Management Information System Applications.pptx

Roshni814224 24 views 49 slides Apr 25, 2024
Slide 1
Slide 1 of 49
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49

About This Presentation

Management Information System Applications


Slide Content

Chapter – 4 Applications of MIS

Information Systems Based on Type of Decisions • Systems that support operational, tactical, and strategic decision are broadly classified into the following categories: • • • Transaction processing systems (TPS) Management information systems (MIS) Intelligent support systems (ISS) , which include decision support systems (EIS), and expert (DSS), executive systems (ES) information systems 2-7

Functional Information Systems • Information systems can also be classified according to function in these four areas: • • • • Marketing Manufacturing and service Accounting and finance H uma n resources 2-9

E I S OAS MI S T P S D S S ES Funct i onal Systems Ds s E I S M IS T P S ES CUSTOMER GIS EDI Figu re 1 : Functi o nal I nformation S y stem

Marketing Information System A system that meets the marketing information needs of an organization. • • Customer-oriented and work toward achieving the strategic sales and marketing plan • Aim is to gain instantaneous access to global market information • Primary goal of retaining existing customers and attracting new ones • Can't be standardized for all companies. Every company has its own • Marketing system must be tailored to match the marketing policies, procedures and practices each company. of • A very popular marketing information system is one that automates sales and marketing functions. • Such systems capture valuable customer information and hence can improve productivity, enhance customer service and create better sales and marketing strategies. • Are influenced by and influence the strategic business plan and the strategic marketing plan.

. - . St rateg i c B u s in e s s P l a n de Strat eg i c S a l es & M a rke ting P l a n dr Strat eg i c I n f o rm a ti o n P l a n d M a rk et i n f o rma ti on S y st e m , r S a l es M a na ge m e n t M a rk e t i n g M i x ( P r od u ct, p l a c e , p r i ce , p r om o t i o n ) Databases E xte rn a l . - , - ... .. - . M a rk et I n t e lli ge n c e M a rk et Ana l ys i s I .. I nt e rn a l M a rk e t R ese a rch Cu st om e r A n a ly s i s F o r e cas ti n g F i gur e2 : M ar ke ting I nfo rmation Sys tem Feedback

Benefits of Marketing Information System Benefits of Marketing Information System Provides employees with information that helps companies capture niche markets in highly competitive Helps in sales forecasting. Able to provide demand forecast. Helps in achieving a company's goal. Marketing Information system have a deep and direct influence on the quality of customer service. Assists the marketing manager to maintain the better relationship with valuable customer.

Manufacturing Information System A system that supports the manufacturing functions of: • • • • • purchasing, receiving, quality control i n v e n t o r y m a n a g e m e n t , m a t e r i a l r e q u i r e m e n t p l a n n i n g , Production scheduling and plant design. Applies to both manufacturing and service industries capacity planning Manufacturing should be viewed within the broad context of delivering both goods and services since a manufacturer of automobile parts and a travel agency are likely to have manufacturing information system. Production system is a subset of manufacturing information system. Production system pertains to the production of goods and services. It specially addresses information needs relating to raw materials, equipment, manpower and other issues related to production of goods and services. • • •

Str ateg i c B u s i n ess P l a n Str a t eg i c M anu fact u ri n g P l a n Str ateg i c In f o rm a ti o n P l a n - - M a nuf act u ri n g dr Ma n ufactu ri n g i n f o rma t io n S yst em J r . Services d P u rchas i ng Recei v i n g Databases ~ Q u a li ty C o ntro l E xte rn a l - - ~ , ~ I nv e nt o ry - ~ M a t e r i a l R e q u i r e m e n t P l a n n i ng C a pa city Pl a nn i n g - - ~ I nt er n a l Sc h ed u li n g F ac i l i ties La yout F i gu r e3 : Manufacturing Information System

Benefits Mfg. Information System • Helps supplier to store such as Home Depot Hardware. Reduces operating cost and inventory levels To achieve strategic goal of company and Ace • •

