MS07 Combined PDF
MS07 Combined PDF
1.1 INTRODUCTION
The individuals are supported by IT to fulfill their roles. The management and the
business processes have become IT oriented. Organization structure and strategy are
also supported by IT. Whenever an external or internal pressure is felt by an
organization, IT helps the organization to plan critical response activities. The
changed government policy may create a pressure on an organization. But such a
pressure is distributed over a long period as government gives enough time to
organizations to respond to changed policies. But if there is a change in the behavior
of consumers, the organization should be able to identify the change. Moreover, they
1
Information Technology should be able to come up with a solution fast. IT helps an organization to anticipate
for Managers and stay ahead of problems. The organization can take proactive measures rather
than firefighting measures.
An organization can use an IT supported strategic system to increase their market
share. IT can help an organization negotiate better with their suppliers. Maintaining
and improving quality of products and processes in an organization needs regular
support, vigilance, and innovation. IT has been used extensively for productivity
improvement, reducing inventory and maintaining quality. Management Information
System (MIS) and decision support system (DSS) have been used to help
management in decision-making process.
Business process reengineering (BPR) has become the need to the day for every
business; BPR involves changing business processes in an innovative way. IT plays a
major role in BPR. Internet and Intranet help an organization in changing its business
processes to reduce cycle time and time to market a product. IT makes information
available to employees with different level of access. As a result, employees can be
given more independence to make decisions. The ERP, a strategic tool, heavily uses
IT to integrate business processes of an organization.
1.2 OBJECTIVES
After reading this unit, you should be able to:
• Define information technology and state the advancement of IT;
• Identify the different types of Information systems;
• Contextualize a business perspective of IT;
• Describe the significance of Internet and its business applications; and
• Explain the role of Computer Aided Decision System in business environment.
1.3 DEFINITIONS OF IT
Let us understand what information is. Information is the finished product for
which data is the raw material. The dictionary defines information as processed
data, which is used to trigger certain actions or gain understanding of what the
data implies.
Information has also been defined as data that have been put into a meaningful
and useful context and communicated to a recipient who uses it to make
decisions. Information involves the communication and reception of intelligence
or knowledge. It apprises and notifies; surprises and stimulates, reduces
uncertainty, reveals additional alternatives or helps eliminate irrelevant or poor
ones, and influences individuals and stimulates them to action. The information
must be received by the recipient within the required time frame and the information
must be free from errors.
The technology plays an important role in delivering timely and error free information
to its recipients. Technology includes hardware, software, databases, and
communication system. Hardware is a set of devices such as processor, monitors,
keyboard, and printer that accept data, process them, and display them. Software is a
set of programs that enable the hardware to process data. Database is also an
integral part of IT system, which is a collection of related files, tables, relation etc.
that stores data and the association among them. Network connects computing
resources of an organization and facilitates sharing of hardware and software. The
organization processes and people are integral part of an IT System.
Now we know what information is and what technology is. Now are ready for a
2 definition of IT.
Information Technology means the collection, storage, processing, Networking Technologies
dissemination, and use of Information. It is not confined to hardware and
software but acknowledges the importance of man and the goals he sets for his
technology, the values employed in making these choices, the assessment
criteria used to decide whether he is controlling the technology and is being
enriched by it.
Information Technology Serving Society, USA in 1979, has given the above definition.
The above definition clearly states that IT is an important tool, which must be used
properly. At one time, 60% people used to work in agriculture. Nowadays, in a
developed country, about 10% people work in agriculture and 40% people work in
information related fields. In a developed country such as US, 50% households have
computers and Internet connection. In India, only about 8 people out of every 1000
have access to computers. However, India is making steady progress.
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
A TPS is used primarily for record keeping which is required in any organization to
conduct the business. Examples of TPS are sales order entry, payroll, and shipping
records etc. TPS is used for periodic report generation in a scheduled manner. TPS is
also used for producing reports on demand as well as exception reports. 3
Information Technology Decision Support System (DSS)
for Managers
DSS serves the management of an organization. A decision support system has
sophisticated data analysis tools, which support and assist all aspects of problem
specific decision-making. DSS may use data from external sources such as current
stock prices to enhance decision-making. DSS is used when the problem is complex
and the information needed to make the best decision is difficult to obtain and use.
DSS is developed with the help of decision makers. DSS helps in decision-making
process and does not make any decision.
There are three types of workflow software. Administrative workflow systems focus
on the tracking of expense reports, travel requests, massages. An Ad-hoc workflow
system deals with the shaping of product, sales proposals, and strategic plans.
Production workflow systems are concerned with mortgage loans and insurance
claims. A workflow system may be Internet based and may be combined with e-mail.
A workflow system may be based on client/sever architecture that may use a
database/file server.
Expert Systems
The system has the ability to make suggestions and act like an expert in a particular
field.
The network technology had been developed during 1970s. The network hardware
and software improved as a result of research and investment. The network became
a reality and every organization laid network cables and connected their computers
and other resources to the network. Such a network is called Intranet. An Intranet is
restricted to an organization. When a network of networks is formed, it is called
Internet. In other words, Internet is a global network of computer networks. The
Internet connects computing resources of various organizations such as academic
institutes, business organizations and government organization. All networks, which
are part of the Internet, follow a protocol called TCP/IP protocol for communication.
Internet has affected business and people both. The Internet provides fast and
inexpensive communication channels. The Internet is used for transferring data files,
e-mail messages and for sharing documents and images. Internet is also used for
chatting. There are news groups, which use Internet to share ideas. People, sitting
miles apart, work on the same project making use of Internet to exchange ideas in
real time. The Internet is also used for education and entertainment.
The Internet has changed the way business is done. A new business paradigm termed
electronic commerce has come into existence. We will discuss e-commerce in some
detail little later. Consumers are able to shop for goods and services from all over the
world in the comfort of their homes. The individuals are able to shop, bank, work, and
entertain themselves without leaving their homes. The payments are also made
through Internet. The organizations, which provide these services, also use Internet.
These organizations use Internet to conduct electronic meetings, train employees in
many different locations simultaneously. The manufactures and corporate houses
directly deal with the producers without going through the retailers. A large
percentage of people are still not part of Internet. However, Internet users are
increasing rapidly.
Teleconferencing, video conferencing and screen sharing are some of the other
Internet applications. Tele-video conferencing save travel time and travel cost. The
ideas can be shared quickly and the information flow is much faster. As a result, the
product development time and contract negotiation time have reduced. The customer
service has improved due to faster and accurate information availability. Many
organizations have been able to draw competitive advantage by using Internet.
The Internet connects hundreds of thousands of different networks from more than
200 countries around the world. More than 400 million people from academics,
business community and government organizations use the Internet. Uses of Internet
vary from being a communication medium to providing a means for collaboration
work.
6
The Internet is being used by various organizations for collaborative work. These Networking Technologies
organizations use the Internet to send electronic mail, message, to transmit documents
and data. The organizations are organizing and participating in electronic
conferences.
Another popular use of Internet is to access information that others make available in
public domain. There are special software package known as search engines, which
help users locate the desired document. Large databases, electronic brochures, book
details, and manuals are present on the Internet. Organizations advertise their
products and services on the Internet.
Internet is also being used to participate in online discussions. These discussions are
done in real time. An applicant can be interviewed online from a distant location. The
candidate does not have to travel to appear for the interview. Apart from these
obvious uses, the Internet is inspiring new business models, called digital firms. In
digital firms, hierarchy and organizational levels are less compared to a traditional
firm. The employees at lower-levels have access to more data and have more
decision-making authority. The employees of an organization in a digital firm are not 9
to 5 people. They could be at location A and working for a digital firm at location B.
These firms are much leaner and efficient than traditional firms.
Internet has immensely helped the field workers. In a traditional environment, a field
worker had to go to his office to take orders for the day and report at the end of the
day again to provide details of his accomplishments. An employee of a digital firm
carries a laptop and enters the data into his laptop, which he transmits to his
organization using a dial-up connection. He can attend meetings without actually
traveling to his office.
The existing business processes have been thoroughly redesigned to take advantage
of IT. A loan application in a traditional system takes about 2 weeks to get processed.
A workflow system has reduced the time to less than a week. There is no paper
movement and everybody can work on an application in parallel.
A company can use global data along with its operational data to respond to changes
in the market place. A company works with much less inventory as it may easily co-
ordinate production activities in the light of the orders. The products can be
customized. The customization done to cater to the needs a very small segment is
referred to as micro marketing.
Internet has also been used for electronic commerce. In Electronic Commerce (EC),
business transactions take place via telecommunication networks. The business
transactions may take place between an organization and consumers or between two
businesses or organizations. The major benefits to the company include reduced cost,
reduced cycle time, and improved customer service. Following is a list of benefits to
an organization using electronic commerce.
• EC decreases the cost of creating, processing, distributing, storing, and reliving
information.
• EC allows reduced inventories and overheads.
• EC reduces the time between the payments and receipts of goods and services.
EC enables an organization to operate in the areas much beyond their physical
location.
E-commerce is the process of buying and selling goods and services electronically
using Internet. The activities such as marketing, advertising, customer support,
delivery, and payments are also done electronically. An e-business is supported by
Internet within the organization. 7
Information Technology One must keep in mind that e-commerce is a whole new business paradigm which
for Managers needs fresh thinking. Just creating a web site doesn’t guarantee success. Many
people started e-business and failed. A sound e-business model is required. Some of
the Internet business models are as follow:
Virtual storefront is an e-business where physical goods or services are sold online
instead of an actual retail outlet. An example is www.amazon.com, which sells book
and other items online. A customer can select an item from their web site and place
an electronic order. He can make payment through credit card and then the company
delivers goods to him using traditional means. There are e-businesses whose prime
business is to sell items where prices are not fixed. The prices are decided by the
customers through auction. There are e-businesses who are content provider and
manager. The companies where core competence is not IT, hire an IT company to
create web sites and databases for them. Some companies provide portals to other
organizations. A portal is a web site that provides an initial entry point to the web site
of the company or other services e.g. Yahoo is a portal.
The e-commerce can also be classified based on the parties involved in the business.
A business-to-consumer e-business involves an electronic retail home and customers.
Such a business is also called B2C business, www.amazon.com is an example of
B2C business. Business-to-business (B2B) involves transaction among businesses.
The main advantage is that a business house can buy raw material and supplies from
another business party without going through the retailer. www.Milpro.com/ is an e-
business, which sells machine tools to other businesses. In a consumer-to-consumer
business (C2C), the e-business is a facilitator only. People are able to sell to other
people using a C2C facility.
A decision system supports and assists all aspects of problem specific decision-
making.
A decision support system (DSS), also called Computer Aided Decision System
(CADS), is used when the problem is complex and the information needed to make
the best decision is difficult to obtain and use.
In an organization, a manager has certain goals, which he tries to achieve through the
use of resources. The resources such as people, money, material, and time is always
limited. One of the roles that a manager plays among many others is of decision-
making. The manager would like to examine various alternatives, which may not be
possible in a manual system due to time constraint or due to sheer volume of data.
Sometimes, a statistical analysis of fluctuating data is required which may be done
only with the help of a decision support system. The data may be distributed over
various branches of the organization and without the help of Information Technology;
it may not be possible to examine the data.
8
An analyst talks to the manager and tries to establish his requirement. Analyst may Networking Technologies
need to interact with users many times before the requirements are completely
understood. The analyst may also study the existing system if any. The analyst must
have domain knowledge. The reality is examined, the problem is identified, and it is
defined. The problem may be too complex to be analyzed. In such a situation, a
simplified version of the problem is defined. The simplified problem is used to create
a model of the actual problem. There are many ways of creating a model for a
problem. The model may be a scale model, i.e. model of a building or a bridge. It may
be a mathematical model such as equations describing the trajectory of a missile. The
model may be an analog model such as a blue print for a building or a map to show a
particular region. There are many other types of models, which are not discussed
here. A model has a set of uncontrollable variables that are not under the control of
the manager. There is a set of decision variables, which are under the control of the
manager, and these variables describe alternative course of action. As the values
assigned to decision variables are changed, the results also change. The result
variables are dependent on decision variables.
The analyst then documents the requirements using one of the formal representations
such as Data Flow Diagram, Flowcharts, ER diagram, structured English. Such a
document is called Software Requirements Specification (SRS).
A system is then built according to the requirements. There are many software
development models such as waterfall model, prototype, and incremental models. For
a decision support system, usually a prototype is built which is shown to the manager
for approval. The complete system is then built taking the feedback from the
manager into consideration.
The decision variables are changed and impact on result variables is analyzed. A DSS
provides support for decision makers by bringing together human judgment and
computerized information. A DSS may provide support throughout large and complex
organization or it may support an executive. A DSS may help an executive to perform
trend analysis. A DSS may be designed to generate exception report so that the
manager does not miss any exceptional condition.
1.8 SUMMARY
In this unit, we have learnt about the Information Systems. The terms Information
Systems and Information Technology are used synonymously. We learnt a few
definitions of IT. We also learnt the main components of an IT system. We also learnt
various types of IT systems that are used in a business. The business applications of
IT were discussed in some detail. Internet and E-commerce which is one of the
applications of Internet were discussed. Various business models of e-business were
also discussed. IT has also been used extensively in decision-making systems. These
systems do not make any decisions by themselves but they only help the decision
maker in analyzing the data.
9
Information Technology
for Managers 1.9 UNIT END EXERCISES
Turban, E., McLean, E. and Wetherbee, J., (1999), Information Technology for
Management, John Wiley, and Sons Inc. (Asia).
10
Networking Technologies
UNIT 2 COMPUTER SYSTEMS
Structure
2.1 Introduction
2.2 Objectives
2.3 Components of a Computer
2.4 Central Processing Unit (CPU)
2.5 Storage and Storage Devices
2.6 I/O Devices
2.7 Networking and Networking Devices
2.8 Plug and Play Devices
2.9 Communication Technology
2.10 Types of Computers
2.11 Summary
2.12 Unit End Exercises
2.13 References and Suggested Further Readings
2.1 INTRODUCTION
For an information system, hardware is defined as any machinery that helps in input,
processing, storage, and output activities. Similarly for a computer, the hardware is
the collection of devices that perform the functions of input, processing, data storage,
and output. In other words, all physical units of a computer system constitute
computer hardware. The input device gets the data from the outside world and the
data is stored in the memory. The central processing unit (CPU) processes this data
and the various output devices display the results. The components communicate with
each other through system bus. Each hardware component plays an important role in
computing. The arrangement of the component within the system even today is what
was suggested in 1945 by Von Neumann and is known as Von Neumann architecture.
2.2 OBJECTIVES
After reading this unit you should be able to:
• Identify the components of a computer system;
• Describe the elements of a CPU;
• Explain the concept of networking; and
• Use plug and play devices
Input Output
Devices Devices
Control Arithmetic
Unit and Logic
Unit
Primary Storage
Communication
Secondary Storage Devices
Computers have been around since 1940s and have been evolving ever since.
Computer hardware has evolved through four stages.
The so-called first generation (1946-1956) computer was built by vacuum tubes and
programming was done by plugging and unplugging chords. The second-generation
(1957-1963) computers had transistors. The third generation (1964-1979) computers
had integrated circuits. The fourth generation (1979 onwards) systems use very
large-scale integrated circuits. Along with the hardware technology, the software also
improved in terms of being user friendly and capability. Every system has software
as its integral part, which makes the computer work. The most important software is
an operating system (OS), which performs two functions:
• Extend the machine - OS presents to the user an extended machine that is easier
to program than the underlying hardware.
• Manage resources such as processor(s), memories, timers, disks, mouse,
network, printer etc. OS provides an orderly and controlled allocation of the
resources among the various programs competing for them.
In order to work, a computer needs some sort of “brain”. At the core of each
computer, there is a device called central processing unit (CPU), which is the brain
of the computer. CPU reads the program from the main memory, and executes each
step of the program, which may involve calculations and decision-making. The CPU
is responsible for controlling all devices of the computer. It initiates a memory
operation, which may involve reading data from an input device and storing it into
memory or read data from the memory and display it on an output device.
The CPU mainly consists of three parts— Control Unit, Arithmetic Logic Unit
(ALU), and Primary Storage (also referred to as Main Memory).
The ALU is the unit, which performs all mathematical calculations and logical
operations. It performs addition, subtraction, multiplication, and division. It performs a
logical operation by comparing two numbers. It can determine the smaller number,
larger number or determine if the two numbers are equal. It can also determine
whether a number is positive, negative or zero.
The word length of a CPU is the number of bits it can process in a single cycle. A
64-bit machine can process 64 bits in a single cycle. A 64-bit machine is faster than a
32-bit machine.
The cycle is defined by the internal clock of the control unit. The Pentium based
systems have a clock speed of 1GHz or more whereas 3 years ago the speed used to
be 300 MHz. The bus carries data, control signals, and address in a system. If the
data bus width is same as the word length, then one word can be moved at a time. If
the bus width is half of word length, two cycles are required for moving one word.
The instruction set also affects the speed. If the instruction set is simple, as in RISC,
one or more instructions may get executed in each cycle. There will be some long
instructions, which take more than one cycle. It is possible that a given application
extensively uses long instructions (such as scientific computing) and the machine will
appear to be slow.
There is no direct relationship between clock frequency and the speed of a system.
There are benchmark programs that are run to establish the speed of a computer
system.
The large amount of data is stored on a computer using various types of storage
media. The storage media are distinguished by their relative speed, capacity, and
resilience to failure.
2) Nonvolatile Storage: The nonvolatile storage media do not require power supply
to retain their contents. Examples of such storage media are disks and magnetic
tapes. Disk is used for online storage, while tapes are used for archival storage.
Disks and magnetic tapes are very reliable storage media. The current
technology used for nonvolatile storage makes them much slower than volatile
storage.
Main Memory
Main memory holds the programs and data required by the CPU for carrying out its
operations. The primary storage is a semiconductor device that is built using
integrated circuits. The data is stored in binary form by main memory. Numeric as
well as non-numeric data can be represented in binary form. With two binary digits,
we can represent 4 different characters. With three binary digits, we can represent 8
different characters. Computes internally use eight binary digits to represent
characters and digits (A binary digit is referred to as bit and 8 bits are called a byte).
256 characters can be represented by a byte. The main memory consists of many
thousands of bytes. The table given below lists commonly used names, abbreviations
and the number of bytes for storage capacity.
3
Information Technology Table 2.1: Commonly Used Names and Abbreviations for Storage Capacity
for Managers
Name Abbreviation Number of Bytes
Byte B 1
Kilobyte KB 1,024
MEMORY
TYPES
Random Read
Access Only
Memory Memory
(RAM) (ROM)
RAM has become the synonym for main memory. 20 years ago, the word core
memory was used for referring to main memory. RAM is the memory access method
and core memory was the technology used in main memory. The core memory
technology is not used any more. RAM is an acronym for random access memory.
As the name suggests, any location of the memory can be accessed randomly and
the access time to is independent of the location. We will continue to use word RAM
to refer to main memory. RAM is very fast; the access time is in nano seconds.
RAM is volatile that is the contents of RAM are lost when the power supply to the
RAM is discontinued.
DRAM (Dynamic Random Access Memory) is the most common kind of RAM. The
data is stored in the cell of transistors and capacitors and the data has to be refreshed
every few milliseconds. SRAM (Static Random Access Memory) does not require
periodical refresh. SRAM is faster than DRAM but is more expensive as compared
to DRAM.
4
A part of computer storage is ROM that cannot be erased or changed. ROM is an Networking Technologies
acronym for read only memory. ROM is nonvolatile i.e. its contents are not lost when
power is switched off. ROM is required for storing the boot program that should not
be lost or changed due to any failure. ROM also comes in many flavors such as
PROM and EPROM. PROM (Programmable Read Only Memory) is used for
storing some specialized application by the computer designers instead of chip
designers. PROM can be written only once. EPROM (Erasable Programmable Read
Only Memory) can be erased and reprogrammed many times.
Secondary Memory
Main Memory provides a small amount of volatile storage. But a computer needs to
store large amount of data and instructions permanently. The secondary memory is
non-volatile and has large capacity. The secondary memory is slow as compared to
main memory. Various technologies are used for secondary memory, some provide
random access, and others provide sequential access. In sequential access, data must
be accessed in the order in which it is stored. For example, if we have stored data of
students in the order of their roll numbers, then to retrieve data of student with roll
number 20, we need to read (and possibly discard) the data of students with roll
numbers 01 to 19 before we can access the desired data. If direct access is provided
then any part of the data can be accessed directly, without the need to pass by other
data in sequence. The sequential access storage devices are referred to as SASD
(Sequential Access Storage Devices) and the direct access devices are called
DASDs (Direct Access Storage Devices). The most common forms of secondary
storage devices are magnetic tapes and magnetic disks.
Magnetic tape is one of the common sequential secondary storage mediums. The
tape usually is a Mylar film coated with iron oxide. Portions of the tape are
magnetized to represent bits. It is sequential access device, to access the nth block on
tape; we must first read the preceding n-1 blocks. The main advantages of the
magnetic disks are they are inexpensive, long lasting and can store large volume of
data (20 GB to 150 GB). Generally it is used for back up or archival storage of data.
Magnetic Disk is all made of magnetic material shaped as a thin circular disk and
protected by a plastic or acrylic cover. A disk is single sided if it stores information on
only one of its surfaces and double sided if both surfaces are used. To increase
storage capacity, disks are assembled into a disk pack, which may include as may as
30 surfaces. Information is stored on the disk surface in concentric circles of small
width, each having a distinct diameter. Each circle is called a track. For disk packs,
the tracks with the same diameter on the various surfaces are called a cylinder. The
concept of cylinder is very important because data stored on the same cylinder can
be retrieved much faster than if it were distributed among different cylinders.
Each concentric circle typically stores the same amount of data. The number of
tracks on a disk ranges up to 800. Capacity of each track typically ranges from 4-50
Kbytes. Each track is divided into sectors. The division of a track into equal sized
blocks or pages is set by the operating system during disk formatting. There is a read/
write head, which reads data from the disk and writes data to the disk. A disk is
mounted on the disk drive, which has the motor that rotates it. A read/write head has
a mechanical arm attached to it. All arms are connected to an actuator attached to
another electrical motor, which moves the head in unison and positions it over the
cylinder of tracks specified in a block address.
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
6
2) What’s the difference between cache and RAM? Networking Technologies
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
Voice Recognition devices are used to recognize human speech. It converts human
voice signals received through microphone to digital signals using software tools.
Voice recognition systems are becoming popular.
Bar Code Reader scans the code (black and white bars), which specifies the name of
the product and its manufacturer. The computer then finds the price of the product
from the database. It is used for high- volume processing of data where use of
keyboard entry can be very time consuming, for example they are used in
supermarkets.
Digital cameras are used to capture pictures. The pictures are digitized and stored in
computers. The pictures can be reviewed, deleted, edited, and saved for future use. 7
Information Technology Images can be transmitted from a PC to a printer or to other cameras. They can be
for Managers mailed to friends. Digitizers are devices that convert drawings made on sensitized
surface with the help of pen to machine-readable input. These inputs are transferred
to the computer. A smart card is a card that is embedded with either a
microprocessor and a memory chip or only a memory chip with non-programmable
logic. The microprocessor card can add, delete, and otherwise manipulate information
on the card, while a memory-chip card (for example, pre-paid phone cards) can only
undertake a pre-defined operation.
Output Devices
The output generated by a computer can be transmitted to the user via several
devices and media. These devices are called output devices. Following are some
important output devices:
1) Monitors: It is a video screen that displays both input and output data. It comes
in different sizes ranging from few inches to several feet. It is interactive in
nature, which is the main advantage associated with this device. It consists of
CRT (Cathode Ray tube) technology. It is the electronic “gun” that shoots the
beam of electrons and illuminates the pixels on the screen.
2) Printers: There are two broad categories of printers i.e. Impact and Non Impact
Printers. Impact printer uses striking action to press a carbon against paper to
create a character. Dot matrix, Line, and Daisy wheel are some important type
of Impact printers. They are slow and noisy. They don’t support graphics and are
susceptible to mechanical breakdowns.
Non Impact Printers use laser beams to write information on photosensitive
drums. The paper passes over the drum and picks the image with toner. Laser
Printer is the example of Non Impact Printers. They have high speed and can
produce print- quality text and graphics. Ink-jet printers are Non Impact Printers,
which shoot tiny dots of ink on the paper. They are inexpensive and are used for
low volume graphical applications when different colors of ink are required.
3) Plotter: They use computer driven pens for creating black and white or color
graphic images likes charts, graphs etc. They are used in engineering and
architectural drawings.
The number of possible ways to logically arrange the nodes, or computer systems and
devices on the networks are mainly of five types. They are termed as network
topologies, i.e. the logical model that describes the network structure or configuration.
These types are bus, ring, hierarchical, star and hybrid.
The computers in the ring network are connected in ring or circle. There is no central
computer and messages are routed around the ring from one device to another in one
direction. In the bus network the devices are connected on the single line. Each
device is connected to the single bus and can directly communicate with all other
devices on the network. A star network has a central computer. This central
computer controls and directs messages. If the central computer breaks down, entire
8
system is broken down. The hierarchical structure has tree like structure and does
not have a central computer. Messages pass through all the branches of the tree till Networking Technologies
they reach the destination. This structure is easy to repair as any branch can be
isolated and repaired without affecting any other branch. Hybrid network is the
combination of two or more topologies.
Ring Structure
Hybrid Structured
Star Structure
Network Devices
Network devices allow multiple computers to exchange data and information through
Internet or Intranet connection. Many people can use a single printer, or share other
devices and resources on the network. Every network has a router which is a device
that connects two or more networks and determines the next point to which a
‘packet’ of data should be forwarded towards its destination. A packet is the smallest
unit of data that travels on the network. A hub is the center point where several
network connections converge i.e. it the point where data comes in from one or more
directions and is forwarded to one or more directions. Sometimes the same device
serves as both the hub and router. NIC (Network Interface Card) is a card installed
on a computer that connects the computer to the network. It provides dedicated and
full-time connection to the computer.
The plug and play feature was introduced in Windows 2000. One can plug in, for
instance, an USB device and it is detected and accepted by the system so that the
device can be used without rebooting the system. Operating system has drivers for
most of the devices. When a device, for which operating system has the driver, is
plugged in, the communication between the driver and the device is established
9
by the OS.
Information Technology These devices are connected to the computer in several ways. Some devices, such
for Managers as network adapters and sound cards, are connected to expansion slots inside the
computer. Other devices, such as printers and scanners, are connected to ports
outside the computer. Some devices, known as PC Cards, connect only to PC Card
slots on a portable computer. The operation system must have device drivers for all
plug and play devices.
USB (Universal Serial Bus) is the new industry standard for attaching peripheral
devices to the computer. This technology is designed for use with numerous devices,
including printers, digital cameras, game pads, joysticks, keyboards and mice, and
storage devices. USB hardware is identical across platforms. It replaces all the
different kinds of serial and parallel port connectors with one standardized plug and
port combination. The devices can plug in without opening the PC.
Activity B
What were the main reasons for the change from the serial, printer, game, and
ps/2 ports to the USB 1.1 port?
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
10
Networking Technologies
2.9 COMMUNICATION TECHNOLOGY
Communications is the transmission of a signal by a way of particular medium from a
sender to a receiver. For example in human speech, the sender transmits a signal
through the transmission medium air.
Signal
Sender Receiver
Transmission
Medium
For the effective communication both the sender and the receiver should understand
the signals and have common interpretation for them. When communication has to be
established a medium is required for transmission. This pathway/medium is called as
communication media. It includes twisted pair, coaxial cable, fiber optic cable,
microwave transmission, and satellite transmission. The table 2.3 lists main
characteristics of these mediums.
11
Information Technology Each character is preceded by start bit and ended with end bit, so that the receiving
for Managers device knows where the character begins and ends. It is inefficient due to the
overhead of transmitting start and stop bits. It is generally used for low speed data
transmission.
Data transmission occurs in one of the following three directions: Simplex, half
duplex, or full duplex. In simplex data transmission, the data transmission takes place
in only one direction. Public announcement systems such as radio and television use
simplex mode of data transmission. It is simple and relatively inexpensive. In half-
duplex transmission mode, the transmission takes place in both directions but only in
one direction at a time. Full duplex mode of transmission allows transmission in both
directions simultaneously. For example, on telephone both parties can communicate
simultaneously. The cost of full duplex transmission is high as compared to both
simplex and half duplex.
Minicomputers: There are also called midrange computers. There are less powerful
than mainframes. Minicomputers are used for specific tasks such as scientific
research and engineering applications. Some times, large organizations install many
minicomputers instead of one mainframe. The application, and data are distributed
ones minicomputer to achieve better reliability. Small organizations use a
minicomputer as a server.
2.11 SUMMARY
12
Networking Technologies
2.12 UNIT END EXERCISES
13
Networking Technologies
UNIT 3 COMPUTER SOFTWARE
Structure
3.1 Introduction
3.2 Objectives
3.3 System Software
3.3.1 Operating Systems
3.3.2 Language Translators
3.3.3 Utility Programs
3.4 Application Software
3.4.1 Programming Languages
3.5 Open Source Software
3.6 Acquiring Application Software
3.7 Summary
3.8 Unit End Exercises
3.9 References and Suggested Further Readings
3.1 INTRODUCTION
The word software collectively refers to various kinds of programs used to operate
computers and related devices. A program is a sequence of instructions that a
computer can interpret and execute. Programs can be built into the hardware itself,
or they may exist independently in a form known as software. Hardware describes
the physical components of computers and related devices.
The two main types of software are system software and application software.
Application software consists of programs that are aimed to help users in solving
particular computing problems. Microsoft Internet Explorer for web browsing, Adobe
Photoshop for developing computer graphics, Yahoo Messenger for instant messaging
all lies in the application software category. The other class of software is the system
software, which encompasses the programs that heavily interact with computer
resources and provide services to other programs. Popular examples in this are
Operating Systems (OS), hardware drivers, compiler etc.
3.2 OBJECTIVES
After reading this unit, you should be able to:
• Describe about the different types of operating systems and their functions;
• State the characteristics of system software and application software;
• Differentiate between compiler and interpreters;
• Enumerate the advantages and disadvantages of compilers and interpreters;
• Define and explain the concepts and philosophy of open-source software; and
• Explain the process of software acquisition. 1
Information Technology
3.3 SYSTEM SOFTWARE
for Managers
System software co-ordinates the various parts of computer system and mediates
between the application software and computer hardware. Operating system is
system software, which manages and controls the computers activities. The other
system software consists of computer language translation programs that convert
programming languages into machine language and utility programs that perform
common processing tasks.
One of the most important functions of any operating system is providing a user
interface. A user interface allows individuals to access and command the computer
system. The first user interfaces for mainframe and personal computer systems were
command based. A command-based user interface requires that text commands be
given to the computer to perform basic activities. For example, the command ERASE
00TAXRTN would cause the computer to erase or delete a file called 00TAXRTN.
RENAME and COPY are other examples of commands used to rename files and
copy files from one location to another. Many mainframe computers use a command-
based user interface. In some cases, a specific job control language (JCL) is used to
control how jobs or tasks are to be run on the computer system.
A graphical user interface (GUI) uses pictures (called icons) and menus displayed on
screen to send commands to the computer system. Many people find that GUIs are
easier to use because user intuitively grasp the functions. Today, the most widely
used graphical user interface is Windows by Microsoft. Alan Kay and others at
Xerox PARC (Palo Alto Research Center, located in California) were pioneers in
investigating the use of overlapping windows and icons as an interface. As the name
suggests, Windows is based on the use of a window, or a portion of the display screen
dedicated to a specific application. The screen can display several windows at once.
The use of GUIs has contributed greatly to the increased use of computers because
users no longer need to know command-line syntax to accomplish tasks.
Hardware Independence
The applications make use of the operating system by making requests for services
through a defined application program interface (API). Programmers can use APIs
to create application software without having to understand the inner workings of the
operating system.
Suppose a computer manufacturer designs new hardware that can operate much
faster than before. If the same operating system for which an application was
developed can run on the new hardware, minimal (or no) changes are needed to the
application to enable it to run on the new hardware. If APIs did not exist, the
application software developers might have to completely rewrite the application
program to take advantage of the new, faster hardware.
Memory Management
Memory controller allows the computer system to efficiently and effectively store
and retrieve data and instructions and to supply them to the CPU. Memory
management programs convert a user’s request for data or instructions (called a
logical view of the data) to a physical location where the data or instructions are
stored. A computer understands only the physical view of data –that is, the specific
location of the data in storage or memory and the techniques needed to access it.
Memory controller converts a logical address to a physical address.
Most operating systems support virtual memory, which allocates space on the hard
disk to supplement the immediate, functional memory capacity of RAM. Virtual
Memory works by swapping programs or parts of programs between memory and
one or more disk drives using a concept call paging. This reduces CPU idle time and
increases the number of jobs that can run in a given time span.
Processing Task
An operating system with multitasking capabilities allows a user to run more that one
application at the same time. Without exiting a program, user may start another
application and switch to newly started application, and then jump back to the first
program, picking up where it was left off. Better still, while user is working in the
foreground on one program, one or more other applications can be churning away,
unseen, in the background, sorting a database, printing a document, or performing
other lengthy operations. In the absence of starting background processes, a
foreground process would monopolize the computer and if the process happens to be
non-interactive such as a file print, then the user will just have to sit and stare at the
screen till the process completed. Multitasking can save users a considerable amount
of time and effort.
Time-sharing allows more than one person to use a computer system at the same
time. For example, 15 customer service representatives may be entering sales data
into a computer system for a mail-order company at the same time. In another case,
thousands of people may be simultaneously using an on-line computer service to get
stock quotes and valuable business news.
Time-sharing works by dividing time into small CPU processing time slices, which
can be a few milliseconds or less in duration. During a time slice, some tasks for the
first user are done. The computer then goes from that user to the next. During the
next time slice, some tasks for the next user are completed. This process continues
through each user and cycles back to the first user. Because the CPU processing
time slices are small, it appears that all jobs or tasks for all users are being completed
at the same time. In reality, each user is sharing the time of the computer with other
users.
Networking Capability
The operating system can provide features and capabilities that aid users in
connecting to a computer network. For example, Apple computer users have built-in
network access through AppleShare feature, and the Microsoft Windows operating
systems come with the capability to link users to the Internet.
4
Access to System Resources Networking Technologies
Computers often handle sensitive data that can be accessed over networks. The
operating system needs to provide a high level of security against unauthorized
access to the users’ data and programs. Typically, the operating system establishes a
log-on procedure that requires users to enter an identification code and a matching
password. If the identification code is invalid or if password does not go with
identification code, the user cannot gain access to the computer. The operating
system also requires that user passwords be changed frequently. If a user is
successful in logging onto the system, the operating system records the details of the
user and system usage. In some, organizations, these records are also used to bill
users for system and resource usage. The operating system also reports any
attempted breaches of security.
File Management
An operating system performs file management functions to ensure that the files are
available to CPU when needed and that they are protected from access by
unauthorized users. Many computers support multiple users who store files on
centrally located disks or tape drives. The operating system must be able to resolve
what to do if more than once user requests access to the same file at the same time.
Even on stand-alone personal computers with only one user, file management is
needed to keep track of where files are located, what size they are, when they were
created, and who created them.
For any program to be executed, it has to be first converted into its equivalent
machine language program and then loaded into the memory of computer. To perform
the translations of programs, language translators are used. As the process of
programming language translations are machine dependent, the translators fall in the
system software category.
Compiler and Interpreter: Compiler and interpreter are used to translate a high
level programming language program into a machine language program. As the
translation process is very cumbersome, some compilers first translate the source
code (the program in high-level language) into the equivalent assembly language
program and then use the assemblers for the next step. To define, a compiler is a
program that translates a source text written in a language A into a target program in
language B, whereas, interpreter is a program which directly executes the program in
a given programming language A. 5
Information Technology
for Managers
Program Machine Computer
Interpreter Language
Statement System
Statement
Translation Statement
Excecution
An interpreter is a language translator that reads the source code line-by-line and
executes them one by one. On the other hand, a compiler first reads the complete
source code and then generates its object code (the equivalent machine language
program).
Interpreter has the advantage that the process of translation takes less time as
compared to the compiler, but the program generated is less efficient as compared to
the compiler in terms of the time is to takes to execute the program.
Compilers are generally used when the efficiency of the generated binary (machine
language) program is desired. Interpreters are mostly used for educational purposes,
where the programmer makes frequent translations of the program as the changes to
the program are frequent. Also, as the interpreter generates the binary program on
the fly, platform independence can be achieved. Platform independence means the
capability of the program to be translated on any platform and executed on any
platform. By platform we mean the hardware and the operating system running on
that system. For example, interpreted languages such as HTML, Perl, and Lisp are
platform independent. Java, which is a half-compiled half-interpreted language, has
benefits of both. As Java programs are compiled to byte-code, instead of binary code,
it can be ported to any platform which has the Java Virtual Machine software, which
interprets the byte-code. By compiling the program to byte code certain level of
optimization that are possible in compilers are achieved.
Computer Machine
Program Compiler Language
Program
Translations
Machine Computer
Language System
Program
Program
Exection
Advantages
• As compared to compiler no synthesis phase is required in interpreter: Neither
there is a need to learn target language B nor the target code is to be generated.
Thus interpreters don’t have synthesis phase.
• Direct Execution: There is no intermediate compilation phase so the code is
directly executed.
Disadvantages
• Efficiency Loss: As the code is executed on the fly, the efficiency of the program
is low. In compilers, there is a separate phase for optimization of the program
code.
• Interpreter must be available on target machine: The compiled code can be
executed on any similar machine. The code needs not to be compiled every time.
For languages, which are interpreter based, the interpreter must be available on
each machine where the code is to be executed.
Activity A
Why is there a difference between High-Level and low level languages?
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
Activity B
Explain the difference between Applications / Utilities with the help of examples.
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
• Third Generation Language (3GL) 3GL are English-like languages. They use
statements and commands, which are similar to the words used in English. 3GLs
are easier to learn, but less efficient in the use of computer resources as
compared to machine and assembly languages. Typically, a statement in 3GL is
translated into many instructions of machine language. C, BASIC, FORTRAN,
8 COBOL and Pascal are the popular third generation languages.
FORTRAN (FORmula TRANslation): Fortran was developed Networking Technologies
in 1956 by
John Backus. It was developed keeping in mind the scientific and engineering
application.
Activity C
Explain the differences between commercial software, shareware, open source
software, freeware, and public domain software.
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
10
Networking Technologies
3.6 ACQUIRING APPLICATION SOFTWARE
A company can either develop or purchase software for its use. In some cases, the
purchased software can be modified / customized according to the needs of the
company. The different options available are summarized in the diagram below.
Build the
Software
Application
Software
Buy the
Software
Build the software: If the requirements of the company are unique or specific, then
the decision to build the software may be taken. If the organization has the required
talent and time, it may be built by the company itself. This kind of development is
known as in-house development. Also the company may obtain customized
software from software vendors. Such software developed for particular companies
are called contract software.
Buy the software: The Company has another option of purchasing, leasing, or
renting software from software companies, who develop programs and sell them to
many computer users and organizations. The software developed for the general
market is called off-the-shelf software. They are readily available and many
companies use them to support their business processes.
Customized Software: The Company can also opt to go for a mix of both buy and
build decision. In that case, the company can purchase some off-the-shelf available
software, and customize it to its needs by in-house or external personnel. There are
software vendors in the market who provide a range of services like installing,
modifying software, training end users, etc. They can be contracted to do the
customization.
3.7 SUMMARY
Computer software have developed so much over the past years that it is very
difficult to cover all aspects of the same. System software and application software
represents two broad levels of categorization. System software encompasses of the
operating system, language translators, and the utility programs. Application software
is aimed to solve particular user computing problems. Open source software is
distributed with the source code and freely available at a fraction of cost as
compared to proprietary software. Acquiring application software is an important
business activity and requires to be managed carefully. 11
Information Technology
3.8 UNIT END EXERCISES
for Managers
12
Networking Technologies
UNIT 4 NETWORKING TECHNOLOGIES
Structure
4.1 Introduction
4.2 Objectives
4.3 Components of a Network
4.4 Types of Networks
4.5 Advantages of Using Intranet and Internet
4.6 The Layered Architectures and Communication Protocol
4.7 Client/Server Architecture
4.8 Summary
4.9 Self-Assessment Exercises
4.10 References and Suggested Further Readings
4.1 INTRODUCTION
There are many networks in the world, some are natural, and some are man-made.
There is a network of veins and arteries in the body and there is a network of
railroads. But these days when we say networks, we mean data communication
networks. Data communication is the movement of computer data from one
computer to another. The data may travel as an electrical or an optical signal on
transmission systems. Such systems are called data communication networks or
simply network. The networking helps us in getting the information fast. If we look
around, we can identify many applications that use networks. One of the prime
examples is the railway reservation system. This system uses networks to find out
the availability of a seat for a passenger. The passenger may be at station A and he
can make a reservation from station B to station C. You may recall that when the
reservation was not automated, a telegram was sent to station B to make a
reservation. The telegram system worked most of the time, but occasionally it did not
reach or it reached after the seats were all reserved. In either case, the passenger
could not be informed. These scenarios have become history. Networks have
changed the life for better.
4.2 OBJECTIVES
1
Information Technology
4.3 COMPONENTS OF A NETWORK
for Managers
The Server or Host Computer - Host is the computer that has data to be transmitted.
The Client : This is the computer on the other end of the transmission system as the
server. It receives the transmitted data from the server.
The Network Interface Card: Earlier, one had to buy a network interface card
(NIC) separately and install it in the computer. Nowadays, the NIC has become a
standard component of a system. The NIC is the interface between the network
cable and the computer.
The Circuit: The circuit is the pathway through which data travels from the host to
the client. The circuit may be a copper wire or an optical fiber. The commonly used
media are twisted-pair cables and coaxial cables. These days, fiber optic cables are
also being used. Fiber optic cables can withstand higher temperature and has much
higher bandwidth. Microwaves are also used for data transmission. The
communication may take place through wireless medium.
Network Hubs : Hubs are used to connect cables. The hubs come in 4, 8 and 16
port sizes. An 8-port hub can connect 8 systems to the central cable.
Activity A
Identify 5 services around you that use data communication networks.
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
2
Networking Technologies
4.4 TYPES OF NETWORKS
A local area network connects computers that are in the same building. A network
spread over few kilometers also comes under LAN. The LAN is usually realized
using Ethernet technology or token ring technology. Fiber Distributed Data Interface
(FDDI) is also becoming popular. The transmission rate varies from 10 Million bits
per second to 1-giga bits per second (10Mbps-1Gbps). A computer has a network
interface card such as Ethernet card that connects it to the network circuit. Usually
LAN is under the control of a single organization. The prime objective of LAN is to
facilitate information and resource sharing within an organization. For instance, a
application software which is used by many people in the organization can be installed
on a computer. This computer is connected to other computer by LAN and
everybody can use the same software. The machine on which the software is
installed is often called a server. In the absence of LAN, the same software will have
to be installed on all machines, which may be very expensive. In addition, an upgrade
in the software will require re-installation/modification on all computers.
The server may be a file server, print server or a database server, depending on the
service it provides to its users. LAN is also connected to other LANs through a
gateway. Almost seventy percent of all LANs in the world use Ethernet. Ethernet
uses a bus topology. All computers are connected to one circuit. All messages from a
computer flow on to the central cable and through it to all computers on the LAN. In
other words, messages are broadcasted.
Wide Area Network
A wide area network connects computers in different cities or countries. The
network to connect computers that are thousands of miles apart is not built by an
organization. Instead, the organization uses leased telephone lines.
It is obvious that WAN is not owned by a single organization. It is owned and
managed collectively by many cooperating organizations.
Internet
Internet or Inter-Network is the connection of two or more networks so that a
computer on one network can communicate with a computer on another network.
The Internet is a set of thousands of networks linked together around the world. The
communication between two computers takes place such that the user does not have
to worry about the technology used by the networks. It is easy to find out the location
of another system on the network. The router (also called gateway) acts as an
interface between two networks. The Internet has no central administration but there
are protocols, which are followed by each network of Internet.
Intranet
6) There are many dedicated discussion groups on the network. A person can join a
group of his choice and share his knowledge with others and get help from
4 others.
Networking Technologies
4.6 THE LAYERED ARCHITECTURE AND
COMMUNICATION PROTOCOL
Communication over a network is a complex task. The host that wants to transmit the
data must know the address of the client, a route to communicate to the client. Then
it must establish a connection and transmit the data. If an error occurs during the
transmission, the client must detect it and inform the host so that it can re-transmit the
data. It will make life simple if this complex task is divided into sub-tasks. There are
two popular models- OSI and TCP/IP.
