Mis Part 1
Mis Part 1
1.1 INTRODUCTION
Today we have an unquenchable thirst for information. The society hac; changed significantly
from the Barbarian to the Agrarian Society, from Agrarian to the Industrial Society and
from the Industrial Society to a Society dominated by the Service Sector.
This structural transformation has brought about discernible changes in the way people
think. We are all living, not in an Agrarian or Industrial Society but in an Information
Society. In fact, we generally refer to the present times as the IT Age or Information Era.
Cndemeath this is a tacit acceptance of the fact that not since the advent of the automobile
and the introduction ofthe telephone has, an invention had such wide-spread impact on
our society as the computer, which has ushered in the Infmmation Era.
l f personal/individual life has had so much impact due to information, it has had profound
impact on Business Organi?ations.
We are living in an era characterized by Globalization and Liberalization. Far reaching
changes across borders arc sweeping nations and we are all getting engulfed in a boundary-
less "Global Village". But this emerging scene also necessitates people to develop the
ability of"Thinking Globally and Acting Locally", which is now also being referred to as
"Glocalisation". Business operations have become, and are going to become, more and
more complex, and competitive.
The increased complexities could be broadly categmized into Business Complexities and
Management Complexities.
The increased Business Complexities could be attributed to :
I. Technological Revolution
2. Research and Development
3. Changes in Product/Product Life Cycle
4. Explosion oflnformation
2
Unit I Management Information Systems
Hence, information is today seen, indeed accepted and recogni:~.cd, as an invaluable source
to ensure effective and efficient decision-making thereby ensuring optimality of results
leading to survival and prosperity ofthe Business Organization.
Information is a Resource because:
• It is scarce
• It has a cost
• It has alternative uses
• There is an opportunity cost factor involved if one does not process information
It must, however, be remembered that unlike other resources, which can be used only
once, information could be used again and again. It is also not tangible. A decision maker
must keep these aspects in mind.
Many a times, we really do not have the information we want and then there is a dilemma.
The dilemma is beautifully expressed in the following words, generally referred to as Fingale's
Law oflnformation :
"The information we have,
Is not what we want,
The information we want
Is not the information we need,
The information we need,
Is not available".
Hence, it is said that,
"Don't give the manager,
What he said he wanted.
But what he meant".
3
Management Information Systems
Thus, because information is so critical, crucial and pivotal tor managers and organi7.ations,
there has emerged the MIS- The Yranagement Information System-to facilitate effective
and efficient decision-making.
One important aspect ofthe difference between MIS and routine data processing is the
capability to provide analysis, planning, and decision making support. An MIS orientation
means users have access to decision models and methods for querying the database on an
ad hoc basis; the database is also, an essential part of routine transaction processing and
reporting. In MIS information is utilized so as to improve decision making and achieve
improved organizational effectiveness.
decision-making through processing and using various components ofthe information system
viz. Hardware, Software, Database, Procedures and Personnel.
A formal system should be able to take care of the following points:-
Handling ofa voluminous data
• Confirmation of the validity ofdata and transaction.
• Complex processing of data and multidimensional analysis
• Quick search and retrieval;
• Mass storage
• Communication ofthe information system to the user on time
• Fulfilling the changing needs ofthe information
The management information system uses computers and communication technology to
deal with the above mentioned points of supreme importance.
J6 Activity A :
Explain with example the meaning of "Don't give the manager, What he said he wanted,
but what he meant".
5
Management Information Systems
·C] 1
-r
1 -. Judgement/ SkiW External
l__!>~mg Logic Intuition Experience Environment ..
_ _____. I -- ~ DeciSion
nata .. comput~rs J trntellige~ce] •I nesi~ ---.[choi~ 1h
Data [HumanBem~
,---- ----
_- __ Infor-
.. .
Dcctsion Making
j
L Monitoring / Fcedba~
Thus, in our discussions we will always consider MIS, which is based on making use of
computers for processing and providing information.
6
Unit I Management Infonnation Systems
organizational functioning, performance and productivity. The impact ofMIS on the function
is in its management. With a good MIS support, the management of marketing, finance
production and personnel became more sufficient. The tracking and monitoring of the
functional targets becomes easy. The functional mangers are informed about the progress,
achievements and shortfalls in the activity & targets. The mangers I is kept alter by providing
certain information indicating the probable trends in the various aspects ofbusincss. This
helps in forecasting and long term perspective planning. The managers attention is brought
to a situation which is exception in nature, inducing him to take action or a decision in the
matter. A disciplined information reporting system creates a structured database and a
knowledge base for all the people in the organization. The information is available in such
a form that it can be used straight away or by blending and analysis, saving the manager's
valuable time.
MIS creates another impact in the organiz.ation by making it convenient to understand the
business better. MIS begins with the definition ofa data, entity and attributes respectively,
designed for information generation in the organization. Since all information systems usc
the dictionary, there is a coming understanding ofterms and terminology in the organi7.ation
bringing clarity in communication and also a similar understating of an event in the
organization. MIS calls for systematization of the business operations for an effective
system design. This leads to streamlining ofthe operations, which complicate the system
design. It improves the administration ofthe business by bringing a discipline in its operations,
as everybody is required to follow and use systems and procedure. The process brings a
high degree ofprofessionalism in the business objects. Since the goals and objectives of
MIS are the product ofbusiness goals and objectives, it helps indirectly to pull the entire
organization in one direction towards the corporate goals and objectives by providing the
relevant information to the people ofthe organization.
A well designed system with a focus on the managers makes an impact on managerial
efficiency. The use ofcomputes help managers to use the tools and techniques, which arc
impossible to usc to use manually. The ready-made packages make this task simpler.
The impact is on the managerial ability to perform. It also improves the decision-making
ability considerably.
Let us also keep in mind that, while, originally, MIS was envisioned as a single, highly
integrated system, bringing together data processing for all organizational functions, MIS
is now viewed as a Federation of Subsystems, developed/implemented as needed but
conforming to an overall plan. To illustrate, each organization will consist of sub-systems
7
Management Information Systems
like Production, Inventory, Finance, Marketing etc. There could be Functional sub-systems
as well as Activities sub-systems as illustrated. Refer to Table 1.1 & Table 1.2.
Table 1.1 Functional Sub-systems
r e~-- -~ales forccasting,-
sa-les-plann-in-g, customer_an_d_sa_le1_s_an_a_ly-si-s.-1
__j~ction pl.;,ning and scb;;;hiling, cost co;;;;;;}an~]
- ufucturing
Logistics
Personnel
j' Planning and control ofpurchasing, inventories, distribution.
Planning personnel requirements, analyzing perfmmance,
I
salary administration.
-------- - - - - - --1
Finance&Accounting i Financial analysis, cost analysis, capital requirements
planning, income measurement.
1 - - - - -- -- - -- --1---- - - - - - - - - - - - - - - - - - - - - - - ;
Information Processing Information system planning, cost-effective analysis.
- -
· ------+----- - - ---- ------- -- - -
Top Management Strategic planning, resource allocation.
- - - - - - - - - - ---- - - - -
Table 1.2 Activities Sub-System
Each ofthese sub-systems will have a certain degree of autonomy or independence in its
functioning. But no sub-system can function as an island by itself, to the detriment ofother
functional sub-systems. Each sub-system must operate within the overall corporate goaV
plan. Thus, because these sub-systems, although enjoying autonomy, arc loosely connected
and arc interdependent, MJS is viewed as a Federation of Sub-systems as illustrated.
Refer to Fig. 1.2.
8
Cnit I Management Infonnation Systems
§co
..§
00
.§
..... ~
'i)
c
~~ ·.o.S
8§
C\lg §~
0 ·.p c p
Activities ~ co
-
@
~
e
0..
~ Vl
"50
3
0
~
c.. £<
tEo
c""
..... c...
~
p::
n r--
I' - -1 - r--
Strategic Planning L I
f-- -
L l
Management Control
I .
-t-~
Operational Control
Transaction Processing
I
I I I I r
rL [!lata Base Management System
Data Base
J
·-
Fig. 1.2 : MIS as a Federation of Sub-systems
This feature has also facilitated the modularity and development of computer based
information system on a modular pattern, permitting autonomy but ensuring interdependence
and wholistic perception.
MIS as seen by the user
The major users ofa computer based information system are shown in Table 1.3.
Table 1.3 MIS as seen by the user
U
-
.-I se
-r------~,.Uses - - - - - - - - - - - .- - -- ----.
Clerical Personnel Handle transactions, process input data and answer inquiries.
First Level Managers Obtain operations data. Assistance with planning, scheduling,
identifY out-of-control situations, and making decisions.
--j
9
Management Information Systems
MIS is also viewed as a multi-disciplinary activity/subject. MIS draws heavily upon various
disciplines like Management Accounting, Management Scicnceffhcory. Organizational
Bchaviour!Theory, Operations Research, Computer Science etc. as illustrated. Refer to
Fig. 1.3.
Computer
Science
Operations Behavioural
Research Sciences
10
-_,_ _ -
__ - --
Unit 1 Management Information Systems
As stated earlier, ~S is today based on computers. It is then no wonder that MIS makes
extensive usc ofcomputer science and technology for data storage, processing, manipulation,
retrieval etc. due to the speed, processing capability and memory size ofthe computers.
As MIS cannot be developed without making use of the various theories, principles,
formulae, MIS is viewed as a multidisciplinary subject.
MIS is also considered to be an evolving subject. MIS has come to play a much larger
role in the organizational life, as compared to the 1950s. While, initially, MIS brought
about more technical changes, MIS has since moved into managerial control and further
into int1uencing the 'core' institutional activities, as shown in Fig. 1.4.
~l MIS - ~
I
I
Technical M-magerial Institutional
Changes Control Core
'
Activities
r-----~------~--~------~--~------~ ~
~ 1950s 1960s
l
1970s 1980s 1990s
Fig. 1.4 : Changing MIS Focus
Further, though initially, MIS started with Electronic Data Processing, it has since moved
to Management Science/Information Systems, Decision Support Systems, Executive
Information Systems, Knowledge Based Experts Systems, Artificial Intelligence etc. as
could be seen from the Fig. 1.5 .
11
Management Information Systems
:.
12
Gnit I Management Information Systems
Consequently, the users and the characteristics ofMIS have also undergone changes over
the years as can be seen from the Table 1.4.
Table 1.4 Changes in MIS
Type of Information Processing Information Users
System Inputs Outputs
ESS/EIS 1 Aggregate da ta,extemal. Graphics; simulations, Projections; Senior Managers I
internal interactive response toqueries
~ Low-volume data:
-
Interactive: simulations. Special reports; Professionals:
analytic modcis analysis decision analysis; Stan· Managers
responses to queries
MIS ' Summary Transaction Routine reports; simple Summary Middle Managers
1
J data:high vol ume data: models, low level andexception
simple mode Is analysis reports
KWS-~ Design speci fications: Modeling, simulations :vt:odels, Graphics Professionals.
Knowlcdgebase technical staff
1-----..L- '
OAS Documents, schedules Document management; Document; Clerical workers
scheduling; schedules;mail
communication
-
fPS Transactions ; events Sorting; listing; merging; Detailed reports: Operations
updating lists; summaries personnel;
i Supervisors
--
_,g Acti.Yity B:
How would implementation ofMTS facilitate the working ofany organb11tion?
13
L
Management Information Systems
14
Unit I Management Information Systems
As Information System has to address and take cognizance ofbehavioral problems and
issues (system utilization and system implementation to mention a few), it is imperative that
behavioral factors arc taken into consideration.
The Behavioral Approach, therefore, borrows heavily from the principles ofPolitical Science,
Psychology, Sociology and Organizational Behavior, among others. This approach,
according to Kling and Dutton, focuses not on technical solutions but on the changes in
attitudes, management and organizational policy.
3. The Socio-TechnicalApproach
It is now reali:t.ed that the problems faced while developing and implementing Information
Systems arc neither purely technical nor behavioral. It, therefore, becomes important to
understand the perspectives ofbotb technical as well as behavioral disciplines. Perspectives
from other disciplines would also be immensely helpful/useful.
The Socio-Technical Approach does not opt for purely technical/technological or behavioral
approach, but it docs attempt to borrow heavily from both the approaches and synthesize
so as to optimize the performance ofthc Information System as a whole.
This approach is now being increac;;ingly accepted and implemented.
15
Management Information Systems
This peculiar dilemma leads to a series of actions and reactions, initiatives and responses
among the firms competing within a particular industry/sector. The dilemma also further
leads to competitive inter-action which often shapes the competitive position of firms,
undertaking the corporate strategies.
This process, in its tum, gives rise to the phenomenon known as "Competitive Dynamics".
Because of competitive dynamics, the effectiveness of any corporate strategy ("what an
organization is today and what it OUGHT to be tomorrow") is determined not only by the
initial move, but also by how well the firm anticipates and addresses the moves and
countc1moves ofcompetitors and the shills occurring in customer demands over a period
oftime. The competitive dynamics also has to take into consideration the fact that while,
earlier, the competitor's Research & Development efforts and Product Decisions could be
known in a few month's time and then acted upon, in today's highly globalised and
information-based economy, any idea that works can sometimes be imitated in a matter of
a few days, if not hours !
In this connection, it would be interesting to note that, as reported, many firms competing
in the electronics industry often DO NOT APPLYFORPATENTS to prevent competitors
from gaining access to the technological knowledge included in the Patent Application !
It is in this overall context that INFORMATION has emerged as a STRATEGIC
RESOURCE - resource that is scarce, has significant cost and has alternative uses -
bestowing competitive edge on the organization which possesses it. lienee, in the present
competitive environment information/knowledge has become a critical organizational
resource and is increasingly considered/accepted as a valuable strategic resource or as an
invaluable asset for competitive advantage.
The probability ofachieving strategic competitiveness in the present competitive environment
could be enhanced for the organization that realizes that its survival, success and prosperity
depends on the ability to capture information, transform it into usable knowledge and
disseminate it rapidly throughout the organization. Organizations that accept this challenge,
shift their focus from merely OBTAINING the information to EXPLOITI}IG the
information, to gain a strategic competitive advantage over competing I rival firms.
Access to and availability of information yields strategic opportunities and results in an
unbelievably large array of strategic implications and possibilities. To be able to grab and
retain the strategic competitive edge, it is imperative for the organizations to be able to
raise and answer questions like -
1. What business the organization should be in?
2. What existing busim,"Ss activities should be spun off?
16
Unit I Management Information Systems
(c) I low will this change the organization's relationship with its competitors?
