GKM College Management Information System

47
G.K.M College of Engineering & Technology Department of Management Studies SubjectName: Management Information System R/TP/01 Subject Code: BA9225 Issue C: Rev 01 Class: MBA I Year/II Semester 1 Period: 01 Topic: Introduction of MIS A definition of management information system, as the term is generally understood, is an integrated, user machine system for providing information to support operations, management, and decision making functions in an organization. The system utilizes computer hardware and software; manual procedures; models for analysis, planning, control and decision making; and a database. The fact that it is an integrated system does not mean that it is a single, monolithic structure; rather, it means that the parts fit into an overall design. The elements of the definition are highlighted below: A management information system is an integrated user machine system for providing information. To support the operation, management, analysis, and decision making function in an organization The system utilizes computer hardware and software manual procedures model for analysis, planning, control and decision making and a database. The elements of the definition are highlighted below: A management information system is • an Integrated user machine system • for providing information • to support the operation, management, analysis, and decision – making function • in an organization The system utilizes • computer hardware and software • manual procedures • mdel for analysis, planning, control and decision making and • a database

description

GKM College Management Information System

Transcript of GKM College Management Information System

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    1

    Period: 01

    Topic: Introduction of MIS

    A definition of management information system, as the term is generally

    understood, is an integrated, user machine system for providing information to

    support operations, management, and decision making functions in an organization.

    The system utilizes computer hardware and software; manual procedures; models for

    analysis, planning, control and decision making; and a database. The fact that it is an

    integrated system does not mean that it is a single, monolithic structure; rather, it

    means that the parts fit into an overall design.

    The elements of the definition are highlighted below:

    A management information system is an integrated user machine system for providing

    information. To support the operation, management, analysis, and decision making

    function in an organization

    The system utilizes computer hardware and software manual procedures model for

    analysis, planning, control and decision making and a database.

    The elements of the definition are highlighted below:

    A management information system is

    an Integrated user machine system

    for providing information

    to support the operation, management, analysis, and decision making

    function

    in an organization

    The system utilizes

    computer hardware and software

    manual procedures

    mdel for analysis, planning, control and decision making and

    a database

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    2

    Period: 02

    Topic: Data, Information, and Intelligence,

    The term data means groups of information that represent the qualitative or quantitative

    attributes of a variable or set of variables. Data are typically the results of measurements and

    can be the basis of graphs, images, or observations of a set of variables.

    Information is the result of processing, manipulating and organizing data in a way that

    adds to the knowledge of the person receiving it.

    Information is a term with many meanings depending on context, but is as a rule closely

    related to such concepts as meaning, knowledge, instruction, communication, representation,

    and mental stimulus. Information is a message received and understood. In terms of data, it

    can be defined as a collection of facts from which conclusions may be drawn.

    Information management (IM) is the collection and management of information from one

    or more sources and the distribution of that information to one or more audiences. This

    sometimes involves those who have a stake in, or a right to that information.

    In short, information management entails organizing, retrieving, acquiring and

    maintaining information.

    Intelligence refers to discrete or secret information with currency and relevance, and the

    abstraction, evaluation, and understanding of such information for its accuracy and value.

    Theories of Intelligence:

    We can become more intelligent through study and practice, through access to

    appropriate tools, and through learning to make effective use of these tools (Perkins,

    1995).

    Howard Gardner

    David Perkins

    Robert Sternberg

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    3

    Period: 03

    Topic: Information Technology

    Information technology (IT), as defined by the Information Technology Association of

    America (ITAA), is "the study, design, development, implementation, support or

    management of computer-based information systems, particularly software applications and

    computer hardware."

    IT deals with the use of electronic computers and computer software to convert, store,

    protect process, transmit, and securely retrieve information.

    IT can be defined as a collection of computer hardware, software, databases, networking and

    telecommunication devices that helps the organization to manage the business process more

    effectively and efficiently.

    A Computer is essentially a system of input/output devices and a processor. The computer performs

    arithmetic and logic operations in a CPU- central processing unit, based on program instructions.

    The two capabilities most computer share are:

    High speed processing

    Arithmetic and logic

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    4

    Period: 04

    Topic: Meaning of IS & its functions

    An information system is a collection of hardware, software, data, people and procedures that are

    designed to generate information that supports the day-to-day, short-range, and long-range activities

    of users in an organization. Information systems generally are classified into five categories: office

    information systems, transaction processing systems, management information systems, decision

    support systems, and expert systems

    An information system (IS) - or application landscape - is any combination of information

    technology and people's activities that support operations, management, and decision making.

    Information system is computer system that support end-users, giving them access to the

    information. The transformation of data into information is primary function of

    information system [IS].

    COLLECTION

    OF DATA

    DATA

    PROCESSING OUTPUT

    INFORMATION USER DECISION

    SOURCE

    TO REDUCE UNCERTAINITY

    TACKLE BUSINESS PROBLEM

    TO BE COMPETITIVE

    ALLOCATION

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    5

    Period: 05

    Topic: Evolution of information system

    Based on the needs and requirements of the organization MIS has been evolving though the

    period of time. MIS was manually operational before the invention of computer application in

    this area. The following table illustrates the evolution of information system.

    Decade Information systems Characteristics of information systems

    1951-60 Electronic data processing Collecting, manipulating, storing of data.

    No scope for decision making

    1961-70 Management information

    system

    Pervasive in all level of the management

    decisions.

    Solution for structured decisions

    1971-80 Decision Support System,

    expert system

    Analytical models for semi structured decisions

    1981 and above Artificial intelligence,

    Executive information system

    Solution for unstructured decision making

    through advanced graphics

    1985 and above Knowledge management

    system, end user computing

    Intelligence workstation for knowledge work

    which involves thinking, processing information

    and formulating analyses , recommendations and

    procedures

    types of information systems:

    transaction processing systems

    MIS

    decision support systems

    expert systems

    executive information systems

    geographical information systems

    E-commerce systems

    multi-media systems

    differences in:

    users

    size, scope

    complexity, certainty, familiarity

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    6

    Period: 06

    Topic: Types based on functions & hierarchy

    The IT provides support in 3 major areas:

    communication

    collaboration

    Data access (including knowledge sharing).

