1 - Business Information System..
1 - Business Information System..
Course Introduction
Course Objectives
1
2.3.2 System and Application software
2.3.3 Operating System
2.3.4 Managing Software Assets: New software tools and approaches
2.4 Managing Data Resources
2.4.1 Organizing Data in a Traditional File Environment
2.4.2 Database management
2.4.3 Designing Databases
2.5 Telecommunications and networks
2.5.1 The Telecommunication Revolution and Contemporary organization
2.5.2 Communications networks
2.5.3 Electronic Commerce and Electronic Business Technologies
Unit Summary
Feedback to Activities
Answer Key for Self-Test Exercises
2
5.1 Developing BIS
5.1.1 Redesigning in the Organization with Information Systems
5.1.2 Systems Development and Organizational Change
5.1.3 Alternative System-Building Approaches
5.1.4 Overview of Systems Development
5.2 Managing Resources
Unit Summary
Feedback to Activities
Answer Key for Self-Test Exercises
Glossary
References
Course Introduction
Hello Dear Distant Learners!
How are you doing?
Nice to meet you through this teaching material!
This course material is designed, assuming that you have a basic knowledge of computers and
management and/or business concepts. It is intended to acquaint you with role of information
systems and technology strategies in the modern enterprise with a focus on helping users apply
technology to achieve and maintain competitive advantage. The course is useful to equip you
with the use of systems to support business decision making. The material provides a deep
understanding of computerized systems hardware and software, networks, telecommunications
and e-business basics. The course will also provide hands-on introduction to basic database
software applications using MS Access.
Generally speaking, this study material is intended to cater to the needs of the learners in
understanding the essential concepts and knowhow of applying the ever growing Information
and Communication Technology in businesses. The course is to be delivered in one module,
which is divided into five units and different sections under each unit. The first unit deals with
the information system revolution and explains the transformation of business and
management to the technology arena. The second unit is about information technology and
3
organization. In the third unit we will learn about application of Business Information Systems in
organizations. Strategic advantage of information will be seen in the fourth unit. The final unit is
designed to teach you about management of information systems.
Within each unit, there are main sections designed in a chronological and logical order of
presentation. Each section within every unit consists of different subsections whenever
necessary. You will find activities and self-assessment questions those intended to evaluate the
understanding and rehearsing level of the learners. The answers and feedbacks to each activities
and self-assessment questions are provided at the end of the modules. I advise you to attempt all
questions by yourself before you resort to find the answers. The modules also contain
assignments for sub-missions. You have to allocate sufficient time for each part of the units.
Furthermore, I strongly recommend you to read the units and sections in their order of
appearance as it eases up your understanding about the subject matter. Similarly it is wise to take
notes during your study of the module and always try to answer by yourself all the activities and
self-assessment questions before referring to the answer or feedback. Have a pleasant
comprehension!
Course Objectives
This distance teaching material is envisioned to enable the learners to understand the
meaning and significance of Business Information Systems. It helps to comprehend apply the
various advanced technologies that assist in automating business operations and perform
decisions. The course is designed to teach you computer based information systems that assist
you in modernizing your business and there by boost the productivity and competitiveness of
the organization or unit that your mange.
The main objective of this material is to acquaint you dear learners with the design,
development, implementation, operation and maintenance of modern computer based business
information systems. It also provides the basic knowledge on transforming business organization
to exploit the various opportunities offered by Information and Communication Technology.
Moreover, the purpose of this module is to train the distance learners how an organization
enhances its productivity by exploiting the advance in computing hardware and software.
Similarly, this material is designed to teach the various applications of technology in boosting
the productivity of organizations. It also acquaints you the need to achieve strategic alignment
between business objectives and technology objectives to assure technology fit and support the
4
businesses strategy. Further, it also aims to teach you dear learners on the various techniques
applied in the management of information systems to enhance company’s investment in
technology and to minimize technology related risks.
5
UNIT ONE
Unit Introduction
Dear learners, welcome to the first unit of this course! This part is designed to introduce you
to the basic concepts of Business Information System [BIS]. It is all about the preliminary
issues of the subject matter. The unit introduces the meaning of BIS and contemporary
approaches to design BIS. In addition, it will provide information on the new role of
Information System in organizations and on the need to learn on the use of Information
Technology [IT] to exploit the new opportunities presented by technology.
It is likely that you are carrying or using an information system. This is so if you have an
advanced mobile phone, a handheld electronic device, or a laptop computer. Information systems
pervade almost every aspect of our lives. Whether you are withdrawing money from a bank’s
automatic teller machine or surfing the Web on your cell phone, hardly a day goes by without
our feeding data into, or using information generated by, an information system. In business
especially, digital information systems generate most of the information we use. These systems
have become essential to successful business operations.
Accordingly the focus of this unit will be up on; meaning and definition of BIS and their sub-
systems, the contemporary approached to design and operate information systems and their new
role, learning to use information systems to exploit opportunities and to manage technology
posed threats, concepts of information system resources and the different schools of thought
view toward the value of information.
On the whole this unit will give you a basic conceptual foundation for understanding the unique
characteristics of Business Information Systems and their role in enhancing the productivity of
6
contemporary organizations. Each topic is followed by relevant activity to be solved before you
proceed to the next topic.
Unit Objectives
After studying this unit, you should be able to:
know meaning and definition of Business Information System
Explain why information technology matters.
Define digital information and explain why digital systems are so powerful and
useful.
Explain why information systems are essential to business.
Describe how computers process data into useful information for problem
solving and decision making.
Identify the functions of different types of information systems in business.
Describe careers in information technology.
Identify major ethical and societal concerns created by widespread use of
information technology.
Section Overview
Businesses use the conceptual resource i.e information to manage and control the physical
resources of their organizations using business information system. This is because it is difficult
for managers to control every activity of the organization by being physically present in the place
of work. Therefore, information resource is one of the main areas that need the attention of
management like that of human, financial and material resources. According to Raymond
(1995), in today’s information age, the manager’s interest for information is perceived from two
major perspectives. The first is business organizations have become more complexes, which
compelled managers of organizations to process large volume of external and internal
information to cope up with changes taking place in their environment. The second is the growth
of computers in processing speed and memory capacity have enabled managers to use and sort
7
large volume of data to make organizational decisions and to manage their organizations more
effectively and efficiently than the managers of the industrial age. As a result, management
devises information systems to collect, store and process data to produce information about their
business’s operation.
Business Information System refers to the system that collect, store and process data to
produce information about the business useful for making various business decisions.
Business Information Systems can be manual or computerized Systems. The manual system is
made up of people that operate the system, procedures written to guide the people, the data
created by the businesses day to day operation, documents used to capture the data and physical
equipments used to perform data processing. Manual information systems are nowadays are not
able to cope up with the tremendous volumes of data created by the business. As a result,
companies are evolving their business information system towards computers. Computer based
business information systems are made of people, procedures, data and Information
Technologies.
It is important to distinguish between data and Information. Data is a raw fact or figure and can
take a form of a number or a date. Data is often meaningless or it does not provide knowledge to
make a specific decision. Information is a knowledge or meaning derived from data. It is a
processed or transformed data that empowers decision makers to make a particular decision.
Data: - is defined as "groups of non- random symbols which represent quantities, actions,
objects, etc". Data are symbols that will never be a complete representation of, or the same with,
reality, but they describe objects, events & their relationships incompletely. Data consists of
figures and facts that can take different forms such as images, text, or voice. Simple figures and
facts are meaningless to the user unless they serve a purpose. For processing purposes data items
are organized into data structures, file structures and databases.
8
Information is a representation that is relevant, timely, consistent, reliable, objective
understandable.
In general, processing is changing the raw material i.e. data to finished product i.e. information.
Refer to Figure 1.1. It is a simplified information system model. Data is the input that can be
processed either manually or using a machine, such as a computer, to obtain information for
decision purpose. Figure 1.1. also illustrates that data can be stored for future use. For example, a
personnel section stores the data of employees in personal files to use the data in the future for
promotion, termination or any other purpose. The data can also be stored in a diskette in a
computer system as a soft copy or in a filing cabinet as hard copy.
Data
Storage
Processing
Input (Information Output
(Data) Processor) (Informatio
n)
Defining System
A System is a set of two or more interrelated components or sub-systems which interacts each
other to serve a common goal or purpose. A system is an array of components that work together
to achieve a common goal, or multiple goals, by accepting input, processing it, and producing
output in an organized manner. Often, a system consists of several subsystems— components of
a larger system—with subgoals, all contributing to meeting the main goal. Subsystems can
receive input from, and transfer output to, other systems or subsystems.
System is defined as” a group of interrelated components working together toward a common
goal by accepting inputs and producing outputs in an organized transformation process". The
general definition of a system is that it is a group of interrelated components performing different
9
functions in a coordinated way to serve the common purpose of the system. Therefore,
organizations as systems have different components such as administration, finance, production,
marketing etc. that are working together towards achieving the overall organizational objective.
Systems can exist in different forms. Some can be abstract systems, which can deal with ideas,
beliefs or ethical values of society. Some can be natural systems, which can deal with natural
relationship. Natural systems include living systems and non-living system. Some can be
artificial systems, which are man-made systems such as organizations, computer systems, factory
systems, etc.
Systems are closed or open, depending on the nature of the information flow in the system. A
closed system stands alone, with no connection to another system: nothing flows in from another
system; nothing flows out to another system. An open system interfaces and interacts with other
systems. The systems that we discuss here are open systems. Interactions between open systems
take place through exchange of information, material, personnel, finance and energy. All
business organizations are open systems but all systems are not organization.
An open system is a system that interacts with other systems in its environment.
The application of the concept of system’s theory to business began around the year 1948 by
Norbert Wiener, and later got depth in 1966 by a biologist Ludwig von Bartalanffy. According to
the systems’ concept, all business and government organizations are open systems with the
following major characteristics discussed henceforth.
Environment: A system exists and functions in an environment. The environment in this context
is all the economic, political, social, and technological situations within which any open system
operates.
Subsystems and Supera System: A system has different components (parts) called subsystems.
A system can be a part of a larger system, which can be called a supera-system. The distinction
between system and sub-system is a matter of perspectives
Boundaries: Systems have Boundaries that allow us to differentiate one system from other
systems and allow us to separate from its environment to determine the scope of the system. The
10
boundaries of some systems can be clearly shown or defined. But for many systems, it is
difficult to draw clear lines to show the boundary of a system. Boundaries of systems are drawn
in abstract way based on their goals, objectives, functions and activities.
Interface: The other basic characteristic of an open system is that it interacts with other systems
in its environment. This is called interfaces. Interfaces occur at the boundary of a system
through the form of taking in inputs from, and giving out outputs to, the environment.
Inputs: A system has flows of information, material, personnel that enter the system from the
environment as inputs.
Processing:- the inputs undergo transformational processes within the system. Any open system
has components (subsystems) that transform the input resources into the output resources.
Output: - the processing component of a system combines and transforms the varieties of inputs
that entered the system to produce a new type of output with the higher value than the values of
the combined inputs. This output should be transferred to the other systems.
Feedback and Control: A complete system should have a feedback and control mechanism.
Feedback means getting internal and external information on one’s performance. An open
system without a feedback and control mechanism is like a person whose nervous system does
not properly function. Such systems do not stay long. An open system with feedback mechanism
has sensors that capture information on its performance and behavior from internal and external
sources. The controlling mechanism of the system measures the direction, intensity and the
extent of the feedback and compares it with established standards. The result of the comparison
can be either negative feedback or positive feedback. If it is positive feedback, the system
maintains and further improves its performance. If it is negative feedback, the system control
takes corrective actions and sends the appropriate instruction to the concerned subsystem to
reverse the entropy.
Entropy is defined as the deterioration of the performance of a system through time. Based on
the instruction from the control subsystem, the subsystem adjusts its action in line with the
systems expectation.
11
With an understanding of the terms “information” and “system,” the definition of business
information system is almost intuitive: an information system (IS) consists of all the components
that work together to process data and produce information. Almost all business information
systems consist of many subsystems with sub-goals, all contributing to the organization’s main
goal.
An information system (IS) can be any organized combination of people, hardware, software,
communications networks, data resources, and policies and procedures that stores, retrieves,
transforms, and disseminates information in an organization. People rely on modern information
systems to communicate with one another using a variety of physical devices (hardware) ,
information processing instructions and procedures (software) , communications channels
(networks) , and stored data (data resources). Information system can be defined as “a set of
people, procedure, and resources that collects, transforms and disseminates information in an
organization”. Organizations can depend on manual information systems such as using paper &
pencil or informal (word-of mouth) or computer based information systems such as using
computer hardware, software & people resources to transform data resources into information
products that can serve the need of the information user.
Activity 1
1 Mr. Alex produced 200 units of material X in ABC factory during May 2015. Does Mr. Alex’s
performance good or bad?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
2 Mr. Alex produced 200 units of material x in ABC factory during May. The budgeted units of output for
Mr. X is 250 units for May. Does Mr. Alex’s performance good or bad?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
3 Re-considering the first and the second questions and your answer. Which one do you think
represent data and which one represent information?
12
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
Section Overview
This section attempts to introduce the contemporary approaches that contribute towards the
existing information systems.
In this section we will examine the defining attributes of approaches that shape the contemporary
information systems applied in organizations. The study of information systems is a
multidisciplinary field. No single theory or perspective dominates. Therefore, there is a need to
take wider perspectives of disciplines that contribute to the problems, issues and solution in the
study of information systems.
Information systems are socio-technical systems. Though they are composed of machines,
devices, and “hard” physical technology, they require substantial social, organizational, and
intellectual investments to make them work properly. Therefore, this sections aims to introduce
the various approaches that shape modern day information systems.
13
In general, the contemporary approaches towards the study of information system can be divided
into technical and behavioral approaches.
For instance, sociologists study information systems with an eye toward how groups and
organizations shape the development of systems and also how systems affect individuals, groups,
and organizations. Psychologists study information systems with an interest in how human
decision makers perceive and use formal information. Economists study information systems
with an interest in understanding the production of digital goods, the dynamics of digital
markets, and how new information systems change the control and cost structures within the
firm.
The behavioral approach does not ignore technology. Indeed, information systems technology is
often the stimulus for a behavioral problem or issue. But the focus of this approach is generally
not on technical solutions. Instead, it concentrates on changes in attitudes, management and
organizational policy, and behavior.
Activity 2
14
1 What are the approaches toward the study of information systems?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
Section Overview
Until the 1960s, the role of most information systems was simple: transaction processing, record
keeping, accounting, and other electronic data processing (EDP) applications. Then another role
was added, namely, the processing of all these data into useful, informative reports. Thus, the
concept of management information systems (MIS) was born. This new role focused on
developing business applications that provided managerial end users with predefined
management reports that would give managers the information they needed for decision-making
purposes. By the 1970s, it was evident that the prespecified information products produced by
such management information systems were not adequately meeting the decision making needs
of management, so the concept of decision support systems (DSS) was born. The new role for
information systems was to provide managerial end users with ad hoc, interactive support of
15
their decision-making processes. This support would be tailored to the unique decisions and
decision-making styles of managers as they confronted specific types of problems in the real
world. In the 1980s, several new roles for information systems appeared. First, the rapid
development of microcomputer processing power, application software packages, and
telecommunications networks gave birth to the phenomenon of end-user computing. The
development and the use of Internets have brought a drastic change in the use of information
systems for global strategy and has revolutionised our information age from parochial thinking
of organisations and nations to global thinking of the “world as a small village”.
Businesses have seen much to achieve the current level of sophisticated use in business
information system. This section will introduce the evolution of business information systems in
organizations and identify the new roles of information systems.
Computers began after the 2nd world war and they were largely used to solve complicated
mathematical and scientific problems. During the early 1950s, managers were using manually
processed information to make decisions. The then manual information processing was
characterised by producing reports or getting information using typewriting, handwriting, word-
of-mouth, etc. The manual data processing was changed to machine-assisted data processing
such as using adding machines, calculators, etc. However, after the first commercial computer
was developed in 1951, electronic data processing replaced the machine-assisted data processing.
The first generation of computers was largely used for accounting applications such as order
processing, inventory data and customer accounts. Accounting tasks are routine and repetitive.
Hence, it was the accounting function of business where Computer Based Information System
was first applied.
Business grew in their sizes and activities, and data processing systems were not much helpful to
convert large volumes of accounting data to information. The Accounting Information System
was not a system to provide management with information for analysis, planning and decision
making activities. During that time, managers were overwhelmed with too much data and were
wasting much of their time in searching several pages of lists and tables to find relevant
information they need for decision.
16
To overcome the limitations of AIS, information specialists attempted to design information
systems useful for analysis, planning and decision-making activities. Particularly, the
improvement in the speed and memory capacity of computers in the early 1960s led information
specialists to assume the possibility of creating an integrated information system that could serve
all the functions of an organisation. However, there was misunderstanding between managers
and information specialists. On one hand, managers knew their jobs and the methods of solving
managerial problems without knowing how to use computers. On the other hand, information
specialists knew how to operate computers but they did not have the knowledge and the skill to
identify the information needs of managers.
Even if information specialists developed information systems believing their systems could
serve the purposes of management, managers could not accept the works of these information
specialists because the information systems were not designed based on the information needs of
managers. Later, managers started to explain their information needs to information specialists,
and the information specialists in turn started to learn “ the basics of management and how to
work with managers in designing information systems”. Eventually, Managers started to use
computer application for processing managerial information for decision-making. The new
system enabled managers to produce summary reports in a tabular form and to select data
relevant to the problem at hand. As the result, data processing, which is currently called
Transaction Processing System (TPS), grew to be the foundation of data preparation and
provision for MIS and other managerial information systems.
Today, the concept of BIS is a federation of subsystems developed and implemented as needed,
but conforming to the overall plan, standards, and procedures for the development of Information
Systems for organisational use.
17
In the mid 1960s, Database Management Systems (DBMS) software was developed to manage
large volume of data in an organisation. Later, around early 1970’s, Decision Support Systems
started and combined the reporting function of MIS, graphic displays & the problem solving
capabilities of management Science. In the 1980s, the introduction of personal computers
brought the realisation of Executive Information System (EIS), by which executives (Top level
Managers) can use computers to graphically display information needed for strategic decisions.
Around the mid 1980s, the Expert System (ES) started. Since then, Expert System has been used
to solve business problems. Expert system is the result of the rapidly growing field of computer
technology called artificial intelligence.
The development and the use of Internets in the 1990s have brought a drastic change in the use of
information systems for global strategy and has revolutionised our information age from
parochial thinking of organisations and nations to global thinking of the “world as a small
village”. The following diagram summarises the correlation of the evolution of the development
of information systems with the trend of increase in the capacity and power of computers.
Trend of power of
computers in relation
to time
19
1.3.2.3. E-business Support
The Internet and related technologies and applications have changed the ways businesses operate
and people work, as well as how information systems support business processes, decision
making, and competitive advantage. Thus, many businesses today are using Internet technologies
to Web-enable their business processes and create innovative e-business applications.
E-business is a generic-term that refers to all uses of advances in information technologies such
as Internet technologies to work and empower business processes, e-commerce, and enterprise
collaboration within a company and with its customers, suppliers, and other business
stakeholders. While e-commerce is a narrower term that refers to an electronic execution of a
business transaction.
In essence, e-business can be more generally considered an online exchange of value. Any online
exchange of information, money, resources, services, or any combination thereof falls under the
e-business umbrella. The Internet and Internet-like networks—those inside the enterprise
(intranet) and between an enterprise and its trading partners (extranet) — have become the
primary information technology infrastructure that supports the e-business applications of many
companies. These companies rely on e-business applications to (1) reengineer internal business
processes, (2) implement e-commerce systems with their customers and suppliers, and (3)
promote enterprise collaboration among business teams and workgroups.
Business Information System’s new roles include providing operational support, providing
strategy support and enabling e-business
Activity 3
1 What were the most common business uses of first generation computers?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
2 The World is now as a Small Village. What initiates the concept? How does it revolutionize our thinking
of organizations?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
20
3 What are the new roles of business information systems in organizations?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
Section Overview
Dear learners, nowadays the advance in information technology has presented an ever increasing
opportunity for those companies that moves early to exploit it. However, it is also presenting a
threat for those companies which lags behind in identifying the new opportunities of information
technology and exploit them. As a result, you as a business professional need to appreciate and
learn the use of Information Systems to exploit new opportunities. Accordingly, in this section
we will discuss the need to learn to use information systems.
