MSPS-15
MSPS-15
Course Credit: 3
Course Objective :
CO 1. Create conceptual understanding Information system and its strategic uses in
an organization
CO 2. State out the fundamental principles of computer system, techniques to
monitor the database and the procedure for office communications
CO 3. Examine the application of information system, decision and expert support
system
CO 4. Describe the planning and development of information system and alternative
approaches for system development
CO 5. Paraphrase ethical challenges and the risk involved in information technology
References:
1. Arpita Gopal, (2009), MIS for Strategic Business Processes, latest Edition,
McGraw Hill Education, India
2. Brien, Marakas, Behl,( 2017), Management Information Systems, latest Edition,
TMH, India
3. Goyal .D P (2010), Management Information Systems–Managerial
Perspective, 3rd Edition MacMillan, Chennai
4. Gupta A K, Sharma, (2012), Management of Systems, latest Edition,
Macmillan, Chennai
5. Jawadekar, (2012), MIS Text and Cases, latest Edition, TMH, India
6. Joseph P T,( 2012), E-Commerce, an Indian Perspective, PHI, India
7. Laudon & Laudon, (2018) Management Information Systems, latest Edition,
Pearson, India
8. Milind M Oka (2012), “Cases in Management Information system , latest
Edition, ‘Everest Publication, India
9. Murthy,( 2013), Management Information System, latest Edition Himalaya,
Publication, India
10. Nina Godbole & Sunit Belapure (2012), “ Cyber Security” latest Edition, Wiley
India
11. Nirmala Bagchi, (2012), Management Information Systems, latest Edition,
Vikas Publication, India
12. Sandra Senf (2016), Information Technology Control and Audit, 4 th edition,
Auerbach Publications, Florida.
13. https://openstax.org/books/introduction-business/pages/13-3-management-
information-systems
14. https://nptel.ac.in/courses/106105175
15. https://smallbusiness.chron.com/management-information-system-2104.html
16. https://www.simplilearn.com/types-of-information-systems-and-applications-
article
Course Outcome :
CLO 1. Comprehend management and uses of information System for the making
managerial decisions.
CLO 2. Review the application of DBMS and Office Communications.
CLO 3. Acquire a real-world application of Information systems and Decision
Support System in a business
CLO 4. Recognize the planning and development of IT and its alternative
approaches
CLO 5. Outline the role of the ethical, social, and security challenges of
information systems.
CONTENT
1.1 Introduction 3
2.1 Introductions 13
3.1 Organization 26
UNIT 7 DBMS 76
8.2 Internet 93
BUSINESS PART-1
INFORMATION SYSTEM
1
Unit 1
INTRODUCTION TO INFORMATION
SYSTEM
STRUCTURE
Overview
Learning Objectives
1.1 Introduction
Glossary
Suggested Readings
Answers to check your progress
OVERVIEW
An information system is a set of interrelated components that collect,
manipulate, and disseminate data and information and provide a
feedback mechanism to meet an objective. We all interact daily with
information systems, both personally and professionally. An information
system will support the decision making and control in an organization.
In addition to supporting decision making it also helps in coordinating
and controlling the organization. The information system may also help
managers and workers in analyzing the problems, visualizing the
complex subjects and it helps to create new products.
Information systems contain information about significant people, places
and things within the organization or in the environment surrounding it.
By information we mean data that have been shaped into a form that is
meaningful and useful to human beings. Data, in contrast, are streams
of raw facts representing events occurring in organizations or the
physical environment before they have been organized and arranged
into a form that people can understand and use.
Brief example contrasting information to data may prove useful.
Supermarket checkout counters ring up millions pieces of data, such as
product identification numbers or the cost of each item sold. Such pieces
2
of data can be totaled and analyzed to provide meaningful information
such as the total number of bottles of dish, detergent sold at a particular
store, which brands of dish detergent where selling the most rapidly at
that store or sales territory, or the total amount spent on that brand of
dish detergent at that store or sales region.
Three activities in an information system produce the information. One is
Input – it captures or collects raw data from within the organization or
from its external environment. Second is processing - converts the raw
data into meaningful information. Third is output – transfers the
processed information to the people who will use it or to the activities for
which it will be used. Information system also require feedback, which is
output that is returned to appropriate members of the organization, to
help them evaluate or correct the input stage.
LEARNING OBJECTIVES
1.1 INTRODUCTION
“The good old days – when programmers and management did’nt
interface with information system – are gone. Now all projects, even
those involving changes to existing systems, are reviewed by a steering
committee made up mostly of managers. To top it off, they are not even
the managers who will use the systems they approve. Rather, they are
senior managers – planners and strategists, not the ones who are
actually on the manufacturing floor or in the warehouse.”
The lifeblood of any organization is the flow of intelligence, information
and data. This “plasma” moves along channels from point to point
through the interrelated network of the operating elements of the
organization. It is important to recognize that a tremendous number of
these pieces of information, these bits of data, are generated almost
every minute of every day in the interaction of an organization with its
environment. Every activity in every organization contributes to the
generation of the information system.
3
information to support decision making and control in an organization. In
addition to supporting decision making, coordination, and control,
information systems may also help managers and workers analyze
problems, visualize complex subjects, and create new products.
4
Functions of Information System
5
firms and law firms; they also provide business services like copying,
computer software or deliveries. Because the productivity of employees
will depend on the quality of the systems serving them, management
decisions about information technology are critically important to the
prosperity and survival of a firm. Consider also that the growing power of
information technology makes possible new services of great economic
value. Credit cards, overnight package delivery, and worldwide
reservation systems are examples of services that are based on new
information technologies, Information and technology that delivers it
have become critical, strategic resources for business firms and their
managers.
6
hierarchical), decentralized, flexible arrangement of generalists who rely
on real time (nearly instant) information to deliver mass-customized
products and services uniquely suited to specific markets or customers.
This new style of organization is not firmly entrenched, it is still evolving.
Nevertheless, the direction is clear. This new direction would be
unthinkable without information technology.
The traditional management group relied - and still does- on formal
plans, a rigid division of labour, formal rules, and appeals to loyalty to
ensure the proper operation of a firm. The new manager relies on
informal commitments and networks to establish goals (rather than
formal planning), a flexible arrangement of teams and individuals
working in task forces, a customer orientation to achieve coordination
among employees, and appeals to professionalism and knowledge to
ensure proper operation of the firm. Once again, information technology
makes this style of management possible.
1.3 OBJECTIVES OF INFORMATION SYSTEMS
Requests for information systems are typically motivated by one of three
general objectives:
Solve a Problem
An activity, process, or function that does not now or may not in the
future meet performance standards or expectations unless remedial
actions are taken.
Example: Reduce excessive data entry errors by eliminating the manual
entry of sales details.
Capitalize on an Opportunity
A change to expand or improve business performance and competitive
achievements
Example: Capture a large base of customers by offering a new airline
frequent flier program focusing on discounted airfares.
Respond to a Directive
An order, request, or mandate originating from a legislative or
management authority to provide information, perform in a certain
manner, or alter either information or performance.
Example: Report annually to the Indian Revenue Service, using
prescribed formats, interest earned on savings, checking, and time
deposit accounts. To achieve these objectives, firmly typically undertake
projects for one or more of the following reasons-the five C’s:
7
Capability
Communication
Competitiveness
Control
Cost
Capability
Greater Processing Speed: Using the computer’s inherent ability to
calculate, sort, and retrieve data and information when greater speed
that of people doing the same tasks is desired.
Increased Volume: Providing the capacity to process a greater amount
of activity, perhaps to take advantage of new business opportunities.
Often a result of growth that causes business to exceed the capacities
and procedures underlying the achievements to date.
Faster Information Retrieval: Locating and retrieving information from
storage. Conducting complex searches.
Control
Greater accuracy and improved Carrying out computing consistency
better security steps, correctly and in the same way each time.
Better Security Safe guarding sensitive and important data in a form that
is accessible only to authorized personnel.
Communication
Enhanced Communication Speeding the flow of information and
messages between remote locations as well as within offices. Includes
the transmissions of documents within offices.
Integration of Business Area: Coordinating business activities taking
place in separate areas of an organization, through capture and
distribution of information.
Cost
Cost Monitoring: Tracking the cost of labour, goods and facilities to
determine how actual costs compare with expectations.
Cost Reduction: Using computing capability to process at a lower cost
than possible with other methods, while maintaining accuracy and
performance levels.
8
Competitive advantage
Lock in Customers: Changing the relationship with and services
provided to customers in such a way that they not choose to change
suppliers. Improve Arrangements with changing the pricing, Suppliers
service, or delivery arrangements, or relationship between suppliers and
the organization to benefit the firm. New Product Development:
Introducing new products with characteristics that use or are influenced
by information technology.
Activity 1
Standard International (SI) is subsidiary to a large manufacturing firm: it
is responsible for marketing, sales, and distribution outside the United
States. Standard International does not develop products: the parent
firm creates all products it sells. SI has operations in 30 countries. In
virtually all these countries the local SI operation is treated legally as a
subsidiary of Standard International.
Recently a new president took control of SI. Historically the firm’s
systems were oriented to finance and accounting because the
technology group reports to the vice president of finance. Accounting
applications are important because so many different currencies are
involved. The new president, however, is impatient and feels that
technology should be able to do something for marketing and sales.
She asked you to consult with SI in the hope of finding a strategic
application technology: “I want something that will give us a competitive
edge, “she said. How does it establish and maintain a competitive
advantage?
LET US SUM UP
We have discussed about the Information System and the Emergence of
Global Economy. IS made transformation in the Business enterprise and
Managers manage in each level of Management. WE have discussed
about the objectives of IS and the 5 C’s which initiates the Information
system projects across Globe.
a) Interrelated b) correlated
9
2) The main objectives of Information System
a) Communication b) Solve a Problem
c) Responsiveness d) linkage function
c) Quantity d) Cost
5) The purpose of management is to plan, organize, coordinate, and
lead the members of the firm in order to achieve profitable
_____________
c) Quality d) Money
GLOSSARY
10
SUGGESTED READINGS
1. Bentley Trevor J (1986) Management Information Systems & data
processing, 2nd edition, Holt, Rinehart and Winston publications,
University of California. ISBN 0039106888, 9780039106881.
2. Donald W. Kroeber (1986) Computer-Based Information Systems: A
Management Approach, Subsequent edition, Macmillan Publications,
University of Virginia. ISBN 0023668407, 9780023668401.
3. Gordon B.Davis (2013) Management Information Systems, 1 st Edition,
TMH Publications, India. ISBN 007066241X.
4. Joel E. Ross (1970) Management by Information System, illustrated
edition, Prentice-Hall publications, University of Wisconsin,ISBN
0135486289, 9780135486283.
5. Kenneth C. Loudon & Jane P. Loudon (2014) Management Information
Systems, 13th Edition, Pearson Publications, USA.
11
Unit 2
INTRODUCTION TO MANAGEMENT
INFORMATION SYSTEM
STRUCTURE
Overview
Learning Objectives
2.1 Introduction
Let Us Sum Up
Suggested Readings
OVERVIEW
Information processing is a major societal activity. A significant part of an
individual working and personal time is spent in recording, searching for,
and absorbing information. As much as 80% of a typical executive’s time
is processing and communication information. More than 50% of the
United States workforce is employed in jobs that involve some form of
information processing. A large proportion of these employees are
“knowledge workers”; their duties involve the production and use of
information outputs – documents, reports, analyses, plans, etc.
Computers have become an essential part of organizational information
processing because of the power of technology and the volume of data
processed. Today, computerized processing of transaction data is a
routine activity of large organizations. Moreover, the capability to
automate information processing has permitted an expansion in the
scope of formalized organizational information use. The current
challenge in information processing is to use the capabilities of
computers to support knowledge work, including managerial activities
and decision making. The wide variety of computer resources to perform
12
transaction processing, to provide processing for formal information and
reporting system and to accomplish managerial-decision support are
broadly classified as the organization’s management information system.
MIS is a broad concept rather than a single system. Some MIS activities
are highly integrated with routine data processing, while other MIS
applications are designed for a particular knowledge work activity or
decision-making function. The office use of computer and
communication technology to support person-to-person communications
and clerical support is also included in this text as part of management
information systems.
LEARNING OBJECTIVES
2.1 INTRODUCTION
Management’s job is to make sense out of the many situations faced by
organizations, make decisions, and formulate action plans to solve
organizational problems. Managers perceive business challenges in the
environment; they set the organizational strategy for responding to those
challenges; and they allocate the human and financial resources to
coordinate the work and achieve success. Throughout, they must
exercise responsible leadership.
They must also create new products and services and even re-create
the organization from time to time. A substantial part of management
responsibility is creative work driven by new knowledge and information.
Information technology can play a powerful role in helping managers
design and deliver new products and services and redirecting and
redesigning their organizations.
13
manager finds himself over his head in a complex network of interrelated
duties that must be discharged. His response is predictable and
practical. He recognizes his need for help if his business is to continue to
grow, and he hires another man to assist him in his management
functions. It should be recognized that because he was the sole owner-
manager, all his actions up to this point were, by definition,
management. But, with a second manager on this scene, managing
begins to require more definition.
Suddenly, problems of authority and responsibility, and communication
and organization, begin to assume serious proportions. Where does one
man’s area of authority and responsibility begin and where does the
others man’s end? Who tells whom to do what? Who reports to whom?
The whole spectrum of organizational problems appears on the horizon,
and the need for a Management Information System (MIS) begins to
take shape.
Ideally, the evolution of an MIS would be guided by knowledgeable
people, careful to structure the information system to meet the objectives
of the organization and the realities of its internal and external
environment. But experience indicates that an MIS evolves in fits and
starts to meet sudden and to respond to unforeseen crisis.
The result, as may be expected, is a system that grows with little
attention to the overall needs of the total organization. It usually takes
shape as a patchwork of information subsystems, some connecting with
others, some overlapping, some duplicating, and many working at cross-
purposes.
As the organization develops, the managers establish better
communications channels to meet their needs for accurate, timely
information. Formal, semiformal, and even informal reporting habits are
standardized, proceduralized, and scheduled. Information flows are
structured for early warning of problems, quick response to crisis, and
clear pathways for management directives to the critical action points of
the organization. A viable Management Information System is born!
The criterion for an effective Management Information System is that it
provides accurate, timely, and meaningful data for management
planning, analysis, and control to optimize the growth of the
organization. Neither the glamour of the equipment nor the
sophistication of the decision techniques can offset the failure of a
Management Information System to meet that test. It must enhance the
management of the organization.
14
Figure 2.1 Management Information System
15
2.4 ELEMENTS OF MANAGEMENT INFORMATION SYSTEMS
Software
Procedures
Database
Hardware
Hardware refers to physical computer equipment and associated
devices.
16
Central processor (computation, control and primary storage)
Software
Software is broad term given to the instructions that direct the operation
of the hardware. The software can be classified into two major types:
system software and application software.
Database
The database contains all date utilized by application software. An
individual set of stored data is often referred to as a file. The physical
existence of stored data is evidenced by the physical storage media
(computer tapes, disk packs, diskettes, etc..) used for secondary
storage.
Procedures
Formal operating procedures are physical components because they
exist in a physical form such as a manual or instruction booklet. Three
major types of procedures are required.
1. User instructions (for users of the application to record data, or use
the result)
Activity 1
Auto zip sells accessories for cars through a chain of stores on the West
Coast. The company started a catalog sales division 4 years ago that
now accounts for 25 percent of sales. Customers like the convenience of
calling a toll-free number and having the parts they delivered via UPS or
an overnight carrier such as Federal Express.
The president of Auto zip realizes that the firm needs to have a presence
on the internet. He is trying to decide whether to accept orders on the
web, and if so, how. He is caught between two positions offered by his
staff. The marketing vice president advocates taking orders on the Web.
Her reasoning is: What have we got to lose? We have everything to
gain; it’s another market channel and our competitors are already there
or will be soon. We save money because customers act as their own
order entry personnel.
The controller disagrees. His reasoning is: Any advantage we gain will
be temporary: it is so easy to set up a system to order on the web that
everyone will take Web orders and we won’t gain a sustainable
advantage.
17
The president has to make a decision. First, should Autozip accept
orders on the Web, and second, if so, how?
Financial Information
Every company has a financial information system .The basis of this
system is to plan and to find out the best way in tracking out the
accounting system and the methodology to be adopted in the financial
management to be followed by the organization.
Personnel Information
The personnel information system is concerned with the flow of
information about people working in organization. Almost every company
maintains records of its personnel.
Logistics Information
A logistic system like the other two major systems is principally
concerned with recurring, documentary, internal and historical
information of the solutions to the logistics.
Marketing Information
A marketing information system tends to help in handling the entire
activity of marketing and sales functions completely with the detail effort
of coordinating various information activities.
18
Research and Development
Many companies have management system for exchanging information
on the results of research findings and further research areas to the new
product development.
MIS is used in the field of Accounting, computer Science, Operational
research, Behavioral science and Management.
Communication meetings
Communication
Interactions
19
Operating information
Status information
Benchmark comparisons
Reference information
Types of reports
Daily reports
Weekly reports
Monthly reports
Other reports
4. Electronic technologies
CASE STUDY
From Teaspoons to Satellites
In 1984, two young women and a man sat on their living room floor,
using teaspoons to fill jars and containers with skin care products. They
were the founder’s of Nu Skin International, a producer of additive-free
skin care products aimed at aging baby boomers. Initially Nu Skin’s
founders Blake. Roney and Sandie Tillotson promoted Nu Skin products
themselves. They sold their wares at mails and airports and to family
and friends- wherever people congregated.
Demand for the product spread like wildfire. Ten years later, Nu Skin’s
revenues have soared to over $500 million. Roney and Sandie Tillotson
preside over a vast network of Nu Skin distributors in Canada, Mexico,
Hong Kong, Taiwan, Japan, Australia, and New Zealand. While one Nu
Skin distributor hosts a live satellite broadcast to thousands of
distributors all across North America his Taiwanese counterpart can
20
transmit an order via voice mail on high-speed links to Nu Skin’s
headquarters in Provo, Utah. New technologies and information systems
have made that spectacular growth possible.
Without the cash or resources of giant cosmetics companies, Roney and
Sandie Tillotson, and other co-founders decided that they could build
their company through network marketing. Nu skin creates networks of
distributors who could be responsible for promoting and selling Nu Skin
products on a commission basis. Distributors in turn could create
“downlines” or networks of distributors working under them. Some
distributors have tens of thousands of people working under them on
three continents. To keep the distributors happy and the sales and
distribution network humming Nu Skin’s managers believed that it was
all important to get distributors their commission checks on time.