Financial and Accounting Information System (FAIS) • Provides information related to the accounting and financial activities an organization Includes a large number of subsystems that address the operational, tactical and strategic information needs of the business Includes some subsystems such as budgeting, cash and asset of • • management, capital budgeting, portfolio account receivable, inventory control and Other subsystems include record keeping, analysis, general ledger, payroll systems. account analysis, cash • management, financial analysis, leasing options, insurance underwriting, insurance claims processing and investment management. F i n a n c i a l i n s t i t u t i o n l ik e b an k , u s e s s pe ci a l i z e d F A I S , s u c h a s c o m m e r c i a l l o a n a n a l yz e r s , c r e d i t a ppr o va l s y s t e m , c o mm e r ci a l a c c o u n t r a t i n g s y s t e m , c r e d i t a p p l i c a t i o n s y s t e m , a u t o m a t e d t e l l e r c o n t r o l a n d s e c u r i t i e s t r a d i ng . •

Str ate g i c B u s in ess P l a n St r at eg i c F i n a nci a l P l a n d Stra teg i c I n f o rm a ti o n P l a n • F in a n c i a l & A cco u nti n g I n f o r m at i on S y ste m s G e n er a l L e d ge r Databases As se t m a n a ge m e n t O r d e r e ntry, A cco un ts R ecei v a b l e s , Acco un ts p a y ab l e E xte rn a l I nv e nt o ry co n tro l , Pa y r ol l , C as h m a n age m e n t , Cap i t a l m a n a g e m e n t , In ve st m e n t m a n age m e n t I nt er n a l L o n g - ra n ge F o reca st i n g B u s i n e s s In te l l i g e n c e Figure5 : Finan c ial & A c counting Inf o rmati on Sys tem

Human Resource Information System (HRIS) • Supports the planning, control, coordination, administration and management of an organization's human resources. HR I S includ e s a la r g e n u m b e r o f s u b s y s t e m s t h a t ad d ress t h e i n f o r m a t i o n needs of various human resource functions. They provide managers with information, policies and procedures concerning recruiting, layoffs, employee evaluation, promotion, termination,transfer , salary equity monitoring, job • • descriptions and responsibilities, training, affirmative action and employment opportunities. A n HR I S a lso d e t e r m i n e s h o w h ir i n g a nd t r a i n i n g decisi on s m a d e personnel department can increase sales revenues. equal • by the

St r a t e g i c Bu sin e ss P l an St r a t e g i c H uman Res o ur c e P l a n St r a t eg i c In f ormation P l an Hu man R e s o ur c e I nf o rm at i on System s P e rs o n ne l Data b as e s Pa y r o ll r Be n efit s Exte r n a l E qu it y M o n i t o rin g I nt er n a l R e c rui t ment Co m p li a n c e s ys te ms M a n po w er P l an n i n g F igur e 6: Hum an R esource I nformatio n Sys te m

Developing Cross-functional System Today, the emphasis is on building cross-functional systems that facilitate the flow of information among all units in an organization. Some critics to develop a Cross-functional System are: 1. Decision-making should not be compartmentalized in functional areas, but should instead be viewed in the context of the entire organization 2. A c lo se l i n k i s m ad e in b e t w e e n i n f o r m a t i o n s y s t e m a nd f u n c t i o n a l s y s t e m . 3. System must be designed in such a way that it can work combinely with both the systems For example, a report of the number of people who worked overtime last month or the number of machines that operated during the night shift last month (manufacturing) are often the output of an MIS.

12- 16 Strategic Information Systems

12- 17

12- 18

12- 19 Definition of SIS Researchers have classified IS into three categories: Systems that support business functions Systems that support strategic planning such as DSS and EIS Systems that are a part of a firm’s strategy

12- 20 Definition of SIS Contd… Strategic Information System (SIS) A system that delivers information products and services that play a direct and prominent role in helping the firm achieve its strategic goals.

12- 21 Definition of SIS Contd… An SIS also supplies an organization with Business Intelligence or competitive information Business Intelligence Business Intelligence consists of internal and external data used to assess and analyze opportunities and threats in business environment

12- 22 Types of SIS SIS can be external or internal systems. External strategic systems are used primarily by external entities in the business environment, such as customers, suppliers, and distributors. Benefits to the customer: 1. Increased customer satisfaction 2. Increased customer control 3. Reduction in transaction costs (shipping and handling costs)

12- 23 Types of SIS Contd… SIS can be external or internal systems. Internal Strategic Systems are used by employees within the organization and do not have a value-added component. They focus on issues such as improving the quality of products and services and enhancing the decision-making capabilities of managers. Benefits to the Organization: 1. Increased market share 2. Reduction of processing costs 3. Ability to charge higher prices because of value-added component 4. Increase in profit margins

12- 24 Examples of SIS An example for a SIS is the Automated Teller Machine (ATM) first introduced by Citibank in 1977. This completely revolutionized the system in banking industry and forever changed the way people conducted financial transactions. ATMs were strategic systems because the only alternative to ATMs would require banks to open branch offices at a large number of convenient locations and these offices would have to remain open for 24hrs per day, 7 days per week, to provide the same level of service as ATMs.