    Such support is usually given by an information system that we call an application program.

    An application is a system developed for specific purpose or function, such as facilitating

    each function properly.

    Types based on functions:

    Departmental IS

    Plant IS

    Divisional IS

    Enterprise wide IS

    Inter organizational IS

    Key functional areas.

    A TYPE IS based on hierarchy:

    One way to classify IS by their organizational structure and hierarchical structure.

    Executive IS, DSS, MIS, and TPS.

    BASIC KINDS OF IS:

    Operational-level systems

    Management-level systems

    Strategic-level systems

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    7

    Period: 07

    Topic: Introduction to System Analyst

    A systems analyst researches problem, plans solutions, recommends software and systems,

    and coordinates development to meet business or other requirements. They will be familiar

    with multiple varieties of programming languages, operating systems, and computer

    hardware platforms. Because they often write user requests into technical specifications, the

    systems analysts are the liaisons between vendors and information technology professionals.

    They may be responsible for developing cost analysis, design considerations, and

    implementation time-lines.

    A systems analyst may:

    Plan a system flow from the ground up.

    Interact with customers to learn and document requirements that are then used to

    produce business requirements documents.

    Write technical requirements from a critical phase.

    Interact with designers to understand software limitations.

    Help programmers during system development, ex: provide use cases, flowcharts or even

    Database design.

    Perform system testing.

    Deploy the completed system.

    Document requirements or contribute to user manuals.

    Whenever a development process is conducted, the system analyst is responsible for

    designing components and providing that information to the developer.

    Who is system analyst: A system analyst is the person who selects and configures computer

    systems for an organization or business. His or her job typically begins with determining the

    intended purpose of the computers. When configuring computer systems for a business, the

    analyst must select both hardware and software.

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    8

    Period: 08

    Topic: Role of System Analyst

    The system analyst is the person (or persons) who guides through the development of an IS.

    The primary objective of any system analyst is to identify the need of the organization by

    acquiring information by various means and methods. Information acquired by the analyst

    can be either computer based or manual. Collection of information is the vital step as

    indirectly all the major decisions taken in the organizations are influenced. The system

    analyst has to coordinate with the system users, computer programmers, manager and number

    of people who are related with the use of system. Following are the tasks performed by the

    system analyst.

    The systems analyst systematically assesses how users interact with technology and

    businesses function by examining the inputting and processing of data and the outputting of

    information with the intent of improving organizational processes. Many improvements

    involve better support of users work tasks and business functions through the use of

    computerized information systems. This definition emphasizes a systematic, methodical

    approach to analyzingand potentially improvingwhat is occurring in the specific context

    experienced by users and created by a business.

    In performing these tasks the analyst must always match the information system objectives

    with the goals of the organization.

    Systems analysts as a consultant

    Systems analysts as a programmer

    Systems analysts as supporting expert

    Systems analysts as agent of change

    The architects

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    9

    Period: 09

    Topic: Responsibilities & functions of system analysts

    A person who conducts a methodical study and evaluation of an activity such as business to identify

    its desired objective in order to determine procedures by which these objectives can be gained is

    technically designated as system analysts.

    Skills of system analysts:

    Technical skills

    Interpersonal skills

    Management skills

    Analytical skills

    Functions:

    Examining the existing IS and procedures of the procedures of the organization with a view to

    find problems and inefficiencies.

    Analyzing the findings to develop a basis for designing a new improved system effectively.

    Designing a new system that maximizes efficiency, minimizes problem and achieves the set

    objectives.

    Testing and implementing the new system, including its appraisal before and after

    implementation, its documentation and regular maintenance.

    Examining the feasibility of new or replacement system proposal.

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    10

    Unit -2 Period: 10

    Topic: Introduction of system analysis & system design

    System analysis is the process of investing a system, identifying problems, and using the

    information to recommend improvements to the system.

    System analysis is a systematic investigation of areal or planned system to determine the functions of the system and how they relate to each other and to other system

    Characteristics:

    Top-down approach Use of tools and techniques Abstraction of models Users role Iterative development Use of advanced technology

    Objectives:

    To describe what the customer requires. To establish a basis for the creation of a software design To define a set of requirement that can be validated once the software is built,

    special notation and graphical symbols are used to describe and partition the

    functionality of system.

    System design is the process of planning a new business system or one to replace or

    complement an existing system.

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    11

    Unit -2 Period: 11

    Topic: SDLC

    System Development Life Cycle: The Systems Development Life Cycle (SDLC) is a

    conceptual model used in project management that describes the stages involved in an

    information system development project from an initial feasibility study through maintenance

    of the completed application.

    Phases of software development cycle:

    System study

    Feasibility study

    System analysis

    System design

    Coding

    Testing

    Implementation

    Maintenance

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    12

    Unit -2 Period: 12

    Topic: SSLC

    SYSTEM SOFTWARE LIFE CYCLE MODELS: software development process, also

    known as a software development life cycle (SDLC), is a structure imposed on the development of a

    software product. Similar terms include software life cycle and software process. It is often considered

    a subset of systems development life cycle. There are several models for such processes, each

    describing approaches to a variety of tasks or activities that take place during the process. Some

    people consider a lifecycle model a more general term and a software development process a more

    specific term. For example, there are many specific software development processes that 'fit' the spiral

    lifecycle model. ISO/IEC 12207 is an international standard for software lifecycle processes. It aims

    to be the standard that defines all the tasks required for developing and maintaining software.

