Professional Documents
Culture Documents
Introduction of MIS
Howard Gardner
David Perkins
Robert Sternberg
SOURCE
COLLECTION
ALLOCATION
PROCESSING
OUTPUT
OF DATA
DATA
TO REDUCE UNCERTAINITY
INFORMATION
USER
DECISION
TO BE COMPETITIVE
Information systems
Electronic data processing
1961-70
Management information
system
1971-80
MIS
expert systems
E-commerce systems
multi-media systems
differences in:
users
size, scope
Who is system analyst: A system analyst is the person who selects and configures computer
systems for an organization or business. His or her job typically begins with determining the
intended purpose of the computers. When configuring computer systems for a business, the
analyst must select both hardware and software.
In performing these tasks the analyst must always match the information system objectives
with the goals of the organization.
Systems analysts as a consultant
Systems analysts as a programmer
Systems analysts as supporting expert
Systems analysts as agent of change
The architects
Top-down approach
Use of tools and techniques
Abstraction of models
Users role
Iterative development
Use of advanced technology
Objectives:
To describe what the customer requires.
To establish a basis for the creation of a software design
To define a set of requirement that can be validated once the software is built,
special notation and graphical symbols are used to describe and partition the
functionality of system.
System design is the process of planning a new business system or one to replace or
complement an existing system.
10
System study
Feasibility study
System analysis
System design
Coding
Testing
Implementation
Maintenance
11
12
Preliminary or General Design: In the preliminary or general design, the features of the
new system are specified. The costs of implementing these features and the benefits to be
derived are estimated. If the project is still considered to be feasible, we move to the detailed
design stage.
Structured or Detailed Design: In the detailed design stage, computer oriented work begins
in earnest. At this stage, the design of the system becomes more structured. Structure design
is a blue print of a computer system solution to a given problem having the same components
and inter-relationships among the same components as the original problem. Input, output,
databases, forms, codification schemes and processing specifications are drawn up in detail.
In the design stage, the programming language and the hardware and software platform in
which the new system will run are also decided.
13
Systems Analysis
Systems Design
There are several tools and techniques used for describing the system design of the system.
These tools and techniques are:
1. Flowchart
14
15
- object model
- dynamic model
-functional model
The system design phase follows the analysis phase. Here the overall architecture is
established.
The OMT software engineering methodology is sequential in the sense that first comes
analysis, followed by design. In each phase, a cyclical approach is taken among the smaller
steps. The OMT is very much like the Booch methodology where emphasis is placed on the
analysis and design phases for initial product delivery. Both the OMT and Booch do not
emphasize implementation, testing, or other life cycle stages.
OOAD-Object oriented analysis and design.
16
Data dictionary
TYPES OF DATABASE
Operational database
Analytical database
Data warehouse
Distributed database
End-user database
External database
Function of DBMS: Stores data in a uniform and consistent way, Organizes the data,
Accesses the files updates the records, Retrieves data as requested, Adding and deleting
records, Reorganizing the data base by reassigning storage space processing more efficient.,
Provides data security
17
RDBMS components
Interface drivers
SQL engine
Transaction engine
Relational engine
Storage engine
DBMS do not store data in the table format while RDBMS stores data in the form of
table.
Most of the DBMS are not supporting client / server architecture as it is supported by
RDBMS
Most of the DBMS do not support distributed databases while RDBMS is do that.
18
Its consistent, data independent, secure, controlled & extensible data management
services to support the object oriented model. They were created to handle big &
complex data that relational databases could not.
Its stores the data & procedure as objects that can be automatically retrieved &
shared. OODBMS are becoming popular because they can be used to manage the
various multimedia components or java applets used in web applications, drawings
images , photographs, voice, and full motion videos etc.
ADVANTAGES:
The defined operations of those types of systems are dependent on the particular
database applications running at a given moment.
Data types of object oriented databases can be extend to support complex data, such
as images , digital & audio/ video along with other multi-media operations.
19
INPUT SUBSYSTEM:
OUTPUT SUBSYSTEM:
Transactional data
forecasting
Forecasting data
funds management
Financial intelligence
INPUT SUBSYSTEM
OUTPUT SUBSYSTEM
TRANSACTIONAL DATA
FORECASTING
FORECASTING DATA
USERS
DATA
FINANCIAL
BASE
FUNDS
MANAGEMENT
INTELLIGENCE DATA
AUDIT &
FINANCIAL
CONTROL
STRATEGIC
DATA
20
INTERNAL RECORDS
PLAAN
MARKETING
INTELIGENCE DATA
PRICE PLAN
OTHER
AREAS
DATA
MARKETING
BASE
RESEARCH DATA
PLACE
PLAN
MARKETING
PROMOTION
DECISION
PLAN
SUPPORT
DATA
21
EXTERNAL
ENVIRONMENT
OUTPUT SUBSYSTEM
Transactional Data
Functional plans
organizational management
External data
INPUT
OUTPUT
ORGANISATIONAL
TRANSACTIONAL DATA
RESOURCE
PLANNING
FUNCTIONAL PLANS
DATA
ORGANISATIONAL
BASE
MANAGEMENT
EXTERNAL DATA
PAYROLL
ADMIN
22
USERS
Order processing
Inventory data
Personnel data
Production process
External sources
23
Period: 24
Unit -3
Period: 25
24
Is only supportive in nature & human decision makers still retain their supremacy.
Is individual specific.
Unit -3
Period: 26
Communications
On the basis of identification & monitoring of key performance indicators (KPI) &
critical success factors (CSF).
Trend monitoring- finding out the directions in which a given set of numbers is
moving.
