Management Information System
Management Information System
Information is the basis for every decision taken in an organization. The efficiency of
management depends upon the availability of regular and relevant information. Thus it is
essential that an effective and efficient reporting system be developed as part of accounting
system. The main object of management information is to obtain the required about the operating
results of an organization regularly in order to use them for future planning and control.
The old techniques like intuition, rule of thumb, personal whim and prestige, etc. are now
considered useless in the process of decision taking. Modern management is constantly on look
out for such quantitative and such information, which can help in analyzing the proposed
alternative actions and choosing one as its decision. Thus, modern management functions are
information-oriented more popularly known as “management by information”. And the system
through which information is communicated to the management is known as “management
information system (MIS)”. The management needs full information before taking any decision.
good decisions can minimize costs and optimize results. Management information system can be
helpful to the management in undertaking management decisions smoothly and effectively.
2. Information: information, in MIS, means the processed data that helps the management
in planning, controlling and operations. Data means all the facts arising out of the
operations of the concern. Data is processed i.e. recorded, summarized, compared and
finally presented to the management in the form of MIS report.
3. System: data is processed into information with the help of a system. a system is made up
of inputs, processing, output and feedback or control.
Thus MIS means a system for processing data in order to give proper information to the
management for performing its functions.
CONCEPTUAL VIEW OF MIS
The concept is a blend of principles, theories and practices of management, information and
system giving rise to a single product called MANAGEMENT INFORMATION SYSTEM.
The concept of management gives high regard to the individual and his ability to use the
information. MIS gives information through data analysis. While analyzing the information, it
relies on many academic disciplines like management science, OR, organization behavior,
psychology, etc.
The foundation of MIS is the principles of management and its practices. MIS uses the concept
of management control in its design and relies heavily on the fact that the decision maker is a
human being and is a human processor of information.
A MIS can be evolved for a specific objective it is evolved after systematic planning and design.
It calls for an analysis of business, management views and policies, organization culture and the
management style.
The MIS, therefore relies heavily on systems theory. The systems theory offers solutions to
handle complex situations of the input and output flows. it uses theory of communication which
helps to evolve a system design capable of handling data inputs, process, the outputs with the
least possible noise or distortion in transmitting the information from a source to destination
WHO ARE THE INFORMATION USERS?
• Managers
The idea of using the computer as a management information system was a breakthrough
because it recognized managers’ need for problem solving information. Embracing the MIS
concept made several firms develop applications specifically aimed at management support.
• Non-managers
Non-manages and staff specialists also use the MIS output.
• Persons & organizations in the firm’s environment
Users outside the company benefit from the MIS as well. They can be customers receiving
invoices, stockholders getting dividend checks, and the federal government checking tax reports.
Management Levels
Strategic Planning Level
The strategic planning level involves mangers at the top of the organizational hierarchy. The
term strategic indicates the long-term impact of top managers’ decisions on the entire
organization. The term executive is often used to describe a manager on the strategic planning
level.
Management Control Level
Middle-level managers include regional managers, product directors, and division heads. Their
level is called “management control level” due to their responsibility of putting plans into action
and ensuring the accomplishment of goals.
Operational Control Level
Lower level managers are persons responsible for carrying out the plans specified by managers
on upper levels. Their level is called the “operational control level” because this is where the
firm’s operations occur.
Influence of Management Level on Information Source and Form
When designing information systems, it is important to consider the manager’s level. Such levels
can influence both the source of information and how it is presented. Managers on the strategic
level place greater emphasis on environmental information than do managers on the lower levels.
Managers on the operational control level regard internal information as vital. The second figure
shows that strategic planning-level managers prefer information in a summary format, whereas
operational control-level managers prefer detail.
Business Areas
Managers are found in various business areas of the firm. The three traditional business areas are
marketing, manufacturing, and finance in addition to other two areas that have gained major
importance-human resources and information services.
What managers do
According the French management theorist, Henri Fayol, managers perform five major
functions.
• They plan what they are to do
• They organize to meet the plan.
• They staff their organization with the necessary resources.
• They direct the available resources to execute the plan.
All managers perform these functions, however with varying emphasis as shown below.
Management Knowledge
• Computer literacy
This knowledge includes an understanding of computer terminology, a recognition of its
strengths and weaknesses, an ability to use the computer ..etc
• Information literacy
A manager should also have information literacy which consists of understanding how to use
information at each step of the problem solving process, where this information can be obtained
from, and how to share information with others.
Information literacy is not dependent on computer literacy. A manager can be information
literate but computer illiterate.