IT is no longer the sole domain of IT professionals. Business professionals can no longer count
solely on IT specialists to make decisions on development, purchasing, and deployment of
information systems. Today’s business professionals are expected to know how to develop and
use IT significantly more than just a few years ago. Regardless of their major field of expertise,
those who have the proper IT knowledge and skills stand a better chance of receiving more
lucrative job offers and faster promotions.
We are accustomed to using 10 digits to represent quantities. We call it the decimal counting
system. However, we could also use a system consisting of only two digits, zero and one, to
represent quantities. This is the binary counting system. Because computers and related devices
use the binary system—a system that uses two digits—they are referred to as digital systems .
However, digital systems are not used only to represent information that contains numbers, or
quantities. They can also represent any information as combinations of zeroes and ones, or, more
accurately, the two states that represent zeroes and ones.
Digital information consists of zeroes and ones representing two states. When you have a
mechanism that can represent two states, such as electrically charged and uncharged elements,
magnetized and nonmagnetized areas, light and no light, you have a way to represent the zeroes
21
and ones. Based on such signals, information can be represented, stored, communicated, and
processed digitally.
An organization or individual that identifies more than one way to solve a problem or a dilemma
must make a decision. The problem “2 + 2 = ?” does not require decision making because it has
only one solution. However, as a manager, you might face a dilemma such as “Which is the best
way to promote the company’s new car?” There are many potential ways to promote the new car
—television advertising, radio advertising, newspaper advertising, Web advertising, auto shows,
direct mail, or any combination of these methods. This dilemma calls for decision making.
Both problem solving and decision making require information. Gathering the right information
efficiently, storing it so that it can be used and manipulated as necessary, and using it to help an
organization achieve its business goals—all topics covered in this book—are the keys to success
in business today. The purpose of information systems is to support these activities. In addition
to solving problems and making decisions, businesses use information systems to support daily
operations, such as electronic commerce, making airline reservations, and many other activities.
As a professional, you need to understand and apply information fundamentals to succeed.
Activity 4
1 Why do we refer computers and related devices as digital systems?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
2 Business use information to make sound decisions and to solve problems. What is problem? What kind
of problems requires individuals to make decisions?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
23
Section Overview
Dear learners, different types of information systems serve different functions—for particular
types of organizations, functions within organizations, business needs, and management levels of
an organization. Business enterprises differ in their objectives, structure, interests, and
approaches.
However, ISs can be generally categorized based on the level of a system’s complexity and the
type of functions it serves. ISs in business range from the basic transaction processing system
that records events such as sales to sophisticated expert systems, which provide advice and
reduce the need for the expensive services of a human expert. In recent years the capabilities of
many applications have been combined and merged. It is less likely that you will find any of the
following applications as stand-alone systems with a single capability. Managers and other
professionals plan, control, and make decisions. As long as a system supports one or more of
these activities, it may be referred to as a management information system (MIS) and the
individual systems performing a specific activity its subsystems. In this section we cover the
basic sub systems of business information systems.
24
activities and is linked to become one large IS providing information on any stage of a business
process is called supply chain management (SCM) systems.
Often, such systems are called enterprise resource planning (ERP) systems, because the
information they provide supports the planning of shipping resources such as personnel, funds,
raw materials, and vehicles. However, ERP is a misnomer for the systems, because they mainly
serve managers in monitoring and modifying business processes as they occur, and not only for
planning. The term “supply chain,” too, is somewhat misleading. Business processes do not
always take the form of a sequence; some processes take place in parallel. This is true in
manufacturing, where two or three teams work on different parts of a product, and in services,
where two or three different people peruse a document online and add their input to it within a
certain period of time rather than sequentially. In the production of goods and services, some
modules of SCM systems provide support to the major processes. These components include
human resources (HR) information systems and cost accounting systems.
ERP is an integrated enterprise application because the systems that support each business
process are connected to each other to form one large IS. Technically, anyone with access to the
system can know the status of every part of an order received by the business: whether the raw
materials have been purchased, which subassemblies are ready, how many units of the finished
product have been shipped, and how much money has been billed or collected for the order. HR
managers can tell which workers are involved in any of the processes of the order. Accountants
can use their module of the system to know how much money has been spent on the order and
what the breakdown of the cost is in labor, materials, and overhead expenditures.
Decision support systems help find the optimal course of action and answer “What if?”
questions. “What if we purchase raw materials overseas? What if we merge our warehouses?
What if we double our shifts and cut our staff?” These questions seek answers like, “This is how
this action will impact our revenue, or our market share, or our costs.” DSSs are programmed to
process raw data, make comparisons, and generate information to help professionals glean the
best alternatives for financial investment, marketing strategy, credit approval, and the like.
However, it is important to understand that a DSS is only a decision aid, not an absolute
alternative to human decision making.
Using ESs preserves the knowledge of retiring experts and saves a company the high cost of
employing human experts. After gathering expertise from experts and building a program, the
program can be distributed and used repeatedly. The expertise resides in the program in the form
of a knowledge base consisting of facts and relationships among the facts.
26
Activity 5
1 Which sub-systems of business information systems deals with recording data collected at the
boundaries of organization?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
2 Supply chain management systems are also called ERP Systems. What is an ERP system? Do you agree
the naming Supply Chain and ERPs express the potentials of such systems? ( Why? or Why not?)
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
Section Overview
Dear learners, information systems basically organizations to perform five activities and to
perform such activities they require four resources. The activities of information systems and the
resources needed to perform them are discussed here under.
27
2. Processing of data into information- this is the calculation, comparison, sorting, classifying
& summarising of data to prepare reports for management.
3. Output of information products – information products are video displays, paper with
messages, forms, reports, listings, graphics, etc.
4. Storage – Storage is retaining data & information in an organized manner for later use.
Stored data is commonly organized into fields, records, files & databases.
5. Control of system’s performance: inputs, processing output and storage activities an
information system are needed to be monitored & evaluated to determine the sequences of
operations or if the system meets established performance standards. Information security is
one aspect of the controlling activity that allows the organisation to control and protect its
database/information base. The Chief Information Officer (CIO) is responsible to decide the
access of information such as who should get what information.
1. Hardware resources – includes all physical devices and materials used in information
processing. It includes not only machines, such as computers and calculators, but also all data
media – that is, all tangible objects on which data is recorded- from sheets of paper to
magnetic disks, filing cabinets and paper trays are one form of hardware for manual data
storage.
2. Software resources – includes all sets of information processing instructions. Software
resources include Programs, which are the sets of operating instruction that direct, &
control computer hardware, and procedures which are the sets of information processing
instruction needed by people. This includes manuals that explain how to operate a computer
system or how to use an application software package. In manual information processing
there are instructions how to fill an application form or a material requisition form.
3. People resources – people resources refer to specialists & end users of information systems.
Specialists are people like system analysts, programmers and computer operators that
develop and operate information systems. End users are people like managers, accountants,
salespersons, engineers, clerks, customers that use the products of information systems.
4. Data Resources – managers & information systems professionals realise that data &
information constitute valuable organisational resources. For example, students name, region,
sex, entrance examination results, grades, etc are data resources that need to be stored in any
form for making different kinds of decisions on the performance of a student in his college
life.
28
Activity 6
1 Discuss the 5 major activities of a typical information system?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
2 Among the different business functions constituted in a company, which business function is
responsible to decide access to information?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
3 Information systems require different resources. Identify the typical resources required by
information systems to perform their basic activities.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
Section Overview
Dear learners, the values of Information can be measured in terms of quality or in terms of
quantity. Quality measures the subjective assessment and interpretation of specific information
an individual uses. However, in most cases it is difficult to measure information quantitatively
because, in reality, managers make decisions by dealing with many uncertain events, which are
difficult for accurate prediction, in the environment. In general, qualitative measure of
information relies on the level of satisfaction that a decision maker has on the information. In
this part we discuss what factors improve the quality of information from the perspective of the
decision maker.
29
1.7.1. Quality of Information
Quality of information depends on the subjective assessment of the individual who is using the
information. Since it is difficult to define what quality means, it is important to indicate some
aspects of quality of information in terms of the perception of the decision-maker. The decision
maker views quality of information in terms of utility, satisfaction created, and the extent of error
and bias inherent in the content of the information. The value of information decreases or
information becomes unimportant if it is outdated, inaccurate or difficult to understand. For a
manager, to attach a value of high quality, the information used should satisfy the following
qualities.
Timeliness: Information should be available for problem solving, before crisis situations get
out of hand or opportunities are lost. It is not enough to provide management with historical
or (backward looking) information and analysis. Though historical data are useful for
controlling purposes, forward information that indicates trends developing inside and outside
organisation must also be provided. To satisfy the quality of timeliness, information should
be up-to-date (current).
Accessibility: Information should be available at the time of need, and should be provided as
often as needed (frequency). Therefore, an information system can be designed to provide
information whenever a manager wants it (demand reporting), whenever specified conditions
occur (exception reporting) or at regular intervals (periodic reporting).
Security: Information of an organisation should be protected from unauthorised intruders,
from viruses designed to damage or distort the data resource of the organisation. Hence,
information systems should be designed with facilities, such as passwords, crucial to
maintain security of data and information resources of the organisation.
Accuracy: Ideally all information should be accurate or free of errors or bias. It is true that
most information obtained from the operational level of the organisation or information
obtained from activities involving money such as payroll, billing, and accounts receivable
can be 100% accurate. However, it is difficult to have 100% accurate information to make
strategic and tactical decisions. At the time of decision-making, managers allow a certain
margin of errors when they use long-range economic forecasts and statistical reports as
information.
Economical: the degree of accuracy of information increases as the organisation spends
more to obtain additional information. Therefore, managers need to balance between the cost
of obtaining information and the level of accuracy needed.
Relevancy- Information is relevant when it pertains to the problem at hand or to a specific
situation. The manager should obtain the needed information without searching a large
volume of information. One has to avoid unnecessary information, and the information
should be concise and to the point as much as possible.
Completeness: The manager should be able to obtain information that presents a complete
picture of a problem or a solution. Any information when presented should be clear and easy
to understand. Thus systems should not be designed that drown a manager in a sea of
30
information. The term information overload hints the problem created as a result of too much
information. The manager should be able to determine the amount of detail needed whenever
s/he deals with problems.
Activity 7
1 There are different approaches towards measuring the value of information. How do managers
ascertain the value of information? Which measure is easy to apply? (Why?)
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
2 Identify the factors that improve the quality of information from the perspective of a decision maker.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
UNIT SUMMARY
Businesses use the conceptual resource i.e information to manage and control the physical
resources of their organizations using business information system.
Business Information System refers to the system that collect, store and process data to
produce information about the business useful for making various business decisions.
Data is a raw fact or figure and can take a form of a number or a date. Data is often meaningless
or it does not provide knowledge to make a specific decision. Information is a knowledge or
meaning derived from data.
31
Information is a representation that is relevant, timely, consistent, reliable, objective
understandable.
A System is a set of two or more interrelated components or sub-systems which interacts each
other to serve a common goal or purpose.
An open system is a system that interacts with other systems in its environment.
Business Information System’s new roles include providing operational support, providing
strategy support and enabling e-business
A typical Information System will enable organizations to perform the 5 major activities i.e
input, process, storage, output and control activities using the 4 resources i.e., Hardware,
Software, People and Data.
Checklist
Now that you have completed the first unit, you need to check whether you have grasped the
concepts discussed in this unit. If your answer to the questions below is No, then you have to go
back and read the relevant sub-section again.
Accomplishments Yes/No
Can Know the meaning and definition of Business Information Systems
You Identify the features of manual and computerized Business Information Systems
32
Differentiate between data and information
Know the approaches that contribute to the problems, issues, and solution in the
study of information systems.
Distinguish contemporary approaches used in the design of information systems
Describe the evolution of information systems in organizations
Explain the new roles of information systems
Identify the opportunities of advances in IT
Explain the need to learn to use ISs
Identify the sub-system of an Information System
Explain the purpose of each of the sub-systems of information systems
Identify the different activities performed by an information system
Identify the Information system resources,
Identify the different vies in identifying the values of information
Explain the various dimensions used in measuring the value of information
Commandment!
So as to pass through this step, at least you have to accomplish or perform 90% of the above
requirements! If not, go back and get done the unfulfilled part!
1. Which one of the following best describes the system that collect, store, and process data
to produce information about the business useful for making various business
decisions?
A. Transaction Processing C. organization,
System, D. Information System,
B. Business Information System, E. None of the above.
2. Identify the incorrect component of a modern business information system?
A. People, D. Document,
B. Procedure, E. None of the above.
C. Data,
3. A system that interacts with other systems in the environment is best described as,
33
A. Open system, D. Supera System,
B. Closed system, E. None of the above.
C. Subsystem,
4. Which one of the following approach in the study of information system emphasize
mathematical based models to study information systems?
A. Technical, D. Socio-technical,
B. Behavioral, E. None of the above.
C. Contemporary,
5. In evolution of BIS, which of the following identifies its latest stage?;
A. Transaction Processing System,
B. Expert System,
C. Decision Support System,
D. Strategic Management Information System,
E. None of the above.
6. Which one of the following is not BIS’s new role?
34
Direction: Choose the best answer from the given alternatives
35
9. Intranet is a network that connects the internal networks of two different companies
where as extranet is an international network.
10. E-business is a generic term where as e-commerce is a narrower term.
36
Feed Back/Answer for Activity 2
1. The approaches towards the study of information system are two. The first one is the
technical approach that emphasizes on mathematical based models where as the second
one is the behavioral approach that emphasizes on behavioral issues that arise in the
development and long-term maintenance of information systems.
2. The emphasis of the technical approach is on mathematical based models derived from
computer science, management science and operations research.
3. The behavioral approach does not ignore technology. Instead it takes technology as the
stimulus for behavioral problem. But the focus of this approach is generally not on
technical solutions.
37
[ES] rely on artificial intelligence techniques to support knowledge intensive decision
making.
Feed Back/Answer for Activity 6
1. Information systems perform the following 5 typical activities. They let us to capture
and enter data as an input. They let us to store the data captured as an input. They
assist us to retrieve and process the data into information. They let us to display the
information as an output. Finally they enable us to provide adequate control regarding
data and information of the business.
2. Nowadays, a new business function called information system headed by Chief
Information Officer [CIO] is surfacing in business structure to deal with system
administration, computer operations, program development and maintenance. This
function is responsible to decide who shall have access to the computer system, to do
what and on which resources.
3. The typical resources required by information systems to perform their basic
activities are hardware, software, people and data.
Feed Back/Answer for Activity 7
1. The value of information can be assessed using qualitative aspects and quantitative
aspects. Qualitative aspects measure some attributes of the information like its
accuracy, timeliness, predictive value, relevance, verifiability, objectivity and so on.
However, quantitative measures aim to assign quantitative figures or monetary values
to the information.
2. The factors that improve the quality of information from the perspective of decision
makers include timeliness, accessibility, security, accuracy, relevance, and
completeness.
3. Information overload is the situation that arises when a decision maker is provided
with too much information. Information overload is as detrimental as providing too
few information. This is because when the decision maker tries to absorb the
information it will be tied up and reduces quality of decision.
38
39
UNIT TWO
Unit Introduction
Dear learners, welcome to the second unit of this course! This part is designed to acquaint you
to the development of Information Technology [IT] and its use in organizations. This unit is
about the constituents of modern computer systems: Hardware, Software and Information and
Communication Technologies. Dear students, as a management major, you may not need to
know the detailed history of the development of computer technology. In this unit, you are
going to read how computers perform the basic information processing activities.
Information Technology and organizations influence one another. Information systems are built
by managers to serve the interests of the business firm. At the same time, the organization must
be aware of and open to the influences of information systems to benefit from new technologies.
The interaction between information technology and organizations is complex and is influenced
by many mediating factors, including the organization’s structure, business processes, politics,
culture, surrounding environment, and management decisions. You will need to understand how
information systems can change social and work life in your firm. You will not be able to design
new systems successfully or understand existing systems without understanding your own
business organization.
Every computer system, either main frame computer or microcomputer' consists the hardware
and the software parts. Computer hardware is defined as “a system of interrelated components
that supports the basic system functions of input, processing, output storage & control" to
provide "end users with a powerful information processing tool”. Computer software is
sequences of instructions that direct the operations of the computer hardware to perform the
basic system functions. No computer system exists with having hardware but not software or
vice versa. An advanced computer system needs both computer and communication hardware
and software to effectively serve its purpose.
This chapter has five sections. Section one introduces the major trends in information
technology. Section two describes the major features of computer hardware, data representation,
40
classification and generations of computers. In addition, it discusses the major components of
computer hardware system in relation to the five major activities of information systems. Section
three discusses the two major types of software, which are the system software and the
application software. Section four introduces the management of data emphasizing on the file
based and database systems. Section five describes the communication network and discusses the
mechanisms of communication and the different types of topologies of computer networks.
Unit Objectives
After studying this unit, you should be able to:
41
• describe the trends in Information Technology
Section Overview
In the Technology Revolution we have seen the rapid adoption of many innovations including
mainframe computers, minicomputers, personal computers, networks, the Internet and World
Wide Web, assembly language, higher level languages, fourth generation languages, spreadsheet
programs, word processors, packaged programs, and Web browsers. In the Technology
Revolution, companies use IT as a new source of energy for processing and accessing
information. This technology helps the organization collect, store, retrieve, and apply knowledge
to solve problems; IT converts the raw material of information into useable knowledge. The
Technology Revolution, like the Industrial Revolution, has changed the economy, creating new
industries and ways of doing business.
The computer has been called "the machine that changed the world." We believe that information
technology has and will continue to revolutionize management.
42
Information Technology [IT], Information Systems [IS] and Information and Communication
Technology [ICT] are often used interchangeably in practice. Though their difference is subtle it
will be wise to distinguish among the three.
Computers process data (input) into information (output). Computers carry out processes using
instructions, which are the steps that tell the computer hardware how to perform a particular task.
A computer contains many electric, electronic, and mechanical components known as hardware.
These components include input devices, output devices, a system unit, storage devices, and
communications devices.
A computer often holds data, information, and instructions in storage for future use. Some people
refer to the series of input, process, output, and storage activities as the information processing
cycle.
ICT, in contrast is used to describe a group of computers that operate together via
communication hardware and software. Most computers today communicate with other
computers. As a result, communications also has become an essential element of the information
processing cycle. IT and ICTs are now a day’s used interchangeably. Information System [IS]
often used to describe an IT or ICT that is particularly applied in the day to day operations of
businesses or other forms of organizations.
An organization is a stable, formal social structure that takes resources from the environment and
processes them to produce outputs. This technical definition focuses on three elements of an
organization. Capital and labor are primary production factors provided by the environment. The
organization (the firm) transforms these inputs into products and services in a production
function. The products and services are consumed by environments in return for supply inputs.
Organizations are formal legal entities with internal rules and procedures that must abide by
laws. Organizations are also social structures because they are a collection of social elements,
43
much as a machine has a structure—a particular arrangement of valves, cams, shafts, and other
parts.
This definition of organizations is powerful and simple, but it is not very descriptive or even
predictive of real-world organizations. A more realistic behavioral definition of an organization
is a collection of rights, privileges, obligations, and responsibilities delicately balanced over a
period of time through conflict and conflict resolution.
In this behavioral view of the firm, people who work in organizations develop customary ways
of working; they gain attachments to existing relationships; and they make arrangements with
subordinates and superiors about how work will be done, the amount of work that will be done,
and under what conditions work will be done. Most of these arrangements and feelings are not
discussed in any formal rulebook.
Changing these elements can take a long time, be very disruptive, and requires more resources to
support training and learning. For instance, the length of time required to implement a new
information system effectively is much longer than usually anticipated simply because there is a
lag between implementing a technical system and teaching employees and managers how to use
the system.
Technological change requires changes in who owns and controls information, who has the right
to access and update that information, and who makes decisions about whom, when, and how.
This more complex view forces us to look at the way work is designed and the procedures used
to achieve outputs.
44
There are major trends that have drastically altered the way organizations use technology. These
trends make it imperative that a manager become familiar with both the use of technology and
how to control it in the organization. These trends are summarized as follows:
Activity 1
1 What contribution does the machine that changed the world has for business organizations and their
management?
45
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
3 Identify and list the major trends of Information Technology that have drastically altered the
way organizations use technology.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
Section Overview
At the core of any modern information system stands at least one computer. Few machines have
changed human life as radically as the computer, and few such complex machines have become
so affordable to so many businesses and individuals in such a short time. Because computers are
central to information systems and to business, to successfully implement ISs, you need to
understand them. Businesses have many hardware choices, ranging from types of computers and
memory devices to input and output devices. Understanding the capabilities of hardware and the
options available can save companies millions of dollars. This section provides you with the
knowledge to make intelligent decisions about computer hardware in your professional career.
