvious data entry
errors:
Outliers? (really high or low numbers)
Example: Age = 110 (really 10 or 11?)
Value entered that doesnt exist for variable?
Example: 2 entered where 1=male, 0=female
Missing values?
Did the person not give an answer? Was answer accidentally not entered into the
database?
May be able to set defined limits when entering data
Prevents entering a 2 when only 1, 0, or missing are acceptable values
Limits can be set for continuous and nominal variables
Examples: Only allowing 3 digits for age, limiting words that can be
entered, assigning field types (e.g. formatting dates as mm/dd/yyyy or
specifying numeric values or text)
Many data entry systems allow double-entry ie., entering the data twice and
then comparing both entries for discrepancies
Univariate data analysis is a useful way to check the quality of the data

Univariate Data Analysis
Univariate data analysis-explores each variable in a data set separately
o Serves as a good method to check the quality of the data
o Inconsistencies or unexpected results should be investigated using the
original data as the reference point
Frequencies can tell you if many study participants share a characteristic of
interest (age, gender, etc.)
o Graphs and tables can be helpful
Examining continuous variables can give you important information:
o Do all subjects have data, or are values missing?
o Are most values clumped together, or is there a lot of variation?
o Are there outliers?
o Do the minimum and maximum values make sense, or could there be
mistakes in the coding?

Commonly used statistics with univariate analysis of continuous variables:
Mean average of all values of this variable in the dataset
Median the middle of the distribution, the number where half of the
values are above and half are below
Mode the value that occurs the most times
Range of values from minimum value to maximum value
Distribution and Percentiles
Distribution whether most values occur low in the range, high in the
range, or grouped in the middle
Percentiles the percent of the distribution that is equal to or below a
certain value

S-ar putea să vă placă și