Application Layer
This is the top layer and provides user with an interface to the network. The primary
purpose is to provide a set of utilities for application programs.
Presentation Layer
This layer formats the data for presentation to the user. This layers, for instance,
might compress/uncompress the data.
Session Layer
This layer is responsible for initiating, maintaining, and terminating the network
session on behalf of an application.
Transport Layer
This layer is responsible for creating data units called packets from the data that is to
be transmitted. Each unit is appended with enough information about its source and
destination so that it can travel independently on the network without having to worry
about other packets. The packets are combined at the destination into the original
message. This layer makes sure that each packet has been received and without
error. It may request re-transmission of a packet if required.
Network Layer
This layer accepts messages generated by the transport layer. Its responsibility is to
route packets to the destination.
This layer is responsible for initiating the physical transmission of the data. This layer
also detects and corrects errors that might have occurred during transmission.
Physical Layer
This layer is concerned with transmission of data bits. This layer defines rules for
transmission, such as voltage.
The TCP/IP model consists of four layers- application layers, network layer, data link
layer, and physical layer. The network layer is equivalent to presentation layer,
5
session layer, transport layer, and network layer of OSI model.
Information Technology
for Managers
Application Layer Application Layer
TCP/IP
TCP/IP is a protocol suite, which consists of protocols for all four layers. This suite is
used for intranets as well as for Internet. 70% of all networks use TCP/IP. This
protocol provides a reliable stream delivery and virtual connection service to the
applications. The protocol ensures error-free transmission. TCP performs
packetizing- large messages are broken up into smaller units called packets. Each
packet contains the source and destination port identifier. A port is a logical entity that
identifies an application. The web server port is 80, FTP server port is 21, TELNET
port is 23 and SMTP port is 25. The packet also contains its sequence number and
error checking information. The source and destination addresses are also included in
the packet.
The address part needs some explanation. Each computer has some device such as
network card or modem through which computer is connected to the network. This
device has an address. For instance, the Ethernet card addresses are 6 bytes long.
The address is part of the hardware and cannot be changed. This address is unique in
the world. The network administrator assigns a 4 byte address to each computer on
the network. This address is known as IP address. This address has to be unique on
the network. The way this uniqueness is ensured is quite interesting. A computer on
the LAN is assigned an address by the system administrator. These addresses are 4
numbers separated by a dot (.), each number is between 1 and 254.
The intranet addresses are usually 172.x.x.x. The system administrator maintains a
table of assigned addresses and can easily ensure the uniqueness. A computer on the
Internet is assigned an address by the Internet Network Information Center
(InterNIC) who again maintains a table and can ensure uniqueness. The Internet
service providers can get a block of addresses from InterNIC and assign them to
individuals or organizations.
Type A: The first byte is fixed by the NIC. The first bit of this byte is 0 for all type A
addresses. The first byte can have value between 1 and 127. The remaining 24 bits
are used to identify the host on the network.
An organization that has obtained a type A address may connect over 16 million
computers to the Internet. Type A address is no more available.
6
Type B: The first two bytes are fixed by the NIC. The first twoNetworking
bits of theTechnologies
first byte
are 10 for all type B addresses. The first byte can have value between 128 and 191.
The remaining 16 bits are used to identify the host on the network.
An organization that has obtained a type B address may connect over 65000
computers to the Internet. Almost 80% type B addresses have already been
allocated.
Type C: The first three bytes are fixed by the NIC. The first three bits of the first
byte are 110 for all type C addresses. The first byte can have value between 192 and
233. The remaining 8 bits are used to identify the host on the network.
An organization that has obtained a type C address may connect 254 computers to
the Internet. Almost 30% type C addresses have already been allocated.
There are Type D and Type E addresses also which are not for commercial use.
An organization has the freedom to divide its computers into various clusters and
each cluster forms sub-network, referred to as subnet. The address of each
computer on a subnet has same first three digits. The subnet mask identifies the
subnet part of the address. The subnets are connected to each other by a gateway.
The IP address may be static or may be dynamic. A static address is assigned to the
computers that are permanent members of the network. The computers that connect
to the network through a modem are usually assigned IP address dynamically.
Dynamic Host Configuration Protocol (DHCP) is part of the TCP/IP suite for
dynamic addressing. A client can be assigned an IP address dynamically by DHCP
server.
It is not so easy to remember 4 decimal numbers for each computer that one might
like to communicate with. The name that a human being can remember easily is
assigned to each server. These addresses are like www.iitk.ac.in or ftp.iitk.ac.in etc.
These addresses are known as application layer addresses. A user wants to
communicate to, let us say ftp.iitk.ac.in for a file transfer. This address must be
converted to IP address and then to hardware address.
The ARP is used for converting an IP address to the hardware address. The protocol
is based on broadcast; the computer trying to send a message to a particular IP
address broadcasts a message asking for its hardware address. The computer with
requested IP address responds back. The requesting computer also maintains a
database of IP addresses and corresponding hardware addresses.
7
Information
A message isTechnology
broken up into packets. All the packets may travel independently on
for Managers
possibly different routes. This type of routing is known as connectionless routing. If
all packets of a message are forced to travel same path, then a virtual circuit is set
up. This type of routing is known as connection-oriented routing.
The World Wide Web (WWW) made the Internet popular among people who were
not part of the academic community. The Internet became popular primarily because
of www applications. The prime objective of www applications is to facilitate sharing
of text and image files. The www applications are implemented using client/server
architecture. The server runs a software package called web server and clients run
web browsers. The most popular web browsers are Netscape and Internet Explorer.
Popular servers are Apache, Tomcat, Netscape server, and Microsoft server.
In order to get a page from the Web, the address of the desired page is typed into the
browser. The user must know the address of the page in order to request the page.
The web address is like any other address. It has components such as domain and
computer name. Each computer on the Internet has a unique address. Each address
is assigned by one of the address assigning board such as InterNIC. These boards
ensure that there are no duplicate addresses. Each address has computer name
followed by domain name. Some of the well-known domains are as follows. The
domain “edu” is reserved for educational institutes, “com” is for commercial
organizations, “gov.in” is for government departments of India.
There are special software known as search engines which help a user in locating a
web site. Popular search engines are google, altavista, yahoo, khoj etc. The user can
run a search engine and type some keywords and the search engine locates many
web sites, which have documents containing the keywords. The user may decide to
then visit one or more sites. The sites listed by a search engine may run into millions
and most of the sites may be irrelevant. Usually the top few sites are most relevant.
The search engine maintains a database of all the web sites and this database is
updated frequently.
The web server and the client both follow Hyper Text Transfer Protocol (HTTP) to
communicate with each other. HTTP is an application level protocol for hypermedia
documents. A virtual connection is established between the client and the server.
File Transfer Protocol (FTP) enables a host to send and receive files over the
network— intranet as well as Internet. In a file transfer, there is a client that requests
the transfer and there is a server, which entertains the request. There are many
graphical FTP clients available these days, e.g. gftp on linux and ws-ftp on windows.
A file transfer can be either closed or anonymous. In a closed file transfer, file
transfer requires a valid login/password, which is given by the system administrator.
An anonymous file transfer can be initiated by anyone. For a file transfer under ftp, a
virtual connection between client and server is established to transmit control
information. Another virtual connection is established for data transfer.
Telnet : The telnet application enables a user on one computer to log on to another
computer on the network. A virtual connection between the client and the server is
established. The connection is used to transmit data. The protocol gives client an
option to emulate graphics terminal.
8
Networking
Email : Electronic mail is one of the oldest applications of Internet Technologies
and it has become
the most common way of communication. Email can be used to send a message to an
individual or to a group of people. Text, formatted document, or an image in any
format can be sent via email. The email uses client/server architecture. Clients are
very advanced and provide amazing facilities. The user can create named folders and
can save selected messages into the folder. It is almost like filing letters into a
cabinet. A message can be sent to one person and a copy can be sent to another
person. The message can be sent with a request for an acknowledgment. A message
can be forwarded, deleted, or replied to. There are many protocols for email server
as well as client. Simple Mail Transfer Protocol (SMTP) and Post Office Protocol
(POP3) together form a complete mail transfer protocol. An SMTP server receives
emails and stores them. The client can use POP3 to fetch and store emails in the
individual local mailbox.
The SMTP server and POP3 client combination is quite popular these days.
A workstation running POP3 can dynamically access the SMTP mail server and
retrieve the mails on it. A POP3 client makes a connection to the server either on
demand or on regular intervals. If there is a mail, it is retrieved and the connection is
aborted. POP3 seems inadequate if user would like to have the freedom to access his
mailbox from anywhere. Internet Message Access Protocol version 4 (IMAP4)
allows a client to access and manipulate mailboxes on an SMTP server as local
mailboxes. The mail stays on the server and user can access his mailbox from any
computer running IMAP.
When you install a new computer on the network, you must obtain an IP address
In the days of mainframes, the central server used to be a powerful machine. The
software and the data both were stored on the main frame. There used to be a set of
terminals that people used to connect to the server. This simple architecture is known
as host-based architecture. Along the passage of time, the terminals were replaced
by computers, which were not as powerful as the servers but were more powerful
than the terminals. The server became the file and database server, which stored the
data, but the application software ran on the client computers. As the applications
became complicated, the network traffic increased and people started looking for an
alternative. The client/server architecture was then proposed and it became very
popular.
In the client/server model, a machine that provides a service is called a Server. The
machine that makes use of the service is called a Client. For instance, server may
store the database of an organization. A client connects to the database server for its
needs. The client and the server work independently in a co-operative manner. The
architecture facilitates the addition of a new client or server to the network. A server
usually can handle many clients simultaneously. Therefore, most servers are powerful
machines such as mainframes, minicomputers, workstations etc. The clients need not
be as powerful as the servers and they usually are not. The clients and servers are on
the network. But each server is assigned one or more specific tasks. For instance, a
file server is used to manage user data files, a network server may control network
connections. A database server stores the data of the organization and provides
different levels of access to different clients. The servers provide their services
9
Information
through humanTechnology
readable names and well-known ports. When the client makes a
for Managers
request, it is not aware of the physical location of the server, or the processes of the
server. The server details are hidden, but services are transparent. This is known as
“service transparency”. It is an important feature of client/server architecture.
A request made by a client may involve data access, data processing, and result
rendering to the client. The data access, the processing, and the presentation can all
be done by the server or they can be shared between the server and client. The
client/server implementation is called “distributed presentation” when all three
components are on the server, and the client has part of presentation logic.
In remote presentation, the data storage and management and application logic is
handled by the server, but the presentation logic is handled by the client.
In distributed logic arrangement, the data storage and management is handled by the
server, the presentation is handled by the client and the application logic is shared
between the server and the client.
In remote data management model, the data storage and management is the
responsibility of the server and the other two functions are handled by the client.
In distributed database model of the client/server architecture, the client handles part
of the data storage and management of application logic and presentation. The server
compliments data storage and management job of the client.
A client is called a thin client if it only handles the presentation job. A client is a fat
client if it supports data storage, application processing, and presentation.
4.8 SUMMARY
This unit has given you an introduction to the data communication networks and their
importance to an organization. The components of a network are described which are
same for all types of networks. A network operating system is also an integral part of
a network. The protocols- OSI model and TCP/IP are the main protocols, which
were described in detail. The TCP/IP is a suite of protocols which has application
layer protocols, network layer protocols, data link layer protocols and physical layer
protocols. The application layer protocols and network layer protocols were described
in some detail. The client server architecture was also explained.
10
Networking Technologies
4.9 SELF-ASSESSMENT EXERCISES
6) Describe TCP/IP protocol suite briefly. You may include any five protocols in
your note.
11
Information Systems
UNIT 5 IN MIS PERSPECTIVE Economics
Structure
5.1 Management Information Systems : An Introduction
5.2 Objectives
5.3 Historical Background
5.4 Status of MIS in Organizations
5.5 Framework for Understanding Management Information Systems
5.6 Organization and Information System— Two Way Relationship
5.7 Summary
5.8 Unit End Exercises
5.9 References and Suggested Further Readings
The subject of management information system (MIS) has different meaning for
different people. The concept of MIS has evolved over a period of last two decades
or so. The initial management information systems were built to process
transactional data of an organization and to produce regular reports. The reports
were not targeted and individuals picked the required data from the report. The
information systems evolved further and produced different reports according to
requirements. Instead of user looking through the report for required data, the
system generated a report in a suitable format that created an impact on its user and
provoked an action, a decision or an investigation. Today, an information system has
evolved to the stage where they handle databases and facilitate decision-making.
Accordingly, definition of MIS has also evolved. There are many closely related
definitions in use. The terms MIS is synonymously used with terms the Information
System (IS), the Information and Decision System and the Computer based
Information System.
The MIS is defined as an integrated system of man and machine for providing the
information to support the operations, the management, and the decision-making
function in the organization.
5
Information Systems-I
Planning
Control
Conective Actions
Operations
In any organization that has planned activities leading to the achievement of the
stated goals, there is always a control process in place that measures progress
towards these goals and enables the manager to deduct the deviations from the
original plan in time. It is the responsibility of the management to take corrective
actions before it is too late. The deviations may be due to environmental changes or
due to the mistakes made by people. An MIS is concerned with planning and control.
An MIS has large amount of data as its integral part that is stored and managed by a
data base management system.
5.2 OBJECTIVES
Since 1950s, computers have been used to perform common business applications in
the developed countries. The use of computer for keeping track of transactional data
in organizations in India started in 1980s. An organization employs a large number of
clerks to record business transactions. A transaction is any business-related
exchange such as payment to employees, sales to customer, purchase order placed to
a vendor, payment received from a customer etc.
6
With the help of computers, organizations automated the process expecting to reduce Information Systems
errors and cost. The very first application of computers in business was to create a Economics
transaction processing system (TPS). A TPS is an organized collection of people,
procedures, software, databases and devices used to record business transactions.
The initial TPS were used for automating payroll systems. The input to the payroll
transaction processing system is the hourly pay rate and number of hours worked.
These systems also calculated income tax for each employee and generated reports
for tax collecting body. The benefits provided by an effective transaction processing
system are tangible and can be quantified. They speed up the processing of business
activities and reduce clerical costs. The scope of TPS widened in due course of time
to include all aspect of accounting and financial transactions.
The TPS provided no help to the managers and decision makers. The Management
Information System (MIS) were then built to provide routine information to managers
and decision makers.
View 1 View 2
Management
Information
View 3 System
View 4
Database
The Figure 5.2 shows that an MIS uses organization’s transaction processing system
and prevents different view of this data to different people. The sales managers
would be interested in sales data and accounts officer would be interested in
accounts receivable and payable data. In 1960s, the organizations realized the
potential of MIS and started funding MIS projects. MIS produced routine reports,
demand reports and exception report.
In 1980s, the personal computers made computing facilities within reach of small
organizations as well. People at each level started using personal computers to do a
variety of tasks. Decision makers started using the information held by computers.
The decision making process was further supported by decision support systems
(DSS). A decision support system is an organized collection of people, procedures,
software, databases and devices to support problem – specific decision-making. An
MIS helps an organization “do things right”, a DSS helps a manager “do the right
thing”.
Information systems have been evolving ever since. Workflow Systems, Enterprise
Resource Planning systems, and expert systems have been built to assist managers in
the process of decision-making. One thing is very clear that none of these systems
were a substitute for the manager they only assisted the manager.
7
Information Systems-I
5.4 STATUS OF MIS IN ORGANIZATIONS
Information systems are used in all functional areas and operating divisions of
business. In finance and accounting, information systems are used to forecast
revenue and business activity, determine the best sources and uses of funds.
Information systems have been used for managing cash and other financial
resources, and analyzing investment. Financial health of an organization is also
checked using IS. In sales and marketing, information systems are used to develop
new goods and services (product analysis), determining the best location for
production and distribution facilities (site analysis), determine the best advertising and
sales approaches (promotion analysis) and set product prices to get the highest total
revenues (price analysis).
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
There is too much data and information in an organization. In order to design a MIS
successfully, we need a framework to structure the information so that the data and
information relevant for decision-making can be separated from rest of the data.
Before we talk about the design of MIS, let us understand the strategic management
of a business. An organization must respond to market forces, competition, to
environment and to technological changes. The scope of business is wide, touching
many fronts. A business, among other activities, must do a long-term strategic
planning. There are many methodologies for strategic planning. According to model
presented by Robert Anthony, the strategic planning is one of the major activities in
business planning and control. The other two are the management control and
operational control. This framework is illustrated below:
8
Information Systems
Economics
Strategic Planning
Control Systems
Operation Control
2) Management Control is the process by which managers assure that the resources
are obtained and used effectively and efficiently to attain the objectives of the
organization.
3) Operational Control is the process of assuming that specific tasks are carried out
effectively and efficiently.
It is useful to classify the above definitions with some examples. The table below
gives instances of planning and control activities in different functional areas.
9
Information Systems-I Table 5.2: Differences in Information required for three types of
Planning and Control Processes
Information Strategic Management Operational
Characteristic Planning Control Control
1 Volume Low Intermediate High
2 Level of Aggregation High Intermediate Low
3 Frequency of use of a Low Intermediate High
particular type of data
4 Currency requirement Low Intermediate High
5 Accuracy Low Intermediate High
6 Scope Wide Intermediate High
7 Source Significant amount Mostly Internal Entirely
from external sources Internal
8 Predictability with user Low Fairly High Very High
9 Variability with user High Intermediate Low
10 Distance of user Fair Fairly close Close
(in organizational terms)
from sources within
organization
Let us now look at Simon’s framework that has broken down the process of decision
making into three stages:
1. Intelligence: This is the stage in which the decision maker recognizes that there
is a problem or opportunity that requires him to make a decision.
2. Design: The decision maker determines the alternatives that are available to him
to resolve the problem or exploit the opportunity.
3. Choice: In this stage, an alternative generated in stage-2 is singled out to be
pursued. The selection process may involve feasibility analysis or cost-benefit
analysis.
With this framework, we can distinguish between three major classes of decisions.
a) Programmed Decisions are there in which all stages are handled by following a
preset well-defined procedure. The decisions are repetitive and routine which
arise often and are capable of being modeled mathematically in their entirety.
The classic example would be inventory-ordering decisions.
c) Semi-programmed decisions are those in which at least one and no more than
two of the above stages can be handled by well-defined preset procedures. An
example where the intelligence phase is well structured would be the diverse
kinds of variance analysis. A comparison with a budget or standard is undertaken
in a well-defined way to signal the need for a decision. Subsequent stages of
design and choice, however, are not handled by a set procedure.
The MIS designer must plan to deliver reports in line with the organization structure.
This means that the main decision makers and the power centers must be recognized
in the MIS. If the decision-making responsibilities are clearly defined and allocated in
the organization, MIS must capture them. If the organization culture provides
sufficient incentives for efficiency and results, the MIS support this culture by
providing such information, which will aid the promotion of efficiency.
The organization system is an open system and MIS should be so designed that it
highlights the changes to the concerned level in the organization so that the action can
be taken to correct the situation.
The designer of the MIS should take care of the data problems. The input data to the
MIS may contain bias and error. The inputs to the MIS must be controlled to ensure
impartiality, reliability and consistency.
If the organization culture provides sufficient incentives for efficiency and results, the
MIS should provide information that will aid the promotion of efficiency.
If the organization is an open system then MIS should be designed to highlight critical
changes in the system or in its environment.
In designing an MIS there are two types of situations one may come across. If the
organization has no experience of computing applications, which will create the
maximum impact on the organization, it can be identified by using Zani’s framework.
Key success variables are however seldom obtained through a questionnaire survey
of managers. Data on environment, past company performance must be analyzed
and discussed to identify key success variable. It is sometimes useful to pen down a
quantitative measure of such variable. For example the performance of a textile unit
can be summed up through two indicators: contribution per loom shift and fixed cost
per loom shift. Similarly the performance of a shipping company may be measured as
11
Information Systems-I gross operating profit per day per voyage. Precise definitions of performance
indicators enable the analyst to understand and quantify the likely impact of
improvement in different task of planning and monitoring.
An analysis of the company’s key success variables can be done only after a
thorough understanding of the company’s operations. Consultants and vendors who
do not spend adequate time in understanding the operations are unlikely to throw up
application areas, which will create the maximum impact. They are likely to suggest
“off-the-shelf” applications. One should use standard software, which is available for
such applications.
For a company getting into computerization for the first time, a list of applications
would have to be generated, keeping in view a 4-5 year perspective on the basis of
which a suitable configuration would be decided. However the development and
implementation of the applications would have to be done in a phased manner. The
first few applications must be those, which can create an impact on the performance
of the organization, are quick to implement with the least amount of changes in the
existing procedures and systems. Initial success can make the later implementation
of complex and more involved systems easier.
For organizations, which have been into data processing and would like to graduate to
MIS, the choices are somewhat limited. Existing computer technology, manpower,
and past experience with computer applications etc., all such factors will condition the
future growth of MIS.
By and large an effort is made to create useful databases, which capture data during
the execution of routine data processing systems. Such data are then analyzed to
produce periodic planning report for monitoring.
Examples of such systems are the sales analysis based on invoice processing;
inventory control based on stock accounting; costing and profitability analysis on the
basis of financial accounting system. Marginal additions to data fields, new coding
structure, and revised procedures are introduced to make the data base and reporting
more useful.
Factors Facilitating Implementation of MIS
A few factors, which will increase the chances of a successful implementation of
MIS, are:
1) Involvement of top management in the computerization effort, in defining the
purpose and goals of computers within the organization.
2) Selection of an EDP Manager who has the political skills to involve managers in
choosing application areas, identifying information needs and designing reports.
3) A computer staff, which has interdisciplinary skills in computers, management,
and operations research.
4) A balanced expenditure on hardware and software.
Activity B
Can you visualize MIS without computers? Justify your answer.
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
12
Information Systems
5.6 ORGANIZATION AND INFORMATION SYSTEM Economics
– TWO-WAY RELATIONSHIP
Tasks
People Structure
Goals
Technology Culture
An organization is an open system that has the capacity to adjust itself to the
changing environment. The goals of an organization change in response to the
changes in organization or in its environment. The organization must change as
system to stay in tune with the goals.
MIS should be designed viewing the organization as a system. MIS design should
give due weightage to the human side of the organization and its culture. MIS should
be designed to give reports to main decision maker. In other words, the designer
must study the organization structure and identify the power centers.
In a tall hierarchy with a high degree of centralization, the MIS should give control
information to the higher management.
If the organization is structured on a functional basis, then the MIS should have a
functional design.
If the organization works on a standardized system where rules, policies, systems and
procedures have been laid down, then there become part of the MIS.
5.7 SUMMARY
This unit has given you a fair understanding of the main feature of a Management
Information System in Organizational Context, describing its various functions,
importance and relationship with planning, control and operations in an organization
i.e. what an MIS is and what it is not.
Further, the unit systematically leads you to the prevailing status of MIS in
organizations, discussing the ever growing need of information and its proper handling
(processing), which in turn led to the development of MIS and advent of computers
therein to cope with the hazards faced in coordinating and managing the
organizational challenges. We have also discussed different viewpoints about the MIS
13
given by same management scientists.
Information Systems-I
5.8 UNIT END EXERCISES
1) Define MIS. What are the main features of an MIS?
2) Write a brief note to explain the evolution of MIS.
3) What are the functions that MIS supports in an organization?
4) What is Simon’s framework for decision-making? How does it help in MIS
design?
5) What are the determinants of MIS design according to Zani?
6) Explain the following statement, “there is a two way relationship between
organization and Information Systems”.
14
Information Systems
UNIT 6 INFORMATION SYSTEMS Economics
ECONOMICS
Structure
6.1 Introduction: Growing Need of Information
6.2 Objectives
6.3 Data, Information and Knowledge
6.4 Value and Cost of Information
6.5 Information Systems: Success and Failure
6.6 Summary
6.7 Unit End Exercises
6.8 References and Suggested Further Readings.
In ancient times, people were required to keep record of their possession so that
governing body could tax them. Government and traders kept records to plan their
activities better. As society became more structured, the manufacturing sector also
got structured in the form of factories. As factories grew in size, it became necessary
for factory owners and managers to keep records of inventory and accounts.
Management needed more information for internal decisions. Investors, on the other
hand, needed information about the organizations, its soundness, and health. In spite
of the technological developments, there is an ever-increasing pressure for more and
more information.
There was a swing from integration to fragmentation. Now we are trying to integrate
once again. Most organizations were controlled and managed by single individuals.
But as the business diversified and grew, it became necessary to delegate authority
and responsibility to others. The communication lines and their length measured. As a
result, the owner often had very little knowledge and control on the decisions made at
the lower levels. More people at the lower levels got involved in their immediate
problems losing sight of the organization’s overall goals. The situation is depicted in
the following Figure:
1
Information Systems-I
Level I
Level II
Level III
Level IV
At Level I is the owner, Level II has middle management, Level III is lower level
management and at level IV are the workers.
Too many communication channels got established. The situation is changing and
some kind of structure is being introduced. The content scenario is closer to what is
shown below in Figure 6.2
Level I
Level II
Level III
Level IV
With increased size of organization, the volume of data generated within the
organization also increased. The information for rational decision-making, however,
became more difficult to extract from the pile of data.
6.2 OBJECTIVES
The data is now usable and we can process it to extract information such as the
amount withdrawn from account number 1234 is 5000.00. We can consolidate the
data and extract the information that 24500.00 Rs. were withdrawn on 25/2/04.
Data that have been put into a meaningful and useful context and
communicated to a recipient who uses it to make decisions it reduces
uncertainty, reveals additional alternatives or helps eliminate irrelevant or poor
ones.
Returning back to our example, the bank manager may decide the amount of required
cash based on the information of total money withdrawn.
1) Accurate: The information should be accurate and error free. The information
may be inaccurate due to incorrect data that has been used to generate
information. The data may be inaccurate due to human error. This is commonly
referred to as garbage-in-garbage-out (GIGO).
2) Complete: The information must be complete. The information should not have
been filtered that presents a biased picture to the recipient. Let us say,
salespersons of organizations are reporting sales information to the sales
manager. They make those sales for month of July are exceptionally low. They
delete this information from their report whereas the sales manager might be
interested in July sales just as much as in other month’s sales. He might even be
aware of the seasons for the dip and might be planning to boost sales in July. The
incomplete information may be useless for him.
3
Information Systems-I 4) Flexibility: Let us understand flexibility through an example. In a bank, the bank
manager would like to know the total amount withdraw and deposited through
transactions distributed and recovered through bank. A client would like to check
the total money he withdraws from his account and his present balance. The
information that the bank possesses should be flexible enough to present different
views of data to different people.
8) Timely: The information may loose its value if it is not received in a timely
manner. Imagine reading yesterday’s newspaper today.
Data Processor
Information
We can think of data having their own life cycle namely, data generation, data
manipulation, transmission of data (and communication of information) and storing/
retrieving and reproduction data.
The generation of data could take place internally and/or externally. This data has to
be captured by recording of data from an event or occurrence in some from such as
sales slips, personnel forms, purchase order etc.
The captured data would have to be stored either in person’s mind or in document or
in ‘mechanical’ or electronic device, microfilm, and punched cards/tapes or in device
of some suitable form before they may be operated upon or authorized.
Stored data would have to be retrieved by searching out and gaining access to
specific data elements from the medium where it is stored.
Data are also constantly being transported to the user in processed from. It is
transferred to storage from the source, then processed and passed on the user, who
again returns it to storage after working on it, which becomes available for further
retrieval.
The randomly accumulated data has to sorted and classified to reveal appropriate
information. For example, sales data can be classified product-wise, territory-wise,
4
salesperson-wise etc. Such a classification will give the sales data more meaning. Information Systems
Economics
Sometimes aggregation or synthesis of many pieces of data to structure a meaningful
whole or complete report is often required.
Processing of data might entail quite a bit of manipulation and calculations involving
addition, subtraction, multiplication, division etc. based on certain formulae.
Computations might have to be performed for deriving employee’s pay, customer’s
bill, financial ratios etc. Management science/operational research models might be
used for determining optional product mix, aggregate planning, and economic order
quantity determination.
Data stored must be utilized on some occasion by some one at some point of time;
otherwise there is no point in putting it in the inventory. When data is finally put in a
usable form it can be retrieved and turned into information at appropriate time for
decision-making.
Sort
Generate
Store Manipulate Utilize
Synthesize
Destroy
IT cost is so hard to estimate that one may be off by 50% or more. One of reasons is
that the overheads are excessive. If one unit of money is invested in IT, 57 units will
be spent on human resources etc. The Table 6.1 gives the cost involved.
a) Direct Cost
Table 6.1: Cost Involved in IT
Indirect human cost is more significant than direct cost and it is very illusive in nature.
Following is the taxonomy of indirect human costs:
• Management Time
• Management effort and dedication
• Employee Training
• Management Resources
• Personnel Issues
• Cost of ownership
• Employee Time
• Employee Motivation
c) Indirect Organizational Costs
• Losses in productivity
• Organizational Productivity
• Strains on Organizational Resources
• Opportunity Cost and Risk
• Business Process Reengineering
• Covert Resistance
Identification of Benefits
.
1) The project scope should be stable and well understood. If the scope of the Information Systems
project changes during the development of the software, the project is likely to Economics
suffer in terms of quality, schedule and budget overrun.
4) Support from the management is vital for the success of the project. If
management looses interest in the project, budget may be cut, key people may be
moved to another project or the moral support required by the team may become
non-existent.
5) The objective of MIS must be in tune with the objective of the organization. For
instance, objective of an organization is to cut cost. An MIS that aims to handle
financial transactions of the company is not in tune with the company’s objective.
6) The system should be user friendly and the response time should be reasonable
so that the user does not feel frustrated or over-powered by the system.
7) MIS should be developed with a clear objective that must be documented before
the development commences. The objective must be identified with the help of
all stakeholders. An analyst may have to interview concerned people to establish
their needs. He should consolidate the inputs and make a presentation in front of
stakeholders and the development team. This exercise may have to be repeated
till the objective becomes clear.
8) An important aspect of an MIS is data. Data policy such as what data will be
included, who will provide the data, who will validate the data, who will integrate
the data and how will the data retire should be clearly stated. These seemingly
trivial issues can turn a success into a failure.
10) The concerned people should be adequately trained on the new system.
11) The system should be properly documented so that attrition does not affect the
project or MIS adversely.
6.6 SUMMARY
In this unit, you have been introduced to basic concept of data, information, and
knowledge. You have also learnt the growing need for information in the society. The
life cycle of data was introduced. The information has a cost and value associated
with it which was discussed in some detail. An information system depends on many
factors for its success. We discussed the main reasons for success and failure of an
MIS.
9
Information Systems-I
6.7 UNIT END EXERCISES
1) Define data and information. What is the difference between the two?
2) What is the need of information in present day society? Why is it necessary to
have a structure in an organization?
3) What are the main characteristics of information?
4) What are various ways of assessing the value of information? Explain each
method briefly?
5) Write a detailed note on data life cycle.
6) What are the main reasons for success and failure of an information system?
Kanter, J., 1972. Management Oriented MIS, Prentice Hall Inc: Englewood-Cliffs.
Zani, W.S., 1973. “A blue print for MIS”, Harvard Business Review.
10
Information Systems
UNIT 7 MANAGEMENT INFORMATION Economics
7.1 INTRODUCTION
1
Information Systems-I
7.2 OBJECTIVES
After reading this unit, you should be able to:
• Explain the basic overview of the systems concept;
• Describe the management functions at various levels in the context of
relationships between management and informational needs;
• Apply the systems approach to analysis of organizational problems;
• Use MIS as a technique for making programmed decision;
• Describe the assistance of information systems for decision making;
• Explain the vulnerability of an information system; and
• Discuss the control and audit structure required for an information system.
A change that has occurred in recent years is the adoption of the so called ‘systems
approach’. In the past, managers, decision-makers and problem-solvers attempted
piecemeal solutions, thinking in an isolated compartmentalized fashion independent of
other operational units in the organization. Today besides professional managers,
political administrators have also become aware of the need for adopting an
integrated holistic perspective by adopting the systems approach to problem-
conceptualization and decision-implementation.
System concepts
Today we find everyone talking of systems—the transport system, educational
system, healthcare delivery system, defence system, economic system,
communication system, management information system, transaction processing
system, decision support system, computer systems, etc. we are in the midst of an
era of systems so to say. But what exactly do we mean by a system?
What is a system?
A system is an organized or complex whole. It is an entity; conceptual or physical,
which consists of interdependent parts or components. It is this interdependency
which consists of interdependent parts or components. It is this interdependency
which is characteristic of the parts of the system. It is an interlocking complex of
processes characterized by many reciprocal cause effect pathways. A system is a
complex of elements or components directly or indirectly related in a casual network.
This brings in the notion of some type of feedback and control to see whether or not
the system is a position to achieve the goals/purpose/objectives of the system. Any
system must have an objective or a set of objectives or a hierarchical set of
objectives. In a large context, a system is an assembly of procedures, processes,
methods, routines techniques etc. united by some form of regulated interaction to
form an organized whole. In fact no system, unless it be a totally closed system, can
exist in isolation.
A system is made up of sub-systems, which may be composed of further sub-
systems. We could carry on this refinement till we arrive at the so-called ‘black box’
level, which is some perceptible manageable level. Just as system is made up of sub
or sub-sub-system, it itself is part of a super or supra system. This could be termed as
the environment in which the system operates. The forces in the environment impinge
on the system while the system itself exerts pressure outwardly on the environment
thereby having some sort of a dynamic equilibrium at the boundary, which separates
the environment from the system.
2
Information Systems
Super or Supra System Economics
Sub system
(SSS - 1) SSS - 2
Black
Box BB-1 BB - 2
Processor/
Set of
Transformer/
Inputs
Converter
(a)
Boundary Wall Environment
Input Output
Adjusted
Processor
Measured Output
Information (MOI)
MOI
Comparison Control
Effector
of MOI & STD Module
STD
Standard Norm/
Budget
Information 3
Fig. 7.2 : Basic Systems Module (b)
Information Systems-I We can graphically depict the above narrative description in the form of Figure 7.1
below. Let us give an illustration in the context of Figure 7.1. well, one could think of
an industrial system or a factory system. A factory system has various sub-systems
like the production sub-system, the financial sub-system, the marketing sub-system
and the personnel sub-system. Now a production sub-system could consist of sub-
sub-systems of production control, materials control, quality control etc. the materials
sub-sub-system can be further broken down into ‘black boxes’ say purchasing, stores,
transportation etc. In turn, the factory system is part of the larger economic system
of the country which would be the so-called superior or supra system.
Activity A
Think of at least three examples in the context of the Figure 7.1
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
Further could you give yet another example in the context of Figure 7.2. Data could
be a set of input into a data processing, which would process/transform/convert the
data into output or information. One could think of raw material entering as input into
production system, which is converted/transformed or processed into an output i.e.
some final product.
Activity B
In the context of Figure 7.2, give at least three examples mentioning the inputs, the
processor, and the set outputs.
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
Top
Management
Revenue Costs
Schedules Measur
Goods Services
Operating Man
4
Fig. 7.3: Interaction of Management Levels
Continuing the example further in the context of Figure 7.3 this time, the quality of the Information Systems
finished product could be measured by comparing it with the standard specifications Economics
of the finished product. Depending on the deviations or variances the manager can
then adjust the quality and quantity of the raw materials. The environment of the
factory system under consideration could be other factories, competitors, customers,
markets, socio-political and cultural factors, government etc.
5
Fig. 7.4 : The Allocation of Managers' Time
Information Systems-I The hierarchical view of management is important for two reasons: information needs
tend to be different at different levels of management and the amount of time
devoted to any given function varies considerably with the level as can be seen in
Figure 7.4. The job content at various management levels is further elaborated in
Table 7.1.
Thus we take strategic decisions at the top level, tactical decisions at the middle and
operational decisions at the junior level. As can be seen from Table 7.1, the type of
problems and decisions at the junior level are quite deterministic and structured, so
we can have programmed decisions.
Table 7.1: Job Content of Management Levels
In certain cases, the decision can be made using a rule, procedure or quantitative
method. Such problems are known as structured organization may decide to place a
purchase order for every purchase requisition without worrying about merging them.
Such decision can be programmed. An organization may have a fixed re-order point
and fixed re-order quantity irrespective of demand. Such decision can be easily
programmed. Automated system such as transaction processing systems and MIS
are often used to handle programmed decisions. There systems generate reports for
concerned people so that they can take action. In our examples a purchase order will
be generated for every requisition and a purchase order will be raised whenever the
inventory goes below specified limit.
If the problem is unstructured, the solution cannot be arrived at using a set of rules of
procedures. The rules and procedures, at best, can help in identifying alternatives. An
information system that assists decision maker in making a non-programmed decision
is referred to as decision support system. A decision support system (DSS) usually
has large amount of data that is managed by a Database Management System. The
DSS presents various views of data to the decision maker to facilitate decision-
making.
The views and reports may present details according to the needs of the user. A user
may prefer graph whereas another user may like to see data in tabular form. A DSS
is designed to provide presentation flexibility to its users. Details can be rolled up or
drilled down depending on the requirement. For instance, sales manager of area A
would be interested in knowing total sales, details of each sub-area within his area.
He would also like to know sales in area B, area C etc. to measure his relative
performance. He would not be interested in details of sub-areas of area B as C; and
will down area A get complete details.
DSS should provide facility to its user to perform statistical analysis of data. The
sales data, for instance, can be analyzed for identifying seasonal fluctuations from
regular demand change. There are whole lots of software packages that can do 7
Information Systems-I amazingly good analysis of the data. Let us say, a company is considering an
investment in an IT Project. It can do a what-if-analysis to analyze worst and best
scenario. The expected cost and benefit can be changed within limits to estimate pay
back period.
These are situations when a closed form solution is not available. In such situation a
simulation model is constructed to gain insight. The model is tested on large number
of inputs. Sometimes, simulation is done to study the behavior of system over a period
of months in few days. A simulation system assists manager decision-making.
Ideally, one would like to have a DSS to help in decision making in every situation. So
far, no DSS has come close to being so general and useful at the same time. A DSS,
in practice, is developed for assisting in decision-making process for specific
problems.
Due to the potential of information systems, they are under constant attack from
intruders and hackers. Unauthorized access to data and programs may cost an
organization a fortune. For instance, an individual may disclose the stock levels of an
organization to a potential buyer who may decide to go to the competitor if he feels
that you may not be able to fill the order in time. In the world of e-Commerce, one
mistake could cost a client enough to justify a lawsuit. To avoid, abuse of information
system, proper controls must be set. There are many threats to information systems
such as hardware failure, software failure, user errors, program changes, theft of
data, services, equipment, and telecommunications problems.
We all know that prevention in better than cure. It is better to think of all possible
misuse and fraud from within the organization and establish system control to present
them. Such controls are reformed to as deterrence controls. We next discuss some of
these controls.
Input/output Controls
Input Control deal with entry of people who use the system as the data that is entered
in the system. People identification systems such as finger print identifier, retina
8
scanner, voice entry. A magnetic card reader is also becoming popular. Information Systems
Economics
The standard procedure such as well chosen passwords and different levels of
access are always put in place.
As far as data entry is concerned, the data forms may be used to validate data before
entry, identifying the person and date of data entry.
In the same manner, any output generated should leave an audit trail to identify any
misuse of the reports.
An information system is like any other system in the organization. it must be audited
and reviewed to make sure that it is operating and being used as intended. The initial
requirements and objective document serves as a reference. The system is audited
for its performance, use, cost, benefit and other design criteria such as planned
activity for which resources are allocated and time frame is set. A planned review is
time-driven that may be done every 6 months or every year.
The review must have a clear objective and reviewers must produce a written report.
The report must comment on the following factors:
Staff: Is staff sufficient and sufficiently trained? Are People controllable using the
system?
Safety: Are enough controls present to ensure safety? Are the controls working
effectively?
Cost Benefit: This is one of the key reasons for taking up review activity. This is also
the most difficult part of the review process. The reviews should try to be as
objective as possible.
7.10 SUMMARY
In this unit, we have learnt the basic structure of an information system. We also
learnt the MIS as an organizational unit within an organization. MIS and its role at
various levels of management were also discussed. MIS is used for making
programmed decision as well as in assisting the decision making process. The
information system is vulnerable and it can easily be abused. An information system
requires a control structure and it needs regular audits 9
Information Systems-I
7.11 UNIT END EXERCISES
1) Discuss fully the purpose of an information system.
2) Discuss why management needs information. Is it possible for the management
of an organization to make effective decisions without the aid of an information
system? Discuss.
3) “In the end, the information system is recognized only as a foundation for human
judgment, insight and inventiveness”. Discuss.
4) What impact does the implementation of programmed decision-making have on
the management system of an organization?
5) Compare and contrast programmed decision-making information system and
decision assisting information system.
6) What are different types of controls and audits required for an information
system?
Kanter, J., 1972. Management Oriented MIS, Prentice Hall Inc: Englewood-Cliffs.
Zani, W.S., 1973. “A blue print for MIS”, Harvard Business Review.
10
Information Systems
UNIT 8 INFORMATION SYSTEM SECURITY Economics
Structure
8.1 Introduction: Ethics in Information Society
8.2 Objectives
8.3 Information Rights, Privacy and Freedom in an Information Society
8.4 Protecting Computer Equipment and Files
8.5 Limiting Logical Access to Computer Systems
8.6 Disaster Recovery Plan
8.7 Computer Virus and Prevention
8.8 Summary
8.9 Unit End Exercises
8.10 References and Suggested Further Readings
Ethics determine generally accepted and encouraging activities within a company and
the larger society. Ethical computer users define acceptable practices more strictly
than just reframing from committing crimes. They consider the effects of their
activities including Internet usage, on other people and organizations. There are many
associations who have developed a code of ethics that provide useful guidance. The
association for computing Machinery (ACM) has developed a number of specific
professional responsibilities. These responsibilities include the following:
a) Access computing and communication resources only when authorized to do so.
b) Honor contracts, agreements and assigned responsibilities.
c) Give comprehensive and through evaluations of computer systems and their
impacts, including analysis of possible risks.
d) Accept and provide appropriate professional review.
e) Strive to achieve the highest quality, effectiveness and dignity in both the process
and products of professional work.
The above code of conduct for his deeds if a person accesses some data without
proper authorization, he held responsible. The person cannot say that data should
have been protected and get away with it. The information system and their impact
must be audited like other systems. Information system is like any other product and
the users must be aware of the risks involved. The unethical use of information
system can devastate an organization.
8.2 OBJECTIVES
After reading this unit, you should be able to:
• Describe ethical issues involved in information society;
• Discuss the right to privacy and freedom of information in society;
• Explain the need and mechanism to protect hardware and software from
unauthorized access;
• Recognize the importance of having a disaster recovery plan; and
• Measure the threat of virus and identify ways of preventing them
1
Information Systems-I
8.3 INFORMATION RIGHTS, PRIVACY AND
FREEDOM IN AN INFORMATION SOCIETY
Privacy is an important social issue involved in information society. Privacy deals with
the collection and use or misuse of data. Data is constantly being collected and stored
on each of us. This data is often distributed, sold or used without our knowledge. The
health care provider and retail shops have, for instance, forms of data on its clients
and customers. The fundamental question is “who owns this data and information?”
We know for sure that we would not like to share our medical records with others,
definitely not with insurance company or our employers.
The employer can use information technology to monitor the employees. The time
spent by an employee on computer can be recorded along with his activities. The
employer can use this data to estimate the number of breaks an employee takes. The
employer can easily monitor electronic communication in the form email. At the same
time, an employee can reveal company data to monitor employee’s emails. The
deleted emails can be retrieved and used as evidence if required.
Crimes involving illegal system access and use of computer services are also a
concern. The systems left unattended over weekends without proper security have
been used for commercial use. Computer magazines regularly report cases where
employees have used the facilities for their personal benefit sometimes at the cost of
their employers.
Hackers make use of their computer knowledge to gain access to others computers.
Sometimes, files, passwords, programs, or processing power are stolen. An intruder
may alter the data or destroy the data making it unusable and useless. A hacker
writes a small password snifter that is hidden from the computer owner. A password
snifter can steal passwords and gain access to data and files. There are Antisniff
Programs that can detect and block a password snifter.
All types of computer systems and equipments have also been stolen from offices. In
one recent incident, all hardware components from the computer age were removed
and carried away, leaving the cage behind.
