0% found this document useful (0 votes)
19 views28 pages

MIS All Modules 28 Pages

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views28 pages

MIS All Modules 28 Pages

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

CHapter 1

The content provided in both presentations is vast and detailed. Below, I have structured the
key topics and subtopics from both modules into detailed 10-mark answers. This format
ensures each response meets the depth required for such marks in academic or
examination settings.

Module 1: Management Information Systems

1. Introduction to Information Systems (IS)

Main Concepts:

● Definition: IS collects, processes, stores, analyzes, and disseminates information for


specific purposes.
● Importance of IS:
○ Provides strategic value by enabling better decision-making and efficient
operations.
○ Helps organizations adapt to competitive, interconnected, and rapidly
changing environments.

Key Points for Answer:

● Role of IT in transforming communication, collaboration, and competition.


● IS as a tool for informed users to enhance career opportunities and improve
organizational performance.
● Strategic value in businesses (e.g., dependency on IT for operations and competitive
advantage).

2. Computer-Based Information Systems (CBIS)

Main Components:

1. Hardware: Physical devices for input, processing, and output.


2. Software: Programs enabling hardware functionality.
3. Database: Central repository of structured data.
4. Network: Connectivity for resource sharing.
5. Procedures: Guidelines for system operations.
6. People: Users who interact with the system.

Key Types:

● Functional Area IS (FAIS): Tailored to specific functions (e.g., HR, Marketing).


● Enterprise Resource Planning (ERP): Integrates all functional areas for seamless
communication.
● Transaction Processing Systems (TPS): Handles core transactional data.

Key Points for Answer:

● Define CBIS and explain its components with examples.


● Discuss the roles of ERP, TPS, and FAIS in organizational efficiency.

3. Impact of IT on Organizations

Key Impacts:

1. Reduces Middle Management:


○ Automation reduces manual oversight needs, increasing efficiency.
2. Changes in Managerial Roles:
○ Real-time data influences faster decision-making.
○ Tools like dashboards and analytics improve decision support.
3. Job Creation and Elimination:
○ IT creates roles in technology but may replace repetitive jobs.
4. Health and Safety:
○ Risks like repetitive strain injuries (e.g., carpal tunnel) and stress from
increased workloads.
○ Adaptive technologies for differently-abled individuals.

Key Points for Answer:

● Provide specific examples of IT's organizational impact (e.g., automation in logistics).


● Discuss advantages (e.g., productivity) and challenges (e.g., health risks).

4. Organizational Strategy and Competitive Advantage

Key Frameworks:

1. Porter’s Five Forces:


○ Threat of new entrants.
○ Bargaining power of suppliers and buyers.
○ Threat of substitutes.
○ Industry rivalry.
2. Value Chain Analysis:
○ Primary Activities: Inbound logistics, operations, outbound logistics,
marketing, and service.
○ Support Activities: HR, technology, procurement.
3. Strategies for Competitive Advantage:
○ Cost leadership, differentiation, innovation, operational effectiveness, and
customer orientation.
Key Points for Answer:

● Apply examples like Walmart (cost leadership) or Dell (customization).


● Explain how IT drives each strategy.

5. Importance of IS to Society

Applications:

● Healthcare: IT enables better diagnostics and treatment (e.g., telemedicine).


● Education: Online learning platforms increase accessibility.
● Environmental Impact:
○ IT supports "Go Green" initiatives.
○ Reduces physical resource dependency.

Key Points for Answer:

● Use case studies like telemedicine or e-learning to illustrate societal benefits.

Module 4: Social Computing and E-Commerce

1. Social Computing in Business

Applications:

1. Social Commerce:
○ Facilitates reviews, group shopping, and peer-to-peer interactions.
○ Improves vendor response and customer experience.
2. Marketing:
○ Leverages social media for targeted ads and conversational feedback.

Key Points for Answer:

● Discuss benefits for businesses (e.g., viral marketing) and customers (e.g.,
interactive shopping).

2. Facebook Commerce (F-Commerce)

Types:

1. Commerce-on-Facebook:
○ In-app purchases (e.g., Pampers F-store).
2. Commerce-off-Facebook:
○ Uses Open Graph for integration with external sites.
Challenges:

● Privacy concerns and technical limitations like slow page loads.

Key Points for Answer:

● Explore success stories (e.g., ASOS) and privacy-related critiques.