    1. Classical waterfall model

    2. Iterative waterfall model

    3. Prototyping model

    4. Evolutionary model

    5. Spiral model

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    13

    Unit -2 Period: 13

    Topic: System analysis & system design

    Systems analysis is a process of collecting factual data, understand the processes involved,

    identifying problems and recommending feasible suggestions for improving the system

    functioning. This involves studying the business processes, gathering operational data,

    understand the information flow, finding out bottlenecks and evolving solutions for

    overcoming the weaknesses of the system so as to achieve the organizational goals. System

    Analysis also includes subdividing of complex process involving the entire system,

    identification of data store and manual processes.

    System Design

    Based on the user requirements and the detailed analysis of the existing system, the new

    system must be designed. This is the phase of system designing. It is the most crucial phase

    in the developments of a system. The logical system design arrived at as a result of systems

    analysis is converted into physical system design. Normally,

    the design proceeds in two stages:

    1. Preliminary or General Design

    2. Structured or Detailed Design

    Preliminary or General Design: In the preliminary or general design, the features of the

    new system are specified. The costs of implementing these features and the benefits to be

    derived are estimated. If the project is still considered to be feasible, we move to the detailed

    design stage.

    Structured or Detailed Design: In the detailed design stage, computer oriented work begins

    in earnest. At this stage, the design of the system becomes more structured. Structure design

    is a blue print of a computer system solution to a given problem having the same components

    and inter-relationships among the same components as the original problem. Input, output,

    databases, forms, codification schemes and processing specifications are drawn up in detail.

    In the design stage, the programming language and the hardware and software platform in

    which the new system will run are also decided.

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    14

    Unit -2 Period: 14

    Topic: Tools

    Systems Analysis

    Analysis of existing hardware/software

    User requirements analysis

    Logical systems design:

    Conceptual data model (Entity-Relationship Diagram)

    Conceptual process model (Data Flow Diagram)

    Functional application description

    Systems Design

    Relational database model and data dictionary (sometimes included in Systems Analysis phase)

    Detailed description of application inputs and outputs

    Detailed conceptual design of forms, reports, application programs and other application components

    Yields System Design Specification

    There are several tools and techniques used for describing the system design of the system.

    These tools and techniques are:

    1. Flowchart

    2. Data flow diagram (DFD)

    3. Data dictionary

    4. Structured English

    5. Decision table

    6. Decision tree

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    15

    Unit -2 Period: 15

    Topic: Data flow diagram & Entity relationship

    A data-flow diagram (DFD) is a graphical representation of the "flow" of

    data through an information system. DFDs can also be used for the

    visualization of data processing (structured design).

    An entity-relationship model (ERM) is an abstract and conceptual

    representation of data.

    Entity-relationship modeling is a database modeling

    method, used to produce a type of conceptual representation data model of

    a system, often a relational database. Diagrams created by this process are

    called Entity-Relationship Diagrams (or) ER diagrams, or ERDs.

    COMPONENTS OF AN ERD:

    1. Object types

    2. Relationships

    3. Associative object type indicators

    4. Super type / sub type indicators.

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    16

    Unit -2 Period: 16

    Topic: Object Modeling

    OBJECT MODELING TECHNIQUE (OMT) is a well-known example of a software

    engineering methodology .it deals with object- oriented development in the analysis &

    design phases.

    The analysis phase starts with a problem statement which includes a list of goals & a

    definitive enumeration of key concepts within a domain.

    This problem statement is then expanded into three views or models.

    - object model

    - dynamic model

    -functional model

    The system design phase follows the analysis phase. Here the overall architecture is

    established.

    The OMT software engineering methodology is sequential in the sense that first comes

    analysis, followed by design. In each phase, a cyclical approach is taken among the smaller

    steps. The OMT is very much like the Booch methodology where emphasis is placed on the

    analysis and design phases for initial product delivery. Both the OMT and Booch do not

    emphasize implementation, testing, or other life cycle stages.

    OOAD-Object oriented analysis and design.

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    17

    Unit -2 Period: 17

    Topic: DBMS-database management system

    DATA BASE: A Collection of integrated data items that can be retrieved for various applications. A Database is a collection of related files

    DBMS is a set of systems software programs that organizes and maintains in a database for

    providing the information.

    DBMS is system software used to manage the organization, storage, access, security and

    integrity of data in a structured database.

    That permits an organization to centralize data, manage them efficiently, and provide

    access to the stored data by application programs.

    DBMS- Special software to create & maintain a database & enable individual business

    applications to extracts the data they need without having to create separate files or

    data definitions in their computer programs

    A DBMS has three components:

    Data Definition Language

    Data Manipulation Language

    Data dictionary

    TYPES OF DATABASE

    Operational database

    Analytical database

    Data warehouse

    Distributed database

    End-user database

    External database

    Function of DBMS: Stores data in a uniform and consistent way, Organizes the data,

    Accesses the files updates the records, Retrieves data as requested, Adding and deleting

    records, Reorganizing the data base by reassigning storage space processing more efficient.,

    Provides data security

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    18

    Unit -2 Period: 18

    Topic: RBMS

    RDBMS RELATIONAL DBMS

    RDBMS may be a DBMS in which data is stored in the form of tables and the

    relationship among the data is also stored in the form of tables.It represents all data in the

    database as simple two dimensional tables called relations. Tables may be referred to as files.

    Information in more than one file can be extracted and combined.

    RDMBS structured query language (SQL) is the principal data manipulation language for

    relational DBMS & major tool for querying , updating , reading a relational database.

    The most popular RDBMS are MS SQLserver,DB2, Oracle, and MySQL

    RDBMS components

    Interface drivers

    SQL engine

    Transaction engine

    Relational engine

    Storage engine

    Difference between DBMA & RDBMS

    DBMS is single user system. RDBMS is a multi user system.