2
Information Systems
8.5 LIMITING LOGICAL ACCESS TO COMPUTER Economics
SYSTEMS
Personal efforts can reduce the risk of unauthorized access. You must protect your
computing facility in the same manner in which you protect valuables. You must
follow safety and security policies of your organization. For instances, you may be
advised to change your password frequently and choose password carefully. In case
your organization does not have a written policy, it is time to create written computer
security policy. In case, an incidence takes place, treat it the way you would treat any
other theft. Inform the authorities, document the incidence as accurately as you can,
back up all you files and data immediately and keep them offline. You must secure
any evidence.
b) Upgrade your software with the help of patches, which are developed by
vendors whenever a security gap is found in the software.
c) Guest logins are always misused. Any book on Microsoft products advises
against creating a guest login. Group accounts such as head-sales should also be
avoided. Such accounts become public very quickly and no body can be held
responsible. In one of the academic institute of India, head-department account
was lying dormant for some time. A hacker noticed and started using it for
surfing the net and providing access to others as well. He used 60 hours of
download time per day for a month. At the end of the month, data is regularly
checked when this got caught and the only solution was to de-activate the
account.
d) Remote-logins also create serious threat to security. This fact is so well accepted
that Linux does not permit super-user remote-login. There was a time when
system accepted login and then prompted for password. While you typed
password, a star will substitute each character. A person from a distance could
easily learn the login and number of characters in the password. Systems have
now changed and login-password is accepted together.
e) It is a good idea to have dedicated servers for applications that communicate
with outside world. Encourage people to have separate passwords for Intranet
and Internet if possible.
f) In certain cases, the law requires that audit trail must be on. A document once
created cannot be changed without leaving an audit trail. Most of the ERP
packages, for instance, leave audit trail. In case of a crime, the audit trail can be
of immense hel.
3
Information Systems-I
8.6 DISASTER RECOVERY PLAN
An information system performs key functions for an organization. It for some
reason, the system becomes non-functional for some time, the consequences may be
unacceptable. Organizations usually have a set of emergency procedures for critical
functions. In best scenario, the end user will not be able to discover the failure of
regular system. Generally, the switching to alternate mechanism and procedures is
not seamless and the switching causes certain level of inconvenience to the users.
For instance, a library may issue books recording them manually if the information
system becomes temporarily unavailable.
The main reasons for system failures include power failure, data corruption, disk
failure, network failure etc. Nature also plays its role sometimes in the form of a
fine, flood or earthquake. In addition, labour unrest or human errors may also render
system unusable.
One of first stops of disaster planning is to identify threats. Not all the threats listed
earlier will be a concern to an organization. After identifying the threats, appropriate
disaster recovery plans should be implemented. We discuss disaster recovery plans
next.
Hardware backup
In case of a natural disaster or due to technology failure, the hardware may become
unusable. There are companies and firms that provide disaster recovery services. A
company may provide a hot site that has an operational ready to use system. This is
an expensive option, as the system is kept up to date, usually in different seismic
zone. The next option is to maintain a cold site. A cold site provides the infrastructure
but not the processing power and data. In case of a problem, the backup system is
made operational.
Some companies provide data backup services. You can keep a copy of your data in
electronic farm.
Software Backup
Software programs are precious assets of an organization that must be protected. A
human error may delete a software package or a hardware failure may make it
inaccessible. A simple strategy is to make copies of software and keep them safely.
In addition, one may like to keep another copy of-site in a safe environment.
The least one should do is take regular backup. If the data is too large, incremental
backups can be taken or selected data may be backed up at regular intervals.
The smart strategy is to be in pro-active mode rather than reactive mode. It may be
less expensive to plan ahead to avoid possible down time than suffer losses.
Virus writers have to balance how and when their viruses infect against the possibility
of being detected. Therefore, the spread of an infection may not be immediate. Some
viruses infect other programs each time they are executed; other viruses infect only
upon a certain trigger. This trigger could be anything; a day or time, an external event
on your PC, a counter within the virus, etc. Virus writers want their programs to
spread as far as possible before anyone notices them. In order to avoid detection, a
virus will often take over system functions likely to spot it and use them to hide itself.
Such viruses are known as Stealth viruses. A virus may or may not save the original
of things it changes so using anti-virus software to handle viruses is always the safest
option.
Polymorphic viruses change themselves with each infection. There are even virus-
writing toolkits available to help make these viruses. These viruses are more difficult
to detect by scanning because each copy of the virus looks different than the other
copies.
Viruses often delay revealing their presence by launching their attack only after they
have had ample opportunity to spread. This means the attack could be delayed for
days, weeks, months, or even years after the initial infection.
The attack phase is optional; many viruses simply reproduce and have no trigger for
an attack phase. However, these viruses write themselves to the disk without your
permission to steal storage and CPU cycles. These viruses often damage the
programs or disks they infect. This is not an intentional act of the virus, but simply a
result of the fact that many viruses contain extremely poor quality code.
As an example, one of the most common past viruses “Stoned” is not intentionally
harmful. Unfortunately, the author did not anticipate the use of anything other than
360K floppy disks. The original virus tried to hide its own code in an area of 1.2MB
diskettes that resulted in corruption of the entire diskette. This bug was fixed in later
versions of the virus.
There are currently over 50,000 computer viruses and that number is growing rapidly.
Fortunately, only a small percentage of these are circulating widely. A virus’ name is
generally assigned by the first researcher to encounter the beast. The problem is that
multiple researchers may encounter a new virus in parallel, which often results in
multiple names.
However, viruses are only one way your data can be damaged. You must be
prepared for all threats; many of which are more likely to strike than viruses such as
disk failure due to hardware problem. There are many other threats to your programs
and data that are much more likely to harm you than viruses. A well-known anti-virus
researcher once said that you have more to fear from a cup of coffee (which may
spill) than from viruses. While the growth in number of viruses and introduction of the
Microsoft Word® macro viruses and Visual Basic Script worms now puts this
statement into question (even though you can avoid these by just not clicking on them
to open them!), it is still clear that there are many dangerous occurrences of data
corruption from causes other than from viruses.
So, does this mean that viruses are nothing to worry about? Emphatically, no! It just
means that it’s foolish to spend much money and time on addressing the threat of
viruses if you’ve done nothing about the other more likely threats to your files. 5
Information Systems-I Because viruses and worms are deliberately written to invade and possibly damage
your PC, they are the most difficult threat to guard against. It’s pretty easy to
understand the threat that disk failure represents and what to do about it (although
surprisingly few people even address this threat). The threat of viruses is much more
difficult to deal with. There are no “cures” for the virus problem. One just has to take
protective steps with anti-virus software and use some common sense when dealing
with unknown files.
Finding a virus on your system may not be easy; they often don’t cooperate. Using
anti-virus tools is important.
A virus may or may not present itself. Viruses attempt to spread before activating
whatever malicious activity they may have been programmed to deliver. So, viruses
will often try to hide themselves. Sometimes there are symptoms that can be
observed by a trained casual observer who knows what to look for.
Virus authors often place a wide variety of indicators into their viruses (e.g.,
messages, music, graphics displays). With DOS systems, the unaccounted for
reduction of the amount of RAM known of a computer is an important indicator of
presence of a virus. But, under Windows, there is no clear indicator like that. The
bottom line is that one must use anti-virus software to detect and fix most viruses.
Your main defense is to detect and identify specific virus attacks to your computer.
There are three methods in general use. Each has pros and cons. Often, a given anti-
virus software program will use some combination of the three techniques for
maximum possibility of detection; namely Scanning, Integrity checking and
Interception. We briefly look at scanning next.
Once a virus has been detected, it is possible to write scanning programs that look for
signature string, which is a characteristic of the virus. The writers of the scanner
extract identifying strings from the virus. The scanner uses these signature strings to
search memory, files, and system sectors. If the scanner finds a match, it announces
that it has found a virus. This obviously detects only known, pre-existing, viruses.
Many so-called “virus writers” create “new” viruses by modifying existing viruses.
This takes only a few minutes but creates what appears to be a new virus. It happens
all too often that these changes are simply to fool the scanners. Newer scanners
often employ several detection techniques in addition to signature recognition. Among
the most common of these is a form of code analysis. The scanner will actually
examine the code at various locations in an executable file and look for code
characteristic of a virus. A second possibility is that the scanner will set up a virtual
computer in RAM and actually test programs by running them in this virtual space
and observing what they do. These techniques are often lumped under the general
name “heuristic” scanning. Such scanners may also key off of code fragments that
appear similar to, but not exactly the same as, known viruses.
The major advantage of scanners is that they allow you to check programs before
they are executed. Scanners provide the easiest way to check new software for
known or suspected viruses. Since they have been aggressively marketed and since
they provide what appears to be a simple painless solution to viruses, scanners are
the most widely used anti-virus product.
If too many people depend solely upon scanners, newly created viruses will spread
totally unhindered causing considerable damage before the scanners catch up with
the viruses. An example of this was the attack by the Maltese Amoeba (Irish) virus in
the UK. This virus was not detected prior to its destructive activation on November
1, 1991. Prior to its attack, it had managed to spread quite widely and none of the
existing (mostly scanner-based) products detected this virus.
6
Another major drawback to scanners is that it’s dangerous to depend upon an old scanner. Information Systems
With the dramatic increase in the number of viruses appearing, it’s risky to depend upon Economics
anything other than the most current scanner. Even that scanner is necessarily a step
behind the latest crop of viruses since there’s a lot that has to happen before the scanner
is ready. The virus has to be detected somehow to begin with. Since the existing scanners
won’t detect the new virus, it will have some time to spread before someone detects it by
other means. The newly discovered virus must be sent to programmers to analyze and
extract a suitable signature string or detection algorithm. This must then be tested for false
positives on legitimate programs. The “string” must then be incorporated into the next
release of the virus scanner. The virus scanner or detection database must be distributed
to the customer. If you depend upon a scanner, be sure to get the latest version directly
from the maker. Despite the most extensive testing it is possible that a scanner will
present false alarms (i.e., indicate a file as infected when it really is not).
Another line of defense is continuing education.
8.8 SUMMARY
In this unit, we have learnt about ethical issues involved in information society. We also
discussed the right to privacy and freedom in information society. There is a need and
mechanism to protect hardware and software from unauthorized access. You must
understand the importance of having a disaster recovery plan and every organization
should plan against a possible disaster. We also discussed the threat of virus and ways of
preventing them.
Bishop Matt(2002), Computer Security: Art and Science, Addison-Wesley Pub Co; 1st
edition.
Pfleeger Charles P & Pfleeger Shari L., (2002), Security in Computing, third edition,
Prentice Hall PTR.
http://www.cknow.com/vtutor/vtintro.htm
7
-
Introduction
0b.jectives
Infor~iiationfsom Data
Types of Information
Information in Managerial Functions
Information Source: Internet
Information Systems ill Management
System De\/elopment: A Strategic I.'l;~~ilii~~g
P~.ocess
Progra~nmedancl Non-P~.ogrammecIDecisio~is
Environmental a11dCompetitive Information S!'stem
Infol-mationSystems in Functional Arerts ancl Ilccision
9.1 1.1 Marlteting
9.1 1.2 Operations Mana,ilement
9.1 1.3 Financial Management . 1*
9.1 INTRODUCTION
The world is passing through an important era in wliicli k~iowledgeis co~isideredto be
a supreme source for all other activities. Well-appreciated strategic decisions are the
outco~iieof good knowledge. Acquirement of k~iowledgeat one point oftime and
coiiti~iuousupdating keeps ;perso~i fit for business survival in tlie competitive
environ~i~ent. Learning froni persdhal experience is one way of gaining k~iowledge.
But as we know. it takes lot of tinie and some times it niay become impracticable.
K~iowledgegained t h o ~ ~ otlier
g h s o ~ ~ r clike
e s educntio~i,interaction witli others and
otlier means is comparatively faster. Information enriches tlie k~iowledge.Role of
informati011and knowledge in managerial decision-making is inevitable ill nature. In
managerial fi~nctio~is, knowledge integrates the activities of different departments and
enables tlie decisioli maker to take riglit decisions. Fitrtlier i~~formation enriclies the
nianqgel-s about tlie latest sce~ia'~.io
on tlie vital areas of functional ~lianage~iient like
Finalice, Marketing, Hunian Resource arid Operatiolis, Inforniatio~iis not only tlie
fou~idationfor any business: it tilso plays tlie role of bricks ill builclilig up tlie busi~iess
decisio~is.The generation and dissi~iiiltltionot'information should be a co~itinuous
process ill tlie orga~iization.
i unit you will pet an overview of basic i~ifoniiationsystems with focus 011
111this
I fi~nctio~ial
areas, 'l'lie co~iiirigtwo i~liltswill den1 witli HR and M~rketing
i ' M~~ingeme~it
and Opertitio~ismid Financiiil Mr!ringc~ne~~t respectively,
,
I
Infi,~.rns
tion Systems - IT
I --.- .--
9.2 OBJECTIVES
After reading this unit: you should be able to:
@ Describe the importance of inforniation in managerial fi~~ictions:
@ Identifi the role of iilfoniiation:'
@ Identifi. and appreciate
. -
tlie basic infonliation s!.stcms.
@ Diagnose tllc situatio~lfor de~~clopmcnt of infonilation s!,stem: and
Attribute tlie role of i~~foniiation s!~stc~iisin fi~nctio~ial
rircns of maliagcmcnt.
1
9.1: Position of the Infomation
Fig~rc
@ Su~ntnnrisntion
0 Dntn Trimming
Pre3cnt:;tion
I
Irrclcvatit
Iirformiition
Fncts I
I lafornintion . &
Discard
lnvestiga te
Sources (Inside or
Outside the Net) ,
,
Soul.ce: h//p '/vi.rioiic/i:vilr(~~~I,>
Data Trimming
Data trimming is the condensation or consolidation of statistical data for retrieving I
information. Tliere are specific statistical data reduction tools fortrimming the data.
Depending L I P O ~the
I nature ofthe data and tlie objectives of the study, tlle tools are
decided. I n practical situation we come across a huge volume of data for retrieval of
inforination and the application of co~nputersand the statistical software are used at a
large scale to draw conclusions. Suppose that the production department in a
man~~facturing company has the data on the number of units demanded i n a year, the
n111nher of times ordered, the quantity supplied etc., about its product. The company I
may be interested to find out various parameters associated with the productioi~like
tlie opti~numqiia~~tity to be produced, the lead time for the order etc., Wit11 the
application of statistical packages related to tl~einve~itoryproble~ns,it is possible to
derive tlle required information. I
Presen tntion
Tlie outcome of the data triniming is the uninterpreted statistical results. The results
obtained need to be related to the objectives for the meaningful representation. Tlie
process of depicting the statistical results in the desired form (charts, diagrams,
schematic representation etc.,) is called presentation. The presented results will
reveal tlie information in a better way. Information, as an object could be derived
from tlie presented results.
Indexing
Indexing or codification oftlie resil Its is required for fi~rtllerprocessing of information
like storage and retrieval, modification, converting into electronic mode for
commi~~iication etc., The codification is the base for presenting the information on
web pages. In the Internet searcll the codes are recognized by tlie computer at a
greater speed to retrieve them from the data dictionary or catalog. The big con-lpi~ter
databases are designed and used for data retrieval through proper indexing of the
data. p i 7 iraw
~ ~ data
~ collected from the field beconies infor~nationin the final forrn.
This has been depicted in a schematic representation given above.
TYPES OF INFORMATION
lnfor~nationretrieved from raw datacould be classified in different categories as:
1) Facts
2) Assumptions
3) Collateral i~ifor~nation
4) Fragmentary infor~natio~~
5) Irrelevant information
Facts are the accurate inforination. The infor~nationgenerated with the assumption of
~natliernaticalmodels is called reliable inforlnatio~iwithout any uncertainty. In some
statistical analysis certain amount of probability is used to predict the required results. !
Si~chinfor~liationmay not be 100% true. This type of information is called
informati011based OII assu~nptions.The other type of information is called collateral
and fragmentary infonnation. Tl~istype of i~ifor~nation cannot be directly retrieved but
is a parallel source of information. It is not considered to be highly reliable. Such
sources need to be investigated for acceptance.. ,
Before going illto details about fu~ictiolialarea applications of illformation, let us take
sonie situations that higliliglit the information requirement and its typology. The I
fol lowi~igare some of the managerial situations wliere the information requirement is
evident ill businesp situations.
-!
Table 9.1: Infornlation Requirelnent in Managerial Situations Information Systems and
Functional Area Applic :I t'Ions
In each of tliese above situations tlie manager responsible for taking decisions
requires sufficient infortnation from the relevant records available with the
'
organization. Tlie term information means collectio~iof facts fro111which business
decisioris can be drawn. Facts and figures collected in this connection will enable tlie
company to go for a valid decision.
I I SBudgets
P ~ ~ Ii~nd
Sales FOI-ecituting
Labout-01-iented
c Cl;lssifici~ttion
F i y ~ r 9.4: of Info~mittiollNeeds
i711c
llllks alllorlg tllc ~~crspccti\/cs
on infonnatio~i111an organization and as a manager Infortn;~tionSystems i111d
Functitrnr~lArea Applications
a1.c sho\ln belo\\,.
Activity A
You are working in an FMCG company as a manager. Your company wants to
launch a new product. Search the web to fi~ldout tlie similar products by different
companies arid make a coniparative chart of the critical information that will help the
cause of your company.
Processing output .
In a system the different components are con~lectedwith each other and they are
intel-dependent. For example, Human body represents a complete natural system. We
are also bound by many national systems such as poIitical system, economic system,
educational system, and so forth. The objective of the system demand that some
output is produced as a result of processing the suitable inputs.
I
a - A Decision
(Stratagical)
pl e v l a
Transaction
Middle level pro.cessing
(Tactical)
/ Bottom level
(Operalional)
\
Onice
automalion
to
area, it is possible retrieve the data for any Lrther informahon. This kind of
approach is called integrated data approach and the development of system is called
integrated system. The master database created here should be flexible to have the
following features:
I) Distribute and share the data on network,
2) Nonnalized to accept che unique characteristics,
3) Capable of automatic updating,
4) Quick query.
The followiilg diagram depicts the creation of centralized database for application to
various fwnctional areas of management.
Financial Plan
Cost & Asset
Accounts Received
Inven t o ~ yCosting
Cnpncity Planning
Joh-pe~~fu~mnncc
Requirement Plnn
1 -I
Pipre 9.7: Creation of Centldized Database for Various Functional Areas Application
A typical example of role o f information systems for the iniportat~tareas of functional Information Systems ~ n t l
~hanagenientat different level of decisio~i-makingis shown below: Functional Area Applications
Production -
Finance -
Personnel -
Marketing
Strategic New Plant Alternative Welfare Competitor
Location Financing Policy Survey
Tactical , Production Variance Performance Advertising
Bottleneck Analysis Appraisal
Operational Daily Payroll Leave Sales
Scheduling. Records Analysis
6 1 Development I
System Design ~ocument.Focuses on how to deliver tlie
rea uired functionalitv.
Converts a design into a complete information system.
II
1 I lncludes acquiring and installing systerns environment: I
creating and testing databaseslprepari~lgtest case
proczdures: preparing test files: coding, colnpiling, refining
I I programs; performing test readiness review and procurement I
1 activities.
7 lntegration and Test Demonstrates that the devcloped system conforlns to
requirements as specified in the Functional Requirements
Document. Conductcd by the Quality Assurance staff and
users. Produces Test Analysis Reports.
8 Implementation Includes ilnplementation preparation, implementation ofthe
system into a production environment, and resolution of
'
problems identified in the lntegration and Test Phase.
9 Operational Describes tasks to operate and maintain information
Maintenance systems in a praductian environment, Includes Post-
l~nplementationand In-Process Reviews.
10 Disposition . Describes end-of-system activities. Emphasis is given to
, I proper preservation of data
SOUI'C~:
h l l l ~ : / / i ~z~~doj..q(l\:
~~~i(!
~nforrnationSystems - 11 In short tlie tasks pertaining to design isjistenl consists of defining the problem,
understanding the management objectives, identifying the system constraints,
understanding the need for information, searching for alternative designs and finally
docutnentingtheconcept. The following schematic presentation depicts the typical
planning process of a systeln development.
i
Figure 9.8: Qpical Planning Process ofsystem Development
77
Maintenance
systemstudy
Feasibility Study
t
implementation
4
System Analysis
t
Testing
Development
Life Cycle
4
System Design
IG
Coding
2
Figure 9.9: Different Phases of Software Dcveloplnent Lifc Cgclu
lnformrtion Systems and
PROGRAMMED AND NON-PROGRAMMED Functional Area Applications
Over tlie years tlie 13rogra1n1iiedand non-programmed decisions have also been
known as structured and unstructured tlecisions. While designing, information
systems one slio~~ld keep this vital difference between tlie two types of decisions in
mind Flexible access to data, user friencll iness, graphical Llser interSaces, natl~ral
lallgllage suppott, what-if ailalqsis, capability, etch.characterize information support
for non- programmed decisions.
.
ihkrnntk)or Byst~tn!, I! Exaniple for Programmed Decisions: Consider tlie problem faced frequently b) a '
small and ~~rediurn sized e~iterprises(SMEs) in deciding about the size to be ordered
lo ~nasinlizetlre profit 011 consumable items (nu~nber. o f 1111its
o f food packets). The I
Get I)and Q
I
-
I
I
.
I
')"his is celled conccptuulization o f tile problem. Once tlie problem is conceptualized,
\t.c..ctlt~give the mathematical fitnctian to tlie problem,
-.
nroclel defined above coc~ldbe wed for any available quantities o f D and Q.
.']'he
.
1 lic advantages o f this n~odelarc:
'
I) Tlie system is open to arlyorlc in tlie organi;rnt~onfor applicatron
2) Instrlnta~leousn ~ i daccurate ci~lculatianis pvssible
3) Entrblcs co~~ip~rterizntion
oi'tlie system
4) k'lcsiblc Sir rev icn~lmodification.
I
Though tlie programmed decisions are considered to be more accurate, tliere are
some situations in which the assumptions made under this category cannot be fully
practical and lielice tlie approacll of non-programmed decisions are used. If the
decision maker is we~l'ex~erienced, no doubt the accuracy could be maintained and
admit that tlie experience improves tlie problem solving,
The informatio~isystem developed for business purposes should take into account all
tlie conditions,'which affect ihe business transactions. Usually the two major factors
I-esponsiblefor the business changes are the enviro~i~nental conditions (local and
global) and the co~iiparativefactors. Successful development of illfortnation systems
sli~~i~ldhave been based on tlie deep understanding of the organizatiatial structure and
dynamics of the enterprise also. For production department tlie assignment ofjobs to
~nachi~ies or machines to operators in a production eliviron~nentis very important. For.
a service organization like hospital itmay be a duty roster for nurses, doctors or other
paramedical staff: Such scl~edulesmust be detailed and unambiguo~isreports could
be produced in large number at relatively low cost. Most of the information contained , '
' in such reports is internal - to tlie special sliop or liospital. Some organization are
goal oriented, the analyst nus st be clear as to what information exactly need to be
collected, stored atid analyzed. Since every information must have acontext, only
operational inform,ationthat ulti~natelyhas some decision-making contribution must be
collected. Secondly, tlie information collected and processed must be co~isistentwitli
the level of tlie organization to wliicli it is to be presented. Organizations have not
only found out tlie i~n~riense utility of information systems to better Inallage tliejr
organizations but are also feeling the pote~itialof the competitive advantage provided
by, illformation as a resource. The classic example of ilre use of inforrnatio~ifor
conipetitive advantage is,SABRE Airline Reservation System of American Airlines
and tlie Frequent Filer Option introduced by Airlines tlie world'over. These are
esamples that illustrate tlie use of infor~nationnot just to run business effectively but
also to,open up new busi~iessvistas.
Detailed Sales A~ialysisis a must for ally sales and marketing function. This might
i~ivolvea very detailed data collection and processing pertaining to every salesman,
every product over a loiig time span of an entire year or a quarter with even details
'of the region, market segment etc. Accuracy and timeliness of this effort would
decide the quality of tactical and strategic decisio~isthat may be based on summary
information generated out of this data. Accuracy and desegregation would be the
watcliword for such detailed data collectio~ieffort. ,
I
!
lnformrtion Systems - I1 Natt~rallyinformation systems milst have suln~naryinformation, with provision for I
Let LISdiscilss some of tlie infortnation systenis in functional areas and their
contribution to decision-making.
9.11.1 Marketing
The term marketing as per the American Marketing Association (AMA)
is defined as follows:
The process oT:
@ Planning and executing the conception,
' @ Pricing,
@ Promotion and
Distribution of ideas, goods, and services to create exclianges tliat satisfy
inclivid~laland organizational objectives.
Outputs
Intensive reports on itidustry wide sales performances,
Inferences of results'c~rn~ared to forecasts with respect to past marketing
strategy, advertising and pricing
Review of marketing strategy, advertising and pricing policies, I
Marketing Planning:
, Inputs
0 Summarized data from market research.
Outputs .
Marketing Control
Inputs
Sales data of various products o f a co~iipahy,
Marketi~ipexpelise datn.
i ~
sales performance d ~ t personnel/
Sumniarized output sales a~ialysisco~istit~~ting a
repion/p~.oductwise.
/ , Sales tl-ansactiondata from i~ivoicingand sales systems.
Outputs
a * Variance analysis.
It
Age analysis,
'e Tactical reports on desirab'le a~id
undesirable trends.
:I r
Compny
Database
MARKETINGSUESYSTEM
.+ Sales Forecast
Md&l
'*
Dab .a
Profit Plsn
Pertaining to
Sales Plan, . -++
@ Planning
Brand Switching
'
' M~lcriPla
Bills, Profit Porceptionei
Q Snlw Anslyslls
Plan etc. Analysis
-nr
. - -
't
t
27
11
4
- L
Inft~~.rn;)tion
Systems - 11 To integrate tlie activities of marketing, sub-systems are broadly classified on thc
followi~igtypes:
1) Control systems
2) Planning systenls
3) Market research systems
4) Sales systems.
Activity B
Prepare a brief report on tlie niarket pla~~i~iiig
and sales ailalysis of a cornpan!, of
your choice. What are the benefits derived out of: computers and MIS.
@ Project scheduling
Tr,msportation costs nlininlization
@ Assignillent of jobs
@ Sequellciilg of jobs
The probleills ill opcratioils management are well stn~ctured.The tools of opcratio~is
research need to be comp~~terized for better results because of the followi~lgreasons.
Easily structured tllrougll ii~atlleinaticalmodel
e Nu~uericaloriented . .,
The integrated system approach could be shown through the followiilg schelnatic
representation.
d Orders Received
d Production Rules A
d Invoice Data
INPUTS d Shipping Note
d Sillcs Forecnst
D m A\~ilil:ihility OUTFJU'IS
Outouts in the
24
Figulr: 9.11: The 1ntegl.itted System A j ) p r ~ i ~ ~ h
c.
Inventory Management lnfornlation Systems a n d
Functional Aren Applications
lliventory Management system allows you to
e Manage your stocks on a quantity and value basis
Plan, enter, and check ally goods lnove~nents
o Carry out physical inventory.
'The following are tlie important activities to be carried out for a better control over
the ~nanagementof inventory.
in the Inventory Matlagelnetit system, the pliysical stocks reflect all transactions
resulting in a change in stock atid thus in updated invelitory levels. The user can
easily obtain an overview of the current stocks of any given material. For eacli
material, not only tlie stocks in tlie warehouse are sliown, but also the stocks ordered
but not yet delivered, reserved for production or for a customer, and tlie stocks in
qi~alityinspection can be ~nonitored.For example, If a fi~rtliersubdivisio~iby lots is
required for a malerial, one batcli per lot is possible. Tliese batches are then managcd
individually in tlie stock. Special stocks from tlie vendor or from tlie customer (for
example, consigli~nentstocks) are managed separately from your company's own
stock.
Physical Inventory
Tlie adjusrment between tlie pliyslcal stocks and the book invetitories can be carried
out independently of tlie pliysical invelitory lnetliod selected. Tlie System supports tlie
following pliysical inventory methods:
0 Periodic inventory.
I~ivetitorysampling.
Q Cycle counting.
Information Systems - II 11ivoice Verification
purchase order.
Warehouse Management
provides automated support for several advanced warehousing techniques, sucli as:
e and automatic assignment of goods to optimurn
The analysis of ~*zq\~ire~iients
locations in tlie warehouse ~ ~ s iput
~ i away
g strategies that can be easily defined to
match tlie characteristics of each storage area,
m Tlie configuration of areas for backorder staging and claoss-dockingof received
goods,
e 'The setup of "forward pick" areas and production s~lpplyareas with automatic
continuous repletlisliment from case or reserve storage wlieli a certain tliresliold
is reached.
Be~intii~ig with tlie planning phase, the WM systeln carries out stock availability
clieclcs ullencver trt~nsnctionsare iniliated in each of the respective systeln
components. Altliough it is possible to print material documents for each separate
transaction in the warehouse, tlie WM systeln facilitates automatic Row through
wareliousi~igtasks that are virt~~ally papel-less.
In tlie \Varehouse Management system, you create transfer orders bzsed on transfer
~~equirements. Transfer orders trigger and control the physical movement of goods
~litlii~ithe wa~.elio~~se.The WM systelii si~pportstlie processing of all relevant
riiovements. includi~lggoods receipts and goods issues initiated by the Inventory
Mariagernent (IM) system, deliveries from tlie Sales and Distribution (SD) system, as
well as movelnents that take place within the warehouse, such as internal stock
tra11sfer.s.With its illve~ltoryf~~nctions,tlie WM systelii clisures that boolc inventories
in tlie Inventory Ma~iage~iie~it systeln ln~tclitlie stock iu the ~~areliouse,at any time.
Because syste~iicomponents are fi~llyintegrated, you do not need separate interface
programs between tlie Inventory Management systeln and the Warehouse
Ma~iage~nent system.
+
Figure 9.12: The Activities and the Required Outputs for the Develop~nentof a System
.......,..
.. .... .,,.7.Ln,,J - II Y. 11.3 Financial Management
Financial accounting deals with collection, recording, arid evaluation offinancial data.
Bttsiness enterprise requires systelnatic maintenance of their records that help for
preparing the financial statenlents like Profit and Loss Accounts and Balance sheet.
Accotulting is considered as an information system because it has inputs of financial
data, processing by evaiuation and outputs through financial reports. The importance
of financial information system for the different users in the managerial area can be
depicted as:
-
Nature of Information Ultimate User
To fillfill the needs offinancial illformation the itiformation system used in most ofthe
co~npaniesmay be classified as under:
. ,
System development for financial management is not only to make the computerized
billing or providing the receipts for the transactions. The system integrates number of
financial transactions of the organization.
9.11.4 ~ u m a n
Resource Management
1-he manpower utilized in the organization is treated as a valued asset. Tlie
management of this asset is just like management of any other source in an
organizatio~l.Organizational, effectiveness and efficiency, growth of the business,
sustainability for the competitiveness can be seen through proper management of
hilman resources. HRD management emphasizes an optimum utilization of human
res9urces by formulating consiste~itand coherent policies aiined at promoting
Int'c~tmationSystems - II commitment to the organizatioil. Tile infbrmation system 011 HRD is restricted to
persolme1 managenlent systems whose role is to assist in:
8 Recnlitment,
Placement,
0 Training and development,
The vital area covering the above activities is called Humall Resource Plai~~ling.
HRD syste~nbinds fi~nctionsof personnel management systems with other fi~nctions
of organization such as marketing, finance, production, and inventory.
I
0 Recruitment
OUTPUTS
PROCESSING
Alterni~teSources
e Woi-kAn;llysis
* Cnst4)cnctit
9.12 SUMMARY
In this unit. an attempt has been made to explain the importance of information.
informatioil generation as a system and role of infonllation in various areas of
Eunctioilal ina~lagemei~t,We have discussed some of the key points (environmc~~tal
m ~ dcompetitive) to be kept in mind while going for the development of infontlatiol~
systems. Steps in the process have been discussed to familiarize the learners to
practice for the developillent of the business system for the given enviromiellt.
Soine of the areas left out are project, medical and health care, township, training: firc
service, and energy etc. lllese all have similar needs to build up from the basic iriputs
a good quality database each and then to evaluate selective data, analyzed data, int(?r-
.
linked data and aggregated data to derive suitable MIS support to decisionmaki~lgax
the corporate level,
30
Information Systems and
9.13 UNIT END EXERCISES Functional Area Appliiertians
4) Visit some of tlie 01-ganizationsto identify the information systems used for better
management. Suggest tlie ways and mealis for the improvement.
-
9.1 4 REFERENCES AND SUGGESTED FURTHER
READINGS
Clifton. 1-4. D.. 1986. Bu.sin~..ssDrr/aS"j'afenrs,Prentice-Hall: Englewood-Cliffs,
CS R (20021, M~~nugemenf
Pvtu~-tl~y fr~forn~ation Texl and Applicofion,~,
Sj/sten~,~:
Third Edition. Himalaya Publisliing House, Murnbai
10.1 INTRODUCTION
Management information system, in general, consists of all business transactions of
the organization. Every information system has many subsystems like transaction
processing system, decision support system, office automation system etc., to have a
larger utility of database created for business analysis. Data stored in the form of
computer database need to be retrieved properly to satisfy the information
requirement of different operational areas of management. The decision makers do
retrieval of information from the master data through a set of well-defined tools. For
example, to calculate the net salary of an employee, we need to supply different
inputs like basic salary, number of days present, existing DA, and HRA levels.
Accounts department uses this information to calculate the final receivable salary of
an employee. This process is called transaction process of the data for payroll
calculation. As this is a part of the information system, it can be called as a
subsystem. Preparation of transaction documents such as pay slips, invoices, and
receipts is important and routine task performed in managerial functions. The general
view of transaction processing system is shown below:
Transa
Modu
Central
General Processing
Database
Transa
Modu Etc,
Output
Formats
1
Figure 10.1: General View of Transaction Processing System
Information Systems -toIIget the desired information through the specific tools of
Data manipulation
management is called transaction process. As applicable in other cases, different
areas of management like HRM, Finance, Operations, and Marketing have various
business data processing and hence the sub systems to generate required output are
needed.
10.2 OBJECTIVES
After reading this unit you should be able to:
• Describe the role of transaction processing system in managerial functions;
• Identify transaction modules in a subsystems;
• Integrate subsystems to get desired output;
• Discuss the subsystems in Human Resource Management;
• Explain the subsystems in Marketing; and
• Enumerate the advantages of computer oriented transaction processing.
Recruitment Human
Resource
Management
2
10.3.1 Recruitment Integrated Applications
10.3.3 Retirement
Personnel department keeps track of retiring employees. It completes all the formali-
ties necessary and issues orders for providing retirement package through account
department. The calculation requires various inputs about the employees from the
personnel records.
There are other subsystems also like Compensation & Maintenance etc. Another
interesting subsystem could be Skills inventory program, which identifies and locate
the talent resources of the organization to maximize their use. The concept of “Skill
banks” or “manpower assessment program” is applied. This could be one of the
subsystems to develop and support the main system.
Further, the data pertaining to personnel information about the employees are
confidential in nature. In manual system there is always the possibility of unauthorized
access to these data. With the computer system, the access can be controlled through
the password and hence the confidentiality can be maintained.
Let us make a comprehensive list of uses of computers in HR area.
The main uses to which computers can be put in human resource departments are:
Keeping Records: Replacing card indexes and filing cabinets by compact discs.
Listings: Quickly providing listings of employees by department, occupation, grade,
pay level, length of service, age, sex, qualifications, skills, etc.
Automatic Letter Writing: Producing standard letters and forms for recruitment,
promotion, transfer, upgrading, appraisal, pay review and new contracts of
employment.
Manpower Planning: Using manpower data to forcecast the future demand and
supply of people. Manpower models can be used, for the following forecasting
model for examining a hierarchy of grades by age. Useful for gaining general
understanding of future movement of staff and changes in age/grade structure
Labour Turnover Analysis: Providing labour turnover statistics.
Career Development: As a development of manpower planning models, computer-
ised personnel information can be used to improve succession planning.
Recruitment: The computer can, in effect, be used as a filing cabinet to store details
of cash applicant, date of receipt of application, when called for interview and the
outcome. If an applicant contacts the company, he can be informed of the progress of
his application. Managers can be given details of the number of applicants and how
many have been interviewed, Lists and automatic letters can be produced when
calling for interview rejecting applicants or making offers.
Training: Records can be kept to check on who has received training or on progress
through other training schemes. Listings of skills and qualifications be department or
occupation can be produced to identify gaps and training needs.
Pay: Information can be drawn from both personnel and pay-roll systems to analyse
pay-roll costs and ratios and to assess the impact of various pay increase options on
the pay stucture and on total pay-roll costs. Budgetary control systems can be
computerised to show actual pay-roll costs against budget and project future costs.
Salary Administration: Salary analysis reports can be produced which give
information by employee on occupation, salary position in salary range, total
percentage increases over previous years and annual appraisal. Individual forms and
departmental schedules can be generated for salary reviews and analysis can be
4made of the salary structure (e.g. comparisons).
Job Evaluation: Data bases can be created to hold and process Integrated Applications
the information on
job evaluations, such as grades and point scores. Weightings of job evaluation factors
can be determined by multiple regression analysis and the recording and analysis can
be computerised. In a job evaluation exercise, the information system can be used to
point out the names of those whose jobs are to be evaluated. Details of job, grade,
function, location, sample size and current point ratings can be programmed in. The
data base can link together similar posts in different parts of the organisation. Listings
of all gradings, re-gradings and points/scored can be produced.
Absence and Sickness: Absence and sickness can be recorded by employee, with
reasons and analysis can be produced of absenteeism and sickness.
Health and Safety: Records can be maintained on accidents and absence due to
health hazards. Trends can be analysed and information produced on who has
worked in certain areas, or who has used certain processes and for how long.
Activity A
Critically evaluate the use of computers by your organization for Human Resource
Management decision-making.
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
As we have seen in the previous unit, the business function of marketing deals with
different activities like planning, promotion, and sale of existing products and exploring
the market trend for the existing and new products. Information system specially
designed taking into account all these factors can only supply the required competitive
information for the benefit of customers and management.
Control reporting systems support the efforts of marketing mangers to control the
efficiency and effectiveness of selling and distribution of products and services.
Analytical reports provide information on firm’s actual performance versus planned
marketing objectives.
The major marketing subsystems are:
• Sales Management
• Sales Forecasting
• Advertising and Promotion
• Marketing Research
5
Information Systems - II
Sales Sales
Management Forecasting
Adv. Market
Promotion Research
The sales reports must contain information about the profitability of products, product
lines, sales territories, and individual salespersons. Profitability reporting requires
information about product administration and selling costs.
The sales analysis system also provides information used to evaluate the performance
of sales personnel. By reclassifying sales by sales person rather than by product or
sales unit, it is easy for the sales supervisors to identify whether each salesperson has
met the assigned sales quota. If marginal costs are also assigned by salesperson,
each salesperson’s contribution margin can be established as one criterion for
performance evaluation.
The primary types of information as inputs used for the sales analysis
subsystem are:
i) Information about customer invoices and back orders that is provided by the
sales transaction processing systems,
ii) Information derived from the oral and written reports of sales personnel,
iii) Product cost information obtained from the cost accounting information systems,
iv) Information about the sales transactions may be available from the sales files or
the customer files.,
The basic functions of sales forecasting can be grouped into the two categories of
short-range forecasting and long-range forecasting. Short-range forecasting deals
with forecasts of sales for periods up to one year, whereas long-range forecasting is
concerned with sales forecasts for a year or more into the future. Forecasting
requires the application of mathematical and statistical methods, which consists of
structured procedure. Methods like time series analysis, regression models etc., are
used for sales forecasting.
Production planning, work force planning, and production scheduling are based on
sales forecasting. Materials are ordered and personnel are employed and reassigned
according to the expected sales pattern for the next period. If sales are overestimated
either finished product inventory levels or materials inventory will be excessive, or
personnel will have to be laid off. Conversely, if the sales forecast is too low, either
sales would be lost because of inventory shortages, or higher costs will be incurred as
a result of overtime and need to secure additional materials in a hurry.
The basic information needed for sales forecasting is as follows:
i) Past sales, provided by the sales analysis information system
ii) Market conditions, provided by the market information system
iii) Competitor’s activities provided by the competitor intelligence information system
iv) Promotion and advertising plans, provided by the information system for this
function.
Computers and statistical analysis software help the market research activity collect,
analyze, and maintain information on a wide variety of market variables that are
subject to continuous change. This includes information on customers’ prospects,
consumers, competitors; market economic and demographic trends. Data can also be
gathered through telemarketing and computer aided telephone-interviewing
techniques (CATI).
The main benefits derived from computer- based marketing information system are:
1) Control of market costs
2) Diagnosis for poor sales performance
3) Management of fashion goods
4) Forecasting
5) Promotional planning and corporate long-range planning
6) Purchasing
Activity B
Prepare a brief report on the market planning and publicity planning of your
organization, and the role computers and MIS can play in that
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
8
Integrated Applications
10.6 SUMMARY
In this unit, you have learnt about the role of transaction processing in data retrieval.
Two important areas of the functional management say marketing and human
resource management. As each of the sub-systems perform specific operations/
transactions to support the main system, various inputs required for these subsystem
have been discussed in detail. By now you have come to know how the development
of the system require to be assisted by the different subsystems in the transaction
process.
Course material designed by IGNOU for the programs of Computer and Information
Sciences.
Murdick, Robert G. MIS: Concepts and Design. Englewood Cliffs, N.J. Prentice-
Hall, 1980
Robert G. Murdick, Joel E. Ross and James R Claggett. Information Systems for
Modern Management, Prentice Hall of India, 1997
9
Information Systenls - II
I n this i~nit,you have learnt about the role of transaction processing in data retrieva!.
Two i~iiporta~it areas of the fi~nctionallnanageinent say marketing and liil~na~i
resource management. As each of tlie sub-systems perform specific operations1
tra~isactio~is to support tlie mail1 system, variorls illputs required for these subsystem
have been discussed in detail. By now you have come to know how the developnlerlt
of the system require to be assisted by the dieerelit subsystems in the transaction
process.
Robert G. Murdick, Joel E. Ross and James R Claggett. Infornzation Systems for
Modern Management, Prentice Hall of India, 1997
UNIT 11 T NSACTION PROCESSING
SYSTEMS-11: OPE IONS AND
FINANCIAL MANAGEMENT
Structure
I I .1 Introduction
1 1.2 0b.jectives
1 1.3 Transaction Processing Systems
11.4 ProductionIOperation Systems
11.5 Inventory Management Systems
11.6 Computerized Maintenance Management
11.7 Financial Info~~mation
Systems
11.8 Financial Management Software
11.9 Computes Aided Financial Planning
11.I 0 Sulllllla~]\'
1 1.I I Unit End Exercises
11.12 References and Suggested Furtlicr Readings
11.1 INTRODUCTION
I n the previous unit you have learnt about transaction processing systems in I-luman
Resource Management (I-IRM) wncl blarketing Management (MM). You have learnt
about sub systellls o.f I-ILIIIIS~II I~CSOIII-CC Information System (recruitment, retention1
service conditions and reti~~cment). Simi larly you have learnt about subsystems of
marlteting info!-mation systems (Sales ~nanagement,.fol-ecastingof sales, market
research and advertising).
Businesses today are .foitndecl asound information systems that have transaction
processing as tlleis ma.jor component e.g, sales ordel- processing, purchase order
processing, i~ccounting,pa>,roII, prodirction and stock (or inventory) control and
booking etc. Most of these systems \\:orli in co~iji~nctionwit11 other systems ta provide
management information to si!ppo~-tdecision-m:~king.
In this ~ ~ nyou
i t would learn about another set of fi~nctionalareas i.e. Operations
Management (OM) and Financial Me~~agenient (FM). You will learn about
sUbsYstemsof Operations Management ancl subsystems of Financial ll1forlnation
Systems. You will Icarn about methods oI:computerization of operations and financial
functions.
11.2 OBJECTIVES
After readins this wit. you should be able to:
Describe the subsystems ofoper.ations Management and their integration;
Identify the colnponents of Inventory Management Systems;
Zsplain the role of Computerized ~naintenancemanagement;
Define various aspects of financial systems: and
Iclentify problems associatecl with computerisation of financial systems,
111.3 TRANSACTION PROCESSING SYSTEMS
nnsnction processing is def71iedby on1 ine dictionary and search engine
t\ 41rpedia.cnmas a t>pe of computer processing in which the computer responds
.aT!:, ,linlcly IG ilzet' ; -quests. Each recluest is considered to be a tra17,suction.