3. Customer Relationship Management (CRM)

Types:

1. Operational CRM:
○ Sales force automation, marketing campaigns, and call centers.
2. Analytical CRM:
○ Data-driven insights for segmentation, forecasting, and profitability.

Key Points for Answer:

● Illustrate with examples of CRM tools improving customer retention and satisfaction.

4. E-Commerce Mechanisms and Payment Systems

Mechanisms:

● Auctions (forward and reverse), e-marketplaces, and storefronts.

Payments:

1. Types:
○ Electronic cards, smart cards, virtual credit cards, and PayPal.
2. Advantages:
○ Convenience, global reach, and enhanced security.

Key Points for Answer:

● Provide examples like eBay (auctions) or Amazon (secure payments).

5. Benefits and Challenges of E-Commerce

Advantages:

1. Organizations: Global expansion and reduced costs.


2. Customers: 24/7 availability and product comparisons.
3. Society: Reduced environmental impact and rural access.
Challenges:

● Technical: Security and compatibility.


● Non-technical: High costs and mistrust.

Key Points for Answer:

● Compare benefits (e.g., cost reduction) with challenges (e.g., initial setup costs).

These answers can be elaborated further with real-life examples and theoretical concepts to
meet academic requirements for 10-mark questions. Let me know if you'd like deeper
exploration into any specific topic!

CHapter 2
The presentation covers topics on Database Management and Business Intelligence (BI).
Below are structured answers for each topic and subtopic, suitable for 10-mark responses.
Each section explains key concepts, applications, and examples to meet academic depth
requirements.

1. Managing Data Resources

Difficulties of Managing Data:

● Exponential Growth: Data volumes are increasing rapidly.


● Scattered Data Sources: Data comes from internal (corporate databases), personal
(opinions), and external (government reports) sources.
● Degradation and Rot: Data loses relevance or becomes inaccessible over time.
● Security and Legal Challenges: Ensuring compliance with evolving legal
frameworks.

Data Governance:

● Definition: Formal rules for creating, collecting, and protecting information.


● Key Components:
○ Master Data Management: Ensures consistent and accurate data across all
business functions.
○ Data Quality: Emphasizes accuracy, relevance, and consistency.

Key Points for Answer:

● Define challenges in managing data and how governance improves efficiency.


● Highlight examples like integrating customer data across departments for better
service.
2. Database Approach

Key Concepts:

● Data Hierarchy:
○ Bit: Smallest data unit (0 or 1).
○ Field, Record, File, Database: Increasingly complex groupings.
● Database Management Systems (DBMS):
○ Minimizes redundancy and inconsistency.
○ Maximizes data integrity and security.

Relational Database Model:

● Entities, Attributes, and Keys:


○ Primary Key: Unique identifier for records.
○ Foreign Key: Links records between tables.
● Operations:
○ Select: Extract specific records.
○ Join: Combine data from multiple tables.
○ Project: Select specific attributes.

Key Points for Answer:

● Explain the relational model with examples (e.g., managing supplier and inventory
data).
● Describe operations like Select (finding specific suppliers) and Join (linking sales and
inventory).

3. Big Data

Characteristics of Big Data:

● Volume: Large datasets from sources like social media.


● Velocity: Rapid inflow of real-time data.
● Variety: Diverse formats, including images and audio.

Challenges:

● Data can be inaccurate or incomplete ("dirty data").


● Requires advanced tools for integration and analysis.

Applications:

● Tracking disease outbreaks (e.g., COVID-19 analytics).


● Fraud detection using real-time transaction data.
Key Points for Answer:

● Discuss big data's role in predictive analytics and customer segmentation.


● Use examples like Amazon's personalized recommendations.

4. Data Warehouses and Data Marts

Definitions:

● Data Warehouse: Central repository for historical data, used for strategic decisions.
● Data Mart: Scaled-down version for specific departments.

Characteristics:

● Organized by Subject: Data grouped by business dimensions (e.g., customers,


products).
● Nonvolatile: Data cannot be altered, ensuring consistency.
● Time-Variant: Maintains historical data.

Benefits:

● Enables trend analysis (e.g., sales performance over years).


● Reduces load on operational databases.

Key Points for Answer:

● Explain the advantages of data warehouses, such as efficient decision-making.


● Differentiate between warehouses (enterprise-wide) and marts (department-specific).