Nu Skin built a seamless compensation system. No matter how many
people or how many different countries were in a distributors “downlines”
empire, Nu Skin paid the distributor once a month with one check. (Most
other multi level marketing companies write the distributors one check
for each market. ) Nu Skin continually upgraded its information systems
to make sure that it could handle its sky rocketing volume of sales
transaction and commission checks as the company grew monthly at
double digit rates. Nu Skin upgraded its computer hardware and
software multiple times. The company now runs a $3.5 million Sequoia
mainframe computer that keeps records of every sales transaction for
the past fourteen months and calculates commissions for 250,000 active
distributors. Each distributor is eligible for commissions on six levels of
sales. The information system crunches the numbers and transmits the
results back to each Nu Skin market. It cuts checks in U.S dollars,
Australian dollars, Yen, Pesos- whatever the local currency is Nu Skin
also developed an application that translates prompts on the computer
screen into various foreign languages. If a distributor in Tokyo or Mexico
city needs to check personal and group sales volumes, he or she simply
calls the local office. An agent accesses the companies mainframe
computer, pulls up a screen in the appropriate language, and relays the
requested information directly back to the distributor, no translations are
needed.
Nu Skin developed a voice information program (VIP) to connect
distributors to its down lines. A distributor can use telephone, voice mail,
or facts for prospecting, recruiting and keeping in touch with its down
lines. A future called business card lets a prospective distributor call an
800 number and listen to a tape about Nu Skin business opportunities.
21
The system captures the prospect’s phone number so that the distributor
can immediately make a follow – up call. Some distributors, such as Lien
Yu Shing in Taiwan, use VIP every month to place their orders.
Within three years, Nu Skin plans to move into at least 6 to 12 new
countries, with the main push in Europe. The technological infrastructure
is in place. With its for- reaching information systems, Nu Skin can open
a new market in 90 days- without a teaspoon is sight.
Nu Skin’s reliance on information systems to drive its basic operations
demonstrates how information systems can help both small and large
companies compete in today’s global business environment. Information
systems help firms like Nu Skin extend their reach to faraway locations,
offer new products and services, reshape jobs and workflows, and
perhaps profoundly change the way they conduct business. Information
systems understanding are essential for today’s managers.
LET US SUM UP
We have discussed the vital role of information in an organization. The
information systems have become essential for helping organizations
deal with changes in global economies and the business enterprise.
Information systems provide firms with communication and analytic tools
for conducting trade and managing business on a global scale.
Information systems are the foundation of new knowledge based
products and services in knowledge economies and help firms manage
their knowledge assets. Then the manager who is the organizer knows
all information, and talented person. He should have skill to manage
everything and have courage to solve problems. And he should be a
good communicator.
Powerful computers, software and networks, including the internet , have
helped organizations become more flexible, eliminate layers of
management , separate work from location, coordinate with suppliers
and customers, and restructure work flows, giving new powers to both
line workers and management. Information technology provides
managers with tools for more precise planning forecasting and
monitoring of the business. To maximize the advantages of information
technology, there is a much greater need to plan the organization’s
information architecture and information technology infrastructure.
22
CHECK YOUR PROGRESS
a) Teaching b) Communication
c) Budgeting d) controlling
a) Software b) Database
GLOSSARY
23
and storage media that are not always
directly accessible by a computer.
SUGGESTED READINGS
1) a 2) b 3) a 4)a 5)b
24
Unit 3
Overview
Learning Objectives
3.1 Organization
Let Us Sum Up
Glossary
OVERVIEW
It is often said that good people can make organization pattern work.
Some even assert that vagueness in organization is a good thing in that
it forces teamwork, however, there can be no doubt that good people
and those who want to cooperate will work together most effectively if
they know the parts they are to play in any team operation and the way
their roles relate to one another. This is as true in business or
government as in football or in a symphony orchestra. Designing and
maintaining these systems of roles is the managerial function of
organizing.
25
LEARNING OBJECTIVES
3.1 ORGANISATION
26
It is a management function involving assigning duties, grouping
tasks, delegating authority and responsibility and allocating resources to
carry out a specific plan in an efficient manner.
Process of identifying and grouping the work to be performed,
defining and delegating responsibility and authority and establishing
relationships for the purpose of enabling people to work most effectively
together in accomplishing objectives.
In a nutshell, organization refers to grouping of activities and
resources in a logical fashion.
Organization aims at finding out the objectives, grouping the activities
aimed at theory achievement, assigning them for performance and
coordinating them. It is important for the following reasons.
a) Organizations pervade all the important phases of human life. A
man is born in organization (hospitals and clinics). He is educated in an
organization (schools, colleges and universities). He works in an
organization (office factories and business).
Formal organization
Informal organization
Formal Organization
Formal organization means the intentional structure of roles in a formally
organized enterprise. Describing an organization as “formal” however
does not mean there is anything inherently inflexible or unduly confining
27
about it. If a manager is to organize well, the structure must furnish an
environment in which individual performance, both present and future,
contributes most effectively to group goals.
Formal organization must be flexible. There should be room for
discretion, for advantageous utilization of creative talents, and for
recognition of individual likes and capacities in the most formal of
organizations. Yet individual efforts in a group situation must be
channeled toward group and organization goals.
Although the attainment of goals must be the reason for any cooperative
activity, we must look further for principles to guide the establishment of
effective formal organization. These principles pertain to the unity of
objectives and organizational efficiency.
Informal Organization
Chester Barnard, author of the management classics. “The Functions
of the Executive,” described informal organization as many joint personal
activity without conscious joint purpose, even though contributing to joint
results. Thus the informal relationships established i n the group of
people playing chess during lunchtime may aid in the achievement of
organizational goals. It is much easier to ask for help on an organization
problem from someone you know personally, even if she may be in a
different department, than from someone you know only as a name on
an organization chart. More recently, Keith Davis of Arizona State
University, who has written extensively on the topic and whose definition
will be used here as described the informal organization as a network of
personal and social relations not established or required by the formal
organization but arising spontaneously as people associate with one-
another. Thus, informal organization –relationships not appearing on an
organization chart-might include the machine shop group, the sixth floor
crowd, the Friday evening bowling gang, and the morning coffee
regular’s.
28
The process of organizing helps maintain the logical flow of work
activities. By doing so, it helps individuals and workgroups to easily
accomplish their tasks.
Organizing helps an organization to make efficient use of its resources
avoid conflict and duplication of effort.
Organization coordinates activities that are diverse in nature and helps
to build harmonious relationships among members involved in those
activities.
The process of organizing helps to managers to focus task efforts such
that they are logically and efficiently related to a common goal.
29
communication systems because they channel and direct the activities
of managers at each lower level.
The major organization unit that is concerned with the development of
information systems usually is the computer information systems
department, which is often unaware of the importance of downward-
flowing information and which devotes none of its systems development
efforts to this information flow. When these downward flows are not
properly developed, managers at each level usually are consistent in
their criticism of “the lack of communication from above.” Downward -
flowing information systems merit more attention on the part of both
managers and information systems specialists.
Information flows are not restricted to paths up and down the hierarchy.
Information also flows laterally within an organization, particularly in
transactions processing information system. These lateral information
flows are often extensive, and they help explain the complexity of
information systems in organizations.
People in any work setting, large or small, must have available to them
the right information at the right time and in the right place if they are to
perform effectively. This is made possible by information systems that
use the latest in information technology to collect, organize, and
distribute data in such a way that they become meaningful as
information. Such systems have the potential to make major
contributions to performance in organizations. However the following
factors are considered essential to their success:
Management support
Activity 1
A car company was in trouble. It become clear that it had to compete not
only against U.S carmakers but also against auto manufacturers
throughout the world. Drastic steps were necessary. One of the best way
was to replace the bureaucratic structure. Previously it took 5 years to
produce a new model. The old approaches are as follows: the product
Planners developed the general concept of the new model, which was
then given to the designers. After that, engineers got involved,
developing specifications for manufacturing and for various suppliers .
This process was sequential, with little communications, among the
groups. If a problem was discovered at the manufacturing stage,
30
designers & engineers had to be involved in again doing the problem.
What changes can be in order to compete with other companies?
LET US SUM UP
Over time, information systems have come to play a larger role in the life
of organizations. There is a growing interdependence between business
strategy, rules, and procedures, on the other hand, and information
systems software, hardware, data, and telecommunications, on the
other. A change in any of these components often requires changes in
other components. This relationship becomes critical when management
plans for the future. What a business would like to do in 5 years is often
dependent on what its systems will be able to do.
a) Place b) Management
GLOSSARY
31
Marketing : Marketing is the process of
interesting potential customers and
clients in your products and/or
services.
SUGGESTED READINGS
1. Bentley Trevor J (1986) Management Information Systems &
data processing, 2nd edition, Holt, Rinehart and Winston
publications, University of California. ISBN 0039106888,
9780039106881.
2. Donald W. Kroeber (1986) Computer-Based Information
Systems: A Management Approach, Subsequent
edition, Macmillan Publications, University of Virginia. ISBN
0023668407, 9780023668401.
3. Gordon B.Davis (2013) Management Information Systems, 1 st
Edition, TMH Publications, India. ISBN 007066241X.
32
4. Joel E. Ross (1970) Management by Information System,
illustrated edition, Prentice-Hall publications, University of
Wisconsin,ISBN 0135486289, 9780135486283.
5. Kenneth C. Loudon & Jane P. Loudon (2014) Management
Information Systems, 13th Edition, Pearson Publications, USA.
1) b 2) a 3) b 4) c 5)a
33
Unit 4
Overview
Learning Objectives
Let Us Sum Up
Glossary
Suggested Readings
OVERVIEW
Management information systems are built for use by an identified
organization. Hence it is very important to understand the organization -
its primary goals and objectives, structure, dynamics, scale of operation,
culture, tradition, social setting, level of competition, value system and
the environment. An MIS well designed from the technical
considerations may fail if the dynamics of the organization are not
properly understood. In this chapter we will present a quick overview of
modern organizations and concept of system.
34
LEARNING OBJECTIVE
Support Innovation
Organizations that want to improve their innovation capabilities and
develop new products or services for the market can use cloud
computing to speed up the process. Cloud computing enables
organizations to rent additional IT resources during the development
project on a pay-as-you-go basis, rather than investing in fixed
resources. Organizations can use the additional resources to run pilot
programs or speed up development. This provides an important strategic
advantage by enabling the organization to get new products to market
quickly, ahead of the competition.
Improve Responsiveness
Cloud computing enables organizations to scale up their IT resources
quickly in response to changing market conditions. Organizations that
offer products and services online may find it difficult to handle a surge
in traffic, which could result in lost business. Adding resources from the
cloud provides a strategic advantage by enabling them to respond to
changes in demand, increase revenue and maintain customer
satisfaction.
Increase Collaboration
IT solutions that improve collaboration in an organization can provide an
important competitive advantage. Issuing field service teams with smart
phones, for example, enables service engineers to provide a faster,
more efficient service to customers. Engineers working on a customer
site can set up voice or video conference calls with product or technical
experts at headquarters to discuss and resolve a complex issue, rather
35
than delaying a repair. Offering customer superior service provides a
strategic advantage by differentiating an organization from competitors.
36
Examples of operational level systems include a system to record bank
deposits from automatic teller machines or one that tracks the number of
hours worked each day by employees on a factory floor.
Knowledge-level systems support knowledge and data workers in an
organization. The purpose of knowledge level systems is to help the
business firm integrate new knowledge into the business and to help the
organization control the flow of paper work. Knowledge level systems,
especially in the form of work stations and office systems, are the
fastest-growing applications in business today.
Management-level systems are designed to serve the monitoring,
controlling, decision making, and administrative activities of middle
managers. The principal question addressed by such systems is: Are
things working well? These systems compare the current days’ output
with that of a month or year ago. Management level systems typically
provide periodic reports rather than instant information on operations.
Strategic-level systems help senior management tackle and address
strategic issues and long term trends, both in the firm and in the external
environment. Their principal concern is matching changes in the external
environment with existing organizational capability. What will
employment levels be in five years? What products should we be
making in five years?
Information systems may also be differentiated by functional specialty.
Major organizational functions, such as sales and marketing,
manufacturing, finance, accounting, and human resources, are each
served by their own information systems.
There are six major types of information systems in contemporary
organizations:
37
Figure 4.2 Six major types of information systems
4.2.1 Transaction Processing Systems
Transaction processing systems are the basic business systems that
serve the operational level of the organization. A transaction processing
system is a computerized system that performs and records the daily
routine transactions necessary to the conduct of the business. Examples
are sales order entry, hotel reservation systems, client information (for
public agencies), payroll, employee record keeping, and shipping.
At the operational level, tasks, resources, and goals are predefined and
highly structured. The decision to grant a credit to a customer, for
instance, is made by a lower level supervisor according to predefined
criteria. The decision, in that sense, has been “programmed”. All that
must be determined is whether the customer meets the criteria. Two
features of TPS are noteworthy. First, many TPS span the boundary
between the organization and its environment. They connect customers
to the firm’s ware house, factory, and management. If TPS do not work
well, the organization fails either to receive inputs from the environment
(orders) or to deliver outputs (assembled goods). Second, TPS are
major procedures of information for the other types of systems. TPS can
be viewed as “organizational message processing systems”, informing
managers about the status of internal operations and about the firm’s
relations with the external environment and supporting other information
systems that facilitate management decision making.
38
4.3 KNOWLEDGE WORK AND OFFICE AUTOMATION SYSTEMS
KWS and OAS serve the information needs at the knowledge level of the
organization. Knowledge work systems aid knowledge workers, whereas
office automation systems primarily aid data workers (although they are
also used extensively by knowledge workers).
In general, knowledge workers are people who hold formal university
degrees and who are all often members of a recognized profession, like
engineers, doctors, lawyers, and scientists. Their jobs consist primarily
of creating new information and knowledge. Data workers typically have
less formal, advanced educational degrees and tend to process rather
than create information. They consist primarily of secretaries,
accountants, filing clerks, or managers whose jobs are principally to use,
manipulate, or disseminate information. Office automation systems are
information technology applications designed to increase the productivity
of data workers in the office by supporting the coordinating and
communicating activities of the typical office. OAS coordinate diverse
information workers, geographic units and functional areas: the systems
communicate with customers, suppliers, and other organization outside
the firm, and serve as a clearing house for information and knowledge
flows.
Typical office automation systems handle and manage documents
(through word processing, desktop publishing, and digital filing),
scheduling (through electronic calendars), and communication (through
electronic mail, voice mail, or video conferencing). Word processing
refers to the software and hardware that creates, edits, formats, stores,
and prints documents. Desktop publishing produces professional
publishing quality documents by combining output from word processing
software with design elements, graphics, and special layout features.
The role of knowledge work and office automation systems in the firm
cannot be underestimated. As the economy shifts from relying on
manufactured goods to producing services, knowledge, and information,
the productivity of individual firms and the entire economy will
increasingly depend on knowledge level systems. This is the one reason
knowledge level systems have been the fastest growing applications
over the last decade and are likely to grow in future.
39
making and a data base. The purpose of a computer based information
system is to collect, store , and disseminate information from an
organization’s environment and internal operations for the purpose of
supporting organizational functions and decision making,
communication, coordination, control, analysis and visualization.
MIS serve the management level of the organization, providing
managers with reports and in some cases, with online access to the
organization’s current performance and historical records. Typically, they
are oriented almost exclusively to internal, not environmental or external,
events. MIS primarily serve the functions of planning, controlling and
decision making at the management level. Generally they are dependent
on underlying transaction processing systems for their data.
MIS summarize and report on the basic operations of the company. The
basic transaction data from TPS are compressed and are usually
presented in long reports that are produced on a regular schedule. MIS
usually serves managers interested in weekly, monthly, and yearly
results not day-to-day activities.
MIS generally aid in decision making using past and present data.
MIS are relatively inflexible.
40
Figure 4.6 TPS and MIS
Above figures illustrates how the systems serving different levels in the
organization are related to one another. TPS are typically a major source
of data for other systems, whereas ESS is primarily a recipient of data
from lower-level systems. The other types of systems may exchange
data with each other as well.
Data may also be exchanged among systems serving different
functional areas. For example, an order captured by sales system may
be transmitted to a manufacturing system as a transaction for producing
or delivering the product specified in the order.
It is definitely advantageous to have some measure of integration among
these systems so that information can flow easily between different parts
of the organization.
But integration costs money, and integrating many different systems is
extremely time consuming and complex. Each organization must weigh
its needs for integrating systems against the difficulties of mounting a
large-scale systems integration effort.
Information systems can be classified by the specific organizational
function they serve as well as by organizational level. We now describe
typical information systems that support each of the major business
functions and provide examples of functional applications for each
organizational level.
41
4.6 SALES AND MARKETING SYSTEMS
42
At the operational level, sales and marketing systems assist in locating
and contracting prospective customers, tracking sales, processing
orders, and providing customer service support.
It shows the output of a typical sales information system at the
management level. The system consolidates data about each item sold
(such as the product code, product description, and amount of sales) for
further management analysis.
Company managers examine these sales data to monitor sales activity
and buying trends. The window on Management describes some typical
sales and marketing systems that might be found in a small business.
43
Table 4.2 Examples of Manufacturing And Production Information
Systems
Data about each item in inventory, such as the number of units depleted
because of a shipment or purchase or the number of units replenished
by reordering or returns, are either scanned or keyed into the system.
The inventory master file contains basic data about each item, including
the unique identification code for each item, the description of the item,
the number of units on hand, the number of units on order, and the
reorder point (the number of units in inventory that triggers a decision to
reorder to prevent a stock out). Companies can estimate the number of
items to reorder or they can use a formula for calculating the least
expensive quantity to reorder called the economic order quantity. The
system produces reports such as the number of each item available in
inventory, the number of units of each item to reorder, or items in
inventory that must be replenished.
44
the finance function must obtain a considerable amount of information
from sources external to the firm.
The accounting function is responsible for maintaining and managing the
firm’s financial records-receipts, disbursements, depreciation, payroll-to
account for the flow of funds in a firm. Finance and accounting share
related problems-how to keep track of a firm’s financial assets and fund
flows. They provide answers to questions such as these: What is the
current inventory of financial assets? What records exist for
disbursements, receipts, payroll, and other fund flows?
Table 4.3 shows some of the typical finance and accounting information
systems found in large organizations. Strategic-level systems for the
finance and accounting function establish long-term investment goals for
the firm and provide long-range forecasts of the firm’s financial
performance. At the management level, information systems help
managers oversee and control the firm’s financial resources. Knowledge
systems support finance and accounting by providing analytical tools
and workstations for designing the right mix of investments to maximize
returns for the firm. Operational systems in finance and accounting track
the flow of funds in the firm through transactions such as paychecks,
payments to vendors, securities reports, and receipts. Review Figure
4.3, which illustrates a payroll system, a typical accounting TPS found in
all businesses with employees.
investments
45
complete records on existing employees, and creating programs to
develop employees’ talents and skills.