The organization that uses MIS is able to record ,process, route & tabulate all important
business transactions. As & when need arises the organization is able to incorporate the
needed changes & improvements in the area of concern.
MIS facilitates informed DECISION MAKING. It usually represents a number of options
from which one can choose the best.
The top management ANALYSES whether its resources are being utillized optimally.
A TWO WAY COMMUNICATION FLOW is greatly enhanced by the MIS. The
management freely tells the job v responsibilities to its employees. The employees in
return discuss their doubts & grievances.
MIS supports the planning & controlling function of managers in the organization.
Managers use past/historical data as well as the current data to analyze the performance
& hence apply controlling measures.
MIS encourages DECENTRALISATION in the organisation. Decentralizations possible
when there's a system to measure operations at the lower levels.
It brings COORDINATION. It facilitates integration of specialized activities by keeping
each department aware of the problems & requirements of other departments. Hence, in
some way MIS keeps the organization binded.
Information systems differ in their business needs and the information varies depending upon
different levels in organization. information system can be broadly categorized into following :
The information needs are different at different organizational levels. Accordingly the
information can be categorized into following:
Strategic information
Managerial information
Operational information.
Transaction Processing Systems
1. It assist lower management in problem solving and making decisions. They use the
results of transaction processing and some other information also.
2. An important element of MIS is database.A database is a non-redundant collection of
interrelated data items that can be processed through application programs and available
to many users.
12
1. These systems assist higher management to make long term decisions. These type of
systems handle unstructured or semi structured decisions. A decision is considered
unstructured if there are no clear procedures for making the decision and if not all the
factors to be considered in the decision can be readily identified in advance.
2. A decision support system must very flexible.
3. The user should be able to produce customized reports by giving particular data and
format specific to particular situations.
Decision-support Systems
Systems that combine data, models and analysis
tools for non-routine decision-making
Management-level Systems
Sales region Production Cost analysis Pricing / Contract cost
analysis scheduling profitability analysis
analysis
Sales and Manufacturing Finance Accounting Human
Marketing Resources
13
Used by top level (strategic) management. They are designed to the individual. They let the CEO
of an organisation tie in to all levels of the organisation. They are very expensive to run and
require extensive staff support to operate.
Executive Support Systems
Systems that support non-routine decision-making
through advanced graphics and communications
Strategic-level Systems
5-year sales 5-year operating 5-year budget Profit Personnel
trend plan forecasting planning planning
forecasting
Sales and Manufacturing Finance Accounting Human
Marketing Resources
14
One study identified ten different roles for managers. The roles were categorised into three
groups to form an integrated view of what senior managers do. The interpersonal roles of
figurehead, leader and liaison stem from the manager's formal authority. The informational roles
of monitor, disseminator, and spokesman derive from the manager's interpersonal contacts. In
this role the manager emerges as the "nerve centre" of the organisational unit . The decisional
roles of entrepreneur, disturbance handler, resource handler and negotiator arise from the
manager as the formal authority of the organisational unit who can commit the unit to
action. This approach to managing acknowledges the action-oriented, outward-looking and
ritualistic aspects of managerial work as well as managers' strong preferences for verbal media in
finding information.
Another study of managers at work identified three major processes in which they are engaged (:
agenda setting, network building and implementing their agendas through networks. The key
challenges for general managers reflect the information and people oriented demands of these
three processes: "figuring out what to do (making decisions) in an environment characterised by
uncertainty, great diversity, and an enormous quantity of potentially relevant information" and
"getting things done (implementation) through a large and diverse group of people despite
having relatively little control over them" .
Networking is a feature of another view of managerial work . Three other categories of activity
developed from the research of managers and their subordinates were routine communication,
traditional management and human resources management. Networking includes interaction with
outsiders and socialising/politicking inside and outside the organisation; routine communication
activities include exchanging information and handling paperwork; traditional management
activities consist of planning, decision making and controlling; and human resource management
includes motivating/reinforcing, disciplining/ punishing, managing conflict, staffing and
training/developing. This study distinguished between successful and effective managers,
between those who are promoted and those who have "satisfied, committed subordinates and
produce organisational results". Networking had the strongest relationship with success, whereas
routine communication had the strongest with effectiveness. The type of activity with the
weakest relationship with success is human resource management and with effectiveness the
weakest is networking.
The final study considered here explores the work of middle managers. It suggests that managing
relationships, finding innovation, creating a mindset and facilitating learning are integral to
creating competitive advantage. The study of middle managers focussed on strategy formation, a
process that moves away from the overly rational, command and control model of strategy as a
two stage process of formulation and implementation and has "more to do with learning than
planning" . Four distinct roles for middle managers in strategy were identified: championing
strategic alternatives; synthesising information; facilitating adaptability; and implementing
deliberate strategy. By engaging in these roles, middle managers link strategic purpose and
organisational action.