    DBMS do not store data in the table format while RDBMS stores data in the form of

    table.

    Most of the DBMS are not supporting client / server architecture as it is supported by

    RDBMS

    Most of the DBMS do not support distributed databases while RDBMS is do that.

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    19

    Unit -2 Period: 19

    Topic: OODBMS

    In programming languages is to utilize objects, thereby making OODBMS in the 1980s. OO (Object Oriented) programmers can develop the product, store them as

    objects, and can replicate or modify existing objects to make new objects within the

    OODBMS. Information today includes not only data but video, audio, graphs, and photos

    which are considered complex data types that relational database could not.

    Its consistent, data independent, secure, controlled & extensible data management services to support the object oriented model. They were created to handle big & complex data that relational databases could not.

    Its stores the data & procedure as objects that can be automatically retrieved & shared. OODBMS are becoming popular because they can be used to manage the

    various multimedia components or java applets used in web applications, drawings

    images , photographs, voice, and full motion videos etc.

    OBJECT ORIENTED PROGRAMMING RESULTS IN 4 CHARACTERSITICS:

    1. INHERITANCE

    2. DATA ENCAPSULATION

    3. OBJECT IDENTITY

    4. POLYMORPHISM

    ADVANTAGES:

    Object oriented is a more natural way of thinking

    The defined operations of those types of systems are dependent on the particular database applications running at a given moment.

    Data types of object oriented databases can be extend to support complex data, such as images , digital & audio/ video along with other multi-media operations.

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    20

    Unit -3 Period: 20

    Topic: Financial Information system

    FINANCIAL INFORMATION SYSTEM

    Finance function is responsible for overall financial planning and raising of capital.

    Financial IS has a significant impact on other IS when one considers that the ultimate

    common denominator of many operating decisions in finance.

    INPUT SUBSYSTEM: OUTPUT SUBSYSTEM:

    Transactional data forecasting

    Forecasting data funds management

    Financial intelligence audit and control

    Financial strategic data

    INPUT SUBSYSTEM OUTPUT SUBSYSTEM

    TRANSACTIONAL DATA

    FORECASTING DATA

    FINANCIAL

    INTELLIGENCE DATA

    FINANCIAL

    STRATEGIC

    DATA

    DATA

    BASE

    FORECASTING

    USERS

    FUNDS

    MANAGEMENT

    AUDIT &

    CONTROL

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    21

    Unit -3 Period: 21

    Topic: Marketing Information system

    MARKETING INFORMATION SYSTEM

    Marketing is concerned with identifying the needs & wants of customers & effectively offer

    goods & services.The role of Marketing IS to assess the managers information needs, develop

    the needed information and distribute that information in a timely fashion.

    The INPUT subsystems of marketing IS are:

    Internal records system

    Marketing intelligence system

    Marketing research system

    Marketing decision support and analysis system

    MARKETING INFORMATION SYSTEM

    INTERNAL RECORDS

    MARKETING

    INTELIGENCE DATA

    MARKETING

    RESEARCH DATA

    MARKETING

    DECISION

    SUPPORT

    DATA

    DATA

    BASE

    PRODUCT

    PLAAN

    PRICE PLAN

    PLACE

    PLAN

    PROMOTION

    PLAN

    OTHER

    AREAS

    EXTERNAL

    ENVIRONMENT

    INPUT SUB SYSTEM OUTPUT SUB SYSTEM

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    22

    Unit -3 Period: 21

    Topic: Personnel Information system

    PERSONNEL INFORMATION SYSTEM-PIS

    PIS is a staff function that supports the activities of the firms line functions. The functions

    carried out by personnel administration generally impact all other functional areas of an

    organization.

    INPUT SUBSYSTEM: OUTPUT SUBSYSTEM

    Transactional Data organizational resource planning

    Functional plans organizational management

    External data payroll & admin

    INPUT OUTPUT

    TRANSACTIONAL DATA

    FUNCTIONAL PLANS

    EXTERNAL DATA

    DATA

    BASE

    ORGANISATIONAL

    RESOURCE

    PLANNING

    USERS ORGANISATIONAL

    MANAGEMENT

    PAYROLL

    ADMIN

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    23

    Unit -3 Period: 22

    Topic: Production Information system

    Inputs to the Manufacturing MIS

    Strategic plan or corporate policies.

    The TPS:

    Order processing

    Inventory data

    Receiving and inspecting data

    Personnel data

    Production process

    External sources

    Manufacturing MIS Subsystems and Outputs

    Design and engineering

    Master production scheduling

    Inventory control

    Manufacturing resource planning

    Just-in-time inventory and manufacturing

    Process control

    Computer-integrated manufacturing (CIM)

    Quality control and testing

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    24

    Unit -3 Period: 24

    Topic: Materials Information System

    Materials Information System signifies one and the same system, which

    helps the materials managers to know where the required item is available

    for production.

    Materials intelligence

    Selection of right quality, quantity, and supplier.

    Planning for both short & long term

    MRP

    Budgeting

    Unit -3 Period: 25

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    25

    Topic: DSS-Decision Support System

    MANAGEMENT SUPPORT SYSTEM MSS: Management support system focus on managerial uses of information resources. These systems provide information to managers for

    planning and decision making by internal & external data.

    3 types of Management support system:

    Decision support system-DSS

    Executive information support system-EIS

    Expert system.

    DSS are designed to support the decision making process of managers to improve their

    effectiveness & thereby efficiency of the enterprise. DSS are also described as interactive IS

    that help managers utilize data analysis models to solve unstructured problems.

    A DSS is an interactive , flexible , and adaptable computer based information system that utilizes decision rules , models, & model base coupled with a comprehensive

    database & the decision makers own insight, leading to specific, implemental decisions

    in solving problems that would not be amenable to a management science models per..