Strategic-level human resources systems identify the employee
requirements (skills, educational level, types of positions, number of
positions, and cost) for meeting the firm’s long-term business plans. At
the management level, human resources systems help managers
monitor and analyze the recruitment, allocation, and compensation of
employees. Knowledge systems for human resources support analysis
activities related to job design, training, and the modeling of employee
career paths and reporting relationships. Human resources operational
systems track the recruitment and placement of the firm’s employees.
Human resources TPS for employee record keeping maintains basic
employee data, such as the employee’s name, age, sex, marital status,
address, educational background, salary, job title, date of hire, and date
of termination. The system can produce a variety of reports, such as lists
of newly hired employees, employee who are terminated or on leaves of
absence, employees classified by job type or educational level, or
employee job performance evaluations. Such systems are typically
designed to provide data that can satisfy federal and state record
keeping requirements for Equal Employment Opportunity (EEO) and
other purposes.
CASE STUDY
The West American Hospital Association is an organization of hospitals
in the greater Los Angeles area, including Palm Springs and San Diego
to the east and south and kern county to the north. Included among its
several activities are support of research projects at laboratories at
several hospitals and medical schools, dissemination of research
findings, and provision of medical specialists to outlying, smaller
institutions.
Of growing concern to the association has been the problem of whole
blood distribution among the hospitals in the southern California area.
Blood supplies are maintained by most hospitals but, through necessity
brought by perishability and uncertain demand, these are small in
quantity and often do not include an adequate representation of different
blood types. As a result, most hospitals particularly the smaller ones,
often find it necessary to locate quantities of whole blood on an
emergency basis, telephoning each nearby hospital and supply point
until some can be found with which the holding institution can part
without endangering their own operations. Delivery is affected by
automobile. This procedure is time consuming and expensive.
46
The problem of the association is rectified by a computer system which
has been installed by the Los Angeles Metropolitan hospital. That
hospital has installed a fairly large computer system for research,
statistical and operational uses and has offered the services of this
system to the Hospital Association for purposes the association deems
appropriate. The computer system has the ability to handle
teleprocessing on a real time basis. This means the computer users can
enter data, programs, and perform other work with the system using
remote terminals that employ typewriters or other input-output devices. A
perspective user need only dial the appropriate number on a telephone
associated with his terminal and he has the use of system through his
input output device, which is connected to the computer by telephone
lines. The computer system operates so fast that many such terminals
can be using the computer at once with no appreciable time delay for
anyone user. Moreover, the computer system is able to handle these
teleprocessing functions while at the same time performing the tasks
required of it by metropolitan hospital of Los Angeles.
The hospital Association is considering the establishment of a
centralized whole blood distribution center to serve the emergency
needs of the member of the hospitals. Blood of each type must be
replenished each day to bring it to specified quantity. All withdrawals and
receipts must be immediately recorded so that any hospital can
determine immediately the type and amounts of blood available.
Deliveries can be made on an emergency basis by helicopter provided
by the California highway patrol. The association has hired a professor
from a nearby college with an extensive data processing program to
advise it as to how the computer system at Los Angeles Metropolitan
hospital could be used in the operation of the centralized blood bank
system.
LET US SUM UP
One reason why information systems play a larger role in organizations,
and why they affect more people, is the growing power and declining
cost of information technology- the computers and peripheral devices
that make up the core of information systems. Today because of the
growing technology, many new hardware and software have come into
exist. This new hardware power makes powerful, easy to use software
available to complete novices. In a few hours, relatively unskilled
employees can be taught word processing, project scheduling, spread
sheet preparation, and telecommunication applications on a
microcomputer. Now it is possible for end users to design their own
47
applications and simple systems without the help of professional
programmers.
GLOSSARY
48
organization or a business.
SUGGESTED READINGS
1. Kenneth C. Loudon & Jane P. Loudon (2014) Management
Information Systems, 13th Edition, Pearson Publications, USA.
2. Gordon B.Davis (2013) Management Information Systems, 1st
Edition, TMH Publications, India. ISBN 007066241X
3. Bentley Trevor J (1986) Management Information Systems &
data processing, 2nd edition, Holt, Rinehart and Winston
publications, University of California. ISBN 0039106888,
9780039106881.
4. Donald W. Kroeber (1986) Computer-Based Information
Systems: A Management Approach, Subsequent
edition, Macmillan Publications, University of Virginia. ISBN
0023668407, 9780023668401.
5. Joel E. Ross (1970) Management by Information System,
illustrated edition, Prentice-Hall publications, University of
Wisconsin,ISBN 0135486289, 9780135486283.
1) a 2) b 3) a 4)a 5)b
49
BLOCK 2
50
Unit 5
COMPUTER HARDWARE
STRUCTURE
Overview
Learning Objectives
Let Us Sum Up
Glossary
Check Your Progress
Suggested Readings
OVERVIEW
Computer system includes both hardware and software. Computer
hardware includes central processing unit, storage unit, input devices
and output devices. Any organization and management should possess
right knowledge about Computer Hardware and its usage in the
Organization for a successful business with Information Technology
LEARNING OBJECTIVES
51
5.1 COMPUTER HARDWARE
The hardware components of a computer system consist of five main
elements. They are,
2. Primary storage
3. Secondary storage
4. Input devices
5. Output devices.
The central processing unit manipulates raw data into a more useful
form and controls the other parts of the computer system. Primary
storage temporarily stores data and program instructions during
processing, whereas secondary storage devices store data and
programs when they are not being used in processing. Input devices,
such as a keyboard or mouse, convert data and instructions into
electronic form for input into the computer. Output devices, such as
printers and video display terminals, convert electronic data produced by
the computer system and display them in a form that people can
understand. Communications devices provide connections between the
computer and communications networks. Buses are circuitry paths for
transmitting data and signals among the parts of the computer system.
52
determining whether a number is positive, negative, or zero. The control
unit coordinates and controls the other parts of the computer system. It
reads a stored program, one instruction at a time, and directs other
components of the computer system to perform the program’s required
tasks.
53
when the computer is turned off. The most important secondary storage
technologies are magnetic disk, optical disk, magnetic tape.
Magnetic Disk
The most widely used secondary-storage medium today is magnetic
disk. There are two kinds of magnetic disks: floppy disks (used in PC’s)
and hard disks (used on large commercial disk drives and PC’s). Large
mainframe or midrange systems have multiple hard disk drives because
they require immense disk storage capacity in the gigabyte and tetra
byte range. PC’s also use floppy disks, which are removable and
portable, with a storage capacity up to 2.8 megabytes, and they have a
much slower access rate than hard disks.
Optical Disks
Optical disks, also called compact disks or laser optical disks, use laser
technology to store data at densities many times greater than those of
magnetic disks. They are available for both PC’s and large computers.
Optical disks can store massive quantities of data, including not only text
but also pictures, sound, and full-motion video, in a highly compact form.
The most common optical disk system used with PC’s is called CD-ROM
(compact disk read-only memory). A 4.75-inch compact disk for PC’s
can store up to 660 megabytes, nearly 300 times more than a high-
density floppy disk. Optical disks are most appropriate for applications
where enormous quantities of unchanging data must be stored
compactly for easy retrieval, or for storing graphic images and sound.
CD-ROM is read-only storage. WORM (write once/read many) and CD-
R (compact disk-recordable) optical disk system allow users to record
data only once on an optical disk. Digital video disks (DVD), also called
digital versatile disks, are optical disks the same size as CD-ROM but of
even higher capacity. They can hold a minimum of 4.7 gigabytes of data,
enough to store a full-length, high-quality motion picture.
Magnetic Tape
Magnetic tape is an older storage technology that still is used for
secondary storage of large volumes of information. More and more
organizations are moving away from using the old reel-to-reel magnetic
tapes and instead are using mass-storage tape cartridges that hold far
more data than the old magnetic tapes.
5.1.5Input Devices
An input device is a computer hardware component that converts input
data into a machine-readable binary code and transmits them to the
54
CPU, where they may be used in processing or may be sent to storage
for later use. The computer is useless without data to process. The input
of data is the first step in data processing operations and requires the
conversion of facts and figures in alphabetical and numerical form into a
form the computer can use. This, as we saw earlier, means converting
all data into the binary digits 1 to 0, which can be represented by
electrical impulses. Input devices gather data and convert them into
electronic form for use by the computer.
Keyboards remain the principal method of data entry for entering text
and numerical data into a computer. However, pointing devices such as
the computer mouse and touch screens, are becoming popular for
issuing commands and making selections in today’s highly graphic
computing environment.
Pointing Devices
A computer mouse is a handled device with point-and-click capabilities
that is usually connected to the computer by a cable. The computer user
can move the mouse around on a desktop to control the cursor’s
position on a computer display screen, pushing a button to select a
command. The mouse also can be used to “draw” images on the screen.
Trackballs and touch pads often are used in place of the mouse as
pointing devices on laptop PCs.
55
Touch Screens
It allows user to enter limited amounts of data by touching the surface of
a sensitized video display monitor with a finger or a pointer. Touch
screens often are found in information kiosks in retail stores, restaurants,
and shopping malls.
Digital Scanners
These translate images such as pictures or documents into digital form
and are an essential component of image-processing systems. Voice
input devices convert spoken words into digital form for processing by
56
the computer. Voice recognition devices allow people to enter data into
the computer without using their hands, making them useful for
inspecting and sorting items in manufacturing and shipping and for
dictation. Microphones and tape cassette players can serve as input
devices for music and other sounds.
Sensors
These are devices that collect data directly from the environment for
input into a computer system. For instance, farmers can use sensor to
monitor the moisture of the soil in their fields to help them with irrigation.
Printers
These produce a printed hard copy of information output. They include
impact printers (such as a dot matrix printer) and non-impact printers
(laser, inkjet, and thermal transfer printers). Most printers print one
character at a time, but some commercial printers print an entire line or
page at a time. In general, impact printers are slower than non-impact
printers. High-quality graphics documents can be created using plotters
with multicolored pens to draw (rather than print) computer output.
57
Plotters are much slower than printers but are useful for outputting large-
size charts, maps, or drawings.
58
servers, which are used for managing internal company networks or web
sites.
A personal computer (PC), which is sometimes referred to as a
microcomputer, is one that can be placed on a desktop or carried from
room to room. Smaller laptop PCs are often used as portable desktops
on the road. PCs are used as personal machines as well as in business.
A workstation also fits on a desktop but has more powerful
mathematical and graphics processing capability than a PC and can
perform more complicated tasks than a PC in the same amount of time.
Workstations are used for scientific, engineering, and design work that
requires powerful graphics or computational capabilities.
A supercomputer is a highly sophisticated and powerful computer that
is used for tasks requiring extremely rapid and complex calculations with
hundreds of thousands of variable factors. Supercomputers traditionally
have been used in scientific and military work, such as classified
weapons, research and weather forecasting, which use complex
mathematical models, but they are starting to be used in business for the
manipulation of vast quantities of data. Supercomputers use parallel
processing and can perform billions and even trillions of calculations per
second, many times faster than the largest mainframe.
5.3 HARDWARE TECHNOLOGY REQUIREMENTS FOR
ELECTRONIC COMMERCE AND THE DIGITAL FIRM
Electronic commerce and electronic business are placing heavy new
demands on hardware technology because organizations are replacing
so many manual and paper-based processes with electronic ones.
Companies are processing and storing vast quantities of data for data
intensive applications, such as video or graphics, as well as for
electronic commerce. Much larger processing and storage resources are
required to handle the surge in digital transactions flowing between
different parts of firms and between firms and their customers and
suppliers.
Although electronic commerce and electronic business may be reducing
the role of paper, data of all types (such as purchase orders, invoices,
requisitions, and work orders) must be stored electronically and
available whenever needed. Customers and suppliers doing business
hour of the day or night, and they demand 24-hour availability. For
business to occur 24hours a day anywhere in our electronic world, all
possibly relevant data must be stored for on-line access and all these
data must be backed up.
59
Figure 5.4 Types of Computers
LET US SUM UP
Computer hardware technology constitutes the underlying physical
foundation for the firm’s information technology (IT) infrastructure. The
other components of it infrastructure-software, data, and networks-
require computer hardware for their storage or operation. The modern
computer system has six major hardware components: a central
processing unit (CPU), primary storage, input devices, output devices,
secondary storage, and communications devices.
CHECK YOUR PROGRESS
Choose the Correct Answer:
1_________ is not a primary storage device
a) RAM b) ROM
60
c) Super computer d) Software technologies
GLOSSARY
61
SUGGESTED READINGS
1. Bentley Trevor J (1986) Management Information Systems &
data processing, 2nd edition, Holt, Rinehart and Winston
publications, University of California. ISBN 0039106888,
9780039106881.
2. Donald W. Kroeber (1986) Computer-Based Information
Systems: A Management Approach, Subsequent
edition, Macmillan Publications, University of Virginia. ISBN
0023668407, 9780023668401.
3. Gordon B.Davis (2013) Management Information Systems, 1 st
Edition, TMH Publications, India. ISBN 007066241X.
4. Joel E. Ross (1970) Management by Information System,
illustrated edition, Prentice-Hall publications, University of
Wisconsin,ISBN 0135486289, 9780135486283.
5. Kenneth C. Loudon & Jane P. Loudon (2014) Management
Information Systems, 13th Edition, Pearson Publications, USA.
1) c 2) c 3) a 4)a 5)a
62
Unit 6
COMPUTER SOFTWARE
STRUCTURE
Overview
Learning Objectives
6.1 Evolution of Computer Software
6.2 Classification of Computer Software
6.2.1 Operating Systems
6.2.2 Control Programs
6.2.3 Service Programs
6.2.4 Programming Languages
6.2.5 Packaged Software
Let Us Sum Up
Glossary
Suggested Readings
OVERVIEW
The purpose of computer software is to simplify the control of the
computer. Computer software includes system software and application
software. The managers should have basic understanding of computer
software and hardware so that they can make better decisions.
LEARNING OBJECTIVES
63
numbers, and the computer, which response to electrical impulses. In
order to control a computer, two different types of system software are
needed. They are operating system and a programming language. Other
system capabilities, such as time sharing or data communications, also
may be required, depending on the application and the hardware
configuration. During the later stages of the first generation, assemblers
and compilers were developed in elementary form. Early instructions or
programs for the computer were in machine language, comprehensible
only to the computer for which they were designed. This form is rarely
used today, usually being replaced by symbolic coding which permits
simpler description of instruction to the machine.
In the late 1950’s, the potential of universal symbolic language was
obvious, that a number of attempts have been made to develop a
language. A number of such languages are in use today, each oriented
to certain specific characteristics or requirements. Languages such as
FAP and AUTOCODER were early languages, which had algorithmic
capabilities, but were basically machine or assembler oriented. Algebraic
languages, which could be readily prepared from algebraic expressions
or equations, such as ALGOL or FORTRAN, were developed for the
conversion of these expressions into computer instructions. FORTRAN
literally means formula translation and has been developed into an
accepted universal language capable of utilization on many computers.
Although excellent for conversion of mathematical terminology,
FORTRAN is not basically oriented towards business language. For this
reason, COBOL (common business oriented language) was developed
and is now perhaps the most broadly utilized universal language for
business application. Program is prepared in symbolic language; it is
processed by another program, the assembler, which converts the
symbolic instructions into a form suitable for execution on the computer.
Simultaneously, the assembler package can also review any errors and
provide other diagnostic information, even preparing graphic flow charts
if desired. The output of the assembler is written in absolute code, and
the symbolic language is replaced by either absolute or re-locatable
addresses.
When universal languages are utilized in preparation of a program, an
assembler is not used to convert the actual machine instructions. In this
case, a compiler program is utilized. As in the case of the assembler, the
compiler does transform the programs from a form easily read by
programmers into one capable of being read by the computer. However,
while the symbolic input program for the assembler is very dependent
upon the computer is being utilized, the compiler program is relatively
64
computer independent. The second generation was the batch process,
in which input material was introduced, processing accomplished, and
output physically removed from the computer. Actually, this is stacked
processing, in which a series of jobs are introduced without operator
intervention. True dependent- and with proper choice of higher level
languages will run on other computers with only minimal changes. The
input program for both is called the source program, and the output is
termed the object deck.
Second-generation computers carried both assemblers and compilers to
a sophisticated level of development. The number of built in instructions
in equipment was generally reduced because of inflexibility. These
instructions were replaced by early operating systems, which had sets of
basic instructions, and input output, control systems-as well as
programs. The second generation was the batch process, in which input
material was introduced; batch processing involves the processing of a
stack of similar jobs, and the completing of the same phase across each
job, then returning to the second phase of each job in the batch. For
both stack and processing, however, simple operating systems are
useful.
Third generation computer makes the use of operating systems almost
indispensable for the largest- size machine. Without a machine operated
system, operator inefficiencies would greatly offset the higher cost of the
hardware. Operating systems have become increasingly complex,
including for families such as IBM 360 COS (Compatible operating
system-a series of programs which allowed emulation mode to operate
1401 programs on the 360); BOS (basic operating system- disc oriented
one of the early 360 operating systems, no longer used); DOS (disc
operating system); TOS (tape operating system); and TSS (time sharing
system).
The most comprehensive operating system for the IBM 360 series is
OS/360. This is tremendously flexible system with largest configuration
of this series, spanning a range from the model 50 upward. Initially,
OS/360 had been intended to service the entire range of IBM 360’s, but
the system itself requires a substantial memory dedication- exceeding in
some cases 128k. In addition, the OS requires substantial peripheral
equipment in memory to properly utilize its dynamic capabilities.
Accordingly, model 360/50 is one of the smallest to utilize the OS, and
its utility becomes much greater as the systems increase in size. OS/360
has a modular organization, so that the system can be implemented in
several versions to various levels of sophistication. The system utilizes a
65
job control language offering great flexibility over operation of the
machine. OS/ 360 has a definite data management structure, which is
flexible, but dependable. Accordingly, the programmer is able to utilize
the characteristics of OS/360 to enhance the capabilities of the program,
while reducing its overall size. While OS/360 is perhaps the most widely
known operating system, other computers have had similar operating
systems developed for optimal utilization of their hardware.
Evolution of Computers
66
more difficult the programming to accomplish it. That is, if management
chooses to speak directly to the computer in reasonably pragmatic
English, the programming implications are fantastic. While this is within
the realm of the state-of-the-art, it usually produces completely
unacceptable cost levels. While it is possible that the continual
development of larger machines will ultimately permit a breakthrough in
terms of direct communication with the equipment, the overhead for this
software master operating system will be substantial-and perhaps too
expensive for general use. Further, when such a system is developed, it
will be operable only on the new and ultrahigh-capacity equipment and
this will preclude use on current third-generation equipment.
Accordingly, the economic implications of utilization of the yet-to-be
developed utopian system will have to pass another economic barrier.