All these questions could be answered by undertaking "Competitor Analysis" or resorting
to "Competitive Intelligence" or "Business Intelligence".
It has to be noted that critical to "Business Intelligence" or "Competitive Intelligence" or
"Competitor Analysis" is the gathering of Data and Information. Data and Information can
help the fmn understand competitors' intentions and strategic implications resulting from
them.
The Data/Information should cover not only the competitors but also the public policies
from countries across the world. Such data/information not only enables the recipient of
such information to better understand and better anticipate competitors' objectives,
strategies, assumptions and capabilities, but also provides an early warning ofthreats and
opportunities emerging from the global public policy environment, and analyze how it will
affect the achievement ofthe company's strategy.
The information, collected through bu.c;iness/compctitive intelligence or competitor analysis,
enables the organization to gain insights it requires to help create a competitive advantage
and to increase the quality of strategic decisions it makes when choosing how to compete
against its major/emerging competitors/rivals.
To conclude, in the ultimate analysis, out there on/in the "competitive battlefield", it is going
to be the survival ofthe fittest.
To survive, succeed and prosper in this fiercely competitive environment, the corporate
17
:'vlanagement lnfonnation Systems
Dramatic changes have occurred in Information Technology over the last few years. These
changes, in turn, have ushered in an Information Revolution which is sweeping the corporate
organizations world-wide.
The corporate business environment has, resultantly, become intensely competitive,
increasingly globalised and highly information-based. In such a highly competitive
environment, it is imperative for an organization to strive to seek and seize competitive
advantage to emerge winner. Ability to access and usc information effectively has been an
important source of competitive advantage for a number ofcorporate organizations.
What is Competitive Advantage?
"Competitive advantage is about changing the balance of power between a frrm and its
competitors in the industry, in the firm's favor".
Alternatively, "Competitive Advantage could be usually embodied in either a product or a
service that has the most added value to customers and that is unavailable from the
competition".
18
Unit 1 Management lnfom1ation Sysh:rns
Competitive advantage could also be seen "as an internal system that delivers benefits to a
firm, not enjoyed by its competition".
What is the Role of Information in Competitive Environment?
2. It spawns whole new business, often from within the company's existing operations.
19
:'v!anagement Information Systems
20
Unit 1 Management Infom1ation Systems
21
Management lnfonnation Systems
1.11 SUMMARY
--- ------ - -·-- - - - -
An MIS orientation means users have access to decision models and methods for querying
the database on an ad hoc basis; the database is also, an essential part ofroutine transaction
processing and reporting. In MIS information is utilized so as to improve decision making
and achieve improved organizational effectiveness. MIS is the system, which makes
available the right information to the right person, at the right place, at the right time, in the
right form and at the right cost. MIS has become necessary due to the increased Business
and Management Complexities. These complexities demand not only quantitative but
qualitative decision-making. And all managers, as we know, have to take decisions under
conditions of Risk, Certainty or Uncertainty. A good manager/decision-maker is one who
minimizes, ifnot eliminates altogether, the clements ofrisk and uncertainty in decision-
making. MIS is helpful in doing precisely this.
22
Unit l Management Information Systems
Each sub-system has a certain degree ofautonomy or independence in its functioning. But
no sub-system can function as an island by itself, to the detriment of other functional sub-
systems. Each sub-system must operate within the overall corporate
goal/plan. Thus, because these sub-systems, although enjoying autonomy, are loosely
Information is a strategic resource - it is scarce, has significant cost and has alternative
uses - bestowing competitive edge on the organization which possesses it.
1. State the difference between typical data processing and management information
system.
2. Business complexities lead to development ofMIS. Do you agree with this statement?
JustifY your answers.
8. How docs MIS Confer Competitive advantage? Illustrate with real life corporate
examples.
23
Management Information Systems
2.1 INTRODUCTION
The term Information Technology brings up different images for different people. While
for some it is the Super-Computer, for others, it means Lap Top or Palm-Top. While for
some it means the electronic gadgetry, for others, it means the efficiency in communication
channels.
Information Technology is the term used to describe technologies which enable the users
to record, store, process, retrieve, transmit and receive infmmation. Infom1ation Technology
encompasses modem technologies such as computers, facsimile transmission, micro-
graphics, telecommunications and micro-electronics.
Today, we are all aware that Information Technology has provided new ways ofrecording,
storing, processing, retrieving, transmitting and receiving information enabling us - the
users -to build more effective and more efficient information systems.
IT has changed the way bu..c;incss organizations function and carry out their activities. People
like Bill Gates today talk and write about "Business@ Speed ofThought" and information.
Most of us today routinely talk about and some of us actually deal in, c- Business, e-
Commerce etc. As stated by Davenport and Short, IT has tremendous and varied
capabilities. It has transactional, geographical, automational, analytical, informational,
sequential, knowledge management, tracking and dis-intermediation capabilities.
The IT capabilities and their organizational impacts arc briefly illustrated hereafter :
26
Unit 2 lnfom1ation Technology
Geographical IT can transform information with rapidity and ease across large
distance, making process independent of geography.
f i-- -- - --
Automational IT can replace or reduce human labor in a process.
These capabilities, however, can be exploited/made use of, if and only if, the business
organizations/managers understand and implement Information Technology. Computer and
I. Telecommunications provide the two main pillars oflnformation Technology.
i
2.3 UNDERSTANDL~G A COMPUTER
.,
According to the Information Technology Act, 2002, "Computer means any electronic,
magnetic, optical or other high speed data processing device or system which performs
logical, arithmetical and memory functions by manipulation ofelectronic, magnetic or optical
impulses, and includes all inputs, output, processing, storage, computer software or
communication facilities which are connected or related to the computer in a computer
system or computer network".
27
Management Information Systems
• Software :-Instructions that tell the hardware , what and how and to perfonn
• Data/Information:- Data is facts collected and given as input to the computer and
information is processed data i.e data is processed into useful information
Characteristics of a computer
1. Automatic : Computers are automatic machines because once started on a job, they
carry on, until the job is finished , normally without any human assistance.
3. Accuracy : The accuracy ofa computer is consistently high. Every calculation is done
with same accuracy. If errors do occur they arc mainly due to fault in instructions
given to the computer or Hmlty data. Computer follows the rule of GIGO (garbage in,
garbage out)
4. Diligence : Diligence is the ability ofa computer to perform repetitive tasks with the
same accuracy consistently with tiredness. i.c.lt is free from monotony, tiredness and
lack of concentration.
5. Versatility :A computer can perform a variety oftasks ranging from very simple to
very complex.
6. Reliability: Computers consistently produced accurate results and hence are very
reliable. All information stored in a computer remains there till the users want it to be
there, even if recalled after years the information remains intact and accurate. No
detonation of data stored/information.
7. Storage : Computers can store large amount of data which can be accessed as and
when required and at a high speed.
28
Unit 2 Information Technology
: Input
I' T'""' 'f"'' Output- ]
[ii{mary Storage
Arithmetic & I
Logical Unit 1 I
Central Processing Unit (CPU)
., 3. Output Devices
4. Storage Devices - Primary and Secondary
5. Physical media to link various communication devices.
The CPU consistc; ofthe Arithmetic/Logic Unit and the Control Unit. It is at the CPU
that the manipulation of symbols, numbers and letters takes place. The CPUalso
controls the other parts ofthe computer system. It is like the human brain.
The Arithmetic Logic Unit (ALU): The ALU in the CPU performs both arithmetic
and logical operations. On the arithmetic side, theALU adds, subtracts, multiplies
and divides, determining whether a number is positive, negative or zero. On the logical
side, it distinguishes between letters as well as numbers logically, and also determines
whether a given quantity is greater than or less than or equal to another quantity. The
type and number of arithmetic and logical operations, which a computer can perform,
29
Management Information Systems
The Control Unit (CU) :The CU selects and interprets programs instructions and
then checks their execution. It has some special purpose registers and a decoder to
perform these activities. The special purpose ref,risters help the control unit in instruction
selection, namely the instruction register and the program control register, which hold
the ctm·ent instruction and the next instruction to be executed respectively. The
decoder has the necessary circuitry to decode and interpret the meaning of ever
instruction supported by the CPU. Each instruction is accompanied by microcode
(very basic direction, which tells the CPU how to execute the instruction.
Inspite ofthe fact that control unit does not performing any actual processing ofthe
data it still acts as a central nervous system for the other components of the computer
by managing and coordinating the entire computer system including the input and
output units. The control unit receives instructions from the program stored in the
main memory, it interprets the instructions and issues signals which cause other units
ofthe system to execute them.
2. Input Unit
Data and instructions must be entered into the computer system, before any
computation can be performed. This task is performed by the inputunit, which links
the external environment with the computer system. Data and instructions enter input
units in various forms, which depend upon the particular input device used. Regardless
ofthe form in which input is received, all input devices must transform the input data
into binary codes, which the primary memory of a computer is designed to accept.
This transformation is accomplished by units called input interfi1ccs. The functions
performed by an input unit are:-
• It supplies the converted instructions and data to the computer system for further
proccssmg.
30
Cnit 2 Information Technology
3. OutputUnit
As the name suggests it is absolutely reverse ofthe input unit. It supplies the
information obtained from data processing to the user. Since a computer works with
binary code, the results produced are also in the binary form, hence before supplying
the results to the user, it must be converted to human acceptable/readable form. This
task is accomplished by units called as output interfaces. Output interface-S are designed
to match the unique physical or electrical characteristics of output devices. The
functions performed by the output unit are :-
• It accepts the results produced by the computer, which are in coded form.
• It converts these coded results to human acceptable/readable fom1.
• It supplies the converted results to the user.
4. Storage Device
31
Management Information Systems
CPU II
'
Arithmetic Primary
Logic Unit
- - Storage
- Contro!Unit I
DATA BUS
ADDRESS BUS
CONTROL BUS
..
-----=---t- -
INPUT DEVICES OUTPUTDEVIC~ SECONDARY
• Keyboard • Printers I STORAGE
• Video Display • Magnetic Tape
• Computer Mousej
• Touch Screen Unit I Monitor • Magnetic Disk
• Source Data • Plotters • Magnetic Drum
Automation • Audio Output 1 • Optical Disk
L-------------~
a) List down the configuration ofyour computer along with operating system and
other software's installed on your machine.
32
Unit 2 Infom1ation Technology
2.4 GENERATJONSOFCOMPUTER
The first generation ofcomputer refers to those computers which relied on and used
vacuum tubes for storing and processing data.
The computers were very big in size, could be located in a large room and had limited
memory and processing capability - The ENIAC, for example, had only 20 storage
registers and could accomplish 5000 additions per second.
The vacuum tubes generated lot of heat, consumed great deal of power and bad a
very short span oflife. Resultantly, the MTBF (Mean Time Between Failure) was
low -of the order of an hour.
The computers were used by technical people mainly for scientific and engineering
work. The maximum main memory size was reported to be around 2KB (2024
Bytes) and the speed of about 10,000 Instructions Per Second. Computer
programming was mainly carried out in Machine Language and later in Assembly
Language.
The second generation computer appeared on the scene around 1955-56. The
computer used transistors made ofgermanium semi-conductors material, instead of
the vacuum tubes, for storing and processing data.
Transistors were more compact in size and more reliable. Transistors consumed less
power and consequently the MTBF (Mean Time Between Failure) became longer.
It is said that the transistors were about ten times more reliable, ten times faster,
consumed one tenth ofpower, occupied about one tenth ofspace and were ten times
33
Management lnfonnation Systems
cheaper than the first generation computers. The memory size and processing speed/
capability also went up simultaneously.
A typical second generation computer could have upto 32 KB of RAM and speed
upto 2,00,000 to 3,00,000 instructions per seconds. The years 1956-63 also
witnessed the emergence ofmagnetic core memory and development of High Level
Language like ALGOL, COBOL, FORTRAN and SNOBOL.
Resultantly, computers became more widely accepted and used. Computers which
were earlier used for technical/scientific work, were now accepted by the industry
and business. During this period, the business and applications of computers were
mainly in the areas of Pay Roll, Inventory, Production Planning, Marketing and
Accounting.
The third generation ofcomputers emerged with the introduction ofa newer technology
-the Integrated Circuits/Chips. The third generation ofcomputers witnessed transistors
being replaced by silicon chips-- more popularly known as the Integrated Circuits/
Chips.
The ICs were circuits consisting oftransistors, resistors and capacitors grown on a
single chip ofsilicon. The Integrated Circuits/Chips were made by printing hundreds,
and later thousands, oftiny transistors on small silicon chips, called Semi-conductors.
The cumulative effect was the emergence of extremely compact, yet powerful,
computers. Computer memories expanded to 2 MBs of RAM and processing
speed of CPU went up to 5 Million Instructions Per Second (MIPS).
There were further improvements in High Level Languages. It was during this period
I generation that it became possible for people without extensive technical training to
make use of computers, making it possible for computers to enlarge their role in
34
Unit 2 Information Technology
business, thanks to newly developed systems like dynamic production control systems,
airlines reservation systems, interactive query systems etc.
The computers which we handle today belong to fourth generation which extends
from 1980 to the present. The fourth generation computers are characterized by the
usc ofvery large scale integrated circuits (VLSICs) which are packed with as many
as 2,00,000 to over 3 million circuits per chip.
Ac. a result, the power of a computer that once took up a large room, could now
reside on a small desk-top/tower-top/lap-top and even palm-top.
The VLSIC technology has fuelled a growing movement towards micro- processors
and micro-miniaturization- the proliferation of computers that arc so small, fast and
cheap that they have become ubiquitous.
5. Fifth Generation
Fifth Generation computers are expected to use parallel processing and massively
parallel processing. They will be using artificial intelligence and intricate mathematical
models. They will be able to blend voice, images and massive data from various
sources.
35
:vtanagcment lnfomu1tion Systems
Comparative Features
Detailed information as regards the comparative features ofthe five generations ofcomputers
is furnished hereafter.
Closet(Size) Transistors
- - --
Hundreds components per circuit Magnetic Core (Main Memory)
(Density)
36
......