5. Business Intelligence (BI) Applications

Data Analysis:

● OLAP:
○ Multi-dimensional "slicing and dicing" of data.
○ Example: Analyzing sales by region and time.
● Data Mining:
○ Extracting patterns, such as:
■ Associations: Product pairings (e.g., chips and cola).
■ Clustering: Grouping customers by behavior.

Presenting Results:

● Dashboards: Visual summaries for quick insights (e.g., KPI tracking).


● Data Visualization: Charts and graphs to simplify complex data.
Key Points for Answer:

● Describe OLAP for analyzing business trends.


● Highlight how dashboards support executives with real-time updates.

6. Normalization and Database Design

Normalization:

● Definition: Process of reducing redundancy and organizing data efficiently.


● Forms:
○ First Normal Form (1NF): Eliminates duplicate groups.
○ Second Normal Form (2NF): Ensures all fields depend on the primary key.
○ Third Normal Form (3NF): Removes transitive dependencies.

Design Principles:

● Entity-Relationship Diagrams (ERDs): Illustrate relationships (e.g., customer-order


mapping).
● Referential Integrity: Ensures consistent links between tables.

Key Points for Answer:

● Explain normalization with examples (e.g., splitting a customer-order table into


smaller related tables).
● Discuss ERDs for visualizing database structures.

7. Applications of BI in Decision Making

Types of Decisions:

1. Operational:
○ Day-to-day tasks (e.g., scheduling shipments).
2. Tactical:
○ Medium-term goals (e.g., pricing adjustments).
3. Strategic:
○ Long-term planning (e.g., entering new markets).

BI's Role:

● Supports each decision type by providing relevant insights.


● Uses tools like OLAP for tactical adjustments and data mining for strategic planning.

Key Points for Answer:


● Provide scenarios where BI aids managers (e.g., analyzing customer feedback for
marketing campaigns).

This comprehensive structure ensures each topic and subtopic from the presentation is
detailed for a full 10-mark answer. Let me know if you'd like any specific topic expanded
further!

CHapter 3
Here is a summary of 10-mark answers for each key topic from the provided material on
Information Security, Ethics, and Privacy. Each answer includes definitions, examples,
and structured points relevant to the topic.

1. Introduction to Information Security

Definition: Information security encompasses policies and processes to protect data and
information systems (IS) from unauthorized access, disruption, or destruction.

Key Concepts:

● Threats: Dangers to the IS (e.g., malware).


● Exposure: The potential damage from a threat.
● Vulnerability: Weakness that a threat can exploit.

Examples:

1. A company network compromised due to weak passwords (vulnerability) results in


data theft (exposure).
2. A ransomware attack encrypting sensitive files, causing operational downtime (threat
realization).

2. Unintentional Threats to Information Systems

Definition: Unintentional threats arise from human error or environmental factors without
malicious intent.

Categories:

1. Human Errors:
○ Poor password choices.
○ Negligence in handling sensitive equipment.
2. Environmental Hazards: Power failures, natural disasters.

Example:

● A misplaced USB with unencrypted sensitive data being found and misused
illustrates a human error with significant consequences.

3. Deliberate Threats to Information Systems

Definition: Malicious activities aimed at disrupting, stealing, or compromising information.

Types:

1. Espionage: Unauthorized access to data.


2. Sabotage: Defacing websites to harm reputation.
3. Identity Theft: Misuse of personal information for fraud.

Example:

● A distributed denial-of-service (DDoS) attack by bots targeting an e-commerce


platform, rendering it inoperative during peak sales.

4. Software Attacks

Definition: Cyberattacks utilizing malicious software to compromise systems.

Categories:

1. User-Action-Based: Phishing, viruses, worms.


2. Non-User-Action-Based: DDoS attacks.
3. Programmer-Created: Logic bombs, Trojan horses.

Example:

● A phishing email tricking employees to click a malicious link, leading to ransomware


deployment.

5. Risk Management in Information Security

Definition: The process of identifying, controlling, and minimizing risks to acceptable levels.

Key Steps:

1. Risk Analysis: Assessing and comparing risks and mitigation costs.


2. Risk Mitigation Strategies:
○ Acceptance.
○ Limitation (e.g., using firewalls).
○ Transference (e.g., cyber insurance).

Example:

● A company implementing multi-factor authentication (risk mitigation) to prevent


unauthorized logins.

6. Information Security Controls

Definition: Defense mechanisms to protect IS components like hardware and data.

