Documente Academic
Documente Profesional
Documente Cultură
SYSTEMS
COURSE WRITER
Prof. Jayant K.Oke
EDITOR
Ms. Neha Mule
Acknowledgement
Every attempt has been made to trace the copyright holders of materials reproduced in this book. Should any
infringement have occurred, SCDL apologises for the same and will be pleased to make necessary corrections
in future editions of this book.
PREFACE
It is indeed my pleasure and privilege to offer this book on ‘Management Information Systems’ (MIS)
to the students of SCDL.
The course structure has been devised keeping in view the student profile and the fact that this is a
distance-learning programme. Accordingly, while the course material begins with the need and evolution
of MIS, it also discusses the related topics in a lucid manner, without in any way compromising the
basic basics. Due focus has also been bestowed on the emerging trends, particularly in the context of
increasing and intensifying global competition.
The student-readers would find repeated references to competitiveness, competitive battlefield and
to MIS as “Facilitator towards gaining the competitive advantage to survive, succeed and prosper in
today’s dynamic and competitive corporate environment”.
The course structure has also been designed viewing MIS from a generalist, practicing manager’s
perspective, who should be able to ask the right questions, know the wrong answer and arrive at the
most optimum decisions, by understanding and utilising computers and Information Technology from
a strategic control perspective. Suitable examples and case studies have also been incorporated.
It must be mentioned that while preparing the course material, I have drawn on materials from a
variety of Books, Journals, Seminar Papers etc. I acknowledge my profound intellectual debt to all
those authors and contributors. Their ideas have shaped my thinking on the subject over the years.
While I trust that the course material would be of real use and value to the student-readers, being a firm
believer in “Kaizen”, I would welcome suggestions and constructive criticism to ensure continuous
improvement.
My sincere thanks to SCDL for providing me an opportunity to share my experiences and knowledge
with a large number of distant learners.
iii
ABOUT THE AUTHOR
A Government Open Merit Scholar, Prof. Jayant Oke has done his masters in both Economics and
Management. He has also studied for the Post-Graduate Diploma in Laws and Post-Graduate Diploma
in Computer Applications and Systems Analysis.
He has around three decades of professional experience and credentials, initially as a Banker (selected
as a Probationary Officer for the State Bank Group and was later selected as Economist for the
Corporation Bank by the B.S.R.B., Southern Region, Bangalore) and presently as a Management
Consultant and Corporate Trainer.
As a Banker, Prof. Jayant Oke had a special association with and expertise in Project Management/
Financing, Strategic Planning and Management Information and Control Systems. It was during this
phase that he first encountered and realised the pivotal role of information in the corporate world. He
was instrumental in bringing out an MIS Compendium for the Bank’s operations during the seventies.
The relationship with information and control systems has since continued unabated. It was this
expertise, which helped him to branch off into Project and Management Consultancy during the Post-
1991 Liberalisation, Privatisation and Globalisation (LPG) Era.
Prof. Jayant Oke has been associated with Management education since 1993-94, as a Guest Faculty.
He is a recognised PG Teacher for Management Courses of the University of Pune since 1994.
He was also the former Director of Padmashri Dr. D.Y. Patil Institute of Management and Research, Pune
during 1994-95. He is currently associated as a Guest/ Visiting Faculty with the leading Management
Institutes in Pune, including University of Pune and Symbiosis Institutions.
Prof. Jayant Oke has been, inter alia, associated with a number of Corporate Organisations and with
prestigious Institutes in Pune viz. the Reserve Bank of India, VAMNICOM and YASHADA, as a
Guest Faculty.
Prof. Jayant Oke’s other current interests include Entrepreneurial Development and International
Business Management.
iv
CONTENTS
vi
Unit No. TITLE Page No.
vii
Unit No. TITLE Page No.
viii
Unit No. TITLE Page No.
Appendix I 276
Glossary 277
ix
Management Information System
UNIT
1
Structure:
1.1 Introduction
1.2 Concept of MIS
1.3 Role of MIS
1.4 Characteristics and Pre-requisites of MIS
1.4.1 Pre-requisites of MIS
1.5 Contemporary Approaches to MIS
1.6 Information as a Strategic Resource
1.6.1 Use of Information for Competitive Advantage
1.7 Porter-Millar Postulates
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
---------------------- Today, we have an unquenchable thirst for information. The society has
changed significantly from the barbarian to the agrarian society, from agrarian
---------------------- to the industrial society and from the industrial society to a society dominated
by the service sector.
----------------------
This structural transformation has brought about discernible changes in
---------------------- the way people think. We are all living, not in an agrarian or industrial society
but in an Information Society. In fact, we generally refer to the present times as
----------------------
the IT Age or the Information Era.
---------------------- Underneath this is a tacit acceptance of the fact that not since the advent
of the automobile and the introduction of the telephone, an invention had such
----------------------
wide-spread impact on our society as the computer, which has ushered in the
---------------------- Information Era.
Many a times, we really do not have the information we want and then ----------------------
there is a dilemma. The dilemma is beautifully expressed in the following
words, generally referred to as Finagle’s Law of Information: ----------------------
---------------------- T. Lucey has defined MIS as “a system to convert data from internal
and external sources into information, to communicate that information, in
---------------------- an appropriate form to managers at all levels, in all functions to make timely
and effective decisions for planning, directing and controlling the activities for
---------------------- which they are responsible”.
---------------------- According to Henry C. Lucas, “MIS is a set of organized procedures
which when executed provide information to support decision-making.”
----------------------
Donald W Kroeber and Hugh J. Watson have defined MIS as “an organized
---------------------- set of processes that provide information to managers to support the operations
and decision-making within an organisation”.
----------------------
From the various definitions quoted above, we can state that MIS is an
---------------------- integrated system, which transforms the data (inputs) into reports (outputs) for
facilitating decision-making through processing and using various components
----------------------
of the information system, viz., hardware, software, database, procedures and
---------------------- personnel.
----------------------
----------------------
Fig. 1.1 : MIS Concept
Thus, in our discussions we will always consider MIS, which is based on making ----------------------
use of computers for processing and providing information.
----------------------
----------------------
Fill in the blank.
----------------------
1. MIS is a set of ___________, which when executed, provide
information to support decision-making. ----------------------
Multiple Choice Multiple Response.
----------------------
1. A formal system should be able to take care of:
----------------------
i. Mass storage
ii. Handling of voluminous data ----------------------
iii. Confirmation of the validity of data and transaction ----------------------
iv. Hardware and software
----------------------
----------------------
----------------------
Fill in the blank.
----------------------
1. MIS creates an __________ work culture in an organisation.
----------------------
Activity 2 ----------------------
----------------------
Visit an organisation and discuss the impact of MIS in that organisation with
the manager. Prepare a report on the same. ----------------------
----------------------
1.4 CHARACTERISTICS AND PRE-REQUISITES OF MIS
----------------------
Originally, MIS was envisioned as a single, highly integrated system, bringing
----------------------
together data processing of all organisational functions. However, MIS is
now viewed as a federation of subsystems developed/implemented as needed, ----------------------
but conforming to an overall plan. Each organisation consists of subsystems
like production, inventory, finance, marketing, etc. There could be functional ----------------------
subsystems as well as subsystems of activities as given in Table 1.1 and
----------------------
Table 1.2.
----------------------
Processing
Finance &
Marketing
Personnel
Accounts
Logistics
---------------------- Activities
R&D
----------------------
----------------------
Management
Computer Accounting
----------------------
Science Management
Science / Theory ----------------------
MIS
Operations
Behavioural ----------------------
Research
Sciences ----------------------
Organisation
Theory
----------------------
----------------------
Technical Managerial Institutional
---------------------- Changes Control Core
Activities
----------------------
To
----------------------
To To 1990
MIS DSS To
ES
AI ----------------------
----------------------
Fig. 1.5 : Evolution of CBIS
----------------------
EDP Focus on Data
OAS Focus on Communication ----------------------
MIS Focus on Information ----------------------
DSS Focus on Decision Support for a specific business problem
----------------------
EIS Focus on Decision Support for Top Management
----------------------
ES Focus on Consultation
AI Focus on self-learning/thinking systems ----------------------
----------------------
----------------------
----------------------
----------------------
ESS System
---------------------- Excutive
Support
System
----------------------
DSS
---------------------- Decision
Support
System
----------------------
---------------------- MIS
Management
Information
---------------------- System
---------------------- OAS
Office
---------------------- Automation
System
----------------------
---------------------- TPS
Transaction
Processing
---------------------- System
----------------------
1950s 21st Century
----------------------
Fig. 1.6 : Evolution of MIS
----------------------
Consequently, the users and the characteristics of MIS have also undergone
---------------------- changes over the years as can be seen from the Table 1.4.
---------------------- Table 1.4 Changes in MIS
Type of Information Processing Information Users
---------------------- System Inputs Outputs
ESS/EIS Aggregate data, Graphics, Projections, response Senior managers
---------------------- external, internal simulations, to queries
interactive
DSS Low volume Interactive, Special reports, Professionals, staff
---------------------- data, analytic simulations, decision analysis, managers
models analysis response to queries
---------------------- MIS Summary Routine reports, Summary and Middle managers
transaction data, simple models, low exception reports
---------------------- high volume level analysis
data, simple
models
---------------------- KWS Design Modelling, Models, graphics Professionals,
specifications, simulations technical staff
---------------------- knowledge base
OAS Documents, Document Document, Clerical workers
---------------------- schedules management, schedules, mail
scheduling,
communication
---------------------- TPS Transactions, Sorting, listing, Detailed reports, Operations
events merging, updating lists, summaries personnel,
---------------------- supervisors
----------------------
Activity 3 ----------------------
How would the implementation of MIS facilitate the working of any ----------------------
organisation? Prepare a report for the same by visiting an organisation.
----------------------
----------------------
Systems development has ceased to be a purely technical activity. While
developing information systems due attention is given to the related aspects like ----------------------
organisational structure, organisational culture, human behaviour, etc., along
with the technical aspects. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
1.6 INFORMATION AS A STRATEGIC RESOURCE ----------------------
With globalization, competition is increasing and becoming more global, ----------------------
relentless and fierce. Global competition has increased performance standards in
many dimensions covering the whole gamut of cost, price, quality, technology, ----------------------
productivity, product launch/ introduction time and operations. Moreover, these
standards are not static. They are exacting, requiring continuous improvement ----------------------
from the organisations. ----------------------
Hence, to survive, succeed and prosper in the present competitive
environment, strategic competitiveness would have to be achieved by the ----------------------
corporate not only by meeting but also by exceeding the prevailing global ----------------------
standards.
----------------------
However, to exceed the global standards, an organisation must first know
what they are and then only attempt first to reach and then better them. Like, ----------------------
if one has not even heard of the Six Sigma, the question of being a zero-defect
company simply would not arise. ----------------------
This leads to a series of actions and reactions, initiatives and responses ----------------------
among the firms competing within a particular industry/sector. It also further
leads to competitive interaction, which often shapes the competitive position of ----------------------
firms, undertaking the corporate strategies.
----------------------
----------------------
---------------------- Activity 5
---------------------- Visit an organisation and find out how information plays an important role
---------------------- and why it is considered a strategic resource.
----------------------
----------------------
----------------------
----------------------
Activity 6 ----------------------
Visit an organisation and find out the competitive forces, which determine ----------------------
profitability as per Porter and Millar.
----------------------
----------------------
----------------------
Keywords
----------------------
●● Resource: Material or other asset that is transformed to produce benefit
---------------------- and in the process may be consumed or made unavailable.
●● Decision-making: The mental process (cognitive process) resulting in
----------------------
the selection of a course of action among several alternative scenarios.
---------------------- ●● Decision support system: A computer-based information system that
supports business or organisational decision-making activities.
----------------------
●● Data: Data in computing are often represented by a combination of items
---------------------- organized in rows and multiple variables organized in columns.
---------------------- ●● Data Processing: Any process that a computer program does to enter data
and summarise, analyse or otherwise convert data into usable information.
---------------------- ●● Information: A sequence of symbols that can be interpreted as a message.
----------------------
i. – d. ----------------------
ii. – c. ----------------------
iii. – a.
iv. – b. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
2
Structure:
2.1 Introduction
2.2 Impact of Information Technology
2.3 Understanding a Computer
2.4 Generations of Computer
2.5 Categories of Computer
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
Information Technology 25
Notes
Objectives
----------------------
After going through this unit, you will be able to:
----------------------
●● Discuss Information Technology and its impact
---------------------- ●● Define a computer, its hardware and software
---------------------- ●● Identify the generations of computer
---------------------- ●● Describe various categories of computer
----------------------
2.2 IMPACT OF INFORMATION TECHNOLOGY
---------------------- IT has changed the way business organisations function and carry out their
activities. People like Bill Gates today talk and write about “Business @
---------------------- Speed of Thought” and information. Most of us today routinely talk about and
some of us actually deal in e-business, e-commerce, etc.. IT has transactional,
---------------------- geographical, automational, analytical, informational, sequential, knowledge
---------------------- management, tracking and disintermediation capabilities.
----------------------
Fill in the blanks.
----------------------
1. _______________ is the term used to describe technologies, which
enable the users to record, store, process, retrieve, transmit and ----------------------
receive information.
----------------------
2. IT has changed the way _________________ function and carry out
their activities. ----------------------
----------------------
----------------------
----------------------
Information Technology 27
Notes
Activity 1
----------------------
Visit a manufacturing company and analyse the impact of Information
----------------------
Technology on the company.
----------------------
2.3 UNDERSTANDING A COMPUTER
----------------------
According to the Information Technology Act, 2002, “Computer means any
----------------------
electronic, magnetic, optical or other high speed data processing device or system
---------------------- which performs logical, arithmetical and memory functions by manipulation
of electronic, magnetic or optical impulses, and includes all inputs, output,
---------------------- processing, storage, computer software or communication facilities which
are connected or related to the computer in a computer system or computer
----------------------
network.”
---------------------- A computer is an electronic device, which accepts input, processes it according
---------------------- to a set of instructions provided and generates the desired output. It operates on
data. It can store, process and retrieve data as and when desired. A computer
---------------------- system is a combination of the following different elements:
---------------------- ●● Hardware: All physical devices that the computer is made of.
●● Software: Instructions that tell the hardware what and how to perform.
----------------------
●● Data/Information: Data is facts collected and given as input to the
---------------------- computer and information is processed data, i.e, data is processed into
useful information.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 2.1 A Computer System
----------------------
Characteristics of a computer
----------------------
1. Automatic: Computers are automatic machines because once a job
---------------------- starts, it continues until the job is finished, normally without any human
assistance.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 2.2 Basic Organisation of a Computer System
The computer hardware consists of: ----------------------
1. Central Processing Unit (CPU): The CPU consists of the Arithmetic ----------------------
Logic Unit and the Control Unit. It is at the CPU that the manipulation of
----------------------
symbols, numbers and letters takes place. The CPU also controls the other
parts of the computer system. It is like the human brain. ----------------------
i. Arithmetic Logic Unit (ALU): The ALU in the CPU performs
----------------------
both arithmetic and logical operations. On the arithmetic side, the
ALU adds, subtracts, multiplies and divides, determining whether ----------------------
Information Technology 29
Notes a number is positive, negative or zero. On the logical side, it
distinguishes between letters as well as numbers logically, and also
---------------------- determines whether a given quantity is greater than or less than or
equal to another quantity. The type and number of arithmetic and
---------------------- logical operations, which a computer can perform, is determined
---------------------- by the engineering design of the ALU. Most ALU’s are designed to
perform the four basic arithmetic operations (add, subtract, multiply
---------------------- and divide) and logical operations or comparisons.