These studies of managerial work range across managers at different levels in organisations from
senior management to middle management. They also span different kinds of organisational
structures from the more traditional hierarchies to post-entrepreneurial organisations with leaner,
flatter structures and participative, team-based work units.
DATA-FLOW DIAGRAMS
Specific elements included on data-flow diagrams (DFDs) include outside units such as customer
needs, inside units such as the employees who actually manipulate data, and whether a data
element inputs to an element or reads from an element. Data storage areas are also indicated on
DFDs. Data-flow diagrams can be designed to illustrate existing processes as well as to
document better and even ideal situations. Each type of element is denoted within a prescribed
symbol (e.g., rectangles signify outside units) so that a simple glance at the chart is enough to
differentiate each element.
DFDs are helpful in that they show exactly how data flow is initiated and by whom, who or
which system receives the data, and what they do to the data. Diagrams can also be annotated to
show the volume and frequency with which these changes occur. However, data-flow diagrams
do not show specific processing details, nor are they a helpful representation of how the process
fits onto a timeline.
External Entities
It is normal for all the information represented within a system to have been obtained from,
and/or to be passed onto, an external source or recipient. These external entities may be
duplicated on a diagram, to avoid crossing data flow lines. Where they are duplicated a stripe is
drawn across the left hand corner, like this.
The addition of a lowercase letter to each entity on the diagram is a good way to uniquely
identify them.
Processes
When naming processes, avoid glossing over them, without really understanding their role.
Indications that this has been done are the use of vague terms in the descriptive title area - like
'process' or 'update'.
The most important thing to remember is that the description must be meaningful to whoever
will be using the diagram.
Data Flows
Double headed arrows can be used (to show two-way flows) on all but bottom level diagrams.
Furthermore, in common with most of the other symbols used, a data flow at a particular level of
a diagram may be decomposed to multiple data flows at lower levels.
Data Stores
Each store should be given a reference letter, followed by an arbitrary number. These reference
letters are allocated as follows:
In order to avoid complex flows, the same data store may be drawn several times on a diagram.
Multiple instances of the same data store are indicated by a double vertical bar on their left hand
edge.
In decision support, we are typically interested only in “sufficiently difficult” decision problems,
which are “worth” approaching in an organised and systematic manner and which have
sufficiently “important” consequences. In other words, it should make sense to collect
information about these problems, think and discuss about the possible solutions, and in general
support the process with some method, computer program or information system. It is also
important to understand that it is possible to effectively support only decision problems and
processes that are sufficiently well understood. When approaching a problem, we have to know
what exactly we are deciding about, what are the goals and what are the possible consequences
of the decision, we should at least partly know the alternatives and their properties, we have to be
aware of possible uncertainties, etc.
Decision problems can be classified along different dimension. One classification is into routine
and non-routine problems, which often implies a considerable difference in difficulty. Routine
decisions are taken frequently and repeatedly. The decision maker typically knows them well and
feels familiar with the problem. All key factors, consequences and uncertainties are well
understood and under control. Such decisions are usually easy. In contrary, non-routine decisions
tend to be more difficult, particularly because of the lack of knowledge and experience in taking
such decisions. Often, non-routine decisions are risky and have important consequences.
With respect to frequency, decision can be one-time or recurring. Although there is some overlap
with the previous classification, the frequency dimension is important because it largely
determines the focus of the decision-making process. With one-time decisions, the emphasis is
on the decision itself: the goal is to find and implement the best alternative. The process ends
when the alternative has been chosen (or implemented in some cases). From decision-support
perspective, this usually requires the use of methods for the evaluation and analysis of
alternatives, and the use of general-purpose decision support software. With recurring decisions,
the focus usually shifts to finding the most effective method or procedure for choosing
alternatives. Although it is still important to find the best alternative each time, it is often more
important to implement an effective decision-making process.
From decision-support perspective, this often requires to design and implement dedicated
decision support software. Another classification considers the number of criteria, which are
taken into account when assessing alternatives. Single-criterion (or single-attribute) methods
take into account only one criterion, most often some monetary value, such as profit or income.