Types:

1. Physical Controls: Locks, guards.


2. Access Controls: Authentication, authorization.
3. Communication Controls: Firewalls, VPNs.

Example:

● A retail store securing customer data with firewalls and encrypting data transmission
using SSL.

7. Ethics in Information Technology

Definition: Principles guiding right and wrong behavior in IT use.

Frameworks:

1. Utilitarian Approach: Maximizing overall good.


2. Fairness Approach: Treating everyone equally.
3. Common Good Approach: Respecting societal values.

Example:

● A company ensuring employees' personal data is not misused for surveillance aligns
with ethical standards.

8. Privacy Concerns in IT

Definition: The right to control personal information's collection and dissemination.


Major Concerns:

1. Misuse of data (e.g., tracking cookies).


2. Unauthorized access to databases.

Example:

● Social media platforms sharing user data with third-party advertisers without consent.

9. Business Continuity Planning

Definition: Strategies ensuring organizational operations during disasters.

Types of Sites:

1. Hot Sites: Fully equipped operational facilities.


2. Warm Sites: Partial equipment but no data.
3. Cold Sites: Bare facilities for emergencies.

Example:

● A financial firm having a hot site ready to replicate operations during a major
cyberattack.

10. Ethics and Privacy in Surveillance

Definition: Balancing surveillance technologies with ethical considerations and privacy.

Issues:

1. Overreach in monitoring.
2. Ethical implications of covert surveillance tools (e.g., EyeSee mannequins).

Example:

● Public concerns about facial recognition in retail stores, highlighting the need for
transparent privacy policies.

Let me know if you need further customization or elaboration on any topic!


CHapter 4
Here is a set of detailed, structured answers for Social Computing, Customer
Relationship Management (CRM), and E-Business/E-Commerce topics tailored for 10
marks each.

1. Fundamentals of Social Computing in Business

Definition: Social computing leverages IT systems to incorporate social behavior and user
contributions, creating value in business processes like marketing and commerce.

Key Features:

● Social Commerce: Combines social interactions with e-commerce activities,


facilitating buying, selling, and customer interaction online.

Examples:

1. Customer Interaction: Using Twitter for real-time support enhances responsiveness.


2. Collaborative Buying: Groupon promotes group deals based on collective buying
power.

Benefits:

● Customers: Faster service, collaborative problem-solving in forums.


● Businesses: Low-cost marketing, viral promotions, real-time feedback.

2. Social Computing in Shopping

Definition: Social computing integrates reviews, ratings, and social networking for enhanced
shopping experiences.

Types:

1. Social Marketplaces: Platforms like Etsy connect buyers and sellers for niche
products.
2. Peer-to-Peer Shopping: Platforms such as Airbnb enable resource sharing and
rentals.

Example:

● Ratings and Reviews: Amazon integrates customer reviews and expert opinions,
influencing purchase decisions.

Benefits:
● Builds trust through user-generated feedback.
● Enables collaborative consumption models.

3. Social Computing in Marketing

Definition: Utilizes social platforms to advertise, gather market research, and engage in
conversational marketing.

Methods:

1. Social Advertising: Leverages likes and shares for peer-influenced campaigns.


2. Conversational Marketing: Using platforms like Facebook for real-time customer
feedback.

Example:

● Dell’s IdeaStorm invites user feedback to refine products and services.

Benefits:

● Precise targeting based on user behavior.


● Cost-effective campaigns using viral marketing.

4. Customer Relationship Management (CRM)

Definition: CRM involves managing customer interactions to improve relationships, drive


sales, and enhance service.

Types:

1. Operational CRM: Direct interactions like sales automation and marketing


campaigns.
2. Analytical CRM: Insights from customer data to predict behavior.

Example:

● A 360° Customer View consolidates data across channels to personalize services,


e.g., Amazon’s personalized recommendations.

Benefits:

● Improved customer retention.


● Cross-selling and upselling opportunities.
5. E-Business and E-Commerce

Definition:

● E-Business: Broader, including internal processes like supply chain and CRM.
● E-Commerce: Specific to buying and selling online.

Examples:

1. Pure E-Commerce: Digital product and delivery (e.g., buying e-books).


2. Partial E-Commerce: Physical product ordered online (e.g., Flipkart).

Advantages:

● Businesses: Global reach, reduced costs.


● Customers: 24/7 access, price comparisons.