46
A computer hardware is defined as “a system of interrelated components that supports
the basic system functions of input, processing, output storage & control" to provide
"end users with a powerful information processing tool”.
Dear students, do you know that computer hardware understand only electronic signals of binary
digits of 1 and 0 (“On” and “Off”)? Before you read the hardware parts, it is essential to grasp
some idea how data is represented in computer hardware.
In general, “Data is processed and stored in a computer system through the presence or absence
of electronic or magnetic signals in the computer circuitry or in the media it uses. The smallest
possible electronic data is a bit [binary digit] and it is represented by ‘on’ or ‘off’ in the
electronic system of the computer. This is called a binary or two-sate representation of data. The
‘on’ is symbolized by 1 and the ‘off’ is symbolized by 0. Each symbol in a binary number (one
or zero) is called a binary digit. The way to represent many different characters using only binary
digits is to take sets of 0s & 1s and establish a code such that a certain pattern of 0s & 1s
represent A, another pattern of 0s and 1s represent B, etc. In addition, a computer stores picture
by creating a grid overlay of the picture and it measures the light or colour in each box or cell
called pixel (picture element).
47
In this regard, we discuss two standard coding schemes that combine bits in definite patterns to
represent different characters.
American National Standard Institute (ANSI) developed this coding scheme. ASCII is a 7-
bit code allowing 27 or 128 different code combinations. Practically all computers use a set
of 8 bits to encode a character. ASCII itself, by adding an extra meaningless bit, fills the 7-
bits to an 8-bits space. ASCII coding scheme is used in almost all microcomputers and many
minicomputers.
IBM developed this coding system. EBCDIC is an 8- bit coding schemes used on many
minicomputers and almost all mainframe computers. Eight bits allows 28 or 256 possible
code combinations.
In both coding systems, we simply add a binary number one to the binary code of the previous
letter to get the code of the next letter or number. For example, to find the letter D in EBCDIC
binary code, simply add 1 to 11000011 (binary code of C) to find 11000100 (Binary code of D).
The following table shows the examples of the two coding systems to represent some of the
capital and small letters and some of the numbers.
Characters ASCII Coding EBCDIC coding
A 01000001 11000001
B 01000010 11000010
C 01000011 11000011
a 01100001 10000001
b 01100010 10000010
0 00110000 11110000
1 00110001 11110001
2 00110010 11110010
9 00111001 11111001
The memory capacity of a computer's primary storage and its secondary storage devices is
usually expressed in terms of bytes.
48
For example, if we read 1.44 MB on a floppy disk it is to mean that the floppy disk has a space
of one million and forty four thousand bytes or it can store one million forty four thousand
characters. In summary, 8 bits = 1 byte = 1 character. The relationship between bit, byte,
kilobyte, megabyte, gigabyte and terabyte is shown as follows.
8 bits = 1 Byte
Dear students, when we buy a computer, one of the spec (meaning specification) to look for is
the computers hard disk storage capacity and Random Access Memory (RAM) capacity. Both of
these crucial specs is measured in terms of bytes. For example, a Laptop with a good spec may
have a Hard disk capacity of 1TB and a RAM memory of 8 GB
Speed of a computer is measured by its ability to read millions of instructions per second. The
hardware measures machine cycle times in milliseconds, microsecond, etc. Machine cycle is a
series of operations that a computer performs to process a single instruction. The machine cycle
times have the following relationships.
1 1
Milli sec ond Second Micro sec ond Second
1000 ; 10000000
1 1
Nano sec ond Second Pi cos econd Second
1billion 1Trillion
For example, if a computer reads 200 millions of instructions per second (200 MIPS), then this
1
Second
means that the computer takes some 200 millions or 15 nanoseconds to read one
instruction.
1
The memory capacity measured in KB is approximated to 1000 Bytes, in MB is one million Bytes, GB is one
Billion bytes and TB is one Trillion bytes respectively.
49
2.2.2. Computer Generation and Trend: Time and Size in the Computer
The computers that we use today have not reached this stage at once. Due to the incessant effort
of computer and information system specialists, the processing speed and memory capacity of
information technology have improved through time to pass three distinct stages of computer
development and to attain the present stage of fourth generation computers.
1st Late 1940s to Vacuum tube, To solve Very large class Very Small Very slow Very High,
early 1950s rotating magnetic, complex room size 2KB RAM (up to 100 expensive generates
punched cards mathematical instructions great deal
and per second of heat
engineering
problems
2nd 1957-1963 Transistors, Used for Smaller than 1st 32KB Ram between Expensiv Medium,
magnetic core scientific and generation 200,000 to e generated
memory used for 300,000 (cheaper less heat
business instructions than the
purposes per second first)
3rd 1964-1979 Large Integrated Equally used Smaller than 2nd 2MB RAM Affordabl Failure rate
Circuits, Magnetic for scientific Generation e for significantl
core and magnetic and business governme y
tape for memory purpose nt and decreased,
business have their
organisati own
ons ventilation
system
4th 1980- Very Large Equally used Smaller than 3rd Gigabytes Gigahertz Affordabl Failure rate
Integrated Circuits, for scientific generation e for once in a
Ultra large scale and business governme year, have
integration, purpose nt, their own
semiconductor business ventilation
memory. and system
individual
s
In general, the trends of computers show that computers have continued to become smaller in
size, faster in processing speed, more reliable, larger in their primary and secondary memory
capacity, cheaper in price and more users friendly.
50
2.2.4. Classification of Computers
Computers may differ in their processing speed and memory capacity as well as in the number
and capabilities of peripheral devices they can support for input, output and secondary storage.
Peripheral devices are separate from but can be directly connected to and controlled by the CPU.
There are four main classifications of computers the first three of them in business use. They are
the microcomputers, minicomputers, mainframe computers and super computers.
a. Microcomputers – These are the smallest types of computers often called personal
computers (PC). As technology is advancing from time to time they are becoming more
and more powerful than the mainframe computers of the previous generations. These
types of computers started to be used during the fourth generation of computers
particularly during the early 1980s. Their primary storage capacity ranges from 256
kilobytes and currently passes 8GBs of semiconductor storage. They are in the form of
desktop and laptop computers. Processing speed is usually measured in Giga Hertz
(GHz) or Billions of Instructions per Second (BIPS). One gigahertz is equal to one billion
cycles per second. Around the year 2000, the processing speed of microcomputers ranged
between 133 MHz and 466MHz. Currently, the processing speed is in the range of
1000MHz and 3000 MHz. The microcomputers are common in Ethiopia and they are
largely used in many government offices and business organisations. Even today many
individuals in Ethiopia have their own microcomputers, price ranging between Birr 8,000
and Birr 12,000.
Micro computers include all Personal Computers that serve a single user at a time. Micro
computers include desktops, laptops and palmtops. Workstations are computers
considered as desktop but they are a little bit larger in size and have larger memory
capacity and faster processing speed. They are designed to process scientific, engineering
and design work that require powerful graphic and computational capability.
c. Mainframe computers – They are larger and more powerful than minis and
microcomputers. They usually have one or more central processors with faster
processing units. Mainframe computers can handle many peripheral devices such as
terminals and printers at the same time. For this reason, they can handle large number of
51
users that need simultaneous access to the central databases or users that need to use the
libraries of applications programs in time-sharing network. The processing speed of
mainframe computer ranges has passed tens of Giga Hertz of instructions per second.
Their prices are very expensive. They are largely used by major corporations and
government organisations, which have enormous and complex data processing
assignments.
d. Supercomputer is the largest computer with an extra ordinary computing power, which
is designed for high-speed numeric computations. A supercomputer is the fastest, most
powerful computer and the most expensive. Applications requiring complex,
sophisticated mathematical calculations use supercomputers. Large-scale simulations and
applications in medicine, aerospace, automotive design, online banking, weather
forecasting, nuclear energy research, and petroleum exploration use a supercomputer.
Any computer hardware system has five major components that perform the five activities of
information system. A computer contains many electric, electronic, and mechanical components
known as hardware. These components include input devices, output devices, a system unit,
storage devices, and communications devices.
52
2.2.5.1. Input Devices
An input device is any hardware component that allows you to enter data and instructions into a
computer. Five widely used input devices are the keyboard, mouse, microphone, scanner, and
Web cam.
A computer keyboard contains keys you press to enter data into the computer.
A mouse is a small handheld device. With the mouse, you control movement of a small symbol
on the screen, called the pointer, and you make selections from the screen.
A microphone allows you to speak into the computer. A scanner converts printed material (such
as text and pictures) into a form the computer can use.
A Web cam is a digital video camera that allows you to create movies or take pictures and store
them on the computer instead of on tape or film.
A computer keeps data, instructions, and information on storage media. Examples of storage
media are USB flash drives, hard disks, optical discs, and memory cards.
53
A storage device records (writes) and/or retrieves (reads) items to and from storage
media.
Drives and readers/writers, which are types of storage devices, accept a specific kind of storage
media. For example, a DVD drive (storage device) accepts a DVD (storage media). Storage
devices often function as a source of input because they transfer items from storage to memory.
A USB flash drive is a portable storage device that is small and lightweight enough to be
transported on a keychain or in a pocket. The average USB flash drive can hold about 4 billion
characters. You plug a USB flash drive in a special, easily accessible opening on the computer.
A hard disk provides much greater storage capacity than a USB flash drive. The average hard
disk can hold more than 320 billion characters. Hard disks are enclosed in an airtight, sealed
case. Although some are portable, most are housed inside the system unit.
Portable hard disks are either external or removable. An external hard disk is a separate,
freestanding unit, whereas you insert and remove a removable hard disk from the computer or a
device connected to the computer.
An optical disc is a flat, round, portable metal disc with a plastic coating. CDs, DVDs, and Blu-
ray Discs are three types of optical discs. A CD can hold from 650 million to 1 billion characters.
Some DVDs can store two full-length movies or 17 billion characters (Figure 1-5). Blu-ray Discs
can store about 46 hours of standard video, or 100 billion characters.
Some mobile devices, such as digital cameras, use memory cards as the storage media. You can
use a card reader/writer to transfer the stored items, such as digital photos, from the memory card
to a computer or printer.
There are two major types of storage devices in a computer system. The first type is the primary
storage usually called main memory, which is found near the central processing unit with
control unit and arithmetic and logic unit. The second type is the secondary storage, which
supplements the primary memory by storing end users' data or instructions permanently.
Primary storage has dual purposes. First, it is a place where data or instructions (programs) are
stored temporarily between processing steps or after processing is completed. Second, it is the
place where permanent computer operational instructions, written during the manufacturing of
the computer, are stored. The primary storage, often called main memory, is made up of
54
semiconductor chips (Circuits). The storage capacities of integrated circuits are measured in
megabytes (MB) or million bits of data. There are two parts of primary storage.
Random Access Memory (RAM): In this part of primary storage each memory position can be
sensed (read) and changed (written). However, RAM is a volatile memory because the data that
we write on it is not stored permanently; and if electric power is interrupted while we enter data
to the computer all the contents will be lost. This is why computer users are advised to save their
works frequently when they work on their data using a computer. In short RAM is useful to
store data and instructions (programs) temporarily during processing.
Read only Memory (ROM): In this part of memory we can read instructions and data that have
been stored at the time of manufacturing the computer. We cannot change these instructions and
data by writing over them. ROM is non-volatile because it contains permanent instructions and
data that cannot be erasable when the power is turned off. These permanent instructions are
part of the operating system that help the user to create, edit & copy files and others more
specialised activities. In general, the capacity of primary storage is continually increasing from
generation to generation of computer. The RAM capacity of the first generation of mainframe
computer was measured in kilobytes, but the RAM capacities of today’s microcomputers are
measured in Gigabytes.
In Direct Access Storage Devices data or instruction can be directly stored & retrieved by
selecting and using any of the location on the storage media. This is because each storage
position (1) has a unique address, and (2) can be individually accessed in approximately the same
time without having to search through other storage positions. For example, the primary storage,
RAM and ROM, is a direct access storage device. Other examples of secondary storage devices
55
are magnetic disk and optical disk storage. Magnetic disk storage is most common form of
secondary storage that can provide fast access and storage capacity at a reasonable cost.
Magnetic disk can be in the form of hard disk or floppy disk, or flash disk. Hard disks can be
removable or non-removable (fixed disks). Optical disk storage: –one of the example of optical
disk is CD ROM. CD-ROM (Compact Disk Read Only Memory) can store from 500 to 700
megabytes of data. The problem with optical disk storage devices is once data are recorded, it is
not possible for the end user to erase and alter the data. Another example is the DVDs (Digital
Video Disks), which have high capacity (minimum 4.7 GB) and useful to store high quality
motion pictures.
Sequential Access Storage Devices are devices in which data and instructions are stored or
retrieved sequentially or serially because they don’t have unique addresses. Hence they cannot be
individually accessed in approximately the same time like that of direct access storage devices.
An example of sequential access storage device is the magnetic tape. Magnetic tape storages are
large tape reels and cartridges used in mainframe & mini computers, and small cassettes or
cartridges used in microcomputers. The advantage of magnetic tapes is they can provide high
storage capacity, from 100 MB for microcomputers to billion of bytes for mainframe computers.
They are the cheapest storage devices of all magnetic disks. Though magnetic tapes are the
outdated storage devices due to the improvement made on other storage medias, they provide
back-up capabilities and they can be used to store data, which are not frequently used.
56
control unit co-ordinates the works of all the components of the computer system and controls
the program and data flow in the computer system.
The arithmetic & logic unit, on the other hand, is the one, which performs the required
arithmetic and logical comparison of the system by using a register. A register is a special area
in the ALU or control unit where data is temporarily stored to be processed after the control unit
transfers data from primary storage. These two units of the CPU together are called processors
because they process the contents of the primary storage. For example, when one writes 2+3,
then the control unit directs the arithmetic and logic unit to make the additions and to write the
result five. The processing powers of computers depend on the speed and performance of their
microprocessors.
Dear learners, the CPU is one of the specs that must be critically evaluated when you buy a PC.
The CPU’s spec is its speed measured by Giga Hertz (GHz). A typical computer may have a
processing speed measured by 2.4 GHz and is Core i 3. This means the CPU can run 2.4 billion
circulation per second with three processors.
An output device is any hardware component that conveys information to one or more people.
Three commonly used output devices are a printer, a monitor, and speakers
A monitor displays text, graphics, and videos on a screen. A monitor is also a spec. So when you
buy a computer you need to inspect whether it has an LCD or CRT monitor and what inch. An
LCD monitor is a one with flat screen where as a CRT monitor is a one with box feature.
Speakers allow you to hear music, voice, and other audio (sounds).
Activity 2
1 Define hardware and identify the components of a computer hardware?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
57
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
Section Overview
Hardware, as powerful as it might be, is useless without software. Software consists of
instructions that tell the computer and its peripheral devices what to do and how to do it. These
instructions are called programs or applications. Many IT professionals refer to computer
programs as “systems” because they are composed of components working to achieve a common
goal. As a professional, you must be able to make educated decisions regarding software
selection. To do so, you need to understand the factors involved in developing, selecting, and
using software. This section introduces to you what a software is, and distinguishes the
difference between application and system software. Further it describes the functions of the
operating system. Finally it elaborates approaches to manage software assets.
Software is a series of instructions to a computer to execute any and all processes, such
as displaying text, mathematically manipulating numbers, or copying or deleting
documents.
58
two states, which eventually close or open tiny electrical circuits. Different sequences of signals
represent different instructions to the computer.
Like computers hardware systems, software systems have passed four generations of
developments. The improvement in the memory and speed of computers has enabled information
system specialists to modify and add new features of software. The development of software has
made computers to become more users’ friendly. Hence, the subsequent generations of languages
are the results of adding new instructions and features to immediately preceding generations of
languages with the purpose of making computers comfortable, fast, cheap and simple to use. The
two major categories of software are application software and system software.
1. Operating system: Operating system manages the operation of the CPU, controls the
input/output and storage devices of a computer system. In this it performs three activities.
The first is allocation and assignment of resources to the jobs in the queue, the second is
scheduling tasks based on their arrival and users’ priorities and the third is monitoring the
jobs, the individuals using the system (what program is run by whom) and protecting the
information system from being accessed by any unauthorised person.
2. Utility programs – Utility programs are programs that perform certain routine tasks needed
by the user. Utilities enable the user to copy, create, sort or delete files. For example, sort
program performs sorting operation; load programs loads programs, save program records
the contents of primary storage on the secondary memory devices.
59
3 Language Software: There are two types of languages software. The first is Language
translators – translate programs written in the high level languages into machine languages.
Program written by the programmer is called source program and the machine language is
called the object program. Therefore, the system software that translates the source program
to machine program is called translator. Compilers translate high level programmes to
machine languages. Interpreters translate Basic Languages to machine language.
The second type of language software is called program language. There are different
programming languages that help to develop application software. These are C++, Visual
Basic, Java, etc.
The application software is the software, which is the interface between the system software and
the end user. The application software makes the end user to use the computer. General purpose
and application specific Software. Application software is a program that assists the
application of computers to meet the information processing needs of the end user. Application
software can be acquired in two ways. The first is through custom programming and the second
through the purchase of prewritten programs.
In custom programming firms use their own information specialists to design computer-based
systems that can meet the unique needs of the firm. Prewritten packages are programs that are
produced by software producing firms and available in the market to be purchased and used by
end-user organisations. Examples of such types of packages are like Microsoft word, Microsoft
Excel, Access etc. Prewritten packages can be classified into general-purpose programmes and
application specific programmes.
General-purpose programs – These are programs that perform common information processing
tasks for end users. Some of the programs under this category are word processing programs,
electronic spread sheet programs like Lotus 1,2,3 and excel, and graphic packages that convert
numeric data into graphic displays.
Access is used for Database Management application such as electronic record keeping,
inquiry and report generation.
60
Application specific programs – These are packages that are created to satisfy specific
information processing need of a particular end user. Business application programs are
programs used to process business related information such as accounting, sales analysis, cash
budgeting, materials requirement planning, etc. These programs assist business decision-making.
The scientific application programs are useful for information processing tasks of physical,
mathematical, engineering, social and other activities.
The operating system (OS) is the single most important program that runs on a computer and the
most important type of system software. The operating systems performs basic tasks, such as
recognizing input from the keyboard and mouse, sending output to the computer display, keeping
track of files and directories (groups of files) on disks, and sending documents to the printer.
Without an operating system, no application can run on a computer.
The OS is sometimes called the “traffic cop” or the “boss” of computer resources. Indeed, it is
charged with control functions such as optimally allocating memory locations for an application
program, copying the application from an external storage medium into memory, passing control
to the CPU for execution of program instructions, and sending processing results to output
devices. Operating systems are also often referred to as “platforms,” because they are the
platform on which all other applications “ride” when interacting with the hardware.
2. User Interface
An important part of the OS is the user interface. A graphical user interface (GUI) makes
the use of the computer intuitive and easier to learn. The interface takes the form of easy-
to-understand frames, icons, and menus. Users find it helpful to have most of the
interface features identical regardless of the application they use, unless the application
requires an interface element for a unique feature.
3. Memory Allocation One of the most important functions of an operating system is
memory management, especially RAM—the memory where data and program code must
61
reside before being executed. Ideally, an entire application and all the data it processes
reside in RAM until processing ends. However, when many applications are open
concurrently, or when applications and data pools exceed the computer’s RAM capacity,
the operating system may use virtual memory. Virtual memory lets the user proceed as if
significantly more RAM were available than really exists. Virtual memory uses the hard
disk as an extension of RAM.
4. Plug and Play
A good operating system should also facilitate fairly simple changes to hardware
configuration. When a new device, such as an external hard disk, DVD burner, external
communication device, or joystick, is attached to a computer, the operating system’s job
is to recognize the new attachment and its function. If the OS can do so (without your
intervention) immediately after you attach the device, it is a plug-and-play (PnP) OS, and
the device, too, is referred to as a plug-and-play device. To do so, the operating system
must have access to the attached device’s driver.
A driver is the software that enables the OS to control a device, either one installed inside
the computer box (such as a second video card) or an external device such as a flash
memory drive.
62
Anyone who can contribute features or fix bugs is invited to do so. Anyone who wishes to
download the latest version can do so free of charge. An open source program can be developed
by a random group of programmers, rather than by a single company. Programmers share an
application’s basic code, find its weaknesses, debug it, and contribute new pieces.