Many well-known decision analysis tools, such as decision tables and decision trees in their
basic forms, consider only one criterion. However, most real-life decisions depend on multiple
criteria; for example, in addition to return of investment (a single criterion), we may also want to
consider the increase of market share and employment generated by the investment. The
corresponding decision analysis methods are called multi-criteria or multi-attribute. Uncertainty
refers to a state of limited knowledge or information so that something is unknown or is not
perfectly known [6]. Uncertainty occurs whenever there are external factors that influence the
decision, but are beyond the control of the decision maker and are unknown to the decision
maker at the time of decision. With respect to uncertainty, decision problems are classified in
decision theory into :
• Decisions under certainty: Here, the decision maker has all the necessary information about
alternatives and the consequences of decisions are certain and accurate.
• Decisions with risk: The decision maker does not know the true value of external factors
(“state of nature”) for certain, but he can quantify his uncertainty through a probability
distribution of possible outcomes.
• Decision under strict uncertainty: The decision maker feels that he can say nothing at all
about the true “state of nature”. In particular, he cannot quantify his uncertainty in any way.
Depending on the number and role of participants in the decision-making process, we distinguish
between individual and group decisions. Individual decision problems typically involve a single
decision maker. Alternatively, they can even involve more participants, provided that they have
the same goals and decide “as one”. In group decision-making processes, there are several
individuals or groups that have different and often conflicting goals. In the latter case, decision
support aims at resolving the conflict and finding the common solution, either by consensus or
leverage.
For decision support in organisations, there is a very important categorisation of decision
problems based on the nature of the decision to be made and the scope of the decision itself .
The nature of decision is represented with three categories referring to the level of structure
of decision problems (Figure 2):
• Structured decisions: These are all decisions for which a well-defined decision-making
procedure exists. This means that all inputs, outputs and internal procedures are known
and can be specified. Structured decisions can be left to a clerk or a computer.
• Semi-structured decisions: Here, the decision has some structured elements but cannot be
completely structured. We do not know how to specify at least one of the components (inputs,
outputs, internal procedures). Computers can provide a great deal of specific help. Most
organisational decisions are of this type.
• Unstructured decisions: Here, all decision components are unstructured. This may be because
the decision is so new, so complex or so rare that we have not studied them completely.
Computers can still help the decision maker, but only indirectly and with a low level of support.
Another dimension, scope, refers to the levels of management in an organisation (Figure 2):
• Strategic decisions affect the entire organisation, or a major part of it, for a long period of time.
In most cases, they are made at the upper level of organisational management.
Examples of strategic decisions are decisions about introducing a new product or service,
entering a new market, or reorganising the production.
• Tactical decisions affect a part of the organisation for a limited time into the future. Tactical
decisions are generally made by middle managers and take place in the context of previous
strategic decisions. Typical examples are related, for instance, to personnel management:
recruiting new employees and making expert teams.
• Operational decisions affects only current activities in an organisation; they have no or very
limited impact for a short period of time. Operational decisions are usually made by lower level
managers or non-managerial personnel. They are generally structured or semistructured.
Examples of operational decisions are whether to approve a loan to a client, or how to repair a
malfunctioned machine.
The scope of decisions importantly affects the characteristics of information required in the
process (Table 1). The understanding of information characteristics is an important factor for a
successful design and implementation of any decision support system.
Finally, let us mention single- and multi-stage decisions. In a single-stage decision process, there
is only one key decision to be made. In contrast, a multi-stage decision processes consist of
several related decisions, which can be taken sequentially or in parallel. Actually, the distinction
between sequential and parallel decisions is sometimes difficult, because any decision process,
even a single-stage one, consists of a series of other decisions. For example, when we encounter
a decision process, we have first to “decide” how to approach it: intuitively, impulsively, ad-hoc,
or in some organised way. We also have to “decide” which alternatives to take on board and
which goals to consider. Who are the decision makers and with whom to collaborate? Where to
get the relevant information? Which decision support method or computer program to use? And
finally, after we have chosen the alternative, we have to “decide” for action. Essentially, this
takes place as a decomposition of the decision process into a series of smaller and smaller
decision subprocesses. We seek for a sequence of decision subproblems that are sufficiently easy
to solve and can be combined together in order to solve the overall decision problem.
DECISION SUPPORT METHODS
In this section we present three typical approaches to decision support and illustrate them
through examples: decision analysis, operational research, and decision support systems.
DECISION ANALYSIS
Decision analysis is popularly known as “applied decision theory” It is the discipline comprising
the philosophy, theory, methodology, and professional practice necessary to address important
decisions in an organised and formal manner. Decision analysis approaches a decision problem
systematically by structuring and breaking it down into smaller and possibly more manageable
subproblems. In doing that, it explicitly considers the possible decision alternatives, available
information, uncertainties involved, and relevant preferences of the decision maker. It also
attempts to formally represent these components and combine them in a form of decision
models, which are used to assess, evaluate and analyse alternatives. In principle, rational
decisions are proposed in this way. In the case of missing information and other difficulties,
decision analysis tries to provide decisions which are not optimal but “satisfactory” or
“sufficiently good”.