---------------------- ii. Control Unit (CU): The CU selects and interprets program
instructions and then checks their execution. It has some special-
---------------------- purpose registers and a decoder to perform these activities. The
special-purpose registers help the control unit in instruction
----------------------
selection, namely the instruction register and the program control
---------------------- register, which hold the current instruction and the next instruction
to be executed respectively.
----------------------
The decoder has the necessary circuitry to decode and interpret the
---------------------- meaning of ever instruction supported by the CPU. Each instruction is
accompanied by microcode (very basic direction), which tells the CPU
---------------------- how to execute the instruction.
---------------------- In spite of the fact that the control unit does not perform any actual
processing of the data, it still acts as the central nervous system for the
---------------------- other components of the computer by managing and coordinating the
entire computer system including the input and output units. The control
----------------------
unit receives instructions from the program stored in the main memory,
---------------------- interprets the instructions and issues signals, which cause other units of
the system to execute them.
----------------------
2. Input unit: Data and instructions must be entered into the computer
---------------------- system before any computation can be performed. This task is performed
by the input unit, which links the external environment with the computer
---------------------- system.
---------------------- Data and instructions enter input units in various forms, which depend
upon the particular input device used. Regardless of the form in which
---------------------- input is received, all input devices must transform the input data into
---------------------- binary codes, which the primary memory of a computer is designed
to accept. This transformation is accomplished by units called input
---------------------- interfaces. The functions performed by an input unit are:
---------------------- ●● It accepts/reads the instructions and data from the outside world.
●● It converts these instructions and data in computer acceptable form.
----------------------
●● I t supplies the converted instructions and data to the computer
---------------------- system for further processing.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig 2.4 Output Units ----------------------
Information Technology 31
Notes 4. Storage device: The storage devices are used to store data. The various
types of storage devices are discussed below.
----------------------
i. Primary storage: Also referred to as the main/core memory,
---------------------- primary storage is where data and storage instructions are
stored for a temporary period till the processing is completed.
---------------------- There are three different types of primary storage, viz.,
the Register (in ALU or CU), the Cache and the RAM.
----------------------
The linkage between CPU, primary storage and the other
---------------------- devices is provided by three buses, viz., Data Bus, Address
Bus and Control Bus. The Data Bus moves data to and
---------------------- from primary storage. The Address Bus transmits signals for
locating a given address in primary storage. The Control Bus
----------------------
transmits signals specifying whether to read or write data to/from a
---------------------- given primary storage address, input device or output device.
ii. Secondary storage: This device is used for relatively long-term,
----------------------
non-volatile storage of data outside the CPU and primary storage.
---------------------- Also called auxiliary memory (supplementary, backup), it is low in
cost and can store large volume of data on permanent basis. Hard
---------------------- disk, high-density diskette, magnetic tape, optical disk are some of
the secondary storage devices used.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Arithmetic Logic
Unit Primary ----------------------
Storage ----------------------
Control Unit
----------------------
----------------------
DATA BUS ----------------------
ADDRESS BUS
CONTROL BUS
----------------------
----------------------
----------------------
Fig. 2.6 Physical Media to link Various Devices
----------------------
Check your Progress 2
----------------------
Information Technology 33
Notes
Activity 2
----------------------
List down the configuration of your computer along with the operating
----------------------
system and other software installed on your machine.
----------------------
2.4 GENERATIONS OF COMPUTER
----------------------
Related to development of various types of computers, the different
----------------------
generations of computers have been identified which are discussed below:
---------------------- 1. First generation: The first generation of computer refers to those
---------------------- computers, which relied on and used vacuum tubes for storing and
processing data.
---------------------- The computers were very big in size, could be located in a large room and
---------------------- had limited memory and processing capability. The Electronic Numerical
Integrator and Calculator (ENIAC), for example, had only 20 storage
---------------------- registers and could accomplish 5000 additions per second.
The vacuum tubes generated lot of heat, consumed great deal of power
----------------------
and had a very short span of life. Resultantly, the Mean Time between
---------------------- Failures (MTBF) was low − of the order of an hour.
The computers were used by technical people mainly for scientific and
----------------------
engineering work. The maximum main memory size was reported to
---------------------- be around 2KB (2024 bytes) and the speed of about 10,000 instructions
per second. Computer programming was mainly carried out in Machine
---------------------- Language and later in Assembly Language.
---------------------- Table 2.2 First-Generation Computers
Computer Characteristics Trends and Development in
---------------------- and Capabilities Computer Hardware
---------------------- One Component per circuit (Density) Magnetic Drum (Main Memory)
Information Technology 35
Notes The cumulative effect was the emergence of extremely compact, yet
powerful, computers. Computer memories expanded to 2 MB of RAM
---------------------- and processing speed of CPU went up to 5 Million Instructions per Second
(MIPS).
----------------------
The improved/increased CPU capabilities led to development of time-
---------------------- shared operating systems, made online systems feasible and led to the
emergence of Integrated Database Management Systems.
----------------------
There were further improvements in high-level languages. It was
---------------------- during this period/generation that it became possible for people without
extensive technical training to make use of computers, making it possible
----------------------
for computers to enlarge their role in business, thanks to newly developed
---------------------- systems like dynamic production control systems, airlines reservation
systems, interactive query systems, etc.
----------------------
Table 2.4 Third-Generation Computers
---------------------- Computer Characteristics Trends and Development in
and Capabilities Computer Hardware
----------------------
Disk size mini computer Integrated semi-conductor circuits
----------------------
Thousands components per circuit Magnetic core
----------------------
Millions instructions per second Magnetic Drum, Magnetic Tape
----------------------
Failure of circuits in weeks Key to tape and disk (input media)
----------------------
Hundreds of thousands capacities Printed reports/video displays (output media)
----------------------
Cost lower than second generation
----------------------
4. Fourth generation: The computers, which we handle today, belong to
---------------------- fourth generation, which extends from 1980 to the present. The fourth
---------------------- generation computers are characterised by the use of Very Large Scale
Integrated Circuits (VLSICs) which are packed with as many as 2,00,000
---------------------- to over 3 million circuits per chip.
---------------------- As a result, the power of a computer that once took up a large room, now
became as small as a desktop/tower top/laptop and even palmtop.
----------------------
The VLSIC technology has fuelled a growing movement towards micro-
---------------------- processors and micro-miniaturisation − the proliferation of computers
that are so small, fast and cheap that they have become ubiquitous.
----------------------
Computer memory size has accelerated/gone up to over 2 gigabytes in
---------------------- large commercial machines, processing speeds having exceeded 200
MIPS.
----------------------
The fourth-generation computers have been instrumental in:
---------------------- ●● Making possible/available extremely powerful Personal Computers (PCs)
---------------------- at relatively lower costs.
----------------------
Information Technology 37
Notes
Check your Progress 3
----------------------
---------------------- Activity 3
----------------------
By surfing the Internet, collect more information about the various
---------------------- generations of computers and prepare a report on the same.
----------------------
2.5 CATEGORIES OF COMPUTER
----------------------
As seen earlier, each generation of computer is characterised/distinguished
---------------------- by application of a new technology related with the processing speed,
processing capability, memory and utilities among others. Just as computers
---------------------- differ in technology, computers also differ in terms of size and processing
---------------------- speed/capability. It is based on these aspects that computers are divided into the
following four categories:
----------------------
1. Supercomputer: A supercomputer is a highly expensive, sophisticated
---------------------- and powerful machine with huge primary storage. It is designed
for applications requiring very high speed, extremely rapid and
---------------------- complex computations involving hundreds or thousands of variables.
Supercomputers process instructions not one at a time in sequential mode,
----------------------
but in the parallel processing mode.
---------------------- The use of supercomputers has been traditionally confined to scientific/
military research, weather forecasting and engineering applications,
----------------------
where complex mathematical models and simulations have to be used.
---------------------- With the increasing complexity of business due to globalisation and
competition, supercomputers are now being increasingly used in business
---------------------- organisations as well. India has joined the select league of Supercomputer
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
2. Mainframe computer: A mainframe computer has very powerful CPU,
----------------------
highly sophisticated operating system and very large secondary storage
capabilities. “It is a powerhouse with massive memory and extremely ----------------------
rapid processing speed/ability. It is used for very large commercial,
scientific or military applications where a computer must handle massive ----------------------
amounts of data or many complicated processes. A mainframe can support
----------------------
multiple jobs being executed concurrently and online processing from
many remote locations at once.” ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 2.7 A Mainframe Computer ----------------------
3. Minicomputer: A minicomputer is a middle-range computer, less than
----------------------
the size of an office desk and relatively less expensive. It may support
online processing from multiple remote locations. It is often used in major ----------------------
academic institutions, universities, factories or research laboratories.
Information Technology 39
Notes
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 2.8 A Minicomputer
---------------------- 4. Microcomputer: A microcomputer, often termed as, or considered
---------------------- synonymous with a Personal Computer (PC), is a very compact and small
computing machine. A microcomputer could be easily carried from one
---------------------- place to another and is used as a personal machine as well as in office/
workplace and business.
----------------------
A microcomputer was originally conceived as and intended to be, primarily
---------------------- a personal and single-user machine. As such, it had a simple operating
system, small primary storage, mostly one input unit (visual display unit
---------------------- − terminal or monitor), an output unit − mostly a small printer and limited
---------------------- secondary storage by way of diskettes or cassettes.
Today, however, a microcomputer need not be a “stand-alone” machine.
----------------------
Today, it can be used either as a stand-alone machine or can be hooked
---------------------- into/linked to other micros, telecommunications devices or larger
computers. Microcomputer can also be integrated into, and made a part
---------------------- of, organisation-wide network which shares hardware, software and data
resources.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 2.9 A Microcomputer
----------------------
----------------------
----------------------
Summary
----------------------
●● Information Technology is the acquisition, processing, storage and
dissemination of vocal, pictorial, textual and numeric information by a ----------------------
microelectronics based combination of computing and telecommunications.
----------------------
●● Information Technology is the term used to describe technologies,
which enable the users to record, store, process, retrieve, transmit and ----------------------
receive information. It has transactional, geographical, automational,
analytical, informational, sequential, knowledge management, tracking ----------------------
and disintermediation capabilities.
----------------------
●● A computer is an electronic device, which accepts input, processes it
according to a set of instructions provided and generates the desired ----------------------
output.
----------------------
●● The CPU consists of the Arithmetic Logic Unit and the Control Unit.
●● The CU selects and interprets program instructions and then checks their ----------------------
execution. ----------------------
●● The first generation of computer refers to those computers, which relied
on and used vacuum tubes for storing and processing data. ----------------------
●● The second-generation computers used transistors made of germanium ----------------------
semi-conductor material instead of the vacuum tubes, for storing and
processing data. ----------------------
Information Technology 41
Notes ●● The third-generation computers emerged with the introduction of a newer
technology—the integrated circuits/chips.
---------------------- ●● The fourth-generation computers are characterised by the use of Very
---------------------- Large Scale Integrated Circuits (VLSICs) which are packed with as many
as 2,00,000 to over 3 million circuits per chip.
---------------------- ●● Fifth-generation computers are expected to use artificial intelligence.
---------------------- ●● A supercomputer is a highly expensive, sophisticated and powerful
machine with huge primary storage.
----------------------
●● A mainframe computer has very powerful CPU, highly sophisticated
---------------------- operating system and very large secondary storage capabilities.
●● A minicomputer is a middle-range computer, less than the size of an office
----------------------
desk and relatively less expensive.
---------------------- ●● A microcomputer, often termed as, or considered synonymous with a
Personal Computer (PC), is a very compact and small computing machine.
----------------------
Keywords
----------------------
----------------------
Information Technology 43
Notes State True or False.
1. False
----------------------
2. False
----------------------
3. True
---------------------- 4. True
---------------------- 5. False
---------------------- Check your Progress 4
Fill in the blanks.
----------------------
1. Each generation of computer is characterised/distinguished by application
---------------------- of a new technology, related with the processing speed, processing
capability, memory and utilities among others.
----------------------
2. A mainframe computer has very powerful CPU, highly sophisticated
---------------------- operating system and very large secondary storage capabilities.
---------------------- 3. A microcomputer could be easily carried from one place to another and is
used as a personal machine as well as in office/workplace and business.
----------------------
4. The use of supercomputers has been traditionally confined to scientific/
---------------------- military research, weather forecasting and engineering applications.
----------------------
Suggested Reading
----------------------
1. Davis, G and M. Olson. 1985. Management Information Systems. New
---------------------- York: McGraw Hill)
---------------------- 2. Jawadekar, Waman. 2009. Management Information Systems: Text &
Cases. New Delhi: Tata McGraw Hill.
----------------------
3. Prasad, L.M. and Usha Prasad. 2003. Management Information Systems.
---------------------- New Delhi. Sultan Chand & Sons.
---------------------- 4. Sadagopan, S. 1998. Management Information Systems. New Delhi:
Prentice Hall India.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
3
Structure:
3.1 Introduction
3.2 Functions and Categories of Software
3.2.1 Software Categories
3.2.2 Leading Microcomputer Operating Systems
3.3 Data Communication
3.4 Data Processing Modes
3.4.1 Other Data Processing Modes
3.5 Data Transmission
3.6 Network
3.6.1 Network Topologies
3.6.2 Types of Network
3.7 Internet
3.8 IT Enabled Services
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
Application Software
----------------------
----------------------
System Software
----------------------
Hardware
----------------------
----------------------
----------------------
----------------------
System Software
---------------------- 2. Same hardware can have different software to make the computer system
perform different types of job.
---------------------- 3. Except for upgrade, hardware is normally one-time cost, whereas software
---------------------- cost can be recurring.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
---------------------- Activity 1
----------------------
In a computer, both hardware and software are essential and they complement
---------------------- each other. Do you agree with this statement? Justify your answer.
File ----------------------
Blocks ----------------------
Records ----------------------
Fields ----------------------
----------------------
Item
Characters ----------------------
----------------------
Bytes
----------------------
Bits
----------------------
Fig. 3.2 Data Hierarchy
----------------------
Data processing involves a number of operations, similar to those in a
manufacturing unit, to convert the basic raw material − data − into a finished ----------------------
product, i.e., Information. The typical data processing steps would include,
among others, the following activities. ----------------------
Table 3.2 Data Processing Steps ----------------------
Read Sort Collate Compare Store ----------------------
Write Merge Delete Decide Display
----------------------
Print Copy Enter Compute Etc. ----------------------
Plot Transfer Create Perform ----------------------
Data processing also involves carrying out a number of data operations as ----------------------
mentioned in Table 3.3.