Open source software includes hundreds of useful applications, such as the popular Web browser
Mozilla Firefox, the relational database management system MySQL. Linux is the best known
open source operating system. Forty-two percent of Argentine companies use Linux. The
governments of Brazil, Peru, and Chile mandated that all public administration agencies use only
open source software when available. The Brazilian government switched more than 300,000 of
its computers from Windows to Linux
Dear students, do you know that when you “purchase” software, you do not own the software
you have just obtained. As noted earlier, most of the software that organizations and individuals
obtain is not purchased; it is licensed. You receive a software license, limited permission to use
the software, either indefinitely or for a set time. When the use is time-limited, the client pays
annual license fees.
63
Establish ongoing policies and procedures surrounding the acquisition, documentation,
deployment, usage and retirement of software in an effort to recognize long-term benefits
of SAM
2.3.4.1.3.1. New SAM software tools and Approaches
A number of technologies are available to support key SAM processes:
Software inventory tools intelligently “discover” software installed across computer
networks, and collect software file information such as title, Product ID, Size, date, Path,
and version.
License Manager solution provide an intelligent repository for license entitlements which
can then be reconciled against data provided by software inventory tools to provide the
organization with an ‘Effective License Position’ or view of where the organization is
under-licensed (at risk of a compliance audit) or over-licensed (wasting money on
unnecessary software purchases)
Software metering tools monitor the utilization of software applications across network.
They can also provide real-time enforcement of compliance for applications licenses
based on usage.
Application control tools restrict what and by whom particular software can be run on a
computer as a means of avoiding security and other risks.
64
Software deployment tools automate and regulate the deployment of new software.
Activity 3
1 What is software? Discuss the major types of computer software.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
Section Overview
As a professional, you will use databases and likely help design them. Understanding how to
organize and use data is a way to gain responsibility and authority in a work environment. Data
is usually collected in a way that does not make it immediately useful to professionals. Imagine
building a model palace from a pile of building blocks. You have a good idea of what you want
to build, but first you have to organize the blocks so it is easy for you to find and select only the
blocks you need. Then you can combine them into substructures that eventually are integrated
into your model. Similarly, data collected by organizations must be organized and stored so that
useful information can be extracted from it in a flexible manner.
65
You use your Web browser to go to your favorite online electronics store to search for high-
definition flat screen television sets. You enter a price range and screen size. Within a few
seconds, the screen is filled with details on available models complete with product photos and
specifications. Where did this rich, well-organized information come from? It came from a
database. A database management system responded almost instantly to your request.
The manner in which data is organized and arranged in a computer system from the
smallest bit to the largest database is termed data hierarchy: The smallest possible
electronic data is called a bit. A bit is a binary digit of either a 0 (off) or 1 (on). A bit
cannot represent a human letter. When related bits come together they form a byte. A
byte is made of 8 bits. A byte represents a human letter. For example, Abebe is made of
approximately 5 bytes and 40 bits. A collection of related bytes is called a field or
attribute. An attribute is a characteristic of interest regarding the entity. Entity is anything
about which we would like to capture and store data. For example, Abebe is an attribute,
which is made of 5 bytes and it could represent name of a customer. The set of related
attributes will form a record. A record captures data from particular occurrence of an
entity. For example, when Abebe buys goods from our business, we capture his name,
items sold, sales person and the cash received from him. These attributes make a record.
When records come together they form file. The records of all customers like Abebe
make a file. A set of interrelated and centrally coordinated files is called a database.
Businesses collect and dissect data for a multitude of purposes. Digital data can be stored in a
variety of ways on different types of media. They can be stored in what can be called the
traditional file format, in which the different pieces of information are not labeled and
categorized, but are stored as continuous strings of bytes. The chief advantage of this format is
the efficient use of space, but the data is nonetheless difficult to locate and manipulate. By
contrast, the database format, in which each piece of data is labeled or categorized, provides a
much more powerful information management tool. Data in this format can be easily accessed
and manipulated in almost any way desired to create useful information for decision making.
The impact of database technology on business cannot be overstated. Not only has it changed the
way almost every industry conducts business, but it has also created an information industry with
far-reaching effects on both our business and personal lives. Databases are behind the successful
use of automatic teller machines, increased efficiency in retail stores, almost every marketing
effort, and the numerous online search engines and Web-based businesses. Combined with
interactive Web pages on the Internet, databases have made an immense contribution to
commerce.
Without them, there would be no online banking, consumer catalogs, search engines, stock
brokerages, or chat rooms.
66
In virtually every type of business today, you must understand the power of databases. The
approaches to organizing and manipulating data presented in this section will help you gain this
important knowledge.
Data can be maintained in one of two ways: the traditional file approach—which has no
mechanism for tagging, retrieving, and manipulating data—and the database approach, which
does have this mechanism. To appreciate the benefits of the database approach, you must keep in
mind the inconvenience involved in accessing and manipulating data in the traditional file
approach: program-data dependency, high data redundancy, and low data integrity.
There is an interdependency of programs and data of the traditional file approach. Other
challenges with traditional file storage are high data redundancy and low data integrity, because
in older file systems files were built, and are still maintained, for the use of specific
organizational units. If your last and first name, as well as address and other details, appear in the
files of the department where you work as well as in the payroll file of the Human Resource
department, data can be duplicated. This data redundancy wastes storage space (and,
consequently, money) and is inefficient. When corrections or modifications need to be
performed, every change has to be made as many times as the number of locations where the
data appears, which takes time and might introduce errors. If the same data was entered correctly
in one place but incorrectly in another, your record is not only inaccurate, but might appear to
represent a different person in each place. Inaccuracies hurt data integrity—the characteristic that
the data represents what it is supposed to represent and that it is complete and correct.
Often, the traditional file approach to storing data leads to low data integrity. It is difficult to
ensure that data is correct in all locations when there are myriads of places to insert data in files,
as in the traditional approach.
67
To begin with, the development of automating information activities can be divided in to pre-
database and database periods. The pre-database was the time when the traditional file
processing system was the only system used for data collection, storage, processing and
producing reports. As the traditional filing system was having many problems, it gave way to the
advanced computerised data processing system, which is called the database system. This
doesn’t mean that filing system is no more useful in computerised data processing; rather, the
database system has integrated many separate filing systems that increased the flexibility and
efficiency of processing data. This section discusses on the structure of data, the difference
between the traditional filing system and database system.
Some of the functions of Information system management are choosing the type of data to be
collected, designing the formats for capturing data from internal and external business activities,
deciding the way these data are stored and processed within the system and designing the
formats for producing ad hoc and periodic reports for managerial decision making. An
information system specialist needs to consider the following five main criteria in his effort of
designing workable system.
68
a) One-to-one relationship: - If one element of entity A can be directly related to only one
element of entity B, and one element of entity B is directly related with one element of
entity B. For example, in monogamy cultural system a man can marry only one woman
and a woman can marry only one man.
b) One-to-many relationship: when one element of entity A can be related to one or more
elements of entity B, but one element of entity B can be related to only one element of
entity A. For example, the relationship between a biological father/mother and his/her
children. (A biological father/mother can have one or more children but a child has only
one biological father/mother.
c) Many-to-many relationship: - Two entities may have many-to-many relationship when
one element of entity A can be related to one or more elements of entity B, and when
one element of entity B can be related to one or more elements of entity A. For example,
the relationship between entity student and entity course is many-to-many. This is
because one student can take one or more courses; and one course can be taken by one or
more students.
Fields: They are sometimes referred as data items. Data items can represent one of the many
attributes, and are usually grouped together to describe a specific entity. For example, Almaz
could be a data item to represent the attribute student name in the occurrence of an entity student.
Records- Records are formed when related data items (fields) are grouped together. A record
represents a collection of data items that describe each instance of an entity. For example, if
Alemu is a student then the data items that contain his name, student ID, sex, date of birth,
major, address, etc, together form a record of Alemu. See the table below for the difference
between field, record and file.
All fields in the No. Student Name Fathers name Date of Birth Qualification Level of
row are a Education
record of
Employee File
69
100 Zegeye Deribe 22/07/1981 Management BA
File: - Files are formed when related records are grouped together. For example, in payroll file
there are many records of employees consisting of their names, Employee ID, salary, amount of
tax deductions and net pay. And all the records in payroll are grouped together to form a payroll
file.
a) Master files are used to store permanent data and information about entities. It contains
historical and statistical data, which is used as a source of reference data. Master file holds
accumulated data based on transaction data.
b) Transaction file contains records of all transactions occurring during a period & is developed
as a result of transaction processing and preparing transaction documents. Transaction
processing occurs at the time of sales order, purchase order, work order and hiring of
employees. These files are also used to update the master file, such as adding new record or
deleting records in the master file
c) Report file is created when a report is produced by extracting data from the master file. For
example, a registrar office may be required to prepare reports of students by region, GPA,
sex, etc. every semester. There is report generator software that provides easy handling of
special management requests.
70
The following are the major disadvantages of physically separate files under separate owners.
The problems were the major weaknesses of the traditional file system data processing.
Duplications of data (data redundancy): Since each unit maintains its own data the same
data can be repeatedly recorded and stored in different files in different departments of the
same organisation. This is costly in terms of money required to collect, process and update
the data for computer storage. In addition, duplicated data occupies much of computer
memory and increases inefficiency in updating and retrieving data from files.
Lack of data integrity. When the same information is stored in multiple files throughout the
organisation, any change in one file must follow changes in all other files. However, this is
difficult to do. For example, once the Accounting Department updates its own data, it may
forget to pass the new information to other departments. As a result, incorrect data in only
one file could cause severe problem for the user of this data. In filing system. there is no any
standard how to use and process data within the organisation (Raymond, 1995). As a result, it
was difficult for systems with such weaknesses were having problems in delivering
consistent and reliable information to users.
Lack of data compatibility. There was program and data dependency in traditional filing
systems. This results when different departments in an organisation collect process and store
information using different software. When one department’s files are incompatible with
another department’s files, combining the information from the two files becomes extremely
difficult.
Lack of Data security: Since each unit of an organisation controls its own data, the
organisation doesn’t have the power to control the access and dissemination of information.
71
2.4.3.1. Components of Database Systems
The database system has two major components. They are the database administration and the
Database Management Systems (DBMS)
a) Database creation-in database creation the DBMS defines and organizes the content
relationships, and structure of the data needed to build a database.
b) Database Interrogation – this involves the access of data in a database to support various
information processing assignments. This typically involves information retrieval & report
generation.
c) Database Maintenance- the DBMS is used to add new records, delete old records, change
any data in the record, and protect the data in a database.
d) Customised micro processing development- DBMS can be used to develop prototypes of
data entry screens, queries, forms, reports, labels for a proposed system. An organization can
create its own customised mini software using the micro facilities available in Access,
Pardox or Dbase IV that can serve specific purpose of the organisation.
72
2.4.3.3.1. Hierarchical structure
In hierarchical data model the relationships between records form a hierarchy or tree like
structure. A record may have multiple records subordinate to it, the multiple subordinate records
in turn may have their own multiple records subordinate to them. A record that has multiple
records subordinate to it is called parent records and all records which are under the parent
record are called children. There is natural relationship between the parent and its children
because a parent can have multiple children where as a child can have only one parent.
73
high
A data model is an abstract representation of the contents of a database. For example: the
relational database represents as if everything in the database being stored in a form of
table (relation)
Data modeling should first be done to decide which data should be collected and how it should
be organized. Thus, data modeling should be proactive. Creating data models periodically is a
good practice; it provides decision makers a clear picture of what data is available for reports,
and what data the organization might need to start collecting for improved decision making.
Managers can then ask experts to change the relationships and design new reports or applications
that generate desired reports with a few keystrokes.
Effective data modeling and design of each database involves the creation of a conceptual
blueprint of the database. Such a blueprint is called an entity relationship diagram (ERD).
An ERD is a graphical representation of all entity relationships and they are often consulted to
determine a problem with a query or to implement changes. ERDs are a main tool for
communication not only among professional DB designers, but also among users and between
users and designers. Therefore it is important that professionals in all of these fields know how to
create and read them.
74
In an ERD, boxes are used to identify entities. Lines are used to indicate a relationship between
entities. When lines shaped like crow’s-feet are pointing to an object, there might be many
instances of that object. When a link with a crow’s-foot also includes a crossbar, then all
instances of the object on the side of the crow’s-foot are linked with a single instance of the
object on the side of the crossbar. A second crossbar would denote “mandatory,” which means
that the relationship must occur, such as between a book title and author: a book title must have
an author with which it is associated. A circle close to the box denotes “optional.”
A diagram such as the above figure provides an initial ERD. The designers must also detail the
fields of each object, which determines the fields for each record of that object. The attributes are
listed in each object box, and the primary key attribute is underlined. Usually, the primary key
field appears at the top of the field list in the box.
The table below summarizes an example of possible attributes of a Professor entity. Database
designers can use different notations; therefore, before you review an ER diagram, be sure you
understand what each symbol means.
Activity 4
1 What is data hierarchy? Discuss each stages in the data hierarchy.
75
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
2 Distinguish between the traditional file based system and database system of data storage. What are
the major components of database management [DBMS] system?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
3 What is a relational database? In such databases what is the purpose of primary key, foreign
key and non-key attributes.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
Section Overview
Hardware, as powerful as it might be, is useless without software. Software consists of
instructions that tell the computer and its peripheral devices what to do and how to do it. These
instructions are called programs or applications. Many IT professionals refer to computer
programs as “systems” because they are composed of components working to achieve a common
goal. As a professional, you must be able
76
computers and other digital devices, people can now work together as if they were sitting next to
each other, even when they are thousands of miles apart. Financial transactions and information
retrieval take seconds, and wireless technology enables us to perform these activities from almost
anywhere and while on the go. Understanding the technology underlying telecommunications—
its strengths, weaknesses, and available options—is essential in any professional career. This
section introduces the telecommunication revolution, communication and networks, and e-
commerce and e-business technologies
Telecommunications is the transmittal of data and information from one point to another. The
Greek word tele, which means “distance,” is part of such words as “telephone,”
“teleconference,” and other words referring to technologies that allow communications over a
distance. Thus, telecommunications is communications over a distance. Telephone, e-mail, the
World Wide Web—none of these essential business services would be available without fast,
reliable telecommunications.
Computer Network is the connection of two or more computers to enable users to share data,
information, software and computer hardware resources. Understanding the telecommunication
technology is very important because it has changed the nature of making business by enabling
computers to communicate with each other. Therefore, telecommunication is sending
information in any form (voice, text, image, data) from one place to another using electronic or
light emitting media.
The other important terminology in computer network is data communication, which is the
transmitting and receiving of data over communication links between two or more computer
systems and a variety of inputs & output terminal. "Teleprocessing refers to the accessing of
computer power & computerized data files from a distance, generally using terminals &
telecommunication facilities."
Three conditions should be satisfied to have an effective communication. The first is, at least
two people - one sender and one receiver - must be involved. The second is there must be
information or message to be sent to the receiver, and the third is there must be a channel or
media to transmit the information.
77
Data in any form (voice, text and image) follows two format of transmission through a media.
They can be analogue or digital signals.
a) Twisted- Pair Wire - ordinary telephone wires consisting of copper wire twisted together into
pairs to form a cable. This is the oldest mode of media used for data transmission. The
media is low cost and very low speed in transmitting data up to a speed of 100 Millions of
bits per second. Twisted wire is largely used for local networks and telephone systems.
b) Coaxial Cable, which is copper or aluminium wire wrapped with insulators to minimise
interference from outside or distortion. It is more expensive, transmits data faster and less
outside interference than twisted wires. The speed of data transmission for Coaxial Cable is
up to 200Mbps (Megabits per second)
c) Fiber-optic cables: conduct light pulses generated by lasers at transmission rates as high as 2
billion bits per second. It is the fastest, lighter and more durable than twisted wires and
coaxial cables.
78
Then we have a Data Communication System. The components of the system are connected
through a network. So network is connectivity.
1. A star network: In a star network dependent computers are connected to a central host
computer, which controls all the data resources and data communication between computers.
Any communication between two dependent computers in the system takes place through the
host computer. If the host computer fails then all computers connected to the host computer will
not perform any kind of work.
3. Bus network - All the computers are connected to the same communication channel or bus.
Usually the same wire or fibber optic cable is used as a medium of transmission. In Bus network
there is no any central computer on which the other computers are dependent. Any computer can
communicate with any other computer in the system if it has the software that can signal the
right computer to receive the message. The main advantage of bus network is that there is no
need of relaying message because the message can be sent directly to the destined computer
without affecting the works of other connected computers to the same channel.
5. Hybrid Network Topology: A network in practice mixes the topologies discussed above and is
called a hybrid network topology
79
LANs connect information-processing devices within a limited physical area, such as an office
building, manufacturing plant, within a compound of a university. LAN has become a major
type of telecommunication network since the time microcomputers were introduced into offices,
departments,
WAN communication network covers a large geographical area. They are used by
manufacturing firms, banks, government agencies, Universities, etc. to transmit & receive
information across cities, regions, countries or the world. As the connection of computers in a
compound creates LAN, the connections of LAN Creates the WAN.
Network Protocols: Different types of data are transmitted through communication channel in a
computer network. If two computers are communicating two other computers respectively then
the traffic of data passing through the same line of communication media is controlled by
network protocol. Network protocol is a standard set of rules and procedures for the control of
data communication in a network.
80
such as between two businesses or between a business and a consumer. M-commerce describes
Mobile commerce, enabled by advances in technology for mobile communications devices.
1) The manner in which e-business fit and support a company’s business strategy
2) The degree to which e-business assures the achievement of the three key characteristics
of any business transaction. These are:
a. Validity refers to the authenticity of the legality of the transacting parties at the
two ends of the data communication system. In manual systems, signatures and
stamps used to ensure validity. In e-business, digital signatures and digital
certificates must be present to secure validity.
b. Integrity refers to the un-alteredness of any message exchanged among
transacting parties while transferred. In manual systems to ensure integrity we
sign across sealed envelopes or use courier delivery. In e-business we use
message digest to check whether the message was tampered during transmission
or not.
c. Privacy refers to the confidentiality of any information exchanges while
transacting. In manual systems, privacy is attained through signing across sealed
envelopes and personal delivery. In e-business, we use encryption to secure the
privacy of the message. Encryption is the process of converting a message in a
81
plain text to a secret code, which is done using either Single Key System or
public key infrastructure.
Activity 5
1 List and Discuss the improvements in business processes offered by telecommunications technology.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
UNIT SUMMARY
Information Technology and organizations influence one another. Information systems are built
by managers to serve the interests of the business firm. At the same time, the organization must
be aware of and open to the influences of information systems to benefit from new technologies.
Every computer system, either main frame computer or microcomputer' consists the hardware and the
software parts. Computer hardware is defined as “a system of interrelated components that supports the
basic system functions of input, processing, output storage & control" to provide "end users with a
powerful information processing tool”. Computer software is sequences of instructions that direct the
operations of the computer hardware to perform the basic system functions. Data is a raw fact or figure
and can take a form of a number or a date. Data is often meaningless or it does not provide
knowledge to make a specific decision. Information is a knowledge or meaning derived from
data.
The computer has been called "the machine that changed the world." We believe that
information technology has and will continue to revolutionize management.
82
Information technology refers to all forms of technology applied to processing, storing,
and transmitting information in electronic form. Information systems execute organized
procedures that process and/or communicate information.
An organization is a stable, formal social structure that takes resources from the environment and
processes them to produce outputs. Organizations are formal legal entities with internal rules and
procedures that must abide by laws. An organization is a collection of rights, privileges,
obligations, and responsibilities delicately balanced over a period of time through conflict and
conflict resolution. The later definition suggest that an organization suggests that building new
information systems, or rebuilding old ones, involves much more than a technical rearrangement
of machines or workers—that some information systems change the organizational balance of
rights, privileges, obligations, responsibilities, and feelings that have been established over a
long period of time
There are major trends that have drastically altered the way organizations use technology. These
trends make it imperative that a manager become familiar with both the use of technology and
how to control it in the organization.
At the core of any modern information system stands at least one computer. Few machines have changed
human life as radically as the computer.
Businesses have many hardware choices, ranging from types of computers and memory devices to input
and output devices. Understanding the capabilities of hardware and the options available can save
companies millions of dollars.
83
In general, “Data is processed and stored in a computer system through the presence or absence of
electronic or magnetic signals in the computer circuitry or in the media it uses.