From the practical viewpoint, management should consider the cost of
programming in terms of what is relatively available today, and not look
toward pie-in-the-sky developments many years down the road. Actually,
the programming situation is improving-in step with hardware. As
hardware is becoming more modular, and higher-Level languages are
becoming truly interchangeable; the package program has become
practical in many areas. For many portions of MIS, it is possible that
substantial portions of the program may be prepared in a generalized
form.
67
in an organization. Application software may be developed uniquely for
the using organization by in- house (or contractual) personnel or it may
be purchased in ready-to-use packages. Application software includes
computer programs written for an individual application such as payroll
processing or personal skill analysis. They generally require system
software in their execution. For example the application program specify
reading data from a record stored on a disk; the operating system
provides the instructions to manage the physical reading of the record
from disk storage
68
including routine, repetitive, or purely ‘’housekeeping’’ functions in
application programs. Control programs and service are two types of
such systems software.
69
operating systems permit the application programmer to call up a service
program to perform these tasks with only one or two statements.
There are also service programs in operating systems to reformat data
for a different medium (e.g., from tape to disk) and to detect errors in
application programs. System software can detect only syntax errors. It
cannot detect logical errors-programming statements that follow all the
rules but have been used in a manner that will produce the desired
output.
Programming Languages
Machine Languages
The first generation of computer languages is called machine language
because they use the binary code—1’s and 0’ s—understood directly by
the computer and do notion fact require the services of an operating
system. Machine language instructions are typically in two 4 and 5 - bit
parts: an operation code, which tells what is to be done, and an operand,
which tells where to store the results. For example, a machine language
70
code to “store a value called x in register 11011” might be written 1100
11011. Although, technically speaking, machine languages are in binary
code, most computers accept the decimal (base 10) or hexadecimal
(base 16) equivalents of these codes. Languages using non-binary
equivalents are still referred to as machine languages.
Every computer has its own more or less unique machine language,
which is determined by the A.L.U circuitry. All computers ultimately
operate in machine language, but almost none still require the
programmer to use one. Instead, system software translates other,
easier-to-use languages in to machine languages.
Assembler Languages
The second generation of computer languages freed the programmer
from the tedious, error -prone binary instructions and was the first to
require an operating system. This generation is called assembler, or
sometimes, symbolic languages. Assembler languages substitute short
alphabetic expressions for the operation code. For example, add x
means add the variable previously defined as x to the value currently
stored in an accumulator register.
Although not strictly a machine language, most assembler are
nonetheless machine- oriented. That is, each computer has unique
assembler language symbolic expressions that correspond to machine
language instructions on a one- to-one basis. A portion of the operating
system known as a language translator performs the conversion of
symbolic instructions into machine language instructions.
Some assembler languages use macroinstructions that generate two or
more machine language instructions from a single assembler language
statement. For example, the macro instructions add a, b, c which means,
add the variable a to the variable b and call the result c,” replaces three
simple instructions to load a into a register, add b to it and store the
result.
An exception to the general rule of unique assembler languages is found
in the very recent (1983) language c. The language c is sometimes
described as a “portable” assembler language because there are
versions of it available for many computers, from micros to super
computers. C is very powerful language used most often by system
programmers for writing system software.
71
High Level Languages
The third generation of computer languages is called high level and was
the first to free programmers from specific hardware requirements,
although there were (and often still are) minor differences in high level
languages among the various makes and models of computers.
In compiling high level or source program it is translated entirely into a
machine language or object program prior to execution. Interpreters
translate and execute one program statement at a time. Until recently,
most high level languages were compiled for more efficient use of C.P.U
time. Now, however the extremely high speeds of the latest computer
hardware and certain inherent advantages to interpreting have spurred a
renewed interest in interpretive languages. Many fourth-generation
languages are of the interpretive variety.
High level languages may also be classified as procedure- oriented or
problem-oriented.
72
The main advantage of developing a system ”in house” is to obtain a
unique system designed to fit specific needs of an organization. In many
cases, it is more appropriate to lease or buy application software. There
is a growing trend toward purchasing generalized application packages
(such as payroll, accounts receivable, production scheduling) and using
internal development personnel to tailor the packages to unique
organizational needs. Application packages are sold or leased from
companies, which specialize in software development; application
packages for small (personal) computers are sold in computer stores, by
mail, and other similar channels.
Activity 1
When you buy personal productivity software, we recommend that you
do so in the form of a suite. A software suite is bundled software that
comes from the same publisher and costs less than buying all the
software pieces individually choose one personal productivity suite either
from Microsoft office or coral we perfect office. Determine the individual
price for each piece of software included in it. Now, perform a price
companion. How much cheaper is the entire suite? Can you think you a
situation in which someone would buy the individual pieces as opposed
to the entire suite? If so, please describe it.
LET US SUM UP
The computer software is classified into systems software and
application software. A computer is directed by software instructions.
Most programming of instructions is done in high level languages which
trade off programmer productivity against extra machine resources and
numbers of types of high-level languages used in information processing
applications are also described.
73
3. _________ referred to simply as programs or codes.
GLOSSARY
74
pressure; a user interacts with the
computer by touching pictures or
words on the screen.
SUGGESTED READINGS
1. Bentley Trevor J (1986) Management Information Systems &
data processing, 2nd edition, Holt, Rinehart and Winston
publications, University of California. ISBN 0039106888,
9780039106881.
2. Donald W. Kroeber (1986) Computer-Based Information
Systems: A Management Approach, Subsequent
edition, Macmillan Publications, University of Virginia. ISBN
0023668407, 9780023668401.
3. Gordon B.Davis (2013) Management Information Systems, 1 st
Edition, TMH Publications, India. ISBN 007066241X.
4. Joel E. Ross (1970) Management by Information System,
illustrated edition, Prentice-Hall publications, University of
Wisconsin,ISBN 0135486289, 9780135486283.
5. Kenneth C. Loudon & Jane P. Loudon (2014) Management
Information Systems, 13th Edition, Pearson Publications, USA.
1) a 2) a 3) c 4) c 5) b
75
Unit 7
DATABASE MANAGEMENT SYSTEM
STRUCTURE
Overview
Learning Objectives
Let Us Sum Up
Glossary
Suggested Readings
OVERVIEW
In the previous unit, we had discussed the hardware and software
components of Computer. Database Management System is one of the
software components of Computer. More specifically it is the application
software. The features of database management system are discussed
here. Database management system is classified into hierarchical,
network and relationship database management system. Internet
applications are explained at the end of this unit.
LEARNING OBJECTIVES
76
• Cooperating in the maintenance of those shared data resources.
77
A DBMS reduces the complexity of application programs. They no
longer have to cope with the physical locations and structures of the files
and records. With a DBMS, any data element or combination of data
elements can be used to index a group of data from a record or records.
The DBMS, in conjunction with the file-access software, handles the
necessary logistics of retrieving and storing specified data elements in
the proper physical locations within the database.
Many vendors and software companies offer sophisticated
advancements to their DBMS software packages in the form of query
languages. A “query language” is a set of easy-to-use computer
instructions. These instructions are designed to allow a person who is
not trained in computer programming to retrieve, modify, add, or delete
selected data elements on the basis of stated conditions.
The use of query languages or fourth generation languages becoming
increasingly popular because of the proliferation of computer terminals,
personal problems, ad hoc retrieval requests from all levels within an
organization, and the ever-improving software packages readily
available for most user applications. Such advancements place the
computer in the hands of the user and help remove the aura of mystery
that surrounds computers.
Thus, a DBMS allows the users of a database to view the database in
terms of applications necessary to support their departmental or
functional area. Their access to the database is not complicated by other
data elements in the database. This means that data elements can be
added to or deleted from the database without affecting any application
programs other than those that use the data elements being added or
deleted. A DBMS greatly reduces the difficulty of both establishing and
modifying integrated files.
Advantages of a DBMS
• Complexity of the organization’s information system environment
can be reduced by central management of data, access,
utilization, and security.
• Data redundancy can be reduced by eliminating all of the
isolated files in which the same data elements are repeated.
• Data confusion can be eliminated by providing central control of
data creation and definitions.
• Program-data dependence can be reduced by separating the
logical and physical aspects of data.
• Program development and maintenance costs can be radically
reduced.
78
• Flexibility of information systems can be greatly enhanced by
permitting rapid and inexpensive ad hoc queries of very large
pools of information.
• Access and availability of information can be increased.
• Security and privacy can be controlled.
Disadvantages
• Costs are high.
• Security is difficult to maintain.
• A consequence of security breaches may be severs.
• Greater control over data is required.
79
Figure 7.1 Hierarchical Database Model (HDBM)
80
The set may have more than one member occurrence, i.e., a
component may be used in more than one part. The same is true for the
part subassembly set and subassembly-assembly set, and so on. Every
owner is a member besides being the owner and also is a member of
the set. If all the relationships are to be shown, then the model is
equivalent to a network. Hence, the data model is known as the NDBM
Simple Network Data Base model
81
7.2.3 Relational Database Model (RDBM)
In the RDBM, the concept of two dimensional tables is used to show the
relation. For example, consider the following database having the
component name and the component number in the table form.
100 Washer
102 Nut
109 Bolt
111 Screw
RDBM model uses theories of relational algebra in representing the data
in various tables. In RDBM, the relation is shown in a table; attribute is
shown in the column and record in the row of the table. The values of
attributes are taken from a domain. The set of attributes is record and
the record is identified by a unique key known as the primary key.
Latest RDBMS
The latest RDBMS allows an on-line maintenance, rapid recovery and
software-based fault tolerance. These features ensure the availability of
the database round the clock as the database maintenance is possible
on-line when the system is in use. The maintenance activity consists of
the following tasks:
a) Backup
b) Diagnostics
c) Integrity changes
d) Recovery
e) Design changes
f) Performance tuning
The rapid recovery feature allows the system administrator to provide a
’time’ to go back for recovery of the data if the system fails due to the
power failure or network crash. Based on this, time system automatically
goes back and collects all the changes and writes to the disk.
The characteristics of the modern RDBMS includes hardware
independence, software independence, workability under a client-server
architecture, a control feature of integrity, security and autonomy and
built-in communication facilities to achieve and open the system feature
for the MIS. It, therefore, provides a very efficient and effective tool to a
skillful designer, developer and user for handling the information needs
of the business enterprise. Eifcodd prescribes 12 rules to determine how
82
relational a DBMS product is. If these twelve rules are satisfied, the
DBMS product is fully relational. The rules are as under:
1. The information rule
Information Rule
Information in database is represented by values in column positions
within rows of tables and this is the only way it can be done.
Sublanguage Rule
DBMS must support one relational language which helps data definition,
manipulation security, integrity constraints, and begin, commit, and
rollback operations.
83
View update Rule
Distribution Independence
DBMS should function with no error even though the data is distributed.
Non-Subversion Rule
A low level interface provided by the DBMS should not subvert the
system’s relational security or integrity constraint.
Advantages of RDBMS against HDBMS and NDBMS
Some of the major advantages of RDBMS against HDBMS and NDBMS
are:
LET US SUM UP
Database Management system is a software system that manages the
creation and use of databases. It may be hierarchical, network or
relational. Distributed systems have computers located at various
physical sites at which organization does business and these computers
are linked by telecommunication lines in order to support some business
processes. Internet is often referred to as the network of networks which
has a wide range of applications.
84
CHECK YOUR PROGRESS
GLOSSARY
85
"techterms.com."
SUGGESTED READINGS
1. Bentley Trevor J (1986) Management Information Systems &
data processing, 2nd edition, Holt, Rinehart and Winston
publications, University of California. ISBN 0039106888,
9780039106881.
2. Donald W. Kroeber (1986) Computer-Based Information
Systems: A Management Approach, Subsequent
edition, Macmillan Publications, University of Virginia. ISBN
0023668407, 9780023668401.
3. Gordon B.Davis (2013) Management Information Systems, 1 st
Edition, TMH Publications, India. ISBN 007066241X.
4. Joel E. Ross (1970) Management by Information System,
illustrated edition, Prentice-Hall publications, University of
Wisconsin,ISBN 0135486289, 9780135486283.
5. Kenneth C. Loudon & Jane P. Loudon (2014) Management
Information Systems, 13th Edition, Pearson Publications, USA.
1) a 2) b 3) c 4) a 5)a
86
Unit 8
DISTRIBUTED SYSTEM
STRUCTURE
Overview
Learning Objectives
8.2 Internet
Let Us Sum Up
Glossary
OVERVIEW
In the previous unit the features of database management system were
discussed where Database management system is classified into
hierarchical, network and relationship database management system.
The significance of distributed system and Internet applications are
explained in this unit.
LEARNING OBJECTIVES
87
8.1 DISTRIBUTED SYSTEM
It is an application system in which the processing power is distributed to
multiple sites, which are then tied together via telecommunications lines.
Distributed systems have computers (of same size) located at various
physical sites at which the organization does business, and these
computers are linked by telecommunications lines in order to support
some business process. This system is the most commonly used
architecture for workgroup computing.
A distributed system interconnects locations that have computer
capability to capture and store data, to process data, and to send data
and information to other systems. The range of computing capabilities
varies. Some locations use terminals, other microcomputers, and still
others large computer systems. There is no requirement that all
equipment be from the same manufacturer. In fact, it is expected that
several makes of autonomous hardware will be involved. This allows
users to have the type of equipment most suitable for their needs.
All locations in distributed processing are called as nodes. They have
the ability to capture and process data where events are occurring. That
is, if a specific location uses a minicomputer, users enter data and
process it on their minicomputer. They receive rapid responses to
inquiries, store data in the system, and prepare reports as the need
arises. However, they can also transmit data or reports from their system
to another one linked into the network, the collection of interconnected
systems.
Large organizations are establishing networks to interconnect multiple
sales and manufacturing locations. Sales, accounting, and technical
information are readily accessible from multiple locations. Even word-
processing facilities are linked into the network. Corporate management,
at the top of the network, is able to interact with other locations in the
network while having its own independent information system. At the
same time, terminals at field sales offices are able to access information
in the system.
88
Multiple general-purpose processing components
The processing systems can be assigned specific tasks on a
dynamic basis. The systems need not to be of a common make or size.
System transparency
Users do not know the location of a computer in the distributed
system or anything about its manufacturer, model, local operating
system, speed or size. All services are requested by name. The
distributed operating system performs all activities involving physical
locations and processing attributes in order to satisfy the user’s request.
89
• A personal computer that can be partitioned, i.e., able to operate
several different processing sessions simultaneously by using a
special operating system.
• Although these applications can be quite useful, they do not meet
the definition of a distributed processing system.
90
way a distributed processing system is configured usually depends on
the needs of the application.
Local area networks (LANs) are the most prevalent form of distributed
systems for workgroup processing. A LAN connects independent
microcomputers by using cables and processor cards that are inserted in
the expansion slots of the micros. For some systems, the cables are
telephone-type wire; with others, coaxial cable (cables used for tv) is
required. In general, the microcomputers must reside within several
thousand feet of each other. The LAN supports hardware sharing, e-
mail, and workgroup database processing. It connects five user
microcomputers with a special microcomputer called a file server. The
file server contains the database on its disk and processes that
database in accordance with the requests from the other
microcomputers. It also schedules and supervises the processing of
requests for the graphics plotter.
Suppose a company maintains three ware houses in geographically
separated locations. All of the micros in a ware house are connected via
a LAN. Most of the time, the users of the micros need only to
communicate with other micros at the same site. Upon occasions,
however, it is necessary for a micro to communicate with another micro
in a different ware house. Wide area networks are basically networks of
LAN. In general, the system is designed so that micros that need to
communicate frequently are attached to the same LAN. The
independent LANs can communicate however, so that it is possible for a
micro on one LAN to communicate with a micro on another LAN. The
computers that connect the LAN together are called as gateway
computers.
Besides LAN and wide area network, a third network alternative is the
private branch exchange (PBX). A modern PBX is an extension to the
older telephone oriented switching systems. Such PBXs allow for the
transmission of data as well as voice signals and thus provide a medium
for microcomputers to communicate. Most PBX systems provide far less
data transmission capacity than a LAN, and so they currently are used
for low-volume applications such as e-mail.
91
be captured by direct entry into a microcomputer or a terminal connected
to a minicomputer and stored on magnetic disk. At the end of the day,
summary reports on transactions that have occurred are printed, but the
stored transaction data remain on disk. Changes and corrections to
transactions are made as they appear necessary after the transaction
register is scanned. If the system is, for example, a retail system, the
transaction files can be processed at the end of the month to produce
monthly statements for mailing to customers. At the same time,
customer accounts are updated to show new purchases, payments,
credits, and adjustments and to produce a new account balance, all of
which happens at the local level. Periodically throughout the month,
information on inventory levels can be sent to a central system at the
regional ware house that handles all purchasing of merchandise for the
firm. This process can be performed daily, weekly, or at whatever time
interval management finds appropriate.
At the end of the month, the national and regional sales offices receive
reports generated by the local system that summarize sales, inventory,
payments, and accounts receivable information. In this way the central
office receives all the information it needs, while the local offices are
able to capture and process operating data in the manner best suited to
their activities.
92
when the system is again running. Sometimes a terminal is kept on hand
to link with other systems when the local computer system is unusable.
iv)Sharing Software
Sometimes software is the reason for developing distributed systems.
Some software packages run only on certain makes or sizes of
equipment. Budget constraints may also prohibit one site from
purchasing expensive software packages. However, if another site in
network has a specific package on its system, user in a distributed
system are usually able to run the software. Software sharing permits a
remote user to access the computer system to another node, enter data,
and have it run on the remote computer, using the software stores on
that system. As the results are generated, they are stored and later
downloaded (transmitted back) to the originating system.
93
8.2 INTERNET
The internet is often referred to as the network of networks- a
communication medium made possible by computers and networks.
People often exchange all kinds of information, in innumerable social
contexts, on the internet. Research and information pass back and forth
ceaselessly. It is a fluid and dynamic environment: it has no definite
boundaries, its limitations imposed only by available software and
hardware technology. It has been used exhaustively by scientific and
academic communities for many years. With recent surge in interest by
business and government, the internet or its successor network will be of
major importance in tomorrow’s world.
94
Au Australia Hu Hungary Se Sweden
Es Spain Nl The
netherland
Fi Finland No Norway
95
store the newsgroup articles and the amount of traffic on the particular
newsgroup. A news article may be stored for just a few days or up to
months. If you don’t look at a newsgroup for a while, you will miss topics
of discussion as they come and go.
Simplicity of Use
In general the software that accesses the internet is comparatively
simple to use. The reasons for this and their implications can best be
illustrated by looking at the example of the www.
