• Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Computer Notes

Library
    • Computer Fundamental
    • Computer Memory
    • DBMS Tutorial
    • Operating System
    • Computer Networking
    • C Programming
    • C++ Programming
    • Java Programming
    • C# Programming
    • SQL Tutorial
    • Management Tutorial
    • Computer Graphics
    • Compiler Design
    • Style Sheet
    • JavaScript Tutorial
    • Html Tutorial
    • Wordpress Tutorial
    • Python Tutorial
    • PHP Tutorial
    • JSP Tutorial
    • AngularJS Tutorial
    • Data Structures
    • E Commerce Tutorial
    • Visual Basic
    • Structs2 Tutorial
    • Digital Electronics
    • Internet Terms
    • Servlet Tutorial
    • Software Engineering
    • Interviews Questions
    • Basic Terms
    • Troubleshooting
Menu

Header Right

Home » Management » Management Information System

Information System As An Enabler

Implementation And Evaluation

System Analysis

System Development Approaches

Information and System Concepts

Decision Making

System Design

Structure and Classification

MIS Introduction

Information System Planning

Management Information System

Classification of Decision Support Systems

By Dinesh Thakur

DSS have been classified in different ways as the concept matured with time. As. and when the full potential and possibilities for the field emerged, different classification systems also emerged. Some of the well known classification models are given below:

  • According to Donovan and Madnick (1977) DSS can be classified as,
  1. Institutional-when the DSS supports ongoing and recurring decisions
  2. Ad hoc-when the DSS supports a one off-kind of decision.
  • Hackathorn and Keen (1981) classified DSS as,

1. Personal DSS

2. Group DSS

3. Organizational DSS

  • Alter (1980) opined that decision support systems could be classified into seven types based on their generic nature of operations. He described the seven types as,
  1. File drawer systems. This type of DSS primarily provides access to data stores/data related items.
  2. Data analysis systems. This type of DSS supports the manipulation of data through the use of specific or generic computerized settings or tools.
  3. Analysis information systems. This type of DSS provides access to sets of decision oriented databases and simple small models.
  4. Accounting and financial models. This type of DSS can perform ‘what if analysis’ and calculate the outcomes of different decision paths.
  5. Representational models. This type of DSS can also perform ‘what if analysis’ and calculate the outcomes of different decision paths, based on simulated models.
  6. Optimization models. This kind of DSS provides solutions through the use of optimization models which have mathematical solutions.
  7. Suggestion models. This kind of DSS works when the decision to be taken is based on well-structured tasks.
  • Modern classification of DSS are,
  1. Model Driven DSS is a DSS that uses a model (quantitative) based on heuristics, optimization, simulation etc. for deriving solutions to problems. It has access to the models and has flexibility of changing the parameters of the model. Real data or transactional data from databases of TPS is then passed through the model to arrive at the solution. The system is capable of producing different scenarios.
  2. Data Driven DSS is a DSS that gives access to time-series internal data. Data ware houses that have tools that provide facility to manipulate such data are examples of advances systems. Executive Information Systems are examples of data-driven DSS.
  3. Communications-driven DSS is a DSS that uses network and communications technologies to support decision-relevant collaboration and communication. In such systems, communication technologies are the most important component.
  4. Document-driven DSS is a DSS that uses computer storage and processing to provide document retrieval and analysis.
  5. Knowledge-driven DSS is a DSS that collects and stores ‘expertise’ so that it can be used for decision-making when required.

Components of DSS

Even though DSS can be of several types, fundamentally each DSS will have the following components:

  • Interactive User-System Dialog Management Subsystem-DSS requires continuous user interaction. Sometimes the system should prompt the user to give an input at other time the user should be able to control the processing. A typical user system dialog management subsystem will have the following elements:
  1. User Interface – the user interface of a DSS has to be dynamic and GUI based. It has to be an easy to use user interface as most of the people who will be using it are not technical experts but management experts (top management) and hence the interface should be minimalist in design. Also the system should be able to interact with the user in a interactive mode and hence the user interface has to be dynamic.
  2. Request Constructor – since DSS works on an interactive dynamic mode, it needs a request constructor (incorporating aspects of Language Query Interface) which can convert the user’s instructors into model understandable form, the model’s data request to the database and the model’s instructions/requests to the user.
  • Data Management Subsystem – data is the most important component of a DSS. Without the data a DSS cannot function. The data management subsystem manages the data for DSS. Data is accessed in a DSS in many ways like ad hoc basis, structured query basis and heuristic search basis and hence a strong data management subsystems is required to service the varied data requests from a DSS. The subsystem has the following elements:
  1. Database Management System – it is the data store for the DSS. It manages the data and performs all the functions that a typical DBMS package does. In fact, in most DSS a commercial DBMS or RDBMS package is used to perform this task.
  2. The Query Control – this is a tailored element to handle the query requirements of DSS. It may connect the database, directly to the user interface or to the model base or both.
  3. Meta Data – this contains data about the data that is stored in the database. This helps the DSS in understanding the data in the database properly and helps in creating ad hoc queries.
  • Model Management Subsystem – this is the unique feature of a DSS. This makes the system special. However, this also makes the system very specific. There are very few examples of a generalized DSS as generalized models are not available. Those that exist work on half baked solutions. The model management subsystem may use different classes of models like,
  1. Optimization Models
  2. Simulation Models
  3. Heuristic Models
  4. Deterministic Models
  5. Predictive Models

Each class of model is useful to solve a specific class of problems like a routing problem or a scheduling problem or a combinatorial search problem etc. Model and Model Management has several connotations in DSS literature and there have been wide ranging definitions of these terms. The common strain that evolves from these plethora of definitions is that a model is conceived to consist of a solver, a model for solving a problem and data (Ramirez, 1993) where model represents relationships between variables, data represents the values of the variables under consideration and the solver is the tool that enables the computation of the variable values and their relationships. It has been also conceptualized in some literature as a procedure which works on the data to give an output after analysis.

The model management subsystem has the following elements:

  1. The Model Base Management System-A model base or rather a model base management system is software is conceptually like what the DBMS is to data which has the capabilities to manage a model for it to be useful to the decision maker. It is the core of a DSS. It supports generation of models and works with data on one hand and the user supplied instructions on the other.
  2. The Model Command Processor-is the entity that processes the commands coming from the dialog management subsystem.
  3. The Model Executor or Solver- is the heart of the system. It is the process through which the model is solved using some algorithm. It works with the model as generated by the model base with instructions from the user, the request constructor (dialog management subsystem in general) to get the parameters of the model from the user and data from the data management subsystem. It then solves the problem and displays the results and some variations of the best fit solution through the dialog management subsystem. The alternative solutions as provided help the user in decision-making.




Ethics in an Information Society

By Dinesh Thakur

Ethics is a branch of philosophy that deals with what is considered right and wrong in society. It deals with issues which are not in the realm of legal or statutory domains but which may be considered conventionally right or wrong as per perception of the society of that time.

Slavery was at a certain point in time, legal in United States and then with the passing of legislation later during Abraham Lincoln’s Presidency was deemed illegal. The issue is that even when slavery was legal, it was considered as unethical by some as society considered it as something wrong even when it was legal. Therefore, we can say that ethics is a far greater concept than legality. It has something to do with the basic idea of right and wrong that becomes ingrained in us from childhood. Therefore, if you do a good job and your boss steals all the credit for your work then it becomes unethical behavior on his part but it may not be illegal. An issue becomes ethical in nature when it transgresses any basic norm of human existence.

The issue of ethics in the information age has acquired a different dimension altogether. With more access to information, greater connectivity and anonymity new ethical issues are coming to the fore every day. Some major ethical issues hover around the following questions:

  1. How much information about an individual is private and how much that is private which cannot be captured or disclosed?
  2. What information can be kept by organizations dealing with individuals?
  3. How much right does an individual have over his/her own information?
  4. Who can access and who cannot access information?