"1 ::?intic te,!c~s;la:hines Ibr banks are an example of transaction processing. The
GP;',51t: ~ f r r a n s a c r i op~-occ-ssil~g
~~ i h batcli processing, in wliicli a batch of I-equestsis
:,;red aiid tl1el;r execuicd all at one time. Transaction processing requires interaction
\+lit!ia uscr, whereas batch prdcessing can take place without a user being present.
An exa~tipleof batcli processing is the way tliat credit card companies process
b~lling.'flie customer does not receive a bill for each separate credit card purcliase
bti\ one monthly bill for all of tliat nlontli's purcliases. Tlie bill is created through
bate11 processing, wlie~-eall of tlie data are collected and lheld i~rltilthe bill is
:~rcvessedas a bntcli at the end of the billing cycle.
'I'ransactions are tlie activities tliat are performed on daily basis by most businesses.
These could be of two types viz. co~iimercialtl-a~isactions(activities pertailling to
buying. selling, offering sc~.vicesorpaying bills etc.) and recorcli~?gorretrievingdata
(activities pertaining to booking a ticltet, registering a customer 011a or looking up
solne information etc). Many a times these transactions are lii~gein n1.1mbersand one
reqi~irescomputer assista~iccto deal with tliem. Also tlie speecl ancl accuracy with
wliicli tlie information is to be processed should be high level. 'This has led to
clevelop~iie~it of systems that could process transactions at Iiigl~erspeecl, lesser cost
and I1 iglier accuracy.
Businesses today are discovering applications that can benefit from a T~~ansaction
Processing System, mainly because tliese systeliis call now be made fi~nctionalon
personal co~nputers.'l'lius, transaction-processiiig systems are being used to liandle
Inany s i ~ i i ~ ~ l t a ~ iusers
e o i ~tliat
s work on tlie same set of data.
A transaction processing system receives tlie data fro111all input source lilic a
customer and or a barcode or ally otlier data-capturing device. Tlie systeln tile11
performs tlie transaction, cliecks it validity and report it In tlie for111of summary or
esecutivc report to the management.
Tlie Figure given below shows tlie typical fi~nctioningof a transaction processing
-
system.
Transaction
Sumn~ary
11 1.4 PRODUCTION/OPERATIONSYSTEMS
Tlie operations management discipli~ieconsists of a range of areas dealing with the
design, operation and control of production syste~ilsand si~bsystems.Operations
Management is responsible for tlie translation of resources into prodi~ctsor services
tliat custo~iierswill buy. It is interconnected with the otlier company fi~lictiouslike
Hu~iianResources, Fi~laliceand Marketing. A systems approach takes into account Trr~lsactionProcessing
all parts of the system. A system is defined as a collection of persons, ob-jectsand Systems-11: Operations and
procedures for operating w itliin an environment. Every organisation can be Financial Mtanagcment
considered as a system consisting of interacting sub-systems. A system gathers tlie
input and co~ivertsit in solnc ilseful output by tlie means of a conversion process.
Figtn.e 11.2 illustrates this.
ADJUSTMENT
Needal
labour
Capital
Managcrncnt
INPUT
COMPARISON
Fig~lre11.2: Conceotual Model of a Production/Operations System
: f c / ( ~ / ~ ~ c ~ IA,lL5'-j:
Sou~~ce: , / i . o ~A/l(117(igc~n7cnl
ir ufAd(icl7ine~niid M(i/erinl,s
Rcquiren~cnts
on Suppliel-s
l l i p ~from
~t
-+
L
-
Conversion~ransforniation
Process
output to
Suppliers F Inp$ to ProvidcOu tputs to A
r
Customers Customer
Requirements
on Management
3
I
Effective & Efficient
Use of all Factors of
Conversionl
T~~ansforrna tion
Figlire 11.3: New Focus of a ProductionlOperations System
SOL1l.c~::~C/(IIJ/LY!
11.0111A4,5'-53. Pro~/t~~ti011/Ope1~uli017.1'
Mc~nngel~lenl
I
I
Information Systems - II Let 11sdiscl~sssome of the processes that are linked to production1 operatio~is
I management. Suppose your company wants to launch a new product then it will be
I the duty of the operatio~isnianagers to manage the logistics, tlie costs, the skills, and
I
elie equipnleiit necessary for the pl.oduction of tlle new product. He would then have
works concerning the manr~factl~ring and production processes of tliat product.
St~pplycllai~land logistics activities like purcliasing prices and levels, storage of raw
niaterials and itivento~ycomes at tlie next level. After that, the operations manager
becomes busy with a~~alysing and improving quality of the product. The operations
illatlager also providcs costs for each phase of tlie operation. Tlie operations
manager also covers issl~eslike replacement and repair of equipment, which comes
u~iderthe d o ~ i ~ aofi ~maintenance.
i Finally there are facility lnanagelnent issues like
e~ivit-onmentalregulations, waste ~nanagement,site locations and employee security
that are managed by tlie operations manager.
New Product
Development
Facility
Management
PROCESSES LlNKED TO
PRODUCTION1
I Material Requirement 1
Tlie economic order quantity ~i~odels helps in tlie optimal level of invelito~y.
Tlie production ~iiodelof i~ive~itory helps in determining tlie optimal size of a
population lot wlie~isales and production takes p l ~ c esin~ultaneously,Now tliere are
software prograliis that a1low accurate pinpoiuting of process tlows and tjmiug of
supply needs. Tlie benefits of JlT model are tliat tlie order comes in when one need it
so long tern1 storage of supplies is not necessary, It refers to producing or obtaining
olily what is needed, wlreli it is needed and in just tlie aliioulit needed. Tliere is no or
low cost incurred in holding the inventory. Material Requirement Planning (MRP)
systems call help in pla~ini~ig and dete1.1nini11gtlie supply ~iecdsand timelines for new
hlallllfact~lrilipprocesses. They Iielp in predictingdelivery times, respondi~igto
clianges, and have better- colitrol over tlie varioirs plinses of production. MRP is
basical Iy process for deteminirrg material, labour and mncliine t.equire~nentsin a
~nan~~facturing environment. MRPII (Manufacturing Resources 131anning)is tlie
cornbination of material requirements plannirig (MIIP), Capacity Requirements
i'lanning (CRP), atid Master Production Scheduling (MI'S). MRP was origi~ially
designed for materinls planning only. Wllen labour and machine plnnning were
incorporated it became ktiow~ias MRPJI. Todny tlie de.finition of MRPII is generally
associated with MRP systems. One can combine tlie master production scliedule, tlie
bill of ~iiaterialsand tlie vendor lead times to prod~~ce a new schedule of raw
materials purchases with tlie help of MRP. Tlie ~.esultis that the riiaterials are
produced on time and t l l ~ the
~ s cost of raw ~naterialsirive~itoryis reduced.
t
Wllen h/lKPJandJIT are co~iibi~ied tlien tlie details of tlie j?roduction scliedules are
shared with tlie vendors so that they call also plan tlieir prod t1cti011sclied~~les
?inii~ltaneot~slywith the nianuTacturer. Tlie coiiibi~iatioliof the two reduces two
ilive~itorymanagement 131-oblenis(finislied goods at the vendorQand raw tilaterials at
the manufacturer) into one (finislied goods at llic vendor). 'l'liere is one safety stock
problem not two (Mnrthy*2002).
-
S y s t c ~ ~ ~11s
Irll'ur~natru~t Tlie~eare two inore subsystems that support the maill system n-~anufactizri~~g. Tliese
are Comp~~ter-Aided Design1 Computer-Aided Manufacturing (CADICAM) and
Computer-Integrated Manufacruring (CIM). Computer-Aided Design (CAD) is the
use of a computer in industrial design applications such as arctiitecture, engil~eering
. and ~nanufacti~ring while Computer-Aided Mani~facturing(CAM) is the use of
c o ~ ~ ~ p iaids
i t e r(hardware and software) in planning, tracking, analysing, and
implementing the co~istructionof manufactured items. It is basically tliat part of
Computer Integrated Manufacturing (CIM) that is restricted to the operation and
control of ~t~siiufacturing fi~nctions.Computer Integrated Mal~i~facti~ri~ig (CIM) is
thus an integrated use of compute^.-aided techniques in manufacturing. This includes
CAD and CAM. Tlie ~nainprerequisite f ~ CIM r is a database that accessible by all
the d iscipl i~iesi~~volved in tlie manufacturing process, si~clias design, developme~~t,
manufactrrre, distribution, billing etc. CIM is an integration of MKP, JI'T, CAD and
CAM. It brings all these manufactul.ing systeliis into one.
Activity A
of tlie inventory system in your organization. In which type
Prepare a flow diagra~~i
does it fall?
-
1.6 COMPUTERIZED MAINTENANCE
MANAGEMENT
You will read about this is 1iiot.edetail in the course MS-57: Maintenance
Ma~~agement. We have taken sollie excerpts fro171tlie illlit IT-based maintenance
management to give you an idea of role of co~npirtersin ~nairite~iance functions.
Though tlie use of IT lias beer1 adopted quite lately for maintenance functions
comparecl to other f~~nctions like finance, personnel, materials etc., trernendous
progress has been ac1iie;ed in tlie use of IT in both tlie maintenance management
and engineering fi~nctions.Use of I?' in Inany organizations has resulted in Inany
benetits over tlie coliventional manual systems. So~neof these benefits Iiave been
indicated in tlie table given below:
The Figtrre 11.6 explains tlre conceptual model tllroi~ghwhich the ~i~aintenar~ce
ftl~lctioncan achieve its o?jectives on a sitstairled basis
lnfori~i~tion
MAINTENANCE
Contlition Rnsetl
Normally tlie PM software module has the ability to print the work orclers in a
specific sorted order, the key For wliicli could be tile craft, department, priority, etc.
illdependently 01-in combination. The module also produces various types of reports
and queries, some of wliicli are, past due work orders, back log of non-completed
work orders, eqr~ipment Iiistory, eqi~ipmentwise down time, cost of preventive
maintenance, type a11d number of derects observed and corrected etc.
Table 11.2 lists marly oftlie traditional accounting and finance applications as well as
those of high c ~ ~ r rinteiest.
e~~t
I
I
Activity B
I-low are tlie above functions being performed in your organisation? Record your
perception about them, function-wise, choosingone of tlie alternatives given below
1 regarding tlie~rperformance. .
Activity C
W)iat would yo11suggest to make tlie system more efficient?
The microcomputei-can provide a new and very efficient tool to improve the service,
For example, it can transform efficie~icyby replacing a large amount of manual
record keeping and, perhaps more significantly, it can extend the quality of the service
being offered. After introduciri'g a co~nputerisedsales ledger, the regular balancing of
tlie ledger (itself a considerably easier task using a co~itrolledcomputer system) will
be accompanied by the printing of an 'aged' list of balances. From tli~sreport the
accoitntant can initiate atid ~no~iitora follow-up routine to recover any overdue .
amounts. In this and similar situations the firm will be offering a much more powerful
financial control system that combines the interpretative skills of the accountant with
the routine efficiency and a~ialyticalcapabilities of co~nputerisedledger systems.
Informrtion Syste~ns- I 1
ILluch of the software available for the practicing accountant wil I, of course, also be '
of use of his clierlts a s well as to other professional firms. Although some features
Inay be: required specifically for the accountant, his management control needs will be
very similar to tliose of o ~ l l e busi~iesses
r or practices so most programmes offered
ale described in their. publicity material i n ways that illustrate their widest possible
use, i~icludingsues for whicli they [nay be only ~narginallysuited. Some of the most
\-videlyused financial management software call be listed as:
Budgets
Statements
Profit and
Account
L Balance
Sheet
Compute~*isetlGer~eri~l
Ledger Systerils
. Figure 1l.h' illustrates compute^^ runs for. a ge~ie~*iiI ledger syste~n,which is based on
t 1 is derived from dnla produced by l.lie
{lieoutline, Figu1.r~ 11.7. 'Tllc i ~ i pto~ ~1.~111
separate co~tl(~uter applicatiulls in respect of'transactions rclating to stocks, pay-roll,
sales, purcllases. plan1 and niacliinery inclrrding depreciation, accruals and prc-
payments, accounting i ~ ~ ! j ~ s t ~ iand i t ~ 'The transactions datas in respect of
i e ~cash.
eacli applicati.011 is assu~nedto be stored on magnetic tapc. liun 1 is concerned wit11
colisolidating all ~ i o ~ n i ~leclgel-data
ial and tl~isis achieved by niergiog all tlie relevant
. ,
Infarrthtiarr Systems - 11 transactions o n tile general ledger codes. Tlte output from Run 1 is a co~lsolidated
file of transactions, which is input to Run 2 for updating the general ledger file. This
file is stored on magnetic disc to facilitate direct access to relevant general ledger
account codes, Run 2 also produce a list of detailed postings to each account.
At the end oftlie month, the general ledger file is input to Run 3 to produce a Profit
and Loss Account and Balance Sheet. The general ledger file i s also input to Run 4
together with a budget file, wl~ichis updated with actual expenditure providing the
cumulative expenditure to date for comparison with budgeted expenditure.
A variance report is then printed for analysis by respective cost centres.
ACCOU N'1'ING
ACCOUNT1NG. ADJUS1 MEN'I'S
SYSTEM AND PRE-I'AY MEN'I'S
'rransi~ctions
TRANSACTIONS BY
GENERAL LEDCiER
MERGE D
TRANSACTIONS
LEDGER
MASTER
UPDATE
( GENERAL LEDGER. k > I TRANSACTIONS
APPLIED /
LOSS ACCOUNT
.- AND LOSS
ACCOUNT AND
BALANCE SHEET
VAklhNCE
KCPORTS .
bp& hb&in
e".:urnpusrisedIntegrated GeneralLedger Systems
3 .
rrrcomplete records: 'I'his complex area has been a prime target for the Tra~rsactisnProcessiag I
development of computer programmes and these are available on most of the popular S~aLdR'sf operHtioRg "'"
Finsncinl Managenrent
microco~nputers.A typical package will hold between 250 to YO0 nominal accau. ;
headings and between 2,500 to 4,000 transactions. The routines for posting the
transactions will be so structured that each prime entry source will be postid
automatically to the respective nominal account.
Nominal account coding can be defined to suit each client. The for~riatof the
accounts can be used to provide an outline sequence within which to create tlie
accounts code list. It is advisable to allocate the coding in blocks that wilt allow
additional accounts to be opened without destroying this sequence. It is impossible to
define this structure without knowing tlie coding facility of a particular package or the
requirements of the client.
Witlii~ieach group LIPto 999 accounts might be available to allow for'the dctailed
analysis. With the'leserv& group (in the illi~strationtile 5000 series), more numbors
are available to be allocated to revequc and expenses items to be identified in the
profit and loss account. In this latter case, the series numbered GOOU onwards could
1
be used to create a profit or cost centre analysis within the profit and loss account.
The system will create the double entry within the general for all postings through the
sales and purchase ledgers. Journal entries to the general ledger will only be
accepted if tlie debits and credits equate to zero, as will input through tlie purchase
and sales ledger, thereby ensuring that the trail balance must always balance.
Additionally, pay roll and job costing may be linked to the general ledger to produce
final accoilnts and other management i~~formation.
The customer master file will hold tlie name, address and the telephone nurnber,
credit limit account balance 3 to 4 months old, turnover statistics, sales territory codes
etc. The transaction file will hold details entered into the system together with all
invoices, credits, adjustments and cash items posted during the current financial
periods.
tlie like. Mere, then is the fundamental defect oFmanual planning and budgeting ,
I
'What happens if we give: an extra discount of 5 per cent for orders over Rs. 1000 I
development?' tI
'What if we open a new warehouse in Bhopal in two years' time which takes 10 Transaction Processing
percent of the volun~efrom Delhi and 25 percent from Bombay while sales go up by 'perations and 1
Financial lvlanage~nent
15 per cent in each region and how f ~ ~will
l l the three warehouses be?' 1
'Wllat does the picture look like if we run all three ideas (above) together next year?'
'What will change if we defer tlie new warehouse for a further year?'
'What if we put on a second shift with a 30 per cent premiurn on wages but at the
same time stop all production overtime?'
Given a calculatol; large slieets of paper, the basic information and peace and quiet,
any one of tlie above questions could be evaluated by most accountants or managers.
The work is quite straiglitfonvard. It would not be so easy to find the time to work
through all ofthem. But this is a scenario familiar enough in most companies, and
often it results in decisions llaving to be taken without an adequate evaluation being
completed. This is not so because there is, as is so often alleged, 'a lack of
information on which to base the decision' but rather because there is ilisufficient
time to work through all the options with pen and paper.
, Tliis in turn brings a b o ~a, need for a great deal of further work if the full picture is to
be collated each time tlie plans are in any way changed, and further underlines the
fact that such an exercise is ~lnlikelyto be colnpleted adequately, if at all, with annual
methods alone.
3) What are the types of inventoty management systems? Define them and
partition them into fi~rtlierclasses. Also, briefly explain each subdivision.
4) How the financial systems, facilitated by coniputer software, are important for
economy of data processing and administrative efficiency?
Walker D.(1 989), Computer Bused Information Systems, Eisevier Science Pub Co;
2nd edition.
Integrated Applications
UNIT 12 INTEGRATED APPLICATIONS
Structure
12.1 Introduction
12.2 Objectives
12.3 Integrated Software Applications
12.4 Advantages and Business Utility
12.5 The Competition
12.6 Business Software Solutions from SAP
12.7 Business Software Solutions from People Soft
12.8 Business Software Solutions from Oracle
12.9 Business Solutions from Microsoft
12.10 Summary
12.11 Unit End Exercises
12.12 Reference and Suggested Further Readings
12.1 INTRODUCTION
In the present competitive business age everybody wish to choose a system that suits
his business processes. Integrated systems are the systems that help in integrating
key business and management functions. They provide a high-level view of all the
activities that are going on in the business. In the earlier days, data used to be
collected from different nodes and then compiled in the form of a summary report.
All these processes were too time consuming. Presently the software does this
compilation or integration work. There are many packages that integrate the activities
of different business divisions and thus allow the businesses to devote more time on
productive things. However there are different needs of different business and one
should be careful in deciding about a software that would be useful to him. Any
company looks for these packages to integrate its corporate functions like finance,
manufacturing and human resources. This is a critical activity. As a budding manager
you should be able to understand the system requirement of your company. You
should be able to define the information flow, information requirements and
information usage so that you gain competitive edge. This unit is thus an attempt to
keep you updated on the latest in the business solutions area.
12.2 OBJECTIVES
After reading this unit you should be able to
• Explain the concept of integrated software applications;
• Describe their advantages and business utility; and
• Discuss the business solutions offered by market leaders.
ERP: Short for enterprise resource planning, a business management system that
integrates all facets of the business, including planning, manufacturing, sales, and
marketing. As the ERP methodology has become more popular, software applications
have emerged to help business managers implement ERP in business activities such
as inventory control, order tracking, customer service, finance and human resources.
CRM: Short for customer relationship management. CRM entails all aspects of
interaction a company has with its customer, whether it be sales or service related.
Computerization has changed the way companies are approaching their CRM
strategies because it has also changed consumer-buying behavior. With each new
advance in technology, especially the proliferation of self-service channels like the
Web and WAP phones, more of the relationship is being managed electronically.
Organizations are therefore looking for ways to personalize online experiences (a
process also referred to as mass customization) through tools such as help-desk
software, e-mail organizers and Web development applications.
SCM: Short for supply chain management, the control of the supply chain as a
process from supplier to manufacturer to wholesaler to retailer to consumer. Supply
chain management does not involve only the movement of a physical product (such
as a microchip) through the chain but also any data that goes along with the product
(such as order status information, payment schedules, and ownership titles) and the
actual entities that handle the product from stage to stage of the supply chain.
There are essentially three goals of SCM: to reduce inventory, to increase the speed
of transactions with real-time data exchange, and to increase revenue by satisfying
customer demands more efficiently.
There is a lot of interest among IT solution providers about packages that help in
ERP, SCM, BPR and CRM. The plea given is that they help in real business growth.
Companies actually want to integrate their diverse business processes to simplify
operations for faster decision-making. Many companies have realized that if they
have to survive and grow, they have to use tools that can provide quicker and useful
information and cut costs to increase efficiency. Till now IT was used in large and
multinational companies only. Small companies were not willing to invest more on IT.
In India, on an average, small and medium companies were reluctant to invest more
than 2-5% on IT. Circumstances have changed now. Businesses are not trying really
hard to reap the benefits of IT for gaining competitive advantages. IT has given
businesses a chance to generate information in real-time and thus grab opportunities
that were non-existent or unseen earlier. With the development of cutting-edge
technology, we have seen evolution of many systems that has adapted market
demands. IT is readily providing business solutions now. These solutions provides a
platform to integrate all processes in an organization enabling it to plan, trace and see
its 4-m resources (materials, machines, men and money) in the best possible ways to
service customers and reduce costs. If you want that your Business should survive
with low overheads and still run efficiently then you have no choice but to opt for IT
solutions.
A typical business solution is an integration of ERP, BPR, SCM and SCM. While
ERP can take care of functions like accounts production planning, payroll and
marketing etc., BPR can be used simultaneously to cut-down on all non-value added
business processes and paperwork. These systems are the enablers of change in the
business for better. With the help of these systems your business can compete better.
These systems if combined with the web help you to reach your customers most
cost-effectively. There would be no cost incurred on travel and communication and
no cost incurred on setting up offices and employees.
The key to establishing a good IT system lies in the proper planning. Businesses
should first specify their needs, processes and key data. They should clearly specify
the kind of information and its flow. Once these specifications are done, it is the
integration of information that is required. Once integration is done, information is
accessible to every department around the company.
4th
3rd
2nd
1st
Putting a Website
on the Internet
Online E-commerce
Shop on Internet
Activity A
Take the case of your organization or any other organization of your choice. Classify
the activities of the organization with respect to the generations of e-business.
Mention all the features by virtue of which you have done this classification.
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
SAP is the third largest independent software company in the world. Microsoft has
taken an entry into SAP’s market. SAP was founded in 1972 by five former IBM
employees with a purpose of reducing expenditure on programmers for basic
functions like order processing and bookkeeping. It offered a set of pre-built software
programs. SAP was the first to redesign its software to work with distributed client-
server networks. Their products gained prominence with their application suite “R/3”.
Microsoft and Oracle are the only companies that sell more software than SAP.
ERP market
Just this minute
DataResearch DPU
SAP is now trying to prevent Oracle’s acquisition of PeopleSoft. It is also not ready
to accept Microsoft as a major competitive force in the business applications market.
In a nutshell there is so much of competition in the market that big players like SAP
recently re-launched an initiative to tackle smaller accounts with a cheaper, scaled-
down version of its software while striking up reseller partnerships with computer
dealers that cater to small businesses.
SAP offers highly specialized solutions and is the world leader is evident from the
figure 12.3. With installations in 60000 customer locations in 120 countries, SAP is
developed and supported by more than 28000 professionals from its global network.
Its popularity can be verified from the fact that 19000 organizations worldwide run on
SAP. SAP claims that its solutions are designed in such a way so that the businesses
get a better return on their technology investment. SAP claims to achieve great
5
Information Systems
results for many - II
companies, large and small e.g. Brother International got a 129%
return on its investment on SAP’s customer relationship management program and
Volvo Construction Equipment achieved an 89% increase in sales, a 43% reduction in
shipping lead times, and a fourfold increase in revenue per employee with the help of
SAP’s supply chain management program. SAP’s solutions are available for many
industries like aerospace and defense, engineering, construction, and operations,
financial service providers, insurance, telecommunications and banking etc. SAP
offers a suite that helps businesses to respond more quickly to changing customer
needs and market conditions. SAP business suite includes CRM, Financials, HR,
SRM and SCM and many more. The table given below describes them.
3 mySAP™ Human Resources The HR resource that helps more than 7,800
organizations worldwide maximize their return
on human capital
Source: http://www.sap.com/
SAP claims that since its solutions are based on open technologies they can integrate
across technologies and organizations to bring together people, information, and
business processes. SAP software comes in two bundles mySAP™ All in One and
SAP® Business One. An all-In-One solution helps in management of financials,
human resources, supply chain, customer relationships, and other key business
processes and is good if you want industry-specific functionality. SAP business one is
good if you want to perform your core business functions.
Figure 12.4 show that SAP solutions share common values. They integrate people,
systems and thus information. They have the ability to expand the number of users or
increase the capabilities of computing solution users without making major changes to
the systems or application software. These solutions are capable of responding to
changing social, technological, economic and market conditions. These solutions are
easy to implement and cost effective if you look at the long-term costs. A lot of real-
6
world experience is put into these solutions. Integrated Applications
PeopleSoft offers solutions that are ideally suited for company-wide functions such as
human resources, finance, IT, procurement, marketing, services and sales across all
industries. It works on pure Internet architecture that makes integration easier.
PeopleSoft’s solutions are available for many industries like financial, government,
education, healthcare and other services industries. PeopleSoft offers solutions for
Customer Relationship Management, Financial Management, Human Capital
Management, Service Automation, Supplier Relationship Management and Supply
Chain Management.
Source: http://www.peoplesoft.com/
Oracle has an e-Business suite that offers a complete set of applications, which are
capable of automating many functions of the daily business processes. Oracle’s e-
business suite encompasses a wide array of functions. Figure 12.5 is the
representation of such functions.
Source: http://www.oracle.com/
9
Information Systems - II
Source: http://www.oracle.com/
5 Field Service Management Set up and manage service contracts, enter and track
service calls, view schedules, and optimize workloads
across resources.
6 Financial Management Control your general ledger, payables, receivables,
inventory, sales process, purchasing, fixed assets,
and cash flow. Perform reconciliation and collections.
7 HR Management Manage your human resources from mapping,
recruitment, and employee registration, to skills
development and processing of payroll and benefits.
8 Manufacturing Coordinate your entire manufacturing process from
product configuration and supply and capacity
requirements planning, to scheduling and shop floor.
9 Project Management Manage your resources, forecast your costs and
and Accounting budgets, track time and expenses, and organize
contracts and billing.
10 Retail Management Run retail operations from point-of-sale to delivery.
Increase customer flow, speed up lines and tasks,
control inventory, and automate purchasing.
11 Supply Chain Organize single or multiple site warehouses; handle
Management order promising, demand planning, and online
collaboration with suppliers.
(Source: http://www.microsoft.com/BusinessSolutions/Highlights/buyers_guide.mspx
Microsoft carries out these business applications with the help of its array of business
solutions like Microsoft Axapta® which offers solutions for analytics, CRM, e-
commerce, financial management, HRM, manufacturing, project management and
SCM; Microsoft Great Plains® which offers solutions for analytics, portals, field
service management, financial management, HRM, manufacturing, project
management and SCM; Microsoft Navision® which offers solutions for analytics,
portals, e-commerce, financial management, HRM, manufacturing, project
management and SCM and Microsoft Solomon® which offers solutions for analytics,
CRM, e-commerce, financial management, project management and SCM. The
figure given below highlights this.
11
Figure 12.6: Microsoft’s Business Solutions
Information Systems
Source: - II
http://www.microsoft.com/
Source:http://www.microsoft.com/
So, you can see that there is a solution for virtually every thing that your business
needs. All the information that is given in the preceding sections is an attempt to
highlight the issue that there are solutions aplenty and the need is to use them
effectively to gain business advantage.
Activity B
Go to the websites of Oracle and SAP, list down five business advantages or
competitive edge that their customers achieved after the implementation of their
business solution.
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
12
Integrated Applications
.............................................................................................................................
.............................................................................................................................
12.10 SUMMARY
Today’s business faces a number of technology related problems. They are often run
on separate software for each of their business processes like accounts, payroll,
office suites etc. Supporting computers often takes their productive time and hence
affects the business productivity as the employees are left with less time for doing
their primary jobs. This is the reason why businesses need products that are easy to
learn and use. Integration of business solutions emerges as an important tool here.
They connect your customers, suppliers and employees. Thus it works for your whole
business and not just one department. The unit has tried to explain the concepts of
integration and has highlighted the solutions, which are available in the market today.
1) What are the technology related challenges that are invisible to your organization?
Highlight the pitfalls? How integrated software applications can help in this?
2) What are integrated software applications? Talk about their advantages and
business utility.
3) Write notes on the business software solutions provided by
a) SAP
b) PeopleSoft
c) Oracle
d) Microsoft
4. Compare the Business solutions provided by Microsoft and SAP. Is the rivalry
justified? Clearly highlight the features which are common between the two.
13
Computer Programming
UNIT 13: BUILDING INFORMATION and Languages
SYSTEMS
Structure
13.1 Introduction
13.2 Objectives
13.3 Computer Based Information Systems and its Classification
13.3.1 Office Automation Systems
13.3.2 Communication Systems
13.3.3 Transaction Processing Systems
13.3.4 Enterprise Information Systems
13.3.5 Decision Support Systems
13.3.6 Execution Systems
13.3.7 Going Beyond the Information System Categories
13.4 Redesigning the Organisation with Information Systems
13.5 Business Values of Information Systems
13.6 Outsourcing Information System
13.6.1 Advantages and Disadvantages of Outsourcing
13.6.2 When to Use Outsourcing?
13.7 Ensuring Quality with Information System
13.8 Summary
13.9 Unit End Exercises
13.10 References and Suggested Further Readings
13.1 INTRODUCTION
A computer based information system uses the resources of people (end users and IS
specialists), hardware (machines and media), and software (programs and
procedures), to perform input, processing, output, storage, and control activities that
convert data resources into information products as shown in Figure 13.1.
Before going into the details of Computer based Information System. Let us first
discuss about a system. A system is a group of interrelated components working
together toward a common goal by accepting inputs and producing outputs through an
organized transformation process.
Such a system (sometimes called a dynamic system) has three basic interacting
components or functions:
• Input involves capturing and assembling elements that enter the system to be
processed. For example, raw materials, energy, data, and human effort must
2
be secured and organized for processing.
• Processing involves transformation processes that convert input into output. Computer Programming
Examples are a manufacturing process or mathematical calculations. and Languages
People Resources:
Specialists – systems analysts, programmers, and computer operators.
End users – anyone else who uses information systems.
Hardware Resources:
Machines – computers, video monitors, magnetic disk drives, printers, and optical scanners.
Media – floppy disks, magnetic tape, optical disks, plastic cards, and paper forms.
Software Resources:
Programs – operating system programs, spreadsheet programs, word processing
programs, and payroll programs.
Procedures – data entry procedures, error correction procedures, and paycheck distribution
procedures.
Data Resources:
Product descriptions, customer records, employee files, and inventory databases.
Information Products:
Management reports and business documents using text and graphics displays, audio
responses, and paper forms.
3
System Analysis and There are many kinds of information systems in the real world. All of them use
Computer Languages hardware, software, and people resources to transform data resources into
information products.
Although people often think of information systems as tools for decision-making, each
type of information system supports both communication and decision-making in a
number of ways.
Table 13.2: Typical Ways Each Type of Information System Supports Communication
and Decision Making
4
Computer Programming
* Managers, * Provides a basis of facts * Provides and Languages
Management
executives, rather than opinions for summary
information
and people explaining problems and information
system (MIS)
who receive their solutions and measures
and executive
feedback * May incorporate e-mail and of performance
information
about their other communication for monitoring
system (EIS):
work methods with presentation results
Converts TPS
data into of computerized data * May provide
information for easy ways to
monitoring analyze the
performance and types of
managing an information
organization; provided in
provides less flexible
executives form by older
information in a MIS
readily
accessible
interactive
format
One of the reasons the various categories are mentioned frequently is that each is used in
every functional area of business.
5
System Analysis and
Computer Languages Table 13.3: Examples of Each Type of Information System in three Functional Areas of
Business
* E-mail and fax used to * E-mail and v-mail to discuss * V-mail and fax to
Communication contact customer a problem with a new communicate with bank
Systems * Video conference to machine about loan arrangements
present new sales * Video-conference to * Video conference to explain
materials to sales force coordinate, manufacturing effect of financing on
* Work flow system to and sales efforts factory investments
make sure all sales steps * Work flow system to make * Work flow system to make
are completed sure engineering changes sure invoice approval
* System to coordinate all are approved precedes payment
work on a complex sales * System for exchanging the
contract latest information related
to lawsuit
Transaction * Point of sale system for * Tracking movement of work * Processing credit card
Processing sales transactions payments
in process in a factory
System (TPS) * Keeping track of cus- * Tracking receipts of * Payment of stock dividends
tomer contacts during a materials from suppliers and bond interest
sales cycle
Management * Weekly sales report by * Weekly production report * Receivables report showing
Information product and region by production and invoices and payments
System (MIS) * Consolidation of sales operation * Monthly financial plan
and Executive projections by product * Determination of planned consolidation
Information and region purchases based on a
System (EIS) * Flexible access to corporate
* Flexible access to sales production schedule financial plan by line item
data by product and * Flexible access to
region production data by product
and operation
6
Activity A Computer Programming
and Languages
List down the major business activities of your organization. Describe what kind of
information systems are already being used for these activities. Also suggest some
applications of information systems in the activities that are still done manually.
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
OASs help people perform personal recordkeeping, writing, and calculation chores
efficiently. Of all the system types, OASs and communication systems are the most
familiar to students. Tools generally grouped within the OAS category include:
Text and image processing systems store, revise, and print documents containing text
or image data. These systems started with simple work processor but have evolved
to include desktop publishing systems for creating complex documents ranging from
brochures to book chapters.
Personal database systems and note-taking systems help people keep track of their
own personal data (rather than the organization’s shared data.) Typical applications
include an appointment book and calendar, a to do list, and a notepad.
When using these tools for personal productivity purposes, users can apply any
approach they want because the work is unstructured. In these situations, some
individuals use them extensively and enjoy major efficiency benefits, whereas others
do not use them at all. The same tools can also be used for broader purposes;
however, in which they are incorporated into larger systems that organizations use to
structure and routinize tasks. For example, a corporate planning system may require
each department manager to fill in and forward a pre-formatted spreadsheet whose
uniformity will facilitate the corporations planning process. 7
System Analysis and 13.3.2 Communication Systems
Computer Languages
Electronic communication systems help people work together by exchanging or
sharing information in many different forms. New communication capabilities have
changed the way many businesses operate by making it possible to do many things at
a distance that previously required being present in a specific location. This section
groups these tools into four general categories. Teleconferencing systems make it
possible to hold same-time, different-place meetings. Messaging systems make it
possible to transmit specific messages to specific individuals or groups of individuals.
Groupware systems start with messaging but go further by facilitating access to
documents and controlling team-related workflow. Knowledge management systems
facilitate the sharing of knowledge rather than just information.
Teleconferencing
The distinction between these approaches is related to the type of information that is
shared. Audio conferencing is a single telephone call involving three or more people
participating from at least two locations. If several people on the call are in the same
office, they can all participate using a speakerphone, which includes a high-sensitivity
microphone and a loudspeaker that can be heard by anyone in a room. Audio graphic
conferencing is an extension of audio conferencing permitting dispersed participants
to see pictures or graphical material at the same time. This is especially useful when
the purpose of the meeting is to share information that is difficult to describe,
organize, or visualize, such as a spreadsheet or model used to perform calculations
under different assumptions. Video conferencing is an interactive meeting involving
two or more groups of people who can see each other using television screens. The
least expensive forms of video conferencing are tiny cameras and 4-inch screens add
to telephones or separate video conferencing windows displayed on computer
screens. In typical business video conferencing, remote participants appear on a
television screen.
Messaging Systems
The use of computers to send and retrieve text messages or document addressed to
individual people or locations is called electronic mail (e-mail). Each user is identified
by is usually based on the person’s name and also serves as the person’s e-mail
8
address. The sender uses a word processor to create a message and then addresses Computer Programming
it to a distribution list. The distribution list might be an individual account name or a and Languages
group of names, such as those for the sales department or everyone working on a
particular project. The recipient can read the message immediately or can wait until
it is convenient. The recipient e-mail message can save it, print it, erase it, or
forward it to someone else. The recipient can also edit the message to extract parts
to be saved, printed, or passed on.
There have been many innovative uses of e-mail to improve communication. People
in large organizations have used it to bypass bureaucratic structures. For example,
top managers sometimes bypass intermediate management levels by obtaining
specific information directly from people throughout the organization. Some
organizations have replaced the majority of their formal memos with informal e-mail
that gets to the pont directly. As happened at IBM’s Europe headquarters in Paris,
e-mail has also been used as a communication tool fro people who are not fluent in
the language in which business is conducted. E-mail removes accents and permits
non-fluent speakers to read a message several times that otherwise might be
misunderstood in a phone conversation. It also helps them express their ideas more
effectively than they might by using a telephone.
Groupware
A relatively new and still somewhat unshaped category, groupware helps teams work
together by sharing information and by controlling internal workflows. Coined in the
late 1980s the term groupware has attained wide recognition due to the increasing
need for groups to work together more effectively at a distance as a result of
downsizing and rapid organizational change. Products viewed as groupware are still
new enough that their long-term direction is unclear even though the competitive need
to work effectively in dispersed teams is greater than ever.
Groupware goes beyond messaging by facilitative access to documents and
controlling team-related workflow. Many groupware products are related to specific
group related tasks such as project management, scheduling meetings
(“calendaring”), and retrieving data from shared databases. Lotus Notes, a
prominent product in this category, is designed for sharing text and images and
contains a data structure that is a cross between a table-oriented database and an
outline. For example, a law firm in Seattle uses Lotus Notes to permit everyone
working on a particular case to have access to the most current memos and other
information about that case, even if they are traveling. Other companies use Lotus
Notes to store and revise product information for salespeople selling industrial
products, thereby replacing the massive three-ring binders they formerly lugged
around.
Yet other groupware functions are performed through computer conferencing, the
exchange of text messages typed into computers from various locations to discuss a
particular issue. When done through the Internet this is sometimes called a
newsgroup. A computer conference permits people in dispersed locations to combine
their ideas in useful ways even though they cannot speak to each other face-to-face.
Any conference participant may be able to add new ideas, attach comments to 9
System Analysis and existing messages, or direct comments to specific individuals or groups. Proponents
Computer Languages of computer conferencing recognize some disadvantages or working through
computers but emphasize major advantages, such as preventing a single forceful
individual from dominating a meeting. Also, because everything is done through a
computer, a record of how ideas developed is automatically generated.
A different type of groupware product focuses primarily on the flow of work in office
settings. These products provide tools for structuring the process by which
information for a particular multi-step task is managed, transferred, and routed. A
typical example is the approval of travel expenditure. In this case, one person must
propose the expenditure and someone else must approve it. The workflow
application is set up to make the approval process simple and complete. In effect,
groupware is being used as a small transaction processing system for multistep
transaction.
The widespread use of the World Wide Web has led many firms to apply the
information sharing concepts of groupware on a much larger scale by creating an
additional type of communication system, intranets and extranets. Intranets are
private communication networks that use the type of interface popularized by the
Web but are accessible only by authorized employees, contractors, and customers.
They are typically used to communicate nonsensitive but broadly useful information
such as recent corporate news, general product information, employee manuals,
corporate policies, telephone directories, details of health insurance and other
employee benefits, and calendars. In some cases employees can use intranets to
access and change their personal choices regarding health insurance and other
benefits. Once security issues are addressed adequately, intranets for accessing
general-purpose corporate data may lead to widespread use of intranets as a front
end to transaction processing systems and management information systems
described in the following sections.
Extranets are private networks that operate similarly to intranets but are directed at
customers rather than at employees. Extranets provide information customers’ need,
such as detailed product descriptions, frequently asked questions about different
products, maintenance information, warranties, and how to contact customer service
and sales offices. Much of this information was formerly difficult for customers to
access because paper versions of it at the customer site became scattered and
outdated. By using extranets, companies are making this type of information
increasingly available at a single interactive site that is easy to navigate.
Knowledge Management
A final type of communication system is very different from systems that support real
time communication or provide access to information. Today’s leading businesses are
increasingly aware that their employees’ knowledge is one of their primary assets. In
consulting companies and other organizations that rely heavily on unique
competencies and methods, knowledge has more competitive significance than
physical assets because the physical assets can be replaced or replenished more
easily.
TPSs are designed based on detailed specifications for how the transaction should be
performed and how to control the collection of specific data in specific data formats
and in accordance with rules, polices, and goals of the organization. Most contain
enough structure to enforce rules and procedures for work done by clerks or
customer service agents. Some TPSs bypass clerks and totally automate
transactions; such as the way ATMs automate deposits and cash with drawls. A
well-designed TPS checks each transaction for easily detectable errors such as
missing data, data values that are obviously too high or too low, data values that are
inconsistent with other data in the database and data in the wrong format. It may
check for required authorizations for the transaction. Certain TPSs such as airline
reservation systems may automate decision-making functions such as finding the
flight that best meets the customer’s needs. Finally, when all the information for the
transaction has been collected and validated, the TPS stores it in a standard format
for later access by others.
The two types of transaction processing are batch and real time processing. With
batch processing, information for individual transaction is gathered and stored but
isn’t processed immediately. Later, either on a schedule or when a sufficient number
11
System Analysis and of transactions have accumulated, the transactions are processed to update the
Computer Languages database. With real time processing, each transaction is processed immediately.
The person providing the information is typically available to he4lp with error
correction and receives confirmation of transaction completion. Batch processing
was the only feasible form of transaction processing when data were stored only on
punched cards or tapes. Real time transaction processing requires immediate access
to an online database.
Batch processing is currently used in some situation where the transaction data
comes in on paper, such as in processing cheques and airline ticket stubs. A batch
approach is also used for generating paychecks and other forms of paper output that
will be distributed after a delay. Unfortunately time delays inherent in batch
processing may cause significant disadvantages. The central database may never be
completely current because of transactions received while the batch was being
processed. Worse yet, batching the transactions creates built-in delays, with
transactions not completed until the next day in some cases. Even systems with
interactive user interfaces may include lengthy delays before transactions are
completed. For example, weekend deposits into many ATMs are not posted to the
depositor’s account until Monday. Even though the ATM’s user interface is
interactive, the system in a larger sense doesn’t perform real time processing.
Compared to batch processing, real time processing has more stringent requirements
for computer response and computer uptime. As is obvious when a travel agent
says “Sorry, the computer is down,” the jobs and work methods of the people in the
real time TPS are designed under the assumption that the system will be up and
available.
The concept of MIS emerged partly as a response to the shortcomings of the first
computerized TPSs, which often improved transaction processing but provided little
information for management. Computerized MISs typically extract and summarize
data from TPSs to allow managers to monitor and direct the organization and to
provide employees accurate feedback about easily measured aspects of their work.
For example, a listing of every sale during a day or week would be extremely difficult
to use in monitoring a hardware store’s performance. However, the same data could
be summarized in measures of performance, such as total sales for each type of item,
for each salesperson, and for each hour of the day. The transaction data remains
indispensable, and the MIS focuses it for management.
EISs provide executives with internal and competitive information through user-
friendly interfaces that can be used by someone with little computer-related
knowledge. EISs are designed to help executives find the information they need
whenever they need it and in whatever form is most useful. Typically, users can
choose among numerous tabilar or graphical formats. They can also control the level
of detail, the triggers for exception conditions, and other aspects of the information
displayed. Most EISs focus on providing executives with the background information
they need, as well as help in understanding the causes of exceptions and surprises.
This leaves executives better prepared to discuss issues with their subordinates.
The use of online data analysis tools to explore large databases of transaction data is
called online analytical processing (OLAP). The idea of OLAP grew out of
difficulties analyzing the data in databases that were being updated continually by
online transaction processing systems. When the analytical processes accessed large
slices of the transaction database, they slowed down transaction processing critical to
customer relationships. The salutation was periodic downloads of data from the
active transaction processing database into a separate database designed specifically
to support analysis work. The separate database often resides on a different
computer, which together with its specialized software is called a data warehouse.
Downloading data to a data warehouse makes it possible to perform both transaction
processing and analytical processing efficiently without mutual interference.
Data mining is the use of data analysis tools to try to find the patterns in large
transaction databases such as the customer receipts generated in a large sample of
grocery stores across the United States. Careful analysis of this data might reveal
patterns that could be used for marketing promotions, such as a correlation between
diaper sales and beer sales during the evening hours.
The information system categories discussed so far are primarily oriented toward
planning and control activities or toward general office and communication activities.
What about systems designed to directly support people doing the value added work
that customers care about, such as practicing medicine, designing buildings, or selling
investments? Some people call these systems “functional area systems”. Because
there is no generally accepted term form information systems that support value
added work, we will call them execution systems. These systems have become
much more important in the last decade as advances in computer speed, memory
capacity, and portability made it increasingly possible to use computerized systems
directly while doing value added work. Such systems help plastic surgeons design
operation and show the likely results to their patients help lawyers find precedents
relevant to lawsuits, and help maintenance engineers keep machines running.