The memory capacity of a computer's primary storage and its secondary storage devices is
usually expressed in terms of bytes.
Speed of a computer is measured by its ability to read millions of instructions per second.
Software Asset Management (SAM) is a business practice that involves managing and
optimizing the purchase, deployment, maintenance, utilization and disposal of software
applications within an organization.
Checklist
Now that you have completed the second unit, you need to check whether you have grasped the
concepts discussed in this unit. If your answer to the questions below is No, then you have to go
back and read the relevant sub-section again.
Accomplishments Yes/No
Can Understand the basics of computer system
You Know how data is represented in a computer system
Describe the subsystems of a computer hardware system
Describe the generations and classification of computes.
Describe the types of computers Software
Identify the file storage and management approaches
Describe database designing procedures
Describe terminologies of computer networks and internet
Explain how telecommunication technology is used in data transmission between
computers
Distinguish between local area and wide area networks
Distinguish between IT, ICT and IS
Understand the different views of organizations
Relate organizations and information technologies
Describe the trends in IT
Identify and evaluate key criteria or spec (specification) for deciding what
computer or related devices to purchase.
Commandment!
So as to pass through this step, at least you have to accomplish or perform 90% of the above
requirements! If not, go back and get done the unfulfilled part!
84
SELF-TEST EXERCISE (SELF-ASSESSMENT QUESTIONS)
85
1. The smallest possible electronic data is:
A. Byte, D. Record,
B. Bit, E. None of the above.
C. field,
2. The memory capacity of a computer’s primary and secondary storage is expressed in
terms of?
A. Bit, D. Record,
B. Byte, E. None of the above.
C. Field,
3. The smallest possible type of computer is best described by:
A. Micro, D. Super,
B. Mini, E. None of the above.
C. Mainframe,
4. A computer hardware that allows you to enter data and instructions into a computer:
A. Hard disk, D. Mouse,
B. CPU, E. None of the above
C. RAM,
5. A volatile memory that losses data when eclectic power is interrupted?;
A. Hard Disk, D. Magnetic Tape,
B. Compact Disk, E. None of the above
C. RAM,
6. Which software manages the operation of the CPU, controls the input/output and
storage devices of a computer system?
A. Language Software, D. Application Software,
B. Utility programs, E. None of the above
C. System Software,
7. The manner in which data is organized and arranged in a computer system from the
smallest bit to the largest database is termed
A. Bit, D. Data hierarchy,
B. File based system, E. None of the above.
C. Database system,
8. A data storage mechanism in which there is no mechanism for tagging, retrieving and
manipulating data is best described by:
A. Bit, D. Data hierarchy,
B. File based system, E. None of the above
C. Database system,
9. Anything about which we would like to collect and store data;
A. Attributes D. Database
B. Relationship E. All of the above.
C. Entity
10. A data base management system langue used to create the data base is:
A. DML B. DQL
86
C. Data dictionary E. None of the above.
D. DDL,
Part II: Matching
87
10. Application software is a one that manages and controls the computer hardware.
88
3. Microcomputers – These are the smallest types of computers often called personal
computers (PC) Minicomputers – These are larger and more powerful than
microcomputers. Mainframe computers – They are larger and more powerful than
minis and microcomputers. Supercomputer is the largest computer with an extra
ordinary computing power, which is designed for high-speed numeric computations.
89
3. Relational database is a database developed based on the relational data model. The
relational data model is an abstract representation of the contents of a data base and it
represents as if everything in the database as being stored in a form of table (also called
relation). The table has columns(representing fields or Attributes) and rows (representing
a tuple or record). Each attribute may be assigned as a primary key, foreign key or non-
key attribute. A primary key is an attribute that uniquely identifies a specific row in a
table. For example, Customer ID, Vendor ID…A foreign key is an attribute in one table
which is a primary key in another table. Its used to relate the table in which it exists with
the table in which it is a primary key. It is used to implement one to one and one to many
relationships. Non-key attribute is an attribute which is neither primary nor foreign key.
A non-key attribute is used to interrelate its table with the other table.
90
UNIT THREE
Application of Business Information System in Organizations
Unit Introduction
Dear learners, welcome to the third unit of this course! This part aims to acquaint you with
applications of Business Information System in organizations. The unit begins by identifying
the levels of management and the associated information requirements by levels of
91
management. Then it examines Information, Management and Decision making to
distinguish the different decision rules. Finally, it elaborates the individual and organization
decision models.
To succeed in business today, companies need information systems that can support the diverse
information and decision-making needs of their managers and business professionals. In this
unit, we will explore in more detail how this is accomplished by several types of management
information, decision support, and other information systems. We concentrate our attention on
how the Internet, intranets, and other Web-enabled information technologies have significantly
strengthened the role that information systems play in supporting the decision-making activities
of every manager and knowledge worker in business.
Unit Objectives
After studying this unit, you should be able to:
Identify the levels of decision making and their information requirements
Discuss the various applications of BIS in organizations
Explain the interaction between information, decision making and management
Identify the levels of management
Discuss the nature of decision made under each level based on their scope,
structure and time horizon
Identify the information requirements at different levels of management
Discuss features of information need at each of these managerial levels
Identify the various business functions and the role of ISs in these functions
Distinguish the information requirements of the different managerial functions
Explain how ISs in the basic business functions relate to each other
Explain what decision making is and what it involves.
Distinguish among decision making models
Relate IT and Management
92
Section Overview
The type of information required by decision makers in a company is directly related to the level
of management decision making and the amount of structure in the decision situations they face.
Decision making involves making decisions now about what will happen in the future.
Obviously, decisions can turn out badly, or actual results can prove to be very different from the
estimates on which the original decision was made.
Ideally the decision maker would know with certainty what the future consequences will be for
each choice facing him. However, not all decision makers enjoy knowing their decisions
expected consequences and the real world is not normally so helpful.
It is important to understand that the framework of the classic managerial pyramid applies even
in today’s downsized organizations and flattened or nonhierarchical organizational structures.
Levels of management decision making still exist, but their size, shape, and participants continue
to change as today’s fluid organizational structures evolve. Thus, the levels of managerial
decision making that must be supported by information technology in a successful organization
are:
The top management makes strategic planning decisions that are too unstructured and
that have wider scope and covers longer time horizon. BIS provides information to
reduce the uncertainty of top management
93
Increasingly, business professionals in self-directed teams as well as business unit managers
develop short- and medium-range plans, schedules, and budgets and specify the policies,
procedures, and business objectives for their subunits of the company. They also allocate
resources and monitor the performance of their organizational subunits, including departments,
divisions, process teams, project teams, and other workgroups.
Middle level management engages in managerial control level decisions that are semi-
structured, and that have medium scope and covers medium time horizon. BIS assist
middle level management by providing information and in making structured
decisions.
Management control is the process by which managers assure that resources are
obtained and used effectively and efficiently in the accomplishment of the
organization’s objectives. It is sometimes called tactics or tactical planning.
Lower or supervisory levels management makes too structured decisions, and that have
short-term effect and covers shorter time horizon. BIS can make automated structured
decisions beyond provision of information to support decisions.
Operational control (or operational planning) is the process of assuring that specific
tasks are carried out effectively and efficiently.
Activity 1
1 List and Discuss the levels of management.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
2 Which managerial levels are associated with making too structured decisions?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
94
3 Which managerial level makes decisions that cover longer time horizon
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
Section Overview
Within, and at all levels of the organization, information is continually flowing back and forth,
being used by people to formulate plans and take decisions, and to draw attention to the need for
control action, when the plans and decisions don't work as intended. In this section, we will look
at the information needs at all levels of the organisation.
The features of BIS the functional subsystems that we discussed in unit one and the later
developments of managerial application of computers for managerial activities had led to the
chronological identification of information requirements and the development of the following
information systems to serve the different levels of managerial activities, which are operational,
middle and top management
95
As it is obvious from the above table, different level of management face different decision
structure and that requires different information with the identified characteristics.
The information used at different management levels for planning, control and decision making
are classified into three tiers: strategic planning, management control and operational control.
The important fact, which distinguishes strategic management information from other
management information, is its external orientation, towards customers and
competitors, suppliers and perhaps other stakeholders.
96
3.2.1.3. Goal congruence
Business strategy involves the activities of many different functions, including marketing,
production and human resource management. The strategic management information system will
require inputs from many areas of the business.
Operational control is concerned with assuring that specific tasks are carried out effectively and
efficiently. Just as 'management control' plans are set within the guidelines of strategic plans, so
too are 'operational control' plans set within the guidelines of both strategic planning and
management control. Operational control decisions are therefore much more narrowly focused
and have a shorter time frame than tactical or strategic decisions.
The following are features of management control information
(a) Operational information is information which is needed for the conduct of day-to-day
implementation of plans.
(b) It will include much 'transaction data' such as data about customer orders, purchase orders,
cash receipts and payments and is likely to have an endogenous source.
(c) Operating information must usually be consolidated into totals in management reports before
it can be used to prepare management control information.
(d) The amount of detail provided in information is likely to vary with the purpose for which it is
needed, and operational information is likely to go into much more detail than tactical
information, which in turn will be more detailed than strategic information.
97
(e) Whereas tactical information for management control is often expressed in money terms,
operational information, although quantitative, is more often expressed in terms of units, hours,
quantities of material and so on.
Activity 2
1 Differentiate between goal congruence and goal conflict.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
Section Overview
In an economy that produces and consumes so much information, professionals must know how
to use information systems in virtually every business activity. Managers must have an overall
understanding of all elements of a system, so that they know what options are available to
control quality, costs, and resources. Modern information systems encompass entire business
cycles, often called supply chains.
Dear learner, you as today’s professional is expected to be knowledgeable not only in your
specific line of work but also in other areas. And since practically every business process
involves information technology, you are expected to know, or quickly learn, how to use the
98
proper ISs in your respective position. Many employers look for generalists rather than
specialists and focus on the techno-manager, a manager well-versed in information technology.
Because many ISs serve multiple functions and interface with other systems, it is extremely
important for a professional to be familiar with the way ISs facilitate work in areas outside his or
her expertise. If you work for a commercial organization, you are bound to be part of a supply
chain or work for a unit that supports a supply chain.
Knowledge of systems in different business areas helps you cooperate with your peers and
coordinate efforts that cross departmental boundaries. Because professionals often have
opportunities to be promoted to positions in other disciplines, the more you know, the better your
chances of being “cross-promoted.”
Any functional manager performs the managerial activities of strategic planning, tactical control
and operational control depending on the level of management he is in the hierarchy of the
organisation.
The following diagram shows how activities of management are intertwined with different
managerial functions
99
Activities of Management
Finance
Manufacturing
Marketing
Resource
Human
Functions of Management
Information system for each business function will constitute sub-system of business information
system.
100
data, background, skill, experience, pay rate changes, hours worked, pay checks, benefits,
termination notices, etc. The personnel database has employee skills inventory system that helps
human resource managers to locate employees with the skill needed for specific assignments and
projects. Middle level human resource managers need employee performance reports from
operational managers in addition to the information they require on the type of skill and
profession available in the labour market, the type of education provided by universities and
colleges. In addition, computers help human resource managers to analyse the payment structure
for different jobs and professions in order to decide on the appropriate levels of compensation.
The strategic human resource managers assess the environmental influence that affect the human
resource flow in the labour market.
The financial management subsystem gathers data and information from internal sources and
external sources that are relevant to make financial decisions. The major internal sources of data
for financial decision making are income statements and the balance sheets. Production plans
from the manufacturing information system, and sales forecast from marketing information
system. Financial intelligence subsystem gathers external data and information; such as
inflation, interest rates, economic growth, etc.; from the environment that influences the financial
flow of the organisation. The major sources of external information are the financial community,
shareholders (owners) and government organisations.
101
The financial management information subsystem produces financial forecasts- forecasts that
cover the coming five to ten years to provide a basis for strategic financial planning.
Major financial management information systems categories are cash and securities
management, capital budgeting systems and financial planning and budgeting systems.
Software like CAD (Computer Aided Design) assist in product design, and computers with the
software CAM (Computer Aided Manufacturing) assists in assembling parts. Therefore, the MIS
is related to the conceptual system that is the manufacturing information system. The
manufacturing Information System is a subsystem of MIS that provides information on the
manufacturing process of an organisation; and it does not include the physical application of
computers such as CAD or CAM. Computers can facilitate the management of production at all
levels of manufacturing management.
102
and technologies. In addition, computers can assist production managers when they make
strategic decisions regarding plant location and facility layout. The development in information
technology has assisted managers to browse the Internet to obtain information on technological
changes and new developments in the method of production from around the world. This assists
top managers to consider alternative manufacturing and automation approaches for
manufacturing specific products in their organisations.
Much of the input information for operational marketing decision-making is obtained from the
transaction processing systems, specifically accounting information system and manufacturing
information systems. The marketing information subsystems produce sales analysis reports,
sales forecasts, customer analysis and other managerial reports related to products, prices,
distributions and market conditions. The operational control activity of marketing management
produces the day to day scheduling of sales and promotion efforts, and periodic reports of sales
volumes by region, product, customer, etc. The marketing tactical management group is
responsible to make comparison of marketing overall performance against the marketing plan of
the organisation and produce sales analysis reports. The Strategic Planning & Control activity
is mainly considering how to establish new markets, and new marketing strategies. Information
requirement for this group of marketing management includes customer analyses, competitor’s
analyses, consumer survey information, income projection, and demographic projection and
technology projections.
Activity 3
1 Identify typical business function of an organization.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
2 What is the information provided by human resource management information sub system of a BIS?
______________________________________________________________________________________
______________________________________________________________________________________
103
_______________________________________________________________________________
Section Overview
Managers often are referred to as decision makers, and every organization grows, prospers, or
fails as a result of decisions by its managers. Many manager decisions are strategic, such as
whether to build a new factory, move into a new line of business, or sell off a division. Yet
managers also make decisions about every other aspect of an organization, including structure,
control systems, responses to the environment, and human resources. Managers scout for
problems, make decisions for solving them, and monitor the consequences to see whether
additional decisions are required. Good decision making is a vital part of good management
because decisions determine how the organization solves its problems, allocates resources, and
accomplishes its goals.
A choice made from available alternatives is decision while the process of identifying
problems and opportunities and then resolving them is decision making
A decision is a choice made from available alternatives. Many people assume that making a
choice is the major part of decision making, but it is only a part. Decision making is the process
of identifying problems and opportunities and then resolving them. Decision making involves
effort both before and after the actual choice.
There are Six Steps in the Managerial Decision-Making Process summarized in the diagram
below:
104
Individual managers facing identical scenario may not reach into a same decision. This may be
due to individual differences of managers. Some managers tend to be risk averse, some are
neutral and some could be risk takers, with big appetite to risk. This concept can be elaborated
by identifying the three types of decision rules used by managers with in organizations.
The 'play it safe' basis for decision making is referred to as the maximin basis. This is
short for 'maximise the minimum achievable profit'. A basis for making decisions by
looking for the best outcome is known as the maximax basis, short for 'maximise the
maximum achievable profit'. The ‘opportunity loss’ basis for decision making is known
as minimax regret.
There are other rules such as the expected value (EV) rule that basis decision on probability
estimates and that a decision-maker may prefer to use.
105
Scenario/ Outcome Project and Profit
Situation
D E F
1 $100,000 $80,000 $60,000
2 90,000 120,000 85,000
3 (20,000) 10,000 85,000
The maximin decision rule is to select the option that offers the best minimum profit – the best
‘worst possible result' that could happen. In this example, the worst possible is a loss of $20,000
with Project D, a profit of $10,000 with Project E and a profit of $60,000 with Project F. The
best worst outcome is 60,000 and project F would therefore be selected (because this is a better
'worst possible' than either D or E).
Using the above example, the maximum profit for Project D is $100,000; for Project E it is
$120,000; and for Project F it is $85,000.
Project E would be chosen if the maximax rule is followed, because it offers the prospect of the
biggest profit.
106
rule.
With this decision rule, for each of the possible outcome situations, we compare the different
values of profit (or cost) for each of the decision options.
For each outcome situation, we measure the amount of the ‘regret’ for each decision option.
This may seem complicated, but an example should help to clarify the rule.
Using the above example in, a table of regrets can be compiled as follows.
The regret for each decision option in each outcome situation is shown in the Regret table below.
Senario/ Project and Profit
Outcome
D E F
Situation
1 0* ($100,000-100,000) 20,000 (100,000-$80,000) 40,000 (100,000-$60,000)
2 30,000 (120,000-90,000) **0(120,000-120,000) 35,000(120,000-85,000)
3 105,000 (85,000-(20,000)) 75,000 (85,000-10,000) ***0(85,000-85,000)
* With outcome situation 1, the best possible result is obtained from Project D, so the regret with
Project D is $0. The result with Option E would be 20,000 worse and the result from Option F
would be 40,000 worse. So 20,000 and 40,000 are the amounts of the regret for Options D and F
respectively.
** With outcome situation 2, the best possible result is obtained from Project E, so the regret
with Project E is $0. The result with Option D would be 30,000 worse and the result from Option
F would be 35,000 worse. So 30,000 and 35,000 are the amounts of the regret for Options D and
F respectively.
*** With outcome situation 3, the best possible result is obtained from Project F, so the regret
with Project F is $0. The result with Option D would be 105,000 worse and the result from
107
Option E would be 75,000 worse. So 105,000 and 75,000 are the amounts of the regret for
Options D and E respectively.
As a result under each project the Maximum regret will be 105,000, 75,000 and 40,000
The lowest of maximum regrets is 40,000 with project Option F so Option F would be selected,
if the minimax regret rule is used as the basis for making the decision.
Programmed decisions involve situations that have occurred often enough to enable decision
rules to be developed and applied in the future. Programmed decisions are made in response to
recurring organizational problems. The decision to reorder paper and other office supplies when
inventories drop to a certain level is a programmed decision. Other programmed decisions
concern the types of skills required to fill certain jobs, the reorder point for manufacturing
inventory, exception reporting for expenditures ten percent or more over budget, and selection of
freight routes for product deliveries. Once managers formulate decision rules, subordinates and
others can make the decision, freeing managers for other tasks.
Nonprogrammed decisions are made in response to situations that are unique, are poorly defined
and largely unstructured, and have important consequences. Many nonprogrammed decisions
involve strategic planning because uncertainty is great and decisions are complex. Decisions to
build a new factory, develop a new product or service, enter a new geographical market, or
relocate headquarters to another city are all nonprogrammed decisions.
One primary difference between programmed and nonprogrammed decisions relates to the
degree of certainty or uncertainty that managers deal with in making the decision. In a perfect
world, managers would have all the information necessary for making decisions. In reality,
however, some things are unknowable; thus, some decisions will fail to solve the problem or
attain the desired outcome. Managers try to obtain information about decision alternatives that
will reduce decision uncertainty.
108
Every decision situation can be organized on a scale according to the availability of information
and the possibility of failure. The four positions on the scale are certainty, risk, uncertainty, and
ambiguity
The classical model of decision making is considered to be normative, which means it defines
how a decision maker should make decisions. It does not describe how managers actually make
decisions so much as it provides guidelines on how to reach an ideal outcome for the
organization. The ideal, rational approach of the classical model is often unattainable by real
people in real organizations, but the mode has value because it helps decision makers be more
rational and not rely entirely on personal preference in making decisions.
The classical model is most useful when applied to programmed decisions and to decisions
characterized by certainty or risk because relevant information is available and probabilities can
be calculated. For example, new analytical software programs automate many programmed
decisions, such as freezing the account of a customer who has failed to make payments,
determining the cell phone service plan that is most appropriate for a particular customer, or
sorting insurance claims so that cases are handled most efficiently.
109
Airlines use automated systems to optimize seat pricing, flight scheduling, and crew assignment
decisions. Retailers use software programs to analyze sales data and decide when, where, and
how much to mark down prices. Many companies use systems that capture information about
customers to help managers evaluate risks and make credit decisions.
The growth of quantitative decision techniques that use computers has expanded the use of the
classical approach. Quantitative techniques include such things as decision trees, payoff
matrices, break-even analysis, linear programming, forecasting, and operations research models.
The organization is incredibly complex, and managers have the time and ability to process only a
limited amount of information with which to make decisions. Because managers do not have the
time or cognitive ability to process complete information about complex decisions, they must
satisfice.
Satisficing means that decision makers choose the first solution alternative that
satisfies minimal decision criteria.