Most cases of ethical violation in the information society occur due to disclosure of private information. This brings us to the interesting topic of privacy. Let us delve into the issue a little deeper. Is information about a suspected terrorist private or the act that he commits private? Probably not on the other hand if we are asked if information about a dowry victim is private, we will all probably agree that it is. Thus, we see that privacy assumes different degree of severity. In the first case, one can argue that if information about a suspected terrorist is not made public, then the terrorist will not get caught, and will cause more destruction. Thus, the well-being of a majority is at stake if the privacy of information of the terrorist is to be considered. Hence, it may be argued by some that disclosure of such private information as how he looks and what his height is may be considered fine but the same cannot be said for the latter case about the dowry victim. Thus, we see that ethics, privacy and other such related issues have to be considered carefully.

However, the following may be considered ethical issues in information society:

  1. Disclosing another individual’s personal details to others. This is a serious ethical issue. Sometimes when the disclosure is of a very private nature this can even become a legal issue.
  2. Cyber stalking is when an individual is always stalked in cyberspace resulting in violation of an individual’s privacy and creating a fear in the mind of the stalked. This on a small scale is an ethical issue but may become a legal issue if the stalking becomes serious.
  3. Disclosure of trusted content is also another ethical issue. If an individual is in the possession of some trusted content and he shares it with others then that becomes an ethical issue.
  4. Distribution of pornographic material with open access is another ethical issue and needs to be controlled.
  5. Plagiarism is becoming very rampant as content in soft form can just be copied and pasted from other files and claimed as one’s own. On a small scale this is an ethical issue but when the plagiarism is intentional and on a large scale then this becomes a violation of copyright which is a legal issue.
  6. Sending SPAM is also another ethical issue which creates a lot of problems for ordinary users of information systems

Ethics in information society is a very delicate issue and changes with time. At one point of time, stealing of password was an ethical issue. Today it is a crime and has become a legal issue. Such changes in legal and ethical points of view occur with change in legislation and with changes in the norms of society.




Content Management System (CMS)

By Dinesh Thakur

Tremendous amounts of content get created everyday in organization. Most organizations do not have a structured approach to managing such content. However, there is a need for having a scientific approach towards content and its management especially in the digital environment where content gets created and updated much faster. A content management is therefore required in organizations to support the organization and to keep track of the huge volume of content that gets created everyday.

Content management (CM) is the activity that supports the collection, management, and publication of information in any medium. Nowadays content management is usually done on IT platforms and hence it is considered as a separate set of technology that needs to be manag9d for the organization’s benefit. In IT driven companies the content is digital (in the form of alpha numeric text as in documents, multimedia content such as audio and/ or video, or any other type) which helps in its management.

Content management is an important activity that an organization needs to take seriously if it wants to leverage its information base. Content management is a collaborative process and consists of the following:

  1. Content Creator – one who creates the content
  2. Content Editor – one who edits the content and makes it palatable.
  3. Content Publisher – content disseminator.
  4. Content Administrator – manager of content access, version, etc.
  5. Content user – content user.

A very import aspect of content management is version control. Digital content is easily changed and new versions are created of the same content. The content management system must ensure that the content that is available to the users is the current version of the content. Unless the version of the content is managed, the users may not be able to access the updated content. Content management must also be able to manage content distributions and digital rights management. Content management also eliminates duplication.

Drivers of Content Management

The three drivers that propel organizations for content management are:

  1. Collaboration: In today’s working environment, the same content gets created and worked upon by several people simultaneously. This poses a challenge for organizations and the only solution to this is to adopt content management.
  2. Compliance: Several compliance related issues have come up in the recent past that requires the single version of the truth from organizations, when they communicate to internal or external customers. This is again a challenge that can only be met by content management
  3. Consolidation: This is the last driver for content management. Organization need more and more consolidated content that can only be done if content management is practiced.

Content Management System (CMS) is usually a software system with specific processes and procedures that allows us to manage digital content in a collaborative mode.

Types of CMS

  1. Enterprise Content Management used to manage enterprise wide content.
  2. Web content management systems used to manage web content.
  3. Document management systems used for managing documents.
  4. Mobile Content management system used to manage texts and multimedia content for mobile devices.




Total Quality Management (TQM)

By Dinesh Thakur

The concept of quality has changed over time. The awareness about quality started in the early half of the twentieth century but back then quality was considered more of a technical issue and the onus of quality was vested in a department, which was called quality control department. As the name of the department suggests; quality was a control issue, and hence statistical quality control techniques were developed to keep a ‘control’ over the quality. However, with time and with Japanese influence, this concept has changed.

Now, quality ownership is not vested with one department only but with the entire organization. Everybody in the organization is now quality conscious and quality has become more of a managerial and cultural issue rather than being just a narrow technical one. This transformation of the narrow concept of quality management over time into an all-encompassing broad concept of quality in everything and for everyone has been brought about by the concept of total quality management. In short, total quality management means quality for everyone, in everything and by everybody in the entire organization. It is a much broader concept and views quality more as a management issue than a technical one.

Most importantly, TQM is a continuous process and must be viewed as a process of perpetual improvement to improve the quality of about anything in the organization. It focuses on getting things done right in the first attempt and is more of a philosophy of working (attitude towards working), than anything else. The concept is not new and has been in use in Japanese companies from the mid 1950s, but has gained acceptance in the West from 1980s onwards. TQM has some principles that if adhered to in designing management strategies and processes will result in total quality within the organization.

The Principles of TQM

The principles of TQM are as follows:

  1. Quality can be managed and requires management will to be managed. Itis an extremely important ingredient of successful management.
  2. Everyone in an organization has a customer.
  3. People are not the main problem for quality but processes are.
  4. Everyone is responsible for quality. The ownership of quality is vested in each employee.
  5. Problems must be anticipated and with proactive decisions, prevented not merely solved.
  6. Quality must be measured in understandable terms (preferably in quantitative terms).
  7. Improvements in quality are itself a continuous process and must not be viewed as frozen in time.
  8. Zero defects or six sigma should be the quality standard.
  9. Goals once defined on the basis of known requirements are not negotiable.
  10. One must always measure lifetime costs instead of upfront costs.
  11. Management must be completely involved with quality management and should lead the effort. There should be complete buy in at the top management level.
  12. Quality management initiative must be a planned and organized effort.

Six Sigma

Six Sigma is a method used for measuring, improving and controlling process performance. A methodology, which improves customer satisfaction significantly, by reduction of variation in the processes.

‘Six Sigma is not something else that you do … it is what you do.’

What is six sigma?

  1. It is a philosophy which results in operational excellence.
  2. It reduces variation in processes and operations.
  3. A statistical measure of a process capability – 3.4 defects per million opportunity _ 99.99966 per cent probability of passing non-defective products to customer.

Benefits of six sigma

  1. Increased customer satisfaction
  2. Reduced defects
  3. Increased productivity
  4. Better and consistent processes

Six Sigma Methodologies

For Existing Processes (DMAIC):

                                             Six Sigma for an Existing Process

For new design and new processes (DMADV/DFSS):

                                             Six Sigma Methodology for a New Design and a New Process

Organizations implementing six sigma

 

Six sigma has been successfully implemented by manufacturing organizations like GE, AT&T, Motorola, Honeywell, etc., service organizations like American Express, IBM, Accenture, Microsoft, J.P. Morgan Chase, to name a few.

Six sigma approach

Y=f(X)

Where, Y = Output or Effect

X = Input or Cause

DMAIC model

Define phase

The define phase focuses on customer feedback or VOC (voice of customer). It is important to understand who the customer is and then understand the customer requirements. There are tools like interview, survey, focus group, etc., used to collect customer requirements. Once the VOC is obtained, it is translated into a measurable metric called the CTQ (critical to quality). A CTQ should be SMART (Simple, Measurable, Attainable, Relevant and Time bound).