Unit 2 Information Technology
37
Management Information Systems
1. Super Computer
38
Unit 2 Information Technology
2. Mainframe Computer
A mainframe computer has very powerful CPU, highly sophisticated operating system
and very large secondary storage capabilities. "It is a powerhouse with massive memory
and extremely rapid processing speed/ability. It is used for very large commercial,
scientific or military applications where a computer must handle massive amounts of
data or many complicated processes. A mainframe can support multiple jobs being
executed concurrently and on line processing from many remote locations at once."
3. Mini Computer
A mini computer is a middle range computer, less than the size ofan office desk, and
relatively less expensive. It may support on line processing from multiple remote
locations. It is often used in major academic institutions, universities, factories or
research laboratories.
4. Micro Computer
A micro computer was originally conceived as and intended to be, primarily a personal
and single user machine. As such, it had a simple operating system, small primary
storage, mostly one input unit (visual display unit- terminal or monitor), an output
unit-mostly a small printer and limited secondary storage by way of diskettes or
cassettes.
Today, however, a micro computer need not be a 'stand alone' machine. Today, it
can be used either as a 'stand alone' machine or can be hooked into/linked to other
39
Management Information Systems
2.6 SUMMARY
Information technology (IT) is a broad subject concerned with integration of
telecommunications and computer science tcchnolgies and other (l!)])CCts ofmanaging and
processing information, especially in large organil'.ations. IT deals with the usc of electronic
computers and computer software to convert, store, protect, process, transmit, and retrieve
information
The computer hardware consisl'\ of:- the CPU (central processing unit), Input Devices,
Output Devices, Storage Devices - Primary and Secondary, Physical media to link various
communication devices.
Computers are divided into the following four categories:- Super Computer, Main Frame
Computer, Mini Computer, Micro Computer
40
Management Information Systems
3.1 lNTRODUCTIOl'l
For the computer to function and deliver the processing results, we normally expect from
computer, there has to be appropriate software.
Software is a broad term given to "the instructions that direct the operation ofthe hardware".
Software could also be described as "the detailed instructions that control the operation of
a computer system".
A set ofinstructions for a specific task is called a "Routine" and a complete set of instructions
to execute a related set of tasks is termed as 'program'. Software instructions arc also
referred to as 'code'.
In this unit you will learn about Data Communication and IT Enabled Services. To
understand this we first need to have an idea about Software.
Software Categories
Computer software could be broadly divided into two major categories:
System Software and Application Software
1. System Software
System software is a set of generalized programs that manage the resources of the
computers, such as the central processor, communication links and peripheral devices.
Thesystemsoftwarcisinstrumcntal inco-coordinatingthe various parts of the
computer system and mediating between application software(s/w) and computer
hardware (h/w).
44
Unit 3 Data Communication and IT Enabled Services
a. Operating System
Operating system is like the ChiefExecutive. The operating system oftwarc
decides which computer resources will be used, which programs will be run,
and the sequence/order in which activities will take place.
The operating system, as stated earlier, takes care of allocation I assignment of
computer resources, scheduling the jobs/events/tasks and monitors the activities
ofthe computer system.
The device on which a complete operating system is stored is called the System
Residence Device. The operating system currently possesses multi-programming,
multi-tasking, virtual storage, time sharing and multi-processing capabilities. Refer
to Fig. 3.1.
Programming Languages
Assembly/Machine Language
Third/Fourth Generation Languages
Application Software
System Software
Fig. 3.1 Software Categories
45
Management Information Systems
b. Language Translation
The computer programs are written in higher level programming languages like
COBOL, FORTRAN, C etc. These 'Source Code' programs which are 'Human
Readable' must be converted into 'Object Code'- computer readable languages.
System software includes special programs, which translate the higher level
language programs into machine language, which the computer can execute.
This type of system software is called 'compiler' or 'interpreter'.
A compiler translates source code into machine code called object code. An
interpreter translates each source code statement, one at a time, into machine
code.
c. Utility Programs
Also known as utilities , they help users in system maintenance task and in
performing tasks ofroutine nature like sorting, listing etc and managing data like
creating files, merging files).
Utility programs are pre-written programs which arc stored so that they can be
shared by all users of a computer system and can be readily used in many
different information system applications where so required I requested.
d Communications Software
PS Activicy_B_;.
In a computer , hardware and software both are essential and they complement each
other. Do you agree with this statement? Justify your answers.
46
Unit 3 Data Communication and IT Enabled Services
47
Management Information Systems
2. Application Software
RS Activity C :
Application software is user specific. Explain
48
Cnit 3 Data Communication and IT Enabled Services
Data Processing
Data is uns1ructured raw facts in isolation to be used as the raw material o:llfor the information
system. Data is also the glue or mortar ofthe information system.
Data Organization/Sequence
The data is moved, stored and computed in the unit of bytes. One byte represents one
character. The byte is made of eight bits. The data is structured for processing in a certain
sequence and is ultimately stored in file.
• The Bits form a Byte.
• The Byte represents Character.
49
Management Information Systems
I Database I
-t
~ FilC J
t -
Blocks ]
Data Processing
I
Read Sort
I Collate
- cl
I
Compare
I
Store
I
Write Merge Delete I Decide Display
I
I ! ! - - -
J
Hrint Copy I Enter Compute Etc.
- -
Plot Transfer I
I
Create Perform
i
Data processing also involves carrying out a number of data operations. To illustrate this
refer to Table 3.3.
50
Unit 3 Data Communication and IT Enabled Services
r- ·-
Capturing Recording of data from an event/transaction
VerifYing Checking/validating data for correctness.
t - -·
ClassifYing Placing data into specific categories.
·-
r-sortinglArranging Placing data in a particular sequence.
~--
Communicating
t___
Data Processing can be stmunarized as shown in the diagram which follows. Refer to
Fig. 3.3.
I __ _D_a_ta Collection
- - - +
L._
- - -- + Data Collation I
I
~--
[
.
Data Conversion
+ =:J
Data Written m-=D=-o_c_um--en_,.ts-·~
--
L_Data in Ma~hine Readable Form J
C: InputUnit I
,____ Memory
+ CPU =:J
--------,
Processed Data in Internal Form
L •
Output Unit
51
Management Information Systems
A business is conducted through the business transactions, which are recorded systematically.
A sales order accepted by a sales person, a purchase order issued, a reservation, money
being deposited in or withdrawn from bank arc all examples ofBusiness Transactions
which arc recorded and then processed. Ifthere are no transactions, no data/document
and hence no need for data processing either.
Transaction Processing
The transaction processing system is vital for organinttional operations. Without it, bills
would not be paid, purchase orders would not be issued, sales orders would not be
placed, reservations would not be made.
However, before processing a transaction, the relative data item has to be checked, verified
and found correct/acceptable as regards its quality specification. This process is called
Data Validation. This process is effected by using a set of computer software programs,
known as the Validation Programs, where certain data validation tests are applied to the
data items. Validation tests may check any/all ofthe following attributes/aspects. Refer to
Table 3.4.
52
Unit 3 Data Communication and IT Enabled Services
Invalid Value An item can be checked to see if it is in the valid set of valid
values.
Comparison with The test compares the data on hand with data in the file to ascertain
stored data its correctness.
Check digit It is a test, which is very effective in locating/finding out input errors.
Action documents include documents such as purchase order, requisition slips, shipping
orders etc. These documents instruct someone to do something and lead to initiation of
certain action.
As stated earlier, computers are used for the processing of data, analyzing it and getting
the necessary information for facilitating decision-making. It is, therefore, imperative that
the data be processed in keeping with the specific needs, demands and requircmentc; of
the organization. It would not be out ofplace to state that demands ofthe business determine
the type of data processing modes/methods. Broadly, there are four different methods
used for data processing and updating as illustrated hereafter. Refer to Fig. 3 .4.
53
Management Information Systems
.-----:-r-
Batchl I OnLine l
r-~
Real11me jnis_tn_,_.b_u-ted
-
Proccs~~ j Processing 1 Processing l_!~ocessing
This was the only method of data processing until the early 1960s, as technical
limitations required that periodic data preparation and periodic batch processing be
utilized. This system, however, continues to be used till date in older systems or in
those systems where massive volumes ofperiodic transactions are involved. Refer
to Fig. 3.5.
Transactions
Grouped in
Batches
Validate
&
Update
54
Unit 3 Data Communication and IT Enabled Services
In batch system.c;;, transactions are accumulated in a transaction file which contains all
the transactions for a particular time period. This transaction file is periodically used
to update the master file, which contains permanent information on entities. Adding
the transaction data to the existing/current master file, creates a new master file.
The On-Line Processing System of transactions has now become a way oflife. In
this system, the user has access to a terminal for input oftransactions and output
of results. The user enters transactions into a device that is directly connected to
the computer system. The transaction is taken for processing directly and is validated
immediately before being taken up for further processing. After validation, the data is
accepted but processing itselfmay be performed either immediately or at a subsequent
time.
For online processing the flies must be available on direct access storage devices for
immediate access to the data, so that records could be added to or deleted from the
file. Thus, in on line processing, the processing ofdata- from input to computation
and updation of status on various files is carried out immediately. Refer to Fig. 3.6.
Trans actions
Process/ Master
d ireclly via Upd ate File
keyboard m aster file
55
Management Information Systems
However, a user responsible for processing data in an on line system must ensure
proper security protocol- he must sign on properly, enter transactions in the proper,
laid down format, respond to error messages with corrected input, review control
information and sign offafter the transaction processing is complete, to prevent
unauthorised use/access.
The on line real time processing system is similar to the on line processing system
in as much as in both the systems, a transaction is entered directly into the computer
and validated immediately. However, while under the online system, the transaction
may be processed later, under the on-line real time p rocessing system, once a
transaction is found to be valid, it is processed immediately and the results are also
made available immediately, as the master data is always up-to-date.
Needless to add, the real time processing concept is used where stored data needs
to be updated simultaneously as the transaction takes place.
The points to be considered arc the higher costs of on line processing, requiring
greater computer power and often data communication, as also the extra procedures
required to produce adequate control information and to safeguard the files against
accidental or deliberate destruction during on line updating.
Original
Entry & Proces s
Error Immediately
Corrections
Error Messages
Fig. 3. 7 Online Entry with Immediate Processing
56
l ::it 3 Data Communication and IT Enabled Services
The distributed data processing mode became popular during the 1970s, as this
period witnessed the growth ofpowerful telecommunications networks and also the
developments in computer technologies leading to significant decline in computer
hardware prices/costs.
The distributed data processing refers to the distribution of computer processing among
geographically and functionally multiple locations, linked by communications network. The
distributed data processing mode enables to serve multiple real time applications as also
serves multiple classes ofusers. Instead of relying on a single centralized/ mainframe
computer system to provide service to remote sites, the distributed processors directly
serve regional/local unit<;/establishn1ents. These processors, in turn, are linked with
each other by networks.
The distributed data processing system provides the advantages of increased system
availability and quicker systems response time. Systems availability is increased because
when CPU malfunctions or undergoes preventive maintenance, its work may be transferred
to another CPU in the system. The response time is improved because the workload can
be distributed evenly among the CPUs to ensure optimum utilization.
2SActivity D:
Give examples ofonline processing and onLine real time processing
57
Management Information Systems
1. Time Sharing
The time sharing mode of data processing allows several users to simultaneously
share the processing capability ofthe computer system. Under this mode, each user
is allotted a certain 'Time Slot' or 'Time Slice,' dming which that particular user has
access to Processor. The Processor spends this allotted time on one program before
moving over to another. This activity is reiterated till the user's task is finally completed.
The users ofthe system generally avail the facility oftime sharing a computer system
through remote terminals.
2. Multi Processing
3. Multi-Programming
58
L'nit 3 Data Communication and IT Enabled Services
Data Transmission necessarily uses the data processed for forwarding the same to the end
llSer. Data transmission, however, may simply involve forwarding ofthe data to the end
user. Whatever the case may be, data transmission could not be effected without using the
means provided by the advances in the telecommunication field I technology.
Transmission Signals :
The data is transmitted using the telecommunication systems. The data is transmitted in the
torm ofelectromagnetic signals. These signals can be of two types:
I. The Analog Signal
The Digital Signal
It is a continuous wave form that passes through the communication medium. Analog
signals are, rather were, used mainly to transmit data in the form of voice and to reflect
Yariations in the pitch, across the line. The analog signal is in the form ofwaves of different
frequencies and subject to distortion.
59
Management Information Systems
r
Amplitude
It is a discrete wave form that transmits data coded into two discrete states as 1 -bits and
0- bits, which arc represented as On-Off electrical pulses. Digital signal is very useful in
data communications. Now we are, indeed, moving into the "Digital Era" using the digital
signal.
0 0 0 0 0
Fig. 3.9 Digital Signal
60
t:nit 3 Data Communication and IT Enabled Services
Communication!fransmission Channels
Communication channels are the links/means by which data are transmitted from one
device in a network to another, A channel can make use of various media like :
61
Management Information Systems
3.6 NETWORK
The changes and developments in Computer Science and Telecommunications and the
connectivity which has been made possible, in turn, gave rise to the Networks, which have
now become a routine.
Computers and Telephone, along with the Industrial Revolution and Automobile, have and
are changing the way business will be done. In the twentieth century, in particular,
telecommunication and computers have changed dreams into reality. The development of
powerful microprocessors and telecommunication networks ha-; forced the emergence of
a new information architecture based on multi-tasking, multi-programming utilities of
computers and digitized communication networks.
62
Cnit 3 Data Communication and [T Enabled Services
:Setworks and Networking have gained currency as they offer the following advantages :
1. Networks enable users to share resources- hardware, software, peripherals etc.
"> Networks facilitate simultaneous access to the data file by multiple users, thereby,
enabling them to share the data files.
3. Networks facilitate almost instantaneous communication between users.
-t.. Networks facilitate decentralized data processing.
A network typically contains diverse hardware and software components that need
to work together to transmit/receive information. Different components in a network
can communicate by adhering to a common set of rules that enable them to 'talk' to
each other. This set of rules and procedures governing transmission between two
points in a network is called Protocol. Each device in a network must be able to
interpret the other device's protocol.
-t.. File Server : It is a computer in a network that stores various programmes and data
files for users of network. It also determines access and availability in the network.
63
Management Infonnation Systems
5. Network Operating System : It is a special software which manages the file server in
a network and routes and manages communications on the network.