Rather than pursuing all alternatives to identify the single solution that will maximize economic
returns, managers will opt for the first solution that appears to solve the problem, even if better
solutions are presumed to exist. The decision maker cannot justify the time and expense of
obtaining complete information
Managers sometimes generate alternatives for complex problems only until they find one they
believe will work. The administrative model relies on assumptions different from those of the
classical model and focuses on organizational factors that influence individual decisions.
110
According to the administrative model:
1. Decision goals often are vague, conflicting, and lack consensus among managers.
Managers often are unaware of problems or opportunities that exist in the organization.
2. Rational procedures are not always used, and, when they are, they are confined to a simplistic
view of the problem that does not capture the complexity of real organizational events.
3. Managers’ searches for alternatives are limited because of human, information, and resource
constraints.
4. Most managers settle for a satisficing rather than a maximizing solution, partly because they
have limited information and partly because they have only vague criteria for what constitutes a
maximizing solution.
When people have a depth of experience and knowledge in a particular area, the right decision
often comes quickly and effortlessly as recognition of information that has been largely forgotten
by the decision maker.
Coalition building is the process of forming alliances among managers. In other words, a
manager who supports a specific alternative, such as increasing the corporation’s growth by
111
acquiring another company, talks informally to other executives and tries to persuade them to
support the decision.
Without a coalition, a powerful individual or group could derail the decision-making process.
Coalition building gives several managers an opportunity to contribute to decision making,
enhancing their commitment to the alternative that is ultimately adopted.
The political model closely resembles the real environment in which most managers and decision
makers operate. Decisions are complex and involve many people, information is often
ambiguous, and disagreement and conflict ict over problems and solutions are normal.
The political model begins with four basic assumptions:
1. Organizations are made up of groups with diverse interests, goals, and values.
Managers disagree about problem priorities and may not understand or share the goals and
interests of other managers.
2. Information is ambiguous and incomplete. The attempt to be rational is limited by the
complexity of many problems as well as personal and organizational constraints.
3. Managers do not have the time, resources, or mental capacity to identify all dimensions of the
problem and process all relevant information. Managers talk to each other and exchange
viewpoints to gather information and reduce ambiguity.
4. Managers engage in the push and pull of debate to decide goals and discuss alternatives.
Decisions are the result of bargaining and discussion among coalition members.
However, not all managers go about making decisions in the same way. In fact, significant
differences distinguish the ways in which individual managers may approach problems and make
decisions concerning them. These differences can be explained by the concept of individual
decision styles.
Personal decision style refers to distinctions among people with respect to how they
evaluate problems, generate alternatives, and make choices.
112
Research has identified four major decision styles: directive, analytical, conceptual, and
behavioral.
1. The directive style is used by people who prefer simple, clear-cut solutions to problems.
Managers who use this style often make decisions quickly because they do not like to deal with a
lot of information and may consider only one or two alternatives.
People who prefer the directive style generally are efficient and rational and prefer to rely on
existing rules or procedures for making decisions.
2. Managers with an analytical style like to consider complex solutions based on as much data as
they can gather. These individuals carefully consider alternatives and often base their decisions
on objective, rational data from management control systems and other sources. They search for
the best possible decision based on the information available.
3. People who tend toward a conceptual style also like to consider a broad amount of
information. However, they are more socially oriented than those with an analytical style and
like to talk to others about the problem and possible alternatives for solving it. Managers using a
conceptual style consider many broad alternatives, rely on information from both people and
systems, and like to solve problems creatively.
4. The behavioral style is often the style adopted by managers having a deep concern for others
as individuals.
Managers using this style like to talk to people one-on-one and understand their feelings about
the problem and the effect of decision on them. People with a behavioral style usually are
concerned with the personal development of others and may make decisions that help others
achieve their goals.
113
tools, and machining. The computer can instruct the machines to change parts, machining, and
tools when a new product must be produced. Human operators make adjustments to the
computer, not the production machinery itself, dramatically cutting the time and expense of
making changes.
3. Lean Manufacturing
Lean manufacturing, sometimes called lean production, combines advanced technology with
innovative management methods, using highly trained employees who take a painstaking
approach to problem solving at every stage of the production process to cut waste and improve
quality and productivity.
Knowledge goes a step further from information and two steps from data; it is a
conclusion drawn from the information after it is linked to other information and
compared to what is already known. Knowledge, as opposed to information and data,
always has a human factor. Books can contain information, but the information
becomes knowledge only when a person absorbs it and puts it to use
114
A management information system (MIS) is a computer-based system that provides information
and support for effective managerial decision making. MISs typically supports strategic decision-
making needs of mid-level and top management.
115
Management information systems typically include decision support systems, executive
information systems, and groupware.
3.4.7.3. Groupware
Groupware is software that works on a computer network or via the Internet to link people or
workgroups across a room or around the globe. The software enables managers or team members
to communicate, share information, and work simultaneously on the same document, chart, or
diagram and see changes and comments as they are made by others. Sometimes called
collaborative work systems, groupware systems allow people to interact with one another in an
electronic meeting space and at the same time take advantage of computer-based support data.
Activity 4
1 What is a decision and what is decision making.
______________________________________________________________________________________
116
______________________________________________________________________________________
_______________________________________________________________________________
UNIT SUMMARY
To succeed in business today, companies need information systems that can support the diverse
information and decision-making needs
The type of information required by decision makers in a company is directly related to the level of
management decision making and the amount of structure in the decision situations they face.
Decision making involves making decisions now about what will happen in the future.
The top management makes strategic planning decisions that are too unstructured and that have wider
scope and covers longer time horizon. BIS provides information to reduce the uncertainty of top
management
Strategic planning is the process of deciding on objectives for the organization, on changes in these
objectives, on the resources to attain these objectives, and on the policies that are to govern the
acquisition, use and disposition of these resources.
Middle level management engages in managerial control level decisions that are semi-structured, and that
have medium scope and covers medium time horizon. BIS assist middle level management by providing
information and in making structured decisions.
Management control is the process by which managers assure that resources are obtained and used
effectively and efficiently in the accomplishment of the organization’s objectives. It is sometimes called
tactics or tactical planning.
117
Lower or supervisory levels management makes too structured decisions, and that have short-term effect
and covers shorter time horizon. BIS can make automated structured decisions beyond provision of
information to support decisions.
Operational control (or operational planning) is the process of assuring that specific tasks are carried out
effectively and efficiently.
The 'play it safe' basis for decision making is referred to as the maximin basis. This is short for 'maximise
the minimum achievable profit'. A basis for making decisions by looking for the best outcome is known
as the maximax basis, short for 'maximise the maximum achievable profit'. The ‘opportunity loss’ basis
for decision making is known as minimax regret.
The classical model of decision making is based on rational economic assumptions and manager
beliefs about what ideal decision making should be.
Satisficing means that decision makers choose the first solution alternative that satisfies
minimal decision criteria.
118
The political model of decision making is useful for making nonprogrammed decisions when
conditions are uncertain, information is limited, and there are manager conflicts about what goals
to pursue or what course of action to take.
Checklist
Now that you have completed the third unit, you need to check whether you have grasped the
concepts discussed in this unit. If your answer to the questions below is No, then you have to go
back and read the relevant sub-section again.
Accomplishments Yes/No
Can Understand levels of decision making
You Know the information requirements of various decision making
Explain the interaction between information, decision making and management
Identify the levels of management
Discuss the nature of decision made under each level based on their scope,
structure and time horizon
Identify the information requirements at different levels of management
Discuss the features of information need at each managerial levels
Identify the various business functions and the role of ISs in these functions
Distinguish the information requirements of the different managerial functions
Explain how ISs in the basic business functions relate to each other
Explain what decision making is and what it involves
Distinguish among decision making rules
Distinguish among decision making models
Describe the personal traits of decision makers
Relate IT and Management
Commandment!
So as to pass through this step, at least you have to accomplish or perform 90% of the above
requirements! If not, go back and get done the unfulfilled part!
119
1. A decision made by top management that are unstructured and that have wider scope
and covers longer time horizon are best described:
A. Tactical planning, D. Operational control,
B. Strategic Planning, E. None of the above.
C. Management controls,
2. The process of assuring that specific tasks are being carried out effectively and
efficiently is ?
A. Tactical planning, D. Operational control,
B. Strategic Planning, E. None of the above.
C. Management controls,
3. Which one of the following is not a characteristic of strategic management information?
A. Ad-hoc, D. External,
B. Infrequent, E. None of the above
C. Detailed,
4. Which business function involve product engineering, production planning and
operation of production facilities?
A. Marketing, D. Manufacturing,
B. Human Resource, E. None of the above.
C. Financial Management,
5. Which one of the following is not one of the steps in decision making?
A. Evaluation and Feedback, D. Selection of desired
B. Recognition of decision alternative,
requirement, E. None of the above
C. Development of alternatives,
6. The play it safe basis for decision making is best described by:
A. maximin, D. Expected value,
B. maximax, E. None of the above
C. minimax regret,
7. Decisions that involve situations that have occurred often enough to enable decision
rules to be developed and applied in the future are best described by:
A. Strategic, D. nonprogrammed,
B. Tactical, E. None of the above
C. programmed,
8. Which one of the following refers to distinctions among people with respect to how they
evaluate problems, generate alternatives and make choice?
A. Analytical style, D. Conceptual Style,
B. Directive style, E. None of the above.
C. Personal decision style,
9. Which one of the following decision model is referred to as the classical model of
decision making?
A. Ideal-Rational Model C. Political Model
B. Administrative Model D. Programmed Model
120
E. None of the above.
10. A production that combines advanced technology with innovative management methods
through highly trained employees to cut waste and improve quality and productivity is
best described by
A. RFID D. Decision support systems,
B. Lean Manufacturing E. None of the above.
C. Knowledge Management
Part II: Matching
121
1. A difference between programmed and nonprogrammed decisions relates to the degree of
certainty or uncertainty that managers deal with in making the decision.
2. Programmed decisions are made in response to situations that are unique, are poorly
defined and largely unstructured, and have important consequences.
3. The minimax regret decision rule is that the decision option selected should be the one
which minimizes the maximum potential regret for any of the possible outcomes
4. Regret is the opportunity lost through making the right decision.
5. A choice made from available alternatives is decision while the process of identifying
problems and opportunities and then resolving them is decision making
6. The marketing tactical management group is responsible to make comparison of
marketing overall performance against the marketing plan of the organisation and
produce sales analysis reports.
7. Major Manufacturing information systems categories are cash and securities
management, capital budgeting systems and financial planning and budgeting systems.
8. All functional managers perform the managerial activities of strategic planning, tactical
control and operational control.
9. Business functions are groups of similar business activities like marketing, production...
10. The Human Resource Information Subsystems include the staffing subsystem, the work
force planning subsystem, training and development subsystem and the compensation
subsystem.
122
time horizon. Lower or supervisory levels management makes too structured decisions,
and that have short-term effect and covers shorter time horizon.
2. The managerial level associated with too structured decisions is lower level management.
3. The managerial level associated with decisions of longer horizon is top level management
123
decisions relates to the degree of certainty or uncertainty that managers deal with in
making the decision.
UNIT FOUR
Strategic Advantage of Information
Unit Introduction
Dear learners, welcome to the fourth unit of this course! This unit enables you to perceive
technology as the actual cause and driver of business strategy than an afterthought. The unit
begins by explaining strategic role of information systems, and it proceeds by relating
information systems and business strategy. It will discuss how systems must be used to attain
competitive advantage. Finally, it will explain how you as business managers can maintain the
competitive advantage secured through technology.
124
This unit will show you that it is important to view information systems as more than a set of
technologies that support efficient business operations, workgroup and enterprise collaboration,
or effective business decision making.
You should also view information systems strategically, that is, as vital competitive networks, as
a means of organizational renewal, and as a necessary investment in technologies; such
technologies help a company adopt strategies and business processes that enable it to reengineer
or reinvent itself to survive and succeed in today’s dynamic business environment.
Accordingly in this unit, you will be introduced with fundamental competitive strategy concepts
that underlie the strategic use of information systems and with the several major strategic
applications of information technology used by many companies today.
Unit Objectives
After studying this unit, you should be able to:
Identify several basic competitive strategies
Explain how they competitive strategies use information technologies to
confront the competitive forces faced by a business.
Identify several strategic uses of information technologies
Explain how technologies can help a business gain competitive advantages.
Identify the business value of using Information technologies to become an
agile competitor or form a virtual company.
Explain how knowledge management systems can help a business gain strategic
advantages.
Discuss the basic concepts that define the role of competitive strategy as it
applies to information systems.
Identify the strategic roles of Information systems
Explain how companies develop competitive strategies using information
systems
Discuss how information systems help businesses use synergies, core
competencies, and network-based strategies to achieve competitive advantage.
Explain how companies use information systems for competitive advantage
Discuss how information systems help businesses to sustain their competitive
advantage.
125
UNIT FOUR - SECTION ONE
4.
4.1. Strategic Role of Information Systems
Section Objectives
At the end of this section you should be able to:
• Discuss the basic concepts that define the role of competitive strategy as it applies to
information systems.
• Identify the strategic roles of Information systems
Section Overview
A major role of information systems applications in business is to provide effective support of a
company’s strategies for gaining competitive advantage. This strategic role of information
systems involves using information technology to develop products, services, and capabilities
that give a company major advantages over the competitive forces it faces in the global
marketplace.
A strategic information system can be any kind of information system (e.g., TPS, MIS,
and DSS) that uses information technology to help an organization gain a competitive
advantage, reduce a competitive disadvantage, or meet other strategic enterprise
objectives.
The figure below illustrates the various competitive forces a business might encounter, as well as
the competitive strategies that can be adopted to counteract such forces. It is important to note
that the figure suggests that any of the major strategies may be deemed useful against any of the
common competitive forces. Although it is rare and unlikely that a single firm would use all
strategies simultaneously, each has value in certain circumstances. For now, it is only important
that you become familiar with the available strategic approaches. Let us look at several basic
concepts that define the role of competitive strategy as it applies to information systems.
Businesses can develop competitive strategies to counter the actions of the competitive forces
they confront in the marketplace.
126
4.1.1. Competitive Forces and Strategies
How should a business professional think about competitive strategies? How can a business use
information systems to apply competitive strategies?
The figure above illustrates an important conceptual framework for understanding forces of
competition and the various competitive strategies employed to balance them.
A company can survive and succeed in the long run only if it successfully develops strategies to
confront five competitive forces that shape the structure of competition in its industry. In
Michael Porter’s classic model of competition, any business that wants to survive and succeed
must effectively develop and implement strategies to counter (1) the rivalry of competitors
within its industry, (2) the threat of new entrants into an industry and its markets, (3) the threat
posed by substitute products that might capture market share, (4) the bargaining power of
customers, and (5) the bargaining power of suppliers.
Competition is a positive characteristic in business, and competitors share a natural, and often
healthy, rivalry. This rivalry encourages and sometimes requires a constant effort to gain
competitive advantage in the marketplace.
This ever-present competitive force requires significant resources on the part of a firm. Guarding
against the threat of new entrants also requires the expenditure of significant organizational
resources. Not only do firms need to compete with other firms in the marketplace, but they must
also work to create significant barriers to the entry of new competition. This competitive force
127
has always been difficult to manage, but it is even more so today. The Internet has created many
ways to enter the marketplace quickly and with relatively low cost.
In the Internet world, a firm’s biggest potential competitor may be one that is not yet in
the marketplace but could emerge almost overnight.
The threat of substitutes is another competitive force that confronts a business. The effect of this
force is apparent almost daily in a wide variety of industries, often at its strongest during periods
of rising costs or inflation.
For example, when airline prices get too high, people substitute car travel. When the cost of
mutton gets too high, people eat more beef or chicken. Most products or services have some sort
of substitute available to the consumer.
Finally, a business must guard against the often opposing forces of customer and supplier
bargaining powers. If customers’ bargaining power gets too strong, they can drive prices to
unmanageably low levels or just refuse to buy the product or service. If a key supplier’s
bargaining power gets too strong, it can force the price of goods and services to unmanageably
high levels or just starve a business by controlling the flow of parts or raw materials essential to
the manufacture of a product.
Businesses can counter the threats of competitive forces that they face by implementing one or
more of the five basic competitive strategies.
1. Cost Leadership Strategy.
Cost leadership strategy involve becoming a low-cost producer of products and services
in the industry or finding ways to help suppliers or customers reduce their costs or
increase the costs of competitors.
2. Differentiation Strategy.
Differentiation strategy involves developing ways to differentiate a firm’s products and
services from those of its competitors or reduce the differentiation advantages of competitors.
This strategy may allow a firm to focus its products or services to give it an advantage in
particular segments or niches of a market.
3. Innovation Strategy.
Innovation strategy involves finding new ways of doing business. This strategy may involve
developing unique products and services or entering unique markets or market niches. It may
also involve making radical changes to the business processes for producing or distributing
products and services that are so different from the way a business has been conducted that
they alter the fundamental structure of an industry.
4. Growth Strategies.
128
Growth strategies involve significantly expanding a company’s capacity to produce goods
and services, expanding into global markets, diversifying into new products and services, or
integrating into related products and services.
5. Alliance Strategies.
Alliance strategies involve establishing new business linkages and alliances with customers,
suppliers, competitors, consultants, and other companies. These linkages may include
mergers, acquisitions, joint ventures, formation of virtual companies, or other marketing,
manufacturing, or distribution agreements between a business and its trading partners.
One additional point regarding these strategies is that they are not mutually exclusive. The role
of Information Systems in implementing the five basic competitive strategies is summarized
below:
Basic Strategies in the Business Use of Information Technology
1. Lower Costs
•. Use IT to substantially reduce the cost of business processes
• Use IT to lower the costs of customers or suppliers.
2. Differentiate
• Develop new IT features to differentiate products and services.
• Use IT features to reduce the differentiation advantages of competitors.
• Use IT features to focus products and services at selected market niches.
3. Innovate
• Create new products and services that include IT components.
• Develop unique new markets or market niches with the help of IT.
• Make radical changes to business processes with IT that dramatically cut costs; improve
quality, efficiency, or customer service; or shorten time to market.
4. Promote Growth
• Use IT to manage regional and global business expansion.
• Use IT to diversify and integrate into other products and services.
5. Develop Alliances
• Use IT to create virtual organizations of business partners.
• Develop internet enterprise information systems linked by the Internet and extranets that
support strategic business relationships with customers, suppliers, subcontractors, and others.
129
Section Overview
How can business managers use investments in information technology to support a firm’s
competitive strategies? There are many ways that information technology can help a business
implement the five basic competitive strategies, which were already discussed in the previous
section. However, there are many strategic initiatives available to a firm in addition to the five
basic strategies of cost leadership, differentiation, innovation, growth, and alliance. In this
section we will have a look at several key strategies that can also be implemented with
information technology.
These key strategies include locking in customers or suppliers, building switching costs, raising
barriers to entry, and leveraging investment in information technology.
Investments in information technology can allow a business to lock in customers and suppliers
(and lock out competitors) by building valuable new relationships with them. These business
relationships can become so valuable to customers or suppliers that they deter them from
abandoning a company for its competitors or intimidate them into accepting less profitable
business arrangements. Early attempts to use information systems technology in these
relationships focused on significantly improving the quality of service to customers and suppliers
in a firm’s distribution, marketing, sales, and service activities. More recent projects characterize
a move toward more innovative uses of information technology.
A major emphasis in strategic information systems has been to find ways to create switching
costs in the relationships between a firm and its customers or suppliers. In other words,
investments in information systems technology can make customers or suppliers dependent on
the continued use of innovative, mutually beneficial inter-enterprise information systems. They
then become reluctant to pay the costs in time, money, effort, and inconvenience that it would
take to switch to a company’s competitors.
Investing in information technology enables a firm to build strategic IT capabilities so that they
can take advantage of opportunities when they arise. In many cases, this happens when a
company invests in advanced computer-based information systems to improve the efficiency of
its own business processes. Then, armed with this strategic technology platform, the firm can
leverage investment in IT by developing new products and services that would not be possible
without a strong IT capability.
130
An important current example is the development of corporate intranets and extranets by many
companies, which enables them to leverage their previous investments in Internet browsers, PCs,
servers, and client/server networks.
Let’s look at another important concept that can help you identify opportunities for strategic
information systems. The value chain concept, developed by Michael Porter, views a firm as a
series, chain, or network of basic activities that add value to its products and services and thus
add a margin of value to both the firm and its customers. In the value chain conceptual
framework, some business activities are primary processes; others are support processes. Primary
processes are those business activities that are directly related to the manufacture of products or
the delivery of services to the customer. In contrast, support processes are those business
activities that help support the day-to-day operation of the business and that indirectly contribute
to the products or services of the organization.