----------------------
----------------------
----------------------
----------------------
Fill in the blanks.
1. Before processing a transaction, the relative data item has to be ----------------------
________, verified and found _________ as regards to its quality ----------------------
specification. This process is called data ____________.
2. Data processing involves a number of operations, similar to those ----------------------
in a manufacturing unit, to convert the basic raw material, i.e., ----------------------
_______________ into a finished product, i.e., ________________.
----------------------
Activity 2 ----------------------
----------------------
Surf the Internet and read more about data transmission modes and discuss
the same in your own words. ----------------------
----------------------
3.4 DATA PROCESSING MODES
----------------------
As stated earlier, computers are used for the processing of data, analysing
it and getting the necessary information for facilitating decision-making. It is, ----------------------
therefore, imperative that the data be processed in keeping with the specific
needs, demands and requirements of the organisation. ----------------------
It would not be out of place to state that demands of the business determine ----------------------
the type of data processing modes/methods. Broadly, there are four different
methods used for data processing and updating as shown in Figure 3.4. ----------------------
Data Processing ----------------------
----------------------
Batch On Line Real Time Distributed
----------------------
Processing Processing Processing Processing
----------------------
Fig. 3.4 Data Processing Modes
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
---------------------- ●● Once the data is submitted for processing, the computer may be left
running without human interaction.
---------------------- ●● The computer is only used for a certain period of time for the batch job.
---------------------- ●● Jobs can be scheduled for a time when the computer is not busy.
Disadvantages of a batch processing system include:
----------------------
●● There is always a delay before work is processed and returned.
----------------------
●● Batch processing usually involves an expensive computer and a large
---------------------- number of trained staff.
●● While batch processing may be useful in enhancing control of transaction
----------------------
processing, it must be remembered that one major disadvantage of
---------------------- periodic batch processing is the delay in detecting and correcting err
2. Online processing system: The online processing system of transactions
----------------------
has now become a way of life. In this system, the user has access to a
---------------------- terminal for input of transactions and output of results. The user enters
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 3.6 Online Processing
----------------------
However, a user responsible for processing data in an online system
must ensure proper security protocol. He must sign on properly, enter ----------------------
transactions in the proper laid-down format, respond to error messages
with corrected input, review control information and sign off after the ----------------------
transaction processing is complete, to prevent unauthorised use/access. ----------------------
3. Online real-time processing system: The online real-time processing
system is similar to the online processing system in as much as in both the ----------------------
systems, a transaction is entered directly into the computer and validated ----------------------
immediately.
However, while under the online system, the transaction may be processed ----------------------
later, once a transaction is found to be valid, it is processed immediately ----------------------
and the results are also made available immediately, as the master data is
always up-to-date. ----------------------
Needless to add, the real-time processing concept is used where stored ----------------------
data needs to be updated simultaneously as the transaction takes place.
----------------------
The points to be considered are the higher costs of online processing,
greater computer power and often data communication, as also the ----------------------
extra procedures required to produce adequate control information and
to safeguard the files against accidental or deliberate destruction during ----------------------
online updating.
----------------------
A schematic representation of the two alternatives for online direct entry
is illustrated in Figure 3.7. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 3.7 Online Entry with Immediate Processing
---------------------- 4. Distributed data processing: The distributed data processing mode
---------------------- became popular during the 1970s, as this period witnessed the growth
of powerful telecommunications networks and also the developments
---------------------- in computer technologies leading to significant decline in computer
hardware prices/costs.
----------------------
Distributed data processing is a computer-networking method in which
---------------------- multiple computers across different locations share computer-processing
capability. This is in contrast to a single, centralised server managing and
----------------------
providing processing capability to all connected systems. Computers that
---------------------- comprise the distributed data processing network are located at different
locations but interconnected by means of wireless or satellite links.
----------------------
The distributed data processing system provides the advantages of
---------------------- increased system availability and quicker systems response time. Systems
availability is increased because when CPU malfunctions or undergoes
---------------------- preventive maintenance, its work may be transferred to another CPU in
the system. The response time is improved because the workload can be
----------------------
distributed evenly among the CPUs to ensure optimum utilisation.
---------------------- 3.4.1 Other Data Processing Modes
---------------------- In addition to batch processing, online processing, real-time processing
and distributed data processing modes, there are some other modes which are/
---------------------- can be used for data processing. These modes are based on the capability of the
---------------------- operating system. Such data processing modes are:
1. Time-sharing: The time-sharing mode of data processing allows several
---------------------- users to simultaneously share the processing capability of the computer
---------------------- system. Under this mode, each user is allotted a certain “time sot” or
“time slice”, during which that particular user has access to the processor.
----------------------
The processor spends this allotted time on one program before
---------------------- moving over to another. This activity is reiterated till the user’s task is
finally completed. The users of the system generally avail the facility of
---------------------- time-sharing a computer system through remote terminals.
---------------------- 2. Multiprocessing: Multiprocessing is a capability of the operating system.
It enables linking together two or more CPUs to work in parallel in a
---------------------- single computer system. The tasks envisaged to be carried out are divided
between the CPUs, leading to simultaneous execution of two or more
----------------------
----------------------
Fill in the blanks.
----------------------
1. A ___________ system is one where data is collected together in a
batch before processing starts. ----------------------
2. The _____________ of data processingallows several users to
----------------------
simultaneously share the processing capability of the computer
system. ----------------------
3. Multiprogramming is one of the most important capability of the ----------------------
operating system used for sharing computer resources and facilitating
________________. ----------------------
4. When one of the jobs in memory is finished, another job is taken from ----------------------
the __________ of jobs and put into the ___________for execution.
----------------------
----------------------
Activity 3
----------------------
Analyse the examples of online processing and online real-time processing
by visiting relevant sites and prepare a report on the same. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
---------------------- 2. Digital signal: It is a discrete waveform that transmits data coded into
two discrete states as 1bits and 0 bits, which are represented as on-off
---------------------- electrical pulses. Digital signal is very useful in data communications.
Now we are, indeed, moving into the “Digital Era” using the digital
---------------------- signal.
----------------------
0 0 0 0 0
----------------------
Fig 3.9 Digital Signal
----------------------
Modem: Modem is an abbreviation of MOdulation/DEModulation. A
modem is a device that performs the translation from analog to digital ----------------------
or from digital to analog form of signal. The functions of the modem are
illustrated as follows. Refer to Fig. 3.10. ----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 3.10 Modem ----------------------
Communication/Transmission channels
----------------------
Communication channels are the links/means by which data is transmitted
from one device in a network to another. A channel can make use of various ----------------------
media like: ----------------------
1. Physical connection lines
----------------------
i. Twisted pair of copper wires
----------------------
ii. Coaxial cables
iii. Optical fibre ----------------------
2. Microwave lines ----------------------
i. “Line of sight” earth microwave (tower to tower) ----------------------
ii. Radio/wireless transmission waves (AM/FM)
----------------------
iii. Satellite
----------------------
Characteristics of communication channels
The communication channels, mentioned earlier, have the following ----------------------
characteristics:
----------------------
1. Transmission speed: It is the total amount of information that can be
transmitted through any telecommunication channel and is measured in ----------------------
Bits Per Second (BPS). This speed is sometimes also referred to as “baud
----------------------
rate”.
----------------------
----------------------
----------------------
----------------------
----------------------
Computer 1 ----------------------
Computer 2 ----------------------
----------------------
----------------------
----------------------
Terminal 2 ----------------------
Terminal 3
----------------------
Fig. 3.11 Star Network ----------------------
2. Bus network: The bus network is basically a peer-to-peer network. It
links a number of computers by a single circuit. There is no central host/ ----------------------
hub computer to control the network. All the signals are transmitted to ----------------------
the total network, with special software to help in identifying which
components receive messages. ----------------------
As such, the bus network is never affected totally and is not vulnerable ----------------------
like the star network. This is because even if one of the computers in
the bus network becomes inoperable or stops functioning, the remaining ----------------------
network remains unaffected.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Computer 2 Terminal Computer 4
----------------------
----------------------
----------------------
----------------------
Computer with
---------------------- Computer 3
Hard Disk Drive
---------------------- Printer
----------------------
Fig. 3.13 Ring Network
----------------------
Now, a variant of the ring network, known as token ring network, is also
---------------------- available. In this network, a “token” is used by all the computers/devices
connected for communicating. The “token” is a predefined packet of data
---------------------- indicating the sender, receiver and also indicating whether the packet is in use.
---------------------- The token ring network is considered to be more useful for transmitting
large volumes of data between microcomputers or for transmissions between
---------------------- microcomputer and larger computer/s.
----------------------
----------------------
----------------------
----------------------
----------------------
Client Server PC
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 3.14 Local Area Network
----------------------
LANs can also be connected to larger backbone network, which allows
message transmission around the world. ----------------------
2. Backbone Network: It is a large central network in which everything ----------------------
within the organisation is connected. It usually is a network that
interconnects everything on a single company site. It also can be similar ----------------------
to a Metropolitan Area Network (MAN); but for a single organisation
----------------------
such as a company or university only, in which all the terminals, micro-
computers, mainframe, LANs and other communication equipments are ----------------------
connected.
----------------------
----------------------
3.7 INTERNET
----------------------
Internet is a collection of networks—literally an inter-network. It is ----------------------
also a collection of servers connected by common protocols and agreed-upon
standards. ----------------------
To put it simply and succinctly, Internet is the global connection between ----------------------
computers that allows individuals to send e-mail, make travel bookings, order
books, etc. between people and companies all around the world. Internet is a ----------------------
worldwide network of computers holding vast quantities of data that the user
can access directly from a personal computer. Internet has emerged as the single ----------------------
largest “Information Superhighway” in the world. ----------------------
Internet is commonly referred to as “the network of the networks”. The
Internet (with the capital “I”) is a public resource. It means that any user or ----------------------
server on the Internet can connect to any other user or server. No one “owns” ----------------------
the Internet, and this feature gives individual and corporate organisations
tremendous capabilities. Internet has proved to be a powerful tool for corporates ----------------------
in particular as it helps, inter alia, bring in customers, generates revenue and
saves money. ----------------------
----------------------
----------------------
----------------------
----------------------
Record Record
----------------------
----------------------
----------------------
---------------------- Activity 6
---------------------- Surf the Internet and find out the limitations and future of ISDN and also
give relevant example for the same.
----------------------
----------------------
Some of the major GIS applications are in the areas of: ----------------------
a. Advertising ----------------------
b. Archeology ----------------------
c. Education (location of institutes, etc.)
----------------------
d. Cartography (mapmaking)
----------------------
e. Site selection (real estate, optimal railway route, etc.)
f. Election administration (locating booths) ----------------------
g. Insurance ----------------------
h. Routing/distribution network ----------------------
i. Oil, gas and mineral exploration
----------------------
---------------------- In addition to the above-mentioned reasons, some of the other reasons for
outsourcing ITES as indicated by Michael F. Corbett and Associates are:
---------------------- 1. Need to create a variable cost structure.
---------------------- 2. Need to increase revenue.
3. Need to foster innovation.
----------------------
4. Need to conserve capital.
---------------------- 5. Need to improve quality.
---------------------- 6. Need to increase speed to market.
The Snags
----------------------
The ITES in India face certain problems which need to be looked into and
---------------------- set right forthwith on a top priority. Some of the problems are:
---------------------- 1. Relatively poor quality of basic infrastructure including transport, power,
housing and bandwidth (notwithstanding recent improvements).
----------------------
2. Department of Telecommunications (DoT) regulations hampering
---------------------- sufficient/unrestricted interconnectivity.
----------------------
---------------------- 3. The analog signal is in the form of waves of different frequencies and
subject to distortion.
---------------------- 4. Digital signal is generated by microprocessor based or controlled device.
---------------------- 5. Transmission speed is the total amount of information that can be
transmitted through any telecommunication channel and is measured in
----------------------
Bits per Second.
---------------------- Check your Progress 5
---------------------- Fill in the blanks.
---------------------- i. - c.
ii. - d.
---------------------- iii. - b.
---------------------- iv. - a.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
4
Structure:
4.1 Introduction
4.2 Management
4.3 Decision-Making
4.4 Decision-Making Process
4.5 Decision-Making Tools
4.6 Principles for Decision-Making
4.7 Decision-Making Models
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
----------------------
Activity 1
----------------------
Visit any organisation and try to find out the role of managers there. ----------------------
----------------------
4.3 DECISION-MAKING
----------------------
A decision is the choice out of several options made by the decision-
maker to achieve some objective in a given situation. ----------------------
A number of experts consider decision-making as the single-most ----------------------
important managerial function. Decisions are made at different levels in the
organisation structure. The decisions made at different levels vary in their ----------------------
content, risks involved, complexity and the implications.
----------------------
The information support required for the decision-making process also
varies according to the type of decision and the level within the organisation at ----------------------
which such decision is being made.
----------------------
The major characteristics of business decision-making are:
----------------------
a. Sequential in nature
b. Exceedingly complex due to risks and trade offs ----------------------
Information Technology 83
Notes Decision-making environment
Decisions could be made under different types of environment, viz.,
----------------------
ambiguity, certainty, uncertainty and risk. An environment is ambiguous when
---------------------- the problem is not clear, the goal is not clear and hence the outcome also is not
clear.
----------------------
A certain environment is one where the relationship between inputs and
---------------------- outputs is known and hence the result is also known. The element of uncertainty
is there when there is unawareness about resources, input/output relations and
---------------------- the outcome is uncertain or unpredictable. The risk environment is one where
the result is unknown − it might result in profits, but it might lead to incurring
----------------------
losses as well.
---------------------- Decision types
---------------------- Decisions could be divided into two categories − programmed decisions
and non-programmed decisions.
----------------------
1. Programmed decisions: The major characteristics of the programmed
---------------------- decisions are:
Unstructured ----------------------
Policy
Planning ----------------------
(Strategic)
----------------------
Tactical ----------------------
Planning
----------------------
Operational Planning
----------------------
----------------------
Transaction Planning Structured
----------------------
----------------------
Fig. 4.2 Decision-Making at Different Levels of Organisation ----------------------
----------------------
Fill in the blanks.
----------------------
1. The certainty environment is one where the relationship between
inputs and outputs is _______________ and hence the result is also ----------------------
____________.
----------------------
2. Decisions are made at different ______________ in the organisation
structure. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Certainty Risk Uncertainty
Conditions Conditions Conditions ----------------------
----------------------
Select Alternative
Revise ----------------------
Implement Decision
----------------------
Evaluate & Control ----------------------
The payoff matrix shows that the Activity “B” can give him the best ----------------------
possible return among the three alternatives.
----------------------
It must, however, be remembered that the payoff matrix has an obvious
weakness. It is dependent on the decision-maker’s judgement of the ----------------------
possible outcomes for each alternative and also the values the decision-
----------------------
maker assigns to each.
At the same time, it must also be remembered that the payoff matrix ----------------------
forces the decision-maker to make a firm judgment about what he thinks
----------------------
may happen and the worth to him of those outcomes.