Expert systems are a type of execution system that has received attention as an
offshoot of artificial intelligence research. An expert system supports the intellectual
work of professionals engaged in design, diagnosis, or evaluation of complex
situations requiring expert knowledge in a well-defined area. Expert systems have
been used to diagnose diseases, configure computers, analyze chemicals, interpret
geological data, and support many other problem solving processes. This type of
work requires expert knowledge of the process of performing particular tasks.
Although these tasks may have some repetitive elements, many situations have
unique characteristics that must be considered based on expert knowledge.
Intellectual work even in narrowly defined areas is typically much less repetitive than
transaction processing general office work.
14
13.3.7 Going Beyond the Information System Categories Computer Programming
and Languages
The field of IT moves so rapidly that terminology often fails to keep pace with
innovation. The same problem occurs with information system classification. People
identify a new type of system, such as DSS or EIS, and describe its characteristics
are no longer as important or have become commonplace. Eventually many
information systems contain characteristics from several system categories.
Furthermore a system that fits in a category today may not fit once new features are
added. Information systems that contain characteristics of several different
categories can be called hybrid information systems.
ERP systems try to create an integrated database that spans the major activities in a
company. Ideally, having production, sales, human resources, and finances data in the
same database should make it easier to analyze the business and to coordinate
decision-making. Software vendors such as SAP, Baan, People soft, and Oracle
currently sell ERP software. These vendors analyzed basic business processes such
as purchasing and of the process variations they found. This design strategy makes
their products enormously complicated. Just figuring out which of the many options
to use often takes several hundred person-months of time. In many situations,
departments must give up existing customized systems that address their unique
problems in order to use the more general software and its integrated database.
One of the most important things to know about building a new information system is
that this process is one kind of planned organizational change. Frequently, new
systems mean new ways of doing business and working together. The nature of
tasks, the speed with which they must be completed, the nature of supervision (its
frequency and intensity), and who has what information about whom will all be
decided in the process of building an information system. This is especially true in
contemporary systems, which deeply affect many parts of the organization. System
builders must understand how a system will affect the organization as a whole,
focusing particularly on organizational conflict and changes in the locus of
decision-making. Builders must also consider how the nature of work groups will
change under the impact of the new system. Builders determine how much change
is needed.
The most common form of IT-enabled organizational change is automation. The first
applications of information technology involved assisting employees perform their
tasks more efficiently and effectively. Calculating paychecks and payroll registers,
giving bank teller’s instant access to customer deposit records, and developing a
nationwide network of airline reservation terminals for airline reservation agents are
15
all examples of early automation. Automation is akin to putting a larger motor in an
existing automobile.
System Analysis and
Computer Languages
High
Paradigm Shifts
Risk
Re-engieering
Rationalization
Low
Automation
Low High
Return
A deeper form of organizational change – one that follows quickly from early
automation – is rationalization procedure. Automation frequently reveals new
bottlenecks in production, and makes the existing arrangement of procedures and
structures painfully cumbersome. Rationalization of procedures is the streamlining of
standard operating procedures, eliminating obvious bottlenecks, so that automation
can make operating procedures more efficient.
This still more radical form of business change is called a paradigm shift.
A paradigm shift involves rethinking the nature of the business and the nature of the
organization itself. Banks, for instance, may decide not to automate, rationalize, or
reengineering the jobs of tellers. Instead they may decide to eliminate branch
banking altogether and seek less expensive source of funds, like international
borrowing. Retail customers may be forced to use the Internet to conduct all their
business, or a proprietary network. A paradigm shift is akin to rethinking not just the
automobile, but transportation itself.
16
Of course nothing is free. Paradigm shifts and re-engineering often fail because Computer Programming
extensive organization change is so difficult to orchestrate. Some experts believe that and Languages
70% of the time they fail. Why then do so many corporation entertain such radical
change, because the rewards are equally high. In many instances firms seeking
paradigm shifts and pursuing re-engineering strategies achieve stunning, order-of-
magnitude increases in their returns on investment (or productivity).
Another important fact about information systems is shown in Figure 13.3. No matter
how they may be classified, information systems have following business values in an
organization by supporting business operations, decision-making, and strategic
management:
• Support of business operations.
• Support of managerial decision-making.
• Support of strategic competitive advantage.
INFORMATION SYSTEMS
Support of
Strategic
Advantage
Support of
Managerial
Decison Making
Support of
Business Operations
Let’s take a retail store as an example to illustrate this important first point.
As a consumer, you have to deal regularly with information systems used to support
business operations at the many retail stores where you shop. For example, most
department stores use computer-based information systems to help them record
customer purchases, keep track of inventory, pay employees, buy new merchandise,
and evaluate sales trends. Store operations would grind to a halt without the support
of such information systems.
Information systems also help store managers make better decisions and attempt to
gain a strategic competitive advantage. For example, decisions on what lines of
clothing or appliances need to be added or discontinued, or what kind of investments
they require, are typically made after an analysis provided by computer-based
information systems.
17
System Analysis and This not only supports the decision making of store managers but also helps them look
Computer Languages for ways to gain an advantage over other retailers in the competition for customers.
For example, store managers might make a decision to invest in a computerized
touch-screen catalog ordering system as a strategic information system. This might
lure customers away from other stores, based on the ease of ordering merchandise
provided by such a computer-based information system. Thus, strategic information
helps provide strategic products and services that given an organization a
comparative advantage over its competitors.
If a firm does not want to use its own internal resources to build and operate
information systems, it can hire an external organization that specializes in providing
these services to do the work. The process of turning over an organization’s
computer central operations, telecommunications networks, or applications
development to external vendors of these services is called outsourcing.
Advantages of Outsourcing:
18
Service Quality: Because outsourcing vendors will lose their clients if the service is Computer Programming
unsatisfactory, companies often have more leverage over external vendors than over and Languages
their own employees. The firm that out-sources may be able to obtain a higher level
of service from vendors for the same or lower costs.
Disadvantages of Outsourcing
Not all organizations obtain these benefits from outsourcing. There are dangers in
placing the information systems functions outside the organization. Outsourcing can
create serious problems such as loss of control, vulnerability of strategic information,
and dependence on the fortunes of an external firm.
Loss of Control: When a firm farms out the responsibility for developing and
operating its information systems to another organization, it can lose control over its
information systems function. Outsourcing places the vendor in an advantageous
position where the client has to accept whatever the vendor does and whatever fees
the vendor charges. If a vendor becomes the firm’s only alternative for running and
developing its information systems, the client must accept whatever technologies the
vendor provides. This dependency could eventually result in higher costs or loss of
control over technological direction.
Dependency: The firm becomes dependent on the viability of the vendor. A vendor
with financial problems or deteriorating services may create severe problems for its
clients.
19
System Analysis and 13.6.2 When to Use Outsourcing?
Computer Languages
Since outsourcing has both benefits and liabilities and is not meant for all
organizations or all situations, managers should assess the role of information systems
in their organization before making an outsourcing decision. There are a number of
circumstances under which outsourcing makes a great deal of sense:
• When there is limited opportunity for the firm to distinguish itself competitively
through a particular information systems application or series of applications.
For instance, both the development and operation of payroll systems are
frequently outsourced to free the information systems staff to concentrate on
activities with a higher potential payoff, such as customer service or
manufacturing systems. Applications such as payroll or cafeteria accounting, for
which the firm obtains little competitive advantage from excellence, are strong
candidates for outsourcing. If carefully developed, applications such as airline
reservations or plant scheduling could provide a firm with a distinct advantage
over competitors. The firm could lose profits, customers, or market share if such
systems have problems. Applications where the rewards for excellence are high
and where the penalties for failure are high should probably be developed and
operated internally.
Companies may also continue to develop applications internally while outsourcing
their computer center operations when they do not need to distinguish themselves
competitively by performing their computer processing onsite.
When outsourcing does not strip the company of the technical know-how required for
future information systems innovation. If a firm outsource some of its system but
maintains its own internal information systems staff, it should ensure that its staff
remains technically up to date and has the expertise to develop future applications.
When the firm’s existing information systems capabilities are limited, ineffective, or
technically inferior. Some organizations use outsourcers as an easy way to revamp
their information systems technology. For instance, they might use an outsourcer to
help them make the transition from traditional mainframe-based computing to a new
information architecture – distributed computing environment.
Managing Outsourcing
To obtain value from outsourcing, organizations need to make sure the process is
properly managed. With sound business analysis and an understanding of
outsourcing’s strengths and limitations, managers can identify the most appropriate
applications to outsource and develop a workable outsourcing plan.
Segmenting the firm’s range of information systems activities into pieces that
potentially can be outsourced makes the problem more manageable and also helps
companies match an outsourcer with the appropriate job. Noncritical applications are
20 usually the most appropriate candidates for outsourcing. Firms should identify
mission-critical applications and mission-critical human resources required to develop Computer Programming
and manage these applications. This would allow the firm to retain its most highly and Languages
skilled people and focus all of its efforts on the most mission-critical applications
development. Setting technology strategy is one area that companies should not
abdicate to outsourcers. This strategic task is best kept in-house. Ideally, the firm
should have a working relationship of trust with an outsourcing vendor. The vendor
should understand the client’s business and work with client as a partner, adapting
agreements to meet the client’s changing needs.
Firms should clearly understand the advantages provided by the vendor and what
they will have to give up to obtain these advantages. For lower operating costs, can
the client live with a five-second-response time during peak hours or next-day repair
of microcomputers in remote offices? Organizations should not abdicate management
responsibility by outsourcing. They need to manage the outsourcer as they would
manage their own internal information systems department by setting priorities,
ensuring that the right people are brought in, and guaranteeing that information
systems are running smoothly. They should establish criteria for evaluating the
outsourcing vendor that include performance expectations and measurement methods
for response time, transaction volumes, security, disaster recovery, backup in the
event of a catastrophe, processing requirements of new applications and distributed
processing on microcomputers, workstations, and LANs. Firms should design
outsourcing contracts carefully so that the outsourcing services can be adjusted if the
nature of the business changes.
Activity B
Take the case of a petrol pump, a bookstore, a software development company, and
an electronic goods manufacturer. Is outsourcing information systems required for
them? Describe what can be outsourced and the advantages.
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
Today more and more businesses are turning to an idea known as total quality
management. Total quality management (TQM) is a concept that makes quality the
responsibility of all people within an organization. TQM holds that the achievement
of quality control is an end in itself. Everyone is expected to contribute to the overall
improvement of quality – the engineer who avoids design errors, the production
worker who spots defects, the sales representative who presents the product properly
to potential customers, and even the secretary who avoids typing mistakes. Total
quality management encompasses all of the functions within an organization. TQM is
based on quality management concepts developed by American quality experts.
Japanese management adopted the goal of zero defects, focusing on improving their
products or services prior to shipment rather than correcting them after they have
been delivered. Japanese companies often give the responsibility for quality
consistency to the workers who actually make the product or service, as opposed to a
quality control department. Studies have repeatedly shown that the earlier in the
business cycle a problem is eliminated, the less it costs for the company to eliminate
it. Thus the Japanese quality approach not only brought a shift in focus to the
workers and an increased respect for product and service quality but also lowered
costs.
Information systems can fill a special role in corporate quality programs for a number
of reasons. First, IS is deeply involved with the daily work of other departments
throughout the organizations. IS analysis usually have taken a leading role in
designing, developing, and supporting such varied departmental systems as corporate
payrolls, patent research systems, chemical process control systems, logistics
systems, and sales support systems. IS professionals also maintain their knowledge
of these departments through their participation in departmental information planning.
In addition, IS personnel are usually key to the sharing of data between departments
because they have unique knowledge of the relationships between various
departments. Often, only IS personnel know where certain data originate, how other
departments use and store them, and which other functions would benefit from
having access to them. With this broad understanding of the functional integration of
the corporation, IS personnel can be valuable members of any quality project team.
The IS staff in effective information systems departments have three skills that are
critical to the success of a quality program. First, they are specialists in analyzing and
redesigning business processes. Second, many IS technicians are experienced in
quantifying and measuring procedures and critical activities in any process. Typically,
IS departments have long been involved with measurements of their own manager
22
training has long been a staple of better IS departments; such training includes the Computer Programming
use of project management, software. These skills can contribute a great deal to any and Languages
serious quality program, which will normally be organized as a project and will usually
be heavily task-oriented.
The information systems staff is the source of ideas on the application of technology
to quality issues; often they are also the people who can make that technology
available to the quality project. For example, with the help of IS departments,
statistical analysis software is becoming more widely used in the drive for quality.
Reduce Cycle Time: Experience indicates that the single best way to address
quality problems is to reduce the amount of time from the beginning of a process to
its end (cycle time). Reducing cycle time usually results in fewer steps, an
improvement right there. But reducing cycle time has other advantages. With less
time passing between beginning and end, workers will be better aware of what came
just before, and so are less likely to make mistakes.
Improve the Quality and Precision of the Design: Quality and precision in
design will eliminate many production problems. Computer-aided design (CAD)
software has made dramatic quality improvements possible in a wide range of
businesses from aircraft manufacturing to production of razor blades.
Increase the Precision of Production: For many products, one key way to
achieve quality is to tighten production tolerance. CAD software has also made this
possible. Most CAD software packages include a facility to translate design
specifications into specifications both for production tooling and for the production
process itself. In this way, products with more precise designs can also be produced
more efficiently.
Include Line Workers in any Quality Process: Experience has shown that
involvement of the people who perform the function is critical to achieving quality in
that function. Although the information systems are could potentially make many
more contributions like these, its involvement in corporate quality programs has
provoked a great deal of controversy. IS has been criticized for a reluctance to
23
System Analysis and become involved in organization-wide quality programs. Often IS focuses exclusively
Computer Languages upon technological capabilities while not reaching out to aid the rest of the company
in the ways described above. For example, many IS departments are criticized for
failure to use customer demands as a guide to improving their products and services.
On the other hand, non-IS departments often fail to consider contributions the IS staff
might make to their quality project and so do not reach out to involve them. It is not
uncommon for IS to be viewed only as technical support with little to contribute to the
planning or content of the quality program.
13.8 SUMMARY
In this unit we discuss about computer based information system and their different
types. Information systems have been used by organization as an effective way for
decision-making and in supporting communication. The field of IT moves so rapidly
that terminology often fails to keep pace with innovation. The same problem occurs
with information system classification. People identify a new type of system, such as
DSS or EIS, and describe its characteristics are no longer as important or have
become commonplace. Eventually many information systems contain characteristics
from several system categories. Furthermore a system that fits in a category today
may not fit once new features are added. Information systems that contain
characteristics of several different categories can be called hybrid information
systems.
Organizations in the past few years have shown a tendency to focus on their core
business. Functions that are not considered to be part of the core business are
outsourced to external suppliers. Organizations face an increased need, flexibility as
a consequence of a faster changing competitive environment and rapid developments
in information technology. Management has been questioning the idea that quality
costs more. Today many senior executives have come to the conclusion that the lack
of quality is actually a significant expense. While we all understand that product
returns and repairs result in added costs for repair (labor, parts replacement, and
additional shipping), only recently has management focused on the many previously
hidden costs that arise from producing products that are not high quality.
24
Computer Programming
13.10 REFERENCES AND SUGGESTED and Languages
FURTHER READINGS
Alter Steven (1999), Information Systems (A Management Perspective),
Pearson Education.
Burch, John (1992), Systems Analysis, Design, and Implementation,
Boston: Boyd & Fraser.
Laudon Kenneth, C., Laudon Jane, P. (1996), Management Information Systems
(Organization and Technology), Prentice Hall of India, New Delhi.
Loff De (1997), Information Systems Outsourcing Decision Making
(A Managerial Approach), IDEA Group.
O’ Brien, James, A (1995), Introduction to Information Systems, Irwin.
Post Gerald, V., and Anderson David, L.(2003), Management Information Systems,
Tata McGraw-Hill, New Delhi.
25
Computer Programming
UNIT 14 SYSTEM ANALYSIS AND DESIGN
and Languages
Structure
14.1 Introduction
14.2 Objectives
14.3 Traditional Systems Life Cycles
14.3.1 Initiation
14.3.2 Development
14.3.3 Implementation
14.3.4 Operations and Maintenance
14.4 Systems Life Cycle
14.4.1 Stages of the Systems Life Cycle
14.5 Systems Analysis
14.6 Systems Design
14.6.1 Logical and Physical Design
14.7 Implementation and Maintenance
14.7.1 Programming
14.7.2 Testing
14.7.3 Conversion
14.7.4 Production and Maintenance
14.8 Summary
14.9 Unit End Exercises
14.10 References and Suggested Further Readings
14.1 INTRODUCTION
From the inception of an idea for a software system, until it is implemented and
delivered to a customer, and even after that, the system undergoes gradual
development and evolution. The software is said to have a life cycle composed of
several phases. Each of these phases results in the development of either a part of
the system or something associated with the system, such as a test plan or a user
manual. In the traditional life cycle model, each phase has well-defined starting and
ending points, with clearly identifiable deliverables to the next phase.
14.2 OBJECTIVES
1
System Analysis and
14.3 TRADITIONAL
Computer Languages SYSTEM LIFE CYCLE
The goal of the traditional system life cycle is to keep the project under control and
assure that the information system produced, satisfies the requirements. The
traditional system life cycle divides the project into a series of steps, each of which
has distinct deliverables, such as documents or computer programs. This is known as
the systems development life cycle (SDLC). The deliverables are related because
each subsequent step builds on the conclusions of previous steps. This has been
shown in Figure 14.1. Some deliverables are oriented toward the technical staff,
whereas others are directed toward or produced by users and mangers. The latter
ensure that users and their management are included in the system development
process.
14.3.1 Initiation
The initiation phase may begin in many different ways. A user may work with the IS
staff to produce a written request to study a particular business problem. The IS staff
may discover an opportunity to use information systems beneficially and then try to
interest users. A top manager may notice a business problem and ask the head of IS
to look into it. A computer crash or other operational problem may reveal a major
problem that can be patched temporarily but requires a larger project to fix it
completely. Regardless of how this phase begins, its goal is to analyze the scope and
feasibility of a proposed system and to develop a project plan. This involves two
steps, the feasibility study and project planning, which produce the functional
specification and a project plan.
• Economic feasibility involves question such as whether the firm can afford to
build the information system, whether its benefits should substantially exceed
its costs, and whether the project has higher priority than other projects that
might use the same resources.
3
System Analysis and
Computer Languages
The development phase creates computer programs (with accompanying user and
programmer documentation) plus installed hardware that accomplishes the data
processing described in the functional specification. This is done through a process of
successive refinement in which the functional requirements are translated into
computer programs and hardware requirements. The purpose of the various steps
and deliverables in the development phase is to ensure that the system accomplishes
the goals explained in the functional specification. These steps are summarized in
Figure 14.2.
The first step in the development phase is the detailed requirements analysis, which
produces a user-oriented description of exactly what the information system will do.
This step is usually performed by a team including user representative and the IS
department.
The next step is internal system design, in which the technical staff decides how the
data processing will be configured on the computer. This step produces the internal
specification, a technical blueprint for the information system. It documents the
computer environment the system will operate in, the detailed structure and content
of the database, and the inputs and outputs of all programs and subsystems. Users do
not sign off on the internal specification because it addresses technical system design
issues. Instead, the IS staff signs off that the internal specification accomplishes the
functions called for in the external specification the users have approved.
Thus far the discussion has focused on software. Because the software will work
only if there is hardware for it to run on, and essential step in the development phase
is hardware acquisition and installation. For some information systems, this is not an
issue because it is a foregone conclusion that existing hardware will be used. Other
systems require a careful analysis to decide which hardware to acquire, how to
acquire it most economically, where to put it, and how to install it by the time it is
indeed. Factors considered in hardware acquisition decisions include compatibility
with existing hardware and software, price, customer service, and compatibility with
long-term company plans. Computer hardware can be purchased or rented through a
variety of financing arrangements, each with its own tax consequences. A firm’s
finance department usually makes the financing arrangements for significant
hardware purchases. Especially if new computer hardware requires a new computer
room, lead times for building the room, installing the electricity and air conditioning,
and installing the computer may be important factors in the project plan.
In firms with large IS staffs; users rarely get involved with the acquisition, installation,
and operation of computer hardware. Much as with telephone systems, users expect
the hardware to be available when needed and complain furiously whenever it goes
down. This is one reason computer hardware managers sometimes consider their
jobs thankless.
5
System Analysisisand
Programming the creation of the computer code that performs the calculations,
Computer Languages
collects the data, and generates the reports. It can usually proceed while the
hardware is being acquired and installed. Programming includes the coding, testing,
and documentation of each program identified in the internal specification. Coding is
what most people think of as programming. The testing done during the programming
step is often called unit testing, because it treats the programs in isolation.
The documentation of each program starts with the explanation from the internal
specification and includes comments about technical assumptions made in writing the
program, plus any subtle, non-obvious processing done by the program.
Documentation is another activity that can proceed in parallel with programming and
hardware acquisition. Both user and technical documentation is completed from the
material that already exists. The functional specification and external specification
are the basis for the user documentation, and the internal specification and program
documentation are the basis for the programmer documentation. With the adoption of
Computer Aided Software Engineering (CASE) tools, more of the documentation is
basically a compilation of data and diagrams already stored on a computer. Additional
user documentation is usually required, however, because different users need to
know different things depending on their roles. People who perform data entry tasks
need to understand the data entry procedures and what the data mean; people who
use data from the system need to understand what the data mean and how to retrieve
and analyze data, but do not need to know much about data entry details.
After the individual programs have been tested, the entire information system must be
tested to ensure that the programs operate together to accomplish the desired
functions. This is called the system testing, or integration testing. System tests
frequently uncover inconsistencies among programs as well as inconsistencies in the
original internal specification. These must be reconciled and the programs changed
and retested. One of the reasons for Microsoft’s “synch and stabilize” method is to
eliminate the surprises and extensive network that might occur if system testing
showed that programs were incompatible. Although system testing may seem an
obvious requirement, inadequate system testing has led to serious problems.
For example, a new trust accounting system put into operation prematurely by Bank
of America on March 1, 1987, lost data and fell months behind in generating
statements for customers. By January 1988, 100 institutional customers with $ 4
billion in assets moved to other banks, several top executives resigned, and 2.5 million
lines of code were scrapped.
6
Computer
It should be clear that the development phase for a large information Programming
system is a
and
complex undertaking, quite different from sitting down at a personal computer andLanguages
developing a small spreadsheet model. Explicitly separating out all the steps in the
development phase helps to ensure that the information system accomplishes the
desired functions and is debugged. Such an elaborate approach is needed because the
system is a tool of an organization rather than an individual. An individual producing a
spreadsheet is often typing to solve a current problem with no intention to use the
spreadsheet next month, much less that someone else will need to decipher and
modify it next year. In contrast, the traditional system life cycle assumes that the
information system may survive for years, may be used by people who were not
involved in its development, and may be changed repeatedly during that time by
people other than the original developers. The steps in the traditional life cycle try to
make the long-term existence of the information system as efficient error-free as possible.
14.3.3 Implementation
Implementation is the process of putting a system into operation in an organization.
Figure 14.3 shows that it starts with the end product of the development phase,
namely, a set of computer programs that run correctly on the computer, plus
accompanying documentation. This phase begins with implementation planning, the
process of creating plans for training, conversion, and acceptance testing.
Training is the process of ensuring that system participants know what they need to
know about both the work system and the information system. The training format
depends on user backgrounds and the purpose and features of both the work system
and the information system. Users with no computer experience may require special
training. Training for frequently used transaction processing systems differs from
training for data analysis systems that are used occasionally. Information systems
performing diverse functions require more extensive training than systems used
repetitively for new functions. Training manuals and presentations help in the
implementation system. After the previous methods have receded into history, other
types of training material are more appropriate.
Following the training comes the carefully planned process of conversion from the old
business processes to new ones using the new information system. Conversion is
often called cutover or changeover. It can be accomplished in several ways,
depending on the nature of the work and the characteristics of the old and new
systems. One possibility is to simply choose a date, shut off the old information
system, and turn on the new one while hoping that the work system will operate as
intended. This is risky, though, because it does not verify that the information system
will operate properly and that the users understand how to use it.
Consider the following example: The State of California installed an optical disk
system to streamline the process of doing title searches (establishing ownership and
identifying indebtedness on a property) for borrowers who wished to purchase
property. Previously, there was a 2 to 3 week delay between the borrower’s loan
request and the bank’s receipt of a confirmation that the title was clear. The new
system was to reduce this delay to 2 days. Both the vendor and several state officials
recommended that the existing manual system remain in full operation during the
conversion in case of problems. However, the Secretary of Finance rejected the
request for an additional $2.4 million, and the manual system was simply shut down
when the optical disk system came up. Unfortunately, software bugs plagued the new
system, and the resulting logjam of 50,000 loan requests delayed title searches for up
to 10 weeks. The new system was shut down for repair, and the old manual system
reinstated. The Assistant Secretary of State said that some banks almost went out of
business because of the slow turnaround.
To minimize risk and wasted effort, most conversions occur in stages, which can be
done in several ways. A phased approach uses the new information system and work
system for a limited subset of the processing while continuing to use old methods for
the rest of the processing. If something goes wrong, the part of the business using the
new system can switch back to the old system. The simultaneous use of the old
system and the new system is called running in parallel. Although this involves double
record keeping for a while, it verifies that the new information system operates
properly and helps the users understand how to use it effectively within the new work
system.
Conversions from one computerized system to another are often far more difficult
than users anticipate. Part of the problem is that computerized data in the old system
must be converted into the formats used by the new system. In consistencies
between the two systems frequently lead to confusion about whether the data in
8
Computer
either system are correct. Furthermore, programs that convert the Programming
data from one
and
system to another may have their own bugs, thereby adding to confusion and Languages
delays.
Conversion requires careful planning because people who don’t want the new system
and use the problems as an opportunity to complain can blow even minor problems
out of proportion. For these reasons, it is often wise to do a pilot implementation with
a small group of users who are enthusiastic about the system improvements. Ideally,
their enthusiasm will motivate them to make the effort to learn about the changes and
to forgive minor problems. After a pilot implementation demonstrates that the new
information system works, it is usually much easier to motivate everyone else
(including the skeptics) to start using it.
Acceptance testing is testing of the information system by the users as it goes into
operation. Acceptance testing is important because the information system may not
fit, regardless of what was approved and signed off in the external specification. The
business situation may have changed; the external specification may reflect
misunderstandings; the development process may have introduced errors; or the
implementation may have revealed unforeseen problems. For all these reasons, it
makes sense to include an explicit step of deciding whether the information system is
accepted for ongoing use. If it doesn’t fit user needs, for whatever reason, installing it
without changes may lead to major problems and may harm the organization instead
of helping. Acceptance testing also solidifies user commitment because it gets people
in the user organization to state publicly that the system works.
The post-implementation audit is the last step in the implementation phase, even
though it occurs after the new system has been in operation for a number of months.
Its purpose is to determine whether the project has met its objectives for costs and
benefits and to make recommendations for the future. This is also an opportunity to
identify what the organization can learn from the way the project was carried out.
The operation and maintenance phase starts after the users have accepted the new
system. This phase can be divided into two activities: (1) ongoing operation and
support, and (2) maintenance. Unlike the other steps in the life cycle, these steps
continue throughout the system’s useful life. The end of a system’s life cycle is its
absorption into another system or its termination.
Ongoing operation and support is the process of ensuring that the technical system
components continue to operate correctly and that the users use it effectively. This
process is similar to the process of making sure a car or building operates well. It
works best when a person or group has direct responsibility for keeping the
information system operating. This responsibility is often split, with the technical staff
taking care of computer operations and a member of the user organization ensuring
that users understand the system and use it effectively.
Maintenance is the process of modifying the information system over time. As users
gain experience with a system, they discover its shortcomings and usually suggest
improvements. The shortcomings may involve problems unrelated to the information
system or may involve ways that the information system might do more to support the
work system, regardless of the original intentions. Some shortcomings are bugs.
Important shortcomings must be corrected if users are to continue using an
information system enthusiastically.
Handling enhancement requests and bug fix requests is both a technical challenge
and a delicate political issue for IS departments. The technical challenge is ensuring
that changes don’t affect other parts of the system in unanticipated ways. The
traditional life cycle helps here because documentation and internal design methods
enforce modularization and make it easier to understand the scope and impact of
changes.
The political issue for most IS departments are their inability to support even half of
the enhancement requests they receive. For new or inadequately planned information
systems, some departments have more enhancement requests than they can even
analyze. In this environment, it requires both technical and political skill to keep users
satisfied. Users are often frustrated by how long it takes to make changes.
The steps in each of the four phases of the traditional system life cycle have now
been introduced. Table 14.1 outlines the steps in each phase and makes two major
points in addition to the details it presents. First it shows that users are highly
involved in three of the four phases. In other words, building information systems is
not just technical work done by the technical staff. It also shows that each step has
specific deliverables that document progress to date and help keep the project under
control.
The traditional system life cycle is a tightly controlled approach designed to reduce
the likelihood of mistakes or omissions? Despite its compelling logic, it has both
advantages and disadvantages. Adherence to fixed deliverables and signoffs
improves control but guarantees a lengthy process. Having specific deliverables due
at specific times makes it schedule of deliverables sometimes takes on a life of its
own and seems as important as the real project goals.
The traditional system life cycle is the standard against which other approaches are
compared. Project managers who want to bypass some of its steps still need a way
to deal with the issues they raise.
10
Computer
Table 14.1: Step and Deliverables in the Traditional System Programming
Life Cycle
and Languages
Initiation
Development
Implementation
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
The systems life cycle is the oldest method for building information systems and is
still used today for complex medium or large systems projects. This methodology
assumes that an information system has a life cycle similar to that of any living
organism, with a beginning, middle, and an end. The life cycle for information system
has six stages: project definition, systems study, design, programming, installation, and
post-implementation. Each stage consists of basic activities that must be performed
before the next stage can begin.
The life cycle methodology is a very formal approach to building systems. It partitions
the systems development process into distinct stages and develops an information
system sequentially, stage by stage. The life cycle methodology also has a very
formal division of labor between end users and information systems specialists.
Technical specialists such as systems analysts and programmers are responsible for
much of the systems analysis, design, and implementation work; end users are limited
to providing information requirements and reviewing the work of the technical staff.
Formal sign-offs or agreements between and users and technical specialists are
required as each stage is completed.
Product or output of each stage of the life cycle that is the basis for such sign-offs.
The project definition stage results in a proposal for the development of a new
system. The systems study stage provides a detailed systems proposal report outlining
alternative solutions and establishing the feasibility of proposed solutions. The design
stage results in a report on the design specifications for the system solution that is
selected. The programming stage results in actual software code for the system. The
installation stage outputs the results of tests to assess the performance of the system.
The post-implementation stage concludes with a post-implementation audit to
measure the extent to which the new system has met its original objectives. We now
describe the stages of the life cycle in detail.
12
The systems study stage analyzes the problems of existing systems Computer
(manualProgramming
or
and Languages
automated) in detail, identifies objectives to be attained by a salutation to these
problems, and describes alternative solutions. The systems study stage examines the
feasibility of each solution alternative for review by management. This stage tries to
answer the questions, “What doe the existing systems do?” “What are their strengths,
weakness, trouble spots, and problems?” “What user information requirements must
be met by the solution?” “What alternative solution options are feasible?” “What are
their costs and benefits?”
The design stage produces the logical and physical design specification for the
solution. Because the life cycle emphasizes formal specifications and paperwork,
many of the design and documentation tools, such as data flow diagrams, structure
charts, or system flowcharts are likely to be utilized.
The programming stage translates the design specifications produced during the
design stage into software program code. Systems analysts work with programmers
to prepare specifications for each program in the system. These program
specifications describe what each program will do, the type of programming language
to be used, inputs and outputs, processing logic, processing schedules, and control
statements such as those for sequencing input data. Programmers write customized
program code typically using a conventional third-generation programming language
such as COBOL or FORTRAN or a high-productivity fourth-generation language.
Since large systems have many programs with hundreds of thousands of lines of
program code, entire teams of programmers may be required.
The installation stage consists of the final steps to put the new or modified system
into operation: testing, training, and conversion. The software is tested to make sure it
performs properly from both a technical and a functional business standpoint.
Business and technical specialists are trained to use the new system. A formal
conversion plan provides a detailed schedule of all of the activities required to install
the new system, and the old system is converted to the new one.
The post-implementation stage consists of using and evaluating the system after it is
installed and is in production. It also includes updating the system to make
improvements. Users and technical specialists will go through a formal post-
implementation audit that determines how well the new system has met its original
objectives and whether any revisions or modifications are required. After the system
has been fine-tuned it will need to be maintained while it is in production to correct
errors, meet requirements, or improve processing efficiency. Over time, the system
may require so much maintenance to remain efficient and meet user objectives that it
will come to the end of its useful life span. Once the system’s life cycle comes to an
end, a completely new system is called for and the cycle may begin again.
Systems analysis is the analysis of the problem that the organization will try to solve
with an information system. It consists of defining the problem, identifying its causes,
specifying the solution, and identifying the information requirements that must be met
by a system solution.
13
System
The keyAnalysis and any large information system is a thorough understanding of the
to building
Computer Languages
existing organization and system. Thus, the systems analyst creates a road map of the
existing organization and systems, identifying the primary owners and users of data in
the organization. These stakeholders have a direct interest in the information affected
by the new system. In addition to these organizational aspects, the analyst also briefly
describes the existing hardware and software that serve the organization.
From this organizational analysis, the systems analyst details the problems of existing
systems. By examining documents, work papers, and procedures; observing system
operations; and interviewing key users of the systems, the analyst can identify the
problem are and objectives to be achieved by a solution. Often the solution requires
buildings a new information system or improving an existing one.
Feasibility
Technical Feasibility: Whether the proposed solution can be implemented with the
available hardware, software, and technical resources.
Economic Feasibility: Whether the benefits of the proposed solution outweigh the
costs. We explore this topic in greater detail in Section 11.4, Understanding the
Business Value of Information Systems.
Normally the systems analysis process will identify several alternative solutions that
can be pursued by the organization. The process will then assess the feasibility of
each. Three basic solution alternatives exist for every systems problem:
1. To do nothing, leaving the existing situation unchanged
2. To do modify or enhance existing systems
3. To develop a new system
There may be several solution design options within the second and third solution
alternatives. A written systems proposal report will describe the costs and benefits,
advantages and disadvantages of each alternative. It is then up to management to
determine which mix of costs, benefits, technical features, and organization impacts
represents the most desirable alternative.
Perhaps the most difficult task of the systems analyst is to define the specific
information requirements that must be met by the system solution selected. This is the
area where many large system efforts go wrong and the one that poses the greater
difficulty for the analyst. At the most basic level, the information requirements of a
new system involve identifying who needs what information, where, when, and how.
Requirements analysis carefully defines the objectives of the new or modified system
and develops a detailed description of the functions that the new system must
perform. Requirements must consider economic, technical, and time constraints, as
well as the goals, procedures, and decision processes of the organization. Faulty
requirements analysis is a leading cause of systems failure and high systems
development costs. A system designed around the wrong set of requirements either
will have to be discarded because of poor performance or will need to be heavily
revised. Therefore, the importance of requirements analysis must not be
14
underestimated.
Developing requirements specifications may involve considerable Computer
researchProgramming
and
revision. A business function may be very complex or poorly defined. A manual and Languages
system or routine set of inputs and outputs may not exist. Procedures may vary from
individual to individual. Such situations will be more difficult to analyze, especially if
the users are unsure of what they want or need (this problem is extremely common).
To derive information systems requirements, analysts may be forced to work and
re-work requirements statements in cooperation with users. Although this process is
laborious, it is far superior to and less costly than redoing and undoing an entire
system. There are also alternative approaches to eliciting requirements that help
minimize these problems.
In many instances, business procedures are unclear or users disagree about how
things are done and should be done. Systems analysis often makes an unintended
contribution to the organization by clarifying procedures and building organizational
consensus about how things should be done. In many instances, building a new
system creates an opportunity to redefine how the organization conducts its daily
business.
Some problems do not require an information system solution, but instead need an
adjustment in management, additional training, or refinement of existing organizational
procedures. If the problem is information-related, systems analysis may still be
required to diagnose the problem and arrive at the proper solution.
Systems design has three objectives. First, the systems designer is responsible for
considering alternative technology configurations for carrying out and developing the
system as described by the analyst. This may involve analyses of the performance of
different pieces of hardware and software, security capabilities of systems, network
alternatives, and the portability or changeability of systems hardware.
Second, designers are responsible for the management and control of the technical
realization of systems. Detailed programming specifications, coding of data,
documentation, designers are responsible for the actual procurement of the hardware,
consultants, and software needed by the system.
Third, the systems designer details the system specifications that will deliver the
functions identified during systems analysis. These specifications should address all of
the managerial, organizational, and technological components of the system solution.
Design Alternative
Like houses or buildings, information systems may have many possible designs.
They may be centralized or distributed, on-line or batch, partially manual, or heavily
automated. Each design represents a unique blend of all of the technical and
organizational factors that shape an information system. What makes one design
superior to others is the ease and efficiency with which it fulfills user requirements
within a specific set of technical, organizational, financial, and time constraints.
Before the design of an information system is finalized, analysts will evaluate various
design alternatives. Based on the requirements definition and systems analysis,
analysts construct high-level logical design models. They then examine the costs,
benefits, strengths, and weaknesses of each alternative.
Illustrate design alternatives for a corporate cost system, which maintains data on the
costs of various products produced by the corporation’s operating units in various
locations. The first alternative is a batch system that maximizes the efficiency and
economy of computer processing but requires extensive manual preparation of data.
The batch system requires the following steps:
1. Operating units prepare cost sheets with product cost data by plant. Sheets are
mailed to corporate cost accounting at corporate headquarters.
2. Corporate cost accounting reviews cost sheets and prepares transactions forms,
which are entered into the system.
3. The corporate product database is updated twice weekly via batch processing.
The database maintains standard product cost data by plant and links local product
numbers to corporate product numbers. The update also produces standard cost
sheets.
4. Copies the standard cost sheets are mailed back to the operating units.
There is also a time lag between the preparation of operating unit cost sheets and the
point when this information is reflected on the product database.
The second design alternative is an on-line system featuring more timely information
and reduced manual effort, but at greater cost for computer processing, software,
and security and recovery procedures required to maintain the integrity of the product
database. The steps for the on-line system are as follows:
1. Operating units enter their own product cost data on-line via local CRT terminals
with telecommunications links to the central corporate mainframe.
2. Through extensive on-line editing, the operating unit product data are edited.
Errors are corrected and the data immediately update the corporate product
database.
Some MIS researchers have suggested that design should be “user led.” However,
other researchers point out that systems development is not an entirely rational
process. Users leading design activities have used their position to further private
interests and gain power rather than to enhance organizational objectives. Users
controlling design can sabotage or seriously impede the systems-building effort.
The nature and level of user participation in design vary from system to system.
There is less need for user involvement in systems with simple or straightforward
requirements than in those with requirements that are elaborate, complex, or vaguely
defined. Transaction processing or operational control systems have traditionally
required less user involvement than strategic planning, information reporting, and
decision-support systems. Less structured systems need more user participation to
define requirements and may necessitate many versions of design before
specification can be finalized.
The remaining steps in the systems development process translate the solution
specifications established during systems analysis and design into a fully operational
information system. These concluding steps consist of programming, testing,
conversion, and production and maintenance.
14.7.1 Programming
The process of translating design specifications into software for the computer
constitutes a smaller portion of the systems development cycle than design and
perhaps the testing activities. But it here, in providing the actual instructions for the
machine, that the heart of the system takes shape. During the programming stage,
system specifications that were prepared during the design stage are translated into
program code. On the basis of detailed design documents for files, transaction and
report layouts, and other design details, specifications for each program in the system
are prepared.
The amount of time needed to answer this question has been traditionally underrated
in systems project planning. As much as 50 per cent of the entire software
development budget can be extended in testing. Testing is also time-consuming: Test
data must be carefully prepared, results reviewed, and corrections made in the
system. In some instances, parts of the system may have to be redesigned. Yet the
risks of glossing over this step are enormous.
Testing information system can be broken down into three types of activities: Unit
testing, or program testing, consists of testing each program separately in the system.
While it is widely believed that the purpose of such testing each program separately
in antee that programs is error free, this goal is realistically impossible. Testing should
be viewed instead as a means of locating errors in programs, focusing on finding all
the ways to make a program fail. Once pinpointed, problems can be corrected.
Acceptance testing provides the final certification that the system is ready to be used
in a production setting. Systems tests are evaluated by users and reviewed by
management. When all parties are satisfied that the new system meets their
standards, the system is formally accepted for installation.
It is essential that all aspects of testing be carefully thought out and that they be as
comprehensive as possible. To ensure this, the development team works with users to
devise a systematic test plan. The test plan includes all of the preparations for the
series of tests previously described.
The general condition being tested here is a record change. The documentation
consists of a series of test-plan screens maintained on a database (perhaps a
microcomputer database) that is ideally suited to this kind of application.
Users play a critical role in the testing process. They understand the full range of
data and processing conditions that might occur within their system. Moreover,
programmers tend to be aware only of the conditions treated in their programs; the
test data they devise are usually too limited. Therefore, input from other team
members and users will help ensure that the range of conditions included in the test
data is complete. Users can identify frequent and less common transactions, unusual
conditions to anticipate, and most of the common types of errors that might occur
when the system is in use. User input is also decisive in verifying the manual
procedures for the system.
14.7.3 Conversion
Conversion is the process of changing from the old system to the new system.
It answers the question, “Will the new system work under real conditions?” Four
main conversion strategies can be employed: the parallel strategy, the direct cutover
strategy, the pilot study strategy, and the phased approach strategy.
18
Computer
In a parallel strategy, both the old system and its potential replacement areProgramming
run
and Languages
together for a time until everyone is assured that the new one functions correctly.
This is the safest conversion approach because, in the even to errors or processing
disruptions, the old system can still be used as a backup. However, this approach is
very expensive, and additional staff or resources may be required to run the extra
system.
The direct cutover strategy replaced the old system entirely with the new system on
an appointed day. At first glance, this strategy seems less costly than parallel
conversion strategy. However, it is a very risky approach that can potentially be more
costly than parallel activities if serious problems with the new system are found.
There is no other system to fall back on. Dislocations, disruptions, and the cost of
corrections may be enormous.
The pilot study strategy introduces the new system only to a limited area of the
organization, such as a single department or operating unit. When this pilot version is
complete and working smoothly, it is installed throughout the rest of the organization,
either simultaneously or in stages.
The phased approach strategy introduces the new system in stages, either by
functions or by organizational units. If, for example, the system is introduced by
functions, a new payroll system might begin with hourly workers who are paid
weekly, followed six months later by adding salaried employees who are paid monthly
to the system. If the system is introduced by organizational units, corporate
headquarters might be converted first, followed by outlaying operating units four
months later.
A formal conversion plan provides a schedule of all the activities required to install
the new system. The most time-consuming activity is usually the conversion of data.
Data from the old system must be transferred to the new system, either manually or
through special conversion software programs. The converted data then must be
carefully verified for accuracy and completeness.
Moving from an old system to a new one requires that end users be trained to use the
new system. Detailed documentation showing how the system works from both a
technical and end-user standpoint is finalized during conversion time for use in
training and everyday operations. Lack of proper training and documentation
contributes to system failure, so this portion of the systems development process is
very important.
Studies of maintenance have examined the amount of time required for various
maintenance tasks. Approximately 20 per cent of the 20 per cent is concerned with
changes in data, files, reports, hardware, or system software. But 60 percent of all
maintenance work consists of making user enhancements, improving documentation,
and recording system components for greater processing efficiency. The amount of
work in the third category of maintenance problems could be reduced significantly
through better system analysis and design practices.
19
System Analysis and
14.8
ComputerSUMMARY
Languages
Partly because of the problems that have been encountered in the past, and partly
because of technological improvements, several techniques are available to develop
computer systems. The most formal approach is known as the systems development
life cycle. Most organizations have created their own versions of SDLC. Any major
company that uses SDLC also has a manual that is several inches thick (or
comparable online documentation) that lays out the rules that MIS designers have to
follow. Although these details vary from firm to firm, all of the methods have a
common foundation. The goal is to build a system by analyzing the business
processes and breaking the problem into smaller, more manageable pieces.
Ghezzi Carlo, Jazayeri Mehdi and Mandrioli Dino (1991), Fundamentals of Software
Engineering, Prentice-Hall of India, New Delhi.