This framework can highlight where competitive strategies can best be applied in a business. So
managers and business professionals should try to develop a variety of strategic uses of the
131
Internet and other technologies for those basic processes that add the most value to a company’s
products or services and thus to the overall business value of the company.
The above figure provides examples of how and where information technologies can be applied
to basic business processes using the value chain framework. Thus, the value chain concept can
help you identify where and how to apply the strategic capabilities of information technology. It
shows how various types of information technologies might be applied to specific business
processes to help firm gain competitive advantages in the marketplace.
Activity 1
1 Information system has to be viewed strategically. Explain.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
3 What are the five competitive forces that shape the structure of competition in the industry?
Identify the strategies that could be used to counter the competitive forces.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
Section Overview
Strategic information systems often change the organization as well as its products, services, and
operating procedures, driving the organization into new behavioral patterns. Successfully using
132
information systems to achieve a competitive advantage is challenging and requires precise
coordination of technology, organizations, and management. In this section, we will have a look
at how businesses can use information systems to achieve competitive advantage and how to
sustain it.
Organizations may view and use information technology in many ways. For example, companies
may choose to use information systems strategically, or they may be content to use IT to support
efficient everyday operations. If a company emphasized strategic business uses of information
technology, its management would view IT as a major competitive differentiator. They would
then devise business strategies that use IT to develop products, services, and capabilities that
give the company major advantages in the markets in which it competes.
However, making radical changes to business processes to dramatically improve efficiency and
effectiveness is not an easy task. For example, many companies have used cross-functional
enterprise resource planning (ERP) software to reengineer, automate, and integrate their
manufacturing, distribution, finance, and human resource business processes. Although many
companies have reported impressive gains with such ERP reengineering projects, many others
either have experienced dramatic failures or did not achieve the improvements they sought.
Information technology plays a major role in reengineering most business processes. The speed,
information-processing capabilities, and connectivity of computers and Internet technologies can
substantially increase the efficiency of business processes, as well as communications and
collaboration among the people responsible for their operation and management.
133
An agile company is a company that able to move quickly and with suppleness, skill,
and control.
We are changing from a competitive environment in which mass-market products and services
were standardized, long-lived, information-poor, and exchanged in one-time transactions, to an
environment in which companies compete globally with niche market products and services that
are individualized, short-lived, information-rich, and exchanged on an ongoing basis with
customers .
To be an agile company, a business must use four basic strategies. First, the business must ensure
that customers perceive the products or services of an agile company as solutions to their
individual problems. Thus, it can price products on the basis of their value as solutions, rather
than their cost to produce. Second, an agile company cooperates with customers, suppliers, other
companies, and even with its competitors.
This cooperation allows a business to bring products to market as rapidly and cost-effectively as
possible, no matter where resources are located or who owns them.
Third, an agile company organizes so that it thrives on change and uncertainty. It uses flexible
organizational structures keyed to the requirements of different and constantly changing
customer opportunities. Fourth, an agile company leverages the impact of its people and the
knowledge they possess. By nurturing an entrepreneurial spirit, an agile company provides
powerful incentives for employee responsibility, adaptability, and innovation.
Information technologies enable a company to partner with its suppliers, distributors, contract
manufacturers, and others via collaborative portals and other Web-based supply chain systems
that significantly improve its agility in exploiting innovative business opportunities.
Virtual companies typically form virtual workgroups and alliances with business partners that are
interlinked by the Internet, intranets, and extranets. Notice that this company has organized
internally into clusters of process and cross-functional teams linked by intranets. It has also
134
developed alliances and extranet links that form inter-enterprise information systems with
suppliers, customers, subcontractors, and competitors. Thus, virtual companies create flexible
and adaptable virtual workgroups and alliances keyed to exploit fast-changing business
opportunities.
You may ask why do people form virtual companies? This is because virtual companies are one
of the best ways to implement key business strategies and alliances that promise to ensure
success in today’s turbulent business climate. Several major reasons for virtual companies stand
out.
For example, a business may not have the time or resources to develop the necessary
manufacturing and distribution infrastructure, personnel competencies, and information
technologies to take full advantage of a new market opportunity in a timely manner. It can
assemble the components it needs to provide a world-class solution for customers and capture the
market opportunity only by quickly forming a virtual company through a strategic alliance of all-
star partners. Today, of course, the Internet, intranets, extranets, and a variety of other Internet
technologies are vital components in creating such successful solutions.
Many companies today can only realize lasting competitive advantage if they become
knowledge-creating companies or learning organizations. That means consistently creating new
business knowledge, disseminating it widely throughout the company, and quickly building the
new knowledge into their products and services.
Knowledge-creating companies exploit two kinds of knowledge. One is explicit knowledge,
which is the data, documents, and things written down or stored on computers. The other kind is
tacit knowledge, or the “how-tos” of knowledge, which resides in workers.
Explicit knowledge is a one captured as data on documents, and things written down or
stored on computers where as tacit knowledge is a one that resides in workers. For
example, a chef may prepare a guide to make a burger. This guide is an explicit
knowledge. However, the burger prepared by him and someone else based on the guide
may not have same taste. The variant is tacit knowledge which is difficult if not
impossible to codify and transfer it like the explicit knowledge.
135
Tacit knowledge can often represent some of the most important information within an
organization. Long-time employees of a company often “know” many things about how to
manufacture a product, deliver the service, deal with a particular vendor, or operate an essential
piece of equipment. This tacit knowledge is not recorded or codified anywhere because it has
evolved in the employee’s mind through years of experience. Furthermore, much of this tacit
knowledge is never shared with anyone who might be in a position to record it in a more formal
way because there is often little incentive to do so or simply, “Nobody ever asked.”
Successful knowledge management creates techniques, technologies, systems, and rewards for
getting employees to share what they know and make better use of accumulated workplace and
enterprise knowledge. In that way, employees of a company are leveraging knowledge as they do
their jobs.
136
Internet and intranet Web sites, groupware, data mining, knowledge bases, and online discussion
groups are some of the key technologies that may be used by a KMS.
Knowledge management systems also facilitate organizational learning and knowledge creation.
They are designed to provide rapid feedback to knowledge workers, encourage behavior changes
by employees, and significantly improve business performance. As the organizational learning
process continues and its knowledge base expands, the knowledge-creating company works to
integrate its knowledge into its business processes, products, and services. This integration helps
the company become a more innovative and agile provider of high-quality products and
customer services, as well as a formidable competitor in the marketplace.
Section Overview
The competitive advantages that strategic systems confer do not necessarily last long enough to
ensure long-term profitability. Because competitors can retaliate and copy strategic systems,
competitive advantage is not always sustainable. In this section we will look at how business use
information systems to sustain their competitive advantage.
Markets, customer expectations, and technology change; globalization has made these changes
even more rapid and unpredictable. The Internet can make competitive advantage disappear very
quickly because virtually all companies can use this technology. Classic strategic systems, such
as Airlines’ computerized reservation system, bank’s ATM system, and post offices package
tracking system, benefited by being the first in their industries. Then rival systems emerged.
Information systems alone cannot provide an enduring business advantage. Systems originally
intended to be strategic frequently become tools for survival, required by every firm to stay in
business, or they may inhibit organizations from making the strategic changes essential for future
success.
137
In order to sustain the competitive advantage firms consciously engage in such activities as
strategic alignment and managing their strategic transitions. Each of which are discussed below
as follows:
Most businesses get it wrong: Information technology takes on a life of its own and does not
serve management and shareholder interests very well. Instead of business people taking an
active role in shaping IT to the enterprise, they ignore it, claim not to understand IT, and tolerate
failure in the IT area as just a nuisance to work around. Such firms pay a hefty price in poor
performance. Successful firms and managers understand what IT can do and how it works, take
an active role in shaping its use, and measure its impact on revenues and profits.
138
Adopting the kinds of strategic systems described in this chapter generally requires changes in
business goals, relationships with customers and suppliers, and business processes. These socio-
technical changes, affecting both social and technical elements of the organization, can be
considered strategic transitions- a movement between levels of socio-technical systems.
Such changes often entail blurring of organizational boundaries, both external and internal.
Suppliers and customers must become intimately linked and may share each other’s
responsibilities. Managers will need to devise new business processes for coordinating their
firms’ activities with those of customers, suppliers, and other organizations. The organizational
change requirements surrounding new information systems are so important.
Activity 2
1 What is Business Process Re-engineering?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
2 Information System can be used to create an agile company. What is an agile company?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
UNIT SUMMARY
A major role of information systems applications in business is to provide effective support of a
company’s strategies for gaining competitive advantage.
139
A strategic information system can be any kind of information system (e.g., TPS, MIS,
and DSS) that uses information technology to help an organization gain a competitive
advantage, reduce a competitive disadvantage, or meet other strategic enterprise
objectives.
Competition is a positive characteristic in business, and competitors share a natural, and often
healthy, rivalry. This rivalry encourages and sometimes requires a constant effort to gain
competitive advantage in the marketplace.
There are 5 competitive forces (1) the rivalry of competitors within its industry, (2) the threat of
new entrants into an industry and its markets, (3) the threat posed by substitute products that
might capture market share, (4) the bargaining power of customers, and (5) the bargaining power
of suppliers.
They can be countered though 5 strategies (1) Cost Leadership Strategy, (2) Differentiation
Strategy, (3) Innovation Strategy, (4) Growth Strategies and (5) Alliance Strategies.
There are many ways that information technology can help a business implement the five basic
competitive strategies
Strategic information systems often change the organization as well as its products, services, and
operating procedures, driving the organization into new behavioral patterns.
An agile company is a company that able to move quickly and with suppleness, skill,
and control.
A virtual company (also called a virtual corporation or virtual organization) is an organization that uses
information technology to link people, organizations, assets, and ideas.
Explicit knowledge is a one captured as data on documents, and things written down or stored on
computers where as tacit knowledge is a one that resides in workers. For example, a chef may prepare a
guide to make a burger. This guide is an explicit knowledge. However, the burger prepared by him and
someone else based on the guide may not have same taste. The variant is tacit knowledge which is
difficult if not impossible to codify and transfer it like the explicit knowledge.
The competitive advantages that strategic systems confer do not necessarily last long enough to
ensure long-term profitability. Because competitors can retaliate and copy strategic systems,
competitive advantage is not always sustainable
140
Checklist
Now that you have completed the fourth unit, you need to check whether you have grasped the
concepts discussed in this unit. If your answer to the questions below is No, then you have to go
back and read the relevant sub-section again.
Accomplishments Yes/No
Can Understand the competitive forces of market place
You Know the several basic competitive strategies
Explain how they competitive strategies use information technologies to confront
the competitive forces faced by a business.
Identify several strategic uses of information technologies
Explain how technologies can help a business gain competitive advantages
Identify the business value of using Information technologies to become an agile
competitor or form a virtual company.
Explain how knowledge management systems can help a business gain strategic
advantages
Discuss the basic concepts that define the role of competitive strategy as it
applies to information systems
Identify the strategic roles of Information systems
Explain how companies develop competitive strategies using information
systems
Discuss how information systems help businesses use synergies, core
competencies, and network-based strategies to achieve competitive advantage.
Explain how companies use information systems for competitive advantage
Discuss how information systems help businesses to sustain their competitive
advantage.
Commandment!
So as to pass through this step, at least you have to accomplish or perform 90% of the above
requirements! If not, go back and get done the unfulfilled part!
141
1. The collection of strategic information systems that support the competitive position of
a business is best described by:
A. Transaction Processing System, D. Strategic Information
B. Management Information Architecture,
System, E. None of the above.
C. Decision Support System,
2. Which one of the following competitive forces explain the arrival of new internet based
business that offer similar services?
A. Rivalry of competitors , D. Customers power,
B. Entrant threat, E. None of the above.
C. Substitute threat,
3. A strategy that involves developing ways to make a firm’s products unique from
competitors:
A. Cost leadership, D. Growth,
B. Innovation, E. None of the above.
C. Differentiation,
4. Which competitive strategy is supported by information systems if a business uses IT to
create virtual organizations of business partners?
A. Alliance, D. Differentiation,
B. Growth, E. None of the above.
C. Innovation,
5. The concept that views the firm as a series, chain, or network of basic activities that add
value to its products and thus add a margin of value is best described by:
A. Strategy Architecture, D. Virtuality,
B. Value Chain, E. None of the above.
C. Agility,
6. Activities performed a business to manufacture, promote and sell its products is best
described by:
A. Value chain activities, D. Inbound logistics,
B. Primary activities, E. None of the above.
C. Support activities,
7. A fundamental rethinking and radical redesign of business processes to achieve
dramatic improvements in cost, quality, speed and service is best described by:
A. Agile Company, D. Virtual company,
B. Business Strategy, E. None of the above.
C. BPR,
8. Which one of the following refers to knowledge captured as data on documents and
things written down or stored on computers?
A. Knowledge creation, D. Explicit knowledge,
B. Tacit knowledge, E. None of the above.
C. Knowledge management,
142
9. The techniques, technologies, and systems that promote the collection, organization,
access, sharing, and use of workplace and enterprise knowledge is best described by:
A. Knowledge creation, D. Explicit knowledge,
B. Tacit knowledge, E. None of the above.
C. Knowledge management,
10. An attempt to make IT not take a life of its own and does not fail to serve management
interests is best described by:
A. Strategy Sustainability D. Strategic alignment,
B. Strategic Transitions E. None of the above.
C. ERP
Part II: Matching
143
above
1. Growth strategies involve establishing new business linkages and alliances with
customers, suppliers, competitors, consultants, and other companies..
2. Innovation strategy involves finding new ways of doing business.
3. If customers’ bargaining power gets too strong, they can drive prices to unmanageably
low levels or just refuse to buy the product or service is a threat.
4. In the Internet world, a firm’s biggest potential competitor may be one that is not yet in
the marketplace but could emerge almost overnight.
5. Use of IT features to focus products and services at selected market niches are a low cost
strategy application.
6. Use of IT to manage regional and global business expansion is a growth strategy
application
7. Key strategies that could be implemented using IT include locking in customers or
suppliers, building switching costs, raising barriers to entry, and leveraging investment in
information technology
8. Primary value chain processes are those business activities that help support the day-to-
day operation of the business and that indirectly contribute to the products or services of
the organization.
9. Reengineering is a fundamental rethinking and radical redesign of business processes to
achieve dramatic improvements in cost, quality, speed, and service
10. An agile company is a company that able to move quickly and with suppleness, skill, and
control.
144
Feed Back/Answer for Activity 1
1. Information systems has to be viewed as vital competitive networks, as a means of
organizational renewal, and as a necessary investment in technologies; such technologies
help a company adopt strategies and business processes that enable it to reengineer or
reinvent itself to survive and succeed in today’s dynamic business environment.
2. A strategic information architecture: the collection of strategic information systems that
supports or shapes the competitive position and strategies of a business enterprise. A
strategic information system can be any kind of information system (e.g., TPS, MIS, and
DSS) that uses information technology to help an organization gain a competitive
advantage, reduce a competitive disadvantage, or meet other strategic enterprise
objectives.
3. The 5 competitive forces are (1) the rivalry of competitors within its industry, (2) the
threat of new entrants into an industry and its markets, (3) the threat posed by substitute
products that might capture market share, (4) the bargaining power of customers, and (5)
the bargaining power of suppliers. They can be countered though (1) Cost Leadership
Strategy, (2) Differentiation Strategy, (3) Innovation Strategy, (4) Growth Strategies and
(5) Alliance Strategies.
145
2 H 4 K 6 B 8 D 10 I
Part III: True or False
1 F 3 T 5 F 7 T 9 T
2 T 4 T 6 T 8 F 10 T
UNIT FIVE
Management of Information Systems
Unit Introduction
Dear learners, welcome to the last unit of this course! This part focuses on building and
managing systems in organizations. This part answers questions such as: What activities are
required to build a new information system? What alternative approaches are available for
building system solutions? How should information systems projects be managed to ensure
that new systems provide genuine business benefits and work successfully in the organization?
What issues must be addressed when building and managing global systems?
Unit Objectives
After studying this unit, you should be able to:
Explain how building new systems produce organizational change.
Identify the core activities in the systems development process.
Discuss the principal methodologies for modeling and designing systems.
Elaborate the alternative methods for building information systems.
Understand the concept of system resource management
Section Overview
Building a new information system is one kind of planned organizational change. The
introduction of a new information system involves much more than new hardware and software.
It also includes changes in jobs, skills, management, and organization. When we design a new
information system, we are redesigning the organization. System builders must understand how a
system will affect specific business processes and the organization as a whole.
Information technology can promote various degrees of organizational change, ranging from
incremental to far-reaching. There are four kinds of structural organizational change that are
enabled by information technology: (1) automation, (2) rationalization, (3) business process
redesign, and (4) paradigm shifts. Each carries different risks and rewards.
The most common form of IT-enabled organizational change is automation. The first
applications of information technology involved assisting employees with performing their tasks
more efficiently and effectively. Calculating paychecks and payroll registers, giving bank tellers
instant access to customer deposit records, and developing a nationwide reservation network for
airline ticket agents are all examples of early automation.
The most common forms of organizational change are automation and rationalization.
These relatively slow-moving and slow-changing strategies present modest returns but
little risk. Faster and more comprehensive change—such as redesign and paradigm
shifts—carries high rewards but offers substantial chances of failure.
A deeper form of organizational change—one that follows quickly from early automation—is
rationalization of procedures. Automation frequently reveals new bottlenecks in production and
makes the existing arrangement of procedures and structures painfully cumbersome.
Rationalization of procedures is the streamlining of standard operating procedures.
147
Six sigma is a specific measure of quality, representing 3.4 defects per million opportunities.
Most companies cannot achieve this level of quality, but use six sigma as a goal for driving
ongoing quality improvement programs.
A more powerful type of organizational change is business process redesign, in which business
processes are analyzed, simplified, and redesigned.
Business process redesign reorganizes workflows, combining steps to cut waste and eliminate
repetitive, paper-intensive tasks. (Sometimes the new design eliminates jobs as well.) It is much
more ambitious than rationalization of procedures, requiring a new vision of how the process is
to be organized.
Rationalizing procedures and redesigning business processes are limited to specific parts of a
business. New information systems can ultimately affect the design of the entire organization by
transforming how the organization carries out its business or even the nature of the business.
This more radical form of business change is called a paradigm shift. A paradigm shift involves
rethinking the nature of the business and the nature of the organization.
Paradigm shifts and reengineering often fail because extensive organizational change is so
difficult to orchestrate. Why, then, do so many corporations contemplate such radical change?
Because the rewards are equally high. In many instances, firms seeking paradigm shifts and
pursuing reengineering strategies achieve stunning, order-of- magnitude increases in their returns
on investment (or productivity).
Many businesses today are trying to use information technology to improve their business
processes. Some of these systems entail incremental process change, but others require more far-
reaching redesign of business processes. To deal with these changes, organizations are turning to
business process management. Business process management provides a variety of tools and
methodologies to analyze existing processes, design new processes, and optimize those
processes. BPM is never concluded because process improvement requires continual change.
Companies practicing business process management go through the following steps:
1. Identify processes for change: One of the most important strategic decisions that a firm can
make is not deciding how to use computers to improve business processes, but understanding
what business processes need improvement. When systems are used to strengthen the wrong
business model or business processes, the business can become more efficient at doing what it
should not do. As a result, the firm becomes vulnerable to competitors who may have discovered
the right business model. Considerable time and cost may also be spent improving business
processes that have little impact on overall firm performance and revenue.
148
Managers need to determine what business processes are the most important and how improving
these processes will help business performance.
2. Analyze existing processes: Existing business processes should be modeled and documented,
noting inputs, outputs, resources, and the sequence of activities. The process design team
identifies redundant steps, paper-intensive tasks, bottlenecks, and other inefficiencies.
3. Design the new process: Once the existing process is mapped and measured in terms of time
and cost, the process design team will try to improve the process by designing a new one. A new
streamlined “to-be” process will be documented and modeled for comparison with the old
process.
4. Implement the new process: Once the new process has been thoroughly modeled and
analyzed, it must be translated into a new set of procedures and work rules. New information
systems or enhancements to existing systems may have to be implemented to support the
redesigned process.
The new process and supporting systems are rolled out into the business organization. As the
business starts using this process, problems are uncovered and addressed. Employees working
with the process may recommend improvements.