6. Gateway : It helps connect dissimilar networks by providing the translation from one
set ofprotocols to another and permit'i the computers ofdifferent design/architectures
to communicate with one another.
Network Topologies
Networks are formed from the interconnection ofa number of different locations by using
telecommunication facilities. These facilities or components can be organized in various
ways to form a network.
Networks can be classified according to the geographical scope or area covered by services
provided and also by their share or topology.
This network tics all the units to a central host/hub computer. All communications
between units/terminals in the network must necessarily pass through the central
computer. The central computer, thus, acts as a traffic controller for the units/terminals
in the star network.
The central computer of the star network can be part ofthe larger hierarchical network
where the host/hub can be connected upward, providing eventual linking to a mainframe
computer in the corporate office.
The star network, however, is considered to be vulnerable in view ofthe fact that if
the central host/hub computer goes down (becomes inoperable) the total network/
system would also go down (become inoperable) and stop functioning.Refer to
Fig.3.11.
64
l"nit 3 Data Communication and IT Enahlec Services
Computer 1
Computer2
Host
CPU
Printer
Terminal 2
Terrnina13
:Fig. 3.11 Star Network
As such, the Bus Network is never affected totally and is not vulnerable, like the Star
Network. This is because even ifone ofthe computer in the Bus Network becomes
inoperable or stops functioning, the remaining network remains unaffected. Refer to
Fig. 3.12.
Computer l
~
'~ Printer
65
~auagcmcnt Information Systems
In the Ring Network, the computers are arranged in a ring-like structure and data are
pac;sed along the ring from one computer to another in a uni-directional manner. Each
computer in the Ring Network can communicate directly with any other computer
and each processes its own applications/tasks independently or on its own. Refer to
Fig. 3.13.
Computer3
Printer
Now, a variant ofthe ring network, known as Token Ring Network, is also available. In
this network, a "Token" is used by all the computers/devices connected for communicating.
The "Token' is a predefined packet ofdata indicating the sender, receiver and also indicating
whether the packet is in usc.
The Token Ring Network is considered to be more useful for transmitting large volumes of
data between microcomputers or for transmissions between microcomputer and larger
computer/s.
Types of Network
The LAN is a logical extension ofthe emergence ofthe personal computers. With the
onset of LAN, communication between PC users became a reality. PC users can
now transfer Jiles, send electronic mails and share peripherals, thanks to LAN.
66
t:nit 3 Data Communication and IT Enabled Services
However, the performance ofLAN usually dewc:ldes as the area ofcoverage becomes
large as LA.l\ls arc typically small, with limited distance transmission and throughput
capacity.
LANs are used within buildings or campuses and are operated in geographically
specific location. A group ofminicomputers or other workstations/tenninal devices
located in the same general area are connected by a common cable (communication
circuit), so that they can exchange information, is known as a Local Area Network.
LANs arc totally controlled, maintained and operated by the end-users. LANs
generally have higher transmission capabilities and are desirable for organizations
requiring high volumes of data and high transmission speed. LAN"s enable the
organizations to share costly hardware and software and also promote productivity
as direct communication among users is possible without their being dependent upon
a centralized computer system.
LANs can also be connected to larger Backbone Network which allows message
transmission around the world.
2. Backbone Network
67
Management lnfonn ation Systems
A MAN represents LAN technology optimized for longer distances. It could, indeed,
be considered an extension ofLAN, as the MAN interconnects various buildings on
the entire campus or other facilities within a city/wide area. MAN is thus, ba.;;ically, a
network capable ofproviding high speed switched connectivity across distances typical
ofthosc found in metropolitan area and hence a MAN can be defined as "a network
spanning a geographical area that usually encompasses a city or country area".
While, physically, a MA~ consists of a transmission medium and nodes that provide
customer access to the medium, the major advantages ofMAN arc high bandwidth,
low delay and high transmission quality.
MANs arc expected to support several 'tra.ffic' types. Typical MAl~ traffic is expected
to include:
• LAN Interconnection
•
• Connections between PCs/Terrninals/Workstations to mainframes or hosts
• Graphics and Digital Images
• Bulk Data Transfer
• Digitized Voice
• Compressed Video
• Conventional Terminal Traffic
The Wide Area Network (WAN) is a network spanning a large geographical area.
Its micro-computer (nodes) can span cities, states or even national/continental
boundaries. This network interconnects data transmission facilities not only on a nation-
wide but worldwide basis. WANs may consist of a combination of switched lines,
dedicated lines, microwave links and satellite communications.
The Value Added Network (VAN) is a new but distinct trend emerging in the
networking area. The 'value' added is "the extra value added to communications by
the telecommunication and computing services", these networks provide to the user-
clients. Clients do not have to invest in network hardware and software. It is also not
68
Unit 3 Data Communication and IT Enabled Services
necessary for them to perform their own error checking, editing, routing and protocol
conversion.
VANs are private, multi-path, data-only and third party managed petworks that can
provide economics in the cost of service and in network management. The VANs
can be used by multiple organizations on a subscription basis and hence VANs are
useful/beneficial for firms which provide special services, as VANs help in reducing
costs and operational problems related with networks.
~ etwork Considerations
£S Ac.ti.Yicy E :
a) What type ofNetwork Topology is being used in your computer laboratory and
why?
b) What is the difference between a Broad Band Connection and Dialup Connection?
69
Management Information Systems
3.7 INTERNET
The Internet is different things to different people. To some. Internet is a collection of
networks -literally an inter-network. To some others, Internet is a collection of servers
connected by common protocols and agreed upon standards. Notwithstanding the different
perceptions, the fact remains that, today, Internet has emerged as an electronic medium
that can no longer be ignored, particularly when it is fast converting the 'Citizens' into
'Netizens'.
To put it simply and succinctly, Internet is the global connection between computers that
allows individuals to send e-mail, make travel bookings, order books etc. between people
and companies all around the world. Internet is a worldwide network of computers holding
vast quantities of data that the user can access directly from a Personal ('.,omputer. Internet
has emerged as the single largest "Information Superhighway" in the world.
Internet is commonly referred to as "The network of the networks". The Internet (with the
capital "I") is a public resource. It means that any user or server on the Internet can
connect to any other user or server. No one "owns" the Internet, and this feature gives
individual and cotporate organizations tremendous capabilities. Internet has proved to be
powerful tool for corporates in particular as it helps, inter alia, bring in customers, generate
revenue and save money.
It must, however, be remembered that the growth oflnternct has been more evolutionary
than planned, driven by necessity.
The 1950s and 1960s saw the birth and infancy ofthe networks that were to become the
Internet. The 1970s saw the Internet grow through its youth into an international network
presence. The 1970s also saw the introduction of store-and-forward technology and the
usc of e-mail, albeit on a limited and restricted scale. The 1980s was a significant decade
for Internet. It was during this period that the network grew to adulthood, poised for the
explosive and exponential growth ofthe 1990s.
The 1990s witnessed the explosive growth and commercialization ofinternet. One of the
most significant developments as regards Internet during the 1990s, 1991 to be more
specific, has been the release ofwww or W3 or more popularly the World Wide Web-
by CERN.
70
Cnit 3 Data Communication and IT Enabled Services
The WWW project, which was originally developed to provide a distributed hypermedia
system that could easily access information from around the world from any desktop
computer, bas now evolved into a graphic medium that has effectively contributed to the
explosive, indeed exponential, growth ofthe internet during 1990s.
Internet - the co-operative inter-connection ofnetworks - has been possible mainly due to
four factors as follows :
• Under-sea cables
• Satellites
• Telecommunication Technology and Standards
• The Computer itself
Internet Capabilities
Let us now note the major Internet capabilities and the functions which they support.
Refer to Table 3.5.
Table 3.5 Capabilities of the internet
71
\1anagcment Information Systems
The development, expansion and the popularity of the Internet left many business
organizations scrambling to define a new paradigm in computing - the network- centric
computing. The business organizations have realized that the Internet is a rich source of
tools and information and has enormous potential.
Some ofthc major benefits emanating from Internet and also certain problems arising!
likely to arise because oflnternet are summarized as follows: -
Internet Benefits
• Reducing communication costs
• Enhancing communication and co-ordination
• Accelerating the distribution ofknowlcdge
• Improving customer service and satisfaction
• Facilitating marketing and sales
Internet Problems
• Security
• Technology Problems
• Lack of Standards
• Legal Issues
• The traditional internet culture
The Intranet
Over the years, the Internet, which is basically network of networks, has also led to the
development of"Jntranet". The Intranet is not really the Internet, but the application of
internet technologies to the internal corporate network. The TCPIIP Internet Protocols, as
well as the standard systems of the Internet such as FTP, e-mail, protocols and www
system arc now increasingly being used within networks that are commonly referred to as
"lntranets".
Thus, while the Internet is for public consumption, intrancts are for private use, mainly
confined to the users only within a given/specific orgar0.ation.
72
· -nit 3 Data Communication and 1T Enabled Services
The Extranet
While the Internet is public, and an intranet is private, an extranet is essentially a hybrid of
the two : it is semi-private !
The contents of the extranet server are specifically designed for a very select group of
users/audience. Typically, the users/audience could be a company's suppliers, customers
or other business associates.
Prior to 1962, the worldwide telecommunications network was totally analog. Separate
pairs of wires were also required for each service like Voice, Data and Image Signal
Transmission.
In 1962, the world started down the digital road with the onset ofT-1 carrier. From that
point onward, the worldwide telecommunications network has continued to grow and
become more and more digitaL
In 1970s, the concept of integrated services -popularly known as the ISDN -was born.
ISDN stands for Integrated Services Digital Network and is considered to be "the final
step in which digital reaches customer premises/doorsteps, first on copper and then on
'fiber'".
ISDN is an international standard for transmitting voice data, image .and video to support
a wide range of services over the public telephone lines. ISDN is the result ofover a dozen
ofyears of efforts by communication experts, all over the world.ISDN was developed by
the CCITT (Consultative Committee on International Telegraphy and Telephony) in the
late 1970s. ISDN endeavors to bring the world into a new age ofinformation by integrating
ail current and emerging communications technologies into a single, world- wide network.
It is an international push to upgrade business into a single, world-wide network. It is an
international push to upgrade business and human communication, with all the convenience,
capability and economy that the current and emerging state-of-the-art technologies permit.
ISDN, being all-digital, allows user to achieve convenience, flexibility and economy by
way ofreduced costs, lower power conswnption and easy maintainability. It also provides
a variety ofdata communication services over a single telephone line. High utilization is
also achieved due to the integration ofmultiple connection types, services which arc provided
on one line from one source. ISDN, being digital, also offers increased clarity, accuracy
and speed. Refer to Fig. 3.15.
73
Management Information Systems
Wl A _\rl.
~· ISDN 1'-- - - - - - - - - - . ~
~dri:ll
Record Record
il J!! •
Fig. 3.15 ISDN Concept
ISDN is fast emerging as a strategic weapon in global communication. ISDN has the
potential to provide LAN like services to a large, multi-site organizations.
ISDN is, therefore, expected to emerge as an 'Enabler' for "Enterprise Integration" in that
it would enable a business to organize it" resources so that it improves its ability to respond
quickly, coherently and consistently to the customer demands and thereby be more
competitive in worldwide markets.
It must, however, be noted that ISDN is not by itself a service but rather an interface to
existing and future services. [t promotes innovation and convergence of information
technology and telecommunications in open network structures.
According to NASSCOM study, the ITES employed a total of 45,000 personnel during
1999-2000, 70,000 during 2000-2001 and over I ,00,000 as at March 2002.
74
:.."nit 3 Data Communication and IT Enabled Services
Simultaneously, the revenue generated by the ITES has also gone up from Rs. 2,400
crores during 1999-2000 toRs. 4,100 crores during 2000-2001 and Rs. 7,100 erorcs
during2001-2002.
Further, while the ITES arc reported to have witnessed a growth of 67% during 2001-
2002, such services arc expected to grow at a rate of 65% during 2002-2003 . Such a
growth augurs well for ITES prospects and makes the projected revenues of US $ 17
billion by 2008, as projected by the McKinsey-NASSCOM Report, feasible. Further,
according to IT research firms like Gartner, the global BPO market was estimated to
touch US S 234 billion by 2005. ($ 1 billion= Rs. 5000 crores approx.)
The ITES thus present India with a huge opportunity. It is interesting to note that 90% of
all India-based ITES activities have been concentrated in 9 cities - the ITES "Nav-ratnas"
(Nine Jewels), so to speak. TheNaVTatnas, in order ofpresent concentration ofiTES, are
a.;; follows:
1. Hydembad
2. Kochi
3. Chennai
4. Kolkata
5. Ahmedabad
6. Bangalore
7. Mumbai
8. National Capital Region (NCR)
9. Pune
What is ITES?
In simple terms, ITES involve the offering of services from remote locations by harnessing
the power oflnformation Technology through telecommunications/data networks. IT
Enabled services (ITES), also called web enabled services or remote services or Tete-
working, covers the entire gamut of opcmtions which exploit information technology for
improving efficiency ofan organif.ation.
75
Management lnfonnation Systems
ITES could also be considered as another 'avatar ofBusiness Process Outsourcing (BPO).
BPO involves the complete trcillsfer ofa business process or function to an external service
provider who executes the transferred process or function.
Typically, Information Technology is leveraged extensively in canying out the function, and
more recently, the Off..c;hore Model has been used in providing cost-effective services.
(SLAs that often include financial guarantees if the SLAs arc not met by the service
provider).
Such services could be offered domestically or to companies in other parts of the globe
either by a third party (OUTSOURCED PARTh"'ER) or a subsidiary ofthe client company
(REMOTE OPERATIONS or OUT-LOCATION).
Although the IT&<:; cover a number ofservices, the most high profile and most commonly
understood/heard services in the ITES area are the Call Centres, Medical Transc1iphon
Services and the GIS.
ITES, however, go much beyond these services and include, inter alia, services such as:
1. Animation
2. Business Process Outsourcing/Management
3. Back office operations (Credit card, payroll)
4. Collection services
5. Customer Care/Interaction Services
6. Data digitization
7. Digital content development
8. Legal databases
9. Market research
76
Unit 3 Data Communication and IT Enabled Services
I 0. Remote education
11 . Transcription and translation services
12. Website services
Over the last few years, there has been a growing trend to outsource back ofiicc and
data processing operations. Organizations like Banks, Airlines, Financial Services
Companies, Insurance Companies require large-scale data processing and availability
of data to improve their decision-making capabilities. High speed datacom link<> have
made BPO possible and this type oflTES is expected to grow by leaps and bounds
in the years to come. Insurance Claims Processing, Credit Cards Processing arc
typical examples ofback office ITES.