Usually, the decision analysis process proceeds in stages, such as:
1. identification of the decision problem
2. identification of alternatives
3. problem decomposition and modelling
4. evaluation and analysis of alternatives
5. selection of the best alternative
6. implementation of the decision
If necessary, the stages can be intermixed or repeated. The most distinctive stages of decision
analysis are the third stage, in which a decision model is developed, and the fourth stage, in
which the model is used to evaluate and analyse alternatives. Usually, the model is developed by
the decision maker using one of the many decision modelling methods or tools. If necessary, the
decision maker can consult experts, who provide information and experience about the decision
problem, and/or decision analysts, who give methodological advice and may even coordinate the
whole process. Typical decision modelling techniques include decision trees, influence diagrams,
and multi-attribute models
Let us illustrate decision analysis concepts through a hypothetical decision problem. John is an
economist who has just finished his MBA studies. He got four job offers from four companies,
called A (a manufacturing company), B (banking), C (consulting), and D (information
technology). John wants to take into account four important factors: location, salary, relation to
management science (which he particularly likes), and long term prospects of the job. He wants
to formalize these factors and use them to assess each job offer.
Preference relations are conveniently represented in a comparison matrix (Table 2). In order
to avoid comparing each alternative with itself, and to compare each pair of alternatives only
once, more than half of the table is greyed-out and should be left empty. In the remaining
cells, we enter 1, 0, or –1. The number 1 indicates that we prefer the alternative written in the
first column over the alternative in the first row. The number –1 also indicates the strict
preference, but in the reverse order. The number 0 indicates indifference.
The next possible step is to look at job offers in more detail and consider their positive and
negative aspects. Table 3 illustrates a simple qualitative comparison method called pros and
cons analysis . In the table, good things (“pros”) and bad things (“cons”) are identified
about each alternative. Lists of the pros and cons are compared one to another for each
alternative. The alternative with the strongest pros and weakest cons is preferred. Pros and
cons analysis is subjective and is usually suitable for simple decisions with few alternatives
(2 to 4). It requires no mathematical skills and can be used without computers.
For this reason, one of the fundamental characteristics of computer programs is their ability to
branch: programs contain instructions that “switch” between branches composed of other
sequential instructions. All instructions are (in principle) pre-defined by the programmer,
however the branching occurs while the program is running, depending on the current state
ofcthe program and data available to the program. In this way, the program dynamically chooses
between different courses of actions. Externally, this appears as an ability of the computer
tocadapt and makes decisions.
For example, let us consider a very simple mathematical operation: division of two numbers say
x/y. This operation makes sense only if y≠0. Therefore, even in this very simple case, the
computer must “decide” whether to carry out the division or not. Before each division, the
computer must check the value of y. If y=0, it should not make the calculation, but rather issue
some message to the user or perform some other corrective action. Otherwise, the division is
possible and the program should calculate the result. In a computer programming language, these
instructions may be formulated as follows:
Every computer program contains instructions like these. Even though instructions are explicitly
specified by the programmer and their execution is deterministic (fully predictable), we can
gradually add more and more instructions and combine them into complex branching sequences.
In this way, we can create computer programs that exhibit very complex behaviour, even to the
point that is often referred to as “intelligent”: intelligent control systems, intelligent agents, game
playing programs, etc. For example, chess-playing programs are already capable of
outperforming most human players, including the world chess champion Among “intelligent”
computer programs, there is a particularly interesting class of programs which are able to
“learn”. These programs either observe their own performance or monitor some data generated
through performance of other systems. Based on examples of successful or unsuccessful
performances, machine learning programs can find patterns that explain there a sons for such
behaviour, they can find rules that improve performance, or can even modify themselves (by
modifying their own operating instructions) to achieve better performance in the future. The
scientific discipline that is concerned with the design and development of algorithms that allow
computers to change behaviour based on data is called machine learning .
Autonomous vehicles provide good examples of advanced decision systems. In order to explore
the surface of Mars, two Mars Rover vehicles were sent by the USA to that planet. The distance
between Earth and Mars is so large that it takes 12 minutes in average for a signal to travel that
distance. This makes it almost impossible to steer the vehicle from Earth. Therefore, Mars
Rovers were designed as highly autonomous vehicles, which were receiving basic commands
from the Earth, but were also capable to navigate challenging and unknown terrain, investigate
targets, and detect scientific events.