The next step in define phase is to create the six sigma project charter. This is similar to a project plan and has six mandatory sections:

  1. Business case
  2. Problem statement
  3. Goal statement
  4. Scope
  5. Timelines or milestones
  6. Team/resources

Any six sigma initiative consists of customer, sponsor (who finances the project), project champion (the subject matter expert), six sigma team (master black belt, black belt, green belt) and team members (who help in the project).

The last deliverable in define phase is creation of a high-level process map or IPOC.

SIPOC =Supplier – Input – Process – Output – Customer GE uses COPIS:

COPIS = Customer – Output – Process – Input – Supplier

Measure phase

The following activities are undertaken as part of measure phase:

  1. Defining performance standards – consists of the target and the specification limits (operating range on the target)
  2. Data collection – data is collected for all potential causes
  3. Data analysis
  4. Measurement system analysis – no process can be completely variation free. In the measure phase, we call this the measurement system analysis. In a six sigma project before we start analyzing data, we have to ensure that the measurement system does not contribute errors of its own due to person measuring, or the measuring instrument or the sample that is getting measured
  5. Process capability – it is the measure of the current state of the process

Analyze phase

The following activities are undertaken as part of analyze phase:

  1. Basic data analysis on Y
  2. Identifying all potential causes, which are called ‘Trivial Many X’s’
  3. Finding out the root causes or ‘Vital Few Causes’ – tools such as fish bone diagram, Pareto analysis, cause and effect matrix, etc., are used to separate the vital few from the trivial many
  4. Validation of root causes

Improve phase

After the previous phases, we have a set of validated X’s. The deliverables in improve phase are:

  1. Design solutions – when X’s are isolated and independent, tools such as brainstorming, lateral thinking and TRIZ are used to design solutions. When X’s are interdependent, DOE (design of experiments) is a method used for conducting controlled experiments of how a process performs under differing conditions of variables
  2. Risk assessment – failure mode and effects analysis (FMEA) evaluates the different ways an input to a process step can fail and tries to understand the cause of that failure
  3. Solution Implementation
  4. Solution validation – used to measure the success of the process. Cost benefit analysis is used for the same.

Control phase

Control phase attempts to find out the stability of the process and ensures sustainability. Every completed six sigma project should have not only a control chart but also a control plan. This ensures that the process does not revert to the way it previously operated.




What Is Software Quality Assurance (SQA)? SQA Benefit and SQA Plan.

By Dinesh Thakur

SQA is a concept that spans across the entire software development process. It focuses on improving the process of development of software so that problems can be prevented before they become a major issue. SQA also involves continuous monitoring of the process and making sure those agreed-upon standards and procedures are followed all along in the development process. It is the process of providing adequate assurance (to clients, senior management and other stakeholders) on (quality of) the process followed in the development of software (so that all concerned are satisfied about the fact that the plans laid out for development have been adhered to and that the software as developed conforms to specifications).

Since SQA can also be considered a’ a process for monitoring oversight in the development process, its activities have to be unbiased and the SQA team needs to given freedom and authority. SQA may be internal or external as per agreed terms. Quality assurance usually also uses date from other supporting processes, like verification & validation, joint reviews, and audits.

The SQA process usually consists of the following tasks:

  1. Process implementation: In this task, the design team in consultation with the development team and the SQA team prepares a (quality assurance) process for the development of the software (project). This process is then synchronized with the related verification and validation, joint review, and audit processes that run concurrently. A plan is then prepared for the quality assurance process activities/tasks, which is documented and stored (for the life of the contract of the project).
  2. Product assurance: In this task, all plans and tasks are documented including their execution so that one can assure that all contractual obligations have been fulfilled.
  3. Process assurance: In this task, assurance is provided that the software (project) process complies with all the provisions of the contract and the plans for the process of development.
  4. Assurance of quality systems: In this task, the SQA team monitors the development process and measures parameters of the software (project), based on which a decision on the assurance of the software is provided.

SQA Benefits

SQA has a host of benefits. It ensures that that software built as per SQA procedures are of specified quality. SOA helps to

  1. Eliminate errors when they are still inexpensive to correct
  2. Improves the quality of the software
  3. Improving the process of creating software
  4. Create a mature software process

The SQA plan

The SQA plan is a document that specifies the process to be followed in each step of the software development and the procedures to be followed in each activity of such a process. The objective of SQA plan is to ensure that the development of the software is based on a course of action and that from time to time the development can be measured controlled and monitored with respect to such a course of action-so that the end product is as per the specifications. The plan is governed by several quality standards, policies and models such as IS09000, SEI CMM and Baldrige.




What is incident response?

By Dinesh Thakur

What is an Incident?

An incident in the parlance of information security is a security breach or even an attempt to breach security. An unsuccessful attempt to crack the security system is also an incident and needs to be investigated thoroughly.

Incident Response Process

Whenever an incident takes place, a series of steps needs to be taken to find out the causes of the incident to ensure that such incidents do not occur in future. The incident response process involves the following steps:

  1. Incident identification – it is the first step of incident response in which the incident is identified. Some common incidents may be DoS, port scanning, IP sniffing, social engineering, banner capture, unauthorized access or virus infection.
  2. Incident classification – it is the next step in which the incident is classified based on its severity. Every organization must maintain an incident classification chart to rate an incident when it occurs based on its criticality.
  3. Incident notification – it is the notification given to specific functionaries about the incident.
  4. Incident response and containment – it is the action taken to thwart the incident.
  5. Incident recovery – it is the recovery activity to restore system to the previous status.
  6. Post mortem – this is the post incident investigation to find out the vulnerabilities in the system that allowed the incident to happen.

                                                        Incidence Response Flow Chart

Some Attack Techniques and Technologies

Some of the attack tools and techniques are:

  1. IP spoofing is a the techniques of using forged 12 digit IP address (source) in the IP packets that are used in TCPIIP protocol for data communication (primarily on the Internet or on any other TCP/IP network) for concealing the identity of the sender or impersonating another computing system.
  2. Packet sniffing is a technique or a program to troubleshoot network traffic. However, often it is used by hackers to get information about the source and destination of IP packets on a TCP/IP network. When on a TCP/IP network like Internet, data is broken down into small packets that are transmitted over the network and gather together at the destination, reassembled and displayed/stored etc. these packets have stamps of destination and source on them so that they are not lost. Packet sniffing is the technique of that can capture these floating packets on the TCP/IP network like a wiretap and find out what is being sent to or from a source or destination.




Threat and Vulnerability Management (TVM)

By Dinesh Thakur

we are going to discuss about the threats and vulnerabilities of information systems from both insiders and outsiders and the ways of managing such threats and vulnerabilities.

Information Security Attacks from Insiders

It is now an acknowledged fact within the information security community that insiders(people with access to information systems of organizations) within the organization represents one of the biggest2 (estimates vary from half- to three-fourths of all security incidents) information security threats (Dillon 1999, Whitman 2003). Considering that a large number of such incidents go undetected (Hoffer and Straub 1989) it is most likely that these numbers are actually much higher. Specialists therefore prescribe a cocktail of measures to prevent security incidents. These measures fall under two broad categories:

  1. Procedural or business control measures-those that define access and other security policies, usage guidelines, security education, training and awareness (SETA) programs.
  2. Technical measures-includes authentication measures, monitoring techniques, tools and filtering mechanisms.

Types of Information Security Attacks from Outsiders

Information security attacks can be of various types. Modern attacks and techniques are difficult to detect and stop as it requires continuous monitoring of the system. Perimeter security is therefore of vital importance as the objective of a security system is to halt an attacker from gaining access into the system. The following are the major forms of attack:

Hacking

It is the activity of getting into a computer system without authorization to have an access for a look around and see what is possible to do in the system. Hackers are mainly of three different types.