As per industry estimates, there were more than 1,00,000 call centers world-wide
and this number was expected to go up to 3,00,000 by 2002-2003, employing
approximately 18 million personnel. By the year 2003, a sum of US S 66 billion was
expected to be spent on call centre services, the momentum being accelerated byE-
Commcrcc.
In India, too, the call centers have recorded a remarkable growth. GE Capital Services
was the early bird to sow seeds ofiTES in India in 1996. Now, while GE Capital
Services boasts ofthe largest call centre facilities with over 12,000 seats, HSBC,
ABN Amro, British Airways and Citigroup are among others who have set up or arc
setting up call centers in India.
3. Medical Transcription
77
Management lnfonnation Systems
The sound tracks containing the prescription/treatment, dictated by doctors, are sent
through datacom lines to overseas organization which employ "medical
transcriptionists" who hear these recordings, transcript them into medical reports and
send them back, electronically, through datacom links/lines to the hospitals/clinics.
4. . Legal Databases
In every judicial system, the lawyers always look for 'precedents', past rulings/
judgments to support and build-up the cases on hands. To fulfil this requirement, the
job of preparing legal database is outsourced. The job basically involves working
closely with the solicitors finn/s to create a database oftheir existing records, indexing
on the basis ofvarious useful and commonly understood criteria, keeping track of
new documents generated/created and incorporating them into the legal databases
as per laid down norms/parameters.
This ITES caters to the needs of web sites management, production of content for
new media as Compact Disk, Digital Versatile Disk as we11 as for products of
convergent technologies such as internet-enabled TV.
While the preliminary work in the field of GIS commenced in the late fifties, the first
GIS software was released in the seventies. The GIS, thus, has been around tor the
past 30 years. While earlier GIS Applications have been in Government and Utilities
companies, mostly for analy~:ing Census Data, GIS is now being increasingly utilized
by various business organif.ations, particularly in marketing, manufacturing, real estate
and logistics. The evolution ofGIS has, indeed, transformed and revolutionized the
ways in which planners, engineers and managers conduct geographical data
management and analysis.
In technical parlance, GIS is an Infom1ation System (IS) designed to work with data
referenced by spatial/geographical co-ordinates. GIS technology integrates common
78
nit 3 Data Communication and IT Enabled Services
database operations such as query and statistical analysis with the unique visualization
and geographic analysis benefits offered by maps.
These abilities distinguish GIS from other IS and make it valuable to a wide range of
public and private enterprises for explaining events, predicting outcomes and planning
strategies. GIS is, therefore, seen as a tool to assist in decision-making and management
of attributes that need to be analyzed spatially.
4. The depiction ofthe measured or analyzed data in some type ofdisplay in any of
the following commonly employed forms :
(a) Maps
(b) Graphs
(c) Lists
(d) Summary statistics
79
\1anagement Information Systems
GIS Applications
With economic slowdown, the corporates - the MNCs in particular - were on a look out
to be cost-effective globally, to remain competitive and ensure survival. Outsourcing ITES
was considered a desirable option as :
1. Outsourcing ITES can help the MNCs save anywhere upto 30-50% ofthcir costs.
2. The increased speed ofchange, including changes in the Regulatory Environment,
forcing the MNCs to achieve greater efficiencies in their core processes (Telecom/
Utilities/Financial Services).
3. Rapidly improving telecom infrastructure, declining telecom costs and related
developments offered significant connectivity at low cost.
In addition to the above mentioned reasons, some ofthe otherreasons for outsourcing
ITES as indicated in a recent survey by Michael F. Corbett and Associates arc :
HO
Unit 3 Data Communication and IT Enabled Services
Till 1999, India was not considered as an "ideal destination for IT-enabled Services".
However, notwithstanding the snags, constraints and deficiencies, India was able to create
anew TTES industry, showing growth rates of 50% plus, even in times ofthe global slow
downs. While India has made great strides in ITES, it must be remembered that 90% ofall
India-based ITES activity has been concentrated in 9 "Nav-ratna" cities as stated earlier.
In the process, India has not only stolen a march over its competitors like China and
Philippines, in Asia, and Australia, Canada, Ireland, Mexico and New Zealand globally,
but bas emerged as a leader in ITES in her own right. India's ITES revenues are nearly five
times that ofthe nearest competitor.
81
Management Information Systems
India has to be constantly on her toes as the competitors cannot be taken for granted or
lightly. China, in fact, could not only emerge as a challenge but may pose a real threat once
she succeeds in propagating English language and further improves the infrastructure.
Any complacency, therefore, would be a sure-fire remedy for disaster, if not a catastrophe.
The Snags
The ITES in India £:'lee certain problems which need to be looked into and set right forthwith
on a top priority. Some of the problems are:
1. Relatively Poor Quality ofbasic infrastructure including transport, power, housing
and bandwidth (notwithstanding recent improvements).
2. DcpartmentofTelccommunications (Dol) regulations hampering sufficient/unrestricted
inter-connectivity.
3. Non-granting of industry status.
4. Insufficient regulations in the area of data protection security.
5. Undue emphasis on financial services.
While the problems need to be addressed with alacrity, endeavors need also to be initiated
to reposition India's ITES as a destination like Ireland, for higher value services. It must be
realized that low cost skill base advantage, in any case, would not be sustainable in the
longrun.
Ifthis does not happen, the BPO/ITES potential, such as it is perceived, might remain just
a day dream or another "Hype" phenomenon.
Ifthe BPO/ITES potential remains as a day dream or another Hype phenomenon, India
would be denying herself-
82
Unit 3 Data Communication and IT Enabled Services
India can ill afford to lose all this. India, therefore, has to make all the right moves in the
spirit of'Do it right, the first time, every time'. Iflndia makes the right moves, and discernible
and sustainable results arc seen and felt, there is a whole new world- not VIRTUAL but
REAL world - out there to be conquered.
3.9 SUMMARY
Data Processing involves a number of operations to convert data into information. Batch
processing, online processing, online real tin1c process, distributed data processing, time
sharing, multiprogramming, and multiprocessing are diiTcrent modes of data processing.
Various types ofnetworks arc LAN, MA01, WAN, Backbone 1\ctwork & VAN. Network
topologies arc star topology, bus topology and ring topology. Internet has emerged as an
electronic medium that can no longer be ignored, particularly when it is fast converting the
'Citizens' into 'Netizens'.
Integrated Services Digital Network is considered to be "the final step in which digital
reaches customer premises/doorsteps, first on copper and then on 'fiber'". ISDN is an
international standard for transmitting voice data, image .and video to support a wide
range of services over the public telephone lines
IT Enabled services (ITES), also called web enabled services or remote services or Tclc-
working, covers the entire gamut of operations which exploit information technology for
improving efficiency ofan organif.ation.
83
Management Information Systems
4.1 INTRODUCTION
A decision is a choice made from available alternatives. MIS is crucial for Decision Making
as it facilitates effective and eflicient decision making. All managers/ management have to
take decisions for good and efficient functioning ofan organization. Decisions are taken at
all levels of management, decision taken at the lower level of management is structured
(routine or repetitive), decisions taken at the middle level ofmanagement are both structured
and unstructured whereas decision taken on the top level ofmanagement is unstructured
(innovative, strategic, long term). A decision maker makes use various tools of decision
making. to be taken by the Manager or Management.
4.2 MA.~AGEMENT
Management is "the art ofgetting things done through people". A manager is defined as a
person who achieves the organizational goals by motivating others to perform- not only
by performing himself Modem management in the environment oftcchnology is becoming
more of science than an art.
Modern management system relies and depends on MIS. The complexity of business
management and competitive nature ofbusiness requires handing ofbusiness operations
with skills and foresight to avoid crisis. Modern business management requires shift from
the traditional controls to managerial controls. The manager becomes more efficient ifhe is
well informed, has a knowledge base, experience and analytical skills and is able to face
the uncertainties ifrisks ofbusiness. All this is possible only ifthe management is supported
by MIS.
The management has to utilize the resources -Human, Financial and Physical- effectively,
by doing right things, and efficiently, by doing things right, so that, at the end, it is able to
get the things 'done' and 'deliver goods/results'. This involves managing the work, managing
the people and managing the operations optimally.
Optimal utilization ofresources, in turn, involves exercising choices and hence the basic
job ofthe management could be considered to be 'Decision Making' in discharging various
functions assigned to it.
88
Unit 4 Management and Decision .Making
Managers, therefore, have to develop decision making skills as managers are evaluated/
rewarded on the basis of the importance, numbers and resultc; ofthcir decisions. Quality of
decisions of managers' reach is the yardstick of their effectiveness and oftheir value to the
organizations.
A decision is the choice out of several options made by the decision maker to achieve
some objective in a given situation.
A number of experts consider decision making as the single most important managerial
function. Decisions arc made at different levels in the organization structure. The decisions
made at different levels vary in their content, risks involved, complexity and the implications.
The information support required for the decision making process also varies according to
the type of decision and the level within the organization at which such decision is being
made.
Decisions could be made under different types of environment viz., ambiguity, certainty,
uncertainty and risk. An environment is ambiguous when the problem is not clear, the goal
:.s not clear and hence the outcome also is not clear.
The certainty environment is one where the relationship between inputs and outputs is
known and hence the result is also known. The uncertainty clement is one where there is
.mawarcness about resources, input/output relations and the outcome is uncertain or
;mpredictablc. The risk environment is one where the result is unknown- it might result in
?fOfits, but it might lead to incurring losses as well.
89
Management Information Systems
Decision Types
Decisions could be divided into two categories m., the Programmed Decisions and Non-
programmed Decisions.
1. Programmed Decisions
2. Non-Programmed Decisions :
90
Unit 4 :yfanagement and Decision Making
Decisions taken at the lower level are programmed, while ac; decision taken at higher level
are non-programmed, as illustrated in Fig. 4.1.
Management + - - - - - - - Non-Programmed
TOP ~3road. Unst~cturcd, Infrequent
MIDDLE Both Structured ......._.....__----~&Unstru~~c
& -
~d_ __ _J
---------------~~quent
-- I
LOWER Routine, Structured, I
- - -·
Programmed---------+
Fig. 4.1 Levels of management and types of decisions
This can also be illustrated by looking at the decision making process from the organiz.:'ltional
pyramidal point ofview. Refer to Fig. 4.2.
Unstructured
Tactical
Planning
Operational Planning
91
Management lnfommtion Systems
16 Activity.A:
Give any 3 examples ofdifferent types of decisions.
Step Detail
92
Unit 4 Management and Decision Making
The decision making process could be represented as shown in the flow chart. Refer to
Fig. 4.3.
~-----------------. Identify & Define the probl;~]
Revise
.. ,
I
...
Develop alternative solutions
... I
~I Evaluate alternative solutions I
Revise
~ ~
-- l
Certainty Risk Uncertainty
Conditions Conditions Conditions
I ..... ~ I
SelectAlternative
Revise
•
Implement Decision
Decision-Making Styles
• Co-actions
• Task groups
• Interacting groups
• Brain storming
• Delphi Techniques
• Consensus mapping
93
Management lnfom1ation Systems
"Pay OffMatrix" is one ofthe more commonly used and essential quantitative technique of
Decision Making. It helps in summarizing the interactions ofvarious alternative actions and
events. The Pay OfTMatrix takes into account the 'Probability' (i.e., the degree of
likelihood that a particular event would occm). Probabilities range in value from 0 (no
chance of occurring) to 1 (certain chance of occurring). The probabilities are usually
expressed in terms of percentages, or as the number of times the event is apt to occm in a
hundred trials.
By using probabilities a Pay OffMatrix is prepared, which provides the decision- maker
with quantitative mea<;ures of the Pay Off for each possible consequences and for each
alternative under consideration. This is known as Expected Value (EV).
Positive Pay Off implies profit and Negative Pay-Off implies loss. Let us illustrate the use
ofPay Offby the following example :
A businessman wants to invest Rs. I ,00,000 in a new business. He has identified three
alternatives- Activity A, Band C. The businessman has worked out the probabilities of
his return on investment. He has estimated that there is a probability of0.40 that sales will
be high and a probability of0.60 that the sales will be low.
The Pay OffMatrix based on the data available with the businessman. Refer to Table 4.2.
94
Unit 4 Management and Decision Making
Altema~~Probability
igh Sales
: 0.40)
I Low Sales
(Probability : 0.60)
-t Rs. 45,000 - Rs. 10,000
From the Pay OffMatrix, the Expected Value ofthe investment inActivity "A" will be
as follows:
The Pay Off Matrix shows that the Activity 'B' can give him the best possible return,
among the three alternatives.
It must, however, be remembered that the Pay OffMatrix bas an obvious weakness. It is
dependent on the decision maker's judgement ofthe possible outcomes for each alternative
and also the values the decision-maker assigns to each.
At the same time, it must also be remembered that the Pay OffMatrix forces the decision
maker to make a firm judgment about what he thinks may happen and the worth to him
ofthose outcomes.
The Pay OffMatrix docs not make a decision but it docs force the decision maker
to be more realistic about possible outcomes.
95
Management Information Systems
2. Decision Tree
It is a useful technique for presenting analysis when the decision maker has to make
a sequence of decisions. It is referred to as Decision Tree as different alternatives
form branches from an initial decision point (known as Decision Node) and then
moves on to various options emanating from different points (called Chance Nodes).
Thus, to summarize, the decision tree is a means ofrepresenting the sequential multi-
stage logic of a decision problem. The decision tree technique is oriented to show
decision paths that may be taken rather than the criteria for selecting a given path. It
is convenient for showing the probabilities for outcomes,
96
Unit 4 Management and Decision Making
Standard Presentation :
97
Management Information Systems
3. Decision Rules
Decision Rules and Decision Tables arc used together. Decision Rules enable decisions
to be made better and more economically. Decisions could also be faster and
more accurate. Decision Rulesn'ables arc to be used for programmable or routine/
operating decision. It is, therefore, imperative that Decision Rules are documented.
4 Decision Table
Decision Table documents rules that select one or more actions based on one or
more conditions from a set of possible conditions. It is precise and compact.