6. Types of E-Commerce

Types:

1. B2C: Businesses sell directly to consumers (e.g., Amazon).


2. B2B: Businesses transact with other businesses (e.g., Alibaba).
3. C2C: Peer-to-peer transactions (e.g., eBay).
4. B2E: Internal company services for employees.
5. M-Commerce: Transactions over mobile devices.

Example:

● G2C (Government-to-Citizen): Online tax payment portals simplify public services.

Benefits:

● Enhances efficiency and accessibility across sectors.

7. E-Commerce Mechanisms

Definition: Platforms enabling transactions digitally.

Key Mechanisms:

1. Electronic Catalogs: Digital displays of product offerings.


2. E-Malls: Consolidated stores under one virtual address.

Example:
● Auction Models:
○ Forward Auctions: eBay’s competitive bidding for goods.
○ Reverse Auctions: Companies procure goods at the lowest price.

Benefits:

● Dynamic pricing and global participation.

8. Electronic Payment Systems

Types:

1. Electronic Cards: Credit and virtual cards.


2. Smart Cards: Multi-functional, secure payment systems.
3. Person-to-Person Payments: Platforms like PayPal.

Example:

● Virtual Credit Cards: Protect against fraud with single-use numbers.

Advantages:

● Fast, secure, and convenient transactions.

9. Advantages and Disadvantages of E-Commerce

Advantages:

● For Businesses: Wider markets, lower operational costs.


● For Customers: 24/7 access, variety, and better deals.
● For Society: Reduced environmental impact (e.g., fewer commutes).

Disadvantages:

● Technical: Security vulnerabilities, system compatibility.


● Non-Technical: Lack of physical interaction, privacy concerns.

Example:

● Multichanneling: Retailers using both online and offline channels face


"showrooming," where customers check items in-store but purchase online.

10. Online Advertising in E-Commerce


Definition: Internet-based advertising using dynamic and targeted methods.

Methods:

1. Banner Ads: Static or interactive visuals.


2. Viral Marketing: Encourages organic sharing of brand messages.

Example:

● YouTube ads use algorithms for precise targeting.

Advantages:

● Low cost, real-time updates, and personalized reach.

Let me know if you need further elaboration on any topic!

CHapter 5
Here are comprehensive 10-mark answers covering Emerging Technologies and Cloud
Computing topics based on the provided content.

1. Consumerization of IT and BYOD (Bring Your Own Device)

Definition: The use of personal devices and consumer-grade applications in the workplace
for business purposes.

Key Points:

1. Examples: Google Apps, Dropbox, and personal smartphones used for work emails.
2. Implications:
○ Increases employee flexibility and productivity.
○ Raises security concerns and challenges in managing devices.

Example:

● An organization adopting BYOD policies may allow employees to access corporate


emails on personal tablets, ensuring work continuity.

2. Virtualization
Definition: A technology that abstracts computing resources to enable flexible and efficient
usage, independent of physical hardware.

Types:

1. Server Virtualization: Multiple operating systems run on a single machine.


2. Desktop Virtualization: User desktops hosted on a central server.

Example:

● A single server running multiple virtual machines to host applications for different
departments reduces hardware costs.

Benefits:

● Cost reduction, enhanced flexibility, and efficient resource utilization.

3. Grid Computing

Definition: A distributed system that connects geographically remote computers into a


network to act as a supercomputer.

Applications:

1. Solving complex scientific problems (e.g., simulating nuclear explosions).


2. Analyzing large datasets for research.

Example:

● SETI@home project uses idle processing power from personal computers to analyze
radio signals for extraterrestrial life.

Advantages:

● Cost-effective, scalable, and high performance.

4. Cloud Computing

Definition: On-demand delivery of IT resources and applications over the internet on a


pay-as-you-go model.

Characteristics:

1. Resource Pooling: Shared resources serve multiple customers dynamically.


2. Broad Network Access: Accessible from various devices via the internet.

Deployment Models:
1. Public Cloud: Open to the public (e.g., AWS).
2. Private Cloud: Exclusive for one organization.
3. Hybrid Cloud: Combines public and private clouds.

Example:

● A startup uses AWS (public cloud) for hosting its website and a private cloud for
handling sensitive customer data.

5. Cloud Computing Services

Types:

1. Infrastructure-as-a-Service (IaaS): Virtualized computing resources (e.g., AWS


EC2).
2. Platform-as-a-Service (PaaS): Development platforms (e.g., Google App Engine).
3. Software-as-a-Service (SaaS): Ready-to-use software (e.g., Gmail).