  1. Ethical hackers: Ethical hacking and hacking etiquette demands that the hacker after having penetrated the system notifies the system administrator of his entry to let him know about the vulnerability of the system. This kind of hacking actually helps the organization to improve its security apparatus.
  2. Crackers: These are malicious hackers. Once they get inside a system, they destroy valuable assets. Their objective is to cause as much damage to the system as possible. These attacks are to be feared as they have the potential to cause large-scale damage to the organization’s information assets.
  3. Phreaks: These are people who hack into the phone systems of organizations so that they can then make calls at the expense of the organization. Each hacking incident however, may be different from the other as each hacker in each incident tries a different trick to exploit a different vulnerability of a system. Since nowadays most systems are connected to the Internet, most hacking incidents occur from net-based hackers who gain access into the organizations computer systems and then cause damage to the system. Most hacking incidents follow a typical pattern or method, which are:

Reconnaissance-The hacker before embarking on a full-scale attack tries to find out the counter measures that are protecting a system. He tests the waters before jumping into the action. In this stage, he typically tries to gather information about the system (and/or network), its vulnerabilities, critical information stored in the system, key employee information, public information about the system and the organization, information about customers of the organization. This is passive reconnaissance. After this stage, the hacker moves on to active reconnaissance in which he acquires DNS information, IP addresses, performs ping sweeps, SNMP network scans and other attacks like banner grabbing, etc.

Vulnerability canning-After the reconnaissance stage, the hacker moves to the scanning stage in which he looks for vulnerabilities in the perimeter security of the system. He also scans the routers and firewalls of the organization to check for vulnerabilities.

Securing/getting access-After the scanning stage, he moves to the stage of gaining access, here he accesses the organization’s system after capitalizing on any vulnerability in the organization’s security system. This can happen through the operating system of the organization’s server or networked computer, an application (either planted within the system or suitable file corrupted/modified by the hacker to work on his commands), or through any network devices in the organization’s network.

Maintaining access-After getting access to the organization’s system, the hacker would normally like to continue to maintain access. This he manages by planting a custom-built application on the already compromised server of the organization. This strategy helps the hacker to enter and exit the system at will. Thus, the hacker can have complete control over the organization’s system. He can upload applications, modify applications, modify data without anyone’s knowledge, steal data and cause widespread damage to the system. At this stage, the hacker evaluates the information assets of the organization and based on his intentions goes ahead with a plan to profit from his efforts. He can wish to just maintain access without causing any damage, steal information and sell it outside, profit from altering the data of the organization or simply blackmail the organization•

Covering tracks-Once the hacker has enabled his access into the organization’s system, he would like to remove any trace of his entry and exit from the system. This he manages by suitably deleting the evidence of his access from the audit files and log files. Thus, the system administrators remain oblivious to the access of the hacker.

Denial of service (DoS)

This is another form-security attack in which the attacker overwhelms the organization’s server (or other hardware resources) or the telecommunication lines from the ISP. Normally, DoS attacks are one-to-one meaning that the attackers launches an attack from his machine and attacks one organization with the objective of overwhelming its resources (hardware or telecom) thereby denying the system’s services to legitimate users. Since February 2000 the trend for such attacks has changed. Now attackers use a many-to-one mode of attack for DoS. This is known as distributed denial of service (DDoS). The attacker creates zombies (these are compromised machines on the Internet that run application codes which are controlled by the attacker). At his instructions DoS attacks are launched simultaneously on a single target from all the zombies (sometimes as many as tens of thousands). The only way to control DDoS attacks is to control the number of zombies on the network. It is one of the most difficult forms of attack against which an organization is to be secured.

Malicious code

“This is another form of security threat, being pieces of code that reach vital areas of a system and renders great damage to it. The easiest form of distributing malicious codes is through e-mails. It is therefore a good idea to check the attachment files in e-mails before opening them. There are many different types of malicious code:

  1. Virus: This is the most common type of malicious code. Viruses are also of various types. File viruses are viruses that infect files of a system and then keep on multiplying themselves whenever a user opens a file or access a file and therefore spread to all parts of a system and damage all files in a system. Such file viruses are the most common form of virus applications. Most file viruses are executable files. Other types of viruses attack the master boot record of the operating system thereby rendering the as useless. Some viruses are application specific like macro viruses that affect office applications.
  2. Worm: A form of malicious code that affects networks. They have the capability to replicate themselves over a network and spreads very quickly from one machine to another in a network. Several highly publicized attacks have been reported.
  3. Trojan: It is a stealth version of a malicious code. It seems like a good and trustworthy code on the surface but is actually a malicious code in reality? The easiest way to stop Trojans is to stop opening untrustworthy attachments and stop downloading and running freeware.
  4. Logic bomb: This type of malicious code waits in a system for a trigger, like a particular date and time, to unleash damage. The code waits patiently and does not act malevolently until a particular data and time and after that due date and time, it would work in a malevolent manner by damaging the system and data.

Social engineering

This is another way of attacking a system. Social engineering is a set of techniques used to trick gullible users into parting with their critical information like username and password. The social engineering attacker uses the following human attributes to get access to critical data:

  1. Most people trust others unless they are found untrustworthy. The attacker exploits this trait of human nature. For example, simple calls made ostensibly on behalf of a trustworthy organization like a bank would make us divulge a lot of critical information about our bank accounts.
  2. The fear of getting into trouble is also another human trait that the attacker exploits. For example, a simple mail requesting you to give your password for better maintenance of your bank account may actually cause fear in your mind that if you do not divulge your password, maintenance will not be proper and hence some indeed do give away their password.
  3. Preference for short cuts is another human trait that attackers exploit. Most people give passwords as nicknames or birth dates or name of their pets which can be easily cracked.

Thus, we can see that a skilled social engineer may be able to get critical data that will enable him to access the system without much trouble. Thus, this type of attack is a very serious threat that all must be careful about.

Some Top Hacking Incidents of All Time

1990s

Kevin Mitnick, a well known hacker, hacked into computer networks and systems of top telecom companies like Nokia, Fujitsu, Motorola, and Sun Microsystems. The incident caused a huge stir in the security establishment and Mitnick was arrested by the FBI in 1995, but later released on parole in 2000.

1995

A Russian hacker Vladimir Levin was the first hacker to hack into a bank to rob money. In early 1995, he hacked into a top US bank which had a very secure VAX VMS based system and robbed an estimated $10 million USD. He was later arrested.

1990

In 1990 a radio station in Los Angeles started a contest that awarded a Porsche for the 102nd caller. Kevin Paulson, a hacker took control of the entire city’s telephone network, and ensured that he is the 102nd caller, so that he get the prize. He was later arrested.

1996

Timothy Lloyd wrote a small piece of malicious software code that allowed a “logic bomb” to explode which deleted software worth $10 million USD.

 

1988

Robert Morris a Cornell University graduate launched a worm on the Internet that infected machines world wide and crashed thousands of machines.

1999

David Smith wrote and launched one of the most dreaded virus, Melissa that damaged machines worldwide.

2000

 

Mafia Boy hacked into the most popular sites on the Internet world, like eBay, Amazon and Yahoo and managed to engineer a Denial of Service attack.




The 4R Model of Information Security

By Dinesh Thakur

The ISO/IEC 27001 definition of information defines information as an ‘asset’. Therefore, information is something that has value and requires to be protected against theft or destruction. In order to protect information from theft or destruction, all counter measures that are taken come under the purview of Information security measures. Information security is therefore defined as all steps taken by the organization to protect its information and information systems. The steps may be technical or managerial in nature and may involve automation or manual controls.

At the core of the concept of information security lies the concept of 4R which are

  1. Right information-means that information has to be accurate and complete
  2. Right people-means that information is available to the people who are authorized to receive it.
  3. Right time-means information must be available to the authorized individual on demand.
  4. Right format/form-means that information must be given in a format that makes some meaning. It has to be given in a format that makes decision-making easier.