    This definition clearly presents the characteristics of a DSS:

    Is a MSS whose capabilities go beyond those of MIS?

    Is only supportive in nature & human decision makers still retain their supremacy.

    Is individual specific.

    Extensively uses databases.

    Also incorporates various mathematical, statistical, operational research models.

    Provides good user interfaces for decision makers.

    TYPES AND FEATURES OF DSS:

    DSS may be a data or model oriented.

    The data oriented DSS have greater input of data RETRIEVEL & DATA ANALYSIS.

    Model oriented DSS has powerful facilities for simulation of decision scenarios by estimating the outcome of action & generating suggestions.

    Unit -3 Period: 26

    Topic: EIS-EXECUTIVE INFORMATION SYSTEMS-EIS

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    26

    The top executives need fast access to up-to-date, concise information & exception reports

    with facilities to personalized information & analysis. The IS designed to provide to such

    needs of top executives are called executive IS (EIS) or executive support systems. IS is a

    software, front ended by a user-terminal and a interface. It electronically provides executives

    with rapid & reliable access to information regarding key areas of business, and helps them to

    perm their management functions and achieve business objectives.

    CHARACTERISTICS OF EIS:

    Need for a separate executive database.

    Data aggregation facilities

    Highly user-friendly interface

    Flexible menu- based data retrieval

    High-quality business graphics

    Simple modeling facilities

    Communications

    Automated links to others databases.

    HOW DOES AN EIS WORK

    On the basis of identification & monitoring of key performance indicators (KPI) & critical success factors (CSF).

    Typical status reporting facilities provided by an EIS include

    Drill-down- offer highest level of summary data with over-view of performance of each.

    Exception reporting- opposite of drill down , instead of starting with aggregate information and later digging for details , looks for details against user- defined levels

    of acceptability.

    Trend monitoring- finding out the directions in which a given set of numbers is

    moving.

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    27

    Unit -3 Period: 27

    Topic: KMS

    KMS refers to a system for managing knowledge in organizations for

    supporting creation, capture, storage and dissemination of information.

    The idea of a KM system is to enable employees to have ready access to the

    organization's documented base of facts, sources of information, and solutions.

    Sharing of valuable organizational information throughout organizational

    hierarchy.

    Can avoid re -inventing the wheel, reducing surplus work.

    May reduce training time for new employees

    Retention of Intellectual Property after the employee leaves if such knowledge

    can be stored.

    KNOWLEDGE WORK SYSTEMS (KWS):

    The KWS are specially designed to promote the creation of

    knowledge and to ensure that new knowledge & technical expertise are properly

    integrated into the business.

    Includes researchers, designers, architects, scientist and engineers who

    primarily create knowledge and information for the org..

    Examples CAD/CAM, 3D visualization, virtual reality systems, Investment

    workstations.

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    28

    Unit -3 Period: 28

    Topic: GIS-GEOGRAPHICAL INFORMATION SYSTEM

    A Geographic information system (GIS) is a computer program for storing, retrieving,

    analyzing, & displaying cartographic data. Technically, a GIS is a system that includes

    mapping software & its application to remote sensing, land surveying, aerial photography,

    geography, & tools that can be implemented with GIS software.

    A Geographic information system is a computer system that uses location information:

    Address

    Postal code

    Census block

    Latitude / longitude coordinates

    With a GIS, you can:

    Map customers to study demographics

    Look for patterns in the way a disease is spreading

    Model the path of atmospheric pollution

    And much more

    A GIS can also map information stored in:

    Spreadsheets

    Database

    GIS allows you to see:

    Patterns

    Relationships

    Trends

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    29

    Unit -3 Period: 29

    Topic: INTERNATIONAL INFORMATION SYSTEM-IIS

    Business is turning themselves into global organization. To handle these challenges the

    companies will need faster communications and information processing.

    Company will have to rely more on information technology to manage global

    organization. This type of creation of IS in co operating in one or more countries is

    referred to as IIS.

    Globalization

    Barriers to ISS:

    Legal issues

    Market access issues

    Financial issues

    Language and translation

    Purchasing in different currencies

    Challenges of ISS:

    Technological challenges

    Regulations and tariffs

    Differences in payment mechanisms

    Language differences

    Cultural differences

    Conflicting economic, scientific and security interests

    Political challenges

    Different standards

    Legal barriers

    Different time zones.

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    30

    Unit -4 Period: 30

    Topic: Introduction to SECURITY AND CONTROL

    SECURITY:

    Security refers to the protection of computer based resources hardware, software,

    data, procedures and people against alteration, destruction, or unauthorized use.

    All computer systems & communications channels face security threats that can compromise

    systems, the services provided by the systems, and data stored on or transmitted between

    systems.

    The most common threats are:

    denial-of-service

    Interception

    Manipulation

    Masquerading

    repudiation

    CONTROLS

    The combination of manual and automated measures that safeguards IS and ensure that they perform according to management standards is termed controls.

    Controls consist of all the methods, policies, and organizational procedures that ensure the safety of the organization assets the accuracy and reliability of its

    accounting records, and operational adherence to management standards.

    Properly designed controls may prevent errors from occurring, deter criminals from attacking the system, and deny access to authorized persons.

    General controls

    Physical controls

    Access controls

    Biometric controls

    Data security controls

    Other general controls

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    31

    Unit -4 Period: 31

    Topic: Security system & types of testing

    CHALLENGES OF IS SECURITY:

    Internal the mode of attack is within the organization. For example, employees misusing their authentication right and access permissions.

    External originating outside the organization, for example, hackers and viruses.

    Natural due to natural disasters or system failure, for example, earthquakes.

    TESTING

    Security testing is possibly the surest determinant of whether a system is configured and continues to be configured to the correct security controls and policy.