Netscape and Microsoft provide the products (www browsers) that are
used by the vast majority of people who access the www.These
products are increasingly designed for the mass consumer and not the
specialist. A core objective of the products is that they are intuitive to use
with a short learning curve. In addition to this objective is the
requirement for browsers to operate on a wide range of different
suppliers computing products and operating systems. Once the basic
principles of using a browser have been learnt, this knowledge is
transferable across most of the computing platforms that a user is likely
to encounter. A further implication of the simplicity of the browser
software is the ability of the same product to be used both horizontally
and vertically within an organization. It is increasingly likely that the CEO
and a lowly grade clerical employee will use the same interface on their
desktops.
Breadth of Access
Like the telephone network, the internet operates globally. Once
connected, the scope of access is not conditioned by geographic
boundaries. Unlike the telephone network, the costs involved in global
connection are not related to the distances involved. Conducting
transactions with the adjacent office costs the same as contacting the
farthest continent.
No other communications medium has had access to such a large
audience and range of people which increases the ability to leverage the
value of information to a scale that has never been possible.
96
street journal and numerous other publications produce both an
electronic and paper version of their products.
Publishers of software and games now deliver their products
directly over internet.
Entertainment companies regularly provide extracts of their films
and music recordings to promote the real products.
Flexibility of Communication
The continuing releases of both Microsoft and netscape www browsers
will greatly extend the ways in which individuals can communicate. They
are:
Exchange text with each other.
Activity
Which is the better internet software tool, Internet Explorer or Netscape
Communicator? To prepare your analysis, use articles from computer
magazines and the web and examine the software’s features and
capabilities. If possible, use presentation software to present your
findings to the class.
97
LET US SUM UP
Database Management system is a software system that manages the
creation and use of databases. It may be hierarchical, network or
relational. Distributed systems have computers located at various
physical sites at which organization does business and these computers
are linked by telecommunication lines in order to support some business
processes. Internet is often referred to as the network of networks which
has a wide range of applications.
GLOSSARY
98
the group is organized.
SUGGESTED READINGS
1. Bentley Trevor J (1986) Management Information Systems &
data processing, 2nd edition, Holt, Rinehart and Winston
publications, University of California. ISBN 0039106888,
9780039106881.
2. Donald W. Kroeber (1986) Computer-Based Information
Systems: A Management Approach, Subsequent
edition, Macmillan Publications, University of Virginia. ISBN
0023668407, 9780023668401.
3. Gordon B.Davis (2013) Management Information Systems, 1 st
Edition, TMH Publications, India. ISBN 007066241X.
99
4. Joel E. Ross (1970) Management by Information System,
illustrated edition, Prentice-Hall publications, University of
Wisconsin,ISBN 0135486289, 9780135486283.
5. Kenneth C. Loudon & Jane P. Loudon (2014) Management
Information Systems, 13th Edition, Pearson Publications, USA.
1) c 2) b 3) a 4) a 5) b
100
BLOCK 3
APPLICATIONS OF INFORMATION
SYSTEM
101
Unit 9
APPLICATION OF INFORMATION
SYSTEM IN BUSINESS AREAS - PART I
STRUCTURE
Overview
Learning Objectives
9.2 Procurement
9.3 Warehousing
Let Us Sum Up
Glossary
Suggested Readings
OVERVIEW
Information system finds its applications in our every walk of life. It plays
a vital role in today’s business. In this unit, we will discuss the
application of information system in business. Especially in the functional
areas of business, viz. marketing, procurement, warehousing,
102
production, finance and human resources. In this chapter, we will look in
detail how IS is applied to Marketing, Procurement and Warehousing.
LEARNING OBJECTIVES
103
price is way too high for the customer, the system generates a leasing
contract with low monthly payments. As a special service, the application
system calculates the cost effectiveness of alternative machine
configuration in the copy shop under differing assumptions. Example it
may analyze that after the investment in the extra high capacity device
twice as many new students may be acquired as customers or that sales
may go down by 20% since the costs for using newly installed machines
in the university library have been lowered. In the next step the offer is
printed out and is stored on the notebook. Finally, the salesperson
transmits the offer the potentially the order (e.g., using a wireless
modem) to the central of her printing machine manufacturing company.
A Practical Example
Ford-Werke AG in Germany has its central parts administration
integrated with the ordering systems of the Ford dealers. The integrated
system is called DARTS (Dealer Application Remote Terminal System).
An order scheduling program running on a computer in a dealership
makes suggestions when and in which amounts accessories and spare
parts should be ordered. The dealer authorizes or modifies these
suggestions and stores the final orders in the dealership’s computer.
Periodically the central DARTS computer fetches the orders
automatically from the dealers’ computers and transmits these
collectively to the order processing programs in the central spare parts
administration of Ford Motor Works in Cologne.
Important components are the various verification features. They must
assure that as few incorrect data as possible enter the integrated
system. The technical verification examines whether the desired variant
may be delivered or whether maybe an error occurred during the
configuration by the salesperson or whether a mistake was made by the
customer. For example, a medical device intended for export to
104
Germany may be specified with an adaptor that works fine in the United
States, but does not meet the specifications of the German electricity
grid. During the credit assessment one checks whether after acceptance
and delivery of the order the customer would exceed a credit limit such
that payment may be jeopardized. The due date verification module
checks whether the customer’s desired delivery date may be kept. In
order to do this we first will have to query the inventory status starting
with the finished products, on to intermediate products and up to
externally procured parts. If one does not have enough supplies then the
system has to estimate whether the required production processes may
finish on time.
105
3. Analysis of the customer data, e.g., through the use of database
marketing
4. Suggestions for the sales department that certain campaigns or
special offers are necessary, e.g., support when a trade exhibit is
forthcoming or when for equipment one year after installation a general
overhaul is recommended
9.2 PROCUREMENT
i) Order scheduling
ii) Purchasing
106
Delivery to customer - Finished product Shipping logistics
warehouse outflow
notices
warehouses
houses
In many firms the core of the procedure is the first order exponential
smoothing in accordance with the formula:
= Smoothing parameter
The demand for period i is estimated by correcting the predicted value
for the period i-1 by the fraction of the thereby occurring prediction error.
The size of determines how sensitive the forecasting process will react
on the newest observations. The smaller is, the stronger the forecast
values of the past are taken into account. Looking at the formula gives
us an indication of this effect, e.g., if one assigns to be as small as
possible, i.e. zero: Now the system picks the old forecast value also as
107
the new predicted value, i.e. the last observation M i-1 does no longer
play any role. For more complicated demand processes (cyclical trend,
seasonal dependencies, overlap of trend and season or demand thrusts
through sales campaigns) the exponential smoothing has to be
enhanced.
The order scheduling program finds the intersection L (desired delivery
date) of the outward stock movement line with the parallel to the x axis
that marks the safety stock, and moves to the left from this point by the
amount of the reorder time tw . In doing so the order date TBis specified.
This is the point in time when an order will have to be placed such that
after the reorder time period has passed the ordered parts will arrive on
time. The x-coordinate value TBcorrespondents to the y-coordinates s.
This is the reorder level.
In the next step a low-cost order quantity Q is calculated. If the part is
obtained through in-house production, then the order for a finished
product will have to be transferred to the application system Primary
Requirements Planning. For an intermediate good or single part the
transfer data will need to be sent to the application system Material
Requirements Planning. If we are dealing with an external procurement,
however, then material scheduling will pass along the data to the
purchasing system.
108
9.2.2 Purchasing
One need to distinguish whether a) only one supplier is under
consideration, b) the systems may determine a supplier on its own (in a
module supplier selection) or c) the choice becomes the duty of the
purchasing officer. In the cases) a) and b) the computer can print the
order and store it in a temporary reservation file. In case c) the
purchasing officer is presented with the choice of suppliers on the
monitor. The orders may only be triggered when a human being has
entered his/her decision into the computer. In some firms the application
system transmits its orders, e.g., via the Extranet to the computer of the
supplier (interorganizational integration or supply chain management,
respectively).
During the classical procurement process the ordering entity, e.g., a raw
material warehouse, enters an order request into the system. This
request is processed at the PC of an employee within the purchasing
department (checking against the purchasing budget, choice of supplier,
where appropriate a modification may be made in the computer-
suggested lot size) and is then passed along to the supplier. In case of
the so-called desktop purchasing in our example the warehouse
scheduler places the order without the participation of the purchasing
department. The rules via which the purchasing department employee
checked the order request are now depicted in an electronic program.
As long as there is no interference the computer of the warehouse
scheduler transmits the order in electronic form to the supplier.
The purchasing or procurement function is according to many observers
once of the partial systems of a manufacturing firm that are drastically
changed by the Internet (“electronic procurement”). We may distinguish
among various levels
1. Information collection from WWW presentations: The
purchaser acquires on the Internet the newest product descriptions and
prices, investigates potential suppliers, etc.
2. Internet-Shops: Buyers visit virtual show rooms on the Internet
and order directly.
3. Internet-Shopping Malls: Here several Internet shops are brought
together in a portal. The buyer may thus inquire about the availability
and conditions of a multitude of potential suppliers.
4. Internet Request for Proposals: The buyer may post his needs
on an Internet portal. An intermediary compares the specification with
109
the tender of potential suppliers and transfers the inquiry with the
request to make an offer.
5. Internet Market Places: One may see them as a further
development of Internet requests for proposals. The main difference is
that the potential suppliers after the request for proposals have the
possibility to examine the offers of the other competitors and to improve
their own in favour of the buyer without interference by the market place
operator (online purchase auction).
110
Aside from the ‘bureaucratically’ managed, i.e. using stock
requisitions and delivery notes, warehouses there is shop floor stock for
which not every single movement is accompanied by a book entry.
One has to consider reservations, i.e. parts, that are physically still
in the warehouse even though they are already encumbered and may
only be delivered for a specific purpose.
Stock-taking as an example demonstrates how information systems
trigger processes carried out by men and thus makes essential
contributions to the orderliness of companies (concurrence between
“book inventory balance” and actual “inventory”). Occasions requiring
inventories that applications systems are capable of determining
themselves are:
111
based on any particular order (so-called random or chaotic storage).
Since the computer stores an image of the warehouse, the system is
capable of finding available positions any time.
2. During stock withdrawal “position” as part of a consignment (order
or shipping process) are fetched (partially) automatically from their
storage location, sorted and are being transported to the location for
packing and shipping.
A Practical Example
Avon CosmeticsTM opens the shipping cartons that had arrived folded
with an automated machine. Also automatically each carton is marked
with a bar code that identified it as part of a customer order. A control
system reads this bar code and delivers the carton over belts, gates and
switches only to those unloading/loading locations whether there are
ordered parts/items. The employees handling the consignment receive a
graphical presentation on a monitor that shows to which shelf location
and space they have to move. This shelf space is being illuminated at
the right moment and on a digital display the employee sees how many
units (e.g., lip sticks, tubes) will have to be picked and be placed into the
carton. After this is done the employee pushes a button to report the
process as completed. The carton is then transported automatically to
the next location. In that way a sort of “consignment progress control”
occurs. The system transmits data to a logistics manager who is then
informed of which shipping tasks are forthcoming and how he/she is to
manage these shipments.
LET US SUM UP
In this unit we have discussed the application of information system in
business. In marketing the information system finds its application in
customer inquiry and sales offer processing, quotation follow up, order
entry and order verification and customer relationship management. It is
helpful and goods receiving control in procurement function. The
warehousing functions include material valuation, inventory control and
support of processes in the warehouse.
c) Procurement d) DBMS
2. Purchasing is a function of_____________
112
a) Order scheduling b)CRM
a) Marketing b) Financing
c) Operation d) Personnel
GLOSSARY
SUGGESTED READINGS
1. Bentley Trevor J (1986) Management Information Systems &
data processing, 2nd edition, Holt, Rinehart and Winston
113
publications, University of California. ISBN 0039106888,
9780039106881.
2. Donald W. Kroeber (1986) Computer-Based Information
Systems: A Management Approach, Subsequent
edition, Macmillan Publications, University of Virginia. ISBN
0023668407, 9780023668401.
3. Gordon B.Davis (2013) Management Information Systems, 1 st
Edition, TMH Publications, India. ISBN 007066241X.
4. Joel E. Ross (1970) Management by Information System,
illustrated edition, Prentice-Hall publications, University of
Wisconsin,ISBN 0135486289, 9780135486283.
5. Kenneth C. Loudon & Jane P. Loudon (2014) Management
Information Systems, 13th Edition, Pearson Publications, USA.
ANSWERS TO CHECK YOUR PROGRESS
1) b 2) c 3) c 4) d 5)a
114
Unit 10
APPLICATION OF INFORMATION
SYSTEM IN BUSINESS AREAS - PART II
STRUCTURE
Overview
Learning Objectives
10.1 Production
10.1.1 CIM
10.1.4Throughput Scheduling
10.1.6Availability Check
10.1.7 Order Clearance
10.2 Finance
10.1.4General Accounting
10.1.5Accounts Receivable
10.1.6Accounts Payable
10.3.2Payroll Accounting
10.3.3Reporting Programs
115
10.4 Decisions-Support Systems
Let Us Sum Up
Glossary
Suggested Readings
OVERVIEW
Information system finds its applications in our every walk of life. It plays
a vital role in today’s business. In this unit, we will discuss the
application of information system in business. Especially in the functional
areas of business, viz. marketing, procurement, warehousing,
production, finance and human resources. In this chapter, we will look in
detail how IS is applied to Marketing, Procurement and Warehousing.
LEARNING OBJECTIVES
After reading this unit, you should be able to,
• evaluate the functions of production.
• evaluate the functions of finance and human resources.
10.1 PRODUCTION
The production function includes CIM, MRP I, MRP II, throughout
scheduling, cap acing balancing, availability check, order clearance, job
shop scheduling, CIM, Computer aided quality assurance and
production data entry.
116
that a separation into the business management and technical parts is
barely recognizable.
This illustration is of relevance mainly to firms, e.g., in the mechanical
engineering industry, that manufacture products that have been ordered
that have been ordered by customers on an individual basis or with
certain variants in job-shop manufacturing settings. For firms that turn
out mainly mass-produced items for an “anonymous” market, such as
cleaning detergent, other configurations of the building blocks will have
to be chosen.
A very difficult problem in the conceptualization of application systems in
the production area is the intensive reciprocal interaction among the
individual systems. Basically, one should depict. CIM as one huge
simultaneous model. Figure 5.3 shows just one example of the effects of
integration: If one increases the lot size, this implies that one is willing to
put up with increased inventories that tie up more capital. However due
to shorter set-up times, bottlenecks are better utilized. Thereby the
throughput times of orders decline initially during the manufacturing
process. After exceeding a minimal value, cycle times will tend to
increase again, because lots will increasingly have to wait directly at the
manufacturing unit where a larger and previously scheduled lot is being
processed for a longer period of time.
The production flow depends on various factors, e.g., lot size at various
manufacturing levels, production sequences, as well as the choice of
constructive variants and alternatives in conjunction with work flow,
plans and schedules. Even with the largest available computers today it
is still impossible to master a simultaneous optimization. During the
course of several decades a sequence of the modules established itself
that was considered practical in many respects, but not always optimal.
It is based on the following considerations.
117
10.1.3 Material Requirements Planning/MRP I
The demand for final products (derived from order entry, sales planning
or primary demand planning) must be broken down (“bill of materials
explosion”) into its components (secondary demand).
It is organized as a building block parts list, i.e. one recognizes (in the
shape of the dashed rectangles) from which subordinate parts each
respective supra-ordinate part is assembled. The application system,
e.g., determines that per passenger car five wheels are needed,
including the spare. The assembly team “wheel” would subdivide this
again into one rim, one tire and four clamping bolts, etc. In that way one
would calculate first the gross requirements of the assembly teams and
the component parts. The application system examines also whether or
not cost-effective bulk order may be placed through bundling of
demands for different future time period. In several industries, e.g.,
aluminum, glass, optics, paper and textile, we may specify through
rather complicated mathematical procedures how parts (e.g., paper
webs) will have to be cut out of larger raw material units (e.g., paper
master rolls) such that waste is minimized. During such materials
demand planning the transition to the subsequent time scheduling is
implemented in that the system considers the associated lead time. This
is the time span by which the sub-ordinate component has to be
available earlier than the supra-ordinate component such that the
subsequently requisitioned parts may be assembled in a timely fashion.
The results of the procedure are roughly planned work, manufacturing or
production orders, respectively, or (with external procurement)
requirements to be transferred to order scheduling.
10.1.4 Throughput Scheduling
Whereas volume planning determined availability scheduling, i.e. those
points in time at which a part is to be delivered, through forward-shifting,
throughput scheduling has to generate the starting dates of the
individual work processes.
118
Figure 10.1 Throughput Scheduling
A method for this is backward scheduling that calculates from the
delivery deadline found in material requirements planning toward the
present. An example in figure 5.5 is the work order M is assembly
requiring the finished products of the work orders A, B and C. One
should note that in this phase waiting periods, as they tend to come
about through capacity bottlenecks, are not considered. In other words:
We work here with the simplified assumption “capacity is infinite”. With
other, more complicated and computation-intensive methods this
simplification is not applied, as they conduct simultaneous scheduling
and capacity planning.
Particularities occur when the applications system determines that a
work process should have started several days or weeks ago “prior to
the present” (sometimes students gain such knowledge as well during
the manufacture of the product “examination”!). In order to avoid revising
the hitherto production planning because of the later delivery date, the
application system will attempt to shorten the throughput time in
comparison to the planned values. For examples, it may test whether
several machines are available for a work process and then split a lot
onto two or more manufacturing resources that then “divide” the work
among themselves. The system then has to determine through the use
of parameters defined by manufacturing management the trade-off
between lead-time reduction and the additional expenses for setting up a
second, third, etc. machine.
119
10.1.5 Capacity Balancing
If in the throughput scheduling no attention had been paid to capacities,
it may occur that in individual periods certain work places are heavily
overloaded whereas others are underutilized.
120
check for actual production. For example, all work orders are selected
that have to start within the time span “clearance day + ten working
days” according to throughput scheduling.
121
Some firms do not issue such documents; instead employees identify on
their screens what they should produce and how (“paperless factor”).
122
to register the quantity of the manufactured granulated material at a
weighing station that is coupled to a computer.
On the other hand it is important to examine, especially with machine
data and process data logging, the flood of largerly automatically
received data for their correctness and plausibility. This is necessary
since, similar to the order entry, process data logging is an important
entry point to integrated information systems. Consequently, errors
occurring during the data capture may easily trigger numerous
erroneous after-effects.
10.2 FINANCE
In comparison to other areas we find relatively few administration and
scheduling systems in the finance area (excluding accounting). An
important, although difficult task, is the finance and liquidity scheduling.
Here we are concerned with predicting the likely revenues and outlays
and, depending on the accounting balance, deciding about use of
available funds or about getting a short term loan. Especially
international firms utilize a cash management system for this purpose.