12- 25 Strategic Information Systems Plan (SISP) Strategic Business Plan: A plan that identifies a company’s goals as a means of achieving the organizational mission; also includes what is popularly referred to as SWOT analysis. Strategic Information Systems Plan (SISP): Identifies the information systems and technologies that are vital to support a firm’s business strategy; derived from the strategic business plan. -Is like a road map that helps IS managers to identify any potential gaps between what is available and what should be available to promote good decision making.

12- 26 Strategic Information Systems Plan (SISP) Contd… The SISP should specifically target the following four areas: - Aligning IS investment with business goals - Exploiting information technologies for competitive edge - Ensuring the efficient management of IS resources -Developing technology policies and practices

12- 27 Strategies for Developing an SIS Steps involved in developing an SISP: Establish the purpose of the plan and develop a broad outline describing what the plan will address. Update the strategic business plan and the goals of the business. Reassess the current business environment Identify the existing information systems including hardware, software, and networking capabilities. Determine future information needs and systems Identify the new systems, projects, and capabilities required to meet the changing environment and changing information needs. Identify the resources required to implement the plan and to win the support of top management for the plan. An organization should ask two important questions before investing in strategic systems: - Is the project financially feasible? - Is the project technically feasible?

12- 28 Steps to Ensure Success of Strategic Systems Re-engineering: Re-evaluating and radically redesigning the way in which a company does business; driven by the question, “Why do we do what we do?” Technology decisions should be grounded in a clear understanding of the processes that drive the technology. Strategic systems should be driven by strategic alliances between trading partners Continuous improvement and investment in strategic systems are essential for their long-term success The organizational culture should encourage some risk taking Users must be fully trained if the full potential of the strategic system is to be achieved

12- 29 Potential Barriers for Developing an SIS Development (Definition) Barriers: - Generating Workable ideas requires leadership and teamwork - Many innovative ideas are technically feasible - Many innovative ideas are prohibitively expensive -Many ideas die because they lack a sufficient market. Implementation Barriers: - Telecommunications increases the complexity of implementing SIS - Multiple systems are difficult to integrate - SIS systems often require inter-organizational cooperation - State-of-the-art technologies are difficult to implement Maintenance Barriers: - Competitors can copy SIS - Unanticipated demand can overwhelm the usefulness of an SIS - Applications can be expensive to maintain or enhance - High exit barriers can cause devastating losses.

12- 30 Securing Information Systems

12- 31 Computer Security The process of protecting and safeguarding hardware, software, networks, physical facilities, data, and personnel from accidental, intentional, or natural disasters.

12- 32 Common Types of Security Violations Company data theft by employees Gaining access to information stored on computer networks by cracking passwords Industrial espionage by criminals eavesdropping on wireless communications or on LANs and Internet connections Deliberate, unauthorized modification of software Theft of employees’ identities to make outrageous or illegal statements on the Internet Starting or fueling rumors on the Internet that are designed to harm the company Denial of service attacks in which people call a toll-free number or send an e-mail but the number stays perpetually busy or they are denied access

12- 33 Awareness of Security Violations 60 50 10 40 30 20 70 Yes No Unknown 53% 69% 9% 14% 38% 17% 1996 1998 Has your organization been the target of information espionage? Source: Warroom Research, Inc., Annapolis, Md.