20
Computer Programming
UNIT 15 COMPUTER PROGRAMMING AND
and Languages
LANGUAGES
Structure
15.1 Introduction
15.2 Objectives
15.3 Programming Vocabulary
15.4 Control Statement or Control Structure
15.5 Overview and Features of Visual Basic
15.6 Overview and Deatures of Java
15.7 Overview and Features of HTML
15.8 Overview and Features of COBOL
15.9 Overview and Features of Excel
15.10 Summary
15.11 Unit-End Exercises
15.12 References and Suggested Further Readings
15.1 INTRODUCTION
15.2 OBJECTIVES
• Identify important features of Visual Basic, Java, HTML, Excel and COBOL;
and
1
System Analysis and
15.3
ComputerPROGRAMMING
Languages VOCABULARY
Suppose we want to write program for finding factorial of a number. The flow chart
and pseudo code for this will be as follows:
Input N
F
N >0
N =0 or T
N=1
N=
Write 1
Write
“ Invalid Input”
Stop
Apart from key words a program uses several other programming concept viz.
identifiers, constants, expression, library functions etc.
Identifiers
Identifiers are the name given to various program elements such as variables,
functions, sub-routines etc. Identifiers consist of letters and digits, in any order, except
the first character must be a letter.
Variables
Variables are those elements of program whose value can change during the
execution of a program.
Constant
Constant are those elements of program whose value cannot be changed during the
execution of the program. Means they have fixed value.
The numeric constant can be integer representing whole number or floating point
number with a decimal point. Constants would be probably the most familiar concept
to us since we have used them in doing everything that has to do with numbers.
Operations like, addition, subtraction, division, multiplication, and comparison can be
performed on numeric constants.
Expression
An expression represents a single data item, such as a number or a character. The
expression may consist of a single entry. Such as constant, a variable, and array
element or a reference to a function. It may also consist of some combination of such
entities inter connected by one or more operators. Generally every high level
programming language provides some sets of arithmetical, relational, logical
operators. The most common arithmetical, relational, and logical operators are:
Arithmetical operator
* Multiplication
/ Division operators
– Subtraction operator
+ Addition operator
Relational operator
= Equal to
<> Not equal to
< Less than
> Greater than
<= Less than or equal to
>= Greater than or equal to
3
System Analysis
Logical Operatorand
Computer Languages
NOT Logical NOT operator simply negates a truth-value.
AND Logical AND operator return true if both operators are true
(e.g. (4<=8) and (a<=b) is true.
OR Logical OR operator return false if both operands and false.
XOR Exclusive OR is true only if one of the operand is true and other is
false.
Each operator has got some precedence associated with it and expression is always
evaluated on the basis of precedence of the operator e.g.
3+7*6-4/2–2 ↑ 4
Relational operators have same level of precedence among themselves but low
precedence than arithmetic operators. Logical operators have lower precedence than
relation operators. Among themselves they have the following order of priority during
evaluation of logical expression (logical expression is an expression evolving relational
or logical operators and evaluate either true value or false value)
Expressions would be our basic workhorses. Our programs would be full of them,
and while executing the program; computer would be preoccupied most of the time to
evaluate them. But it would also be doing other things such as taking some values as
input from input device, assigning a value or result of an expression to a variable,
send a value for display to output device pondering to be or not to be on some
conditional expression, repeating some tasks until we are satisfied and calling some
slave – program to perform specific task. In the following discussion we shall
elaborate on these actions.
ii) Statements
4
Computer Programming
Programmin and Languages
Input/Output Declarativ
If – else
– end if Case For
5
System Analysis
Built-in andand statement type are specific to a particular programming
data type
Computer
language. Languages
Generally all programming language support following types of built in data viz.
Int. Whole number
Real Number with fractional part
Boolean Data type which is either ‘true’ or ‘false’
Char Single alpha number character enclosed in single quotation
mark e.g. ‘a’, ‘1’ etc.
String Group of characters enclosed in double quotation mark.
Before using any variable in the program it is generally necessary to define it’s type.
The memory requirement for each data type is different and it is dependent upon the
specific programming language.
Statements
Statement in programming language can be broadly classified as follows:
i) Declarative statements
ii) Input output statement
iii) Assignment statement
iv) Control statement or control structure.
Declarative Statements
These statements are used to declare the type of the variable e.g.
In Java
Int x : is of integer type variable
Char x : is character type variable
Byte b : b is of byte type variable
Float y : y is of float (real) type variable
In Visual Basic
Dim x as Integer : x is integer type variable
Dim b as Byte : b is byte type variable
Dim y as Single : y is of floating (real) type variable
Input Output Statement
Console input is used for taking the input from default input devices (e.g. line 1 of
Figure 15.1(a)) while console output statement is used for printing the result of the
program on default output device (e.g. line 4, line 10, line 12 of Figure 15.1(b)).
Similarly file input statements are used for taking the input from file or non default
input device while file output statement is used for writing the output into the
specified file.
6
Assignment statements are used for assigning the value to variable e.g. variable
Computer Programming
name = value to be assigned. and Languages
If – then – else
This statement used when we have to make selection from two available groups of
statements. S1 group of statements will be only executed if Boolean expression true
otherwise s2 group of statement will be executed.
Entry
Boolean
Expression
F T
7
System statement
CASE Analysis and
is used if we have to make selection from several available group of
Computer
statement Languages
Case (expression R)
{ Case x : S1
Case y : S2
Case w : S3
Case z : S4
………………………..
………………………..
Expression R
Expression-R = X
s1
Expression-R = X
s2
If we do not know in advance how many times the loop will iterate then we use while
– loop or repeat – until structures. There types of loops are terminated by some
Boolean expression. The body of these loops must contain one statement that alters
the value of the Boolean expression.
Sn
Wend
Boolean
Expression
T F
Execute Body of Loop
Repeat
S1
Body of the loop containing
S2 a statement which alters
S3 the Boolean expression.
Sn
iii) Jump Statement : Go to, break and continue are generally the jump
statements. Go to statement is used for jumping from one location to another
labeled location within the program. Break statement causes the loop to be
terminated, the continue statement causes the loop to be continued with the next
iteration after skipping any statements in between.
2. Visual Basic supports the principles of Object-oriented design. This means that
you can compartmentalize different aspect of your application as objects and
develop and test those objects independently of the rest of the application.
Design and
Build User
Interface
Write Even
Driven Code
Visual Basic
Compiler
Convert to
Runtime and
Prepare
Distribution File
.FRM file
.FRM file
Visual Basi
.BAS file
.BAS file
The .VBP file at the top of the diagram is the Visual Basic project file. This file
contains references to all the components of the project and is not actually compiled
into .EXE file.
If Then Optio
Expression Stateme
Statement
The optional statement block is executed only when expression is true. Regardless of
the value of the expression, execution continues after the if statement with statements.
If then else is used when certain statements execute only when the expression is true
other statements execute if the expression is false
Statement 1
If Else Sta
Expression If e
i
Than
Statement(s)
If expression
is true
End if
Statement 2
13
SystemSyntax:
Analysis and
Computer Languages
If Expression Then
Statements(s)
Else
Statements(s)
End if
The final extension of if then End if branch is diagrammed below:
Statement-1
If Else If Else If
Expression 1 Expression 2 Expression n
End if
Statement-2
Syntax:
If expression 1 then
Statement(s)
Else if expression 2 then
Statement(s)
:
:
:
Else if expression n then
Statement(s)
End if
14
Computerand
The select case branch is used in place of nested if then else statements Programming
is easy
to understand and is diagramed below: and Languages
Select Case
Expression
Case Stateme
Value 1
Case Statemen
Value 2
Case Stateme
Value n
End Case
Syntax:
Select Case Expression
Case value 1
Statement(s)
Case value 2
Statement(s)
:
:
:
Case value n
Statement(s)
Else Case
Statement(s)
End Select
15
System Analysis
Looping and
Constructs of Visual Basic
Computer Languages
The For… Next is useful whenever we know how many times loop through the
statement block
Syntax
Var> Final
Value
Yes No
The loop can be executed either while condition is true or until the condition becomes
true. The two variations of the Do – loop use the keywords while until to specify how
long the statements are executed. To execute a block of statements while a condition
is true, use the following syntax:
Do while condition
Statement block
Loop
To execute a block of statements until the condition becomes true use the following
syntax:
Do Until Condition
Statement block
Loop
16
Computer Programming
15.6 OVERVIEW AND FEATURES OF JAVA and Languages
Java Environment
Java environment includes a large number of development tools and hundreds of
classes and methods. The development tools are part of Java Development Kit
(JDK) and classes and methods are part of Java Standard Library (JSL).
Main Java Development tools are as follows:
Table 15.3: Java Development Tools
Tools Description
Java Java interpreter, which runs applets and application by reading and
interpreting byte codes.
Javac The java compiler, which translates Java source code to byte code
files that the interpreter can understand.
Javadoc Creates HTML format documentation from Java source code file.
Javah Produces header file for use with native methods.
Javap Java disassembler, which enables us to convert byte code files into
a program description.
Jdb Java debugger, which helps us to find errors in our programs.
17
System
The wayAnalysis and are applied to build and run application program is show below in
these tools
Computer
the figure Languages
Java Source
Javadoc
Code
Javac
Java Class
File Javah
Java Jdb
Java Program
Source Code Java Compiler
Java standard library includes hundred of classes and methods grouped into six
functional packages.
1. Language Support Package: Collection of classes and methods required for
implementing basic features of Java.
2. Utilities Package: A collection of classes to provide utility functions such as
time and date.
3. Input /Output Package: A collection of classes required for input/output
manipulation.
4. Networking Package: A collection of classes for communicating with other
computer via intranet or Internet.
5. Awt Package: The abstract window tool kit package contains classes that
implements platform independent graphical user interface (GUI).
6. Applet package: This includes a set of classes that allow us to create java
applets. Applets are small java programs developed for intranet/ Internet
applications.
An applet located on a distant computer (server) can be downloaded via internet/
18
intranet and executed on a local computer (client) using a java capable browser
Structure of Java program Computer Programming
and Languages
A java program may contain many classes of which only one class defines a main
method. A class contains data members and methods that operate on the data
member of the class. A java program may contain the following sections:
Documentation section Suggested
Package Statement Optional
Import Statement Optional
Interface statement Optional
Class definitions Optional
Main method class Essential
All Java source files will have the extension Java, also if a program contains multiple
classes, the file name must be the class name of the class contains the main method.
Control Statements
Expression
True
Statement x
False
Statement x
19
SystemIfAnalysis and
(expression)
Computer Languages
{
True – block statement(s)
}
else
{
False – block statement(s)
}
Statement – x
True False
Expression
True-Block False-Block
Statement Statement
Statement x
If (Condition-1)
Statement – 1;
Else if (Condition – 2)
Statement – 2;
Else if (Condition – 3)
Statement – 3;
............................................
............................................
............................................
Else if (Condition – n)
Statement – n;
Else
Default statements;
Statement – x
Activity A
1. What are the different types of conditional branching statement sin Visual basic?
.....................................................................................................................
.....................................................................................................................
.....................................................................................................................
2. Describe the six functional packages in JAVA progam library.
.....................................................................................................................
.....................................................................................................................
20 .....................................................................................................................
Computer Programming
and Languages
T Condition-1 F
Statement-1
T Condition-2 F
T F
Statement-2
Condition-3
T F
Statement-3 Condition-n
Default
Statement-n
Statement
The Java language provides three constructs for performing loop operations viz
While loop
Do loop
For loop
In the while loop test condition is evaluated and if the condition is true, then body of
loop is executed as illustrated in the Figure below:
Syntax:
Initialization
While (Condition)
{
Body of loop
}
F
Condition
T
Body of Loop
21
System
In Analysis and
do statement test condition is evaluated the bottom of the loop hence resulting at
Computer Languages
least one time execution of the body of the loop irrespective of the value of test
condition:
Syntax:
Initialization
Do
{
Body of loop;
} While (condition)
Body of Loop
F
Condition
T
The for loop is used when we know in advance how many times the loop will run.
The syntax is:
Initialization of Control
Variable
Test F
Condition
T
Initialization of Control
Variable
22
Computer Programming
15. 7 OVERVIEW AND FEATURES OF HYPERTEXT
and Languages
MARKUP LANGUAGE
The basic HTML commands that are needed to create web pages fall into following
categories:
Structural Command
These identify a file as an HTML document and provide information about the data in
the HTML file.
Activity B
A Principal wants to make a web site for the information of parents so that they can
get information of their progress of their ward in the school as well about various
schemes of the school.
1. Make a diagram for the website.
2. Which language would you prefer for that website.
.....................................................................................................................
.....................................................................................................................
.....................................................................................................................
.....................................................................................................................
.....................................................................................................................
COBOL source program is written in Code sheet. In the coding sheet each line has
five following zones:
i) Columns 1-6 : used for sequence number
ii) Column 7 : used for continuation mark an
asterisk (*) mean comment
Division heading, section names paragraphs names, level numbers are usually margin
B entries.
24
Identification Division Computer Programming
and Languages
This is the first division of every COBOL program. It has no direct effect on
the execution of the program.
IDENTIFICATION DIVISION
PROGRAM-ID. <Program Name>
[ AUTHOR. <author Name> ]
[ INSTALLATION. <name of installation>]
[ DATE-WRITTEN. <date>]
[ DATE-COMPILED <date>]
[ SECURITY. <status of security>]
[ REMARKS. <remarks or comments>]
The words enclosed with < > are to be understood as generic terms referencing the
COBOL language items. The word enclosed within [] are optional and those
enclosed with { } are understood to be alternatives.
Environment Division
This is the second division of a COBOL program and is mostly machine oriented. It
contains information regarding the equipments to be used for processing the program
and has two section viz. Configuration Section and INPUT-OUTPUT Section. The
structure of this division is as under:
ENVIRONMENT DIVISION.
CONFIGURATION SECTION.
SOURCE-COMPUTER. <source computer name>
OBJECT COMPUTER <object computer entry>
[SPECIAL-NAMES. <special name entry>]
INPUT-OUTPUT SECTION.
FILE-CONTROL. <file control clauses>
[I-O CONTROL. <input-output control entries>.
Data Division
25
System Analysis
[BLOCK and
CONTAINS
Computer Languages
[<integer> TO] <integer>
{ RECORDS
CHARACTERS] }
[; LABEL { RECORD is } {Standard}
{RECORDS are} {Omitted}
[;RECORD CONTAINS [<integer> TO] <integer> CHARACTERS]
[; VALUE OF <data-name IS {data-name} {literal}
[,<data-name> IS {data-name {literal}]
[; DATA {record IS} <data-name> [‘,<data-name>….]
Procedure Division
This division contains the actual instruction for manipulation and processing of data
with the help of executable statements. This division is usually organized into several
paragraphs. A paragraph start with a paragraph name, followed by a period and one
or more sentences. A COBOL instruction is a valid combination of verbs and
phrases. There are three categories of COBOL statements:
a) Imperative statements, which always start with a verb e.g. ADD, MOVE,
READ, WRITE etc.
b) Conditional Statement, which direct the computer to find the truth value of a
condition and take subsequent branching to one of the alternative paths
depending upon the truth value. If statement is one such conditional statement.
c) Compiler directing statements, which direct the COBOL compiler at the time of
compilation and does not generate any instruction in the object program.
Spreadsheets are used for performing calculations, recalculating results if any data
stored in them is changed, creating financial reports, comparing reports etc. A very
useful feature of spreadsheet is its ability to create groups. It helps you establish
relation-ship between two or more sets of data and easily understand the trends of
data changes.
A spreadsheet consists of rows and columns, which combine to form cells. A Cell is
a box where we can enter data. Column form the vertical lines of calls while rows
form the horizontal line of cells. Cell is an intersection of rows and columns. To
describe the location or address of a cell, we have to write the names of the column
and the row whose intersection has created this cell.
26
Computer Programming
Rows Columns
and Languages
A B C
1
2 Cell B3
3
4
5
Cell B3 is location of address of this cell, which means column B, & row 3.
Labels are the headings, which we enter in cell. Values are the number on which
calculations are performed. Formulas and functions are elements that perform the
desired calculations on the values.
Value
A B C D E
1 Profit in months
2
3 Export 1,200 1,600 1,479
4 2,200 1,785 2,100
5
6 Total 3000 C3+C4 3,579
Formulas, which are present within the spreadsheet itself, are called functions. We
can also put up our own formulae in any cell. In the above figure cell B6; C6 and
D6 contain the formula, which total the values of export and import.
Exam Left-aligned
Exam Right-aligned
Exam Centered
Graph is yet another powerful feature of spreadsheet. The data stored in the
spreadsheets can be converted into graph so as to study the relationship various data.
The spreadsheet program has the facility to draw various graph viz. Bar, Pie,
2D and 2 D graphs.
27
System Analysis and
15.9 SUMMARY
Computer Languages
28
UNIT 16 DATABASE RESOURCE
MANAGEMENT
Structure
16.1 Introduction
16.2 Objectives
16.3 Data as Organizational Resource
16.4 Organizing Data
16.5 Database Management Systems and its Components
16.6 Modelling Data
16.7 Data Types
16.8 Developments in Database Technology
16.9 Database Administrator and the Role
16.10 Critical Success Factor of Data Warehousing
16.11 Summary
16.12 Unit End Exercises
16.13 References and Suggested Further Readings
16.1 INTRODUCTION
A university uses a database to keep student records, large libraries uses a database
system to keep track of library and to provide various types of indexing to material by
subject, title, author etc. and a bank uses database system to keep records of its
customers, employees, loans etc. and many more. Businesses normally use a
database to keep records of its employees, sales, production etc. All those who keep
a collection of records for a common purpose, uses a database. Therefore, a
database system is a collection of programs, which allows storage, modification, and
manipulation of information from a database. It is a layer of software between the
physical database and the user.
16.2 OBJECTIVES
Before the computer came into existence, there were many limitations associated
with the physical handling of documents and human processing. Computers came into
existence to speed up the data processing. Computers helped to manage data.
We are living in the age of information processing. The ability to acquire accurate and
timely data, managing data efficiently, is all through which an organization succeed. 1
The development in hardware has catalysed rapid development in software and now
we are having more sophisticated software to handle data as it was earlier.
The term data and information are often taken as to mean the same thing. Data are
the details about factories, outlets, staff, competitors, customers and suppliers. Data is
also kept for monitoring the activities and processes in business. Once businesses
collect these details, information comes into picture. Information is the collection of
meaningful facts that are derived from the data. Information is significant and
relevant to the user unlike data, which has no meaning alone. Information leads to
decision and thus an appropriate action. In fact, information consists of only the data
that is useful, meaningful and needed. You come across many information systems in
you daily life like banking information system, ticketing and reservations systems etc.
Now what you get out of these information systems is pure information and these
systems work out this information on the basis of data. In other words, data is raw
and information is refined. The exact form of the refinement depends on the type of
application one is dealing with.
The data must be accurate, timely and relevant. It is desired that any information
system should have accurate data to work on. Inaccurate data howsoever well
analysed will hardly be useful for any decision-making. Although collection of
accurate data is costly and time consuming, every effort should be made to make it
as accurate as possible. One may strike a balance between the cost of processing
and value of accuracy. The data should also be timely. If the right data is not
available at the right time then it is worth little use. For example if the updating of
electoral lists cannot take place before the schedule of elections then it is of no use to
the elections. The timeliness of the data is detrimental of success of any information
system. The data should be relevant. For better understanding of the organizations
and their information needs data has to be high on the relevance factor. There are
many decision-support systems (DSS) and executive support systems that are
present in today’s scene, but the general feeling is that often the data is generating
accurate and timely information, that is not very relevant. However, the future looks
bright because of the emergence of high-end computing machines, sophisticated data
capturing devices and other technology driven tools. Technology is making data
available in larger quantities than ever before, due to lower cost storage, increased
processing speeds, higher capacity communications and increased variety of
information formats.
In earlier times, data processing was done manually. Organizations appoint a large
number of people called clerks. The information technology devices used at that time
was forms, ledger books and basic mechanical adding machines. The results of such
manual operations were obtained at a time when the information was almost out of
date (e.g. census). Then some systems were invented in which processing was
mostly mechanized e.g. Hollerith Tabulation System. In such systems data was
recorded in the binary form of holes in cards, using a cardpunch. These stacks of
cards could be sorted and tabulated. IBM and Remington Rand led the development
of punched card technology.
Things have changed considerably with the advent of computers. There are a few
terms that you need to know about the data organization. IT-specific encyclopedia of
whatis.techtarget.com and searchdatabase.com defines theses terms as follows:
Bit: A bit (short for binary digit) is the smallest unit of data in a computer. A bit has a
single binary value, either 0 or 1. Although computers usually provide instructions that
can test and manipulate bits, they generally are designed to store data and execute
2
instructions in bit multiples called bytes. In most computer systems, there are eight
bits in a byte.
Byte: In most computer systems, a byte is a unit of data that is eight binary digits
long. A byte is the unit most computers use to represent a character such as a letter,
number, or typographic symbol (for example, “g”, “5”, or “?”). A byte can also hold a
string of bits that need to be used in some larger unit for application purposes.
We have discussed earlier that an organization must have accurate and reliable data
for effective decision-making. For this, the organization maintains records by
combining the data from different sources in an organization. Database is a collection
of related information stored along with the details of interpretation of the data
contained. For managing the data in the database we need a system called Database
Management System. In other words, DBMS is a complex piece of software that 3
facilitates a flexible management of the data. Through DBMS we can access,
monitor, store and modify the database. Through DBMS data can be made available
to all users and redundant (duplicate) data can be minimized or completely eliminated.
DBMS also makes possible for an organization to prevent important data access from
unauthorized users by providing the security to the database at different levels. Some
of the DBMS that are used are INGRES, ORACLE, SQL Server and SYBASE.
The DBMS allows users to access data from the database having no knowledge of
how data is actually stored in it. The process is much the same as ordering a menu in
the restaurant. A customer simply orders for the food to a waiter and waiter serves
the specified order. A customer only checks the menu for the desired items and need
not know how the items are arranged in a restaurant. Similarly, the database user
need not know how the data is stored instead he needs to know only what he requires
and the DBMS takes care of retrieving the required data on its own.
File Manager: File manager manages the structure and space of the file on disk.
This also locates the block in which the required record exists and requests from the
disk manager for this block containing the required record and finally provides the
required record to the data manager.
Disk Manager: As specified earlier, disk manager provides the block or page that
the file manager asks for. The disk manager is a part of Operating System. Disk
Manager does all the physical input and output operations.
Query Processor: The Query Processor takes care of the queries by the database
user. The database user when uses the Data Manipulation Language (DML) for
retrieving the data, the Query Processor converts it into that form that could be sent
4
to the Data Manager, so that Data Manager can execute it.
Data Dictionary: A data dictionary contains the information/ data about the data. A
data dictionary includes all the database descriptions, entity/ table descriptions,
attributes etc. Apart from these data dictionary includes the information about the
users also, which tables are used by which programs, authorization of users. A data
directory/ dictionary is just like a database and its cost depends on how complex it is?
More complexity leads to increase in cost. Just like an index helps us to find the
chapter easily, data dictionary helps DBA for designing, implementing and maintaining
the database and searching for the desired record in the database. It also helps the
managers and end users in their project planning.
As we have discussed earlier that any organization needs to store the information and
this is done through database. Data models refer to the conceptual model of the data
and the underlying relationships among them. DBMS abstract some generic
structures to represent conceptually every possible file structure.
Data models can be classified in two classes viz; Record-based logical Models and
Object-based logical models. Record-Based logical data models can be classified
(Sadgopan, 1997) into the following categories:
Hierarchical Models: These are the early data models used in 1970’s.
Hierarchical models capture the intuitive hierarchy of the data elements. The early
generation of large DBMS e.g. IMS belongs to the hierarchical data models. Even
today some large databases are maintained on IMS platform.
Network Models: Since hierarchical models are unable to represent data items that
existing at two different level of hierarchy, network models were proposed. The
notable systems built using this model were ADABAS and DBMS-10 on DEC-10
machines.
Relational Models: Though network models were quite powerful, they lacked in
elegance. The systems built on this data model were dBase, Xbase and ORACLE.
Almost all commercial systems presently available like Oracle 8i, 9i, 11 etc., SQL
Server, MySQL are built on the relational models. There are 12 rules that are
required to be followed in a relational model.
Entity: Any real-world object that has certain properties (attributes of its own) and
this object are uniquely identified by the system on the basis of these. This is
represented by a rectangle with the entity name specified in the centre.
For e.g.: student is an entity.
Attribute: Attribute is the properties of an entity, like a student entity can have
attribute as student name, student roll no., student class etc. Attributes are placed
5
inside the circles and attached to the entities and relationships.
Relationship: Relationship specifies the meaningful relation between two entities.
This relationship can also have attributes. A rhombus represents these with a relation
specified in it. For e.g.: if we have student and course as entities, then we can relate
these entities as student enrols for a course.
Student
Name
STUDENT COURSE
Enrols
Entity Course
Entity
Code
Student
Number Relationship
Course
E Name
Attributes
Degree of Relationship (DOR): This specifies the occurrence of entity with other
entity.
One to One (1:1): In this, there can be almost one related occurrence for each
entity. For example, A single manager manages one department and one department
can be managed by a single manager. It is represented as follows.
One to Many (1:N): Here, for one occurrence of the first entity, there may exist
many occurrences of the second entity and for every occurrence of the second entity,
these exists only one occurrence of the first entity e.g.:
Here one manager supervises many employees and every employee reports to only
one manager.
Many to Many (M: N): In this degree of relationship, for one occurrence of the
first entity, these may exists many occurrences of the second entity and also for
every occurrences of second entity, there exists many occurrences of the first entity
e.g.:
Consider a relation
But this requires a join between these two relations, which is very expensive.
Now lets look into several normal forms with the help of an example:
1 Amit English 65
Hindi 72
Maths 70
2 Seema English 70
3 Anjali English 54
Hindi 60
7
To make this unnormalized data into 1 NF (First Normal Form), we have to make
each cell containing one value. And all the repeated information should be removed.
1 Amit English 65
1 Amit Hindi 72
1 Amit Maths 70
2 Seema English 70
3 Anjali English 54
3 Anjali Hindi 60
The data is still redundant in this form. Here combination of two keys (composite
key), Roll No. and Subject, is a primary key (PK, that uniquely identifies a record).
But the attributes of this table depend on the part of the PK. Roll No. and subject
determines marks, Roll No. determines Name, Name has no dependency on the
attribute subject. This may lead to following problems:
Insertion: the name of a subject cannot be recorded until a student gives any exam.
Updation: Roll No. and name is repeated several times. If name of the student is to
be changed, then at every place the name needs to be updated otherwise may lead to
inconsistencies.
Deletion: if a student has not given any of the three exams, then the name of that
particular student will be deleted.
So, for overcoming these problems, this first normal form needs to be decomposed
and converted into Second Normal Form (2NF) without any loss of information.
2 Seema English 70
3 Anjali English 54
3 Anjali Hindi 60
8
Other major normal forms are 3NF and 4NF. Third normal form or 3NF is used to
prevent loss of information and dependencies preserving decomposition. Fourth
normal form or 4NF is used to preserve multi-valued dependency, which is essentially
a constraint. There are several other normal forms like project-join NF, domain-key
NF. We are not describing them as it is not within the scope of this course.
Activity A
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
In database system, for storing the data, each column in the table have a certain type
of data. For example when we create a table for employee’s personal data, then we
may have different fields like name, address, phone, age etc. In this if we take the
field “name” then this would of character type and “age” and “phone” are of numeric
type.
Sometimes an attribute of a table T takes the values from a set D that is known as a
domain. A domain is defined in the cases when we want an attribute to take some
exact set of constants. For instance, the domain of the attribute age for a particular
post that a candidate can apply for, might be defined as consisting of all the integer
numbers between 18 and 25. On the other hand, the domain of the marks column,
might be defined as all the numbers between 0 and 100, with at most one non-zero
digit after the decimal point (assuming the maximum marks to be 100). The
significance of declaring a column of a table to have a particular type (or domain) is
the ability to compare the values of two different column rests on this declaration. A
particular column I a table must contain similar data, which is of a particular type.
Besides storing character, numeric, we can also store data, binary data such as
graphics, sound also. Whenever we have the bio data of employees or students or
candidates, sometimes it is nice to store their photographs also, in that cases, we can
use graphics as a data type for photograph column.
9
These developments include handling of spatial data such as maps; engineering
design data such as design of buildings, components and circuits; multimedia data
such as text, image, video and audio data; time related data such as historical records
or stock exchange data and the World Wide Web data. Han & Kamber (2001) had
described each of these advanced databases:
1. Object Oriented Databases: In object oriented databases each entity is
considered as an object. These objects can be customers, suppliers, employees
or items. Objects that share a common set of properties can be grouped into a
class that represents properties common to a class.
2. Object Relational Databases: In object relational data model much is the
same as the basic relational data model but for the fact that object relational
databases also handles complex data types and complex object structures.
3. Spatial Databases: These databases contain geographic databases, clip design
databases, medical and satellite image databases. These data are represented in
raster format, consisting of n-dimensional bit maps or pixel maps as well as
vector format, consisting of basic geometric shapes such as points, lines and
polygon etc.
4. Time Series & Temporal Database: These databases contain time-related
data. A temporal database usually stores relational data that include time-
related attributes. A time series database stores sequences of values that
change with time.
5. Text & Multimedia Databases: Text databases contain word description for
objects (these could be long sentences or paragraphs). Multimedia databases
store images, audio and video data. These databases are used in applications
such as picture content-based retrieval, voice mail systems, video-on-demand
systems & World Wide Web etc.
6. Heterogeneous Databases: Objects in one component database may differ
greatly from objects in other component databases, making it difficult to
assimilate their semantics into the overall heterogeneous database. There are
special methods for analysis of such databases.
7. World Wide Web Databases: World Wide Web has data objects linked
together to facilitate interactive access. Users seeking information of interest
traverse from one object via links to another.
Activity B
Now that you know about various types of data, you can encounter in day-to-day life.
Take the case of an organization of your choice and try to identify two examples of
each of these data types. Also, comment on the usefulness of analyzing these data
types for the organization
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
10
16.9 DATABASE ADMINISTRATOR AND
THE ROLE
Large and complex databases need a lot of maintenance to work in a proper manner.
A database administrator (DBA) does this maintenance. DBA is the supervisor of
the database and hence have the highest level of expertise. DBA centrally controls
the database and administers the overall user community. DBA also takes care of the
data and controls the database structures. DBA is responsible for accessing the
database so that an unauthorized person should not access the database. DBA stores
the permissions granted to the users created to verify that a particular user can only
perform a given operation on the database. DBA can also revoke the permission if he
founds that the user or user group needs no more access to that particular portion of
the database.
DBA account is sometimes known as the system account that has the powerful
capabilities that other regular database users don’t have. Sometimes when more than
one user uses the same resource such as the data, there may exists the conflict but
the DBA seeks for the compromise and takes care of the conflict for the benefit of
the organization. Hence, DBA also has the responsibility for maintaining the integrity
of data. This means that only accurate data can be inserted into the database.
Duties of DBA includes the existence control, definition control, quality control,
update control, access control etc. The DBA is also responsible for recovering the
database from failures that may be due to human disasters, software and hardware
causes or natural causes with the minimal loss of data. DBA changes the database
according to the changes or growth in the organization. Hence, DBA is said to be a
super user who is responsible for monitoring and improving the performance and
operations to maintain the database activities. The database dictionary is one of the
most important tools for the database administrator. It is used to maintain information
related to various resources.
In 1990, Bill Inmon first introduced the term Data Warehouse. According to him,
“A warehouse is a subject-oriented, integrated, time-variant and non-volatile
collection of data in support of management’s decision-making process’. You will
read in detail about data warehousing in the next unit. A data warehouse is a central
repository for significant pieces of the data that are collected by various business
systems. Data from various online transaction processing applications and other
sources is organized on the data warehouse for use decision-making process.
A data warehouse is used in applications like data mining, Web mining and a decision
support system (DSS). Data Warehouse enables the executive, manager or the
analyst to make better and faster decisions. It presents the right information in the
right place at the right time with the right cost in order to support the right decision.
According to Inmon, a data warehouse should firstly, have a common format meaning
that data that goes into a warehouse should have a common data format. Since a
data warehouse is made out of a combination of various organizational databases of
the company, every care should be taken to maintain uniformity. Secondly, since
different company functions such as Sales, Marketing, Finance, and Production have
some variables common in a database. 11
A data warehouse should be able to use these data pertaining to different functions.
Thirdly, since data often contain time as a dimension and is updated into a data
warehouse periodically, a data warehouse should be efficient in computing all time
dependent aggregations again and again.
Finally since data warehouses are never deleted or updated they should be able to
sustain large chunks of data (may be in terabytes). A data warehouse grows all the
time as new data keeps on adding. In practice, a data warehouse is often
“resynchronized” to keep its volume manageable. Resynchronization means that data
is kept in periods and as and when a new period is added the oldest one is deleted.
These are some very preliminary concepts about data warehousing. You will read
about it in more detail in the next unit.
16.11 SUMMARY
Data consists of facts and details about things, activities, transactions etc. Data can
be stored as a resource that can be drawn later on to produce information for the
people and activities that need it. In this unit we have discussed about the prominent
features of a modern database management system. Understanding a DBMS is very
significant for a manager dealing with information systems. You have learnt about
modelling data and different data types. You saw the developments in the field of
database technology. This shows that almost any kind of data can be handled, be it a
music database or a database of photographs stored on the computer. The unit closes
with giving you a glimpse of success factors in data warehousing, which you would
read in detail in the next unit.
We have limited our scope in the sense that we would not like to make you a
programming expert but would be more interested in making you to capable of
applying these concepts for deriving business advantage.
4) What are data models? How you would classify the data models?
Differentiate between various data models with the help of an example.
5) What is normalization and why it is used? Explain with the help of an example
how would you derive normal forms.
6) Discuss different types of data in database system. What are the developments
in database technology with respect to data types?
12
16.13 REFERENCES AND SUGGESTED FURTHER
READINGS
Han Jiawei & Kamber Micheline (2001), Data Mining: Concept and Techniques,
Morgan Kaufmann, Elsevier Science, India
13
UNIT 17 DATA WAREHOUSING AND
DATA MINING
Structure
17.1 Introduction
17.2 Objectives
17.3 Operational and Informational Databases
17.4 The Data Warehouse
17.5 Data Warehouse Schema
17.6 Metadata
17.7 Data Warehouse and the Web
17.8 On-line Analytical Processing (OLAP)
17.9 Data Visualization
17.10 Data Mining
17.11 Summary
17.12 Unit End Exercises
17.13 References and Suggested Further Readings
17.1 INTRODUCTION
Over the past couple of decades huge investments have been made in computer
systems by businesses of all types to gain competitive advantage. A large majority of
these computer applications designed and developed during this period have
concentrated on automating business processes, for example: order processing,
inventory and itemized billing of telephone calls. The automated business systems, or
the operational systems – as they are called, were not only good at doing what they
were designed for, but also (possibly unintentionally) ended up collecting huge
volumes of data. However, in the context of the twenty first century, competitive
advantage comes less from mere automation (or even optimization) of day-to-day
activities, and more and more from proactive strategic decisions based on analytical
use of data. Unfortunately, the technological requirements of systems for supporting
analytical applications, like on-line analytical processing (OLAP) and data mining,
differ greatly from the requirements laid down when the operational systems were
designed. We will discuss these differences in the next section and then go on to see
how a new breed of systems, known as data warehouses have evolved, matured,
and taken the world of business by storm in recent years.
17.2 OBJECTIVES
After reading this unit you should be able to:
• Identify the types of data in data warehouse;
• Describe the design decisions involved in data warehouse design;
• Explain the importance of building an Enterprise Data Warehouse;
• Depict the architecture of a data warehouse and its various components;
• Describe various aspects of Star and Snowflake schemas;
• Define and explain the concept of metadata in the data warehouse;
• Enumerate the importance of external data feed from the World Wide Web
to the Data Warehouse;
• Describe the process of data analysis and on-line analytical processing;
• Develop a case for the business value of visualization of data; and
• Apply data mining tools for discovery of hidden relationships and patterns in
business data. 1
17.3 OPERATIONAL AND INFORMATIONAL
DATABASES
There are several reasons that have compelled information system designers to
accept that even the latest technology cannot be optimized to support both operational
and informational (or analytical) processing in a cost effective manner.
• The data required is different
• The technology required is different
• The user community is different
• The access pattern is different
• The processing characteristics are different
• The system loading pattern is different.
High level business objectives provide the framework for competitiveness and growth
to an enterprise in the long run. To set realistically achievable objectives and monitor
the company’s performance against them, managers need information on subjects
like customers (e.g. their needs and preferences), products (e.g. the company’s
offering vis-à-vis competitors), suppliers (e.g. their production lead times) and
distributors (e.g. location). It is also beneficial to aggregate measures like quantities
of products and sales values across various dimensions like geographical regions and
time, and compare them with yard-sticks like budgets, forecasts, previous year’s
actuals and industry averages. The differences between informational systems
satisfying needs of these types and traditional operational systems are summarized in
the Table 17.1.
2
Information systems have evolved from the master-file / transaction file and
sequential processing of the 1960s to DBMS based random access processing of the
1970s to high-performance transaction processing during the 80s to decision support
systems built around the existing operational databases. The traditional IT
departments when faced with the need to provide strategic information using data in
operational databases find themselves inadequately equipped to respond.
Some of the difficulties faced are:
• IT receives too many ad hoc requests, resulting in a large overload. With limited
resources, IT is unable to respond to the numerous requests in a timely fashion.
• Requests are not only too numerous, they also keep changing all the time.
The users need more reports to expand and understand the earlier reports.
• The users find that they get into the spiral of asking for more and more
supplementary reports, so they sometimes adapt by asking for every possible
combination, which only increases the IT load even further.
• The users have to depend on IT to provide the information. They are not
able to access the information themselves interactively.
• The information environment ideally suited for strategic decision-making has to
be very flexible and conducive for analysis .IT has been unable to provide such
an environment.
The solution to the problems lies in a new paradigm – the data warehouse. It is an
environment that is specifically designed to hold data required to support complex
analysis, and detection of patterns, trends and deviations.
The characteristics of such an environment can be summarized as follows:
• Provides an integrated and total view of the enterprise
• Make the enterprise’s current and historical information easily available for
decision-making.
• Makes decision-support transactions possible without hindering operational
systems
• Renders the organization’s information consistent.
• Presents a flexible and interactive source of strategic information.
We have seen in the previous section that we need a new breed of information
delivery environment, called a data warehouse, to facilitate strategic decision-making.
The concept of a data warehouse given by Bill Inmon, the father of data
warehousing, is depicted in Figure 17.1.
A Data Warehouse is a:
• Subject-oriented
• Integrated
Data • Time-Variant
Warehouse • Monvolatile
Similar data can have different representations or Provide a unified view of all data elements
Integrated meanings. For example, telephone numbers may with a common definition and
be stored as 033-29-70701 or as 0332970701, and representation for all business units.
a given condition may be labeled as T/F or 0/1 or
Y/N. A sales value may be shown in thousands
or in millions.
Subject-oriented Data are stored with a functional, or Data are stored with a subject orientation
process, orientation. For example, data that facilities, multiple views of the data and
may be stored for invoices, payments, facilitates decision making .For example,
credit amounts, and so on. sales may be recorded by product, by
division, by manager, or by region.
Data are recorded as current transactions. For Data are recorded with a historical
Time-variant example, the sales data may be the sale of a perspective in mind. Therefore, a time
product on a given date, such as Rs. 342.78 on dimension is added to facilitate data
12-AUG-1999. analysis and various time comparisons.
Data updates are frequent and common. For Data cannot be changed. Data are only
example, an inventory amount changes with added periodically from historical systems.
Non-volatile each sale. Therefore, the data environment is Once the data are properly stored, no
fluid. changes are allowed. Therefore the data
4 environment is relatively static.
DATA INFORMATION DECISION
L Q
o u
Operational a e
Data d r
Data
y
Summary Miners
M
a Information M
n Detailed a
a Detailed
Information n
g Information a
e Meta g
External
r Data e
Data
r OLAP
Tools
WAREHOUSE MANAGER
Data flows into the data warehouse through the load manager. The data is mostly
extracted from the operational database(s) and other internal sources (like archived
historical data), and supplemented by data imported from external sources. Externally
sourced data can greatly enhance the value of information generated from a data
warehouse. For example Transco, the gas pipeline operator in UK, uses weather
forecast data from the British Met Office on a regular basis to determine demand for
gas (the main source of energy used for heating homes and offices) in various areas
of the country. The weather data is fed into a model that incorporates several other
factors (e.g. day of the week, internal data about customers’ usage patterns,
demographic and economic profile data, alternate sources of energy, types of
buildings in the area) to arrive at a demand forecast. Types of data from external
sources that may be included in data warehouse are: financial indicators and statistics
of the industry, market share data of competitors, demographic data, weather data,
credit worthiness data, readership / viewer survey data for advertising media,
specially commissioned surveys and so on. External data is usually obtained from
commercial database services or government agencies (e.g. Equifax, Reuters, Met
Office, census agency, industry associations, stock exchanges, local government
statistics service). The data from such diverse sources will obviously be in different
incompatible formats and will be distributed through various media. Some of them
may be available on a downloadable format on the Internet; others may be distributed
on CD-ROMs, while some may only be available on printed media. Some data may
be available for free but most data (particularly when used for commercial purposes)
have to be purchased.
5
Data Extraction: This function has to deal with numerous data sources. Appropriate
techniques have to be employed for each data source. Source data may be from
different source machines in diverse data formats. Part of the source data may be in
relational database systems. Some data may be on other legacy network and
hierarchical data models. Many data sources may still be in flat files. There may also
be the need to include data from spreadsheets and local departmental data sets. Data
extraction can become quite a complex operation at times.
Various tools are available on the market for data extraction. Use of outside tools
may be considered suitable for certain data sources. For the other data sources, in-
house programs may need to be developed to do the data extraction. Purchasing
outside tools may entail high initial costs. In-house programs, on the other hand, may
mean ongoing costs for development and maintenance.
After extraction, the data needs to be kept somewhere for further preparation.
Sometimes the extraction function is performed in the legacy platform itself if that
approach suits the designed framework. More frequently, data warehouse
implementation teams extract the source data into a separate physical environment
from which moving the data into the data warehouse would be easier. In the separate
environment, the source data may be extracted into a group of flat files, or an
intermediate relational database, or a combination of both. This physical environment
is called the data-staging area.
As already discussed, data for a data warehouse comes from many disparate
sources. If data extraction for a data warehouse poses great challenges, data
transformation presents even greater challenges. Another factor in the data
warehouse is that the data feed is not just an initial one-time load. The ongoing
changes will have to continue to be picked up from the source systems. Any
transformation tasks are set up for the initial load will have to be adapted for the
ongoing revisions as well.
A number of individual tasks are performed as part of data transformation. First, the
data extracted from each source is cleaned. Cleaning may be correction of
misspellings, or may include resolutions of conflicts between state codes and pin
codes in the source data, or may deal with providing default values for missing data
elements, or elimination of duplicates when the same data is brought in from multiple
source systems.
Standardization of data elements forms a large part of data transformation. The data
types and field lengths for same data elements retrieved from the various sources
need to be standardized. Semantic standardization is another major task. Synonyms
and homonyms have to be resolved. Resolution of synonyms is required when two or
more terms from different source systems mean the same thing. On the other hand,
when a single term means many different things in different source systems,
resolution of homonyms have to be performed.
6
Data transformation involves many forms of combining pieces of data from the
different sources. In some cases, data from a single source record or related data
elements from many source records are combined. In other situations, data
transformation may also involve purging source data that is not useful and/or
separating out source records into new combinations. During data
transformation sorting and merging of data takes place on a large scale in the data
staging area.
In many cases, the keys chosen for the operational systems are field values with
built-in meanings. For example, the product key value may be a combination of
characters indicating the product category, the code of the warehouse where the
product is stored, and some code to show the production batch. Primary keys in the
data warehouse cannot have built-in meanings. Therefore, data transformation also
includes the assignment of surrogate keys derived from the source system primary
keys.
A grocery chain point-of-sale operational system keeps the unit sales and revenue
amounts by individual transactions at the checkout counter at each store. But in the
data warehouse, it may not be necessary to keep the data at this detailed level. It
may be more appropriate to summarize the totals by product at each store for a given
day and keep the summary totals of the sale units and revenue in the data
warehouse’s storage. In such cases, the data transformation function would include
such summarization processing.