123
Above all it is the duty of the computer to predict the extends and dates
of payments. In integrated information systems we may draw, e.g., upon
the following data: sales plan, goods on order, account receivable,
accounts payable, purchase commitments, costs projections, regularly
recurring payments (e.g., wage and salary payments or rents) and
investment plans.
Preliminary Costing
For preliminary costing three data groups are at out disposal within an
integrated concept:
124
Post Costing Analysis
The post costing analysis program also uses many data from the
production area. Data pertaining to material movement and time tickets
or wage slips (delivered from the production data entry and pay
accounting in machine-readable form) generate the direct costs that are
posted to the cost object accounts. As far as one wants to consider
indirect costs, if at all, this occurs through adding overhead charges to
the direct costs and by costing the usage times registered by the
production data entry system (e.g., via machine hourly rates).
125
even the input of booking procedures that still need to be handled
manually has been streamlined, for example in that the accountant is
being guided from posting to posting and thus is being made aware of
any erroneous entries right away.
A Practical Example
The employee carries a machine-readable company identification card
that features a magnetic strip or even a chip. This will be entered into a
card reader when he/she arrives for work and when he/she leaves. The
electronic system reads the individual’s identification number and stores
it with the correct time. At the same time the system checks the arrives-
leaves cycle and makes the employee aware of any discrepancies. The
126
latter may be the case, e.g., when the employee forgot to enter his
“leaves’” data to the information system the prior evening. At the same
time it is possible to display to the employee the accumulated total work
time during a given month, as well as the target/actual comparison.
Strategic information
All organizations plan their strategy according to their needs and
requirements. The strategic information refers to what an organization
wants to achieve in the short or long term. The following is the input to
formulate the strategic information of an organization:
External input: Macroeconomic environment, what competitors are
doing, change in government policies, etc.
127
Internal input: Company vision and mission, top management input,
audits and feedback, learning from the past, future challenges, etc.
Collating all this input helps an organization plans its strategy. These
strategies have no meaning at all if they are not properly supported by
means to achieve them. This is actually tactical information which is
nothing more than the enablers to actually implement the strategies.
Tactical information
An organization needs to do a necessary and sufficiency check for this
tactical information. The necessary and sufficiency check actually helps
an organization to establish that the tactical information is actually
necessary and sufficient for implementation of a strategy.
The basic difference between strategic and tactical information can be
explained with a simple example of a steel making company.
The steel making company produces different grades of steel at the
lowest cost and is a benchmark in the industry. The company wants to
sustain the identity of being the lowest cost producer of steel for the long
term. So this particular objective of the company should be termed as
strategic information as it qualifies as a long-term goal of the company.
Now the company analyzes that it can achieve its target of being the
lowest cost producer only if it is able to secure a long-term supply of
cheaper raw materials. The long-term supply of cheaper raw materials
can, in turn, only be ensured if the company has its’ own source of raw
128
materials and it is not dependent on other suppliers. The raw material for
the steel company is iron ore, coal, and limestone. All these are natural
resources available in the Earth’s crust. Therefore, the company decides
to acquire new mines so that raw material security can be ensured in the
future. This, in turn, supports its strategy of lowest cost producer of steel.
Therefore it can be termed as tactical information.
Characteristics of DSS
• DSS offer users flexibility, adaptability, and a quick response.
• DSS allow users to initiate and control the input and output.
129
• DSS operate with little or no assistance from professional
• programmers.
• DSS provide support for decisions and problems whose solutions
• cannot be specified in advance.
• DSS use sophisticated analysis and modeling tools.
130
Figure 10.6 Executive Support Systems
LET US SUM UP
In this unit we have discussed the application of information system in
business. The production function includes CIM, MRPI, MRPII,
throughout scheduling, capacity balancing, availability check, order
clearance, job shop scheduling, CAM. Computer Aided quality
Assurance and production data entry. The finance function includes cost
center accounting, product cost accounting, supplier accounts auditing,
accounts receivable and accounts payable. Work schedule
management, payroll accounting, reporting program and employee’s
tasks assignments are some of the Human resource functions.
131
4.To find a machining sequence for the orders is called____________
GLOSSARY
132
and acquiring customers.
SUGGESTED READINGS
1. Bentley Trevor J (1986) Management Information Systems &
data processing, 2nd edition, Holt, Rinehart and Winston
publications, University of California. ISBN 0039106888,
9780039106881.
2. Donald W. Kroeber (1986) Computer-Based Information
Systems: A Management Approach, Subsequent
edition, Macmillan Publications, University of Virginia. ISBN
0023668407, 9780023668401.
3. Gordon B.Davis (2013) Management Information Systems, 1 st
Edition, TMH Publications, India. ISBN 007066241X.
4. Joel E. Ross (1970) Management by Information System,
illustrated edition, Prentice-Hall publications, University of
Wisconsin,ISBN 0135486289, 9780135486283.
5. Kenneth C. Loudon & Jane P. Loudon (2014) Management
Information Systems, 13th Edition, Pearson Publications, USA.
1) a 2) a 3) c 4)a 5) b
133
BLOCK 4
134
Unit 11
Overview
Learning Objectives
Let Us Sum Up
Glossary
Suggested Readings
OVERVIEW
Information system planning is part of business planning concerned with
deploying firm’s information systems resources, including people,
hardware and software. In the eighties the system was developed with
the assumption that information needs do not change often. But the late
nineties have seen the revolutions in information technology.
LEARNING OBJECTIVES
After reading this unit, you should be able to,
• discuss the challenges in information system planning
• explain Planning of Information system.
135
Information Systems Planning should be an integral part of business
planning. Business Planning is the process of identifying the firm’s goals,
objectives and priorities, and developing action plans for the
accomplishing those goals and objectives. Information systems planning
is the part of business planning concerned with the deploying the firm’s
information systems resources, including people, hardware, and
software. The goals, objectives, and priorities of the business should
drive all the plans. Furthermore, although each plan is produced by
specialists in a particular department, all the plans should support the
same strategy and goals. From this viewpoint, the unique aspect is that
it concentrates on Information System projects.
Needs and Objectives
• To ensure that Information System both complements and assists in
the achievement of our business goals.
• To ensure that the use of scarce resources are maximized within a
business.
• To maximize the benefits of changing technology.
• To take account of the different viewpoints of business
professionals and IT professionals
Many prescriptions for project planning call for starting with a search for
problems needing solutions. By the time a company is ready to do
project planning, it is far too late to search for problems needing
solutions. In fact, we already have that at hand- it evolved from business
objectives to MIS objectives, from business strategic plans to MIS
strategic plans, from business operating plans to MIS operating plans.
We know that project we are working on and what the general needs
and objectives are. We now need to refine these statements of need.
The statement of general needs and objectives is almost always too high
level and vague to be implemented. The process of refining these vague
requirements is crucial factor in project success. These key steps should
be taken:
1. The problem statement must be made comprehensible to those who
will design and implement the MIS. For example, the management need
may be for an in-depth market analysis. The computer specialists may
have no idea what all that includes; hence the importance of breaking
down the idea “market analysis” to include and define “competition”,
“market share”, “distribution channels”, “sales force size”, and so on. In
other words, first determine the user’s needs in specific terms.
2. Input. From the user’s perspective, what items can the user
reasonably are expected to provide? Human-to-machine interface may
136
be important, and if it is, these requirements need to be detailed during
this phase. For example, if a clerk will be the user, very clear messages
prompting for input are required.
3. How the system will work should be specified only in very general
terms at this time. In fact, the designers should concentrate on “what”
the system should do and leave as implementation details as reasonable
to the specialists who will actually produce the MIS. For example, a
permanent payroll record may be a valid need or objective. But the
internal format in which the file is maintained is probably a too much
detail for this phase of design.
4. Output. If the user has expectations about, or requirement for, the
results of the system, those need to be detailed. For example, sample
user reports should be drawn up to this stage and taken for the future
users for approval.
137
which is often considered a major factor in American Airlines competitive
success. That system was not initially designed as a major competitive
strategy. Rather, it evolved through four distinct stages over 30 years. It
began in the early 1960s as a response to American Airlines inability to
use manual methods to monitor its inventory of available seats. Although
a technical achievement for the time, it was a far cry for the powerful
system later accused of presenting biased displays to travel agents so
they would see and select American Airlines flights for their clients. The
point of the example is that it is usually difficult to forese e the way
information system innovations will develop. As with many complex
products, users typically identify new uses and possible improvements
that the inventor never imagined. Consequently, Information System
plans should be reviewed periodically and systems should be designed
to be flexible and extendable.
Difficulty in Assuring Consistency with Organizational Plans and
Objectives
A fundamental problem with Information System planning is that
individual departments within companies have their own priorities and
business practices and often have difficulty working toward a mutually
beneficial plan. This issue is especially significant if a large organization
attempts to develop an information architecture and infrastructure that
spans departmental boundaries. Even if mutual benefits seem likely, the
process of developing the plans takes a lot of time and effort, and the
rewards may be distributed unevenly.
138
may lag in productivity, flexibility, or security. Participants can cause
problems due to anything from inattention to criminality. The information
in the system can cause problems due to anything from occasional
inaccuracy to fraud. Furthermore, the technology can impede or stop the
business process by degrading or failing. Each of these problems can be
planned, but at the cost of more effort, more attention, more expense,
and less flexibility.
LET US SUM UP
Information system planning is an integral part of business planning. It
can be carried out in two ways. They are top-down planning and bottom-
up planning. Attaining a genuine dialogue is important because the
business professionals and the IT professionals each bring knowledge
and understanding essential for system success. Many IT professionals
have worked on different types of information systems and may be able
to suggest approaches the business professionals would not have
imagined.
139
a) Bottom-up planning b) Top-Down Planning
a)Planning b) Organizing
c) Controlling d) Staffing
4. A medium for transporting output of a system to the input to another
system is_____________
GLOSSARY
140
which are then addressed in
phases. As the name indicates, top-
down planning is an approach that
aims at moving gradually from
the top to the lower levels of a given
hierarchy.
SUGGESTED READINGS
1. Bentley Trevor J (1986) Management Information Systems &
data processing, 2nd edition, Holt, Rinehart and Winston
publications, University of California. ISBN 0039106888,
9780039106881.
2. Donald W. Kroeber (1986) Computer-Based Information
Systems: A Management Approach, Subsequent
edition, Macmillan Publications, University of Virginia. ISBN
0023668407, 9780023668401.
3. Gordon B.Davis (2013) Management Information Systems, 1 st
Edition, TMH Publications, India. ISBN 007066241X.
4. Joel E. Ross (1970) Management by Information System,
illustrated edition, Prentice-Hall publications, University of
Wisconsin,ISBN 0135486289, 9780135486283.
5. Kenneth C. Loudon & Jane P. Loudon (2014) Management
Information Systems, 13th Edition, Pearson Publications, USA.
1) b 2) a 3) a 4)b 5)d
141
Unit 12
DEVELOPMENT OF INFORMATION
SYSTEM
STRUCTURE
Overview
Learning Objectives
Let Us Sum Up
Suggested Readings
OVERVIEW
Information system planning is part of business planning concerned with
deploying firm’s information systems resources, including people,
hardware and software. The late nineties have seen the revolutions in
information technology. The system analyst has now to play the role of
business analyst, technology expert and consultant, giving a solution to
the business needs of information requirement.
LEARNING OBJECTIVES
142
System Objective
It is necessary to define the system objectives. Many a times, it is
observed that the systems are historically in operation and have lost
their main purpose of achievement of the objectives. The users of the
system and the personnel involved are not in a position to define the
objectives. Since you are going to develop a computer based system, it
is necessary to redefine or reset the objectives as a reference point in
the context of current business requirement.
System Boundaries
It is necessary to establish the system boundaries which would define
the scope and the coverage of the system. This helps to sort out and
understand the functional boundaries of the system, the department
boundaries in the system, and the people involved in the system. It also
helps to identify the inputs and the outputs of the various subsystems,
covering the entire systems.
System Importance
It is necessary to understand the importance of the system in the
organization. This would throw more light on its utility and would help the
designer to decide the design features of the system. It would be
possible then to position the system in relation to the other systems for
deciding the design strategy and development.
Nature of the System
The analysis of the system will help the system designer to conclude
whether the system is a closed type or an open, and a deterministic or a
probabilistic. Such an understanding of the system is necessary, prior to
design the process to ensure the necessary designing architecture.
Role of the System as an Interface
The system, many a times, acts as an interface to other systems. Hence
through such an interface, it activates or promotes some changes in the
other systems. It is necessary to understand the existing role of the
system, as an interface, to safeguard the interests of the other systems.
Any modifications or changes made should not affect the functioning or
the objectives of the other systems.
Participation of the Users
The strategic purpose of the analysis of the system is to seek the
acceptance of the people to a new development. System analysis
process provides a sense of participation of the people. This helps in
breaking the resistance to the new development and it also ensures the
commitment of the new system.
143
Understanding of Resource Needs
The analysis of systems helps in defining the resource requirements in
terms of hardware and software. Hence, if any additional resources are
required, this would mean an investment. The management likes to
evaluate the investment from the point of view of return on such
investments. If the return on the investment is not attractive, the
management may drop the project.
Assessment of Feasibility
The analysis of the system helps to establish the feasibility from different
angles. The system should satisfy the technical, economic and
operational feasibility. Many times, the systems are feasible from the
technical and economic point of view; but they may be infeasible from
the operational point of view. The assessment of feasibility will save the
investment and the system designer’s time. It would also save the
embarrassment to the system designer as he is viewed as the key figure
in such projects.
12.2 PROCEDURE OF ANALYSING EXISTING SYSTEM
When the objectives of information system are finalized, as the first step
towards development, it is necessary to analyze the existing system.
The step-by step procedure for analyzing existing system is given below
1.Carry out the analysis of the system at a place where the system is
functioning. This step will ensure that the analyst is accepted as one of
those operating the system.
2.Note down the key personnel in the system besides the head of the
department. The key personnel are those who contribute towards the
system operations.
3.Spend some time with the operating personnel and observe the
system to understand the finer details of the system.
144
4.Define the scope of the system and its objective. The scope will cover
the boundaries of the system. Further, one should identify the problems
faced in the system which cause difficulties in achieving the objective.
5.Collect all the documents which are raised in the system. These
documents carry data from one point to another. The documents could
be printed or handwritten. While collecting the documents, the analyst
should note down that raises the document, the purpose it achieves, and
the manner in which it is distributed.
6.Collect separately outputs such as the statements, reports, memos,
etc. made in the system to throw more light on the information it
generates. If these reports and the statements are sent to other
departments, make note of it. Also find out if any register or notebook is
maintained at previous points, which act as data storage and reference.
Note down against each such document, its use.
7.Make a list of rules, formulae, guidelines, policies, etc. which are used
in running the system.
8.Note down the check points and the controls used in the system to
ensure the data flow is complete, processing of the data is correct and
the analysis is precise.
9.Study the flow of data in the system in units, summary and aggregates
from document to document and from one stage to the other.
10.Make a small system note as a base document and seek an
appointment with each head of the department to discuss the system. In
the discussion, ensure that your system view and understanding is the
same as that of the head of the department. Ascertain from him whether
he has any other objectives which the system should achieve.
145
14.Draw a revised system flowchart to indicate how the system runs the
major steps of processing the information. This chart should include all
the modifications which had been suggested and accepted.
15.Discuss the flowchart with the personnel operating the system so that
they understand the system. Impress upon them that they should run the
system as per the flowchart, and resist any deviations there from that
would cause a disturbance in the system. Explain the modified system in
such a way that the user would appreciate the changes.
16.Make a list of outputs containing information. Get the contents of the
reports approved by the head of the department.
17.Analyze the requirements of the information and reports from the
utility point of view. More the information, higher is the cost of
generation. Decide the utility based on the value of the information.
18.Compare the cost of the old and the new system, and benefit offered.
19.Obtain approval of the new system from the users and top
management.
20. Write a system manual for use of the people in the department and
for reference to the other users of the system.
Requirement Analysis
Requirement Definition
System Design
Input Design
Process Design
Output Design
System development
Developing
Unit Testing
System Testing
Implementation
146
Maintenance
The requirement analysis is carried out from the top downwards in the
organization hierarchy, linking the goals and the objectives of the
business organization, with the strategy mix decide to achieve them. In
this phase the information needs of the individuals, groups and functions
are analyzed from a decision making or a support point of view. Such
information needs would fully satisfy the operational and management
information needs. Once the needs are justified, the next step is to
define those clearer terms for the purpose of development. The
requirement definition brings clarity in the content and its application in
various ways.
The third step is to design a physical and a logical system through which
the outputs are designed. The processes which would give the outputs
are determined, and the data which would be required by these
processes is finalized in terms of definition, source, and quality. And
further, the collection, creation, validation, and storage of the input data
is also decided.
The fourth step is to break the system design into modules in the
hierarchical top-down structure to facilitate the development efforts as
well as its implementation.
Once the modules are developed, the unit testing is carried out to
confirm data transaction and outputs validity and accuracy. In testing,
the transaction level processes are checked to confirm the input-
process-output relation, and the data storage and the transaction level
updating.
When the unit testing is over and the module level processing is
confirmed, the modules are put together to generate the information as
determined in the requirement definition. The process of putting the
modules together is a process of integration. It is intended to produce
the results of data integration.
The system so developed is tested as a whole for several aspects such
as information, quality, performance, utility, user acceptance and so on.
Once the system testing is complete, the system is implemented at site,
on the hardware and software platform. The implementation step has its
own procedure starting from the installation of the hardware and the
software, training the users, and then shifting to a fully designed system.
While implementing the system some minor modifications, may be
required for ease of acceptance of the user.
Even after complete installation, the system may require modifications or
changes in terms of functions and features over a period of time. The
process of introducing these new requirements without disturbing the
147
time tested basic system is called maintenance. Such changes are
required swiftly and hence they are required to be carried out very
easily. The system is designed keeping this natural requirement in post
implementation period.
A good system design and its implementation has high user acceptance
because it helps solve the problems in business performance, and
meets the information needs, within a sensible time scale, with an
assured quality and security of information.
Activity
Assume you have been asked to develop an information system for
processing the result of your class. Which method would you prefer for
developing such a system? Also conduct a feasibility study and prepare
a feasibility report
12.4 COMPUTER SYSTEM DESIGN
After analyzing the system by way of structured analysis, the next task of
the designer is to design a computer system. The computer system
design consists of five major steps, viz., designing the output, the input,
the processing, the data specifications, and the procedure specifications.
Output Design
The output should be able to communicate information to the users in
the organization effectively. The information, as an output, can be
printed, displayed or stored. If it is necessary to print the information, as
a report, then the designer has to decide the format of the report. If it is
to be displayed, then the designer has to provide a screen format.
The output design requires determining the reports, the screens, the
contents of the reports and the screen, and the layout of the contents.