    Security testing is a process to determine that an information system protects data and maintains functionally as intended.

    Security testing provides insight into the other system development life cycle activities such as risk analysis and contingency planning.

    Security testing results should be documented and made available foe staff involved in other IT AND Security related areas.

    Specifically, security testing results can be used in the following ways:

    As a reference point for corrective action.

    In defining mitigation activities to address identified vulnerabilities.

    As a benchmark for tracking an organization progress in meeting security

    requirement.

    To assess implementation status of system security requirement.

    To conduct cost/ benefit analysis for improvement to system security

    To enhance other life-cycle activities, such as risk assessments, certification and

    authorization (C&A), performance improvement efforts.

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    32

    Unit -4 Period: 32

    Topic: Error Deduction & controls: Controls consist of all the methods, policies, and

    organizational procedures that ensure the safety of the organization assets the accuracy and

    reliability of its accounting records, and operational adherence to management standards.

    Properly designed controls may prevent errors from occurring, deter criminals from attacking

    the system, and deny access to authorized persons.

    General controls

    Physical controls

    Access controls

    Biometric controls

    Data security controls

    Other general controls

    Application controls

    Input controls

    Processing controls

    Output controls

    Controls for network protection

    Access control

    Encryption

    Cable testers

    firewalls

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    33

    Unit -4 Period: 33

    Topic: IS Vulnerability

    VULNERABILITY

    In computer security, the term vulnerability is a weakness which allows an attacker to

    reduce a system information assurance.

    vulnerability is the intersection of 3 elements:

    A system susceptibility or flaw, attacker access to the flaw, and attacker capacity to

    exploit the flaw.

    IS vulnerability

    It is termed as a flaw [fault] or weakness in system security procedure, design,

    implementation, or internal controls that could be exercised (accidentally triggered or

    intentionally exploited) and result in a security breach or a violation of the system

    security policy.

    CAUSES OF VULNERABILITY

    Complexity

    Familiarity

    Connectivity

    Password management flaws

    Fundamental operating system design flaws

    Internet website browsing

    Software bugs

    Unchecked user input

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    34

    Unit -4 Period: 34

    Topic: Computer crimes

    Its includes traditional criminal acts committed with a computer as well as new

    offenses that lack any parallels with non-computer crimes

    The U.S department of justice [DOJ] broadly defines computer crimes as any

    violations of criminal law that involve knowledge of computer technology for their

    perpetration, investigation, or prosecution.

    Cyber-crimes are frequently grouped into 3 categories.

    The first are those in which the computer comprises the object of crime and in which the perpetrator targets the computer itself.

    The second category involves those in which the computer forms the subject of a crime, either as the physical site of the offense or as the source of some form of loss

    or damage.

    Third, which computer serves the instrument used to commit traditional crimes in cyberspaces? This encompasses offenses like cyber-fraud, online harassment, and

    child pornography.

    Types of computer crimes:

    Spam

    Fraud

    Obscene or offensive content

    Harassment

    Drug trafficking

    Cyber terrorism

    Cyber crime: Any criminal activity that uses a computer either as an instrumentally, target

    or means for perpetuating further crimes comes within the ambit of cyber crime. A

    generalized definition is unlawful acts wherein the computer is either a tool or target or

    both

    Reasons for cyber crimes:

    Capacity to store data in comparatively small space.

    Easy to access. Complex, Negligence, Loss of evidence

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    35

    Unit -4 Period: 35

    Topic: SECURING THE WEBSITE

    Right when choosing your web hosting company you need to ask about their servers & how

    secure they are. Do they update software quickly & automatically? What operating system is

    used & is used and is it secure?

    Make sure that if you have sensitive data such as a customer credit card / personal

    information that is transmitted or stored, keep data secure.

    Use packet filtering and firewall settings to restrict unauthorized sites. Make it password

    protected.

    Vulnerability scanners are used in some cases to find the weakness in yours sites security.

    Once your business is connected to the internet, its your responsibility to protect your

    business data & information against unwanted intruders.

    You should ensure that your connection to the internet is secure. Some issues to consider

    when securing your website are:

    Working procedures

    Virus and spy ware protection software

    Firewalls

    Back up data

    Using secure passwords

    Ensure the security of your electronic transactions:

    Spoofing

    Unauthorized disclosure

    Unauthorized action

    Data alteration

    Antivirus:

    Malware Viruses, Trojans, Spy ware, Worms, Bots.

    Anti-spy ware

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    36

    Unit -4 Period: 36

    Topic: security the Intranets and Wireless Networks

    Securing the intranet: An intranet is an internal information system based on internet

    technology, web services, TCP/IP and HTTP communication protocols and HTML

    publishing

    The intranet is a technology that allows an organization to define itself as a whole entity, a

    group, where everyone knows their roles, and everyone is working on the improvement and

    health of organization

    Its a smaller version of internet that only the members of an organization can see internal

    network by keeping it private, secure and affordable.

    Business applications of intranet: organization use intranets for variety of internal functions.

    Human resources intranet

    Sales and marketing intranet

    Information system intranet

    Executive or corporate intranet

    Customer service intranet

    Finance intranet

    Advantages of an intranet:

    Exchange files with other branches, co or people is much faster than traditional

    methods

    Global communication is another advantages

    Inter-office network communication network

    Timely updates

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    37

    Unit -4 Period: 37

    Topic: Software Audit

    AUDIT:

    Audits provide an independent evaluation of software products or process to ascertain

    compliance to standards, specifications, and procedures based on objectives criteria that

    included documents that specify.

    Software audit is a regular investigation of the software installed on all computers in an

    organization to ensure that it is authorized or licensed.

    Software audit minimize the risk of prosecution for software theft, minimize the risk of

    viruses through uncontrolled software copying and ensure technical support is available to all

    users.

    Purpose or need for software audit:

    To identify critical security issues before they are exploited.