12- 34 Why Information Systems Are Vulnerable Increased Access to the System Key sources of security breaches are employees, authorized external users such as suppliers, and crackers outside the business Increased System Complexity Information systems today are much more complex than systems even a few years ago the software has many more functions and features and the hardware has integrated components, all of which must work together to provide overall system security each operating system has its own security features, so switching to a new operating system can throw previous security measures into disarray

12- 35 Why Information Systems Are Vulnerable (cont.) Cyber Terrorism on the Internet The Internet is a haven for those engaging in security misdeeds The Internet connects two million host computers and provides access to a rich and extensive set of data and information to millions of users, with the numbers increasing by 15 percent every month Networks Are the Weakest Link in the Chain “Networks are essentially sieves to anyone with minor technical skills, and the desire to retrieve other peoples’ information”

12- 36 Why Information Systems Are Vulnerable (cont.) Complacent Management Top managers are often reluctant to invest in security because it is difficult to see the effect it has on the ‘bottom line”

12- 37 The Three Categories of Security Breaches Types of Security Breaches Description Accidental or unintentional errors Accidents relating to hardware and software. Employees can also cause unintentional security breaches. Most common type of security violation, in which individuals intentionally decode passwords. Breaking into computer hardware such as modems, faxes, and cellular phones. Infected software that behaves in unexpected and undesirable ways. Tornadoes, earthquakes, and other disasters that cause computer systems to fail. Intentional errors Cracking passwords Breaking into computer hardware Software virus Natural disasters

12- 38 Techniques for Reducing Accidental Security Breaches WAYS TO REDUCE ACCIDENTAL SECURITY BREACHES Introduce Hardware Tracking Methods Establish and Enforce Clear Security Policies and Procedures Training and Educating Users

12- 39 Eight Symptoms of a Software Virus Inexplicable loss of free memory Unusually long program loading or execution times Changes in program or file size Malfunctioning print routines Computer freezing Unusual messages or beeps Computer rebooting in the midst of a process Corrupt files

12- 40 Computer Security Controls Policies, procedures, tools, techniques, and methods designed to reduce security breaches, system destruction, and system errors from accidental, intentional, and natural disasters.

12- 41 Classifications of Security Controls SECURITY CONTROLS Examples: Documentation Encryption Firewalls Examples: Passwords Smart cards Biometric identification Backups Development Controls Examples: Fire alarms Security personnel Restricted access to a facility Devices that monitor temperature Physical Facility Controls Application Controls

12- 42 Application Controls Passwords Many companies require employees to change their passwords frequently Employees should use hard-to-guess or randomly generated passwords Smart cards A plastic card with an embedded chip that provides users with a new password each time they log on

12- 43 Application Controls (cont.) Biometric identification techniques Rely on body parts to validate that the user can access the system finger prints retinal scans voice recognition Backup Treat information like gold Establish a backup routine Keep your backups in a safe place

12- 44 Development Controls Documentation Written set of documents that explain in detail the reasoning behind processes, procedures, and other details The more detailed the documentation, the better off the company will be in the future Encryption Converts data into a secret code before they are transmitted over the network

12- 45 Physical Facility Controls Physical Facility Controls are the policies and procedures that control the physical environment in which systems reside Posting security personnel Installing fire alarms Security alarms Hidden cameras Requiring users to wear badges or use smart cards to gain access to a building

12- 46 Disaster Recovery Plan (DRP) There are seven steps in developing a DRP Identify specific situations that are classified as a disaster Name the individuals who have the right and the responsibility to declare a disaster Identify specific steps for declaring a disaster Inventory all crucial corporate assets, functions, and resources that are essential to operate the business Specify the general course of action the business will take when disaster strikes Develop a specific course of action that each employee must take to make the company operational when disaster strikes Identify resources required to recover from the disaster, including money, time, personnel, and facilities

12- 47 Business Guidelines for Security Success Recognize the Symptoms of Security Breaches Unknown accounts added to the system and file server An unusual number of log-on failures and dial-in attempts Unexpected system or network crashes Unauthorized changes to system software and system files High system activity when no users are logged on, especially during off-peak hours

12- 48 Business Guidelines for Security Success (cont.) Be Watchful of Disgruntled Employees Disgruntled employees, or those who have been fired, are often likely to cause security breaches Establish clear policies and legal agreements with fired employees Involve Law Enforcement When You Suspect a Security Breach Call police immediately Train employees not to erase or destroy files that the suspected employee used or created Cooperate with law enforcement Quantify damages to assist with prosecution

12- 49 Business Guidelines for Security Success (cont.) Build Security Partnerships Security depends on partnerships with suppliers and customers, and sometimes the government Convince Top Management That Security Is Not an Option 41% of survey participants reported that their company doesn’t have formal security policies More than half said they lack disaster recovery plans More than a third said they don’t monitor their networks for suspicious activity Fewer than one in five use encryption technology to safeguard sensitive information
Tags