The end result of the data transformation function is a collection of integrated data
that is cleaned, standardized, and summarized. Now the data is ready to be loaded
into each data set in the data warehouse.
Data Loading: Two distinct groups of tasks form the data loading function. After
completion of the design and construction of the data warehouse, when it goes live
for the first time, the initial loading of data is done. The initial load moves large
volumes of data and takes substantial amount of time, but it is a one-time effort. As
the data warehouse starts functioning, extraction of additions (and changes) to the
source data continues on an ongoing basis, together with the transformation and
loading operations.
The query manager provides an interface between the data warehouse and its
users. It performs tasks like directing the queries to the appropriate tables, generating
views on an ad-hoc basis if required, monitoring the effectiveness of indexes and
summary data, and query scheduling.
7
• Time span: Operational data represent current (atomic) transactions. Such
transactions might define a purchase order, a sales invoice, an inventory
movement, and so on. In short, operational data cover a short time frame. In
contrast, data warehouse data tend to cover a longer time frame. Managers are
seldom interested in a specific sales invoice to customer X; rather they tend to
focus on sales generated during the last month, the last year, or the last five
years. Rather than concern themselves with a single customer purchase, they
might be interested in the buying pattern of such a customer or groups of
customers. In short, data warehouse data tend to be historic in nature. That is,
the data warehouse data represent company transactions up to a given point in
time, yesterday, last week, last month, and the like. The time period for which
data is held in the data warehouse is determined by the data analysis
requirements of the users of the data warehouse. These needs, in turn, arise
from the changes in the business environment that a particular organization needs
to monitor, in its effort to stay ahead of its competitors. Since, a data
warehouse’s size depends on the span of time for which data is stored, the time
span covered by the data warehouse is an important design consideration. If, for
example, the environment changes rapidly, the data required for analysis would
relate more often to the recent past, rather than that over several years or
decades. In that case the designers of the data warehouse need to consider
whether or not the cost incurred in holding data for indefinitely long time spans
would be worthwhile.
Operational data represent specific transactions that occur at a given time, such as
customer purchase of product X in store A. Thus, granularity is taken for granted to
be of the lowest level, in operational systems. Data warehouse data must be
presented at different levels of aggregation, from highly summarized to near atomic.
This requirement is based on the fact that managers at different levels in the
organization require data with different levels of aggregation. It is also possible that a
single problem requires data with different summarization levels. For example, if a
manager must analyze sales by region, (s)he must be able to access data showing the
sales by region, by city within the region, by store within the city within the region,
and so on. In this case, the manager requires summarized data to compare the
regions, but (s)he also needs data in a structure that enables him or her to decompose
(drill down) the data into more atomic components (that is, data at lower levels of
aggregation). For example, it is necessary to be able to drill down to the stores within
the region in order to compare store performance by region. Granularity level in a
data warehouse cannot, therefore, be assumed.
The decision on granularity level profoundly affects both the volume of data that
resides in the data warehouse, and the type of query that can be answered. A trade
off exists between the volume of data in the data warehouse and the level of detail of
queries (see Figure 17.3 below). Some data warehouses are designed to support
dual granularity. In such environments some data (usually the most recent) is held
at a relatively low level of granularity, while the rest is held in more summarized form
(i.e. at a higher granularity level). This enables detailed analysis at the same time
allows reduction of data volume.
8
Fig. 17.3: Granularity of Data Warehouse Data
Activity A
What is the difference between a database and a data warehouse? Take some
database from any organization and try to convert it into a data warehouse. What are
the visible advantages that you can make out?
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
10
17.5 DATA WAREHOUSE SCHEMA
One of the key questions to be answered by the database designer is: How can we
design a database that allows unknown queries to be performant? This question
encapsulates the differences between designing for a data warehouse and designing
for an operational system. In a data warehouse one designs to support the business
process rather than specific query requirements. In order to achieve this, the
designer must understand the way in which the information within the data
warehouse will be used.
In general, the queries directed at a data warehouse tend to ask questions about
some essential fact, analyzed in different ways. For example reporting on:
• The average number of light bulbs sold per store over the past month
• The top ten most viewed cable-TV programs during the past week
• Top spending customers over the past quarter
• Customers with average credit card balances more than Rs.10,000 during the
past year.
Each of these queries has one thing in common: they are all based on factual data.
The content and presentation of the results may differ between examples, but the
factual and transactional nature of the underlying data is the same.
Fact data possesses some characteristics that allow the underlying information in the
database to be structured. Facts are transactions that have occurred at some point in
the past, and are unlikely to change in the future. Facts can be analyzed in different
ways by cross-referencing the facts with different reference information.
11
For example, we can look at sales by store, sales by region, or sales by product. In a
data warehouse facts also tend to have few attributes, because there are no
operational data overheads. For each of the examples described, the attributes of the
fact could be as listed in Table 17.3 above.
One of the major technical challenges within the design of a data warehouse is to
structure a solution that will be effective for a reasonable period of time (at least
three to five years). This implies that the data should not have to be restructured
when the business changes or the query profiles change. This is an important point,
because in more traditional applications it is not uncommon to restructure the
underlying data in order to address query performance issues.
12345678901234567890123
12345678901234567890123
12345678901234567890123
12345678901234567890123
Facts 12345678901234567890123
DIMENSIONS
12345678901234567890123
12345678901234567890123
Customer
Events
1234567890123 123456789012345678
123456789012345678 1234567890123 123456789012345678
123456789012345678 1234567890123 123456789012345678
123456789012345678
123456789012345678 1234567890123
1234567890123 123456789012345678
123456789012345678
Customer
123456789012345678
123456789012345678
Time
1234567890123
1234567890123
Location
123456789012345678
123456789012345678
123456789012345678 1234567890123 123456789012345678
Star schemas (so called due to their ‘star like’ appearance) are physical database
structures that store the factual data in the ‘center’, surrounded by the reference
(or dimension) data (see Figure 17.5 above).
The dimension tables should be relatively small (typically less than 5 GB in total) in
comparison to the size of the data warehouse, so that restructuring costs are small as
long as the keys to the fact tables are not changed. In star schema arrangements, the
reference information is often denormalized to a single table to speed up query
performance. The redundancy overheads are acceptable, as the sizes involved are
small and even the reference information changes infrequently.
12
A typical concept hierarchy for a retail chain is depicted in Figure 17.6 below.
Price PRODUCT
Name, Color, Style, Size
Store
Section
Region Department
Business Unit
The number of concept hierarchies that can be defined on any given dimension is by
no means restricted to one. There may be several arbitrary concept hierarchies in use
in any organization to enable data analysis from various angles. Figure 17.7 below
shows how the ‘time’ dimension in a retail data warehouse (represented by the day /
date reference data) may be organized into several concept hierarchies or groupings
(which are single level concept hierarchies – ‘Easter’ and ‘Summer’ in Figure 17.7)
DAY/DATE
Six-week
period
Month
Year
123456789
123456789 12345678901234567890123456789
12345678901234567890123456789
123456789
123456789
12345678901234567890123456789
12345678901234567890123456789
Snowflake 12345678901234567890123456789
123456789
Facts
123456789
12345678901234567890123456789
Star Dimensions
12345678901234567890123456789
12345678901234567890123456789
Dimensions 12345678901234567890123456789
Dept Line
1234567890123456789
1234567890123456789
1234567890123456789
1234567890123456789
1234567890123456789
1234567890123
1234567890123
Locations
1234567890123456789
1234567890123456789 1234567890123 Products Style
1234567890123456789
1234567890123456789 1234567890123
1234567890123
Sales
1234567890123
1234567890123
1234567890123
Transaction 123456789012345678
123456789012345678
123456789012345678
1234567890123 123456789012345678
Locations 1234567890123 123456789012345678
123456789012345678
Products
123456789012345678 Color
123456789012345678
123456789012345678
1234567890123
1234567890123
1234567890123
Region 1234567890123 Size
1234567890123
Time
Time 1234567890123
1234567890123
1234567890123
Month
17.6 METADATA
Types of Metadata
Operational Metadata: As already discussed, data for the data warehouse comes
from several operational systems of the enterprise. These source systems contain
different data structures. The data elements selected for the data warehouse have
various field lengths and data types. Selecting data from different source files, and
loading it into the data warehouse, requires splitting of records, combining parts of
records from different source files, and dealing with multiple coding schemes and
field lengths. When information is delivered to the end-users, it is essential to be able
relate back to the original source data sets. Operational metadata contain all of this
information about the operational data sources that allow us to trace back to the
original source.
14
Extraction and Transformation Metadata: Extraction and transformation
metadata contain data about the extraction of data from the source systems, namely,
the extraction frequencies, extraction methods, and business rules for the data
extraction. Also, this category of metadata contains information about all the data
transformations that take place in the data staging area.
End-User Metadata. The end-user metadata is the navigational map of the data
warehouse. It enables the end-users to find information from the data warehouse.
The end-user metadata allows the end-users to use their own business terminology
and look for information in those ways in which they normally think of the business.
Special Significance
Database Tables, Columns, Databases, Tables, Columns List of Predefined Queries and
Analysis Reports, Business views.
Server Platforms.
and Discovery
Warehouse metadata is not very different in kind from ordinary database metadata,
although it is versioned in order to permit historical analysis. Prism gives the following
breakdown of warehouse metadata in its Tech Topic, “Metadata in the Data
Warehouse:”
Mapping
The mapping information records how data from operational sources is transformed
on its way into the warehouse. Typical contents are:
• Identification of source fields
• Simple attribute-to-attribute mapping
• Attribute conversions
• Physical characteristic conversions
• Encoding/reference table conversions
• Naming changes
• Key changes
• Defaults
• Logic to choose from among multiple sources
• Algorithmic changes
Extract History
Miscellaneous
• Aliases can make the warehouses much more use-friendly by allowing a table
to be queried by “Widgets produced by each factory” rather than “MF-
STATS.” Aliases also come in useful when different departments want to use
their own names to refer to the same underlying data. Obviously, though, aliases
can also cause a great deal of confusion if they are not carefully tracked.
• Volumetric information lets users know how much data they are dealing with,
so that they can have some idea how much their queries will cost in terms of
time and computational resources. Volumetrics could usefully include such
information as number of rows, growth rate, usage characteristics, indexing,
and byte specifications.
• It is also useful to publish the criteria and time scales for purging old data.
16
Summarization and Aggregation Algorithms
Ownership / Stewardship
Access Patterns
Reference data is stored in an external table (see discussion on Star Schema above)
and contains commonly used translations of encoded values. The contents of these
tables must be stored in order to guarantee the ability to recover the original un-
encoded data, together with effective from and effective to dates.
Building a data warehouse without first constructing a data model is very difficult and
frustrating. When a data model is used, metadata describing the mapping between the
data model and the physical design should be stored. This allows all ambiguities or
uncertainties to be resolved.
From the point of view of the Query Manager (see Figure 17.2 above) of the data
warehouse, the Metadata Repository can be perceived to have three logical
layers: the Information Navigator, the Business Metadata, and the Technical
Metadata.
17
Figure 17.9 below illustrates this concept. The query manager accesses the
metadata through the Information Navigator layer which is the topmost layer of the
metadata repository. The higher layers, in turn, access more detailed metadata
components resident in the lower layers whenever required.
METADATA REPOSITORY
Information Navigator
Navigation routes through warehouse content, Browsing of warehouse tables and attributes,
query composition, report formating, Drill-down and Roll-up Report generation and
distribution, Temporary storage results
Business Metadata
Source, systems, Source-target mappings, data transformation business rules, summary
datasets, warehouse tables and columns in business terminology, query and reporting tools,
predefined queries, preformatted reports, data load and refresh schedules, support contact,
OLAP data, access authorizations.
Technical Metadata
Source systems data models, structures of external data sources, staging area file layouts,
target warehouse data models, source-staging area mapping, staging area-warehouse
mappings, data extraction rules, data transformation rules, data cleansing rules, data
aggregation rules, data loading and data refreshing rules, source system platforms, data
warehouse platform, purge/archival rules, backup/recovery, security.
Professor Peter Drucker, the senior guru of management practice, has admonished
IT executives to look outside their enterprises for information. He remarked that the
single biggest challenge is to organize outside data because change occurs from the
outside. He predicted that the obsession with internal data would lead to being
blindsided by external forces.
18 importance of external data and the challenges faced in integrating external data
The
with internally sourced data was discussed in the Section on Load Manager above. In
the same section, it was mentioned that, some externally sourced data (particularly
time sensitive data), is often distributed through the internet.
Many question the reliability of web content, as they should. However, few analyze
the reliability issue to any depth. The Web is a global bulletin board on which both the
wise and foolish have equal space. Acquiring content from the Web should not reflect
positively or negatively on its quality.
Consider the following situation: If you hear, “Buy IBM stock because it will double
over the next month,” your reaction should depend on who made that statement and
in what context. Was it a random conversation overheard on the subway, a chat with
a friend over dinner, or a phone call from a trusted financial advisor? The context
should also be considered when judging the reliability of Web content.
Think of Web resources in terms of quality and coverage, as shown in Figure 17.10
below.
Quality
Commercial
Data Bases
Government
Data
Corporate
Data
Doubtful Quality Free Stuff
Coverage
Toward the top are information resources of high quality (accuracy, currency, and
validity), and resources toward the right have a wide coverage (scope, variety, and
diversity). The interesting aspect of the web is that information resources occupy all
quadrants.
In the upper center, the commercial online database vendors traditionally have
supplied business with high-quality information about numerous topics. However, the
complexity of using these services and the infrequent update cycles have limited their
usefulness.
More to the left, governmental databases have become tremendously useful in recent
years. Public information was often available only by spending many hours of manual
labour at libraries or government offices. Recent developments like the Electronic
Data Gathering, Analysis, and Retrieval (EDGAR) database maintained by the U.S.
Securities and Exchange Commission provide valuable and up-to-date data via the 19
Web.
At the left, corporate Web sites often contain vast amounts of useful information in
white papers, product demos, and press releases, eliminating the necessity to attend
trade exhibits to learn the “latest and greatest” in a market place.
Finally, the “doubtful-quality free” content occupies the lower half of the figure. Its
value is not in the quality of any specific item but in its constantly changing diversity.
Combined with the other Web resources, the doubtful-quality free content acts as a
wide-angle lens to avoid tunnel vision of the market place.
Web Farming
Like operational systems, the Web farming system provides input to the data
warehouse. The result is to disseminate the refined information about specific
business subjects to the enterprise sourced from the Web.
The primary source of content for the Web farming system is the Web because of its
external perspectives on the business of the enterprise. As a content source, the Web
can be supplemented (but not replaced) by the intranet web of the enterprise. This
content is typically in the format of internal Web sites, word processing documents,
spreadsheets, and e-mail messages. However, the content from the intranet is usually
limited to internal information about the enterprise, thus negating an important aspect
of Web farming.
Most information acquired by the Web farming system will not be in a form suitable
for the data warehouse. Also, as discussed above, the source and quality of the
content need to be judged. In any case, the information must be refined before
loading into the warehouse. However, even in its unrefined state, the information
obtained from the Web, through Web farming, could be highly valuable to the
enterprise. The capability to directly disseminate this information may be required via
textual message alerts or “What’s New” bulletins.
Refining Information
When a data warehouse is first implemented within an enterprise, a detailed analysis
and reengineering of data from operational systems is required (see Section on Load
Manager above). The same is true for Web farming. Before Web content can be
loaded into a warehouse, the information must be refined.
The processes of refining information consists of four steps:
Discovery, Acquisition, Structuring, and Dissemination.
Discovery is the exploration of available Web resources to find those items that
relate to specific topics. Discovery involves considerable detective work far beyond
searching generic directory services, such as Yahoo!, or indexing services, such as
Alta Vista. Further, the discovery activity must be a continuous process because data
sources are continually appearing and disappearing from the Web.
Acquisition is the collection and maintenance of content identified by its source. The
main goal of acquisition is to maintain the historical context so that you can analyze
content in the context of its past. A mechanism to efficiently use human judgement in
the validation of content is another key requirement.
Structuring is the analysis and transformation of content into a more useful format
and into a more meaningful structure. The formats can be Web pages, spreadsheets,
word processing documents, and database tables. As we move toward loading data
into a warehouse, the structures must be compatible with the star-schema design and
with key identifier values.
Dissemination is the packaging and delivery of information to the appropriate consumers,
either directly or through a data warehouse. A range of dissemination mechanisms is
required, from predetermined schedules to ad hoc queries. Newer technologies, such as
information
20
brokering and preference matching, may be desirable.
17.8 ON-LINE ANALYTICAL PROCESSING (OLAP)
In the previous sections we have discussed the need for building an Enterprise Data
Warehouse, followed by discussions on its structure and ways and means of populating
it with data. The data warehouse serves as the ‘memory’ of the enterprise. But, memory
is of little use without intelligence. The tools that analyze data provide the ‘intelligence’.
In this section and the ones that follow, we discuss some of the tools available for
accessing the data warehouse and transforming the data in it into information useful
from the point of view of the business or Business Intelligence.
The term, On-line Analytical Processing (OLAP) was coined by E.F. Codd in 1993 to
refer to a type of application that allows a user to interactively analyze data. Online
Analytical Processing (OLAP) is a method of analyzing data in a multi-dimensional
format, often across multiple time periods, with an aim of uncovering the business
information concealed within the data. OLAP enables business users to gain an
insight into the business through interactive analysis of different views of business
data that have been built up from the operational systems. This approach facilitates a
more intuitive and meaningful analysis of business information and assists in
identifying important business trends.
OLAP can be defined as the process of converting raw data into business information
through multi-dimensional analysis. This enables analysts to identify business strengths
and weaknesses, business trends and the underlying causes of these trends. It provides
an insight into the business through the interactive analysis of different views of business
information, that have been built up from raw operating data which reflect the business
users understanding of the business. The OLAP application contains logic, which includes
multi-dimensional data selection, sub-setting of data, retrieval of data via the metadata
layers and calculation formulas. The OLAP application layer is accessed via a front-
end query tool, which uses tables and charts to “drill down” or navigate through
dimensional data or aggregated measures (see Figure 17.4 above).
Although OLAP applications are found in widely divergent functional areas, they all
require the following key features: multidimensional views of data, calculation-
intensive capabilities and time intelligence. Figure 17.11 below illustrates the major
features of an OLAP system.
21
Fig. 17.11: The OLAP System Architecture
The OLAP Engine, which is comprised of the ‘Analytical processing logic’ and the
‘Data processing logic’ layers, shown in Figure 11 above, provides a ‘front-end’ to
the data warehouse – an interface through which a variety of general purpose
Graphical User Interface (or GUI) type tools can access the data warehouse
(see Figure 17.12 below). This arrangement makes the data warehouse data
available for non-multi-dimensional analysis as well.
The four major types of OLAP applications are multidimensional OLAP, hybrid
OLAP, desktop OLAP and relational OLAP. Multidimensional OLAP is based on a
multi-dimensional data base architecture. This stores data in a three-dimensional data
cube that is already in the OLAP multidimensional format for “slicing and dicing” into
analysis views. Relational OLAP products are designed to operate directly on a data
warehouse built on relational databases, through a comprehensive metadata layer.
Hybrid OLAP products primarily integrate specialized multidimensional data storage
with relational database management technology. This allows businesses to link multi-
dimensional data to the underlying source data in a relational database. The desktop
style of OLAP allows users to perform limited analysis, directly against data held
within a relational database, while avoiding many of the problems that affect hybrid
and relational OLAP styles.
Three strong trends have shaped the direction of data visualization software for
business users over the last few years:
Chart Types. Most data visualizations depend on a standard chart type, whether a
rudimentary pie chart or an advanced scatter plot (like the one used in Figure 17.13
below). The list of chart types supported by software has lengthened considerably in
recent years.
The wide array of visualization software supports many different chart types,
because the needs of users vary greatly. For example, business users demand pie and
bar charts, whereas scientific users need scatter plots and constellation graphs. Users
looking at geospatial data need maps and other three-dimensional data
representations. Digital dashboards are popular with executive business intelligence
users who monitor organizational performance metrics, visualizing them as
speedometers, thermometers or traffic lights.
24
Tools for charting and presentation graphics are devoted exclusively to visualizing
data. However, data visualization capabilities are commonly embedded in a wide
range of software types, including tools for reporting, OLAP, text mining and data
mining as well as applications for customer relationship management and business
performance management.
Business software for charting has evolved from static and superficial charts to
interactive visualizations with data connectivity and drill down. These advanced
capabilities are found in a new category of software the enterprise charting system
(ECS). With an ECS, users can develop and deploy chart-centric analytic applications
that provide data visualization specifically for business intelligence on an enterprise
scale.
Data visualization has long been in use in software for the study of mathematical,
statistical, geographic and spatial data. Some data visualization software for business
users has borrowed chart types originally designed for scientific users, such as
scatter plots and constellation graphs.
Whereas scientific users tolerate heavily technical functionality that may require
knowledge of programming languages or statistics, business users need this
functionality to be hidden under a friendly user interface. For data visualization to
appeal to business users, it must provide out-of-the-box value in the form of
functionality for solving business problems, such as analyzing or mining customer
behavior, product categories and business performance.
MOTIVATION FOR What is happening in the Predict the future based only
INFORMATION REQUEST enterprise? why this is happening
SIZES OF DATASETS FOR Not large for each dimension Usually very large for each
THE DIMENSIONS dimension
STATE OF THE Mature and widely used Still emerging; some parts of
TECHNOLOGY the technology more mature
Why Now?
Why is data mining being put to use in more and more businesses? Here are some
basic reasons:
• In today’s world, an organization generates more information in a week than
most people can read in a lifetime. It is humanly impossible to study, decipher,
and interpret all that data to find useful patterns.
• A data warehouse pools all the data after proper transformation and cleansing
into well-organized data structures. Nevertheless, the sheer volume of data
makes it impossible for anyone to use analysis and query tools to discern useful
patterns.
26
• In recent times, many data mining tools suitable for a wide range of applications
have appeared in the market. The tools and products are now mature enough
for business use.
• Data mining needs substantial computing power. Parallel hardware, databases,
and other powerful components are available and are becoming very affordable.
• Organizations are placing enormous emphasis on building sound customer
relationships, and for good reasons. Companies want to know how they can sell
more to existing customers. Organizations are interested in determining which of
their customers will prove to be of long-term value to them. Companies need to
discover any existing natural classifications among their customers so that the
each such class may be properly targeted with products and services. Data mining
enables companies to find answers and discover patterns in their customer data.
• Finally, competitive considerations weigh heavily on organizations to get into
data mining. Perhaps competitors are already using data mining.
Data Mining Techniques
Data mining covers a broad range of techniques. Each technique has been heavily
researched in recent years, and several mature and efficient algorithms have evolved
for each of them. The main techniques are: Cluster detection, Decision trees,
Memory based reasoning, Link analysis, Rule induction, Association rule
discovery, Outlier detection and analysis, Neural networks, Genetic algorithms,
and Sequential pattern discovery. Discussion on the algorithms associated with the
various techniques has been kept outside the scope of this text for two main reasons:
firstly, because they are too mathematical / technical in nature, and secondly, because
there are numerous, well written text books, to serve the needs of those who are
specially interested in the subject. Table 17.7 below summarized the important
features of some of these techniques. The model structure refers to how the
technique is perceived, not how it is actually implemented. For example, a decision
tree model may actually be implemented through SQL statements. In the framework,
the basic process is the process performed by the particular data mining technique.
For example, the decision trees perform the process of splitting at decision points.
How a technique validate the model is important. In the case of neural networks, the
technique does not contain a validation method to determine termination. The model
calls for processing the input records through the different layers of nodes and
terminate the discovery at the output node.
Demand Prediction: Retail and other businesses use data mining to match demand
and supply trends to forecast for specific products.
Risk Management Credit Card Upgrades Mortgage Detection and Analysis Decision Trees
Loans Customer Retention of Association Memory Based Reasoning
Credit Rating Affinity Grouping Neural Networks
Step 2: Prepare Data— This step consists of data selection, preprocessing of data,
and data transformation. Select the data to be extracted from the data warehouse.
Use the business objectives to determine what data has to be selected. Include
appropriate metadata about the selected data. Select the appropriate data mining
technique(s) and algorithm(s). The mining algorithm has a bearing on data selection.
Unless the data is extracted from the data warehouse, when it is assumed that the
data is already cleansed, pre-processing may be required to cleanse the data.
Preprocessing could also involve enriching the selected data with external data. In the
preprocessing sub-step, remove noisy data, that is, data blatantly out of range. Also
ensure that there are no missing values.
Step 3: Perform Data Mining— Obviously, this is the crucial step. The knowledge
discovery engine applies the selected algorithm to the prepared data. The output from
this step is a set of relationships or patterns. However, this step and the next step of
evaluation may be performed in an iterative manner. After an initial evaluation, there
may be need to adjust the data and redo this step. The duration and intensity of this
step depend on the type of data mining application. If the database is being
segmented not too many iterations are needed. If a predictive model is being created,
the models are repeatedly set up and tested with sample data before testing with the
real database.
Step 6: Ensure Usage of Discoveries— The goal of any data mining operation is
to understand the business, discern new patterns and possibilities, and also turn this
understanding into actions. This step is for using the results to create actionable items
in the business. The results of the discovery are disseminated so that action can be
taken to improve the business.
Before we get into a detailed list of criteria for selecting data mining tools, let us
make a few general but important observations about tool selection.
• The tool must be able to integrate well with the data warehouse environment by
accepting data from the warehouse and be compatible with the overall
metadata framework.
• The patterns and relationships discovered must be as accurate as possible.
Discovering erratic patterns is more dangerous than not discovering any
patterns at all. 29
• In most cases, an explanation for the working of the model and how the results
were produced is required. The tool must be able to explain the rules and how
patterns were discovered.
Let us complete this section with a list of criteria for evaluating data mining tools.
The list is by no means exhaustive, but it covers the essential points.
Data Access: The data mining tool must be able to access data sources including the
data warehouse and quickly bring over the required datasets to its environment. On
many occasions data from other sources may be needed to augment the data
extracted from the data warehouse. The tool must be capable of reading other data
sources and input formats.
Data Selection: While selecting and extracting data for mining, the tool must be able
to perform its operations according to a variety of criteria. Selection abilities must
include filtering out of unwanted data and deriving new data items from existing ones.
Data Visualization: Data mining techniques process substantial data volumes and
produce a wide range of results. Inability to display results graphically and
diagrammatically diminishes the value of the tool severely.
Extensibility: The tool architecture must be able to integrate with the data
warehouse administration and other functions such as data extraction and metadata
management.
Scalability: Data mining needs to work with large volumes of data to discover
meaningful and useful patterns and relationships. Therefore, ensure that the tool
scales up to handle huge data volumes.
Suite of Algorithms: A tool that provides several different algorithms rather than
one that supports only a few data mining algorithms, is more advantageous.
Multi-technique Support: A data mining tool supporting more than one technique is
worth consideration. The organization may not presently need a composite tool with
many techniques, but a multi-technique tool opens up more possibilities. Moreover,
many data mining analysts desire to cross-validate discovered patterns using several
techniques.
Activity B
You are a data mining consultant in a large commercial bank that provides many
financial services. The bank already has a data warehouse which it rolled out two
years ago. The management wants to find the existing customers who are likely to
respond to a marketing campaign offering new services.
30
a) Outline the data mining process, list the steps / phases, and indicate the
activities in each phase.
b) In the project you are responsible for analyzing the requirements and selecting a
toolset / software for data mining. Make a list of the criteria you will use for the
toolset / software selection. Briefly explain why each criterion is necessary.
c) What could be the business benefits of the exercise? Would the effort and cost
be justified?
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
Without data mining, useful knowledge lying buried in the mountains of data in many
organizations would never be discovered and the benefits from using the discovered
patterns and relationships would not be realized. What are the types of such benefits?
We have already touched upon the applications of data mining and have indicated the
implied benefits.
Just to appreciate the enormous utility of data mining, the following list enumerates
some real-world situations:
• In a large company manufacturing consumer goods, the shipping department
regularly short-ships orders and hides the variations between the purchase
orders and the freight bills. Data mining detects the criminal behaviour by
uncovering patterns of orders and premature inventory reductions.
• A mail order company improves direct mail promotions to prospects through
more targeted campaigns.
• A supermarket chain improves earnings by rearranging the shelves based on
discovery of affinities of products that sell together.
• An airlines company increases sales to business travelers by discovering
traveling patterns of frequent flyers.
• A department store hikes the sales in specialty departments by anticipating
sudden surges in demand.
• A national health insurance provider saves large amounts of money by
detecting fraudulent claims.
• A major banking corporation with investment and financial services increases
the leverage of direct marketing campaigns. Predictive modeling algorithms
uncover clusters of customers with high lifetime values.
• A manufacturer of diesel engines increases sales by forecasting sales of
engines based on patterns discovered from historical data of truck registrations.
• A major bank prevents loss by detecting early warning signs for attrition in its
checking account business.
• A catalog sales company doubles its holiday sales from the previous year by
31
predicting which customers would use the holiday catalog.
17.11 SUMMARY
Inmon, W.H., 1994, Using the Data Warehouse, John Wiley & Sons
(Asia) Pte, Ltd., Singapore
Inmon, W.H., 1996, Building the Data Warehouse, John Wiley & Sons
(Asia) Pte, Ltd., Singapore
Inmon, W.H., Welch, J.D., Glassey, K.L., 1996, Managing the Data Warehouse,
John Wiley & Sons, Inc., New York
Ponniah Paulraj, 2003, Data Warehousing Fundamentals, John Wiley & Sons
(Asia) Pte, Ltd., Singapore
33
UNIT 18 TACTICAL AND STRATEGIC
INFORMATION MANAGEMENT :
DSS AND EIS
Structure
18.1 Introduction
18.2 Objectives
18.3 DSS Philosophy
18.4 Information Systems
18.5 Difference between DSS, MIS and EIS
18.6 Components of DSS
18.7 Group DSS
18.8 Software Tool Selection
18.9 Building DSS/EIS in an Organization
18.10 Summary
18.11 Unit End Exercises
18.12 References and Suggested Further Readings
18.1 INTRODUCTION
In the previous Unit 17, we have covered Data Warehousing and Data Mining
concepts that is exploration and exploitation of data mining techniques to obtain useful
information about the client, service provider and overall on the organization. This
gives a path of directives, understanding of self and finding the important processes
that strengthens or weakens the organization. Time management and suitable in-time
decision is the key for betterment of the organization. The present unit explores
decision-making process and the support system for management executives and
decision makers.
18.2 OBJECTIVES
Simple decision is one in which there is only one decision to be made, even having
many alternatives.
A decision may be goal oriented for some degree of satisfaction for a given
objective. Objective may be driven by a decision but goal is always target/result
oriented. A decision may employ) decision analysis; a structured thought process to
attain desired results. In doing this, we can distinguish three features of the situation:
alternatives, uncertainties and outcomes. Decision analysis thus constructs
models, logical or even mathematical, representing the relationships within and
between the features of situation. The models then allow the decision maker to
estimate the possible implications of each course of action that he might take, so that
he can better understand the relationship between his actions and his objectives.
Someone who buys a lottery ticket and wins the lottery obtains a good outcome. Yet,
the decision to buy the lottery ticket may or may not have been a good decision
Decision maker may adopt strategy, which is a collection of actions. The outcome of
these actions may be uncertain, but the possible outcome is attainment of that goal set
by the decision maker. It is necessary to mention about the risk at this juncture that a
decision maker often thinks while taking the decisions. Risk can be defined as the
possibility of an undesirable result. The risk is linked with monitory befits or loss and
thus, it can be governed by risk tolerance, an individual’s attitude toward decision
and the risk involved.
With the above background, we can now easily distinguish between strategic and
tactical decisions. Strategic decision affects entire organization or major part of it
vis-à-vis organizational objectives and the policies. It has long lasting effect on the
organizational system and generally taken at the highest management level. On the
other hand, tactical decision or management control decision affects a part of the
organization for a restricted or short time. The tactical decision takes place within the
context of existing strategic decisions. Thus, the contextual and effective
management depends on good and timely information. The decision making process
may use various techniques depending on the situation. We can define decision-
making as an activity of deciding appropriate action in particular situations. With
relevant and useful information the decision-making may reduce the uncertainty.
2
Simon provided a general model of any decision making process. The Simon model
(Figure 18.1) describe the sequence of decision making as :
• intelligence: data in the general area is examined, leading to a specification of
the problem to be solved;
• design: problem is formulated, solutions developed and tested for feasibility;
• choice: selection is made amongst alternatives; and
• implementation: the chosen alternative is implemented and substantiated to
the stakeholders in the organization.
Intelligence
Design
Choice
Implementation
Having the basics of decision-making process, the decision support system (DSS)
thus can be defined as the system that supports the decision-making. There are
various definitions of DSS that links to information retrieval with the help of
computers to use of information to support managers. Let us see that how some of
these definitions describe DSS :
1. G.W. Peter Keen and Decision support implies the use of computers to:
Michael S. Morton, 1978 a) assist managers in their decision processes in
semi-structured tasks;
b) support rather than replace, managerial judgment;
c) improve the effectiveness of decision making rather
than its efficiency.
4. Carroll W. Frenzel, 1996 Decision Support System are analytical models used to
increase managerial or professional decision making by
bringing important data to view.
One word that attracts us is “Model”. Let us see the following figure that describes a
simple DSS model :
Predictive Models
As can be seen, the decision knowledge emerges from the quantified data using
statistical and data mining tools, predictive models and the assessment tools.
Activity A
1) Let us take an example of a travel agent selecting destinations for clients base on
the clients’ expressed interest in vacation activities and agents knowledge of what
is available in various locations. Do you think that a computerized DSS will help in
decision-making? If not, why? If yes, how? (Based on Mallach, 2002).
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
4
18.4 INFORMATION SYSTEMS
The Office Information (automation) System (OIS) has to do with the effective
and efficient flow of organizational information for carrying out day-to-day work. On
the other hand, the Personal Information System (PIS) helps individual middle and
senior executives to derive best possible solution for a given problem. It can also be
linked with problem-solving process for supporting strategic decision-making. The
information systems that used to improve communication and coordination among
members of a group of executives who collaborate on a set of joint tasks, known as
Group Decision Support System (GDSS). We shall be studying about GDSS in
later sections.
5
An Expert System (ES) is specialist knowledge information base that help an expert
to decide on crucial and item specific problems. Strategic information system
(SIS) enables an organization to obtain a competitive advantage over its rivals or to
prevent them from taking advantage over the information.
With the exposure to all the above information systems, let us find out the differences
between DSS and MIS. Table 18.2 enlists some basic differences between decision
support system, management information systems and executive information system.
As the name implies, the later two are the systems that provide information that may
or may not be used for making a decision whereas the support information provided
for deciding on the policy, planning or implementation is the basic component of DSS.
Let us find out the characteristics of the three systems :
DSS:
• DSS will often include modeling tools in them, where various alternative
scenarios can be modeled and compared
MIS:
• Typically will also support tactical level management, but sometimes are used at
other levels
6
Table 18.2 : Difference between DSS, MIS and EIS
Typical Users Analysts, professions, Middle, lower levels, sometime Senior Executives Expediency
Served managers (via intermediaries) senior executives
Application Diversified Areas where Production control, sales Environmental scanning, performance
Managerial Decisions are made forecasts, financial analysis, evaluation, identifying problems and
human resource management opportunities
Decision Support Supports semi-structured and Direct or indirect support, mainly Indirect support, mainly high level and
Capabilities unstructured decision making; structured routine problems, unstructured decisions and policies
mainly ad-hoc, but sometimes using standard operations,
repetitive decisions research and other models
Type of Information to support Scheduled and demand reports; News items, external information on
Information specific situations structured flow, exception customers, competitors and the
reporting mainly internal environment
operations
Adaptability to Permits individual judgment, Usually none, standardized Tailored to the decision making style
Individual User what-if capabilities, some of each individual executive, offers
choice of dialogue style several options of outputs
Treatment of Information provided by the Information is provided to a Filters and compresses the
Iinformation EIS/or MIS is used as an input diversified group of users who information, tracks critical data and
to the DSS then manipulate it or summarize information
it as needed
Can be programmed into DSS Inflexibility of reports, cannot get Instant access to the supporting
Supporting Detailed
the supporting details quickly details of any summary
Information
Model Base Standard Models are available but Can be added, usually not included or
The Core of the DSS
are not managed limited in nature
Adapted from the Information Systems resource materials by Denis Manley, School of Computing at Dublin Institute of Technology.
7
EIS:
• EIS support a range of decision making, but more often than not, this tends to
be unstructured
• EIS support the executive level of management, often used to formulate high
level strategic decisions impacting on the direction of the organization
• These systems will usually have the ability to extract summary data from
internal systems, along with external data that provides intelligence on the
environment of the organization
• Generally these systems work by providing a user friendly interface into other
systems, both internal and external to the organization
Let us now explore differences among the three information systems based on the
dimensions (Table 18.2).
In the following sections, we shall be studying various components of a DSS, building
simple architecture for DSS and GDSS.
Decision Interface
DSS Modeling
Software
Information/
Knowledge base
Database
The Figure 18.3 clearly defines that the data likely to be derived from a database
underpins the information on which good decisions are made. Hence, the database is
the base component of a DSS model. The information or knowledge base contains
information about the intricate relationships that may exist between the data. This
defines the rules that underpin the various knowledge systems or the relationship
8
among the activities. For example, the relationships could be between costs, demand
and profitability in a product costing.
The modeling software enables the user to experiment with various scenarios, i.e. to
see the impact of varying parameters when they are changed on the outcomes, or to
undertake other mathematical analysis, i.e. sensitivity analysis, linear programming,
queuing models and to find out risks involved in each of the scenario.
Based on the database, knowledge base and the relations, the decision interface is
created where the user component plays an important role. Here, the users are either
senior management or middle management with lower levels of technical expertise.
Activity B
Having basic understanding of decision-making process and DSS, let us find out what
is Group Decision Support Systems (GDSS). GDSS are interactive computer-based
systems that facilitate decision-makers working together as a group to arrive at a
solution for unstructured problem. The group of executives analyzes problem
situations and performs group decision-making tasks. The GDSS provides
mechanisms to help the users to coordinate and keep track of on-going projects, allow
them to work together thru computer-supported communication, collaboration, and
coordination. Typical applications of GDSS include email, awareness and notification
systems, videoconferencing, chat systems, multi-player games, and negotiation
systems.
The group decision support system addresses the vary issue of human behaviour in a
given environment along with computer science and management. It is found that a
task assigned to a group is a typical information processing system that usually
provides a judicious solution with alternatives. The GDSS has several implications
that can be listed as follows :
• Enable all participants to work simultaneously thereby promoting broader input
into the meeting process and reducing dominance of few people;
• Provide equal opportunity for participation;
• Enable larger group meetings that can effectively bring more information,
knowledge, and skills for a given task;
• Provide process structure to help focus the group on key issues and
discourages irrelevant digressions and nonproductive behaviors;
• Support the development of an organizational memory from meeting to meeting;
and
• Individual satisfaction increases with group size.
The software developed for GDSS focuses principally on assisting brainstorming and
mechanizing voting, two of the rare events in business meetings. We have reached
the stage of mechanizing word-oriented problems in group meetings.
Low High
E-mail Electronic Audio Video Face-to-face
Communication Communication
Chat
Richness Richness
Evaluation Steps
The evaluation of the software basically involves four steps, covering creation of
evaluation team, need identification, product evaluation and negotiations
with vendors. The evaluation team is key and thus it is vital to ensure availability of
team members while making the project plan. Some points to be remembered in
formulation of evaluation team are :
a) identification of suitable members
b) role specification for them
c) anticipation and management of time commitment
d) leadership selection
e) creating directions for the team.
The evaluation team should reasonably be small (5 to 7 members) with a project
leader and the team should submit a regular report on findings to the senior
management.
Needs Assessment
The next step is need assessment for enterprise-wide DSS. The evaluation team is
supposed to create criteria and interact with the personnel who will be impacted by
implementation of DSS. The role of evaluation team in communicating with the
people is to crucial and is to be effective to determine the needs from those who
want DSS, who will be expected to use DSS and who are concerned, opposed, bored
or out of reach. The communication could be question based where interaction should
not be over selling or under done. Questions can be related with the functions and
tasks, controls and security needs, operational performance needs and on the design
12 architecture strengths and problems.
Product Evaluation
The third step is evaluating a product. It is important to mention here that there is no
software package available that can fit in any organisational DSS needs. The
package is to be customized for the organization and one may need to explore other
users and their experiences with the package. The product evaluation may involve
the following three stages :
a) Preliminary evaluation : testing of actual products available in the market and
their screening. The strengths and weaknesses of the vendor is also to be
checked.
b) Functional screening and review of the product on the laid criteria : examination
of cost, design, support and installation requirements.
c) Operational performance evaluation : screened packages have to be tested
operationally either with the demonstration versions or pilot tested for its
scalability, load bearing capacity, direct and indirect costs, after sale support,
training, etc.
Negotiating with Vendors
The responsibility of final selection needs to have negotiations with the vendor who
has submitted the project proposal with costs, infrastructure requirements. The
negotiations are based on the installation plan and post-installation reviews. The role
of evaluation team gets converted in to a project team as no vendor can guarantee on
the performance of DSS when it is actually implemented. On the other hand,
sustainability and reliable information extraction with constant support from the
supplier with up gradations and appropriate changes in software are to be negotiated
at the time of finalization of the software.
Activity C
Please name at least two information systems for each high, medium and low
communication richness media.
2.
The architecture of an information system refers to the way its pieces are laid out,
types of tasks assigned to each piece, interaction among pieces and interaction of
pieces with outside system. Martin (1991) defines information system architecture as
“A written expression of the desired future for information use and management in
an organization, that creates the context within which people can make consistent 13
decisions”.
Let us look at the flow diagram (Figure 18.6) of course development process
adopted by Indira Gandhi National Open University for generating a course that you
are reading as an example of information system architecture.
Database on Learners'
Requirements, Formal Educational Pre-development Survey and
Opportunities & Institutional Reach Need Assessment
Database on
Course Writers Appointing Course Writers and
Scheduling the Writing Activity
We are not explaining the diagram, as it is self-explanatory, but please note the data
gathering situations and try to identify the decision making points.
To build a DSS in organization, one has to consider the spectrum of DSS that
organization is going to use. The following are to be well thought-out to approach
systematically :
• Strategic, tactical and operational decisions of the organization,
• Unstructured, semi structured and structured decisions,
• All levels of management and knowledge workers in the organization,
• Major functions, product or line of business,
• Hierarchy in operations, and
• Geographical division of the organization.
14
Let us refer to Figure 18.7 showing generic view of a DSS architecture.
User Interface
End-User
Query Tools
Having an exposure to information system architecture, let us see that how a DSS is
build in an organization. There are three approaches that are commonly used for
development of an information system :
a) The traditional System Development Life Cycle (SDLC) approach considers
identification of user requirement, analysis of existing system, designing overall
system and its designing, development (with simultaneous implementation) and
testing. Each of these steps culls a written document, reviewed and approved
before starting next step. The basic advantage of this approach is that it covers
all the areas and maintains a record of them. On the other hand it is too rigid for
a system that is frequently changing or updating.
b) Prototype Approach considers user requirement and either applies prototype
system design before system design or evolves prototype design after
development and exercising a prototype system. In the former style, the
implementation of the system design done on the basis of prototype design and
development and testing follows whereas in the later approach, while evolving
the prototype system or rapid application development all the changing factors
are taken care of. The implementation of system is faster in later approach.
Both prototype approaches are flexible and responsive to the development
process. The drawback in the prototype approach is longer development
schedule and possibility of using wrong tool or using the right tool in the wrong
way.
c) End-user Development approach provides an opportunity for development of
DSS by the decision makers themselves. Spreadsheet is a common low-level
end-user development tool. The approach provides extensive control of the user
on the system including target schedules and problem understanding-solving
environment.
15
The DSS project development is teamwork where each team members has definite
role to play. The members of the team are the users, responsible for solving the
problem that the DSS is to help with, the intermediately, who help the users of DSS,
the DSS builder, who are technical experts and have technical decision making
power on the hardware, the technical support person, who are programmers
integrating existing packages into overall system and do customized programming,
and the toolsmith, who uses tools to be used in constructing the DSS.