                            The 4R Model of lnformation Security

If information has to be protected, the 4Rs must be applied properly, information and its value must be well understood and the threats to it must be analyzed in detail. Only then, can counter measures be taken to ensure that there is no deviation from the principles of the 4R, i.e., information confidentiality is maintained, information integrity is guaranteed, availability to authorized personnel is ensured on demand and the integrity of the formats of information storage and delivery are not tampered with.

However, there are risks to information assets. While some risks may be eliminated, some risks can only be minimized. Such risks are to be managed properly to ensure smooth functioning of the information infrastructure. From a security perspective, risks are potential issues and have to be understood carefully in order to come up with security counter measures that would minimize or eliminate the risk.

Risk may be defined by the formula as:

Risk =ƒ (Information asset value, threats, vulnerabilities)

As one can see, risk to an information system can be defined as a function of the asset value of the information, the threat to the information and its vulnerabilities. Risk can therefore be managed if we are able to manage the asset value, the threat to it and its vulnerabilities.

The risk management alternatives therefore are:

  1. Risk reduction.
  2. Risk acceptance.
  3. Risk transference.
  4. Risk avoidance.




Critical Success Factors In Implementation of Information Systems

By Dinesh Thakur

It has been observed that certain factors are critical for the successful implementation of information systems. These factors fall under both management and technical factors. The critical factors that determine the success of implementation of information systems are:

Top Management Commitment

It has been observed that top management commitment is vital for a successful IS implementation. Whenever there is top management commitment, minor issues and problems do not snowball into major ones and they normally do not pose a challenge. However, in the absence of such commitment even minor issues become unmanageable. It is important that top management commitment for such IS implementation is not only present but is also communicated well within the organization, so that there is no ambiguity about the commitment. This strong signal of the will of the top management makes the work of the implementers easier. Minor issues cease to become issues at all and even major issues are sympathetically dealt with and urgently attended to by the client organization.

IS Team Composition

The implementation of IS is done by a team. The team consists of technical and management specialists from the vendor organization as well as people from the IS department and other stakeholder departments of the client organization. The constitution of the team is a very important and a critical factor in the successful implementation of IS. The team must consist of representatives from the user community, people who were part of the planning team, designing team in the client organization, other stakeholders in the client organization and people from the human resources department. The team must also obviously have members from the vendor organization who have sufficient knowledge of the IS being implemented. Their technical knowledge and managerial competence must be beyond any doubt. It is best if such a team works under the supervision of a top management functionary with sufficient powers and authority to take suitable decisions about the project so that better control can be exercised on the implementation schedules and issues that come up on the floor can be ironed out across the table. The urgency of the implementation in such cases is clearly demonstrated to the entire organization. The acceptability of the IS also improves. If the team consists of members from all stakeholders and is steered by a senior manager.

IT Teamwork

The team that is created must work in a cohesive manner with a sense of purpose. A unified front must be projected so that acceptability of the project improves. If the team members indulge is public spats, the chances of successful implementation are grim. However, every effort must be made to find out real issues and they must be dealt with in the right earnest. The team members must work as a team in all respects.

IS planning Quality

An IS project is as successful as its plan. If the planning was faulty, the IS implementation will no doubt be faulty. The IS will never be able to supply the kind of information the client desires if the planning has not been done diligently.

Diligent Project Management

The manner in which the implementation project is handled is also another critical success factor. Modern project management techniques must be used to estimate accurate cost and time schedules which must then be strictly monitored and adhered to. Any laxity will result in slippage of deadlines resulting loss of credibility of the project.

Change Management Initiatives and their Effectiveness

The process of implementation is normally a process of change and hence is riddled with challenges. Therefore, change management is probably the single most important factor in most large-scale IS implementations. The change management initiatives must be considered as part of the implementation effort and should be done proactively rather than in a reactive manner. Change management initiatives must also be done with the seriousness that it deserves. A callous attitude towards change management initiatives can cause more damage than good. Hence the attitude of management must be calibrated to suit the initiative.

Effective Communication

Communication is a key element in any organization initiative. In IS implementation, communication is a key element for success. Both formal and informal communication needs to be managed for implementing the project successfully. Effective communication will improve transparency and build trust within the client organization, thereby reducing the dependence on change management interventions.

Training

This is a key factor in the successful implementation of a new IS, making the IS acceptable to the users, reduces resistance to the IS and creates a better environment as a whole for the implementation to proceed smoothly. However, the quality of the training must be good and it must be explained to the users, the added benefits of the IS being implemented. The reason for migrating to the new IS will then be clearly understood by the users. Training will also help in the smooth transition from the old system to the new one without hampering the business process efficiency of the organization.

Technical Quality of IS

Even with all the support from the client, the implementation can fail if the basic technical product that comes from the vendor is of bad quality. Technical quality should be of good quality. This is a necessary condition. With bugs in the systems popping up every few minute, the system will have very slim chances of success. Clinch free technical system is therefore a critical factor.

HR Measures to Neutralize Organization Antibodies

Organization antibodies are people who find fault where none exists. Negativity and pessimism are the defining characteristics of such individuals. Sometimes they may also have motives to bad mouth a new system. When the influential staff bad months the new IS system, others follow them. This creates an avalanche effect and confidence in the new system drastically falls. This is an HR issue and has to be dealt with by the HR department in a firm and fair manner. It must be made known within the organization that there exists room for discussion and debate. Several teams and committees that are formed from the planning stage of a new IS initiative must be highlighted as forums for discussion and debate but only at the right time. Once a decision is taken about an IS by the top management, everyone must work towards making that decision a success. Any deviation from this must attract the necessary measures that it deserves. Such a measure will neutralize any antibodies and in their absence the implementation will be smooth.

                        Critical Success Factors for Implementation of IS




Implementation of MIS

By Dinesh Thakur

Implementation of a system is as much important as the creation of it. Implementation can easily destroy the good work done in the earlier phases and bring the system to a standstill. Implementation requires technical and managerial skills as the implementers work as change agents. Implementation is also a process that has a series of sequential steps which culminates in making operational the new system.

Implementation as an activity has to be carefully managed. It requires client interaction at every stage. The implementers need the full support and cooperation of the client and the IS department functionaries to successfully execute the implementation of information systems. In order to help them perform this task of implementation smoothly, a series of predefined steps are followed. These implementation tasks are as follows:

Implementation Plan

It is the series of action-oriented steps planned for making the implementation smooth. It normally involves the following steps:

  1. Creating a master schedule of the implementation activities
  2. Setting timelines for critical and non-critical activities
  3. Identifying major bottlenecks and their solutions
  4. Communication of the plan.

This step is required to help the user community to understand the time frame for installation of the new system. Communication plays a vital role in the implementation and without proper communication especially, from the top management on the installation and implementation of the new system the change management will be difficult. Resistance to change related issues will come to the fore making the difficult task of implementation more difficult. Communication of the plan of implementation to the user community helps the users to prepare for the change and makes them mentally prepared for it. The communication is required to be formal so that rumors cannot be spread about the system. The communication process may itself be in several phases. The top level can communicate the general intent of the new system and then detailed briefings to staff may be left to the divisional heads. The communication process also indicates (indirectly), the role each employee is required to play in the implementation process.

Organizing the MIS Department

The MIS department will be the custodian of the new system. Hence, they have to be gear up to support the new system. Organization of the department is therefore necessary before the new system becomes operational. The roles of each member of the MIS department have to be clearly laid out before the new system becomes operational. Effort is made to ensure that the role of the MIS staff is understood by each member of the organization. Training is provided to those who need training on the new system so that they in turn can help others. This process of organizing the MIS department starts much before the actual implementation process begins as it entails some hiring and training which requires some lead time. The organization is done in such a timeframe that staff is available when the actual implementation starts. This enables the MIS staff to provide support to the implementation team, when the implementation process starts. This will also help the MIS staff to understand the nitty-gritty of the new system as they will be able to get a hands-on experience in the implementation of the new system.