    To perform extensive, regular security audit on the installed software or systems to

    reduce vulnerabilities

    To locate the most problematic crashes of application, and improving debug (clear up,

    correct, sort out) capabilities.

    To conduct software vulnerability assessment, and gain control over organization

    private data etc.

    Auditing regularly the commercial software, provide quality assurance requirement .

    SOFTWARE AUDIT REVIEW:

    Type of software review in which one or more auditors who are not members of the

    software development organization conduct.

    An independent examination of software product, software process, or set of

    software process to access compliance with specifications, standards, contractual

    agreement, or other criteria.

    Software product is kind of technical document, IEEE std.1028 offers a list of 32

    examples of software products subjects to audit

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    38

    Unit -4 Period: 38

    Topic: Ethics in IT

    Ethics is a moral code and set of rules which establishes boundaries of generally accepted

    behavior. Morality is social conventions about right and wrong. Ethics is a set of beliefs

    about right and wrong behavior. Ethical behavior conforms to generally accepted social

    norms.

    Ethics in IT:

    Data mining

    Social networking

    E-mail spam

    Intellectual property / IT

    Filtering online content

    Ethics and IT professionals:

    The IT professional like programmers , system analysts, software, software engineers,

    database administrators, local area network [LAN] administrators, chief information

    officers [CIO's] are responsible to following stakeholders in terms of keeping ethical

    behavior in IT.

    Relationships between IT professionals and employers.

    Relationships between IT professionals and clients

    Relationships between IT professionals and suppliers

    Relationships between IT professionals and other professionals

    Relationships between IT professionals and IT users

    Relationships between IT professionals and society

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    39

    Unit -5 Period: 39

    Topic: e-Business & its Classification

    Electronic commerce or e-commerce refers to a wide range of online business activities for

    products and services.1 It also pertains to any form of business transaction in which the parties interact electronically rather than by physical exchanges or direct physical contact.

    Is e-commerce the same as e-business?

    While some use e-commerce and e-business interchangeably, they are distinct concepts. In e-

    commerce, information and communications technology (ICT) is used in inter-business or

    inter-organizational transactions (transactions between and among firms/organizations) and in

    business-to-consumer transactions (transactions between firms/organizations and

    individuals).

    In e-business, on the other hand, ICT is used to enhance ones business. It includes any process that a business organization (either a for-profit, governmental or non-profit entity)

    conducts over a computer-mediated network.

    A more comprehensive definition of e-business is: The transformation of an organizations processes to deliver additional customer value through the application of technologies, philosophies and computing paradigm of the new economy.

    What are the different types of e-commerce?

    The major different types of e-commerce are:

    1. business-to-business (B2B);

    2. business to-consumer (B2C);

    3. business-to-government (B2G);

    4. consumer-to-consumer (C2C);

    5. mobile commerce (m-commerce)

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    40

    Unit -5 Period: 40

    Topic: e-governance

    The term e-government is of recent origin and there exists no standard definition since the

    conceptual understanding is still evolving. The generally accepted definition is: "e-

    government" or electronic government refers to the use of Information and Communication

    Technologies (ICTs) by government agencies for any or all of the following reasons:

    Exchange of information with citizens, businesses or other government departments Speedier and more efficient delivery of public services Improving internal efficiency Reducing costs or increasing revenue Re-structuring of administrative processes

    Defining e-governance: The application of electric means in: [1] the interaction between

    government and citizens and government and business, as well as in [2] internal

    government operations to simplify and improve democratic, government and business

    aspects of governance.

    E-administration

    E-services

    E-governance

    E-democracy

    Delivery models & activities of e- governance:

    Government-to-citizen or Government-to-customer[G2C]

    Government-to-business[G2B]

    Government-to- Government[G2G]

    Government-to-employees[G2E]

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    41

    Unit -5 Period: 41

    Topic: ERP

    Enterprise resource planning (ERP) systems integrate internal and external management

    information across an entire organization, embracing finance/accounting, manufacturing,

    sales and service, customer relationship management, etc. ERP systems automate this activity

    with an integrated software application. Their purpose is to facilitate the flow of information

    between all business functions inside the boundaries of the organization and manage the

    connections to outside stakeholders.ERP is a software architecture that facilitates the flow of

    information among the different functions within an enterprise. Similarly, ERP facilitates

    information sharing across organizational units and geographical locations. It enables

    decision-makers to have an enterprise-wide view of the information they need in a timely,

    reliable and consistent fashion.

    A business strategy and set of industry-domain-specific applications that build customer and shareholder communities value network system by enabling and

    optimizing enterprise and inter-enterprise collaborative operational and financial

    processes

    Installing an ERP system has many advantages - both direct and indirect. The direct

    advantages include improved efficiency information integration for better decision-making,

    faster response time to customer queries, etc.

    The indirect benefits include better corporate image, improved customer goodwill, customer

    satisfaction and so on. Some of the benefits are quantitative (tangible) while others are non-

    quantitative (intangible).

    Tangible benefits are those measured in monetary terms and intangible benefits cannot be

    measured in monetary terms but they do have a very significant business impact.

    Tangible benefits:

    Improves the productivity of process and personnel

    Lowering the cost of products and services purchased

    Paper and postage cost reductions

    Inventory reduction

    Lead time reduction

    Reduced stock obsolescence

    Faster product / service look-up and ordering saving time and money

    Automated ordering and payment, lowering payment processing and paper costs

    Intangible benefits:

    Increases organizational transparency and responsibility

    Accurate and faster access to data for timely decisions

    Can reach more vendors, producing more competitive bids ;

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    42

    Unit -5 Period: 42

    Topic: SCM

    A supply chain is a network of facilities and distribution options that performs the functions of

    procurement of materials, transformation of these materials into intermediate and finished products,

    and the distribution of these finished products to customers. Supply chains exist in both service and

    manufacturing organizations, although the complexity of the chain may vary greatly from industry to

    industry and firm to firm.