The payoff matrix does not make a decision but it does force the decision- ----------------------
maker to be more realistic about possible outcomes. ----------------------
2. Decision tree: The decision tree technique is basically an extension
of the probability theory to decision-making. It is a simple technique, ----------------------
which mathematically factors the degree of risk into a business decision. ----------------------
It allows the decision-maker to work out the options, after taking into
account the “odds”, and then make a reasonably precise comparison ----------------------
among alternative courses of action.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 4.5 Left to Right
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 4.6 Top to Bottom ----------------------
The standard presentation of decision tree is as follows:
----------------------
----------------------
----------------------
Chance Node
----------------------
----------------------
2nd Decision Point
----------------------
----------------------
Initial Point ----------------------
(Decision Node)
----------------------
Fig. 4.7 Standard Presentation
----------------------
3. Decision rules: Decision rules and decision tables are used together.
Decision rules enable decisions to be made better and more economically. ----------------------
Decisions could also be faster and more accurate. Decision rules/tables
are to be used for programmable or routine/ operating decision. It is, ----------------------
therefore, imperative that decision rules are documented.
----------------------
4. Decision table: Decision table documents rules that select one or more
actions based on one or more conditions from a set of possible conditions. ----------------------
It is precise and compact. Decision table may include both qualitative and ----------------------
quantitative bases for decision-making.
Decision tables are in the form of “IF” listings and “THEN” listings. The ----------------------
“IF” listings stipulate the required conditions and the “THEN” listings ----------------------
provide the actions to be taken if the conditions exist.
----------------------
The “IF” LISTINGS form the ‘CONDITION STUB’ and the “THEN”
LISTINGS form the ‘ACTION STUB’. ----------------------
The decision table helps the analyst consider all options, conditions,
----------------------
variables and alternatives. It must, however, be remembered that this
technique has to be used in conjunction with other techniques. ----------------------
----------------------
----------------------
Activity 4
----------------------
---------------------- Draw a decision tree to show the fixed deposits schemes offered to customers
in a bank.
----------------------
4.6 PRINCIPLES FOR DECISION-MAKING
----------------------
---------------------- Apart from the various tools and techniques used for decision-making,
the following principles are also used in/for decision-making.
---------------------- 1. Principle of bounded rationality: While the decisions should normally
---------------------- be based on rationality, what is observed is that our rationality, in reality,
is conditioned by various factors/constraints like financial, technical,
---------------------- administrative, etc.
---------------------- In view of this reality of situation, the principle of bounded rationality
comes into existence. It implies that it is practically difficult, almost
---------------------- impossible, to take a completely rational decision. The principle of
bounded rationality, therefore, highlights the fact that as it is not possible
----------------------
to arrive at a scientific solution, it is worthwhile to carry on and arrive at
---------------------- workable decisions which fit into the principle of bounded rationality.
If a scientific decision either cannot be taken or cannot be implemented,
----------------------
it would remain only an ideal, hypothetical yet impracticable decision.
---------------------- Under these circumstances, a workable solution should be worked out
while still continuing to work on developing the scientific solution.
----------------------
In other words, workable decision is the starting point of a scientific
---------------------- solution, which is the ultimate goal that one must strive to achieve.
----------------------
----------------------
Activity 5 ----------------------
By visiting different websites, find out how the principles used for decision- ----------------------
making are effective.
----------------------
Every manager has to take decisions and, in a way, every manager is a ----------------------
model of decision-making himself. However, in the context of our discussions,
----------------------
we would note the following decision-making models:
1. The classical model: As per the classical model of decision-making, ----------------------
a manager, when confronted with a decision-making situation, would
----------------------
collect all the information that is required for that activity and would take
a decision, which would be in the best interest of the organisation. ----------------------
2. The administrative model: Under the administrative model, the ----------------------
manager is more concerned about himself. As such, when confronted
with a decision-making situation, the manager would collect whatever ----------------------
information could be available and take a decision, which may not be in
the best interests of the organisation but would certainly be in the best ----------------------
interests of the manager. ----------------------
---------------------- Design
----------------------
Choice
----------------------
---------------------- Fig. 4.8 The Herbert Simon Model
----------------------
Activity 6
----------------------
---------------------- By visiting different websites, find out how the Simon Model is effective in
the decision-making process.
----------------------
---------------------- Summary
----------------------
●● A manager is defined as a person who achieves the organisational goals
---------------------- by motivating others to perform and not only by performing himself.
●● Managers, therefore, have to develop decision-making skills as managers
----------------------
are evaluated/ rewarded based on the importance, numbers and results of
---------------------- their decisions.
●● The information support required for the decision-making process
---------------------- also varies according to the type of decision and the level within the
---------------------- organisation at which such decision is being made.
●● Decisions could be made under different types of environment, viz.,
---------------------- ambiguity, certainty, uncertainty and risk. An environment is ambiguous
when the problem is not clear, the goal is not clear and hence the outcome
----------------------
also is not clear.
---------------------- ●● Payoff matrix is one of the more commonly used and essential quantitative
techniques of decision-making.
----------------------
●● The decision tree technique is basically an extension of the probability
---------------------- theory to decision-making. It is a simple technique, which mathematically
factors the degree of risk into a business decision.
---------------------- ●● Decision table documents rules that select one or more actions based on
---------------------- one or more conditions from a set of possible conditions.
●● The principle of bounded rationality highlights the fact that as it is not possible
---------------------- to arrive at a scientific solution, it is worthwhile to carry on and arrive at
---------------------- workable decisions which fit into the principle of bounded rationality.
Keywords ----------------------
----------------------
Answers to Check your Progress
----------------------
Check your Progress 1
----------------------
Fill in the blanks.
1. Quality of managerial decisions’ reach is the yardstick of their effectiveness ----------------------
and of their value to the organisation. ----------------------
2. Modern management system relies and depends on MIS.
----------------------
Check your Progress 2
Fill in the blanks. ----------------------
1. The certainty environment is one where the relationship between inputs ----------------------
and outputs is known and hence the result is also known.
----------------------
2. Decisions are made at different levels in the organisation structure.
---------------------- 2. The principle of bounded rationality highlights the fact that it is not
possible to arrive at a scientific solution.
----------------------
Check your Progress 6
---------------------- State True or False.
---------------------- 1. True
2. True
----------------------
3. False
---------------------- 4. True
---------------------- 5. True
----------------------
Suggested Reading
----------------------
1. Davis, G and M. Olson. 1985. Management Information Systems. New
---------------------- York: McGraw Hill)
2. Jawadekar, Waman. 2009. Management Information Systems: Text &
---------------------- Cases. New Delhi: Tata McGraw Hill.
---------------------- 3. Prasad, L.M. and Usha Prasad. 2003. Management Information Systems.
New Delhi. Sultan Chand & Sons.
----------------------
4. Sadagopan, S. 1998. Management Information Systems. New Delhi:
---------------------- Prentice Hall India.
----------------------
----------------------
----------------------
5
Structure:
5.1 Introduction
5.2 Information Process
5.3 Sources of Information
5.3.1 MIS and Information Concepts
5.3.2 Classification of Information
5.3.3 Types of Level-Wise Information
5.3.4 Attributes of Information
5.4 Human as Information Processor
5.4.1 The Newell−Simon Model
5.5 Information Requirement
5.5.1 Information Requirements at Different Levels
5.5.2 Techniques to Assess Information Requirement
5.6 Critical Success Factors
5.7 Business System Planning
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
Information 99
Notes
Objectives
----------------------
After going through this unit, you will be able to:
----------------------
●● Differentiate between data and information
---------------------- ●● Discuss information process and information presentation
---------------------- ●● Assess the importance of relevant information to the decision-maker
---------------------- ●● State the types of information
●● Explain human as an information processor
----------------------
●● Identify information requirement at different levels of management
---------------------- ●● Describe critical success factors and business system planning
----------------------
----------------------
5.1 INTRODUCTION
---------------------- Initially, while discussing about MIS, we have said that MIS is a system,
which provides information to the management. We have also said that we are
---------------------- living in an Information Age. Information is of critical importance for setting
up, running, survival and prosperity of a business organisation. Information is
---------------------- also imperative today as it enables an organisation to gain and retain competitive
---------------------- edge and emerge winner.
We will now discuss the concepts of information in more details as MIS
---------------------- is centred around information. So, what is information?
---------------------- Information is derived from data. Data is nothing but a random,
unorganised collection of indications or measurements of certain qualities
----------------------
or attributes relating to an entity, recorded either in alphabetical, numerical,
---------------------- alphanumerical, voice, image, text or any other form.
Data could also be described as unstructured raw facts, observations or
----------------------
unevaluated messages in isolation. Data, per se, does not convey much or is
---------------------- not of much use. It is like a material, which is simply available in an unfinished
form. Data means facts and figures, which are not currently being used in a
---------------------- decision process and usually takes the form of office/historical records that are
recorded and filed without immediate intent to retrieve for decision-making.
----------------------
Information 101
Notes The degree of communication is affected by the methods of transmission,
the manner of information handling and the limitations and constraints of a
---------------------- receiver as the information processor and the organisation as the information
user.
----------------------
Information should be summarised. The principle behind summarisation
---------------------- is that too much information causes confusion, misunderstanding and misses
the purpose.
----------------------
Another method of improving the degree of communication is through
---------------------- message routing. The aim here is to distribute information to all those who are
accountable for the subsequent actions or decisions in any manner.
----------------------
Information is not only relevant but also critical for the decision-maker as
---------------------- the quality of decision-making is dependent on the quality of information. More
specifically, information is useful for the decision-maker as:
----------------------
1. Information helps in minimising, if not eliminating altogether, the
---------------------- elements of risk and uncertainty in decision-making.
---------------------- 2. Information minimises the element of “surprise” and uncertainty in
decision- making.
----------------------
3. Information improves the quality of decision-making.
----------------------
4. Information helps to achieve the most optimum results within given
---------------------- constraints.
5. Information affects the decision-making behaviour and makes the
----------------------
difference.
----------------------
Check your Progress 1
----------------------
----------------------
Information 103
Notes 2. Non-action information: The information, which communicates only
the status of a situation is a no-action information. For example, while
---------------------- watching a live cricket match you understand that India’s current run rate
is four per over whereas its required run rate is seven per over. You have
---------------------- this information but this a non-action information.
---------------------- 3. Recurring information: This information is generated at regular
intervals, for example,the monthly sales reports, accounts statement, etc.
----------------------
4. Non-recurring information: This information is non-repetitive in nature,
---------------------- for example, the financial analysis or the report on the market research.
---------------------- 5. Internal information: This information is generated through the internal
sources of the organisation.
----------------------
6. External information: This information is generated through external
---------------------- sources, for example, Government reports ,etc.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Information 105
Notes
Check your Progress 2
----------------------
---------------------- Activity 2
----------------------
1. Information minimises risk. Do you agree with this statement? Justify
---------------------- your answer with the help of examples.
---------------------- 2. Visiting some websites and find out the differences between the
various types of information levels.
----------------------
----------------------
----------------------
Input From Mental Output ----------------------
Sensory Recep- Channel Processing Channel Response
tors
Filter ----------------------
----------------------
Fig. 5.2 Human as Information Processor
However, human beings cannot go on accepting unlimited inputs and ----------------------
keep coming up with unlimited outputs, as the human capacity to accept inputs
----------------------
and offer outputs is rather limited. If there is too much of input, the human
capacity will simply be unable to accept the input and correspondingly, the ----------------------
output will also be reduced/restricted. This “too much of inputs” affecting the
output is considered as “overloading”. ----------------------
To avoid this eventuality, humans restrict input to a manageable quantity ----------------------
by being selective in accepting some inputs and blocking other inputs. This
process leads to creation of filters resulting from: ----------------------
i. Frame of reference of the person concerned, based on prior knowledge ----------------------
and experience.
----------------------
ii. Normal decision procedure.
----------------------
iii. Decision-making under stress.
This process of filtering is illustrated in Figure 5.3 and Figure 5.4. ----------------------
----------------------
Input Mental Pro- ----------------------
Filter
Stimuli cessing
----------------------
Fig. 5.4 Filtering under Stress
----------------------
It may be noted that, filtering, apart from blocking unwanted data, may
also block data, which is not considered to be consistent with the established ----------------------
frame of reference. This, in turn, may result in errors of perception like omission, ----------------------
distortion, inferences, etc. These errors of perception may reduce information
content. ----------------------
----------------------
----------------------
Information 107
Notes Data Stored Frames
Storage of Reference
----------------------
----------------------
Input Data Mental Processing Decisions
----------------------
Fig. 5.5 Human Information Processing Mechanism and Decision-Making Process
----------------------
5.4.1 The Newell−Simon Model
----------------------
Allele Newell and Herbert Simon have proposed a model of human
---------------------- problem-solving and human information processing system. According to
---------------------- the model, the human information processing system consists of a processor,
sensory inputs, motor output and three different memories − Long-Term
---------------------- Memory (LTM), Short-Term Memory (STM) and External Memory (EM) as
illustrated hereafter.
----------------------
Long Term Memory
----------------------
Processor
----------------------
---------------------- Receptors
----------------------
Environment Processor
Memory
----------------------
---------------------- Effectors
----------------------
Fig. 5.7 Human Information Processing System
----------------------
----------------------
----------------------
Fig. 5.8 Computer Information Processing System
----------------------
Check your Progress 3 ----------------------
----------------------
Fill in the blanks.
1. Allele Newell and Herbert Simon have proposed a model of ----------------------
__________ and _____________.
----------------------
2. The computer information processing system consists of _________,
_________, _________ and _____________. ----------------------
----------------------
Activity 3 ----------------------
Visit an organisation and discuss with them regarding the importance of ----------------------
Computer Information Processing System.
----------------------
----------------------
As discussed earlier, information today has become a strategic tool for
organisations. Information is now also considered as a resource, much like capital ----------------------
and labour. As such, it becomes imperative to analyse and assess the information
requirement/needs of business organisations activity-wise, function-wise, level- ----------------------
wise as well as for organisation as a whole, as the information required at each
----------------------
level is different.
Obviously, then, defining the specific information requirements becomes ----------------------
the most critical—and therefore the most difficult—task for the Systems
----------------------
Analyst. This is one area where many large system efforts could go wrong,
bringing the edifice of the organisational information system crumbling down ----------------------
as faulty requirements analysis is a leading cause of systems failure and high
systems development costs. ----------------------
Analysing and assessing information requirements/needs, therefore, must ----------------------
be given the attention and importance it deserves.
----------------------
----------------------
----------------------
----------------------
Information 109
Notes The information requirements within an organisation, hierarchy level-
wise, activity-wise and function-wise, could be presented as follows:
----------------------
Strategic Senior Man-
---------------------- Level agers
---------------------- Operational
Operational
Level Managers
----------------------
Manufacturing
Accounting
Resources
Human
Marketing
Sales &
Finance
----------------------
----------------------
---------------------- Fig. 5.9 Hierarchy Level/Activity/Function-Wise Information Requirements
---------------------- There are four reasons, which make it difficult to obtain a correct and
complete set of information requirements:
----------------------
1. The constraints on humans as information processors and problem-
---------------------- solvers.