Selection and Procurement of Hardware

This step of the implementation process is an important step as it involves huge investments. Proper care is taken to ensure that the organization gets the best deal from such selection and procurement of the hardware. The process of selection and procurement of hardware also varies greatly from firm to firm depending on the size of the firm and the sector in which it operates the type of management. However, the following procedure is followed:

  1. Preparation of vendor list-a list of reliable vendors is prepared. This list of vendors may be prepared after analyzing the vendor management experience of the organization with different vendors or may be prepared based on some accepted list of vendors in that business space prepared by some organization of repute or some industry body/regulatory body. The vendors that are selected to be part of the list are chosen carefully after a thorough checking of their credentials and goodwill in the market. This is essential as the vendor relationship is based on trust and compromise and not only on the basis of strict commercial terms.
  2. Preparation of RFP-the implementation team must prepare the request for proposal document based on their understanding of the hardware requirement of the new system. The RFP must have complete technical details about the required hardware systems including specifications, format, performance expectation, and warranty and service quality requirements. This document is prepared by the implementers in consultation with the development team, management of the organization and the MIS team of the organization so that the need for each specification is well established and there is no scope for any difference of opinion. The consultative process results in the RFP which is a technical document. The RFP also has commercial details which the implementation team prepares in consultation with the management of the organization. The RFP is a quasi-legal document in some countries and proper legal opinion is normally sought before sending it to the enlisted vendors.
  3. Request for bids/proposal to select vendors-after the RFP is prepared it is sent by some mode of communication to the enlisted set of vendors. The communication medium can be an open advertisement in print or electronic media or may be in the form of a letter to the vendors with a deadline for submission of the proposal.
  4. Evaluation of RFP-this is a difficult process. After bids are received before the deadline, they are checked (preliminary check) for basic errors. Those found to be prima facie proper are then evaluated. Several methods of evaluation exist. The evaluation could be on the basis of cost alone or quality alone or may be a mix of both cost and quality. Typically, a score based system of evaluation is used to rank the vendors’ proposals. Scores are assigned to each attribute of a vendor’s proposal like cost, goodwill, track record and service quality guarantee. Based on the weight age given to each attribute a composite score is prepared, which is used to evaluate the proposals. Whatever tJ1emethodology for evaluating the proposal, one must take care to apply the same evaluation criteria to all proposals. Different yardsticks should not be applied to different proposals.
  5. Selection of vendor-based on the evaluation a single vendor or a select set of vendors are chosen for delivery of hardware. Contract negotiations and price negotiations are held with this select group of vendors and following the successful completion of the negotiations the final contract will be signed.

Procurement of Software

The new system being implemented will have been created based on assumptions of operating environment of the organization. Procurement of system software is done on similar lines as the procurement of hardware. The only difference in the case of procurement of software is that the choice of what software to purchase is already made at the design stage of the system development and hence, the RFP preparation process is straightforward. The implementation team need not prepare the specification for the system software. They only need to procure the system software that the new system is designed to run on. The rest of the process is almost similar to the hardware procurement process.

Creating the Database

The new system to be implemented will have data stores. In modern systems, data stores are databases. These databases are relational database management systems, which is a separate application software package. The database has to be created and structures inside the database have to be created in order to enable it to store data. The implementation team creates the database, its structures and rules so that the application system being implemented can be plugged into the database and start working.

Training of Users

Implementation is a larger issue than installation. The new system may get installed but without proper training of users, it may not be of good use. Implementation is a larger concept and focuses on the installation and hand-holding part of the transition process. A training needs assessment is done to understand the training needs of the users. A training programme is planned and the required training given to users. This is an important part of the implementation process and helps in reducing the resistance to change related behavior among the user community. The training also helps users to appreciate the new features of the new system and helps build trust and appreciation for the new system.

Creating Physical Infrastructure

The new system being implemented may require a physical infrastructure. The implementation team must ensure that the system performance must not suffer due to infrastructure bottlenecks. The implementers will have to use their persuasive skills and convince the management of the organization to create the required physical infrastructure so that it does not affect the performance of the new system.

Transition to the New System

This is the last step in the implementation process. The transition if done wrongly leads to a lot of pain. Hence, it is necessary to move slowly on the transition front. Normally, after the new system is installed and ready, the new system and the old system are both used for a period to ensure that the company performance does not suffer due to transition problems. Slowly when the users gain more capability to handle the new system the old system is phased out.




What is Systems Development Life Cycle?

By Dinesh Thakur

Systems development on a large scale was first attempted by the US military in its Department of Defense (DOD) and by the National Aeronautics and Space Administration (NASA). They were therefore instrumental in developing the framework of a sequence of stages or phases for developing a system.

This sequence of distinct stages that a system goes through in its entire life is called the system development life cycle (Anderson 1991). The idea in such frameworks is to understand the detailed issues pertaining to the system in concept development, requirement definition, design, implementation, test and integration, installation, acceptance and operations.
[Read more…] about What is Systems Development Life Cycle?

Role of System Analyst

By Dinesh Thakur

A system analyst is responsible for analyzing, designing and implementing systems to fulfill organizational needs. He/she plays a vital role in making operational the management information system. The role of the system analyst has however changed.

The role of the analyst has however changed with time. Now a system analyst is seen more as a change agent responsible for delivering value to an organization on its investments in management information systems (that includes a heavy dose of information communication technology investment). A dictionary definition of a system analyst (as per Random House Dictionary) defines it as, ‘a person who conducts a methodical study and evaluation of an activity such as business to identify its desired objectives in order to determine procedures by which these objectives can be gained.

An organization requires system analysts as line managers normally do not have an understanding of the kind of information-based solutions that are possible for their business problems. A system analysts bridges this gap as he/she is has a thorough knowledge of both the business systems and business processes. A system analyst is therefore in a position to provide information system based solutions to organizations after having studied the problem that the organization is facing. They understand both business and technology. They study a business problem or opportunity and devise an information system enabled solution for it by detailing the information system specifications. This set of specification that the analyst delivers is in a technical format which is easily understandable to a technical (IT) specialist. The technical specialist might not understand the business issue, if it comes directly from the line managers as he has very little knowledge of business processes. The system analyst then bridges the gap between the two by translating and transforming the business problem/opportunity into a information systems solution and supplying the specification of such a system to the technologist who can then take up the task and build the actual system.

This may sound very easy but it is actually not an easy task. In most cases, the analyst works as a change agent. When devising a solution, the analyst does not restrict him/ her to the immediate problem/opportunity at hand but also focuses on the future. This requires that an analyst suggest some changes in the process of doing business to bring in greater efficiency in future. Inevitably, the process of creating an information systems enabled solution is coupled with the activity of business process reengineering through which change is brought in. The analyst uses the opportunity of devising a solution to bring in change and make the organization more efficient. Thus, a system analyst may also be considered as a change agent.

As we have pointed out in the previous section, the role of the analyst encompasses both the business and technology domain. In addition, the analyst also works, as a change agent hence the work of an analyst not only requires very good understanding of technical knowledge but also of business and interpersonal skills.