5. Continuous measurement: Once a process has been implemented and optimized, it needs to be
continually measured. Why? Processes may deteriorate over time as employees fall back on old
methods, or they may lose their effectiveness if the business experiences other changes.
Although many business process improvements are incremental and ongoing, there are occasions
when more radical change must take place.
When properly implemented, business process redesign produces dramatic gains in productivity
and efficiency, and may even change the way the business is run. In some instances, it drives a
“paradigm shift” that transforms the nature of the business itself.
BPM poses challenges. Executives report that the largest single barrier to successful business
process change is organizational culture. Employees do not like unfamiliar routines and often try
to resist change. This is especially true of projects where organizational changes are very
ambitious and far-reaching.
Managing change is neither simple nor intuitive, and companies committed to extensive process
improvement need a good change management strategy
149
New information systems are an outgrowth of a process of organizational problem solving. A
new information system is built as a solution to some type of problem or set of problems the
organization perceives it is facing. The problem may be one in which managers and employees
realize that the organization is not performing as well as expected, or that the organization should
take advantage of new opportunities to perform more successfully.
The activities that go into producing an information system solution to an organizational problem
or opportunity are called systems development. Systems development is a structured kind of
problem solved with distinct activities.
There are alternative methodologies for modeling and designing systems. Structured
methodologies and object-oriented development are the most prominent.
Structured methodologies have been used to document, analyze, and design information systems
since the 1970s. Structured refers to the fact that the techniques are step by step, with each step
building on the previous one. Structured methodologies are top-down, progressing from the
highest, most abstract level to the lowest level of detail—from the general to the specific.
The primary tool for representing a system’s component processes and the flow of data between
them is the data flow diagram (DFD). The data flow diagram offers a logical graphic model of
information flow, partitioning a system into modules that show manageable levels of detail. It
rigorously specifies the processes or transformations that occur within each module and the
interfaces that exist between them.
DFD uses 4 symbols each representing the data elements represented by DFD.
1. Data sources and destinations
– Appear as squares
– Represent organizations or individuals that send or receive data used or
produced by the system
– An item can be both a source and a destination
150
2. Data flows
– Appear as arrows
– Represent the flow of data between sources and destinations, processes, and data
stores
3. Processes
– Appear as circles
– Represent the
transformation of data
4. Data stores
– Appear as two
horizontal lines
– Represent a temporary or
permanent repository of data
The diagrams can be used to depict higher-level processes as well as lower level details. Through
leveled data flow diagrams, a complex process can be broken down into successive levels of
detail. An entire system can be divided into subsystems with a high-level data flow diagram.
Each subsystem, in turn, can be divided into additional subsystems with second-level data flow
diagrams, and the lower-level subsystems can be broken down again until the lowest level of
detail has been reached.
Another tool for structured analysis is a data dictionary, which contains information about
individual pieces of data and data groupings within a system. The data dictionary defines the
151
contents of data flows and data stores so that systems builders understand exactly what pieces of
data they contain.
Process specifications describe the transformation occurring within the lowest level of the data
flow diagrams. They express the logic for each process.
In structured methodology, software design is modeled using hierarchical structure charts. The
structure chart is a top-down chart, showing each level of design, its relationship to other levels,
and its place in the overall design structure. The design first considers the main function of a
program or system, then breaks this function into sub-functions, and decomposes each sub-
function until the lowest level of detail has been reached. . If a design has too many levels to fit
onto one structure chart, it can be broken down further on more detailed structure charts. A
structure chart may document one program, one system (a set of programs), or part of one
program.
An object combines data and the specific processes that operate on those data.
Data encapsulated in an object can be accessed and modified only by the operations, or methods,
associated with that object. Instead of passing data to procedures, programs send a message for
an object to perform an operation that is already embedded in it. The system is modeled as a
collection of objects and the relationships among them. Because processing logic resides within
objects rather than in separate software programs, objects must collaborate with each other to
make the system work.
Object-oriented modeling is based on the concepts of class and inheritance. Objects belonging to
a certain class, or general categories of similar objects, have the features of that class. Classes of
objects in turn can inherit all the structure and behaviors of a more general class and then add
variables and behaviors unique to each object.
The systems life cycle methodology maintains a formal division of labor between end users and
information systems specialists. Technical specialists, such as systems analysts and
programmers, are responsible for much of the systems analysis, design, and implementation
work; end users are limited to providing information requirements and reviewing the technical
staff’s work. The life cycle also emphasizes formal specifications and paperwork; so many
documents are generated during the course of a systems project.
The systems life cycle is still used for building large complex systems that require a rigorous and
formal requirements analysis, predefined specifications, and tight controls over the system
building process. However, the systems life cycle approach can be costly, time-consuming, and
inflexible. Although systems builders can go back and forth among stages in the life cycle, the
systems life cycle is predominantly a “waterfall” approach in which tasks in one stage are
completed before work for the next stage begins.
The figure below shows the Traditional System Development Life Cycle (The waterfall
approach)
153
5.1.3.2. Prototyping
Prototyping consists of building an experimental system rapidly and inexpensively for end users
to evaluate. By interacting with the prototype, users can get a better idea of their information
requirements. The prototype endorsed by the users can be used as a template to create the final
system.
The prototype is a working version of an information system or part of the system, but it is meant
to be only a preliminary model. Once operational, the prototype will be further refined until it
conforms precisely to users’ requirements.
Once the design has been finalized, the prototype can be converted to a polished production
system.
The process of building a preliminary design, trying it out, refining it, and trying again has been
called an iterative process of systems development because the steps required to build a system
can be repeated over and over again. Prototyping is more explicitly iterative than the
conventional life cycle, and it actively promotes system design changes. It has been said that
prototyping replaces unplanned rework with planned iteration, with each version more accurately
reflecting users’ requirements.
154
Step 4: Revise and enhance the prototype. The system builder notes all changes the user requests
and refines the prototype accordingly. After the prototype has been revised, the cycle returns to
Step 3. Steps 3 and 4 are repeated until the user is satisfied.
When no more iterations are required, the approved prototype then becomes an operational
prototype that furnishes the final specifications for the application.
Sometimes the prototype is adopted as the production version of the system.
The series of activities to develop a new system is called system development life cycle (SDLC).
These activities consist of systems analysis, systems design, programming, testing, conversion,
and production and maintenance.
Systems analysis is the analysis of a problem that a firm tries to solve with an information
system. It consists of defining the problem, identifying its causes, specifying the solution, and
identifying the information requirements that must be met by a system solution.
The systems analyst creates a road map of the existing organization and systems, identifying the
primary owners and users of data along with existing hardware and software. The systems
analyst then details the problems of existing systems. By examining documents, work papers,
and procedures, observing system operations, and interviewing key users of the systems, the
analyst can identify the problem areas and objectives a solution would achieve.
Often, the solution requires building a new information system or improving an existing one.
The systems analysis also includes a feasibility study to determine whether that solution is
feasible, or achievable, from a financial, technical, and organizational standpoint. The feasibility
study determines whether the proposed system is expected to be a good investment, whether the
technology needed for the system is available and can be handled by the firm’s information
systems specialists, and whether the organization can handle the changes introduced by the
system.
Normally, the systems analysis process identifies several alternative solutions that the
organization can pursue and assess the feasibility of each.
A written systems proposal report describes the costs and benefits, and the advantages and
disadvantages, of each alternative. It is up to management to determine which mix of costs,
benefits, technical features, and organizational impacts represents the most desirable alternative.
155
Systems analysis describes what a system should do to meet information requirements, and
systems design shows how the system will fulfill this objective. The design of an information
system is the overall plan or model for that system. Like the blueprint of a building or house, it
consists of all the specifications that give the system its form and structure.
The systems designer details the system specifications that will deliver the functions identified
during systems analysis. These specifications should address all of the managerial,
organizational, and technological components of the system solution.
Like houses or buildings, information systems may have many possible designs. Each design
represents a unique blend of all technical and organizational components. What makes one
design superior to others is the ease and efficiency with which it fulfills user requirements within
a specific set of technical, organizational, financial, and time constraints.
5.1.4.3. Programming
During the programming stage, system specifications that were prepared during the design stage
are translated into software program code. Today, many organizations no longer do their own
programming for new systems. Instead, they purchase the software that meets the requirements
for a new system from external sources such as software packages from a commercial software
vendor, software services from an application service provider, or outsourcing firms that develop
custom application software for their clients.
5.1.4.4. Testing
Exhaustive and thorough testing must be conducted to ascertain whether the system produces the
right results. Testing answers the question, “Will the system produce the desired results under
known conditions?” The amount of time needed to answer this question has been traditionally
underrated in systems project planning. Testing is time-consuming:
Testing an information system can be broken down into three types of activities: unit testing,
system testing, and acceptance testing. Unit testing, or program testing, consists of testing each
program separately in the system. It is widely believed that the purpose of such testing is to
guarantee that programs are error free, but this goal is realistically impossible. Testing should be
viewed instead as a means of locating errors in programs, focusing on finding all the ways to
make a program fail. Once they are pinpointed, problems can be corrected.
System testing tests the functioning of the information system as a whole. It tries to determine
whether discrete modules will function together as planned and whether discrepancies exist
between the way the system actually works and the way it was conceived. Among the areas
examined are performance time, capacity for file storage and handling peak loads, recovery and
restart capabilities, and manual procedures.
156
Acceptance testing provides the final certification that the system is ready to be used in a
production setting. Systems tests are evaluated by users and reviewed by management. When all
parties are satisfied that the new system meets their standards, the system is formally accepted
for installation.
The systems development team works with users to devise a systematic test plan. The test plan
includes all of the preparations for the series of tests we have just described.
Conversion is the process of changing from the old system to the new system. Four main
conversion strategies can be employed: the parallel strategy, the direct cutover strategy, the pilot
study strategy, and the phased approach strategy.
In a parallel strategy, both the old system and its potential replacement are run together for a time
until everyone is assured that the new one functions correctly. This is the safest conversion
approach because, in the event of errors or processing disruptions, the old system can still be
used as a backup.
The pilot study strategy introduces the new system to only a limited area of the organization,
such as a single department or operating unit. When this pilot version is complete and working
smoothly, it is installed throughout the rest of the organization, either simultaneously or in
stages.
The phased approach strategy introduces the new system in stages, either by functions or by
organizational units. If, for example, the system is introduced by function, a new payroll system
might begin with hourly workers who are paid weekly, followed six months later by adding
salaried employees (who are paid monthly) to the system. If the system is introduced by
organizational unit, corporate headquarters might be converted first, followed by outlying
operating units four months later.
Moving from an old system to a new one requires that end users be trained to use the new
system. Detailed documentation showing how the system works from both a technical and end-
user standpoint is finalized during conversion time for use in training and everyday operations.
Lack of proper training and documentation contributes to system failure, so this portion of the
systems development process is very important.
After the new system is installed and conversion is complete, the system is said to be in
production. During this stage, the system will be reviewed by both users and technical specialists
to determine how well it has met its original objectives and to decide whether any revisions or
modifications are in order. In some instances, a formal post-implementation audit document is
prepared. After the system has been fine-tuned, it must be maintained while it is in production to
157
correct errors, meet requirements, or improve processing efficiency. Changes in hardware,
software, documentation, or procedures to a production system to correct errors, meet new
requirements, or improve processing efficiency are termed maintenance.
Section Overview
Today, it is widely accepted that managing the information resource is very often equally
important.
The Information Systems resource management focuses on the fusion of information systems,
technology, and business management for two purposes: the use of information systems to solve
business problems and the management of technology, which includes new product development
and enterprise management.
The vast majority of information systems are developed for and used by people in functional
areas (e.g., manufacturing, human resources, accounting, finance and marketing). To develop
information systems that address the needs of the organization, resource managers must possess
a solid mix of business and technical knowledge. They must understand organizational
structures, objectives, operations (including processes and the flows of data between processes)
and the financial implications related to these factors. Only by understanding these factors can a
resource manager communicate effectively with users and then design systems that support their
needs.
158
System resource managers must stay up-to-date with evolving information technologies and have
a solid foundation of technical skills to select appropriate technologies and to implement
computer-based information systems. Thus, information system managers must be well versed in
topics such as systems development tools and techniques, information architecture, network
configurations, databases, and systems integration.
All the previous chapters believed to boost your know how on system resources other system
development processes. In this section a primer is provided on system resource management.
The major categories of information resources are hardware, software, databases, networks,
procedures, security facilities and physical buildings.
5.2.3. IS Functions
The major IS functions include: Managing systems development and systems project
management & computer operations, including the computer center, Staffing, training and
developing IS skills; provide technical services and Infrastructure planning, development and
control, Initiating and designing specific strategic IS, Incorporating the Internet and e-commerce
into the business, managing system integration including the Internet, intranets and extranets,
Educating the non-IS managers about IT, Educating the IS staff about the business, Supporting
end user computing, partnering with the executives, managing outsourcing, Proactively using
business and technical knowledge to “seed” innovative ideas about IT, creating business
alliances with vendors and IS departments in other organizations and so forth.
159
Activity 1
1 List and discuss the four kinds of structural organizational change that are enabled by information
technology
______________________________________________________________________________________
______________________________________________________________________________________
_____________________________________________________________________________________
2 What are the alternative methodologies for modeling and designing systems?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________
UNIT SUMMARY
Building a new information system is one kind of planned organizational change.
Information technology can promote various degrees of organizational change, ranging from incremental
to far-reaching.
The most common forms of organizational change are automation and rationalization.
These relatively slow-moving and slow-changing strategies present modest returns but
little risk. Faster and more comprehensive change—such as redesign and paradigm
shifts—carries high rewards but offers substantial chances of failure.
Many businesses today are trying to use information technology to improve their business processes.
When properly implemented, business process redesign produces dramatic gains in productivity
and efficiency, and may even change the way the business is run. In some instances, it drives a
“paradigm shift” that transforms the nature of the business itself.
New information systems are an outgrowth of a process of organizational problem solving.
There are alternative methodologies for modeling and designing systems. Structured
methodologies and object-oriented development are the most prominent.
160
The primary tool for representing a system’s component processes and the flow of data between them is
the data flow diagram (DFD).
Another tool for structured analysis is a data dictionary, which contains information about individual
pieces of data and data groupings within a system.
Systems differ in terms of their size and technological complexity and in terms of the
organizational problems they are meant to solve. A number of systems building approaches have
been developed to deal with these differences. These include: the traditional systems life cycle,
prototyping, application software packages, end-user development, and outsourcing.
The series of activities to develop a new system is called system development life cycle. These
activities consist of systems analysis, systems design, programming, testing, conversion, and
production and maintenance.
161
The Information Systems resource management focuses on the fusion of information systems,
technology, and business management for two purposes: the use of information systems to solve
business problems and the management of technology, which includes new product development
and enterprise management
Checklist
Now that you have completed the last unit, you need to check whether you have grasped the
concepts discussed in this unit. If your answer to the questions below is No, then you have to go
back and read the relevant sub-section again.
Accomplishments Yes/No
Can Explain how building new systems produce organizational change.
You Identify the core activities in the systems development process.
Discuss the principal methodologies for modeling and designing systems.
Elaborate the alternative methods for building information systems.
Understand the concept of system resource management
Commandment!
So as to pass through this step, at least you have to accomplish or perform 90% of the above
requirements! If not, go back and get done the unfulfilled part!
1. Which IT enabled organizational change is relatively slow moving and slow changing
strategies with modest return but little risk:
A. BPR, D. Paradigm Shift,
B. Rationalization, E. None of the above.
C. Redesign,
2. Which one of the following IT enabled change is found in programs for making a series
of continues improvement such as TQM and six-sigma?
A. Rationalization, D. Paradigm Shift,
B. Redesign, E. None of the above.
C. BPR,
162
3. A more powerful type of organizational change is business process redesign, in which
business processes are analyzed, simplified, and redesigned:
A. Rationalization, D. Paradigm Shift,
B. Redesign, E. None of the above
C. BPR,
4. Which concept provides a variety of tools and methodologies to analyze existing
processes, design new processes, and optimize those processes.
A. BPR, D. Rationalization,
B. BPM, E. None of the above.
C. Paradigm shift,
5. A logical graphical documentation technique that is used to represent the logical flow of
data is:
A. DFD, D. Document flow chart,
B. ERD, E. None of the above.
C. Program flow chart,
6. Which system development methodology is iterative and incremental?
A. Peripheral, D. Structured,
B. Hap-hazard, E. None of the above.
C. Object-oriented,
7. In a data flow diagram processes are represented as:
A. Arrow, D. Circle,
B. Parallel lines, E. None of the above.
C. Square,
8. A system development approach that involves sequential stages called waterfall is best
described by:
A. Continuous, D. Life cycle,
B. Agile, E. None of the above.
C. Prototyping,
9. Which system development approach is used for building an experimental system
rapidly and inexpensively for end users to evaluate?
A. Continuous, D. Life cycle,
B. Agile, E. None of the above.
C. Prototyping,
10. The stage in which initial investigation is done to analyze problem that a firm tries to
solve with an information system:
A. System Analysis D. Testing,
B. System Design E. None of the above.
C. Programming
163
Direction: Choose the best answer from the given alternatives
1. The prototype is a working version of an information system or part of the system, but it
is meant to be only a preliminary model
2. Technical specialists, such as systems analysts and programmers, are responsible for
much of the systems analysis, design, and implementation work
3. The design of an information system is the overall plan or model for that system.
4. Process or circle represent a temporary or permanent repository of data
5. Data sources and destination represent organizations or individuals that send or receive
data used or produced by the system and depicted as circle.
164
6. New information systems are an outgrowth of a process of organizational problem solving.
7. Employees do not like unfamiliar routines and often try to resist change.
8. Paradigm shifts and reengineering often fail because extensive organizational change is so
difficult to orchestrate
9. Business process redesign reorganizes workflows, combining steps to cut waste and eliminate
repetitive, paper-intensive tasks
10. A deeper form of organizational change—one that follows quickly from early automation—is
rationalization of procedures.
165
automation and rationalization. These relatively slow-moving and slow-changing strategies
present modest returns but little risk. Faster and more comprehensive change—such as redesign
and paradigm shifts—carries high rewards but offers substantial chances of failure.
2. The alternative methodologies for modeling and designing systems are structured methodologies
and object-oriented development. Structured methodology refers to the step by step techniques,
with each step building on the previous one. Structured methodologies are top-down, progressing
from the highest, most abstract level to the lowest level of detail—from the general to the
specific. Object-oriented development uses the object as the basic unit of systems analysis and
design.
3. The traditional alternative methods of system design: the traditional systems life cycle,
prototyping, application software packages, end-user development, and outsourcing.
Answer for Self-Test Exercise (Self-Assessment Questions
Part I: Multiple Choices
1 B 3 B 5 A 7 D 9 C
2 A 4 B 6 C 8 D 10 C
Part II: Matching
1 H 3 K 5 A 7 B 9 I
2 D 4 J 6 F 8 C 10 E
Part III: True or False
1 T 3 T 5 F 7 T 9 T
2 T 4 F 6 T 8 T 10 T
Reference:
1. Barney, Jay B., and Griffin, Rick, 1992. The Management Of Organizations. Houghton
Mifflin Co.
2. Davis, Gordon B. and Olson, Margareth H., 1985. Management Information system:
Conceptual Foundations, Structure & Development. 2nd ed.
3. Effy OZ, 2009. Management Information Systems, 6th ed. Course Technology, a division
of Cengage Learning, Inc.
4. Haag, Stephen; Maeve, Cummings & Dawkins, James, 1998. Management Information
Systems for the Information Age. Irwin McGraw – Hill.
5. Kenneth C. Laudon and Jane P. Laudon, 2014, Management Information System:
Managing the Digital Firm, 13th Golobal ed. , Pearson Education Limited
166
6. Laudon, Kenneth C. & Laudon, Jane P., 1999. Management Information Systems:
Organisation and Technology. 4th ed.
7. Lawler, Computer Information System.
8. McKeown, G. Patrick and Leitch, Robert, 1993. Management Information System:
Managing With Computers.
9. Mintzberg, Henry, 1971. Managerial Work Analysis From Observation, Management
Science No. 18,
10. O'Brien, James A, & George M. Marakus, 2011. Management Information System: A
managerial end user Perspective. 10th edition.
11. Raymond, Mcleod, Jr, 1995. Management Information Systems. 6th Ed., Prentice Hall
International, Inc.
12. Scott, George M. Principles Management Information System, McGraw Hill Book
Company, 1986.
167