2. The variety and complexity of information requirements.
----------------------
3. The complex patterns of interaction among users and analyst in defining
---------------------- requirements.
4. Unwillingness of some users to provide requirements.
----------------------
Information requirement is a detailed statement of the information needs
---------------------- that a new system must satisfy. It involves identifying who needs what
information, where, when and how.
----------------------
Information requirement analysis carefully defines the objectives of
---------------------- the new or modified system and develops a detailed description of the
functions that the new system is expected to perform. Requirements must
---------------------- consider economic, technical and time constraints as well as the goals,
procedures and decision processes of the organisation.
----------------------
5.5.1 Information Requirements at Different Levels
----------------------
Information requirements need to be established at three levels for the
---------------------- purpose of developing/implementing organisational information system. The
three levels are as follows:
---------------------- ●● Organisational information requirements.
---------------------- ●● The requirements for each database defined by data models and other
specifications.
---------------------- ●● The detailed information requirements for an application.
---------------------- 1. Organisational-level information requirement: Information requirements
----------------------
Advertising
Accounting
Personnel/
Inspection
Marketing
Corporate
Corporate
Reporting
Market &
Inventory
Insurance
Appraisal
Recovery
Planning
Analysis
Product
Admin
----------------------
Credit
Client
Audit
Legal
Sales
----------------------
Mgrs
Mgr A ----------------------
Mgr B ----------------------
Mgr C
----------------------
Mgr D
----------------------
.
. ----------------------
. ----------------------
Mgr N
----------------------
----------------------
Fig. 5.10 Subsystem Matrix
----------------------
Information 111
Notes c. Defining and evaluating information requirements for organisational
subsystem: At this stage, the information requirements of each
---------------------- subsystem of the organisation are obtained by conducting group
interviews of those managers having major decision-making
---------------------- responsibility for the subsystems.
---------------------- While conducting interviews, three sets of questions are asked to
improve the chances of obtaining a complete set of requirements.
----------------------
The three sets of questions are:
---------------------- 1. What problem do the managers have and what information
is needed for solving them? What decisions do the managers
----------------------
make and what information do they need for decision-making?
---------------------- 2. What factors are critical to the success of the managers’
activity and what information do they need to achieve success
---------------------- in them or monitor progress?
---------------------- 3. What are the outputs (ends) from managerial activities and
what information do they need to measure effectiveness in
---------------------- achieving the outputs? What resources are used in producing
the outputs and what information is needed to measure
----------------------
efficiency in using the resources?
---------------------- (These questions are derived from three approaches, viz.,
business system planning, critical success factors and means-
----------------------
end analysis, which are discussed later).
---------------------- 2. Database requirements: Database requirements arise both from applications
and ad hoc queries. The overall architecture for the database to meet
---------------------- these requirements is defined as part of the organisational information
---------------------- requirement. Major classes of data are then defined and associated with
organisational processes that require them.
---------------------- The process of obtaining and organising a more detailed database
requirements can be divided into defining data requirement as perceived by
----------------------
the users (conceptual or logical requirements) and defining requirements
---------------------- for physical design of the database.
3. Application-level information requirement: An application, basically
---------------------- a subsystem of the overall information system, provides information
---------------------- processing for a specific organisational unit/function/activity. The process
for the determination of information requirement at the application level
---------------------- defines and documents specific information content as also design and
implementation requirements.
----------------------
Application-level information requirement are mainly of two types:
---------------------- ●● Social or behavioural requirements
---------------------- ●● Technical requirements
The social/behavioural requirements, based on job design, specify
----------------------
objectives and assumptions like:
----------------------
One or more asking methods can be used either alone or in conjunction ----------------------
with other tools to assess information requirement.
----------------------
----------------------
Information 113
Notes 2. Deriving from an existing information system: Information systems,
currently in operation or having an operational history, can be used to
---------------------- arrive at information requirement for a proposed information system.
The types of existing information systems, which could be useful in this
---------------------- regards are:
---------------------- i. Existing system to be replaced by new system.
---------------------- ii. Existing system in another or similar organisation.
iii. Information available from handbooks, industry, specific studies or
----------------------
subject textbooks
---------------------- 3. Means-end analysis: The means-end analysis is a technique used
---------------------- for determining information requirements of the organisation at the
department and/or individual manager’s level.
---------------------- The technique separates the definition of ends (or outputs) generated by
---------------------- an organisational process, from the means (inputs) used to accomplish them. As
the end/output from one process is the input for next/some other process, the
---------------------- ends-means analysis brings out information requirement effectively.
---------------------- The ends-means analysis is based on the Systems Theory. A model of the
ends-means analysis is provided hereunder.
----------------------
Inputs
---------------------- Outputs
----------------------
----------------------
----------------------
Feedback - Effeciency
----------------------
Fig. 5.11 A Model of the Means-End Analysis
----------------------
----------------------
----------------------
----------------------
Information 115
Notes
Check your Progress 5
----------------------
---------------------- Activity 5
----------------------
Visit an organisation and discuss its critical success factors. Analyse the
---------------------- same and write it in your own words.
----------------------
5.7 BUSINESS SYSTEM PLANNING
----------------------
The Business System Planning (BSP) method, also called enterprise analysis,
---------------------- is a comprehensive methodology developed by IBM in the 1960s explicitly for
---------------------- establishing the relationship among large system development projects.
This method encompasses an analysis of organisation-wise information
---------------------- requirements by looking at the entire organisation in terms of organisation’s
---------------------- units’ functions, processes and data elements. It helps identify the key entities
and attributes in the organisation’s data. The BSP is typically a top-down,
---------------------- process-based method of determining information requirements as also
information architectures.
----------------------
Table 5.5 Business Systems Planning: The Pros and Cons
----------------------
Pros Cons
---------------------- It gives a comprehensive view of It produces an enormous
the organization and of systems/ amount of data
---------------------- data uses/gaps.
---------------------- It is especially suitable for start- The data collection is
up or massive change situations. expensive
----------------------
It helps to produce an organiza- It is difficult to use/
---------------------- tion-wideconsensus by involving analyze all the data col-
a large number of managers and lected.
----------------------
users of data
---------------------- It helps managers think about Focus on use of existing/
information and its users available information
----------------------
rather than on critical
---------------------- objectives of manage-
ment.
----------------------
----------------------
Starting the Study
----------------------
Defining Business Processes
----------------------
Defining Data Classes
----------------------
Analysing current systems support ----------------------
----------------------
Defining findings and conclusions
----------------------
Reviewing Information Re- Defining Information Architecture ----------------------
source Management
----------------------
Developing recommendations & action plan ----------------------
----------------------
Fig. 5.12 Steps in defining a Proposed Information Architecture in
Business Systems Planning ----------------------
[Source: Business Systems Planning - Information Systems Planning Guide, ----------------------
Third Edition, GE20- 0527, IBM Corporation, 983, p. 25]
----------------------
Information 117
Notes In addition to the major methods discussed earlier, there are certain other
methods for determining information requirement as follows:
----------------------
●● Normative analysis
---------------------- ●● Decision analysis
---------------------- ●● Strategy set transformation
●● Socio-technical analysis
----------------------
●● Process analysis
---------------------- ●● Input-Process-Output Analysis
----------------------
Check your Progress 6
----------------------
---------------------- Summary
---------------------- ●● Data could also be described as unstructured raw facts, observations or
unevaluated messages in isolation. Data, per se, does not convey much or
---------------------- is not of much use.
---------------------- ●● Information, according to Davis and Olson, is “data that has been
processed into a form that is meaningful to the recipient and is of real or
---------------------- perceived value in current or prospective actions or decisions”.
---------------------- ●● Information should be summarised. The principle behind summarisation
is that too much information causes confusion, misunderstanding and
---------------------- misses the purpose.
●● Data is the raw material used for obtaining information. Data is derived
----------------------
from a number of sources, both internal as well as external. If the data
---------------------- is collected for the first time by the researcher, it is classified as primary
data.
---------------------- ●● Primary data could be gathered directly from the respondent.
---------------------- ●● Secondary sources of data/information include internal records as well as
external records.
----------------------
●● MIS should provide the information which has a surprise value and which
---------------------- reduces the uncertainty. It should simultaneously build the knowledge
base.
----------------------
●● For strategic decision-making, one needs strategic information, which is
---------------------- wholistic, unstructured and draws heavily from the external environment.
●● Tactical information would be used for medium/short-term planning by
---------------------- the middle management.
----------------------
Information 119
Notes
Self-Assessment Questions
----------------------
1. Explain information and its characteristics.
---------------------- 2. Why is presentation of information important?
---------------------- 3. Explain the relationship between information and decision-maker.
---------------------- 4. Operational level covers a specific product, specific activity and a smaller
group/number of people.
----------------------
2. CSF can be used at both the organisation as well as the application level. ----------------------
Check your Progress 6 ----------------------
Fill in the blanks.
----------------------
1. Business systems planning is also called enterprise analysis.
----------------------
2. The BSP is typically a top-down, process based method of determining
requirements as also information architectures. ----------------------
----------------------
----------------------
----------------------
----------------------
Information 121
Notes
Suggested Reading
----------------------
1. Davis, G, and M. Olson. 1985. Management Information Systems. New
---------------------- York: McGraw Hill.
2. Jawadekar, Waman. 2009. Management Information Systems: Text &
----------------------
Cases. New Delhi: Tata McGraw Hill.
---------------------- 3. Prasad, L.M., and Usha Prasad. 2003. Management Information Systems.
---------------------- New Delhi. Sultan Chand & Sons.
4. Sadagopan, S. 1998. Management Information Systems. New Delhi:
---------------------- Prentice Hall India.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
6
Structure:
6.1 Introduction
6.2 Components of DSS
6.2.1 Development of DSS and Desirable Characteristics of DSS
6.2.2 DSS Approach and Core Capabilities
6.3 Structure and Types of DSS
6.4 Group Decision Support System
6.5 Executive Information System/Executive Support System
6.6 Expert Systems
6.7 Artificial Intelligence
Summary
Key Words
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
----------------------
Behavioural Management Operations ----------------------
Model Science Model Research Model
----------------------
Fig. 6.1 Different Models of DSS ----------------------
i. Behavioural model: The focus of behavioural models of DSS
is on studying/understanding the behaviour/trends amongst the ----------------------
variables. Decision could then be arrived at with due regards to such ----------------------
behavioural relationships. Trend analysis, forecasting, co-relation,
regression are examples of behavioural models of DSS. ----------------------
ii. Management science model: These models are developed based ----------------------
upon the principles of management, management accounting and
econometrics, among others. Budgetary systems, cost accounting, ----------------------
capital budgeting, inventory management, etc. are examples of
management science model of DSS among others. ----------------------
iii. Operations research model: Operations research is basically ----------------------
application of mathematical formulae for arriving at optimum
solutions. As such, operations research models are mainly ----------------------
mathematical models. These models represent real-life problems/
----------------------
situations in terms of variables and parameters expressed in algebraic
equations form. Linear programming, ABC analysis, mathematical ----------------------
programming techniques, material requirement planning are some
of the examples of the operations research model. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fill in the blanks.
1. The DSS software system permits easy interaction between the ----------------------
________ of the system and the DSS database and _________ base.
2. A _____________ is an abstract representation that illustrates the ----------------------
components or relationships of a ____________. ----------------------
3. Decision support system helps to close the ____________ to enable
managers to improve quality of their ____________. ----------------------
4. ______________ is basically application of mathematical formulae
for arriving at optimum solutions. ----------------------
Match the following. ----------------------
i. Representations a. Logical and mathematical manipulations of data such as
assigning risksand values, simulating alternatives etc. ----------------------
ii. Operations b. Databases, views of data, work space, libraries and
other capabilitiesto refresh/update memory ----------------------
iii. Memory aids c. It allows user to control the DSS activities like
----------------------
software permitting user control of memory
representations, operations, training ----------------------
iv. Control aids d. Conceptualisation of information used in making
decisions, such as graphs, charts, lists, reports and ----------------------
symbols
----------------------
----------------------
----------------------
----------------------
Model
Management ----------------------
----------------------
----------------------
Dialogue ----------------------
Management
----------------------
----------------------
Data ----------------------
Management
----------------------
----------------------
----------------------
External
----------------------
DSS Enterprise
Database Data Source
Data
----------------------
Fig. 6.2 Fundamental DSS Program Structure ----------------------
Components of DSS Programs ----------------------
1. Dialogue management: It has three subsystems. The user interface
----------------------
subsystem manages the physical user interface. It controls the appearance
of the screen, accepts input from the user and displays the results. It ----------------------
also checks the user commands for correct syntax. The dialogue control
subsystem maintains a processing context with the user. ----------------------
----------------------
User Dialogue Request
c. Data Management
---------------------- Interface Control Translator
---------------------- Query/Database
Command
Interpreter
----------------------
Data
---------------------- Local DSS DBMS Dictionary
Management
---------------------- Interface to Data
Services
----------------------
Enterprise
Data
---------------------- External
Data
----------------------
Fig. 6.3 Components of DSS Program
----------------------
3. Database management: It stores and manipulates the database as directed
---------------------- by either the model management component or the dialogue management
---------------------- component. Secondly, it maintains an interface with data sources that are
external to the DSS, viz., TPS database, inter-enterprise systems, external
---------------------- data utilities and other DSS applications.
---------------------- We have already discussed the various aspects of decision support system,
where the respective executive/decision-maker arrives at effective decisions by
---------------------- using a DSS. Thus, the DSS is designed for and used more by the individual
decision-maker.
----------------------
It was, however, felt that in the contemporary business environment,
---------------------- decision-makers have to increasingly work in groups as group-working/group
decision-making has certain advantages like:
----------------------
i. More comprehensive consideration of the problems and related issues.
---------------------- ii. Better group understanding of the problem and rationale for the decision.
---------------------- iii. Reduced likelihood of “quibbling” using “20/20 hindsight”.
iv. Greater group commitment to the decision.
----------------------
v. Improved communication to/with the implementers ensuring better
---------------------- implementation.
Hence, the DSS application was suitably extended/expanded to facilitate
----------------------
group decision environment and the DSS for a group came to be known as
---------------------- the Group Decision Support System (GDSS). It is also referred to as a Group
Support System or a Computerised Collaborative Work System (CCWS). We
---------------------- would, however, refer to this extended/expanded form of DSS as the GDSS.
---------------------- Under the GDSS environment, the members of the group utilise the DSS
as a group and the user interface is expanded to include the computers, which
---------------------- are suitably connected/networked. In this way, under the GDSS, members of the
group can communicate using their computers with DSS or with other members
----------------------
of the group to facilitate optimal decision-making.
---------------------- According to De Sanctis and Gallupe, “GDSS is an interactive computer-
---------------------- based system that facilitates the solution of unstructured problems by a set of
decision-makers working together as a group”.