Another example, which is currently at the borderline of decision systems, is related to the
DARPA Urban Challenge, a prize competition held in 2007. The requirements were to build a
fully autonomous vehicle, which must be entirely autonomous, using only the information it
detects with its sensors and public signals such as GPS, and which would be able to drive
autonomously between two given points in an urban area, obeying the driving laws. The main
event took place on November 3, 2007, on a course in California, which involved a 96 km urban
area course, to be completed in less than 6 hours. Six of 11 vehicles accomplished the mission,
what is considered a groundbreaking success.
The word “strategy” originates from the Greek word strategos, meaning “general.” In war, a
strategy is a plan to gain an advantage over the enemy. Other disciplines, especially business,
have borrowed the term. As you know from media coverage, corporate executives often discuss
actions in ways that make business competition sound like war. Businesspeople must devise
decisive courses of action to win—just as generals do. In business, a strategy is a plan designed
to help an organization outperform its competitors. Unlike battle plans, however, business
strategy often takes the form of creating new opportunities rather than beating rivals.
Although many information systems are built to solve problems, many others are built to
seize opportunities. And, as anyone in business can tell you, identifying a problem is easier than
creating an opportunity. Why? Because a problem already exists; it is an obstacle to a desired
mode of operation and, as such, calls attention to itself. An opportunity, on the other hand, is
less tangible. It takes a certain amount of imagination, creativity, and vision to identify an
opportunity, or to create one and seize it. Information systems that help seize opportunities are
often called strategic information systems (SISs). They can be developed from scratch, or
they can evolve from an organization’s existing ISs.
A Strategic Information System (SIS) is a system that helps companies change or otherwise alter
their business strategy and/or structure. It is typically utilized to streamline and quicken the
reaction time to environmental changes and aid it in achieving a competitive advantage.
1) Decision support systems that enable to develop a strategic approach to align Information
Systems (IS) or Information Technologies (IT) with an organization's business strategies
2) Primarily Enterprise resource planning solutions that integrate/link the business processes to
meet the enterprise objectives for the optimization of the enterprise resources
3) Database systems with the "data mining" capabilities to make the best use of available
corporate information for marketing, production, promotion and innovation. The SIS systems
also facilitate identification of the data collection strategies to help optimize database marketing
opportunities.
4) The real-time information Systems that intend to maintain a rapid-response and the quality
indicators.
Knowledge management systems also facilitate organizational learning and knowledge creation.
They are designed to provide rapid feedback to knowledge workers, encourage behavior changes
by employees, and significantly improve business performance. As the organizational learning
process continues and its knowledge base expands, the knowledge-creating company works to
integrate its knowledge into its business processes, products, and services. This integration helps
the company become a more innovative and agile provider of high-quality products and
customer services, as well as a formidable competitor in the marketplace. Now let’s close this
chapter with an example of knowledge management strategies from the real world.
It’s hard to place a value on knowledge management systems. Their ability to generate income is
often measured indirectly; their links to cost savings frequently seem tenuous. The return on
investment is hard to quantify. Too often, the case for implementing a system to leverage
intellectual capital and expertise rests mainly on intuition:
It seems like a good idea. But intuition wasn’t nearly enough to sell executives
at Intec Engineering Partnership Ltd., a company whose dedication to thrift is exceeded only by
its passion for sharing knowledge.
An engineering firm serving the oil and gas industry, Intec is headquartered in Houston with
offices throughout the world. As Intec grew through expansion and international acquisitions, it
became more difficult to keep track of and access information. In fact, according to KPMG
International, 6 out of 10 employees say difficulty in accessing undocumented knowledge is a
major problem. A group of Intec engineers volunteered to work on the problem of how to better
capture lessons learned and share knowledge among them. They diagrammed how they solved
engineering problems and envisioned an ideal process: An engineer with a question would go to
a knowledge database that would either provide an answer or refer him to an expert. All new
knowledge would be automatically captured and stored in the database. Intec shopped around
and selected software from AskMe Corp. as the product most likely to facilitate Intec’s problem-
solving model.
The pilot, called AskIntec, began in May 2002. Three months later, it had exceeded
all of the performance and user metrics, and ROI calculations projected an annual return
of 133 percent. After nearly a year, the system is paying off almost exactly as projected.
“Our numbers were pretty spot-on, but they’re going up,” says CIO Fran Steele, noting that the
company estimates payback of 50 percent more next year as nonengineering employees are
added and the system becomes embedded in the culture.