Decision Table may include both qualitative and quantitative bases for decision
making.
Decision Tables are in the form of"lf" LISTINGS and "THEN" LISTINGS. The
"IF" listings stipulate the required conditions and the "THEN" listings provide the
actions to be taken ifthe conditions exist.
The "IF" LISTINGS form the 'CONDITION STUB' and the "THEN" LISTINGS
form the 'ACTION STUFf.
The Decision Table helps the analyst consider all options, conditions, variables
and alternatives. It must, however, be remembered that this technique has to be
used in conjunction with other techniques.
RS..Acti.Yity B :
Draw a decision tree to show the fixed deposits schemes offered to customers in a bank
98
Unit 4 Management and Decision Making
While the decisions should normally be based on rationality, what is observed is that
our rationality, in reality, is conditioned by various factors/constraints like
financial, technical, administrative etc.
In view of this reality of situation, the Principle of Bounded Rationality comes into
existence. It implies that it is practically difficult, almost impossible, to take a completely
rational decision. The Principle of Bounded Rationality, therefore, highlights the fact
that as it is not possible to arrive at a scientific solution, it is worthwhile to carry on
and arrive at workable decisions which fit into the Principle ofBounded Rationality.
In other words, workable decision is the starting point of a scientific solution which is
the ultimate goal that one must strive to achieve.
Decisions based on intuitions are those where logical explanation is not possible
though the decision-makers themselves will believe, and like others to believe, that
their approach/decision is and would be the right one.
99
Management Information Systems
Every manager has to take decisions and, in a way, every manager is a model of decision-
making himself. However, in the context of our discussions, we would note the following
decision-making models :
1. The Classical Model
2. TheAdministrativeModcl
3. The Herbert Simon Model
Under the Administrative Model, the manager is more concerned about himself As
such, when confronted with a decision-making situation, the manager would collect
WHATEVER information could be available and take a decision which may not be in
the best interests ofthe organization but would certainly be in the best interests ofthe
manager.
The Herbert Simon Model is related to the Decision Making Process. The Simon
Model describes the core of the Decision Making Process and is generally used
as the basis for describing the Decision Making Process.
According to the Herbert Simon Model, the Decision Making Process consists
ofthe following three inter-related phases :
a. The Intelligence Phase
b. The Design Phase
c. The Choice Phase
100
Unit 4 Management and Decision Making
The Intelligence Phase requires extensive and comprehensive data base. It, therefore,
involves searching or scanning ofthe environment- both internal as well as external
-for conditions, which indicate or suggest problem or opportunity. The activity of
search for problem/opportunity involves a scan ofthe environment.
The environment for the purpose ofdiscussions in the Herbert Simon Model is divided
into three broad categories :
1. Societal Environment
2. Competitive Environment
3. Organ.b.ational Environment
The Societal Environment : The societal environment would include the economic,
legal and social environment in which the organization operates.
101
Management lnfonnation Systems
The Design Phase then leads to the third and fmal phase ofthe Simon Model viz., The
Choice Phase.
The Choice Phase leads to the selection of a specific alternative or course of action
from the ones generated and considered during the Design Phase. The Choice Phase
requires the application ofa choice procedure and the implementation ofthe chosen
alternative.
There is a flow of activities from intelligence to design to choice, but at any phase
there may be a return to a previous phase. For example the decision maker in the
choice phase reject all alternatives and return to the design phase for generation of
additional alternatives.
102
Unit 4 Management and Decision Making
While, undoubtedly, the Simon Model provides the core ofthe decision-making process,
it must be noted that it docs not go beyond the Choice Pha'>e, The Simon Model thereby
excludes or does not take cognizance of the implementation and the feedback aspect<;,
which are inseparable part ofthe decision making process, as in vogue now.
In this context, it would be both relevant and pertinent to keep in mind the following steps
of a decision making process, suggested by Rubenstein and Hcrbertson :
Notwithstanding the limitation ofthe Simon Model, the fact remains that it is relevant to the
design ofint(xmation support for decision making within the management information system.
4.7 SUMMARY
A decision is the choice out of several options made by the decision maker to achieve
some objective in a given situation. Decisions could be made under different types of
environment viz., ambiguity, certainty, uncertainty and risk. Decisions can either be
programmed decisions which are taken at lower levels ofmanager and non-programmed
decisions which are taken at higher levels ofmanagement.
Various decision making models arc:- The Classical Model, The Administrative Model
and The I lerbert Simon Model
Limitation ofthe Simon ~odel is that it docs not go beyond the Choice Phase. The Simon
Model thereby excludes or does not take cognizance of the implementation and the
feedback aspects, which are inseparable part of the decision making process.
103
Management Infom1ation Systems
The steps of decision making process, suggested by Rubenstein and Herbertson are:
1. Recognition ofproblem or need for decision.
2. Analysis and statement ofalternatives.
3. Choice among the alternatives.
4. Communication and implementation ofdecision.
5. Follow up and feedback ofresults ofdecision.
A. Answerthefollowing
1. Modem management is a combination ofart and science. Discuss
2. Modem management relies on MIS
3. Explain the various models of decision making
4. Expl~in different types ofdecisions.
5. List down the various tools ofdecision making and briefly explain each ofthem.
6. Herbert Simon Model allows backtracking. Justiiy
7. What are the principles used in decision making?
8. Explain the steps of decision making process suggested by Rubenstein and
Herbertson
104
Management Information Systems
5.1 INTRODUCTION
Initially, while opening our discussions about MIS, we have said that MIS is a System,
which provides Information to the Management. We have also said that we are living in an
Inforn1ation Age. Information is ofcritical importance for setting up, running, survival and
prosperity of a Business Organization. Information is also imperative today as it enables
an organi:~ation to gain and retain competitive edge and emerge winner.
We will now discuss the concepts of information in more details as MIS is centered around
information. But what is fufmmation?
Information is derived from data. Data is nothing but a random, unorganized collection of
indications or measurements ofcertain qualities or attributes relating to an entity, recorded
either in alphabetical, numerical, alphanumerical, voice, image, text or any other form.
Information, on the other hand, is like a finished product. Information, therefore, is defined
as data that is collected, collated, processed, logically organized and analyzed so as to be
of use to the decision maker.
Information, according to Davis and Olson, is "data that has been processed into a form
that is meaningful to the recipient and is ofreal or perceived value in current orprospecti.ve
actions or decisions".
Information is, therefore, the difference which makes the difference. Information brings
clarity and creates an intelligent human response in the mind.
108
Cnit 5 Information
ItwIll thus, be observed that for data to be converted into information, it has to undergo
processing as illustrated hereunder. Refer to Fig. 5.1.
[ Stored Data I
_I
(§put (Da~ j Processing (Processor) I _.[ Output (In~ormation) I
Fig. 5.1 Data Processing
Capturing e d_ _ ___~
--+-D_a_ta from an event/transaction has to be record_
r-- -- I
~erifYing Data has to be checked/validated for correctness !
Clas..c;;ifYing Data has to be placed in specific categories
- - - 4- -------~
109
........
Management Information Systems
£S"Activity A~
a) State the difference between hardcopy and softcopy
Information Presentation
Presentation ofthe information is an art. The data may be collected in the best possible
manner and processed analytically, brining lot ofvalue in the information; however, if it is
no presented properly, it may fail to communicate anything of value to the receiver. The
degree of communication is affected by the methods of transmission, the manner of
infmmation handling and the limitations and constraints of a receiver as the information
processor and the organization as the information user.
Information should be summarized, the principle behind summarization is that too much
information causes confusion, misunderstanding and missing the purpose.
Information is not only relevant but also critical for the decision maker as the quality of
decision making is dependent on the quality ofinformation. More specifically, information
is useful for the decision maker as:
1. Information helps in minimizing, ifnot eliminating altogether, the elements ofrisk and
uncertainty in decision making.
110
Unit 5 Information
4. Information helps to achieve the most optimum results within given constraints and
5. Information affects the decision making behavior and makes the difference.
Data is the foundation of all information. A few aspects of data, sources of data and
methods of collecting the data for the purposes of converting them into infonnation arc
described in the paragraphs which follow.
Primary and Secondary Data : Data arc the raw materials used for obtaining information.
Data is derived from a number of sources, both intemal as well as extemal. Ifthe data is
collected for. the first time by the researcher, it is classified as Primary Data. If, however,
data is borrowed by the researcher from other sources, it is referred to as Secondary
Data.
Primary data could be gathered directly from the respondent. Different techniques like
observations, questionnaires, interviews etc. can be used for obtaining primary data, which
can then be converted into information.
Classification ofinformation
Ill
Management Information Systems
4. Non-recurring: Non repetitive in nature. Example: The financial analysis or the report
on the market research.
5. Internal Information : The information generated through the internal sources of the
organization.
6. External Information : The information generated through external sources
Example: Government reports etc.
MIS should provide the information which has a surprise value and which reduces the
uncertainty. It should simultaneously build the knowledge base. While designing MIS, due
regard should be given to the communication theory oftransmitting the information from
the sources ofthe destination. MIS should usc the redundancy of data and information as
a measure to control the error in communication
Information is a quality product for organi7ation. The quality can be ensured ifthe inputs to
the MIS are controlled on the factors of impartiality, validity, reliability, consistency and
age. MIS should give regard to the information used for planning, performance control
and knowledge database.
Recognizing that the information may be misused if it falls into wrong hands, the MTS
design should have the features of filtering, blocking, suppressions and delay delivery.
PS.Actiyity B :
a) Distinguish between primary data and secondary data. Along with examples
- - - - - -- - - -- - --- - - -- - - - - - - - - - - - -
b) Information minimizes risk. Do you agree with this statement? Justify your answers
with the help ofexamples.
112
Unit 5 Information
1. Strategic Level
For Strategic decision making, one needs strategic information, which is wholistic,
unstructured and draws heavily from the external environment. It would also require
more futuristic inputs like the emerging technologies, competition, consumer
preferences, socio-eco-political changes etc. as these inputs would be used for long-
term planning.
2. Tactical Level
3. Operational Level
Apart from the three types as stated above, we could also divide information into Planning
Information and Control Information. The planning and control information could be
differentiated as in table 5.2.
113
Yianagcment Information Systems
~nninglnformation J C~Information 1
rIt covers the whole organization IIt is c~nc~med with smal-1,-sp_e_cific part of
~---- __ orgaruzation_._ _ _ _ _ _ _ _ _ _ _ -;
' It has a longer time span It has a shorter time span
-- - - - - - - - - - - -·
I It looks for and analyses It looks for specific details for functional
I trends/patterns
Used for working futuristic
activity.
- - - ----- -- -- '
~nds/forecas_t._____ _ ___________ _j
5.6 ATTRIBUTES OF INFORMATION
Information, to be ofusc for the decision maker, has to possess certain attributes as stated
hereunder:
• Timely availability
• Accuracy
• Reliahili~
• Periodicity/Frequency
• Verifiability
• Pertinent/Relevant
• Completeness
• Comprehensibility
• Clarity
• Consistency
• Brevity
• Cost effectiveness
Needless to add, more attributes the 'infmmation' possesses, better the quality it would
have, leading to higher value ofsuch infom1ation for the organi:t..ation and decision maker.
Unit 5 Information
~Activity C :
More attributes the 'information' possesses, better the quality it would have. Do you agree
with this statement? Justify your answers.
A human being can hear, se-e, touch, feel and smell. These senses are then transmitted to
the brain which analyses them and then comes out with appropriate response. This human
behavior could be seen/explained in terms ofinformation processing.
The sensory receptors (cars, eyes, nose, etc.) pick up/receive signals which are then
transmitted to the brain. The signals arc then processed by the brain and appropriate
responses are communicated. Thus, the signals from sensory receptors become inputs. ·
These signals are transmitted through the nervous system which acts as a channel or medium.
These signals arc communicated to brain where, while processing the signals, the brain
acts as a Central Processing Unit. The processing leads to responses, which cati be.
considered as outputs.
I Memory J
Input From Mental Output
Sensory Processing Channel ~ Response
Receptors
115
Management Information Systems
However, human beings cannot go on accepting unlimited inputs and keep coming up with
unlimited outputs, as the human capacity to accept input<; and offer outputs is rather limited.
Ifthere is too much of input, the human capacity will simply be unable to accept the input
and correspondingly, the output will also be reduced/restricted. This "too much of inputs"
affecting the output is considered as "overloading".
To avoid this eventuality, humans restrict input to a manageable quantity by being selective
in accepting some inputs and blocking other inputs. This process leads to creation offilters
resulting from :
(a) Frame of reference of the person concerned, based on prior knowledge and
expenence.
(b) Normal decision procedure.
(c) Decision making under stress.
This process of filtering can be illustrated in Fig. 5.3 & Fig. 5.4.
L
Input
· =uli=-·
s:::..::tnn
:::..::
;I
_j-1-_-_-_-_-_.•;.
~___....
FilteS
Mental 1
: Processing
Input Mental
Stimuli 1----- : Processing
----l•l
- ·- --__J
It may be noted that, filtering, apart from blocking unwanted data, may also block data
which is not considered to be consistent with the established frame ofreference. This, in
turn, may result in errors ofperception like omission, distortion, inferences etc. These
errors ofperception may reduce information content.
Data
Storage
116
Unit 5 Information
Allel Newell and Herbert Simon have proposed a model of human problem solving and
human information processing system. According to the model, the human information
processing system consists ofa processor, sensory inputs, motor output and three different
memories- Long Term Memory (LTM), Short Term Memory (STM) and External Memory
(EM) as illustrated hereafter. Refer to Fig. 5.6.
Processor t - - - - -- -
~ ShortTermMemoty
Input • blementary Processor 1--------. Output
Interpreter
I
I
The human memory can perform only one information processing task at a time (known as
Serial Processing) rather than processing number of tasks at a time (known as Parallel
Processing).
Receptors
Environment Processor
+-I Effectors
117
:vtanagcmcnt Information Systems
r
1
Storage
~ t-
Input
L - - - - --
:
_ ___,•~ Processo~--~•~L Output
Obviously, then, defining the specific information requirements becomes the most critical-
and therefore the most difficult- task for the Systems Analyst. This is one area where
many large system efforts could go wrong, bringing the edifice of the organizational
information system crumbling down as faulty requirements analysis is a leading cause of
systems failure and high systems development costs. Analyzing and assessing information
requirements/needs, therefore, must be given the attention and importance it deserves.