---------------------- GDSS Components
---------------------- The GDSS components are similar to that of the DSS components. The
GDSS has three basic components, viz., the hardware, the software, the people
---------------------- and procedure as mentioned below:
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Activity 3
---------------------- Visit an organisation and find out how GDSS helps when more than one
decision-maker has to make a decision.
----------------------
----------------------
Check your Progress 4
----------------------
Fill in the blanks.
----------------------
1. The Executive Information System/Executive Support System is a
---------------------- relatively new _____________ technology.
---------------------- 2. ______________ facilitates the attainment of organisational
objectives.
----------------------
----------------------
Activity 4
----------------------
By visiting an organisation, try to find out how EIS/ESS helps them.
----------------------
----------------------
----------------------
Expert systems were among the most exciting computer applications ----------------------
to emerge during the 1980s. The ES technology basically derives from the
----------------------
research discipline of Artificial Intelligence, a branch of computer science
concerned with the design and implementation of programs which are capable ----------------------
of emulating human cognitive skills such as problem-solving, visual perception
and language understanding. An expert system mimics human expertise in a ----------------------
narrow domain to solve specific problems in a well-defined area.
----------------------
Expert System: Definitions
----------------------
An expert system has been defined differently by different people. As
such, there is no precise definition of an expert system that is guaranteed to ----------------------
satisfy everyone.
----------------------
However, while in a narrower perspective, ES technologies make
computer programming easier and more effective, in a broader perspective, ES ----------------------
represents the first step in a process that will transform computing by moving
programming technologies beyond numerical programming into a realm of ----------------------
logical, symbolic programming. ----------------------
More specifically, the following definitions could be noted.
----------------------
According to Peter Jackson, “An expert system is a computer programme
that represents and reasons with knowledge of some subject specialist with a ----------------------
view to solving problems or giving advice”.
----------------------
Robert Bowerman and David Glover have defined expert system as “highly
specialised computer systems capable of simulating that element of a human ----------------------
specialist’s knowledge and reasoning that can be formulated into knowledge
----------------------
chunks, characterised by a set of facts and heuristic rules”. (Heuristic rules are
rules of thumb accumulated by a human expert through intensive problem- ----------------------
solving in the domain of a particular task).
----------------------
According to Bruce Buchanan and Reid Smith, an expert system is a
computer program that − ----------------------
i. Reasons with domain-specific knowledge that is symbolic as well as ----------------------
numerical.
ii. Uses domain-specific methods that are heuristic (plausible) as well as ----------------------
following procedures that are algorithmic (certain). ----------------------
iii. Performs well in the problem area.
----------------------
iv. Explains or makes understandable both what it knows and the reasons for
its answers. ----------------------
v. Retains “flexibility”. ----------------------
Expert system, according to Hossein Bidgoli, “is a series of computer ----------------------
programmes that attempt to mimic human thought, behaviour in a specific area
that has successfully been solved by human experts”. ----------------------
----------------------
----------------------
Experts
----------------------
----------------------
---------------------- 6. Will the system enable developing the solution faster than human experts?
----------------------
Activity 5
----------------------
---------------------- By visiting relevant websites, find out any two examples of expert systems.
----------------------
----------------------
Artificial Intelligence (AI) is an area, which has over half a century of ----------------------
history. AI began in earnest with the emergence of the computers during the late
----------------------
1940s. It was the ability of these machines to store large amount of data and
process it into information at very high speed, hitherto unimaginable, that gave ----------------------
researchers the vision of building systems which could imitate/emulate some, if
not all, human abilities. ----------------------
While some groundwork had already been initiated earlier, it was not until ----------------------
the 1980s that AI received popular economic and managerial acclaim. It was
during this period that AI went through the transition from a primary research ----------------------
area to potential commercial applications. It was only then that AI was accepted
as an emerging technology and as such attracted considerable attention. ----------------------
AI system does not replace people. They liberate experts from solving ----------------------
common/simple problems, leaving the experts to solve complex problems.
AI system helps to avoid making same mistakes and to respond quickly and ----------------------
effectively to a new problem situation. ----------------------
Artificial Intelligence: Meaning
Artificial Intelligence is a technology, which helps/facilitates the ----------------------
application of computers to areas that require knowledge, perception, reasoning, ----------------------
understanding and cognitive abilities, which distinguish the human behaviour
from machines like computers. ----------------------
It is the science and engineering of making intelligent machines, especially
----------------------
intelligent computer programs. It is related to the similar task of using computers
to understand human intelligence. ----------------------
Before moving into further discussion about AI, it would be desirable
to compare and understand the attributes of Natural (Human) Intelligence and ----------------------
Artificial (Machine) Intelligence. ----------------------
Table 6.6 Comparison between Natural Intelligence and Artificial Intelligence
----------------------
Attributes Natural Artificial
Intelligence Intelligence
----------------------
Ability to use sensors (eyes, ears, touch, smell) High Low
----------------------
Ability to be creative and imaginative High Low
Ability to learn from past experiences High Low ----------------------
Ability to be adaptive High Low ----------------------
Ability to afford the cost of acquiring intelligence High Low
----------------------
Ability to use a variety of information sources High High
Ability to acquire a large amount of external information High High ----------------------
Ability to make complex calculations Low High
----------------------
Ability to transfer information Low High
Ability to make a series of calculations, rapidly ----------------------
and accurately Low High
----------------------
----------------------
Modelling and
Heuristic Representation ----------------------
Search of Knowledge
Problem Solving
and Planning
Computer
Vision
----------------------
AI Language Common
and Tools Sense ----------------------
Reasoning
and Logic ----------------------
----------------------
----------------------
Fig. 6.6: The AI Onion Model
----------------------
Artificial Intelligence Applications
While the technology aspects of AI are almost in place by now, initial ----------------------
applications have clearly demonstrated that AI can provide great leverage for ----------------------
corporate organisations.
----------------------
Some of the illustrative AI applications are as follows:
1. Manufacturing/production planning and scheduling. ----------------------
2. Project management. ----------------------
3. Factory management.
4. Sales, distribution and field services. ----------------------
5. Diagnosis and trouble-shooting. ----------------------
6. Financial management.
----------------------
7. Currency/interest rates, SWAPs.
8. Portfolio management. ----------------------
9. Asset liability management. ----------------------
10. Reading/interpreting financials.
----------------------
11. Criminology.
12. Geology (drilling/oil exploration sites). ----------------------
Precautions ----------------------
Notwithstanding the advances in AI, it must be remembered that AI
----------------------
systems are not to replace human decision-making completely. They are meant
to replicate/emulate human decision-making for certain types of clearly and ----------------------
well-defined problems − the chess matches between Gary Kasporov (Natural
Intelligence) and Deep Junior (Artificial Intelligence) being a classic example ----------------------
of AI/ES.
----------------------
---------------------- Activity 6
----------------------
Who would perform an operation on a patient better, a doctor in flesh and
---------------------- blood or a robot with AI? Justify you answer.
---------------------- Summary
----------------------
●● Decision Support Systems (DSSs) are interactive information systems
---------------------- that rely on an integrated set of user-friendly hardware and software
tools to produce and present information that is targeted to support the
---------------------- management in the decision-making process.
---------------------- ●● DSS refers to a class of systems, which support in the process of decision-
making and does not always give a decision itself. These systems can be
---------------------- used to validate decision by performing sensitivity analysis on various
parameters of the problem.
----------------------
●● The DSS software system permits easy interaction between the users of
---------------------- the system and the DSS database and model base.
---------------------- ●● The Model Management component maintains and executes models of
business activity. Examples of such models are spreadsheets, financial
---------------------- models and simulation models.
----------------------
----------------------
---------------------- iii. – b.
iv. – c.
----------------------
Check your Progress 2
----------------------
Fill in the blanks.
---------------------- 1. In MIS, the focus is on structured tasks and routine decisions.
---------------------- 2. DSS establishes tools to be used for decision process.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
7
Structure:
7.1 Introduction
7.2 Systems
7.3 System Characteristics
7.4 Importance of Systems
7.5 Law of Requisite Variety
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
----------------------
Activity 1
----------------------
Give examples of any five different types of systems around you and specify
----------------------
their types.
----------------------
----------------------
----------------------
----------------------
System 1 System 2 System 3
----------------------
----------------------
Sub-System 1 Sub-System 2 Sub-System 3 ----------------------
----------------------
----------------------
Black Box Black Box Black Box
----------------------
Fig. 7.1 System Details
----------------------
System Facilitating Activities
After studying about the concepts of systems, let’s discuss about some of ----------------------
the system facilitating activities. They are: ----------------------
1. Factoring: A system is organised in a particular manner. The various
----------------------
elements or components have a distinctive role to play, which is assigned
to them. A system for the sake of operational efficiency is divided into ----------------------
subsystems.
----------------------
Each subsystem can then be further divided into lower level of subsystems
until we get a unit, which is considered easy to manage. This process is ----------------------
known as factoring.
----------------------
2. Boundary: A system is divided into subsystems. Each subsystem is
delineated by its boundaries. The environment remains outside the ----------------------
boundary.
----------------------
----------------------
Activity 2
----------------------
---------------------- Find out why should a system be divided into subsystems and on what basis
should this division be done.
----------------------
7.4 IMPORTANCE OF SYSTEMS
----------------------
Systems are put together, directly or indirectly, for the purpose of ensuring
----------------------
control and feedback. Hence, control and feedback are considered the key
---------------------- system concepts as they “pervade and permeate the whole idea of systems”.
What is Control?
----------------------
Control is one of the most important concept, element and process in
---------------------- management. However, in the olden days, control was considered necessary if
---------------------- something went wrong. Control was then also confused with lack of freedom
and “puppet-on-strings” syndrome.
---------------------- Today, it has been realised that control and freedom are fully consistent
---------------------- and interdependent. It has also been realised that the total absence of control is
not freedom but invitation for chaos or anarchy.
---------------------- Today, control is seen as a pro-active response to ensure that things
---------------------- move the way they are expected to. In fact, controlling is one of the four
major functions of management along with planning, organising, directing and
---------------------- leading. According to Koontz and O’Donnell, “Control implies measurement
of accomplishment against the standard and correction of deviation to assure
---------------------- attainment of objectives according to plans”.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
8. Compare goals achieved 2. Plan Programmes
---------------------- with goals desired
----------------------
----------------------
----------------------
----------------------
6. Perform Work 4. Determine required resources
----------------------
----------------------
----------------------
Fig. 7.3 Feedback as an Integral Part of a System
The feedback may be positive or negative. Feedback is useful for ----------------------
exercising control in an organisation by the management as illustrated in ----------------------
Figure 7.4.
----------------------
Desired Performance Actual Performance
----------------------
Implement Course Actual Performance ----------------------
Correcting Programme Measurement
----------------------
Programme for Actual Vs Standard ----------------------
Corrective Action Performance Compared
----------------------
Analyse Causes for Identify Deviation ----------------------
Deviation
----------------------
Fig. 7.4 Usefulness of Feedback ----------------------
Control Systems ----------------------
The control systems based on feedback could be categorised into three types as
follows: ----------------------
1. Closed loop system: Under this system, feedback is based on output ----------------------
measurement. Appropriate feedback is passed on to the input so that
suitable corrections could be made at the input stage itself. Control is ----------------------
internalised. Inventory control, cost control, quality control, Inspection ----------------------
can be said to be examples of closed loop system.
----------------------
2. Open loop system: Under the system, control is not internalised. Instead,
it is extended to the system and there is no feedback or feedback loop. ----------------------
Action to initiate control is also not taken automatically.
----------------------
---------------------- Activity 3
----------------------
S1 S2 S3 .....Sn Decision Rules C1 C2 C3 ...... Cn ----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 7.6 Self-organising Control Response
----------------------
Table 7.2 and figures 7.5 and 7.6 show LRV responses.
----------------------
Check your Progress 4
----------------------
Activity 4 ----------------------
----------------------
Discuss how control is an integral function of Systems Theory. Give
examples. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
8
Structure:
8.1 Introduction
8.2 Basic Concepts of System Development
8.3 System Development Process
8.4 Rapid System Development Tools
8.5 Object-Oriented Systems
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
---------------------- i. Acceptability
ii. Complexity
----------------------
iii. Flexibility
---------------------- iv. Reliability
v. Simplicity
----------------------
----------------------
Feasibility Assessment
----------------------
Information Requirement Analysis
----------------------
Conceptual Design ----------------------
----------------------
Physical System Design
----------------------
Physical Database Design
----------------------
Program Development ----------------------
----------------------
INSTALLATION & OPERATIONS
----------------------
Conversion ----------------------
----------------------
Post Audit
----------------------
Fig. 8.1 Systems Development Life Cycle Model by Davis and Olson ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Activity 1 ----------------------
----------------------
8.4 RAPID SYSTEM DEVELOPMENT TOOLS
----------------------
The System Development Life Cycle (SDLC) Approach or the Product
Life Cycle Approaches are relatively rigorous system development techniques. ----------------------
These techniques necessitate working out the problem identification, information
----------------------
requirements, etc. and hence, could be time-consuming.
However, the aforesaid traditional system development/design ----------------------
methodologies/techniques may not be useful in certain cases in view of the fact
----------------------
that:
●● The problem under investigation may not be always well defined. ----------------------
●● It may also not be possible to fully identify the input-output process. ----------------------
●● The system may be suitable or appropriate in the immediate short span
----------------------
----------------------
The user has already received the initial prototype, which he now puts to use. ----------------------
This working with the prototype enables the user to gain hands-on experience
----------------------
with the proposed system and helps him to determine to what extent the
prototype meets the user needs/expectations/requirements. The user, rather ----------------------
than the systems person, decides the desired changes for further improving the
prototype. ----------------------
Step 4: Revise and enhance prototype ----------------------
The systems person takes due notice of the changes/modifications suggested
----------------------
by the user and revises, enhances and refines the prototype accordingly. The
prototype is then returned to the user and the process follows steps 3 and 4 in ----------------------
an iterative mode, till the prototype is finally approved by the user and becomes
operational prototype. ----------------------
The four steps are iillustrated in Figure 8.3. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Make Use of the
---------------------- Prototype
----------------------
----------------------
Step 3 User Yes
---------------------- Satisfied
----------------------
---------------------- No
----------------------
---------------------- c. Rapid prototyping can gross over essential steps in systems development.
d. Rapidly developed prototypes may be difficult to maintain and support in
---------------------- a regular production environment.
---------------------- e. The performance may be rather inefficient.
---------------------- f. As the system can be changed easily, documentation may not be kept up-
to-date.
----------------------
g. User must be willing and committed to providing ongoing and meaningful
---------------------- feedback.
h. The interactive nature of prototyping demands that the size of the project
----------------------
team be kept as small as possible. As such, each member may not be
---------------------- familiar with all facets of the system.