The interpersonal skills required by a system analyst are:

  1. Communication: The analyst needs to be a very good communicator to understand and communicate to the user group as well as to the1echnical specialists. Sometimes the users may not be able to communicate their needs fully to the analyst, but the analyst must be able to understand their needs from incomplete communication of the users.
  2. Foresightedness and vision: The analyst must have foresight and vision, so that they can factor in the future requirement of the users even if they have not factored that in the design. The analyst must also have vision with regard to the technological changes. He/she must be able to predict where the business needs and technological capabilities/constraints will be in the future. They should also clearly communicate that the design holds good not only for the short term but also the long term.
  3. Adaptability and flexibility skills: The analyst may be new to the environment of the particular business but he/she has to be quick on the uptake and adapt fast to the culture and environment of the organization. Some flexibility in the understanding of problems is also required along with the flexibility to come up with alternative solutions.
  4. Selling: The analyst needs to have flair to sell their ideas and solutions to the users. Sometimes this may be difficult as the users and clients might not know what solution will serve them best. The analyst needs to employ his selling skills to convince the users on the suitability of a solution.
  5. Patience and rationality: The analyst needs to be patient and rational so that he/she do not rush to a solution. If they make haste then they might miss critical information about the problem/opportunity and end up promoting a wrong solution for the users. Rationality is also a virtue for the system analyst, as this will help them in analyzing the problem/opportunity with a clear mind without prejudice.
  6. Sound temperament: The analyst needs to remain calm in the face of adverse situations. Most of the time the critical data that the analyst seeks is hard to come by and may be late in coming. The analyst will have to put up with all this and be clam in such situations. Thus, the temperament that he exhibits will help him in devising an appropriate solution for the client.
  1. Management skills: These skills are an absolute necessity for any analyst. The system analyst has to deliver in spite of several constraints hence they must have good management skills to manage time and resources at their disposal. The particular management skills that they need to have are:
    1. Time management skills. This will help them adhere to the strict schedules of the task.
    2. Project management skills. This will help them manage the project within the boundaries of time and cost.
    3. Man management skills. The analyst will need human resource skills so that they can manage people working under him. This skill will also help them to connect to people in the client organization so that there is greater acceptability for their solutions.
    4. Team management skills. The analyst must be a team player. They have to work in a team and they should ensure smooth team functioning.
    5. Organizing and directing skills. These are basic managerial skills that the analyst must have to conduct the analysis properly.
    6. Negotiation skills. The analyst should be a good negotiator to get his way around for the purposes of selling his solution and to get the relevant data from the client.
  1. Leadership quality: The analyst must exhibit leadership and take initiative to understand issues pertaining to the organization and its line of business in a proactive manner so that they are well aware of the associated issues of the problem/opportunity as well.
  2. Training and documentation capability: The analyst needs to be a good trainer as they may be called upon to enhance the capacities of the users. Their documentation skills will also have to be good, as without those skills the communication with the technical team will remain incomplete.
  3. Presentation skills: The analyst must have good presentation skills that will help him to communicate better.
  4. The technical skills required by the system analyst are:
  5. Creativity: This skill will ensure that the analyst can give the users novel technical solutions for the same problem.
  6. Problem solving: This skill will help the analyst form a systems approach to problem solving so that they are able to structure a problem even when there is none.
  7. Technical knowledge: The analyst needs to have concrete knowledge in the technical domain so that they are able to generate alternative solutions to problem. Without the technical know how they will not be able to develop the solution. The analyst must also have a broad knowledge of the entire technical domain. The broad spectrum of knowledge will help them be flexible in their solution approach and will ensure that they have a better understanding of the future of technologies.




Information System Plans

By Dinesh Thakur

Planning is the key to success in developing a good IS. IS planning brings to focus the reason for existence of the IS and helps the developers to undertake the task of development of IS in a structured manner. Organizations undertake planning for IS for several reasons. Typically IS, plans have a hierarchy with different levels of management handling different plans.

                      Flow Chart to Identify the Need for a New Information System

Strategic Information Systems Planning

This is the first plan of information systems within an organization. It is foremost for defining the role information systems will play in the overall scheme of things. Typically, top management formulates a charter for information systems or the CIO formulates the charter and gets approval of the top management. With the charter, the mission of information system in the organization is also formulated. Thereafter the constraints and environment in which IS is to be implemented is analyzed. In this, the strategic objectives, policies, human resource, maturity of IS usage of the organization and the present and future information needs of the organization in view of changes in technology is analyzed. Following the broad mission and analysis of environment and constraints, concrete objectives of information systems is laid down along with the plan of achieving the objectives. The plan will include broad guidelines on allocation of resources, mechanisms of control of the process of information system development and other guidelines for implementing the strategies of the plan.

Long Range Information System Planning

This is the second stage of planning done primarily to understand the user needs and objectives. This sort of plan does not go into project specific details but rather focuses on the expectations of users from the system. Typically, this kind of planning is done with a time horizon of five to ten years in mind. Broad characteristics of information systems based on the needs of the users are dealt with in this plan along with the technology trends in the information technology space and long-term objectives of the organization. The long-term plan requires greater detailing than a strategic plan and is normally prepared by senior executives in the organization which is then approved by the top management. Ideally, senior executives from different departments are involved in this process. The following step-wise course of action is normally taken to prepare a long-range information systems plan:

Collecting background data

All kinds of data that helps in creating a background or perspective for the planning with regard to the technology scenario, organization objectives, changing needs of the users, competition scenario, potential set of information services in future, availability of resources in future, suitability of organizational culture, etc., is collected and presented as a background.

Analyzing the broad long-term needs

Based on the prepared background, analysis of the overall long-term information system need of the organization is defined. This entails an analysis of demand on resources for such information systems and the means to provide them.

Developing the long-range plan document

Formally documenting the above steps into a plan of action results in the creation of this document. This document typically contains information about the objectives, resources to be made available for the IS, future trends in demand for information within the organization, risks and opportunities in developing the IS and organizational issues pertaining to installation of such IS.

The medium-range information systems planning

This is a very important plan for developing the IS. It looks to satisfy the present information needs of the organization by implementing a portfolio of projects. The planning time horizon is one to two years and the focus is on the present. It normally contains the plan of action for the portfolio of IS projects, resource requirements for each, procurement of necessary resources for implementing the projects, staffing needs analysis, budgeting and funding issues, priority setting of the projects under development. This process of planning, resulting in the information systems, master plan document containing details on:

  1. The present IS situation with regard to usage, ·technology, work force and other resources.
  2. Analysis of the present IS situation.
  3. Plan of action including prioritization of projects aligns it with the long-term plan of IS.
  4. Policies under several operational heads like training, procurement, hiring, outsourcing, and security are given in these documents.
  5. Financial implications.
  6. Risk to projects.
  7. Process of development and present status of each project under development.

The short-range information system planning

The time horizon for such a plan ranges from a few months to a year. Operational details and short-term goals and objectives are detailed out in this document. Normally the personnel of the information systems department are involved in the preparation of such a plan. It includes maintenance plan for existing systems, development plans for top priority systems, technical support required for the development, operations plan, training plan, staffing plan and financial plan containing practices and procedures for relevant issues, all in the short term of about a year.

                         Different Information Systems Plans




Information Systems Planning

By Dinesh Thakur

One has to plan the information which the management information system will churn out for the different levels of management. The report structures, information flow, storage, information capture and its strategy, network, applications and security are all planned and designed before the system is created.

Normally, the stages of MIS development conform to a stage-wise development approach, with planning of the system being the first activity followed by analysis and design which in turn is followed by coding, testing and implementation. However, even though the broad stages may be used for most MIS development, the order is sometimes tweaked. Each of the activities given above for development of MIS is a difficult and intellectually stimulating set of tasks requiring technical and managerial skills. In some of the activities, the users are actively involved in arriving at the design of the system.

Normally, the system analyst and his team will be responsible for the majority of the stages in developing the management information system. This is required as the development process requires knowledge of both management and technology which most line manager’s lack.

Planning for MIS is probably the most important task in the entire development process. It is the activity which if done wrongly may lead to huge cost and time overruns in the development process. The planning process involves amongst other things the aligning of objectives of an organization with the objectives of the MIS. This activity requires strategic management orientation and a macro view of the needs and growth aspirations of the organization among other skills as the system will have to be relevant to the organization in the near future. If the organization outgrows the MIS, then the MIS will have to be redeveloped. This being costly, in both time and financial dimensions is to be avoided.