“Some of the return on information is not quantified just by how quickly you can do something,
but by the fact that you can do it at all,” says Steele. In the end, customers profit from Intec’s
knowledge management investment. “If we can cut weeks off a project and help them get their
facility ready earlier, they can get to market sooner and get that revenue earlier,” she says. That’s
the ultimate value. Source: Adapted from Kathleen Melymuka, “Knowledge Management Helps
Intec Get Smarter by the Hour,”
FOR INNOVATION
Introduce new products and services, put new features in existing products and services, or
develop new ways to produce them. Innovation is similar to differentiation except that the impact
is much more dramatic. Differentiation “tweaks” existing products and services to offer the
customer something special and different. Innovation implies something so new and different
that it changes the nature of the industry. A classic example is the introduction of automated
teller machines (ATM) by Citibank. The convenience and cost-cutting features of this innovation
gave Citibank a huge advantage over its competitors. Like many innovative products, the ATM
changed the nature of competition in the banking industry so that now an ATM network is a
competitive necessity for any bank. Eight ways that IT can introduce technological innovation
for competitive advantage are shown in foll. Table.
In the late 1990s innovation became almost synonymous with electronic commerce. The Internet,
especially, enabled dot-com entrepreneurs to create innovative Web-based business models, such
as Priceline’s name-your-ownprice model, Auto-by-Tel’s informediary model, and
Amazon.com’s affiliate program.
A key consideration in introducing innovation is the need to continually innovate. When one
company introduces a successful innovation, other companies in the industry need to respond to
the threat by attempting to duplicate or better that innovation. Especially in electronic commerce,
the visibility of technologies on the Web makes keeping innovations secret more difficult.
Porter's
Four Generic Strategies (Porter 1980)
According to Porter, competitive advantage grows out of the way an enterprise organizes and
performs discrete activities. The operations of any enterprise can be divided into a series of
activities The ultimate value an enterprise creates is measured by the amount customers are
willing to pay for its product or services. A firm is profitable if this value exceeds the collective
cost of performing all of the required activities. To gain competitive advantage over its rivals, a
firm must either provide comparable value to the customer, but perform activities more
efficiently than its competitors (lower cost), or perform activities in a unique way that creates
greater buyer value and commands a premium price (differentiation).
As per Borden 1964, quoted in Wiseman 1988many differentiation bases can be classified as 4
P’s as given below:
· product (quality, features, options, style, brand name, packaging, sizes, services,
warranties,returns);
· price (list, discounts, allowances, payment period, credit terms);
· place (channels, coverage, locations, inventory, transport); and
· promotion (advertising, personal selling, sales promotion, publicity).
The various attributes listed above can be sharpened the firms product by the support of a
suitable information technology. such as salespeople making sales calls, service technicians
performing repairs, scientists in the laboratory designing products or processes, and treasurers
raising capital. By performing these activities, enterprises create value for their customers.
Product differentiation and Value Chain
Product differentiation is the degree to which buyers perceive products from alternative suppliers
to be different. It is expressed by economic theory, the degree to which buyers perceive
imperfections in product substitutability. The buyers of differentiated products may have to pay a
price when satisfying their preference for something special, in return for greater addedvalue.
The connection between the producer and buyers may be reinforced, at least to the level of
customer loyalty, and perhaps to the point of establishing a partnership between them. Such a
relationship imposes 'switching costs' on the buyer, because its internal processes become
adapted to the beneficial peculiarities of the particular factor of production, and use of an
alternative would force internal changes. Hence product differentiation also serves as an entry
barrier. In addition, a continuous process of product differentiation may produce an additional
cost advantage over competitors and potential entrants, through intellectual property protections,
such as patents, and the cost of imitation.
The activities performed by a particular enterprise can be analysed into primary activities, which
directly add value to the enterprise's factors of production, which are together referred to as the
'value chain', and supporting activities.
Part of the relationship between technology and business models stems from the business model
concept’s roots in transaction cost economics (TCE). The sharp rise in cheap information
technology, bandwidth, and communication possibilities made it much easier for companies to
work in so-called value webs because coordination and transaction costs fell substantially.
Companies, in some cases even competitors, jointly offer and commercialize value to their
customers. That is, the business design choices for managers increased substantially based on
cheap and available information technology. This cost decrese led to industry boundaries
becoming increasingly blurred. The business model concept is a candidate to replace the industry
as a unit of analysis.
Consider iTunes Software/Website of Apple Computer a successful music downloading service.
The main role of this service is not only to sell music, but to enhance the company's sales of
iPods, a portable digital music player. Thus, in terms of industry sectors, this website includes
the software, online, hardware, and music industriesIn terms of business models this website
forms a whole set of business design choices that reinforce one another.