Example:

● A business uses Salesforce (SaaS) for CRM, AWS (IaaS) for server hosting, and
Microsoft Azure (PaaS) for app development.

Benefits:

● Scalability, cost efficiency, and rapid deployment.

6. Concerns and Risks in Cloud Computing

Key Risks:

1. Legacy Systems: Difficult integration with old IT systems.


2. Privacy and Security: Vulnerabilities in storing sensitive data.
3. Regulatory Challenges: Compliance with data protection laws.

Example:

● A hospital storing patient records in the cloud must comply with HIPAA regulations to
protect patient privacy.

7. Green Computing

Definition: Eco-friendly and energy-efficient computing practices.


Strategies:

1. Energy-efficient Equipment: Use of low-power CPUs and laptops.


2. Electronic Waste Management: Recycling and safe disposal of old devices.

Example:

● A data center using AI for power management reduces electricity consumption by


optimizing cooling systems.

Benefits:

● Reduces environmental impact and lowers energy costs.

8. Web Services and Service-Oriented Architecture (SOA)

Definition:

● Web Services: Software components communicate over the web using XML.
● SOA: Self-contained services interact to create applications.

Example:

● Dollar Rent A Car integrates with Southwest Airlines using SOA, allowing customers
to book a car while reserving a flight.

Benefits:

● Platform-independent communication and efficient system integration.

9. Autonomic Computing

Definition: Self-managing systems capable of configuring, optimizing, healing, and securing


themselves.

Features:

1. Self-Healing: Automatically fixes issues (e.g., virus removal).


2. Self-Optimization: Adjusts performance based on demand.

Example:

● Antivirus software autonomously detects and removes threats, notifying users.

Advantages:

● Reduces manual intervention and improves reliability.


10. High-Performance and Power-Saving Processors

Definition: Advanced processors designed for energy efficiency and performance.

Features:

1. Multicore Processors: Combine multiple cores for better performance with lower
power consumption.
2. Low-Power Chips: Generate less heat and require less cooling.

Example:

● A server using multicore processors reduces energy consumption while managing


heavy computational tasks.

Benefits:

● Supports sustainability initiatives and reduces operational costs.

These answers are aligned with the content of your uploaded presentation and formatted for
a 10-mark response. Let me know if you need further refinement!

CHapter 6
Below are 10-mark answers covering each major topic and subtopic from your provided PPT
on Knowledge Management. Each answer is concise yet thorough to fit the requirements.

1. Knowledge: Definition and Dimensions

Definition:
Knowledge is distinct from data and information. It provides a higher-level meaning that can
be exercised to solve problems. Data comprises raw facts, while information is processed,
organized data. Knowledge is contextual, relevant, and actionable.

Dimensions of Knowledge:

● Firm Asset: Intangible, increases as it is shared.


● Forms: Explicit (documented) and Tacit (personal skills, know-how).
● Location: Both individual and social; enmeshed in organizational culture.
● Situational: Conditional (when to act) and Contextual (how to act).
2. Explicit vs. Tacit Knowledge

Explicit Knowledge:

● Codified and transferable without personal interaction.


● Examples: Policies, strategies, procedures, documents, and software.

Tacit Knowledge:

● Personal, subjective, and hard to formalize.


● Includes mental maps, expertise, skills, trade secrets, and organizational culture.
● Plays a critical role in innovation and decision-making.

3. Knowledge Management Systems (KMS)

Definition:
A KMS is a set of business processes designed to create, store, transfer, and apply both
explicit and tacit knowledge.

Cycle:

1. Create: Innovating new knowledge or importing external knowledge.


2. Capture: Identifying and documenting valuable knowledge.
3. Refine: Making knowledge actionable by contextualizing it.
4. Store: Organizing knowledge for easy access in repositories.
5. Manage: Ensuring relevance and accuracy over time.
6. Disseminate: Sharing knowledge organization-wide in usable formats.

4. Knowledge Management Value Chain

Stages:

1. Acquisition: Gathering explicit and tacit knowledge, creating networks, and


analyzing data.
2. Storage: Using databases and document systems; ensuring proper indexing and
organization.
3. Dissemination: Sharing via portals, emails, collaboration tools, and training.
4. Application: Embedding knowledge in decision-making systems, new business
processes, and innovations.

5. Transaction Processing Systems (TPS)


Definition:
TPS captures, processes, and stores data from business transactions in real-time.