.A\
Strategic Senior
Level Jl~ Managers
Management • • a. Midd le
Level - \llanagcrs
Operational Operational
Level Managers
~
>
r. :::::::
(!;
~
c:
::l r.
::>:> 0
c: "'c:::
0 3
::::s
r.
r. ~. <=!
(;
"'::::s
::::s
cr.; "'
Fig. 5.9 Hierarchy LeveVActivity/Function-wise: Information Requirements
118
Unit 5 Information
There are four reasons which make it difficult to obtain a correct and complete set of
information requirements:
1. The constraints on humans as information processors and problem solvers.
2. The variety and complexity ofinfonnation requirements.
3. The complex patterns ofinteraction among users and analyst in defining requirements.
4. Unwillingness of some users to provide requirements.
Information requirement is a detailed statement ofthe information needs that a new system
must satisfy. It involves identifying who need"> what information, where, when and how.
Information requirement analysis carcfi.dly defines the objectives ofthe new or modified
system and develops a detailed description ofthc functions that the new system is expected
to perform. Requirements must consider economic, technical and time constraints as well
as the goals, procedures and decision processes of the organization.
Information requirements need to be established at three levels for the purpose ofdeveloping
implement-ing organizational information system. The three levels are as follows:
1. Organi7.ationallnformation Requirements.
2. The requirements for each database defined by data models and other
specifications.
3. The detailed information requirements for an application.
119
Management Information Systems
;
0 Q)
t)
·.p
t)
~ ~ ·~ ·~ !::::!::::
0:§
~
0 ell
~ ta ;>
~ ~ §: ~
t)
Q)
p::: .s .s ::E ~ ........ C/:1 ~ < ~<t:
Mgrs
MgrA
MgrB
MgrC
MgrD
MgrN
.Fig. 5.10 An illustrative manager by sub-system matrix
120
t:nit 5 Infommtion
While conducting interviews, three sets of questions are asked to improve the
chances ofobtaining a complete set ofrequirements. The three sets of questions
are:
1. What problem do the managers have and what information is needed for
solving them? What decisions do the managers make and what information
do they need for decision making?
2. What factors are critical to the success ofthe managers activity and what
information do they need to achieve success in them or monitor progress?
3. What are the outputs (ends) from managerial activities and what information
do they need to measure effectiveness in achieving the outputs? What
resources are used in producing the outputs and what information is
needed to meac;ure efficiency in use ofthe resources?
(These questions are derived from three approaches viz., Business System
Planning, Critical Success Factors and Ends - Means Analysis, which are
discussed later).
Data base requirements arise both from applications and ad-hoc queries. The overall
architecture for the database to meet these requirements is defined as part of the
organizational information requirement. Major classes of data are then defmed and
associated with organization processes that require them.
The process of obtaining and organizing a more detailed database requirements can
be divided into defining data requirement as perceived by the users (conceptual or
logical requirements) and defining requirements for physical design ofthe database.
121
Management lnfom1ation Systems
for the determination of information requirement at the application level defines and
documents specific information content as also design and implementation
requirements.
The technical requirements, based on information needed for performing task/job, specify
inputs, outputs, stored data and information processes. The structure and format of data
are important in arriving at technical requirement.
The technical requirement also include interface requirements between the user system
and the applications system. The interface requirements include data presentation format,
screen design, user language structure, feedback and assistance provisions, error control
and response time.
1. Asking Questions
Asking questions is one ofthe more frequently used mode ofassessing information
requirement. Questions arc asked to persons associated with usc of system/application
to obtain their requirement<;.
Some 'asking' methods are mentioned below with comments on conditions that suggest
their use. Refer to Table 5.3.
122
t:nit 5 Information
Closed Questions Each question has a defmed i When set of factual responses
set ofpossible answers from not be able to recall all
are known or respondent may know all possible responscs.
which the respondent selects. possibilities. Analyst must
-
Open Questions No answers provided. When feelings or opinionsare
Respondent is allowed to important or when respondcnt
formulate responses. has knowledge and abilityto
formulate responses
~~
Group Consensus The participants arc asked for Used to arrive at 'best'
their estimates or expectations judgmental estimate of
regarding significant variables variables that arc difficult
Delphi Method and Group or impossible to estimate
Forming arc examples quantitatively.
One or more asking methods can be used either alone or in conjunction with other tools,
to assess information requirement.
123
Management Information Systems
3. Ends-Means Analysis
The technique separates the definition ofends (or outputs) generated by an organization
process, from the means (inputs) used to accomplish them. As the end/output from
one process is the input for next/some other process, the ends-means analysis brings
out information requirement effectively.
The ends-means analysis is based on the Systems Theory. A model of the ends-
means analysis is provided hereunder. Refer to Fig. 5.11.
Process
fuputs ..,
Outputs
...
Feedback - Effeciency
'--- - - --
Feedback- Effectiveness
124
Unit 5 Infom1ation
The CSF technique involves a two step process of eliciting the critical factors and then
deriving infonnation requirements. lbis can be used at both the organization as well as
application level.
For arriving at tl::e CSFs, the personal interview technique is generally used. The interviews
are generally confined to the Top/Senior Executives. The personal CSFs are then aggregated
to arrive at the o;;ganizational CSFs, which in tum bring out the information requirements.
Refer to Table 5.4
Pros ICons ·-
• It produces a smaller data set • The data may be simply aggregated
toanalyLe. without any rigor I analysis.
-
• There is a clear focus. • There could be, generally, confusion
between individual and organi'l.ational
CSFs.
• It can be customized and tailor-made • It may be biased towards Top
to suit specific industry/organi'lation. I Manager.
I
• It takes into account the changing • It may not necessarily overcome the
environment. impact of a changing environment or
changes in manager.
• It may help bring about consensus • Undue emphasis on higher level of
among the Top Management. hierarchy at the cost oflower level
functionaries.
-
125
Management lnfonnation Systems
The various steps involved in the Business System Planning or Enterprise Analysis method
arc:-
126
Unit 5 Information
•
Determining the Executive perspective
r
Resource Manageme~
- t -------~
Defining Architecture Prioritic~ J
(Source : Business Systems Planning - Information Systems Planning Guide, Third Edition, Ci£20-
0527, IBM Corporation, 983, p. 25)
In addition to the major methods discussed earlier, there are certain other methods for
determining information requirement a<; follows :
• NormativeAnalysis
• DecisionAnalysis
127
Management Information Systems
5.12 SUMMARY
Information is not only relevant but also critical for the decision maker as the quality of
decision making is dependent on the quality of information. Information can either be
extracted from primary data or secondary data. While designing MIS, due regard should
be given to the communication theory oftransmitting the information from the sources of
the destination.
Human capacity to accept inputs and offer outputs is rather limited. Ifthere is too much of
input, the human capacity will simply be unable to accept the input and correspondingly,
the output will also be reduced/restricted. This "too much of inputs" affecting the output is
considered as "overloading". To avoid overloading, filtering process should be adopted
Critical Success Factors are a small number ofeasily identifiable operational goals shaped
by the industry, the firm, the manager and the broader environment that arc believed to
assure the success of an organization. Ifthese goals arc achieved, then the organization's
success is assured. The CSFs arc, therefore, used to determine the information requirements
of an organization.
The BSP method, also called, Enterprise Analysis, this method encompasses an analysis
oforganization-wise information requirements by looking at the entire organif.ation in terms
oforganization units functions, processes and data elements. It helps identify the key entities
and attributes in the organization's data.
128
Management Information Systems
6.1 ~TRODUCTIO~
These systems were called the Decision Support Systems and, by the end- 1980s, were
extended to groups and entire organizations.
The Decision Support Systems are interactive information systems, that rely on an integrated
set ofuser-fiiendly hardware and software tools to produce and present information that
is targeted to support the management in the decision making process.
While MIS is considered useful for structured decisions. Decision Support System (DSS)
is considered to be more useful for decisions at the tactical/strategic levels, where decision
makers are often confronted with complex decisions which arc beyond their human abilities
to synthesize properly the factors involved.
DSS refers to a class of systems which support in the process of decision making and
docs not always give a decision itself. These systems can be used to validate decision by
performing sensitivity analysis on various parameters ofthe problem.
1. The Database
2. A Model Base
134
Unit 6 Decision Support System
l. The Database
2. The Modelbase
DSS can and does make us~ of uifferent types of models. The models could be
broadly classified into three t) pes Refer to Fig. 6.1 .
* ..----*,.____
!Beha~o~l ~tanagement l Operations l
~d~ Science _ lodel Research Mod~ j
b. Management Science ~odel : These models are developed based upon the
Principles ofManag~ment. ManagementAccomuing and Econometrics, among
others.
135
Management Information Systems
3. The DSS Software System : The DSS Software System permits easy interaction
between the users ofthe system and the DSS databa..c;e and modelbase. The DSS
software system manages the creation, stomgc and retrieval of models in the
modelbase and integrates them with the data in the DSS database. The DSS software
system also provides a graphic, easy to use, flexible user interface that supports the
dialogue between the users and the DSS.
While developing DSS, the focus must be on idcntifying a problem and a set ofcapabilities
that users consider useful in arriving at decisions about that problem.
While developing DSS, therefore, care must be taken to ensure that the DSS possess the
following desirable characteristics :
1. Should aid the decision maker in decision making.
2. Should be able to address semi/un-structured decision making situations.
3. Should support decision makers particularly at tactical/strdtegic levels.
4. Should be able to create general purpose models, simulation capabilities and othc
analytical tools available to decision maker.
5. Should enable users to usc DSS without assistance from MTS/Technical professionals.
6. Should be readily adapted to meet information requirement for any decision
environment
7. Should provide mechanism to enable rapid response to a decision maker's request
for information.
136
Cnit 6 Decision Support System
DSS lays, emphasis on providing capabilities to answer questions ,such as what is? why?
what if? what is best? what is good enough? Refer to Table 6.1.
To be able to provide the answers to questions as mentioned earlier, the DSS requires
four core capabilities as illustrated hereafter. Refer to Table 6.2.
The following factors are considered critical for the success/H"iilure ofthe Decision Support
System: ·
1. UserTraining!Jnvolvement
2. User Experience
3. Length ofUse (Familiarity)
4. Top Management Support
5. Orientation toward Top Management
6. Novelty ofApplication
7. Return on Investment
(Success has been perceived here -to quote Alavi and Toachimsthaler (1998} and Sanders
and Courtney, 1985)- as "perceived improvement in decision making and overall satisfaction
with the DSS.")
£5 Activity A :
How do you think implementing a DSS in an organization would change the working of
the organization? Explain with the help ofan example.
138
Unit 6 Decision Support System
-
Emphasis is on data storage. Emphasis is on data manipulation.
Delivers system based on frozen Follows iterative process hence ~urrcnt
requirements data.can be used.
-
Provides only indirect access to data Managers have direct access to data.
by managers
Reliance on computer expert. Reliance on managerial judgment I
-
Access to data possibly requiring a Direct access to computer and data. Hence I
'wait' for manager's turn. no wait.
MIS manager may not completely Manager knowing nature ofdecision
understand the nature of decision. and decision making environment
Emphasis is on efficiency. Emphasis is on effectiveness
Users interface with the Dialogue Management components, which is a set of programs
that manages the user interface and translates the user's request<; into commands for the
other two components.
The Model Management component maintains and executes models ofbusiness activity.
Examples of such models arc spreadsheets, financial models and simulation models. It is
used to create, store and modify models and to cause them to be involved. The Data
Management component maintains DSS data. Its tasks include managing the DSS database,
which contains both intermediary and final results ofDSS studies and managing interfaces
to enterprise data, which is external to the DSS and data from external sources. Refer to
Fig. 6.2.
139
Management Information Systems
Model
Base
USER
140
Unit 6 Decision Support System
The request translator is to translate the user command into actions for the model
management or data management component<> into a format understandable by the user.
Since flexibility and case ofusc arc important in DSS, GUls arc becoming the standard
for DSS applications. Database is normally through SQL.
2. Model Management: The command processor receives the commands from the
dialogue management components and delivers those commands from the dialogue
management components to either the model base management system or the mode
execution system. Refer to Fig. 6.3.
b. Model :vtanagcmcnt
14l
Management lnfonnation Systems
3. Database Management: Two functions for this are first, it stores and manipulates the
database as directed by either the model management component or the dialogue
management component. Secondly, it maintains an interface with data sources that
are external to the DSS viz. TPS database, inter enterprise systems, external data
utilities and other DSS applications.
4. Accounting system
These systems are not necessarily required for decision making by they arc desirable
to keep track of the major aspects of the business or a function. These systems
142
Unit 6 Decision Support System
account items such as cash, inventory, personnel and relate it to a norm or norms
developed b the management, for control and decision.
These systems arc simulation models or optimization models for decision making.
These decisions, generally are one time and infrequent and provide general guidelines
for operation or management.
Examples' Product mix, job scheduling rules etc. Refer to Table 6.4.
£S Activity B:
What would be the consequence if a DSS fails in an organization?
- - - - ··- - -
143
~anagl!ml!nt Infonnation Systems
Earlier we have discussed the vmious aspects ofDecision Support System (DSS), where
the respective executive/decision-maker arrives at effective decisions by using a Decision
Support System Thus, the DSS is designed for and used more by the individual decision-
maker.
Hence, the DSS application was suitably extended/expanded to facilitate Group Decision
Environment and the DSS for a group came to be known as the Group Decision Support
System (GDSS). 1t is also referred to as a Group Support System or a Computerised
Collaborative Work System (CCWS). We would, however, refer to this extendedlexpm1ded
form ofDSS as the GDSS.
Under the GDSS Environment, the members ofthe group utilize the DSS as a group and
the user-interface is expanded to include the computers which are suitably connected I
networked. In this way, under the GDSS, members ofthe group can communicate using
their computers with DSS or with other members ofthe group to facilitate optimal decision-
making.
What is GDSS?
We have discussed what a GDSS is like. Let us now note the specific defmition ofGDSS.
GDSS Components
The GDSS components are similar to that ofthe DSS components. The GDSS has three
144
Unit 6 Decision Support System
basic components viz. the Hardware, the Software, the People and Procedure, as illustrated
hereafter:
GDSS Configuration
145
Management lnfonnation Systems
Model
Database
Base
' GDSS
Software
Access to External
intra/internet, ElCternal
Database
network and Database
Access
computer systems
Dialogue
Manager
User
(a) Anonymous inputs without identifying the source of inputs to enable group decision-
makers to concentrate on the merits ofthe input without considering who gave it.