In the literature, the expression business models stands for various things, such as parts of a
business model (e.g. auction model), types of business models (e.g. direct-to-customer model),
concrete real world instances of business models (e.g. the Dell model) or concepts (elements and
relationships of a model).
The development of the digital economy and its contribution in development of e-business
models ; value-adding activities; consumer behavior and strategies for competitive advantage
among others is vital in modern business. The development of e-business has forced a review of
the value of traditional business models and focused attention on how ICTs, including the
internet, can be used as a basis for creating new types of business models and the strategies that
are built around them.
Many e-business model definitions feature an architecture for information flows that underpin
value added product or service delivery and a source of revenue (subscription, advertising, etc.).
Key components of e-business models typically comprise strategy, structure, business processes,
value chain and core competencies. Technology is another key feature that should be included.
Crucially, an e-business model differs from traditional models by emphasizing the technology
driven interactivity of key actors along the supply chain as a means of adding value, increasing
efficiency, and building new relationships with suppliers and customers and creating
partnerships. However, the development of e-business models has not been without its critics.
Porter (2001) noted that the empirical use of the e-business model concept was unclear and
lacked theoretical rigour.
Another effect of the digital revolution has been the evident convergence of industries and
technologies. Where once, industries such as telecommunications, broadcasting and computing
were separate sectors, now they have converged to provide a range of products and services that
rely on the overlap of activities and attributes that characterize each. For example, media content
in the form of video, audio or text-based products can be distributed via the internet, satellite,
cable, compact disc and accessed through different platforms such as television, home computer,
mobile wireless phone or PDAs among others. The convergence has not only been evident in the
technologies that support these industries, but also in the firms that supply the products and
services. Collaboration and consolidation have been key features of the global multimedia
industry with more and more market share being vested in fewer firms. Firms such as News
Corporation and Google have become increasingly powerful as they acquire ever-greater
influence in the supply of media products and services around the world. Other industries have
also been radically changed by the digital revolution such as financial services, travel, retailing
and logistics and distribution. All have acquired the types of hardware and software that helps
deliver better quality products and services faster, and often cheaper than ever before. Key to the
success of competing firms in the digital world is the creation of effective strategies for
competitive advantage.
In order to promote Confidentiality, you have several tools at your disposal, depending on the
nature of the information. Encryption is the most commonly thought of method used to promote
Confidentiality, but other methods include Access Control Lists (ACLs) that keep people from
having access to information, using smart cards plus pin numbers to prevent unauthorized people
into your building and looking around, or even explaining to your employees what information
about the company they can and cannot disclose over the phone. When information is read or
copied by someone not authorized to do so, the result is known as loss of confidentiality. For
some types of information, confidentiality is a very important attribute. Examples include
research data, medical and insurance records, new product specifications, and corporate
investment strategies. In some locations, there may be a legal obligation to protect the privacy of
individuals. This is particularly true for banks and loan companies; debt collectors; businesses
that extend credit to their customers or issue credit cards; hospitals, doctors’ offices, and medical
testing laboratories; individuals or agencies that offer services such as psychological counseling
or drug treatment; and agencies that collect taxes.
Information can be erased or become inaccessible, resulting in loss of availability. This means
that people who are authorized to get information cannot get what they need. Availability is often
the most important attribute in service-oriented businesses that depend on information (for
example, airline schedules and online inventory systems). Availability is the part of the triad
most administrators have to worry about at work, and with good reason. It's the most common,
and most visible, part of the security triad, and it is part of the job duties of just about every
administrator, even non-security based ones. It's mostly about system uptime for them, but it can
also cover subjects such as accidentally denying a user access to a resource they should have,
having a user locked out of the front door because the biometrics does not recognize his
fingerprints (False negative), or even major issues such as natural disasters, and how the
company should recover in case of one.
Threats
The potential for a threat source to exercise (accidentally trigger or intentionally exploit)
a specific vulnerability.
Threat-Source: Either (1) intent and method targeted at the intentional exploitation of a
vulnerability or (2) a situation and method that may accidentally trigger a vulnerability The
threat is merely the potential for the exercise of a particular vulnerability. Threats in
themselves are not actions. Threats must be coupled with threat-sources to become dangerous.
This is an important distinction when assessing and managing risks, since each threat-source may
be associated with a different likelihood, which, as will be demonstrated, affects risk assessment
and risk management. It is often expedient to incorporate threat sources into threats. The list
below shows some (but not all) of the possible threats to information systems.