Having had the defined approach and the team in place, who have already completed
the tasks of need assessment and software selection, the following step may be
useful in building the DSS (Mallach).
a) Obtaining and installing the DSS hardware;
b) Installing the DSS and making it run on intended hardware;
c) Providing user access to the system;
d) Creating and updating the database;
e) Training the user on the new system;
f) Documenting the system for its user and who will responsible for maintaining it
in the future;
g) Making arrangements to support the user as the system is being used;
h) Transferring ongoing responsibility for the system from its developers to the
operations or maintenance part of the MIS group; and
i) Evaluating the operations and use of the system.
Let us now examine some of the example of DSS that might include :
• scheduling systems, such as:
• staff roistering systems
• room timetabling
• production scheduling
• project scheduling and management
• product costing systems with predictive capabilities
• investment decisions
•· strategic planning applications
18.10 SUMMARY
In this unit, we have read about the decision-making process and the support system
for management executives and decision makers. The decision support system (DSS)
was defined as the system that supports the decision-making and now we know that
DSS is a information systems, used by managers in making decisions as support, not
to replace, people and used when the decision is semi-structured or unstructured. We
also understood that DSS incorporate a database of some sort and also models.
Through this unit, we defined various information systems and also differentiated
between DSS, MIS and EIS. We also explored Group DSS and its implications. While
building DSS of an organization, we explored the tips for procurement of software for
DSS and system architecture.
This unit has broadly exposed the theories and practices of DSS and EIS. It is
suggestive to read more materials to get deep information on the subject matters.
16
18.11 UNIT END EXERCISES
1) Define decision support system in your own words. Exemplify using your
organizational context.
2) What are the characteristics of DSS? What are its components?
3) Differentiate between DSS, MIS & EIS with the help of suitable examples.
4) Why is DSS more of a facility than a system?
5) Explain the major functions of DSS and its applications.
6) What is group DSS ? What are the components of group DSS?
17
UNIT 19 INTELLIGENT SUPPORT
SYSTEMS
Structure
19.1 Introduction
19.2 Objectives
19.3 Artificial Intelligence
19.3.1 Brief History of AI
19.3.2 Goals of AI
19.3.3 Applications of AI
19.3.4 Building AI
19.4 Expert System
19.5 Neural Networks
19.6 Fuzzy Logic
19.7 Genetic Algorithms
19.8 Summary
19.9 Unit End Exercises
19.10 References and Suggested Further Readings
19.1 INTRODUCTION
The need for intelligent support systems has arisen because a need was felt to solve
not-so-trivial problems by way and means of systems that are much more capable
than humans. It was felt necessary to use skillfully coded real-world knowledge and
rules in to a computer, which in turn simplifies the problem solving effort. Expert
systems and knowledge-based systems are efforts in this direction. Evolution of
techniques like artificial neural networks, fuzzy logic and genetic algorithms has really
enhanced the problem-solving capacity of these systems. In this unit we will give you
a brief introduction about them so that you can appreciate these concepts.
19.2 OBJECTIVES
The advent of Artificial Intelligence (AI) is as old as a half decade when the first
modern computer emerged. Frankly, what a computer does is that it simulates
collective thinking of several humans to process high volumes of data at a high speed
and accuracy. We are witnessing a shrink in the size and cost of the computer, but
there is growth in its capability. The growth in capabilities actually means that
68
computers are becoming more and more competent of delivering more than the
human abilities. These enhanced competencies are then used to deliver more power
in business activities. The goal of the AI scientists had always been to develop a
thinking machine that solves problems in a way that would be considered “intelligent”
if done by a human. This forms the basis of our definition to artificial intelligence.
Oxford dictionary defines the two terms as “artificial” means not natural or imitating
nature and “intelligence” as quickness in understanding the information. The term AI
was first introduced three decades ago by McCarthy, “Intelligence is the
computational part of the ability to achieve goals in the world”. Artificial intelligence
(AI) thus can be defined as a field that focuses on building techniques to enable
computer systems to perform activities that are quick and are above human
intelligence. Patterson (1990) defined artificial intelligence, as “AI is a branch of
computer science concerned with the study and creation of computer systems that
exhibit some form of intelligence: systems that learn new concepts and tasks, systems
that can reason and draw useful conclusions about the world around us, systems that
can understand a natural language or perceive and comprehend a visual scene, and
systems that perform other types of feats that require human types of intelligence”.
Konar (1999) defined AI as “the simulation of human intelligence on a machine, so as
to make the machine efficient to identify and use the right piece of ‘knowledge’ at a
given step of solving a problem”.
The need for AI has arisen because a need was felt because but for the tiny and
trivial problems, it was becoming very difficult to solve not-so-trivial problems. It was
the wastage of time and effort. To counter this, it was felt necessary to use skillfully
coded real-world knowledge and rules in to a computer, which in turn simplifies the
problem solving effort.
1 Works before 50’s Demonstration that a simple computer processor (Turing Machine) is capable of
manipulating symbols as well as numbers (machine intelligence), emergence of
cybernetics (study of communication between human & machine) as a field, new
approaches to language theories, computer becomes a commercial reality,
emergence of theories like information theory, Boolean algebra, switching theory
and statistical decision theory
2 Works after 50’s Development of chess playing programs, works like language translation,
automatic theorem proving and new programming languages. Development of
FORTRAN, LISP, computational linguistics, pattern recognition & natural language
processing
3 Works in the 60’s Program to play checkers, resolution as an inference method in logic; first
knowledge based expert system (DENDRAL), development of a large interactive
general purpose program that solves mathematical problems and simulation of
complicated processes of thinking.
19.3.2 Goals of AI
AI works on the following goals:
1. Emulate Humans: From the very basic definitions of AI it has become clear
that AI’s main goal is to identify solvable and out of the ordinary information
processing problems, and solve them. In other words, AI’s primary goal is to
emulate human intelligence and not only emulate but do things in a better way.
2. Solve Problems that Require Intelligence: Be it a program that plays
chess or a system that has all the intelligence of a dictionary, the primary aim of
the AI has always remained to study and solve problem that are knowledge
intensive and require a high degree of intelligence.
3. Develop Expert Systems on Real-Life Problems: AI has real-life
problems in the world as its pivot. AI’s goal is to develop experts systems that
simulate the real-world problems and solve them automatically.
4. Enhance Interaction: AI works for enhancing human-human, human-
computer and computer-computer interaction. Computers have now accepting
more and more varied use-interfaces for input and output processes like voice,
vision and virtual reality etc.
Table 19.2: Generations of Computers
2 Second Generation These computers were made of Mainly used for commercial
transistors and were smaller in size as data processing and payroll
compared to their predecessors. creation.
4 Fourth Generation These computers came up with high- Operations became more fast.
speed VLSI engines. Many electronic
robots were based on these.
70
19.3.3 Applications of AI
AI is employed in virtually every branch of science today. But before going into the
details of applications where AI plays a significant role, we will go back to how
computers were developed and what were their capabilities at different point of
times. Following table gives these details:
One can see that there is a growth in the capabilities of the computers as they move
from one generation to the other. In fact, this is addition of more and more
intelligence in the systems that are doing wonderful works presently and are poised to
do even better in the future.
You can find a lot of varied applications of AI. It has been applied in game playing,
automated grammar checking, speech recognition, vision systems, and expert systems
like weather forecasting, diagnostic systems, financial decision making and
classification systems, computer simulated natural processes, mathematical theorem
proving, natural language understanding, intelligent control and scheduling & planning.
71
6. Expert Systems: An expert system consists of a knowledge base, database
and an inference engine for interpreting the database using the knowledge
embedded in the knowledge base. There is sound reasoning process that has to
build in order to create an expert system. AI techniques have played significant
role in creation of expert systems for weather forecasting; diagnostic systems
such as medical diagnosis systems, pathology diagnosis system & customer
assistance systems etc.; financial decision making systems like fraud detection
systems used in credit card companies & systems that expedite financial
transactions and classification systems like financial decision making systems &
NASA’s galaxy-classification system.
7. Computer Simulated Natural Processes: Applications of AI are not limited
to human and natural processes, it is extended to other processes too. A model
based on AI tools predicts the walk of a cockroach and its basic behaviors. The
model correctly predicted many of behavioral processes pertaining to
cockroach.
8. Mathematical Theorem Proving: There had been many attempts of proving
mathematical theorems with the help of AI tools. Inference methods are used
to prove new theorems.
9. Intelligent Control: firstly an expert controller sets a set of rules. The rule
whose premise matches the dynamic plant parameter response is selected and
implemented. Fuzzy logic is also used in such cases in many industrial plants
e.g. the power control in a nuclear reactor. There are application using fuzzy
logic and artificial neural networks for plant estimation i.e. for designing a
process estimator.
10. Scheduling & Planning: You must be aware of the importance of planning a
time schedule of a set of events to improve the efficiency. Artificial neural nets
and genetic algorithms have been employed to solve these problems. Typical
examples of these applications are class-routine scheduling problem, Automatic
scheduling for manufacturing and rerouting scheduler for airlines etc. Operation
Desert Storm used these systems for planning logistics of people and supplies.
19.3.4 Building AI
While building artificial intelligence in an organization one has to think about many
factors such as observation, reasoning and action. Take the case of a human being; it
has sensory functions attached to various parts of its body with which it observe the
things in the real world. You might have seen different software for medical
diagnosis, e.g. homeopathic software contains a set of symptoms and test results that
have been obtained and inputted to the system manually. Whenever a patient inputs
its symptoms then the diagnosis system matches it with the recorded ones to give a
diagnosis. The second step in this is the reasoning part. This is dependent on the
inference, decision-making and classification from what is observed in the first step.
There are many tools available for this step. These tools could be artificial neural
network, logical deduction system, heuristic searching a problem space, Bayes
network inference, genetic algorithms etc. The third and the final step in the building
process is the action. We will go back to the example of the human beings. When
the observation is done and reasoning is made it is the time for action e.g. if you
touch a hot thing, you develop a reasoning that if you touch that, you will be hurt. The
action is that you would not touch a hot thing. In real world you may come across
different kind of problems. There would be problems that could be not solved by
mathematical or logical algorithms. Such problems can only be solved through
intuitive algorithms. These problems are the problems that are deemed in to the AI
domain. The key to AI approach is intelligent search and matching. If you were given
a problem you would be doing the following tasks:
72
1) Knowledge Representation and Reasoning: You will first try to represent
the facts in some way. Logic is built to answer questions like “what” & “how”.
One tries to collect all facts whether missing, implicit, explicit or probabilistic to
gather knowledge to solve a problem. You build rules to infer from the
knowledge thus collected. In case you have many ways to infer something then
you would like to go for the path that is al the smallest distance from the goal.
2) Heuristic Search: One has to develop rules of thumb to solve the constraints
in the problem space. As we have earlier mentioned that there are about 10120
states in a Chess game. As we move from one state to another state we search
for the best possible solution at each state. The better the solution found at each
state, the fewer steps it will require to reach to the next state.
3) Inference: While searching you would come across many rules. In many
cases you will be able to infer some new rules from some facts. You can build
reasoning to seize a fact from other facts. The reasoning could be non-
monotonic reasoning or reasoning under uncertainty.
Amongst the most noteworthy developments in the field of Artificial Intelligence (AI)
is the advent of “expert” or “knowledge based” systems. Joint efforts by human
experts yielded systems that can diagnose diseases, fly planes, drive vehicles and
configure computer systems at performance levels that can exceed the best human
expertise. Question thus arises that what are expert systems? To put it most simply:
Expert systems are computer programs that use knowledge to solve problems
competently and successfully. They are similar to human experts in the sense that
they also use logic and heuristics to solve problems, they also make errors and they
also learn from their errors. This expertise is easier to store, retrieve, transfer and is
cost-effective and permanent. Johnson (1983) described the term ‘expert” in the
most accurate manner as, “ An expert is a person who, because of training and
experience, is able to do things the rest of s cannot; experts are not only proficient but
also smooth and efficient in actions they take. Experts knows a great many things
and have tricks and caveats for applying what they know to problems and tasks; they
are also good at plowing through irrelevant information in order to get at basic issues,
and they are good at recognizing the problems they face as instances of types with
which they are familiar. Underlying the behavior of experts is the body of operative
knowledge, we have termed expertise…” Thus we can now define expert systems.
Patterson (1990) described expert systems as, “ An expert system is a set of
programs that manipulate encoded knowledge to solve problems in a specialized
domain that normally requires human expertise. An expert system’s knowledge is
73
obtained from expert sources and coded in a form suitable for the system to use in its
inference or reasoning process.” You might recall the earlier description; an expert
system consists of a knowledge base, database and an inference engine for
interpreting the database using the knowledge embedded in the knowledge base.
There is sound reasoning process that has to build in order to create an expert
system.
4 XCON Late 70’s Digital Equipment Select and configure components of complex
Corporation & computer systems. Expert system work in
Carnegie-Mellon computer systems is typified by XCON.
University
5 ACE Early 80’s Bell Laboratories Equipment fault diagnosis and integrated circuit
design. AT&T uses it for identify trouble spots
Early 70’s in telephone networks
6 HASP/ SIAP Stanford University Identifies ship types by interpreting data from
& Systems Control hydrophone arrays that monitors regions of the
Technology ocean
These were some of the path setting work in the expert systems. These works
provided the base for other systems to build on them. Today one can see a plethora
of applications of expert systems in virtually all areas like agriculture, chemistry,
computer systems, electronics, engineering, geology, information management, law,
manufacturing, mathematics, medicine, meteorology, military science, physics,
process control nd space technology etc.
Expert System is a result of the interaction between the system builder (knowledge
engineer) and many domain experts.
74
Source : Based on Waterman, 1999
Expert systems are computer systems that are based on knowledge rather than the
data. They accumulate this knowledge at the time of system building. Knowledge is
programmed and kept in such a manner so that it can be browsed and appended from
time to time. Expert systems possess a very high level of expertise in the area for
which they are made for. The best thing about expert systems is that they grow over
time and but for the initial expenditure incurred in building them, they work in a cost
effective manner. Expert systems have predictive modeling power i.e. they are
capable of describing the effects of new situation on the data and the solution. Expert
system uses symbolic representations for knowledge (rules, networks or frames).
This compilation often becomes a quick reference for best strategies, methods and
consensus decisions. This becomes a permanent knowledge base. Thus, one can say
that expert systems have a permanent memory. Expert systems gives access to the
user to understand it’s reasoning and can be used to provide training. This is possible
because of its knowledge base; it can provide trainees with experiences and
strategies from which to learn.
75
Waterman (1999) has highlighted the relationship between the two in the following
figure.
Waterman further stated, “ The figure suggests that the user may be a tool builder
debugging the expert-system-building tool includes both the language, a knowledge
engineer refining the existing knowledge in the system, a domain expert adding new
knowledge to the system, an end-user relying on the system for advice, or a member
of the clerical staff adding data to the system”.
The knowledge can be represented in expert systems in three ways. These ways are
rules, frames and semantic nets. A rule-based system consists of a rule-base
(permanent data); an inference engine (process); and a workspace or working
memory (temporary data). Knowledge is stored as rules, which are of the form
IF some condition THEN some action
For example:
IF it is hot THEN turn the AC on
IF the temperature is more than 350 THEN it is hot
IF the weather is not so hot but it is humid THEN also turn the AC on.
When the IF condition is satisfied by the facts, the action specified by the THEN is
performed. These rules may modify the set of facts in the knowledge base. These
new facts can be used to form matches with the IF portion of the rules. This
matching of rule IF portions to the facts can produce “inference chains”. The
inference chains displays how a conclusion is reached in an expert system. Rules can
be used in two ways: - by forward chaining and backward chaining.
Forward Chaining: Suppose you have a database which has some information
stored in it and you want to generate some new rules and test them with respect to
the database. Then by the forward chaining method you start with a fact that is
present in the database. You infer some rule that comes due to a consequence of a
given fact. Next is that you add that inference as fact in the database. In other words
you have appended the database. Once a fact is added, it interacts with other facts
76
and infers some new fact that again gets added into the database. This process is
continued till there is no further inference. The process is “forward” because it uses
the facts on the left side to derive information on the right hand side.
Backward Chaining: Suppose you want to test whether a fact exists in the
database. The process first checks the database for that fact. If the fact that you
want to establish is not there, then the process tires to find other facts that conclude
that fact. It tries to establish those facts first, which conclude the fact you are
interested in. The process continues in the same manner till sufficient evidence is
found for existence/non-existence of the fact being tested.
The essential difference between forward chaining and backward chaining is in the
way the facts are searched in the database. In some situations, backward chaining
proves to be cost-effective. If your intentions were to infer a particular fact then by
employing forward chaining you would waste a lot of time and efforts. This is
because of the fact that experts systems are generally based on hundreds and
thousands of facts. On the other hands if you were looking for some new information
from the database then by forward chaining you would be able to find a lot of rules
that will be executed as a consequence of the existing facts. Forward chaining can
derive a large number of inference chains and situations. These facts and rules could
be further used to append the database.
Activity A
1) You must have used a word-processor and used its spelling and grammar-
checking feature. What additional features would you intend to have for the
grammar-checking module? Mention the limitations you have observed in your
word-processors module.
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
2) Mention five activities that you encounter in your day-to-day life that could be
not solved by mathematical or logical algorithms. Take one such example and
solve it (up to 2-3 stages only) by intuitive approach as done in AI systems.
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
....................................................................................................................
77
19.5 NEURAL NETWORKS
Neural networks are a great aid to computing. They involves mathematical structures
that are capable of learning. Neural network is a set of connected input/output units
where each connection has a weight associated with it. Neural networks are
primarily used for predictions. Neural networks use past data and fit a model on it to
predict and classify. Neural networks as the name suggest resembles the namesake
found in human beings. Neural networks begin with an input layer, which is given
some weight before it connects to the output unit. The output unit processes the
values of input variable and weights with a combination function. There are many
hidden layers between the input and output layer. A neural network is trained by
assigning weights on the inputs of each of the units so that the network predicts the
variable under question in the best possible manner. According to Barry & Linoff
(2001), “Neural Networks are a good choice for most classification and prediction
tasks when the results of the model are more important than understanding how the
model works. Neural Networks actually represent complex mathematical equations,
with lots of summations, exponential functions and any parameters. These equations
describe the neural network, but are quite opaque for human eyes… Neural networks
do not work well when there are man hundreds or thousands of input features…
Neural network works well with decision trees… decision tress are good at choosing
the most important variables- and these can be used for training a network.”
A major difference between neural networks and the statistical modeling is that the
former is based on the rules it explores from the data while the latter is based on
previously specified functional form.
As our nervous system is made up of neurons that are connected with a nerve fiber,
neural nets also have nodes that are connected. As a neuron receives signals from its
neighboring neurons, processes them and move those signals forward, the neural net
also do the same functions.
Thus artificial neural networks are electrical analogues of the biological neural nets.
The most common application of neural network is in the field of machine learning.
One can find many applications of neural networks in control, automation, robotics,
computer vision, scheduling, knowledge acquisition and planning. They are useful in
many applications because they derive meaning from complicated or imprecise data.
These situations are otherwise complex and undetectable by humans and other
computer techniques. Neural Networks are good at identifying patterns or trends in
data and hence they are well suited for prediction and forecasting needs.
78
A neural network can have multiple layers. Suppose, we have a training data and we
measure attributes for training data. These measured attributes form the input layer.
Weights are given to the input layer according to their importance in the problem.
The output from the input layer is assigned some weights and this feed to the second
layer, known as hidden layer. Similarly the weighted outputs of this hidden layers can
be fed to the next hidden layer and so on. Finally these outputs go into the output
layer, which emits network’s prediction. This process is explained in the figure given
below. Figure shows how a training sample x1, x2,…xi is fed to the input layer.
Weighted connections exist between each layer denoted by wij.
If there is a single hidden layer then the network is called a two-layer neural network.
Similarly a network containing two hidden layers is called a three-layer neural network.
There are immense applications of Neural Networks in business. It is just not possible
to mention all of them. However an attempt has been made to give you a glimpse of
the purposes for which neural networks are being applied. Following are some of the
applications of the artificial neural networks Pujari (2001), Konar (2000):
2) Used in monitoring the state of aircraft engines. Parameters like vibration levels
and sound are used to predict or forecast engine problems.
4) A simple neural network based diagnostic expert system, which diagnoses and
recommends treatments for acute sarcophagal disease.
79
6) In path planning of the mobile robots. Mobile robots works on sensors that help
them recognize the world as the humans do. Neural Network based
navigational model has been applied for online navigation of such robots. They
help the robot to receive sensory information, generate control commands for
motion and direction and finally set the schedule of motions.
7) For acquisition of knowledge in an expert system. Fuzzy neural networks are
applied for automated estimation of certainty factors of knowledge from proven
and historical databases of a typical reasoning system.
8) In recognition of human faces from their facial images. Self-organizing neural
nets are applied for this task. Weights are given to each multi-dimensional point
on the 2-d plane and then it is mapped to a single point. This process is repeated
for all the 360 images (corresponding multi-dimensional points.)
9) In cognitive learning for applications in psychological modeling. Fuzzy neural
networks are used to mimic the activities of “long term memory” of the
biological cognitive system.
These applications are never-ending. As said earlier, neural networks are useful in
many applications because they derive meaning from complicated or imprecise data.
These situations are otherwise complex and undetectable by humans and other
computer techniques. We now move on to another important concept i.e. fuzzy logic
and its business applications.
Traditional logic has many limitations when one deals with uncertain and incomplete
knowledge. Unfortunately knowledge in the real world is never certain and complete.
Fussy logic came into picture as a concept that extends the expressive power of
traditional logics. You would recall that in standard set theory, an object is either a
member of a set or it is not. There is no middle way. There is no partial containment.
The characteristic function of a traditional set assumes values 1 and 0, on the basis of
membership. If we generalize this concept and allow the characteristic function to
assume all values between 0 and 1, then we talk about the fuzzy sets and the value
assumed by the characteristic function denotes the degree or level of membership.
Prof. Zadeh of University of California, Berkley in 1965, first introduced fuzzy sets.
The main objective was to define the fuzziness and vagueness. Fuzzy set theory
forms the basis of Fuzzy logic. It is a relatively new discipline that has found
applications in automated reasoning of expert systems. Fuzzy models require defining
of memberships functions. These functions can often be defined on the basis of
intuitive knowledge. Because of their simplicity to use and cost effectiveness, fuzzy
logic and fuzzy computation are good prospects for the next generation expert
systems. The universe of fuzzy set can take any value in the real interval 0 and 1. Let
us take an example to explain the concept better. Suppose we want to define the
membership of batsmen of national level in a country.
1 for x > 50
80
here x is the national average of the batsman. The interpretation is if a batsman has
an average of more than 50 runs he is strong member of the fuzzy set. An average of
40 means his membership is partial with uA(x)=0.5, similarly an average of 30 would
get uA(x)=0.2 and so on. The characteristic function for fuzzy sets provides a direct
linkage to fuzzy logic.
Genetic algorithms are stochastic algorithms. They were first proposed by Holland in
1975. They are based on the natural process of biological evolution. These methods
follow the “Survival of the fittest” principle of Darwin. They are called “genetic”
because they work on the same principles as genetics: The members, which adapt
well to the environment, are selected for reproduction and produce offspring. Poor
performers die without offspring.
81
The figure above can be summarized that genetic algorithms let the data structures
face the environment and carry forward with only the fittest data structures. There
are a few concepts that need to be highlighted.
Mating: Mating is done by randomly selecting a bit position in the eight bit string and
concatenating the head of one parent to the tail of the other parent to produce the
offspring e.g. the fifth bit crossover point of parents xxxxxxxx & yyyyyyyy will
produce offspring xxxxxyyy & yyyyyxxx.
Inversion: Inversion is done on a single string. The inversion concatenates the tail of
the string to the head of the same string e.g. sixth bit inversion of string abcdefgh will
be ghabcdef.
Mutation: In mutation bits at one or more randomly selected positions are altered. It is
done to ensure that all locations of the rule space are reachable so as to avoid local
minima.
To overcome the difficulties that were faced in solving many real-life problems,
intelligence was put into a computer (essentially based on the knowledge of the then
society). The theme of all these efforts was around the concept of making a program
intelligent, by providing it with high quality specific knowledge about some problem
area. This collaborative and collective intelligence led the machine do the tasks
better than the humans. AI has taken off from there and what we are getting today is
an improved build-up on the older systems. Expert systems emerged as a
consequence of the developments in the artificial intelligence field. They started as
problem solvers using specialized domain knowledge. As the time passed by these
systems kept building on themselves and what we are getting today is much better
versions of their predecessors. More and more algorithms and methods were
developed to solve problems more efficiently.
Some of these include artificial neural networks, fuzzy logic and genetic algorithms.
They have immense applications in the field of AI and expert systems. Genetic
algorithms are used with neural networks and fuzzy logic for solving more complex
problems. They are jointly used and hence are often referred as “soft-computing”.
This unit has tried to provide you with an introduction of these developments.
1) What do you understand by Artificial Intelligence? What are the factors that
highlighted the need of developing AI? What are the goals of AI?
3) If you have to build artificial intelligence in your organization, what factors you
would think of and take into consideration. Mention those factors in a stepwise
manner.
5) What are expert systems? Mention the working principles of expert systems.
Also discuss how knowledge can be represented in expert systems.
7) Discuss the salient features of the genetic algorithms. How do they differ from
the artificial neural networks? Explain mutation and mating with the help of
examples.
8) What are the factors that differentiate traditional logic and fuzzy logic? Explain
the concept of membership characteristic function and also discuss the
Business applications of Fuzzy Logic.
83
19.10 REFERENCES AND SUGGESTED FURTHER
READINGS
Berry Michael. J.A. & Linoff Gordon S. (1997), Data Mining for Marketing,
Sales and Customer Support, John Wiley & Sons, 1997.
Han Jiawei & Kamber Micheline (2001), Data Mining: Concept and Techniques,
Morgan Kaufmann, Elsevier Science, India
Johnson, P.E (1983), “What Kind of expert should a system be?” The Journal of
Medicine and Philosophy, vol 8, pp 77-97, 1983.
Konar, Amit (1999), Artificial Intelligence and Soft Computing: Behavioral &
Cognitive Modeling of the Human Brain, CRC Press, Boca Raton, Florida, 2000
Russel, S. and Norvig, P., Artificial Intelligence, McGraw-Hill, New York, 1996
84
UNIT 20 EMERGING TRENDS IN IT
Structure
20.1 Introduction
20.2 Objectives
20.3 Competitiveness of ICT
20.4 Technology for Convergence: Hardware and Software Issues
20.5 Convergence of IT and Consumer Electronics: Emerging Trends
20.6 E-Commerce: Essential Components and Future Issues
20.7 E Commerce Design Issues
20.8 Privacy in the Context of e-Commerce
20.9 Summary
20.10 Unit End Exercises
20.11 References and Suggested Further Readings
20.1 INTRODUCTION
Information and communication are the two basic needs of modern world, which
cannot be compared among them for establishing any importance of one over other,
may it be a personal life or business. In fact these two are most of the time
complementary and sometimes supplementary to each other to maximize the benefits
drawn of information and communication systems. Therefore tools and techniques
are always sought to address the issues raised while attempting to utilize these two
for developing leverage.
During the late 1980s and early 1990s, the rapid growth of distributed processing and
the Internet changed the telephony world. The convergence of voice and data
networks enables the delivery of advanced, revenue generating services, which were
not feasible in the circuit-switched environment. Today’s converged network
combines voice services with packet networks, using signaling as the underlying
technology to provide the independent control network that connects the two.
1
20.2 OBJECTIVES
After reading this unit you should be able to:
• Describe the competitiveness of information and communication technology;
(ICT) with respect to modern business practices and their impact on
economies;
• Describe technology issues involved in convergence with respect to software and
hardware requirements and trends;
• Analyze global market penetration of ICT and prepare strategies for survival; and
• Analyze emerging scenario in e-commerce.
Information and communication technologies have been regarded as the tools for
increasing efficiency levels in all spheres of operation in the postindustrial age. ICTs
are also setting the foundation for new industrial order. This belief is equally shared
by developed nations and most of the developing nations. For evaluating the impact of
ICTs one has to go through the era known for high industrial growth i.e. latter half of
the current century in which they have come into widespread use. The dramatic and
continuing liberalization of world trade is indeed a central feature in global economy
and the spread of ICT and goods derived using ICTs has been rapid with an
accompanying emphasis on the issue of “competitiveness”. The word competitiveness
is widely used to reflect the growing needs of business enterprises to evaluate their
relative position with regard to their domestic competitors in international market and
foreign competitors in domestic markets.
Productivity gains from the use of information technologies involve improved control,
smoother integration of production processes, and better control in the acquisition of
inputs and the disposition of outputs. Communication technologies play important
roles, particularly in co-ordination of functions, such as conveying timely information
about inventories and scheduling throughout a distribution system. The productivity
gains from ICTs are greatly realized through cost-reduction, in material inputs, labor,
and capital. The relative shares of these reductions may differ across industries and
over time, but labor saving is a principle source of cost-reduction. In addition, ICTs
usually make it possible to produce more or higher quality with the same levels of
inputs, resulting in productivity advances that are independent of changes in input use.
Growth in the use of ICTs in manufacturing appear to involve greater flexibility and
changeover speeds as well as shortened and accelerated flows of materials for
processing, work in process, and finished good inventories. These changes suggest a
transformation in methods of organizing production systems from traditional models of
mass production. The trade-off between the creation of new organizational models
and the augmenting of old is essential for evaluating the issue of competitiveness.
The use of ICTs, have also made it possible to expand other economic activities,
conventionally referred to as the “service sector”. The contributions of ICTs in the
service area are apparent with the fact that ICTs are a major component in the
predominant form of physical capital that service industries employ. It can be said
without reservations that ICTs are the tools for productivity improvement in the post-
industrial or information society age for achieving higher productivity gains that match
or exceed those that have been historically experienced in manufacturing
technologies. With such productivity gains it would be possible to indefinitely sustain
the growth of economic output and productivity despite the trend towards a growing
share of this output being produced in service sectors. The possibility of indefinite
growth in the production and consumption of services is encouraging sign for both
developed and developing economies.
There are several reasons to believe that developing nations could benefit from
productivity improvements in services. First, in developing nations, governments often
absorb relatively large shares of national output and most government activities are
involved in the delivery of services. Hence, improvements in productivity in
government services could free resources for private investment. Second, services
are often close complements to manufacturing. For example, the effectiveness of the
retail and distribution sector of an economy influences the growth of manufacturing
by providing more efficient market outlets for manufactured output. Third, developing
nations are increasingly faced with the problems of harmonizing their production
systems with the use of ICTs in developed nations so that they can serve as suppliers
and sub-contractors in an increasingly global division of labor. This process of
harmonization requires adoption of ICTs not only at the “service” level of the firm,
such as the front office and the communication links to developed nation suppliers,
but also within the production process to control quality and scheduling in ways that
are consistent with customer demands. Many of these harmonization problems,
nonetheless, are reflected in demands for services that, without the extensive use of
ICTs, serve as barriers rather than complements to improvement in international trade
and that absorb resources that could otherwise be used directly for production.
Fourth, and finally, productivity improvements in both services and manufacturing are
worthwhile wherever they may be achieved. Having more output using the same
amount of inputs is of benefit in whichever sector it is achieved. To the extent that
ICT use achieves greater productivity through releasing labor, the problem is to
develop other opportunities for their employment (or remove barriers to this
adjustment) rather than to lock them into employment patterns where they have low
productivity.
The convergence of voice and data networks is today’s reality. It requires the
signaling technology that bridges the two networks. Using the converged network,
service providers and carriers are bundling new services and applications into
5
competitive solutions that are revolutionizing the telecommunications marketplace.
Network architecture will evolve and become more sophisticated as new features are
added; creating an environment that will radically alter the way people connect.
Users will have the ability to control how, when, and with whom they communicate.
The new generation of services will focus on personal identity, mobility, presence
management, and multimedia/multiparty communication.
H.323
The infrastructure of the new packet-based network will require core routing
intelligence. Two other IETF protocols, TRIP and ENUM, have been proposed to
6 augment SIP and H.323, providing advanced routing capabilities. Telephony Routing
Information Protocol, or TRIP, is a core protocol for dynamic routing of packet
telephony traffic. TRIP is designed to support the flexible nature of the packet
environment – it interworks with many different kinds of gateways in small or large
networks. TRIP communicates policies for call routing, providing the intelligence to
determine which paths will be used to route calls between packet networks and
multiple PSTN gateways. TRIP creates routing rules and determines optimal
telephony destinations, attributes, and call paths. With TRIP, the network can
automatically propagate all routing information among all routing servers.
ENUM, which stands for E164 number map, allows calls from the PSTN to be
routed to destinations in an IP network. This ability can be used to provide
communication solutions where telephone numbers are the only call identity. ENUM
is a directory service which allows the network to map an E164 standard telephone
number to a set of addresses, such as e-mail, SIP URLs for IP voice, mobile
telephone numbers, and web addresses. Routing can be further enhanced to account
for presence information, time of day, or other attributes. Emerging protocols and
new network architectures are developing to support changing technologies and
subscriber demand for new services. The standardization and adoption of new
signaling protocols, such as SIP and H.323, will make possible the kinds of integrated,
flexible, and innovative systems and applications that deliver the promise of
tomorrow’s network.
One major aspect related to the above innovative technologies to develop seamless
wireless connections between small, multi-functional devices in the home. It is
believed that signal-processing technology is the choice for digital audio, video, cell
phones and broadband and wireless communications. To achieve this access to
broadband technology must be on top of priorities, in order to move forward on this
front focus on spectrum issues. This includes developing policies that promotes more
efficient sharing of spectrum. The expansion of broadband and high-speed wireless
networks is believed to be a key factor in the future proliferation of IT products to be
used by common people in daily life. It is expected that more content made available
over such networks and more engaging applications for the user will lead to the
development of larger commercial markets. Most of the advances in this direction
will lead to developments in consumer electronics products in which convergence of
different technologies and applications will come up as natural process.
The consumer electronics industry, in short, is entering a new era based on the
promise of utilizing broadband and wireless technologies to promote the more
widespread use of electronic devices. Advanced in microelectronics further enhances
the potential for consumer electronic devices to proliferate and be utilized well
beyond what is in the market today. The personal computer led to a revolution in
terms of how data could be managed and manipulated. The Internet enhanced this
function by providing direct access to more data. Mobile wireless and wideband
provides the consumer with all of the above in more places with greater access.
The trend is leading many markets that were traditionally separate on a competitive
8 collision course.
In an interesting development, the convergence trend is leading both hardware and
software companies to become both hardware and software companies. Microsoft
has unveiled its new Smart Personal Objects Technology (SPOT). Chips in the
devices pick up signals from a radio network built on the under-used FM spectrum. It
is part of the company’s strategy to produce a wide range of software for the new
devices of the future beyond a PC, as well as such common consumer electronics
products as watches, clocks, and even key chains. Microsoft has already developed
special software for Pocket and Tablet PCs (a derivative of laptops) in order to
participate in the wireless market. Clearly, this approach appears to be a copy of
what Sony and other Japanese electronics firms decided to do toward the beginning
of the 1990s. Sony sought to develop seamless networks of electronic devices for the
home connected through wireless systems. Sony is making serious efforts to establish
the Linux operating system as the global and open standard for transferring digital
entertainment from device to device in the home as the use of broadband expands. It
is believed that the PC may be useful in transmitting downloaded content to the TV,
or even TV could bypass the PC entirely and get its content from devices like Sony’s
proposed Cocoon set-top box, which has already been tested in Japan. Cocoon is a
Linux-based, Internet-connected set-top box with a hard-disk drive that can transfer
and play movies on devices connected to a home network.
Microsoft, along with Dell, Hewlett Packard, and Gateway, are interested in
expanding into the consumer electronics business. Microsoft, which also produces
products such as the Xbox, now likes to be called a consumer electronics
manufacturer. Companies in the increasingly commoditized PC business are seeking
to expand into consumer electronics by entering into product categories that
compliment to the PC via “gateways”, especially home entertainment devices. The
gateways can take the shape of a PC-centric system, a set-top box, or a handheld
computer containing special software that allows the user to control a variety of
devices throughout the home. It should be interesting to see future competition
between firms such as Microsoft that are developing proprietary standards for
networked electronic appliances versus firms such as Sony that support more open
standards. It is evident that firms that have specialized in producing electronic devices
for the rest of the world, especially those in Japan and Asia, may benefit greatly from
the aforementioned trends. Such a trend may provide an advantage to hardware
makers over software companies and those that excel at branding and the farming
out production to other firms.
New emerging technologies feature new, innovative products with a focus on the
convergence and consumer adoption of 3G, highlighting the growth potential after the
success of GSM. In developed countries wireless phone owners prefer converged
wireless phone/PDA devices to two stand-alone products capable of performing the
same functions. More advanced phones are made for more advanced networks.
Many advances in wireless technologies are seen for next-generation wireless
systems such as smart phones with high-definition screens, camera functionality and
those that double for PDAs. This has resulted due to better, faster networks being
setup and strong demand from consumers.
This section provides a brief description of modern practices and emerging trends
related to technology, design and security issues involved in e-commerce.
Wireless Internet
Major technology and business companies such as Microsoft, AOL and Amazon.com
are in the lead in developing and marketing wireless communications services and
products required for facilitating business through wireless internet. AOL wants to
make instant messaging available to all its customers and Amazon is already selling
books using palm pilots. WAP (wireless application protocol) will be developed for
use for wireless pages, instead of HTML.
Portals
Portals are sites that combine a portfolio of basic content, communication, and
commerce sites. For the most part, they started out as search engines. There are two
different types of portals in use, broad-based portals i.e. sites that serve everyone.
They include Yahoo!, AOL, MSN, Excite, Snap, Lycos, AltaVista, Look Smart,
About.com, Juno, Earthlink, etc. Vertical portals are the sites that focus on a
particular content category, commerce opportunity, or audience segment, with a broad
set of services. Examples of such portals include CBS Sports line, Garden.com, eBay,
Amazon.com, Blue Mountain Arts, CNET, etc.
Smart Cards
A smart card is basically a credit card with a built-in microprocessor and memory
used for identification or financial transactions. When inserted into a reader, it
transfers data to and from a central computer. It is more secure than a magnetic
stripe card and can be programmed to self-destruct if the wrong password is entered
too many times. As a financial transaction card, it can be loaded with digital money
and used like a travelers check, except that variable amounts of money can be spent
until the balance is zero.
The future trends in digital signatures will depend on the proper and responsible use
of the technology. Even though digital signatures are remarkably secure, there is a
growing concern that the keys might be stolen from the owners and they could be
used fraudulently e.g. when a key stored in a system is accessed by a service agent
there is very good chance that the key might be used for advantage of many
outsiders. And in the future though digital signatures are set to embrace the corporate
world, it is of low importance to the customer, as he is very unlikely to purchase his
home, car, etc., online. However this technology can very widely be used in many
other small-scale transactions online. In the near future many software applications
will support the concept of digital signatures. Already Adobe Acrobat supports a
feature called Self-Sign, a plug-in that can be used for signing and validating. Apart
from this Verisign, Entrust and many other companies have unveiled their packages
that go hand in hand with applications like Adobe Acrobat and MS Word. So this
technology will surely be commonly used in the future, though it might take some time
before it has been accepted as a standard.
10
20.7 E-COMMERCE DESIGN ISSUES
As the website of the business organization offering e commerce services are their
front offices and showcases for their customers, a good design can make a web site
stand out among dozens of competing sites selling similar products. A well-thought-
out presentation can boost traffic and sales. The best-designed sites keep customers
coming back. Simplicity seems to be the best strategy in web design for e-commerce.
E Commerce managers and web-design staff must ensure that it’s easy for users to
download a page, find an item, make a purchase, and navigate through page after
page without losing track of the starting point. Navigation is seen as the key; the first
step to building a simple yet effective e-commerce site.
Web Standards
The web standards are very much in demand to consolidate the momentum to enable
the web accessible by everyone by establishing standards, like structural languages
(html, xml), presentation languages (css, xsl), object models (dom), scripting
languages (javascript). Recreation of brick-and-mortar feel is one of the main
concern for the retailers who are moving from brick-and-mortar to online sales, and
always need to consider how they are going to transfer the “feel” of their store to the
internet. It is observed that users look straight at the content and ignore the navigation
areas when they scan a new page. It is suggested that navigation elements should be
removed from websites and replaced with content, which is what users are really
looking for.
Virtual Shopping
The biggest hurdle in online shopping faced by the customers is lack of opportunity to
physically verify the suitability of the product for his or her needs. In some category
of products it becomes almost impossible to make a decision based on the passive
display of product. Innovations in these directions are aimed to remove this hurdle
and some of the sites have shown a path to resolve this problem. For example
boo.com, an international fashion and sports store allows customers to “try on”
clothes and see them from all angles in 3D The boo.com also offers miss boo, a
“virtual personal shopper and futuristic fashion guru”, who will help you with any
question you have about products or services offered. Similarly landsend.com
provides a virtual model, which can be configured to the same body type, hair color/
style, and skin tone as the customer. A very interactive shopping experience is
enabled by iMedium, a company that developed See! Commerce technology with
products See! Catalog and See! Mail. These technologies, are direct response
applications that allow merchants and retailers to offer their customers an interactive
shopping experience based upon scenes, photos or pictures that contain embedded,
contextual advertising and merchandising links. The approaches that allow customers
to see the products in real time before they purchase are starting to be used to
enhance shopping experience. Gallery Furniture Inc. and FAO Schwarz are two of
the companies using this technology.
Personalization on the Web takes two basic forms: collaborative filtering and profiling.
Both are the attempts to collect specific information that will be valuable to
generating additional traffic, click-troughs, and revenue on Web sites. Collaborative
filtering is voluntary. It takes information provided by the user and predicts what
information will be of interest to him or her. It can also compare a user profile with
those of other users to create common-interest groups and make recommendations
based on other customer preferences. In profiling, a visitor’s actions are observed
and gathered through the use of a cookie, a unique identifier for that customer.
Subsequent user clicks identify patterns of behavior and interests, which result in the
presentation of specific information to Web sites visited. There is also the ability to
allow the collection of information on an individual’s cookie across multiple sites.
CPEX (customer profile exchange) is a new standard for how customer information
is gathered and used. The standard is being developed by a group of large companies,
including Compaq and oracle.
12
Standard for e-commerce
A need for a standard in e-commerce has been recognized and the standard for
Internet commerce was developed by global information infrastructure (GII) in
association with Ziff Davis. The Commerce Standard is a codification of best
practices in Internet commerce developed by a community of world-leading thinkers
and practitioners; it specifies the merchant practices and policies that lead to high
levels of customer satisfaction, service, security and privacy. The Standard for
Internet Commerce meets five primary needs. Together these five needs make it
crucial that the Commerce Standard is developed and implemented at this time. The
Standard for Internet Commerce is needed:
20.9 SUMMARY
Multimedia, wireless networks, convergences define the new focus of ICT. Today’s
converged network combines voice services with packet networks, using signaling as
the underlying technology to provide the independent control network that connects
the two. Whenever the issue of convergence is discussed in the context of
information technology it is essential to refer the convergence of information and
communication systems so that devices can be unified for different application
services.
13
20.10 UNIT END EXERCISES
1) It is said, “Information and communication are most of the time complementary
and sometimes supplementary to each other”. Elaborate!
2) What do you understand by competitiveness of ICT? Highlight the impact of
ICT for the developing nations with respect to the economic activities.
3) What are the hardware and software issues for the technology for
convergence? Also explain what do you understand by soft switched-based
applications?
4) What are the standardized protocols for call control and media mapping in
network multimedia communications over packet-based networks? Describe
them!
5) Write a detailed note on emerging trends in convergence of it and consumer
electronics.
6) Briefly describe the modern practices and emerging trends related to
technology, design and security issues involved in e-commerce.
14
MS-07
Management Programme
ASSIGNMENT
SECOND SEMESTER
2018
Course Code : MS - 07
Course Title : Information Systems for Managers
Assignment Code : MS-07/TMA/SEM - II/2018
Coverage : All Blocks
Note : Attempt all the questions and submit this assignment on or before 31st October, 2018 to
the coordinator of your study centre.
1. How do technological advances affect the spread and use of the Internet? What industries
should pay close attention to efforts to regulate the Internet?
2. Describe the role of functional information systems. Also, discuss the managerial and
strategic applications in the Accounting and Finance area or Human Resources
Management areas that are supported by IT.
3. Is information technology as vital to modern global business as money? Why or why not?
Describe the capabilities expected of information systems in modern organizations.
4. Define data mining and list some of its typical characteristics. Discuss some ethical issues
related to data mining.
5. What are the major benefits of neural networks? Discuss some recent popular
applications of Artificial Neural Networks (ANNs).