(b) Parallel communication/s to enable every group member to address issues or make
comment~suggestions simultaneously.
(c) Automated record keeping by anonymously recording each comment that is entered
into the PC by the group member, for future review and analysis.
146
Unit 6 Decision Support System
The success ofGDSS would depend upon the quality ofthe meetings/discussions/ interface
being "productive", ensuring more effective and efficient use oftime and ability ofthe
group-members to produce the desired results in fewer meetings/interfaces.
fe'S Activity. C :
How would a GDSS help when more than one decision maker had to make a decision?
147
Management Infonnation Systems
Why EIS/ESS?
EISIESS emerged, indeed the emergence became imperative, due to various factors both
internal and external, obtaining in the corporate operating environment world-wide.
According to Watson and others, EISIESS has become imperative due to certain internal
and external factors as enumerated hereafter :
1. Internal Factors
• Necdfortimclyinformation.
• Need for improved communications.
• Need for access to operational data,
• Need for rapid status updates on various business activities
• Need for access to corporate database
• Need for more accurate information
• Need for ability to identifY historical trends
2. External Factors
• Increasing and intensifying global competition.
• Rapidly changing business environment,
• Need to be more pro-active.
• Need to access external database.
• Increasing Government regulations (though active Government Role is shrinking).
While, earlier, most ofthe Top Executives were reluctant users oflnformation Technology,
the new generation oftech-savvy Top Executives are not only open to, but actually expect,
support from Computer-Based Information Systems like EIS/ESS.
148
Unit 6 Decision Support System
Accordingly, many organi7.ations have gone in for development ofEIS/ESS to assist Top
Executives decision-making. Looking at EIS/ESS from a historical perspective, the findings
of a study carried out/released by the Center for Information Systems Research (CISR) at
the MIT, C.S.A., would be quite interesting. In 1986, when the study was released, about
30% oflarge U.S. Cmporations had EIS/ESS developed/installed. This figure had grown
to more than 50% in 1989. EIS/ESS is presently observed to be effective in practically all
major corporations worth their names.
What is EIS/ESS?
EIS/ESS is, in a way, specialized DSS that includes all hardware, software, data, procedures
and people used to assist senior/top level executives within the organization. The primary
goal of EIS/ESS is to obtain data from a variety of sources, integrate and aggregate that
data and display the resulting information in an easy-to-use comprehensible format.
While there are different dcfmitions ofElS and ESS, for all practical purposes the terms
arc used interchangeably. And, in this text, except for noting the different definitions, we
too are going to usc the terms interchangeably. We would be using the tenns EIS and ESS
interchangeably as the characteristics, capabilitjes and users are almost identical.
EIS Definition
An EIS is "a computer-based system that serves the information needs ofTop Executives.
It provides rapid access to timely information and direct access to Management Reports.
It is very user-friendly and is supported by graphics, providing Exception Reporting and
Drill Down capabilities. It can also be easily connected with on-line information services
and electronic mail".
(Drill Down capability is an important capability that enables the users to break down data
in details. It enables users to identify both problems and opportunities).
ESS Definition
An ESS is "a comprehensive executive support system that goes beyond the EIS to include
communications, office automation, analysis support and intelligence",
149
Management Information Systems
EIS/ESS Characteristics
Broadly, for the sake of convenience, the characteristics could be divided into three
categories :
1. Informational Characteristics
• Flexibility and ease ofuse.
• Provides timely information with short response-time and quick retrieval.
• Produces correct information.
• Produces relevant information.
• Produces validated information.
2. User-Interface/Orientation Characteristics
• Contains sophisticated 'self-help', user-friendly interfaces including Graphic User
Interface (GUI).
• Facilitates access from many places.
• Provides secure, reliable and confidential access and access procedure.
• Is customized I tailor-made to suit the management style ofindividual executives.
3. Managerial/Executive Characteristics
• Provides support for defining overall Vision, Mission and Strategy as it has a
strategic/futuristic orientation.
• Provides support for Strategic Management (Strategic Planning/Organising/
Control/Staffmg etc.).
• Can help with situations that have a high degree ofrisk/uncertainty.
• Is linked with value-added business processes.
• Supports the need/access for/to the External Data/Databases,
• 1las capabilities like 'Drill Down', 'Exception Reporting' and 'Critical Success
Factors' identification.
• Has a high Result/Performance Orientation.
150
t: nit 6 Decision Support System
EISIESS Capabilities
EIS/ESS Benefits
With the type of capabilities, as mentioned earlier, the ETS/ESS confers lots ofbenefits
upon the users- both individual and corporate. EIS/ESS can be summarized as follows:
151
Management Infom1ation Systems
6. 7 EXPERT SYSTEMS
Expert Systems arc among the most exciting computer applications to emerge during the
1980s. The first acclaimed commercial 'Expert System', DEC's 'XCON', was put into use
in 1981. Expert Systems Building Tools (like WAX, OPSS, 'Expert Ease, KEE, 5.1)
were first offered for sale around 1983. The number of successfully fielded expert systems
mushroomed since 1984 as high level development tools became widely available.
While the years 1985 and 1986 were real 'HOT' years for Expert System, 1987 and
1988 were relatively 'COLD' years as regards the market response to the Expert System.
The market has since matured and the 1990s witnessed increasing acceptance and
applications/uses of expert system to transform the way corporations developed their
software and used computers for managing their business.
The ES technology basically derives limn the research discipline ofArtificial Intelligence,
a branch ofcomputer science concerned with the design and implementation ofprogrammes
which arc capable of emulating human cognitive skillc; such as problem- solving, visual
perception and language understanding.
152
Unit 6 Decision Support System
Expert System mimic human expertise in a narrow domain to solve specific problems in a
well-defined area.
An Expert System has been defined differently by different people. As such, there is no
precise definition of an Expert System that is guaranteed to satisfy every one.
According to Peter Jackson, "An Expert System is a computer programme that represents
and reasons with knowledge of some subject specialist with a view to solving problems or
giving advice".
Robert Bowerman and David Glover have defined Expert System as, "Highly specialized
computer systems capable of simulating that clement of a human specialist's knowledge
and reasoning that can be formulated into knowledge chunks, characterized by a set of
facts and heuristic rules". (Heuristic Rules arc rules of thumb accumulated by a human
expert through intensive problem-solving in the domain of a particular task).
According to Bruce Buchanan and Reid Smith, an Expert System is a computer program
that -
(a) Reasons with domain-specific knowledge that is symbolic as well as numerical.
(b) Uses domain-specific methods that are heuristic (plausible) as well as following
procedures that arc algorithmic (certain).
(c) Performs well in the problem area.
(d) Explains or makes understandable both what it knows and the reasons for its
answers.
(e) Retains "flexibility".
Expert System, according to Hossein Bidgoli, "is a series of computer programmes that
attempt to mimic human thought, behavior in a specific area that ha<> successfully been
solved by human experts".
153
Management Information Systems
The various components ofthe Expert System could be illustrated in Fig. 6.5.
User
Interface
Knowledge
Advice and Base
explanation
Acquisition
Facility
Experts
Fig. 6.5 : ES Components
To be really effective and improve the quality ofproblem-solving, an Expert System should
possess the following capabilities :
1. Capturing ofexpertise
2. Codifying the expertise
3. Duplicating and transferring the expertise
4. Saving the human expert's time
5. Saving on maintenance and updating ofthe knowledge base.
Ralph Stair and George Reynolds have identified the following characteristics ofthe Expert
System:
1. Ability to explain their reasoning or suggested decisions.
154
Unit 6 Decision Support System
Expert Systems can be used to solve problems in practically every field and discipline.
Such systems can also help in various stages ofproblem-solving process. As such, Expert
Systems have been developed for a variety of complex applications. A few illustrative
applications ofExpert Systems arc :
1. Aerospace Technology (NASA)
2. Airline/Civil Aviation (Scheduling/Routing)
3. Banking and Finance (Viz. Credit Card limits)
4. Criminology
5. Education
6. Food Industry
Health Care Management (e.g. Diagnosing Blood Infections)
8. Manufacturing Design and Assembly
9. Geological Data Analysis and interpretation for oil exploration drilling sites
10. Personnel Management
11 . Security Analysis/Portfolio Management
155
Management Information Systems
2. As ES are based on a narrow range of codified domain, they may not be able to
tackle multi-dimensional problems.
3. Due to the narrow range ofknowledge incorporated in the ES, they typically do
not respond well to situations outside their range of expertise. Hence, they remain
what they are - Machine Experts!
4. Typical ES may not be able to make available common sense knowledge and
broad-ranging contextual information/s.
6. If a problem is not specific and has not been solved previously by an expert, or a
number of experts, then that problem is not considered suitable for the Expert
Systems implementation.
156
Unit 6 Decision Support System
Expertise, as we all know, has both its price as well as value. No wonder then that it is
difficult, expensive and time-consmning to develop sophisticated Expert System. It would,
therefore, be desirable to weigh the following aspects/considerations before an organization
decides to opt for Expert System.:
4. Will the system enable the expertise to be made available at multiple locations
simultaneously?
6. Will the system enable developing the solution faster than human experts?
RS..Activicy_D_:.
Are websites such as doctorsonline.com and astrology.com examples ofexpert system?
Justify your answers?
- -- -- -· -- -- -
Artificial Intelligence (AI) is an area which has over half a century of history. AI began in
earnest with the emergence of the computers during the late 1940s. It was the ability of
these machines to store large amount of data and process it into information at very high
speeds, hitherto unimaginable, that gave researchers the vision ofbuilding systems which
could imitate/emulate some, ifnot all, human abilities.
While some ground work had already been initiated earlier, it was not w1til the 1980s that
AI received popular economic and managerial acclaim. It was during this period thatAl
went through the transition from a primary research area to potential commercial
157
Management Information Systems
applications. It was only then that AI was accepted as an emerging technology and as such
attracted considerable attention.
AI system docs not replace people. They liberate experts from solving common/simple
problems, leaving the experts to solve complex problems. AI system help to avoid making
same mistakes, and to respond quickly and effectively to a new problem situation.
It is the science and engineering ofmaking intelligent machines, especially intelligent computer
programs. It is related to the similar task of using computers to understand human
intelligence.
Before moving into further discussion about Al, it would be desirable to compare and
understand the attributes of Natural (Human) Intelligence and Artificial (Machine)
Intelligence. Refer to Table 6.6.
158
Unit 6 Decision Support Syst<::m
To be artificially intelligent and also be able to come out with human-like responses,
computer must possess the following requisite features :
1. Understand what is 'Common Sense'.
2. Understand 'Facts' and relationships among 'Facts'.
3. Be able to manipulate 'Qualitative' data.
4. Be able to deal with exceptions and discontinuity.
5. Be able to interface with humans ina "Free-Format" fa'lhion.
6. Be able to deal with new situations based on previous learning.
AI Defmitions
Al has been defined differently by different people. Let us, therefore, note the various AI
definitions,
"AI is a branch qfcomputer science that is concerned with the automation ofintelligent
behavior".
-George Luger and William Stabblefied
"AI is a series ofrelated technologies that attempt to simulate and reproduce human
behavior, including thinking, speaking, feeling and reasoning".
- Hussein Bidgoli
"AI is a branch ofcomputer science concerned with the study and creation ofcomputer
systems that exhibit some form of intelligence : Systems that learn new concepts
and tasks, systems that can reason and draw useful conclusions about the world
around us. systems that can understand natural languages and perceive and
comprehend a visual scene and systems that per:form other types offeats that require
human types qf intelligence".
- Dan Patterson
The AI Canvas
Al today not only focuses on computer science and computers, but encompa'iscs a group
of related technologies and specialty areas like-
• Expert Systems
159
Management Information Systems
• Fuzzy Logic
• IntelligentAgents
• Natural Language Processing
• Neural~etvvorks
• Robotics
• Speech Recognition
• Vision recognized Systems
• Learning System.<:>
Nielson, a pioneer in the area ofAI, likes to characterizes the various areas/components
ofAl in terms ofwhathe calls, "ONION "MODEL" as illustrated hereafter. Refer to Fig.
6.6.
Modelling and
Heuristic Representation
Search of Knowledge
AI Common
Language Sense
and Tools Reasoning
and Logic
While the technology aspects ofAI arc almost in place by now, initial applications have
clearly demonstrated that AI can provide great leverage for corporate organizations.
160
Unit 6 Decision Support System
2. Project Management
3. Factory Management
4. Sales, Distribution and Field Services
5. Diagnosis and Trouble-shooting
6. Financial Management
7. Currency/Interest Rates SWAPs
8. Portfolio Management
9. Asset Liability Management
10. Readingllnterpreting Financials
11. Criminology
12. Geology (Drilling/Oil Exploration Sites)
Precaution
Notwithstanding the advances in AI, it must be remembered that AI Systems are not to
replace human decision-making completely. They are meant to replicate emulate human
decision-making for certain types ofclearly and well-defined problems - the Chess Matches
between Gary Kasporov (Natural Intelligence) and Deep Junior (Artificial Intelligence)
being a classic example ofAllES.
AI has, no doubt, started getting acceptance and credibility. The success ofAI as a mass-
market technology, however, would depend upon a number of practical factors like :
1. Cost
161
Management Information Systems
~Activity E :
Who would perform an operation on a patience better, a doctor in blood and flesh or a
robot with AI? JustifY you answers?
6.9 SUMMARY
The Decision Support Systems arc interactive information systems, that rely on an integrated
set ofuser-friendly hardware and software tools to produce and present information that
is targeted to support the management in the decision making process. DSS is considered
to be more useful for decisions at the tacticaVstrategic levels of management. DSS
application when suitably extended/expanded to facilitate Group Decision Environment
and the DSS for a group is called as the Group Decision Support System (GDSS) or
Group Support System or a Computerized Collaborative Work System (CCWS).
The ES technology basically derives from the research discipline ofArtificial Intelligence,
a branch of computer science concerned with the design and implementation ofprograms
which arc capable of emulating human cognitive skills such as problem- solving, visual
perception and language understanding. Expert System mimic human expertise in a narrow
domain to solve specific problems in a well-defmed area.
162