26
27
Address
Postal code
Census block
Spreadsheets
Database
Patterns
Relationships
Trends
28
Technological challenges
Language differences
Cultural differences
Political challenges
Different standards
Legal barriers
29
denial-of-service
Interception
Manipulation
Masquerading
repudiation
CONTROLS
The combination of manual and automated measures that safeguards IS and ensure
that they perform according to management standards is termed controls.
Controls consist of all the methods, policies, and organizational procedures that
ensure the safety of the organization assets the accuracy and reliability of its
accounting records, and operational adherence to management standards.
Properly designed controls may prevent errors from occurring, deter criminals from
attacking the system, and deny access to authorized persons.
General controls
Physical controls
Access controls
Biometric controls
30
Internal the mode of attack is within the organization. For example, employees
misusing their authentication right and access permissions.
External originating outside the organization, for example, hackers and viruses.
TESTING
Security testing is possibly the surest determinant of whether a system is configured
and continues to be configured to the correct security controls and policy.
Security testing is a process to determine that an information system protects data and
maintains functionally as intended.
Security testing provides insight into the other system development life cycle
activities such as risk analysis and contingency planning.
Security testing results should be documented and made available foe staff involved
in other IT AND Security related areas.
Specifically, security testing results can be used in the following ways:
31
Physical controls
Access controls
Biometric controls
Application controls
Input controls
Processing controls
Output controls
Access control
Encryption
Cable testers
firewalls
32
A system susceptibility or flaw, attacker access to the flaw, and attacker capacity to
exploit the flaw.
IS vulnerability
CAUSES OF VULNERABILITY
Complexity
Familiarity
Connectivity
Password management flaws
Fundamental operating system design flaws
Internet website browsing
Software bugs
Unchecked user input
33
Its includes traditional criminal acts committed with a computer as well as new
offenses that lack any parallels with non-computer crimes
The U.S department of justice [DOJ] broadly defines computer crimes as any
violations of criminal law that involve knowledge of computer technology for their
perpetration, investigation, or prosecution.
The first are those in which the computer comprises the object of crime and in
which the perpetrator targets the computer itself.
The second category involves those in which the computer forms the subject of a
crime, either as the physical site of the offense or as the source of some form of loss
or damage.
Third, which computer serves the instrument used to commit traditional crimes in
cyberspaces? This encompasses offenses like cyber-fraud, online harassment, and
child pornography.
Spam
Fraud
Harassment
Drug trafficking
Cyber terrorism
Cyber crime: Any criminal activity that uses a computer either as an instrumentally, target
or means for perpetuating further crimes comes within the ambit of cyber crime. A
generalized definition is unlawful acts wherein the computer is either a tool or target or
both
Reasons for cyber crimes:
Spoofing
Unauthorized disclosure
Unauthorized action
Data alteration
Antivirus:
technology, web services, TCP/IP and HTTP communication protocols and HTML
publishing
The intranet is a technology that allows an organization to define itself as a whole entity, a
group, where everyone knows their roles, and everyone is working on the improvement and
health of organization
Its a smaller version of internet that only the members of an organization can see internal
network by keeping it private, secure and affordable.
Business applications of intranet: organization use intranets for variety of internal functions.
Human resources intranet
Sales and marketing intranet
Information system intranet
Executive or corporate intranet
Customer service intranet
Finance intranet
Advantages of an intranet:
Exchange files with other branches, co or people is much faster than traditional
methods
Global communication is another advantages
Inter-office network communication network
Timely updates
36
To locate the most problematic crashes of application, and improving debug (clear up,
correct, sort out) capabilities.
Type of software review in which one or more auditors who are not members of the
software development organization conduct.
37
Ethics in IT:
Data mining
Social networking
E-mail spam
Intellectual property / IT
38
39
E-administration
E-services
E-governance
E-democracy
Government-to-citizen or Government-to-customer[G2C]
Government-to-business[G2B]
Government-to- Government[G2G]
Government-to-employees[G2E]
40
Intangible benefits:
There are four major decision areas in supply chain management: 1) location, 2) production,
3) inventory, and 4) transportation (distribution), and there are both strategic and operational
elements in each of these decision areas.
Warehouses &
Manufacturers
Retailer
Distribution Centers
Source
Order Lead
Time
Delivery Lead
Time
Make
Deliver
To accommodate variability,
inventory levels are
overstocked thus increasing
inventory carrying costs
Production Lead
Time
42
Sell
CRM Contact with customer made through the retail store, phone, and fax.
eCRM All of the traditional methods are used in addition to Internet, email, wireless,
and PDA technologies.
System interface
CRM The client must download various applications to view the web-enabled
applications. They would have to be rewritten for different platform.
eCRM Does not have these requirements because the client uses the browser.
CRM Views differ based on the audience, and personalized views are not available.
Individual personalization requires program changes.
eCRM Personalized individual views based on purchase history and preferences.
Individual has ability to customize view.
System focus
CRM System (created for internal use) designed based on job function and products.
Web applications designed for a single department or business unit.
eCRM System (created for external use) designed based on customer needs. Web
application designed for enterprise-wide use.
43
Data mining (the analysis step of the knowledge discovery in databases process or KDD),
a relatively young and interdisciplinary field of computer science is the process of
discovering new patterns from large data sets involving methods at the intersection of
artificial intelligence, machine learning, statistics and database systems. The goal of data
mining is to extract knowledge from a data set in a human-understandable structure and
involves database and data management, data preprocessing, model and inference
considerations, interestingness metrics, complexity considerations, post-processing of found
structure, visualization and online updating.
44
45
DECENTRALIZATION
DIVERSIFICATION
CONNECTIVITY
SIMPLICITY
TECHNOLOGIES:
COMPUTING-DEVICES
COMMUNICATIONS-CONNECTIVITY
USER INTERFACES
46
Levels of CMM:
1. Initial level
2. Repeatable level
3. Defined level
4.Managed level
5.Optimizing level
47