----------------------
----------------------
System Database System
Analysis Design Design ----------------------
Tools Tools Tools
----------------------
----------------------
System
Strategic CASE Construction
Encyclopedia Tool CODE/ ----------------------
Planning FORM/REPORT
Tools Generations
----------------------
----------------------
Process System
Project
Support Management ----------------------
Management Tools
Tools
----------------------
----------------------
Fig. 8.4 CASE Encyclopedia
----------------------
Further in certain quarters, CASE Tools are also referred to as “Toolsets”
and as stated by James O’brein, the Toolsets could be: ----------------------
a. Planning toolset: It helps begin the development process with information ----------------------
strategy planning from a high level business vantage point.
b. Analysis toolset: It focuses on correctly capturing detailed business ----------------------
requirements early in the development process. ----------------------
c. Design toolset: It provides detailed specifications of the system solution.
----------------------
d. Information integrator: It integrates system specifications, checks them for
consistency and correctness and records in local or central repositories. ----------------------
e. Code generation toolset: It produces a higher language programme code ----------------------
based on system specifications.
----------------------
f. Database generation toolset: It generates system control information
needed for data storage and access. ----------------------
g. Public interface: It provides for file transfers and query reporting. ----------------------
----------------------
4. Data moving openly around the system from Function To Function ----------------------
5. Functions transforming data from one form to another ----------------------
6. Top-down approach in program design
----------------------
Object-Oriented Programming Approach
----------------------
As against this, the Object-Oriented Programming treats data as a critical
element in program development and does not allow it to flow freely around the ----------------------
system. It ties data more closely to the functions that operate on it.
----------------------
---------------------- 4. Functions that operate on the data of an object are tied together in the data
structure.
---------------------- 5. Data is hidden and cannot be accessed by external Functions.
---------------------- 6. Objects can communicate with each other through Functions.
---------------------- 7. New data and Functions can be easily added whenever necessary.
8. “Bottom-up” approach in programming design.
----------------------
The OOP Concepts
----------------------
Some of the concepts used extensively in OOP include:
---------------------- 1. Objects: Objects are the basic run-time entities in object-oriented system.
---------------------- Each object contains data and code to manipulate the data.
2. Classes: Classes are user-defined data types and behave like the built-in
----------------------
types of a programming language.
---------------------- 3. Data abstraction and encapsulation: While “Abstraction” refers to the
art of representing essential features without including the background
----------------------
details or explanations, “Encapsulation” refers to the wrapping of data
---------------------- and functions into a single unit called “Class”.
4. Inheritance: It is the process by which objects of one class acquire the
----------------------
properties of objects of another class.
---------------------- 5. Polymorphism: It refers to the ability to take more from one form.
---------------------- 6. Dynamic binding: It is associated with polymorphism and inheritance.
Dynamic binding means that the code associated with a given procedure
---------------------- call is not known until the time of the call at run-time.
---------------------- 7. Message passing: Message passing involves specifying the name of the
object, the name of the function (message) and the information to be sent.
----------------------
The OOSD Approach
----------------------
The OOSD Approach combines the logic of the Systems Development
---------------------- Life Cycle with the power of Object-Oriented Modeling and Programming.
OOSD also follows a defined SDLC, the life cycle phases usually being
---------------------- completed with a number of iterations.
---------------------- OOSD typically consists of the following steps/activities:
The OOSD has now become a preferred System Design and Implementation ----------------------
tool of both the developers as well as the users. OOSD is now preferred mainly
due the benefits it confers upon the developers and users. ----------------------
However, most developers use OOP languages for the structure and ease ----------------------
they provide. The OOP languages are generally classified into Object-Based
Programming Languages and Object-Oriented Programming Languages, ----------------------
depending upon the features supported by these languages. ----------------------
----------------------
----------------------
----------------------
----------------------
---------------------- From the managerial perspective, OOSD and OOP help expedite project
completion within a shorter time and lesser costs. OOSD and OOP have also
---------------------- been instrumental in enhancing/improving productivity, which by itself is good
enough for increased future applications.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
9
Structure:
9.1 Introduction
9.2 Database Management System
9.3 DBMS Components
9.4 Database Model
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
7. Data catalog management: Data catalog also called data dictionary ----------------------
is a system database that contains description of data in the database
(metadata). It contains information about data, relationships, constraints ----------------------
and the entire schema that organise these features into a unified database. ----------------------
The data catalog can be queried to get information about the structure of
the database. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Division A Division B Division C Division D ----------------------
----------------------
Region I Region II Region III
----------------------
Manager ----------------------
----------------------
Name Posted At Date of Join Performance ----------------------
----------------------
----------------------
Sales Person
----------------------
Fig.9.2 Network Database Model
----------------------
It would be observed that the data regarding the salesperson could be
made use of/for: ----------------------
i. Understanding/analysing “Sales Zone” performance.
----------------------
----------------------
●● Data language: The database provides two different types of languages: ----------------------
Data Definition Language (DDL) to specify the database schema and Data
Manipulation Language (DML) to express database queries and updates. ----------------------
●● Database models: They are used for keeping track of entities, attributes ----------------------
and relationships.
----------------------
Self-Assessment Questions
----------------------
1. What is DBMS? State its characteristics and advantages.
----------------------
2. What is DDL? Explain DDL.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
10
Structure:
10.1 Introduction
10.2 Data Warehousing
10.3 Data Warehouse Structure/Architecture
10.4 Data Mining
10.5 Applications of Data Mining
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
Subject-Driven ----------------------
A data warehouse is organised around major subjects and contains only ----------------------
the information necessary for the decision support processing. It is not organised
according to application (e.g., a data warehousing for bank would be organised ----------------------
by customer, deposit/advances, interest rate and not by different products).
----------------------
Non-Volatile
----------------------
A data warehouse is always a physically separate data store. The relative
data is transformed from the application data. As such, data warehousing does ----------------------
not require processing of transactions, recovery, etc. The data is not updated
or changed either after the data enters data warehouse. Data is only loaded, ----------------------
refreshed and accessed for queries. ----------------------
Time Varying
----------------------
Time-varying data in the data warehouse is collected from the corporate
data archives and could be 3 to 10 years old or even older. The data provide ----------------------
historical perspective and is used for comparisons, trends and forecasting.
----------------------
Integrated
----------------------
While constructing the data warehouse, multiple, heterogeneous sources
such as relational databases, flat files and OLTP files are utilised and data ----------------------
----------------------
10.3 DATA WAREHOUSE STRUCTURE/ARCHITECTURE
----------------------
We have, so far, discussed the definition of data warehouse. Before we
---------------------- proceed further, let us note:
---------------------- Data Warehouse Structure
---------------------- A typical data warehouse structure is illustrated in Figure 10.1.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 10.2 Data Structure in Data Warehouse
Flow of Data inside the Data Warehouse ----------------------
The flow of data inside the data warehouse is illustrated hereafter. Refer ----------------------
to Figure 10.3.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig.10.3 Flow of Data inside the Data Warehouse
----------------------
What does a Data Warehouse do?
----------------------
The major functions/utilities of data warehouse could be stated as follows:
---------------------- 1. It helps integrate data from a number of diverse, heterogeneous sources.
---------------------- 2. It consolidates such data and stores it in a step-by-step fashion. Such
data can then be used for Informative Analytical Processing over a long
---------------------- historical time period.
---------------------- 3. It allows the management, mostly at the senior level using the Decision
Support System (DSS) and the Executive Information System/Executive
---------------------- Support System (EIS/ESS) for semi/unstructured decisions, to consider
---------------------- issues in context, by providing a consistent view of the enterprise.
4. It helps create an enterprise-wide integrated database of summarised,
----------------------
historical information and supports business analysis and decision-
---------------------- making.
5. It improves the optimisation efforts through consolidation, conversion,
----------------------
transformation and integration of operational data.
---------------------- In addition to the utilities/functions stated above, there are some other
benefits of data warehousing. Such benefits are illustrated hereafter.
----------------------
Benefits of Data Warehousing
----------------------
(Adapted from H. J. Watson & B. J. Haley, Managerial Considerations,
---------------------- Communication of the ACM 41 (9) 1998.)
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Activity 1
----------------------
Data warehousing requires investing a lot of money. What is the basis on
---------------------- which an organisation decides to go for data warehousing?
----------------------
10.4 DATA MINING
----------------------
In the corporate world, a lot of data gets collected in the course of their
---------------------- daily operations. This data collected is normally stored/accumulated in a data
---------------------- warehouse and data mart for analysis. The analysis is conducted, using the
stored data, to help managers in the decision-making process. The analysis
---------------------- becomes more meaningful using data mining, as it enables managers to establish
relationships between business elements and find out aspects and facts about
---------------------- their business that may not be evident otherwise.
---------------------- Data mining, thus, is an information analysis tool that involves the
automated discovery of patterns and relationships in a data warehouse. Data
----------------------
mining is a new, but powerful concept that has started to gain popularity in the
---------------------- world of Business Intelligence.
Data mining aims at extracting patterns, trends and rules from data
----------------------
warehouse to evaluate either predicted or scour-proposed business strategies,
---------------------- which in turn, will improve competitiveness, improve profits and transform
business processes.
----------------------
The extraction of hidden predictive information from large databases is
---------------------- called data mining, which is a powerful new technology with great potential to
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 10.5 Cyclical functioning of Data Mining
---------------------- Technologies used in Data Mining
---------------------- 1. Neural networks: Provides non-linear predictive models. Neural networks
are used for modeling complex relationships between inputs and outputs
---------------------- or to find patterns in data.
----------------------
Check your Progress 3
----------------------
Fill in the blanks. ----------------------
1. The extraction of hidden predictive information from large databases ----------------------
is called ____________________.
Multiple Choice Multiple Response. ----------------------
----------------------
Check your Progress 4
----------------------
Check your Progress 4
----------------------
Multiple Choice Multiple Response.
----------------------
1. Which of the following are the trends affecting Data Mining?
i. Data trends ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
11
Structure:
11.1 Introduction
11.2 Why Break IT System Security
11.3 Information System Security Threats
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
i. Revenge ----------------------
ii. Money ----------------------
iii. A shot at/of notoriety ----------------------
iv. Validating Information
----------------------
v. The challenge of doing “IT”
----------------------
11.3 INFORMATION SYSTEM SECURITY THREATS ----------------------
There are two different types of threats/problems: ----------------------
1. External threat
----------------------
2. Internal threat
----------------------
With the prevalence of remote access, the World Wide Web, intranets
and extranets, the distinction/difference between the external threats and the ----------------------
internal threats is more often blurred and hazy. Thus, the difference is more
logical than a physical one. ----------------------
1. External security threats: The external threats would be those emanating ----------------------
from outside the organisation. To provide security against these threats,
the following issues need to be addressed: ----------------------
a. Internet connections: Normally, in every organisation, there are ----------------------
relatively few, identifiable Internet connections. It is, therefore,
relatively easy to focus upon them and exercise control. This ----------------------
connection should be protected by a “Firewall”. ----------------------
Firewalls are hardware and software combinations that guard the
border between the corporate Inter/Intranet (private access) and the ----------------------
Internet (public access) as illustrated in Figure 11.1. ----------------------
----------------------
----------------------
----------------------
---------------------- Firewalls can control who can surf the Web, download files, etc.
Firewalls can also hide the organisational network’s identity from the
---------------------- rest of the world on the Internet, as the corporate internal IP address is
never used. It should be remembered that if the organisation’s Internet
---------------------- connections are not protected by firewalls, it would be like going
---------------------- away on leave/vacation/holidays and leaving the door unlocked. It
would be an invitation for disaster as, while there may not be any
---------------------- visible indication that you are vulnerable, the first person who comes
knocking on the door is going to find out that the door is open and
---------------------- not locked, and he may not be exactly your best and trusted friend.
---------------------- b. Remote dial-in capabilities: While the Internet connections are
few and easy to watch/control, the threats from dial-in are real.
---------------------- There might be hundreds of dial-in threats, most of which might be
---------------------- unknown to the security administration. Any user in the organisation
with a phone line and a modem attached to his PC can be an exposed
---------------------- to external access.
---------------------- While controlling remote dial-in capabilities, the following aspects need
to be given due weightage/considerations:
----------------------
i. Remote access
---------------------- ii. Remote Access Servers (RAS)
---------------------- iii. Server ID
----------------------
Summary
----------------------
●● While one may never be able to eliminate altogether all the security
----------------------
hazards/risks, one can certainly be more aggressive about trying to
minimise IT/System security. ----------------------
●● Although absolute protection of the database from malicious access/abuse
----------------------
may not be possible, we can/should make the cost to the perpetrator high
enough to deter most, if not all, attempts to access the database without ----------------------
proper authority.
●● The best defense is a good offense, in IT/computers, a strong and vigilant ----------------------
defense is the only defense. ----------------------
Keywords ----------------------
----------------------
●● External security threats: The external threats are those emanating from
outside the organisation. ----------------------
●● Firewalls: Hardware and software combinations that guard the border
----------------------
between the corporate Inter/Intranet (private access) and the Internet
(public access). ----------------------
●● Viruses: Any type of programming code that intentionally causes a
system disruption, shut down or loss of data. ----------------------
----------------------
----------------------
Answers to Check your Progress
12
Structure:
12.1 Introduction
12.2 Need for Software Quality Assurance
12.3 Software Quality
12.4 Software Quality Assurance
12.5 Quality Assurance Standards or Models
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
----------------------
State True or False.
----------------------
1. Software Quality Assurance convinces the users or prospective clients
that the developer has a satisfactory Software Quality Assurance ----------------------
Program.
----------------------
12.3 SOFTWARE QUALITY ----------------------
Let us first discuss the two terms separately, before discussing Software ----------------------
Quality.
----------------------
Software
Generally, software is defined as a set of instructions. In the context of ----------------------
Software Quality Assurance, let us now view the software as “all instructions/ ----------------------
data put into a computer to cause it to function in any code”. It includes
“operating systems, supervisory systems, compilers and test routines as well as ----------------------
application programs. It also includes the documents used to define and describe
the program, including flow charts, network diagrams and program listings as ----------------------
well as specifications, test plans, test data, test results and user instructions”. ----------------------
Quality
----------------------
“Quality indicates the degree of excellence of a product or service.”
According to ISO 1986, quality means the totality of features and characteristics ----------------------
of a product or service that bear on its ability to satisfy stated or implied needs.
----------------------
As could be observed, the ISO definition clearly reflects the desire to define
quality in a way, which captures the current concept of quality as customer ----------------------
satisfaction in the broadest possible context.
----------------------
Now that we have noted the definitions of “Software” and “Quality”, let
us now move over to Software Quality. ----------------------
Software Quality ----------------------
Software quality is the inherent ability of software to be used for a ----------------------
specified purpose as the software possesses certain features and characteristics
and which enables it to be used for that purpose. ----------------------
---------------------- There are a set of quality criteria that help in determining the quality of
the software. If they are required and not present, they pose a risk to the success
---------------------- of the software. These are given below:
----------------------
Fill in the blanks.
1. ___________ indicates the degree of excellence of a product or ----------------------
service. ----------------------
Multiple Choice Multiple Response.
----------------------
1. Software quality is the ability of a software to be fit for its purpose
and capability to ensure: ----------------------
i. It is reliable. ----------------------
ii. It is not doing what it is supposed to do.