While designing the report and the screen formats, the designer should
pay attention to the concepts of information presentation so that the
utility of the system is not reduced because of a noise, an information
overload, an incomplete coverage, an inadequate references, etc. The
attention should also be given to the security of information through
access control. The designer should decide an appropriate balance
between the print reports and the display screens. The layout of the
report, whether it is printed or displayed, must satisfy some basic
features. Each report should have an appropriate title with a period
reference, date of processing and a system title. The pages should
number, with the title repeated and at the end of the processing it should
provide the statistics such as number of records, items, etc.
The layout should be such that the readability will be from left to right
and from top to bottom. Each column and row should have meaningful
titles. The layout should provide sub-totals and grand totals with the
148
reference to the unit such as class, group or family. It should provide
suitable blank spaces to enhance readability. If any abbreviations are
used, the expanded forms should be given alongside. As far as possible,
the abbreviations should be universal and common to all reports to avoid
confusion. A good layout improves the utility of the information reports
by highlighting the areas of concern where the attention of the
management and its response is required immediately.
In many cases, the design of pre-printed forms is an easy solution for a
good layout .The use of the pre-printed stationary saves the printing time
and enforces standardization in the information layout. With the use of
the pre-printed stationary, the main user can blank out certain columns
and rows, or certain results to avoid an exposure to the unwanted users.
This saves the duplicate printing and the additional programming effort
required for it.
Input design
In this phase, the designer’s task is to identify those data items that will
be an input to the system. The designer finds a linkage to the input data
from the output. Once the data items are identified, it is necessary to find
the documents from where these data will be taken. A document
containing several data items will be treated as a record in the system.
To obtain the sales information, the system must consider the Order
Acceptance, the Invoice and the Debit Note records containing the
related data items.
The guidelines for selecting the data item from the document and
grouping them into a record are as follows:
1. Only the data items which have a current and a prospective use
should be included; the others should be ignored.
2. The data items from a document should be a grouped together and
arranged in logical order of its use in processing. For example, a
document number or a product code should be at the beginning of the
record.
3. The grouping of the data items should be in line with its application
and not in line with their placement in the report format. For example, the
invoice amount, the discount, the taxes, etc. should be grouped
together.
149
Process Design
After the output and the input design, the designer has to develop a
process design which will specify the various steps that will convert input
data into outputs.
The process design deals with the following two types of processes, viz.,
computing and decision making.
Quantity*Rate = Amount
Process - A.
If the customer is of a type ‘Distributor’, then follow the invoice
process - B.
If the customer is of a type ‘OEM’ then follow the invoice process—C,
and so on.
As a part of the process design, the designer has to decide the source of
the data items, viz., the documents and the files will be used for storage
of the record and for retrieval, their organization becomes an important
factor. The designer classifies the files as master file(s) and transaction
files and also decides their use in the system in a logical sequence. The
files can be organized in a number of ways. The organization of the files
relates to the storage of data items and its recording layout on the
magnetic media.
The files can be organized either in random ordered fashion or in
indexed sequential fashion. Each file organization has its own
advantages related to access and processing. A data processing
situation dictates the type of the organization. In database environment,
data and records are arranged in a table form.
12.5 DATA SPECIFICATIONS
Having identified data items at atomic level and configuring them into a
set to form a record of an input entity, it is necessary to design
specifications for each data item. These specifications of the items will
be followed uniformly at all places wherever they are used. The
specification is expressed in terms of length of an item in terms of
characters, its nature in terms of numeric or alpha numeric known as
150
picture. A data item have some value and hence it would have some
conditions and validity.
For example, date is an item having eight characters, presented in
numeric value with two spaces after date and two spaces after month,
followed by a year mentioned in four numeric characters. The data will
not have null value and has no upper value. The order of data
presentation is day, month and year.
The specifications are used for error checking, control and processing. A
data item before it is accepted as an input is checked against
specifications. If there is a violation, it is corrected through a formal
process of editing before acceptance.
Procedure Design
This phase specifies how the computer system will function from data
entry to the output stage. The procedure indicates the logic of data
processing and the flow of system control from one step to the other.
Since the process design is complete, each process will be a step in the
procedure design of the computer system. Each of such processes will
be implemented through a computer program.
The procedure design steps will be shown in the computer system
flowchart. In all the system design procedures, there are broad steps
which are required to complete the design procedure.
A flow chart of the system using all the specifications of process design
and procedure design guides the designer, the analyst and the
programmer in developing the system. It provides a logical overview of
the system. The guidelines for drawing the system flow chart are as
under:
1. Identify the start and the end of the system.
2. Identify the inputs, in terms of the data and the documents entering
in the system, in their logical order. Determine the transaction and the
master files in the system.
3. Identify the output at each stage and decide the media for
processing and storage.
LET US SUM UP
System analysis plays a vital role in the development of information
systems. The major activities in system analysis and design are
requirement analysis, requirement definition, system design, system
development, unit testing system testing, implementation and
maintenance.
151
CHECK YOUR PROGRESS
1. _________ Specifies the various steps that will convert input data into
outputs.
GLOSSARY
152
Data Specifications : In computing, a data definition
specification (DDS) is a guideline to
ensure comprehensive and
consistent data definition. A
comprehensive data definition
specification encompasses
enterprise data the hierarchy
of data management, prescribed
guidance enforcement and criteria
to determine compliance.
153
components of software are tested.
The purpose is to validate that each
unit of the software code performs
as expected. Unit Testing is done
during the development (coding
phase) of an application by the
developers
SUGGESTED READINGS
1. Bentley Trevor J (1986) Management Information Systems &
data processing, 2nd edition, Holt, Rinehart and Winston
publications, University of California. ISBN 0039106888,
9780039106881.
2. Donald W. Kroeber (1986) Computer-Based Information
Systems: A Management Approach, Subsequent
edition, Macmillan Publications, University of Virginia. ISBN
0023668407, 9780023668401.
3. Gordon B.Davis (2013) Management Information Systems, 1 st
Edition, TMH Publications, India. ISBN 007066241X.
4. Joel E. Ross (1970) Management by Information System,
illustrated edition, Prentice-Hall publications, University of
Wisconsin,ISBN 0135486289, 9780135486283.
5. Kenneth C. Loudon & Jane P. Loudon (2014) Management
Information Systems, 13th Edition, Pearson Publications, USA.
1) c 2) c 3) c 4) a 5)a
154
Unit 13
OVERVIEW OF ALTERNATIVE
APPLICATION
STRUCTURE
Overview
Learning Objectives
13.2 Prototyping
Let Us Sum Up
Check Your Progress
Glossary
Suggested Readings
(3) Design,
(4) Programming,
155
(6) Post implementation. Figure below illustrates these stages. Each
stage consists of basic activities that must be performed before the next
stage can begin. The lifecycle methodology has a very formal
division of labour between end users and information systems
specialists. Technical specialists such as systems analysts and
programmers are responsible for much of the systems analysis, design,
and implementation work; end users are limited to providing information
requirements and reviewing the technical staff’s work.
156
The design stage produces the design specifications for the solution.
The lifecycle emphasizes formal specifications and paperwork, so many
design documents are generated during this stage. The programming
stage translates the design specifications produced during the design
into software program code. Systems analysts work with programmers
to prepare specifications for each program in the system.
The installation stage consists of the final steps to put the new or
modified system into operation: testing, training, and conversion. The
post implementation stage consists of using and evaluating the systems
after it is installed and is in production. Users and technical specialists
will go through a formal post implementation audit that determines how
well the new system has met its original objectives and whether any
revisions or modifications are required. After the system has been fine-
tuned it will need to be maintained while it is in production to correct
errors, meet requirements, or improve processing efficiency. Over time,
the system may require so much maintenance to remain efficient and
meet user objectives that it will come to the end of its useful life span.
Once the system’s lifecycle comes to an end, a completely new system
is called for and the lifecycle may begin again.
13.2 PROTOTYPING
Prototyping consists of building an experimental system rapidly and
inexpensively for end users to evaluate. By interacting with the
prototype, users can get a better idea of their information requirements.
The prototype endorsed by the users can be used as a template to
create the final system.
The prototype is a working version of an information system or part of
the system, but it is meant to be only a preliminary model. Once
157
operational, the prototype will be further refined until it conforms
precisely to users’ requirements. Once the design has been finalized,
the prototype can be converted to a polished production system.
The process of building a preliminary design, trying it out, refining it, and
trying again has been called an iterative process of systems
development because the steps required to build a system can be
repeated over and over again. Prototyping is more explicitly iterative
than the conventional lifecycle, and it actively promotes system design
changes. It has been said that prototyping replaces unplanned rework
with planned iteration, with each version more accurately reflecting
users’ requirements.
Steps in Prototyping
Below figure shows a four-step model of the prototyping process, which
consists of the following:
158
Step 3: Use the prototype. The user is encouraged to work with the
system in order to determine how well the prototype meets his or her
needs and to make suggestions for improving the prototype.
Step 4: Revise and enhance the prototype. The system builder notes all
changes the user requests and refines the prototype accordingly. After
the prototype has been revised, the cycle returns to Step 3. Step 3 and 4
are repeated until the user is satisfied.
When no more iterations required, the approval prototype then becomes
an operational prototype that furnishes the final specifications for the
application. Sometimes the prototype itself is adopted as the production
version of the system.
LET US SUM UP
The traditional systems life-cycle--the oldest method for building
systems--breaks the development of an information system into six
formal stages:
(1) Project definition, (2) systems study, (3) design, (4) Programming, (5)
installation, and (6) post implementation. The stages must proceed
sequentially and have defined outputs; each requires formal approval
before the next stage can commence. The system lifecycle is useful for
large projects that need formal specifications and tight management
control over each stage of system-building. However, this approach is
very rigid and costly and is not well suited for unstructured, decision-
159
oriented applications where requirements cannot be immediately
visualized.
Prototyping consists of building an experimental system rapidly and
inexpensively for end users to interact with and evaluate. The prototype
is refined and enhanced until users are satisfied that it includes all of
their requirements and can be used as a template to create the final
system. Prototyping encourages end-user involvement in systems
development and iteration of design until specifications are captured
accurately. The rapid creation of prototypes can result in systems that
have not been completely tested or documented or that are technically
inadequate for a production environment.
a) Installation b) Programming
a) Installation b) Programming
a) Installation b) Programming
a) Installation b) Programming
solution
a) Installation b) Programming
160
GLOSSARY
161
Programming : Programming is the process of
creating a set of instructions that
tell a computer how to perform a
task. Programming can be done
using a variety of
computer programming languages,
such as JavaScript, Python, and
C++.
SUGGESTED READINGS
1. Bentley Trevor J (1986) Management Information Systems &
data processing, 2nd edition, Holt, Rinehart and Winston
publications, University of California. ISBN 0039106888,
9780039106881.
2. Donald W. Kroeber (1986) Computer-Based Information
Systems: A Management Approach, Subsequent
edition, Macmillan Publications, University of Virginia. ISBN
0023668407, 9780023668401.
3. Gordon B.Davis (2013) Management Information Systems, 1 st
Edition, TMH Publications, India. ISBN 007066241X.
4. Joel E. Ross (1970) Management by Information System,
illustrated edition, Prentice-Hall publications, University of
Wisconsin,ISBN 0135486289, 9780135486283.
5. Kenneth C. Loudon & Jane P. Loudon (2014) Management
Information Systems, 13th Edition, Pearson Publications, USA.
1) a 2) c 3) b 4)d 5)d
162
Unit 14
ALTERNATIVE APPLICATION
DEVELOPMENT APPROACH
STRUCTURE
Overview
Learning Objectives
14.3 Outsourcing
Let Us Sum Up
Glossary
Suggested Readings
Answers to check your progress
OVERVIEW
Systems differ in terms of their size and technological complexity, and in
terms of the organizational problems they are meant to solve. Because
there are different kinds of systems, a number of methods have been
developed to build systems. This unit describes these alternative
methods: the traditional systems, prototyping, application software
packages, end-user development, and outsourcing.
LEARNING OBJECTIVES
163
If a software package can fulfill most of an organization’s requirements,
the company does not have to write its own software. The company can
save time and money by using the prewritten, predesigned, pretested
software programs from the package. Package vendors supply much of
the ongoing maintenance and support for the system, providing
enhancements to keep the system in line with ongoing technical and
business developments.
If an organization has unique requirements that the package does not
address, many packages include capabilities for customization.
Customization features, allow a software package to be modified to meet
an organization’s unique requirements without destroying the imaginary
of the packaged software. If a great deal of customization is required,
additional programming and customization work may become so
expensive and time consuming that they eliminate many of the
advantages of software packages. The initial purchase price of the
package can be deceptive because of these hidden implementation
costs.
164
access data, create reports, and develop entire information systems on
their own, with little or no help from professional systems analysts or
programmers. Many of these end-user developed systems can be
created much more rapidly than with the traditional systems, lifecycle.
Below figure illustrates the concept of end-user development.
165
traditional information systems department. When users create their own
applications and files, it becomes increasingly difficult to determine
where data are located and to ensure that the same piece of information
is used consistently throughout the organization.
14.3 OUTSOURCING
If a firm does not want to use its internal resources to build or operate
information systems, it can hire an external organization that specializes
in providing these services to do the work. The process of turning over
an organization’s computer center operations, telecommunications
networks, or applications development to external vendors is called
outsourcing. Subscribing companies use the software and computer
hardware provided by the application service provider as the technical
platform for their system. In another form of outsourcing, a company
hires an external vendor to design and create the software for its
system, but that company would operate the system on its own
computer. The Window on Management describes how one start-up
company benefited from outsourcing its Web site.
Outsourcing has become popular because some organizations perceive
it as more cost-effective than maintaining their own computer center or
information systems staff. The provider of outsourcing services benefits
from economies of scale (the same knowledge, skills, and capacity can
be shared with many different customers) and is likely to charge
competitive prices for information systems services. Outsourcing allows
166
a company with fluctuating needs for computer processing to pay for
only what it uses rather than to build its own computer, center, which
would be underutilized when there is no peak load. Some firms
outsource because their internal information systems staff cannot keep
pace with technological change or innovative business practices or
because they want to free up scarce and costly talent for activities with
higher payback.
Not all organizations benefit from outsourcing, and the disadvantages of
outsourcing can create serious problems for organizations if they are not
well understood and managed. When a firm allocates the responsibility
for developing and operating its information systems to another
organization. It loses control over its information systems function. If the
organization lacks the expertise to negotiate a sound contract, the firm’s
dependency on the vendor could result in high costs or loss of control
over technological direction. Firms should be especially cautious when
using an outsourcer to develop or to operate applications that give it
some type of competitive advantage.
Activity
Some have said that the best way to reduce system development costs
is to use application software packages. Do you agree? Why or why
not?
LET US SUM UP
Developing an information system using an application software
package eliminates the need for writing software programs when
developing an information system. Using a software package cuts down
on the amount of design, testing, installation, and maintenance work
required to build a system. Application software packages are helpful if a
firm does not have the internal information systems staff or financial
resources to custom-develop a system. To meet an organization’s
unique requirements, package may require extensive modifications that
can substantially raise development costs.
End-user development is the development of information systems by
end users, either alone or with minimal assistance from information
systems specialists. End-users developed systems can be created
rapidly and informally using fourth-generation software tools. The
primary benefits of end-user development are improved requirements
determination, reduced application backlog, and increased end-user
participation in, and control of, the systems development process.
However, end-user development, in conjunction with distributed
167
computing, has introduced new organizational risks by propagating
information systems and data resources that do not necessarily meet
quality assurance standards and that are not easily controlled by
traditional means.
Outsourcing consists of using an external vendor to build (or operate) a
firm’s information systems. The work is done by the organization’s
internal information systems staff. Outsourcing can save application
development costs or allow firms to develop applications without an
internal information systems staff. However, firms risk losing over their
information systems and becoming too dependent on external vendors.
and technical specialists to supply end users with tools, training, and
expert advice.
168
GLOSSARY
169
establish a connection to a
computer. During logon
procedures, two requests are made
from the individual trying to gain
access: a preauthorized account
(or user) name and a preset
password
SUGGESTED READINGS
1. Bentley Trevor J (1986) Management Information Systems &
data processing, 2nd edition, Holt, Rinehart and Winston
publications, University of California. ISBN 0039106888,
9780039106881.
2. Donald W. Kroeber (1986) Computer-Based Information
Systems: A Management Approach, Subsequent
edition, Macmillan Publications, University of Virginia. ISBN
0023668407, 9780023668401.
3. Gordon B.Davis (2013) Management Information Systems, 1 st
Edition, TMH Publications, India. ISBN 007066241X.
4. Joel E. Ross (1970) Management by Information System,
illustrated edition, Prentice-Hall publications, University of
Wisconsin,ISBN 0135486289, 9780135486283.
5. Kenneth C. Loudon & Jane P. Loudon (2014) Management
Information Systems, 13th Edition, Pearson Publications, USA.
1) a 2) a 3) a 4)d 5)b
170
BLOCK 5
171
Unit 15
Overview
Learning Objectives
Let us sum up
Glossary
Suggested Readings
OVERVIEW
Any business faces social and ethical challenges in this society.
Information system as well faces various challenges. Overcoming these
have paved way for a successful development of IS. This unit details out
various IS control and ethics for IS professional.
LEARNING OBJECTIVES
172
Google knows more about you than your mother does. In March 2009,
Google began displaying ads on thousands of Google-related Web sites
based on their previous online activities. To parry a growing public
resentment of behavioral targeting, Google said it would give users the
ability to see and edit the information that it has compiled about their
interests for the purposes of behavioral targeting. Behavioral targeting
seeks to increase the efficiency of online ads by using information that
Web visitors reveal about themselves online, and if possible, combine
this with offline identity and consumption information gathered by
companies such as Acxiom.
The growing use of behavioral targeting techniques shows that
technology can be a double-edged sword. It can be the source of many
benefits (by showing you ads relevant to your interests) but it can also
create new opportunities for invading your privacy, and enabling the
reckless use of that information in a variety of decisions about you.
Online advertising titans like Google, Microsoft, and Yahoo are all
looking for ways to monetize their huge collections of online behavioral
data. While search engine marketing is arguably the most effective form
of advertising in history, banner display ad marketing is highly inefficient
because it displays ads to everyone regardless of their interests. Hence
the search engine marketers cannot charge much for display ad space.
However, by tracking the online movements of 200 million U.S. Internet
users, they can develop a very clear picture of who you are, and use that
information to show you ads that might be of interest to you. This would
make the marketing process more efficient and more profitable for all the
parties involved. But this solution also creates an ethical dilemma, pitting
the monetary interests of the online advertisers and search engines
against the interests of individuals to maintain a sense of c ontrol over
their personal information and their privacy. Two closely held values are
in conflict here. As a manager, you will need to be sensitive to both the
negative and positive impacts of information systems for your firm,
employees, and customers. You will need to learn how to resolve ethical
dilemmas involving information systems.