    There are four major decision areas in supply chain management: 1) location, 2) production,

    3) inventory, and 4) transportation (distribution), and there are both strategic and operational

    elements in each of these decision areas.

    Information In The Supply Chain

    Source Make Deliver Sell

    Suppliers Manufacturers Warehouses &

    Distribution Centers

    Retailer

    Order Lead

    Time

    Delivery Lead

    Time

    Production Lead

    Time

    Each facility further away from actual customer demand must make forecasts of demand

    Lacking actual customer buying data, each facility bases its forecasts on downstream orders, which are more variable than actual demand

    To accommodate variability, inventory levels are overstocked thus increasing inventory carrying costs

    Its estimated that the

    typical pharmaceutical

    company supply chain

    carries over 100 days of

    product to

    accommodate

    uncertainty

    Plan

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    43

    Unit -5 Period: 43

    Topic: e-CRM

    e-CRM This concept is derived from E-commerce. It also uses net environment i.e., intranet, extranet

    and internet. Electronic CRM concerns all forms of managing relationships with customers making

    use of Information Technology (IT). eCRM is enterprises using IT to integrate internal organization

    resources and external marketing strategies to understand and fulfill their customers needs.

    Comparing with traditional CRM, the integrated information for eCRM intraorganizational

    collaboration can be more efficient to communicate with customers.

    Major differences between CRM and eCRM :

    Customer contacts

    CRM Contact with customer made through the retail store, phone, and fax. eCRM All of the traditional methods are used in addition to Internet, email, wireless,

    and PDA technologies.

    System interface

    CRM Implements the use of ERP systems, emphasis is on the back-end. eCRM Geared more toward front end, which interacts with the back-end through use of

    ERP systems, data warehouses, and data marts.

    System overhead (client computers)

    CRM The client must download various applications to view the web-enabled applications. They would have to be rewritten for different platform.

    eCRM Does not have these requirements because the client uses the browser.

    Customization and personalization of information

    CRM Views differ based on the audience, and personalized views are not available. Individual personalization requires program changes.

    eCRM Personalized individual views based on purchase history and preferences. Individual has ability to customize view.

    System focus

    CRM System (created for internal use) designed based on job function and products. Web applications designed for a single department or business unit.

    eCRM System (created for external use) designed based on customer needs. Web application designed for enterprise-wide use.

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    44

    Unit -5 Period: 44

    Topic: Data warehousing & data mining

    In computing, a data warehouse (DW) is a database used for reporting and analysis. The

    data stored in the warehouse is uploaded from the operational systems. The data may pass

    through an operational data store for additional operations before it is used in the DW for

    reporting.

    A data warehouse maintains its functions in three layers: staging, integration, and access.

    Staging is used to store raw data for use by developers. The integration layer is used to

    integrate data and to have a level of abstraction from users. The access layer is for getting

    data out for users.Data warehouses can be subdivided into data marts. Data marts store

    subsets of data from a warehouse.

    Data mining (the analysis step of the knowledge discovery in databases process or KDD),

    a relatively young and interdisciplinary field of computer science is the process of

    discovering new patterns from large data sets involving methods at the intersection of

    artificial intelligence, machine learning, statistics and database systems. The goal of data

    mining is to extract knowledge from a data set in a human-understandable structure and

    involves database and data management, data preprocessing, model and inference

    considerations, interestingness metrics, complexity considerations, post-processing of found

    structure, visualization and online updating.

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    45

    Unit -5 Period: 45

    Topic: Business Intelligence

    Business intelligence (BI) mainly refers to computer-based techniques used in identifying,

    extracting and analyzing business data, such as sales revenue by products and/or departments,

    or by associated costs and incomes. BI technologies provide historical, current and predictive

    views of business operations. Common functions of business intelligence technologies are

    reporting, online analytical processing, analytics, data mining, process mining, complex event

    processing, business performance management, benchmarking, text mining and predictive

    analytics.

    BI is a business management term which refers to applications and technologies which are

    used to gather, provide access to, and analyze data and information about their company

    operations

    The 5 key stages of BI:

    1. Data sourcing

    2. data analysis

    3. data situation awareness

    4. risk assessment

    5. decision support

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    46

    Unit -5 Period: 46

    Topic: Pervasive computing

    The word pervasive and ubiquitous mean existing everywhere. It is growing trend

    towards embedding microprocessors in everyday objects so they can communicate

    information.

    According to Mark Weise, Pervasive computing is roughly the opposite of virtual

    reality. Where virtual reality puts people inside a computer -generated world, Pervasive

    computing forces the computer to live out here in the world with people.

    PRINCIPLES:

    DECENTRALIZATION

    DIVERSIFICATION

    CONNECTIVITY

    SIMPLICITY

    TECHNOLOGIES:

    COMPUTING-DEVICES

    COMMUNICATIONS-CONNECTIVITY

    USER INTERFACES

  • G.K.M College of Engineering & Technology

    Department of Management Studies

    SubjectName: Management Information System R/TP/01

    Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer

    Class: MBA I Year/II Semester

    47

    Unit -5 Period: 47

    Topic: CMM

    What is the Capability Maturity Model (CMM)?

    The application of process management and quality improvement

    concepts to software development and maintenance.

    A guide for evolving toward a culture of engineering excellence.

    A model for organizational improvement.

    Focuses on practices that are under control of the software group

    Presents a minimum set of recommended practices that have been shown to

    enhance a software development and maintenance capability

    It defines the expectation (the what)

    Without overly constraining the implementation (the how)

    Levels of CMM:

    1. Initial level

    2. Repeatable level

    3. Defined level

    4.Managed level

    5.Optimizing level