----------------------
iii. It is not performing according to its specifications.
iv. It is doing efficiently. ----------------------
v. It is working efficiently for the time for which it is predicted to ----------------------
work.
Match the following. ----------------------
----------------------
12.4 SOFTWARE QUALITY ASSURANCE ----------------------
Quality assurance is “a planned and systematic pattern of all actions ----------------------
necessary to provide adequate confidence that the item or project conforms to
established technical requirements”. ----------------------
Software Quality Assurance (SQA) is an umbrella activity that is applied ----------------------
through the software process. SQA is important as it reduces the amount of
rework that it must do, which results in lower costs and more importantly, ----------------------
improved time to market.
----------------------
Software quality assurance, accordingly, lays considerable stress on getting
the design right, prior to coding, although the increasing use of prototyping in ----------------------
systems development is reducing the differences between the production stages
----------------------
of hardware and software.
----------------------
Check your Progress 3
----------------------
Fill in the blanks.
----------------------
1. _________________________is an umbrella activity that is applied
through the software process. ----------------------
Multiple Choice Multiple Response. ----------------------
1. The Discipline Triangle consists of: ----------------------
i. Management Discipline
----------------------
ii. Team Development Discipline
----------------------
iii. Software Development Discipline
iv. Product Assurance Discipline ----------------------
----------------------
12.5 QUALITY ASSURANCE STANDARDS OR MODELS
----------------------
The formal Quality Assurance model would need to be woven around
the ISO 9000 Standard. The International Organisation for Standardization ----------------------
(ISO) developed the family of standards for software. The ISO 9000 framework
describes quality assurance elements, which includes organisational structure, ----------------------
----------------------
Multiple Choice Multiple Response.
1. Which of the following are the levels of Capability Maturity Model ----------------------
(CMM)? ----------------------
i. Initial
----------------------
ii. Repeatable
----------------------
iii. Refined
iv. Managed ----------------------
v. Optimising ----------------------
Fill in the blanks. ----------------------
1. Six Sigma process was developed by ____________________.
----------------------
----------------------
Activity 1
----------------------
With the help of NASSCOM list of IT companies, prepare a list of CMMI
----------------------
level 5 certified companies.
----------------------
Summary
----------------------
●● Software quality is the inherent ability of software to be used for a specified
purpose as the software possesses certain features and characteristics and ----------------------
which enable it to be used for that purpose. ----------------------
●● The software quality must satisfy the criteria consisting of Correctness,
Reliability, Efficiency, Integrity, Usability, Maintainability, Testability, ----------------------
Flexibility, Portability, Reusability, Interoperability. ----------------------
●● Quality assurance is “a planned and systematic pattern of all actions
necessary to provide adequate confidence that the item or project conforms ----------------------
---------------------- Keywords
----------------------
a. – ii. ----------------------
b. – iv. ----------------------
c. – i.
----------------------
d. – iii.
----------------------
Check your Progress 3
Fill in the blanks. ----------------------
1. Which of the following are the levels of Capability Maturity Model ----------------------
(CMM)?
----------------------
i. Initial
----------------------
ii. Repeatable
iv. Managed ----------------------
v. Optimising ----------------------
Fill in the blanks. ----------------------
1. Six Sigma process was developed by Motorola.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
13
Structure:
13.1 Introduction
13.2 Accounts Payable System
13.3 Production Management System
13.4 Marketing Service System
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
---------------------- 8. Debit/credit note payments/deductions are made as and when the need
arises.
---------------------- 9. Cheques are issued as per bank payment vouchers for the entire invoice,
---------------------- advance or debit/credit note payments.
10. Balances of the creditors and those of the control accounts, as per above
----------------------
transactions, are maintained through double entry bookkeeping.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 13.1 B-Context Level Diagram ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Fig. 13.1 C-First Level Data Flow Diagram
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
2. Journal Entry
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
4. Accounts Master ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
2. Vendor Balances
----------------------
XYZ Co. Ltd.
---------------------- BANK BALANCE REPORT
----------------------
Ven. Invoice Trans. Trans. IDS BP Vchr Prev. Type of Trans. Current
Code Code No. Date Clode No. Balance Balance Amount Balance
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Activity 1 ----------------------
----------------------
Prepare Context Level Diagram for Billing System.
----------------------
13.3 PRODUCTION MANAGEMENT SYSTEM ----------------------
---------------------- 5. Various reports such as production plan report, daily product report,
production plan achievement status, inspection report are prepared. These
---------------------- reports are also sent to the management whenever required.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
13.2 Context Level Diagram
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Check your Progress 1
----------------------
----------------------
----------------------
----------------------
3. It will receive enquiries for the supply of cable joining kits from different ----------------------
contractors who apply for the tender for implementation of package
----------------------
works.
4. It will generate offers against the enquiries received. ----------------------
5. The system will store a comparative statement of the enquiries received ----------------------
by the company’s competitors for the supply of cable jointing kits. The
branch offices will provide this information. ----------------------
6. The system will record the orders received by the company’s competitors ----------------------
on the basis of comparative statement entries previously recorded. The
branch office of the company will provide this information. ----------------------
7. It will match the enquiries received and the orders received by the ----------------------
company as well as competitors and close enquiries as well as packages.
The branch offices will provide competitor order details. ----------------------
8. The system will also record direct enquiries received from distributors ----------------------
or end-customers belonging to the utilities market segment for supply of
materials for maintenance purposes. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Master Transaction Reports
----------------------
→ Competitor → Projects → Detail Project Report
----------------------
→ Zone → Direct Enquiry → Summary Project Report
----------------------
→ Branch → Comparative Statement → List of Closed Proiects
---------------------- → Engineer → Order Updation → Detail Enquiry Report
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
13.3 B Context Level Diagram
----------------------
The numbers shown in the diagram represent:
----------------------
1. Competitor Details 12. Project Details
2. Category Details 13. Package Details ----------------------
3. Additional Customer Details 14. Order Kit Details ----------------------
4. Stage Details 15. Order Details ----------------------
5. Supplier Details 16. Kit Details
----------------------
6. Material Details 17. Customer Type Details
----------------------
7. Market Segment Details 18. Customer Details
8. Enquiry Reopen Details 19. Enquiry Details ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
The following are some output reports:
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Other Output Reports can be:
---------------------- 1. Detailed Project Report
---------------------- 2. Summary Project Report
---------------------- Activity 2
---------------------- Visit an organisation involved in sales and purchase of a product and study
their sales and purchase system. Based on your study, write the scope for
----------------------
that system.
----------------------
---------------------- Summary
---------------------- ●● In this unit, the scope of the system and design aspects such as Context
level diagram, data flow diagrams, functional decomposition diagram,
----------------------
input screens and report layouts for accounts payable system, production
---------------------- management system and marketing service system have been covered.
----------------------
----------------------
●● Dataflow Diagram: A graphical representation of the “flow” of data
through an information system, modeling its process aspects. A DFD is ----------------------
often used as a preliminary step to create an overview of the system,
which can later be elaborated. ----------------------
●● Functional Decomposition Diagram: The purpose of the functional ----------------------
decomposition diagram is to show on a single page the capabilities of an
organization that are relevant to the consideration of an architecture. ----------------------
----------------------
Self-Assessment Questions
----------------------
1. With the help of the Accounts Payable System, prepare a list of all the
files. ----------------------
2. Prepare the 1st level data flow diagram for Production Management ----------------------
system.
----------------------
3. Prepare 1st level data flow diagram for Marketing Service system.
----------------------
Answers to Check your Progress
----------------------
Check your Progress 1
----------------------
Multiple Choice Multiple Response.
----------------------
1. The Inspection Department inspects the processed batch and gives the
following details: ----------------------
i. Accepted quantity ----------------------
ii. Rework quantity
----------------------
iv. Rejected quantity
----------------------
v. Reason for rejection
----------------------
Suggested Reading ----------------------
1. Jawadekar, Waman. 2009. Management Information Systems: Text & ----------------------
Cases. New Delhi: Tata McGraw Hill.
----------------------
2. Laudon, Kenneth C., Jane P. Laudon and Rajanish Dass. 2010. Management
Information Systems: Managing the Digital Firm. New Delhi: Pearson ----------------------
Education.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
14
Structure:
14.1 Introduction
14.2 MIS Applications in Service Industry
14.2.1 Airlines
14.2.2 Hospitals
14.2.3 Banking
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
---------------------- l The name, address, contact numbers of all the medical staff
including doctors, nurses, and technicians, hospitals, locations and
268 Management Information Systems
work times on weekdays for contact. Notes
l Important service centres in the town where support services can
----------------------
be obtained in emergency. These are the laboratories, blood banks,
special clinics and special facility centres. ----------------------
3. Resource planning and control
----------------------
l An online query facility to answer the number of queries on the
availability, scheduling and rescheduling of the resources and the ----------------------
facilities.
----------------------
l For judging the usage of the facilities and to put them in proper use.
----------------------
4. Medical case history database
l Knowledge database on the case history for guidance and research. ----------------------
l Monitoring the effect of drugs to judge the efficacy in terms of the ----------------------
patient’s response.
----------------------
l Analyse the health care demand and make planning for health
service strategy. ----------------------
Back-office Applications ----------------------
1. Core applications ----------------------
l Manpower and personnel planning.
----------------------
l Payroll and employee related applications.
----------------------
l Hospital billing and recovery.
l An inventory control − procurement, planning and control. The ----------------------
expiry date management.
----------------------
l Financial accounting. Capital budgeting and expense control.
----------------------
l Maintenance of service facilities.
l Resource utilisation and analysis. ----------------------
l Stock-outs of the critical drugs and the time taken to restore supply. ----------------------
l The number of patients admitted, treated and cured. Length of the ----------------------
stay, cost and revenue to the hospital.
----------------------
l New trends in service demands and service performance in such
cases. ----------------------
l Analysis of the delays in terms of duration and causes.
----------------------
---------------------- The banks deal with a number of transactions, which also vary widely
in terms of length and complexity. The bank customer, like any other service
---------------------- industry, is interested in getting terminal results quickly. The distinctive service
in banking mostly means solving the customers’ problems in the financial
---------------------- matters, and the single most widely used measure of quick service is the elapsed
---------------------- time of transaction execution. For example, the time taken for crediting the
amount, withdrawal of cash, the sanction of a loan or credit facility, etc. are
---------------------- the norms of deciding a good service. The MIS in banking industry revolves
iii. Range of service − savings, credit checking and payment, other ----------------------
financial services.
----------------------
iv. Class of customers − income group, corporate bodies, etc.
----------------------
v. Working hours − morning, afternoon, evening, etc.
The management of the bank should create a customer database and ----------------------
analyse the needs of the customers from time to time to create suitable ----------------------
service package.
2. Service to the account holders ----------------------
The customers (account holders) need constant advice on the status and its ----------------------
operations. Most of the customers use their account for routine payments
affecting the balance. Many a times the account holds a large amount and ----------------------
it is not transacted for any purpose. ----------------------
The MIS should give following reports to the management:
----------------------
a. The non-moving account
----------------------
b. The account having balance of more than, say Rs.50,000.
c. The account going down below minimum balance. ----------------------
---------------------- The bank finances can be utilised in a number of ways to increase the
banking operations by offering credit to the right kind of customers. It is,
---------------------- therefore, necessary to study the trend in the business industry and solicit
the customers from the upcoming and growing business sector.
----------------------
The MIS should concentrate on data collection from various sources to
---------------------- analyse and conclude the future business strategy. Such information will
help the banker to move out to talk to the customer to obtain business for
---------------------- the bank. Such support will also reduce the risk of account going into the
---------------------- red and bad debt.
4. The index monitoring system
----------------------
One more feature of the MIS is to monitor the variety of indices and ratios
---------------------- related to banking operations, which are internal to the banking business.
Some of these ratios fulfill the statutory needs like the Cash Reserve Ratio
----------------------
(CRR)/ Statutory Liquidity Ratio (SLR); some meet the policy needs like
---------------------- the priority sector ratio to total advances and so on. It is necessary to build
the MIS applications to support the bank manager in making decisions to
---------------------- keep different norms and ratios within the acceptable limits. He should
also get support through Decision Support Service to handle the problem
----------------------
of not meeting these statutory standards.
---------------------- 5. Human resource upgrade
---------------------- There is a lot of human aspect in the banking operations. With
computerisation, the service may become faster or quicker but still it
---------------------- requires a human touch and skill. It is, therefore, necessary to upgrade the
---------------------- skills and knowledge of the bank employees to offer proper service to the
customers.
---------------------- The financial world changes so fast that retaining a customer base is a
---------------------- challenge. The financial service business is becoming competitive and
offering a good distinctive service is the only solution to improve the
---------------------- business prospects. The service has to be more aggressive for specific
problem solving of the customers. The MIS should identify such needs
---------------------- and offer help to the management in designing training courses for the
---------------------- employees to improve their knowledge about banking and the financial
world.
272 Management Information Systems
In the banking industry, the traditional methods of good performance Notes
are at odds with good service. A good financial performance may not
necessarily mean a good service quality. ----------------------
The customers of the bank expect the service to be delivered in a smooth, ----------------------
problem-free, efficient and timely manner. The managers in the bank
have the service as well as the financial goals to achieve. It is, therefore, ----------------------
necessary to set the internal standards, accuracy, responsiveness and
----------------------
timeliness. The systems and the resources provided to achieve these
standards need monitoring and the MIS will provide a feedback on these ----------------------
standards so they can be regulated and controlled.
----------------------
For example, a multinational bank has set standards on satisfying the
queries in the first phone call, cheque clearance time, waiting time, etc. It ----------------------
has set eighty-one separate ‘Quality Indicators’ for the Bank Card business
and so on. The MIS measures these standards and gives a feedback on ----------------------
achievement or non-achievement.
----------------------
----------------------
Fill in the blanks.
1. Creating a distinctive ____________ is a willful, conscious and ----------------------
deliberate management endeavour. ----------------------
State True or False.
----------------------
1. A product and service both are tangible.
----------------------
----------------------
Activity 1
----------------------
1. Visit a call centre and prepare a report on the service they provide. ----------------------
2. Prepare managerial and operational service goals for the hotel industry.
----------------------
----------------------
Summary
----------------------
●● The MIS in the service industry should focus on the evaluation of service
needs of the people. The needs should be continuously monitored/ ----------------------
scrutinised to ascertain the change in the service demand in terms of
scope and level. Unless this is monitored, it will not be possible to revise ----------------------
the service strategy. The perception of good service also needs frequent ----------------------
scrutiny, and the strategy should then include the processes, which will
take care of the customer perception of good service. Many a times the ----------------------
perceptions are not directly related to satisfaction of basic service need,
but they are related to the peripheral processes which makes servicing ----------------------
process a comfortable experience. ----------------------
---------------------- Keywords
---------------------- ●● Service: The service function essentially is a human interaction between
---------------------- the service receiver and the provider.
●● Service and product: A product is tangible, but a service is not.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
System Software: A set of generalised programs that manage the resources of the ----------------------
computers, such as the central processor, communication links and peripheral
----------------------
devices.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
Glossary 277
Notes
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------