173
Figure 15.1 Ethical Challenges
Ethics refers to the principles of right and wrong that individuals, acting
as free moral agents, use to make choices to guide their behaviors.
Information systems raise new ethical questions for both individuals and
societies because they create opportunities for intense social change,
and thus threaten existing distributions of power, money, rights, and
obligations. Like other technologies, such as steam engines, electricity,
the telephone, and the radio, information technology can be used to
achieve social progress, but it can also be used to commit crimes and
threaten cherished social values. The development of information
technology will produce benefits for many and costs for others. Ethical
issues in information systems have been given new urgency by the rise
of the Internet and electronic commerce. Internet and digital firm
technologies make it easier than ever to assemble, integrate, and
distribute information, unleashing new concerns about the appropriate
use of customer information, the protection of personal privacy, and the
protection of intellectual property. Other pressing ethical issues raised by
information systems include establishing accountability for the
consequences of information systems, setting standards to safeguard
system quality that protects the safety of the individual and society, and
preserving values and institutions considered essential to the quality of
life in an information society. When using information systems, it is
essential to ask, “What is the ethical and socially responsible course of
action?”
174
discussed or to reduce damage caused to systems, Applications, and
data.
Controls are implemented not only for access but also to implement
policies and ensure that nonsensical data is not entered into corporate
databases.
Physical facility control is methods that protect physical facilities and
their contents from loss and destruction. Computer centers are prone to
many hazards such as accidents, thefts, fire, natural disasters,
destructions etc. Therefore, physical safeguards and various control
procedures are required to protect the hardware, software and vital data
resources of computer using organizations.
Procedural control methods provide maximum security to operation of
the information system. Standard procedures are developed and
maintained manually and built in software help display so that everyone
knows what to do. It promotes uniformity and minimize the chance of
error and fraud. It should be kept up to date so that correct processing of
each activity is made possible.
15.3 APPLICATION RELIABILITY AND DATA ENTRY CONTROLS
The most reliable programs consider every possible misuse or abuse. A
highly reliable program includes code that promptly produces a clear
message if a user either makes an error or tries to circumvent a process.
For example, a Web site invites users to select a username and
password, and the operators demand passwords that are not easy to
guess. The application should be programmed to reject any password
that has fewer than a certain number of characters or does not include
numerals. A clear message then must be presented, inviting the user to
follow the guidelines.
Controls also translate business policies into system features. For
example, Blockbuster Video uses its IS to implement a policy limiting
debt for each customer to a certain level. When a renter reaches the
debt limit and tries to rent another DVD, a message appears on the cash
register screen: “Do not rent!” Thus, the policy is implemented by using a
control at the point of sale. Similar systems do not allow any expenditure
to be committed unless a certain budgetary item is first checked to
ensure sufficient allocation. A spending policy has been implemented
through the proper software.
175
Access Controls
Unauthorized access to information systems, usually via public networks
such as the Internet, does not always damage IT resources. However, it
is regarded as one of the most serious threats to security because it is
often the prelude to the destruction of Web sites, databases, and other
resources, or theft of valuable information.
Access controls are measures taken to ensure that only those who are
authorized have access to a computer or network, or to certain
applications or data. One way to block access to a computer is by
physically locking it in a facility to which only authorized users have a
key or by locking the computer itself with a physical key. However, in the
age of networked computers, this solution is practical only for a limited
number of servers and other computers. Therefore, these organizations
must use other access controls, most of which rely on software. Experts
like to classify access controls into three groups: what you know, what
you have, and who you are.
1. “What you know” includes access codes such as user IDs, account
numbers, and passwords.
2. “What you have” is some kind of a device, such as a security card,
which you use directly, or which continuously changes coordinated
access codes and displays them for you.
176
access to confidential databases, usually remotely. Employees receive a
small device that displays a 6-digit number. Special circuitry changes the
number both at the server and the device to the same new number
every minute. To gain access, employees enter at least one access
code and the current number. The device is small enough to be carried
on a key chain or in a wallet. This two-factor access control increases
the probability that only authorised people gain access. This is an
example of using both what you know and what you have.
In recent years, some companies have adopted physical access controls
called bio-metrics. A bio-metric characteristic is a unique physical,
measurable characteristic of a human being that is used to identify a
person. Characteristics such as fingerprints, retinal scans, or voice prints
can be used in bio-metrics. They are in the class of “who you are.” When
a fingerprint is used, the user presses a finger on a scanner or puts it
before a digital camera. The fingerprint is compared against a database
of digitised fingerprints of people with authorised access. A growing
number of laptop computers have a built-in fingerprint scanner for the
same purpose. The procedure is similar when the image of a person’s
retina is scanned. With voice recognition, the user is instructed to utter a
word or several words. The intonation and accent are digitised and
compared with a list of digitised voice samples.
177
command that forced some computers at a nearby university research
lab to power off
DoS attacks have evolved into the more complex and sophisticated
“distributed denial of service” (DDoS) attacks. The biggest attack ever
recorded — at that time — targeted code-hosting-service GitHub in
2018. We’ll discuss DDoS attacks in greater detail later in this article.
Attackers include hacktivists (hackers whose activity is aimed at
promoting a social or political cause), profit-motivated cybercriminals,
and nation states.
Flooding attacks
Flooding is the more common form DoS attack. It occurs when the
attacked system is overwhelmed by large amounts of traffic that the
server is unable to handle. The system eventually stops.
An ICMP flood — also known as a ping flood — is a type of DoS attack
that sends spoofed packets of information that hit every computer in a
targeted network, taking advantage of misconfigured network devices.
A SYN flood is a variation that exploits a vulnerability in the TCP
connection sequence. This is often referred to as the three-way
handshake connection with the host and the server. Here’s how it works:
The targeted server receives a request to begin the handshake. But, in a
SYN flood, the handshake is never completed. That leaves the
connected port as occupied and unavailable to process further requests.
Meanwhile, the cybercriminal continues to send more and more
requests, overwhelming all open ports and shutting down the server.
Crash attacks
Crash attacks occur less often, when cybercriminals transmit bugs that
exploit flaws in the targeted system. The result? The system crashes.
Crash attacks — and flooding attacks — prevent legitimate users from
accessing online services such as websites, gaming sites, email, and
bank accounts.
178
How a DoS attack works
Unlike a virus or malware, a DoS attack doesn’t depend on a special
program to run. Instead, it takes advantage of an inherent vulnerability in
the way computer networks communicate.
Here’s an example. Suppose you wish to visit an e-commerce site in
order to shop for a gift. Your computer sends a small packet of
information to the website. The packet works as a “hello” – basically,
your computer says, “Hi, I’d like to visit you, please let me in.”
When the server receives your computer’s message, it sends a short
one back, saying in a sense, “OK, are you real?” Your computer
responds — “Yes!” — and communication is established.
The website’s homepage then pops up on your screen, and you can
explore the site. Your computer and the server continue communicating
as you click links, place orders, and carry out other business.
In a DoS attack, a computer is rigged to send not just one “introduction”
to a server, but hundreds or thousands. The server — which cannot tell
that the introductions are fake — sends back its usual response, waiting
up to a minute in each case to hear a reply. When it gets no reply, the
server shuts down the connection, and the computer executing the
attack repeats, sending a new batch of fake requests.
DoS attacks mostly affect organizations and how they run in a
connected world. For consumers, the attacks hinder their ability to
access services and information.
179
services that can disperse the massive DDoS traffic among a network of
servers. That can help render an attack ineffective.
Spoofing
Spoofing is a type of scam in which criminals attempt to obtain
someone's personal information by pretending to be a legitimate
business, a neighbor, or some other innocent party.
Special Considerations
Be skeptical whenever you receive a message asking for personal
information and only download files from trusted sources. Install antivirus
software on any computers you use and keep it up to date.
If you get an inquiry seeking personal information, don’t provide it. Hang
up (or log off) and then look up the phone number or customer service
email address from the entity purportedly contacting you for your
personal information.
If you think you’ve been spoofed, you can file a complaint at the FCC's
Consumer Complaint Center. The FCC doesn't act on individual
180
complaints but will add that information to its database. If you've lost
money because of spoofing, the FCC recommends contacting your local
police.
Email Spoofing
Sometimes referred to as phishing, this tactic is used by both dishonest
advertisers and outright thieves. The spoofer sends out emails with a
falsified “From:” line to try to trick victims into believing that the message
is from a friend, their bank, or some other legitimate source. Any email
that asks for your password, Social Security number, or any other
personal information could be a trick.
Caller ID Spoofing
Here, the spoofer falsifies the phone number from which they are calling
in hope of getting you to take their call. On your caller ID, it might appear
that the call is coming from a legitimate business or government agency,
such as the Internal Revenue Service. Note that the IRS says it doesn't
call taxpayers to tell them they owe taxes without first sending them a bill
in the mail.
Neighbor Spoofing
This is a type of caller ID spoofing in which the call will appear to be from
someone you know or a person who lives near you. The Federal
Communications Commission (FCC) says that the Truth in Caller ID Act
prohibits "anyone from transmitting misleading or inaccurate caller ID
information with the intent to defraud, cause harm or wrongly obtain
anything of value." If they're caught (and that's a big "if"), the spoofer can
face penalties of up to $10,000 for each violation.
URL Spoofing
URL spoofing happens when scammers set up a fraudulent website to
obtain information from victims or to install malware on their computers.
For instance, victims might be directed to a site that looks like it belongs
to their bank or credit card company and be asked to log in using their
181
user ID and password. If the person falls for it and actually logs in, the
scammer could use the information the victim typed in to log into the real
site and access their accounts.
GPS Spoofing
GPS spoofing has a somewhat different purpose. It attempts to trick a
GPS receiver into believing it is in a different location or headed in a
different direction, by broadcasting bogus GPS signals or other means.
At this point, GPS spoofing is more likely to be used in warfare or by
gamers than to target individual consumers, although the technology
exists to make anyone vulnerable.
LET US SUM UP
Information system has various societal and Ethical challenges. There
are two types of IS control Procedural Control and Facility control. There
are 5 moral dimensions on societal challenges on IS. They are
Information rights and obligations, Property rights and obligations,
Accountability and control, system quality and Quality of life.
c) Spoofing d) Profiling
4.__________ attempts to trick a GPS receiver into believing it is in a
different location or headed in a different direction, by broadcasting
bogus GPS signals or other means.
a) Crash attack b) Flooding Attack
c) Spoofing d) GPS Spoofing
182
5. The spoofer sends out emails with a falsified “From:”___________
GLOSSARY
183
coordinates.
SUGGESTED READINGS
1. Bentley Trevor J (1986) Management Information Systems &
data processing, 2nd edition, Holt, Rinehart and Winston
publications, University of California. ISBN 0039106888,
9780039106881.
2. Donald W. Kroeber (1986) Computer-Based Information
Systems: A Management Approach, Subsequent
edition, Macmillan Publications, University of Virginia. ISBN
0023668407, 9780023668401.
3. Gordon B.Davis (2013) Management Information Systems, 1 st
Edition, TMH Publications, India. ISBN 007066241X.
4. Joel E. Ross (1970) Management by Information System,
illustrated edition, Prentice-Hall publications, University of
Wisconsin,ISBN 0135486289, 9780135486283.
5. Kenneth C. Loudon & Jane P. Loudon (2014) Management
Information Systems, 13th Edition, Pearson Publications, USA.
1)b 2) b 3) b 4)d 5) d
184
Unit 16
SOCIETAL CHALLENGES OF
INFORMATION SYSTEM
STRUCTURE
Overview
Learning Objectives
Glossary
Suggested Readings
Answers to check your progress
OVERVIEW
Information system has posed new challenges for the protection of
individual and society. Information sent over this vast network of
networks may pass through many different computer systems before it
reaches its final destination. Each of these systems is capable of
monitoring, capturing, and storing communications that pass through it.
LEARNING OBJECTIVES
185
This may involve articulating the good habits that we should acquire, the
duties that we should follow, or the consequences of our behavior on
others. Finally, applied ethics involves examining specific controversial
issues, such as abortion, infanticide, animal rights, environmental
concerns, homosexuality, capital punishment, or nuclear war.
There are ethical, social, and political levels of analysis for each of the
five moral dimensions of information systems.
Privacy is the claim of individuals to be left alone, free from surveillance
or interference from other individuals or organizations, including the
state. Information technology and systems threaten individual claims to
privacy by making the invasion of privacy cheap, profitable, and
effective.
The claim to privacy is protected in the U.S., Canadian, and German
constitutions in a variety of different ways, and in other countries through
various statutes.
The Privacy Act of 1974 regulates the federal governments' collection
use, and disclosure of information. Most American and European privacy
law is based on the principles of Fair Information Practices (FIP) set
forth in 1973 to govern the collection and use of information about
individuals. This report states that an individual has an interest in the
information gathered about his or her and the record may not be used to
support other activities without the individual's consent.
The Gramm-Leach-Bliley Act of 1999 requires financial institutions to
disclose their policies for protecting the privacy of nonpublic personal
information and to allow customers to opt out of information-sharing
arrangements with nonaffiliated third parties.
The Health Insurance Portability and Accountability Act of 1996 (HIPAA),
gives patients access to their personal medical records maintained by
healthcare providers and the right to authorize how protected information
about themselves can be used or disclosed, and limits the disclosure of
personal information about patients to the minimum amount necessary
to achieve a given purpose.
European privacy protection is much more stringent than in the United
States. The European Directive on Data Protection requires companies
to inform people when they collect information about them and to
disclose how it will be stored and used. Customers must provide their
informed consent (consent given with knowledge of all the facts needed
to make a rational decision) before any company can legally use data
about them.
EU member nations cannot transfer personal data to countries that don't
have similar privacy protection regulations. To work with Europeans
186
privacy laws, the U.S. Department of Commerce developed a safe
harbor framework for U.S. firms. A safe harbor is a private, self -
regulating policy and enforcement mechanism that meets the objectives
of government regulators and legislation but does not involve
government regulation or enforcement. U.S. firms must be certified by
public accounting firms to be "safe harbor" for personal data on
Europeans, and this certification is recognized (but not enforced) by the
Department of Commerce.
Ethical Analysis- Professional code of conduct
The Internet poses new challenges to the protection of individual privacy
because information can easily be monitored, captured, and stored as it
passes through its network of computer systems. Companies can record
a user's on-line activities, such as what files were accessed, or which
Web sites were visited. Web sites can learn the identity of their visitors if
the visitors voluntarily register at the site or they can capture information
about visitors without their knowledge using "cookie" technology.
Cookies are tiny files deposited on a computer hard drive when a user
visits certain Web sites that track visits to the Web site. Some
companies use Web bugs, which are tiny graphic files embedded into e -
mail messages and Web pages to monitor who is reading the e-mail
message or Web page.
187
Most Internet businesses do little to protect their customers' privacy
other than the publication of privacy statements. Some e-commerce
sites add opt-out selection boxes to their privacy statement, which, when
accepted by a visitor, permit the collection of personal information.
Privacy advocates promote the wider use of an opt-in model of informed
consent in which businesses are prohibited from collecting information
unless specifically allowed by the consumer. Spyware is small
applications that can secretly install itself on an Internet user's computer
by piggybacking on larger applications. Once installed, the spyware calls
out to Web sites to send banner ads and other unsolicited material to the
user, and it can also report the user's movements on the Internet to
other computers.
In addition to legislation, new technologies are available to protect user
privacy during interactions with Web sites, including encrypting email,
anonymizing Web surfing, preventing cookies, and eliminating spyware.
The Platform for Privacy Preferences (P3P) is a standard for
communicating a Web site's privacy policy to Internet users to help them
select the level of privacy they wish to maintain when interacting with the
Web site.
188
Meanwhile the elements that describe ethical behavior in the profession,
in general these codes assert that IT professionals need to commit to:
➢ Integrity
➢ Competence
➢ Professional responsibilities
➢ Work responsibilities
➢ Societal responsibilities
Specific guidance stems from these general principles. Some common
commitments between the three codes are to:
189
Figure 16. 3 The relationship between ethical, social, and political Issues
in an information society.
The introduction of new information technology has a ripple effect,
raising new ethical, social, and political issues that must be dealt with on
the individual, social, and political levels. These issues have five moral
dimensions: information rights and obligations, property rights and
obligations, system quality, quality of life, and accountability and control.
There are five main moral dimensions for these issues that tie together
ethical, social, and political issues in an information society. These moral
dimensions are:
1. Information rights and obligations. What information rights do
individuals and organizations possess with respect to themselves? What
can they protect?
2. Property rights and obligations. How will traditional intellectual
property rights be protected in a digital society in which tracing and
accounting for ownership is difficult and ignoring such property rights is
so easy?
3. Accountability and control. Who can and will be held accountable
and liable for the harm done to individual and collective information and
property rights?
4. System quality. What standards of data and system quality
should we demand to protect individual rights and the safety of society?
5. Quality of life. What values should be preserved in an
information- and knowledge-based society? Which institutions should we
protect from violation? Which cultural values and practices are
supported by the new information technology?
190
Key Technology Trends That Raise Ethical Issues
• Doubling of computer power
• More organizations depend on computer systems for Critical
operations
• Rapidly declining data storage costs
• Organizations can easily maintain detailed databases on
individuals
Individuals for:
Profiling
• Combining data from multiple sources to create dossiers of
detailed information on individuals
Non obvious relationship awareness (NORA)
• Combining data from multiple sources to find obscure hidden
connections that might help identify criminals or terrorists
A Five-Step Process
LET US SUM UP
Information system has various societal and Ethical challenges. There
are two types of IS control Procedural Control and Facility control. There
are 5 moral dimensions on societal challenges on IS. They are
Information rights and obligations, Property rights and obligations,
Accountability and control, system quality and Quality of life.
191
CHECK YOUR PROGRESS
192
as to command, restrain, or manage.
SUGGESTED READINGS
1. Bentley Trevor J (1986) Management Information Systems &
data processing, 2nd edition, Holt, Rinehart and Winston
publications, University of California. ISBN 0039106888,
9780039106881.
2. Donald W. Kroeber (1986) Computer-Based Information
Systems: A Management Approach, Subsequent
edition, Macmillan Publications, University of Virginia. ISBN
0023668407, 9780023668401.
3. Gordon B.Davis (2013) Management Information Systems, 1 st
Edition, TMH Publications, India. ISBN 007066241X.
4. Joel E. Ross (1970) Management by Information System,
illustrated edition, Prentice-Hall publications, University of
Wisconsin,ISBN 0135486289, 9780135486283.
5. Kenneth C. Loudon & Jane P. Loudon (2014) Management
Information Systems, 13th Edition, Pearson Publications, USA.
193
194
195