Components:

● Batch Processing: Data processed periodically in batches.


● Online Processing: Real-time transaction updates.

Functions:

● Handling high-volume data, ensuring accuracy, providing audit trails, and maintaining
security.

6. ERP Systems

Definition:
Enterprise Resource Planning systems integrate organizational processes using a common
database to ensure flexibility, decision support, and efficiency.

Types of Implementation:

● Vanilla Approach: Standard ERP with minimal customization.


● Custom Approach: Tailored ERP for specific needs, though expensive.
● Best of Breed: Combining standard and customized systems.
● SaaS ERP: Cloud-based ERP for cost-effective and scalable solutions.

Advantages:

● Flexibility, decision support, and improved process quality.

Limitations:

● High costs, complexity, and risks of implementation failure.

7. ERP with SCM and CRM

ERP-SCM Integration:

● Automates raw material replenishment based on criteria like minimum quantity or


expiration dates.

ERP-CRM Integration:

● Forecasts customer needs and suggests campaigns based on variables like location,
season, or customer type.
Benefits:

● Enhanced coordination across supply chains and customer management.

Let me know if you'd like me to expand on any specific section or add more examples!

Below are 10-mark answers covering each topic and subtopic from your provided PPT on
Decision Support Systems (DSS). Each answer is detailed and focuses on the specific
content.

CHater 6B
1. Types of Decisions in an Organization

Structured Decisions:

● Decisions with well-defined procedures.


● Can be automated and are programmable (e.g., payroll processing).

Semistructured Decisions:

● Partly automated with some reliance on human judgment.


● Benefit from information retrieval and analytical models.

Unstructured Decisions:

● Unique, one-time decisions with no standard procedure.


● Relies on intuition and limited IT support.

Challenges in semi- and unstructured decisions include handling multiple criteria and
resolving conflicting objectives.

2. Phases of Decision Making

1. Intelligence Phase:

● Examines conditions requiring decisions.


● Collects data from multiple sources to identify problems or opportunities.

2. Design Phase:

● Constructs models to represent the situation.


● Defines criteria and relationships among alternatives.
3. Choice Phase:

● Selects the best alternative based on analysis.


● Includes DSS tools like cost-benefit calculations.

4. Implementation Phase:

● Develops plans to execute the decision.


● Involves follow-up assessments by DSS to ensure success.

3. Components of a Decision Support System

1. Database Management:

● Includes internal and external data managed by a DBMS.


● Performs data analysis for decision-making.

2. Model Base Management:

● Contains mathematical and statistical models for analyzing data.

3. User Interface:

● Provides an interactive interface for decision-makers.

4. DSS Engine:

● Coordinates database, model base, and user interface to ensure seamless


functioning.

4. Capabilities of a DSS

1. What-If Analysis: Predicts outcomes based on changing assumptions.


2. Goal-Seeking Analysis: Determines inputs required to achieve desired outputs.
3. Sensitivity Analysis: Studies the impact of changes in variables.
4. Additional Features: Graphical analysis, forecasting, simulation, and statistical
modeling.

5. Roles in the DSS Environment

1. User:

● Uses the DSS for decision-making tasks.


● Could include managers or entire departments.
2. Managerial Designer:

● Aligns DSS features with management goals.


● Focuses on ensuring the DSS addresses organizational needs.

3. Technical Designer:

● Implements the DSS system.


● Handles data storage, security, user access, and system performance.

4. Model Builder:

● Connects users with designers.


● Defines model inputs, outputs, and assumptions.

6. Benefits of a DSS

Outlined by Peter G. Keen:

● Examines more alternatives.


● Faster responses to unexpected events.
● Facilitates unique, one-of-a-kind decisions.
● Provides cost savings and improved teamwork.
● Enhances communication, control, and data usage.

7. Digital Dashboards

● Integrate data from various sources.


● Display information as charts or graphs for quick insights.
● Help decision-makers identify trends and address issues promptly.
● Examples include Microsoft SharePoint dashboards.

8. Group Support Systems (GSS)

Definition:

● Facilitate group decision-making using computer and communication tools.

Capabilities:

● Audio/video conferencing, email, brainstorming, workflow automation.

Advantages:
● Improves collaboration and decision-making efficiency.

Disadvantages:

● Security concerns, high implementation costs, and lack of a personal touch.

Let me know if you'd like expansions on any section or additional examples!


● Reduces costs and stress by minimizing travel.

You might also like