                        Problem of IS developement

However, before we embark on planning, we must have an understanding of what we are getting in to. For this, it is very important to understand that IS development for which the planning is being done can be difficult or easy depending on a few factors. If the IS development according to the assessment of the factors is easy, planning will be done accordingly and if the assessment of the factors is such that the IS development is likely to be difficult then planning has to be detailed and management has to be involved more in the planning process. The factors also must be explained to the top management and the possible difficult areas must be clearly identified and monitored in the entire development process. The planning for all this then becomes a part of the IS planning process.

Information systems development becomes easy if there is:

  1. A supportive management with a positive attitude
  2. The existing IS is adequate
  3. The objectives for the new IS is good and clear

In such a scenario, the IS development becomes easy and the IS that is developed delivers value and becomes acceptable to employees easily. However, if any or all of the above factors are not in favor, i.e., management is not supportive or has a negative attitude towards IS or if the objectives of the new IS are bad or if the existing IS is inadequate or all of the factors are together not in favor, then the IS development becomes very difficult. One must factor in these issues before commencing with the information systems planning process.

The Process of Development of Information System: A Typical Software Development Life Cycle

The process of development of information systems in an organization may vary from case to case but ideally the stages of development can be clearly demarcated. The process of development of information system involves the following stages:

  1. Planning-planning is required as without planning the outcome will be below expectations. Planning sets the objectives of the system in clear and unambiguous terms so that the developer may conform to a well laid set of deliverables rather than a high-sounding statement that may mean little to him. Planning also enables the development process to be structured so that logical methodology is used rather than working in fits and starts. It ensures user participation and helps in greater acceptability and a better outcome from the development process. It leads to a system that is well balanced in both the managerial and technical aspects.
  2. Analysis-is an activity of technical representation of a system. Over the years many methods have been developed of which the structured analysis and object oriented analysis are most widely used. This step or activity is the first technical representation in abstract terms of the system.
  3. Design-is the stage where the model or representation of an entity or a system is done (in detail). It is based on the idea that the developer will be able to develop a working system conforming to all the specifications of the design document which would satisfy the user. ·It is a concept which has been borrowed from other branches in engineering where the blueprint of a system or entity to be built later is first created on a piece of paper or digitally to help developers in conceptualization of the system and to understand the specifications of the system.
  4. Coding-is the actual stage of writing codes to develop the application software according to the specifications as set by the design document. The programming done at this stage to build the system is dictated by the needs of the design specifications. The programmer cannot go beyond the design document.
  5. Testing-is the testing of the system to check if the application is as per the set specification and to check whether the system will be able to function under actual load of data. The testing is also done to remove any bugs or errors in the code.
  6. Implementation-is the stage when the system is deployed in the organization. This is a process which often is a difficult one as it involves some customization of the code to fit context specific information in the system.

Before commencing IS planning, one must also identify the need for new information system. The above figure gives a flow chart to find out if the existing IS is fulfilling the objectives of the organization with respect to IS. Sometimes, an existing IS can be tweaked or redesigned to align it with the changing objectives and business needs of the organization but sometimes, that become too costly or technically infeasible, in which case, one has to start the process for a new IS. The above flowchart also gives us a tool to use to understand whether our existing IS is relevant for our business operations.




Strategic Information Systems Planning

By Dinesh Thakur

The Strategic of information systems planning is explained below.

The Ad Doc Approach

This approach towards development of information systems is the worst possible approach as people in the development process are in the process of perpetual fire fighting. There in no plan available and the development work is carried out as per wises of the developer based on his understanding of what the needs of the user should be. The outcome of this kind of approach is a set of systems that are not synchronized or synergized into one system but a host of systems that work in isolation.

The Data Collection Approach

In this approach, all possible data about the need for the system and about the system is collected. This approach assumes that information systems are best developed based on data from all quarters. This results in lack of focus and understanding as the systems development process gets mired unnecessarily into other issues, like projecting the future information requirement in granular detail by the user.

The Organization Chart Approach

In this approach the information system is developed with the organization structure in mind. It assumes that information strictly flows on the basis of organizational structures. Junctions of information exchange are made on an ad hoc basis which complicates the flow of information and brings in redundancy in the system.

Now that we know how not to approach IS development in an organization, let us discuss the appropriate approaches for IS development.

The Top-down Approach

The top-down approach is used to develop IS with the objectives in focus. The objectives of the IS become the most important priority. The objectives are clearly defined in the first step, followed by identification of the activities of the organization. This in turn is followed by the third step in which the decision-making needs of managers within the organization are analyzed and the necessary information flow for facilitating information delivery to managers for decision-making is understood in detail. Once all the details are available, the application is developed. In this type of system the objectives become the mainstay of the system. However, for this kind of system, the requirements from the systems have to be clearly understood upfront to avoid any problems in the development process. This is because the strategy of development is such that the design is not adequately dynamic.

The Bottom-up Approach

In the bottom-up approach, we find out the type of information that is produced in the operational subsystem and then work backward to integrate this with the entire IS structure to have an organization wide impact. In this design, there is more flexibility to change the information system deliverables even during the development process as the individual subsystems are not designed according to the demands of the upper layers as in the case of top-down approach. On the contrary, here the upper layers are integrated with the lower layer subsystems to create the IS. Thus, bottom-up systems can expand in response to real-world changes and needs of the organization.




Importance of Information Systems Management in an Organization

By Dinesh Thakur

The degree of success of any information management initiative or intervention in an organization depends upon the approach of the management of the organization towards such an initiative. If the approach is short term and the benefits or objectives envisaged is too narrow, then the information system remains only of marginal value.

On the other hand if the management is fully convinced of the need for such a system and gives it wholehearted support and backing, then naturally the process of information system development is adhered to in a more comprehensive manner, with proper planning, listing of objectives, proper analysis and design and proper implementation. This result in a superior information system that can not only fulfill the information needs of the organization in the present but can also continue to serve the organization in times to come.

The objectives and deliverables planned for such a system is well structured and the user, i.e., the managers who are involved in the planning and designing stage of the development process of the information system. There is no gap in the expectations and deliverables. This means that there is no misunderstanding between what the managers want from the system and what the developer designs the system to deliver. This leads to greater acceptability of the system within the organization and leads to greater return on investment as far as the organization is concerned. The training required for the managers is also much less if they are involved in the process of development.

Also the role of the top management comes to a focus in the development process. The top management by giving its full support may choose to send a message to the entire organization that leads to greater acceptability of the system and a lesser resistance to change. If the top management is ambivalent, problems of acceptability and conflict arise. Information systems are known to cause conflict, resulting from a resistance to change of mindset amongst employees. This behavior may to an extent be controlled without human resource intervention if the top management support is not only given to the project but also made well known across the organization. This means that communication is needed for the system and the support of the top management should be well communicated to the employees to gain greater acceptability and a smooth transition.

Most organizations choose to outsource the work of development of information systems to specialized IT firms. This brings to the fore the necessity to control the outsourcing process. The problem with the strategy of outsourcing the development work of information systems is that the outsourced agency may not understand the specific internal requirements of the organization. Specialized IT consulting firms are available to control this process on behalf of the organization. Typically, the IT consulting firm studies the needs of the organization and prepares a design document in consultation with the users, i.e., the managers of the organization and then the IT development firm develops the system by adhering to the design. Suitable control is exercised by the organization in which this information system will be implemented in the form of discussions, ratification of prototypes, etc., along with controls exercised by the IT consulting firm like comparison of design with the actual development. This ensures that the product is prepared as per plan and that any deviations are noticed during the development stage and not during the implementation stage. This ensures that corrective measures can be taken to rectify the mistakes, if any, without much on cost or time.

In some cases, the organization may choose to develop the information system with its own resources. This is difficult as in today’s world the technological development has been sogreat in these areas of information technology and communication technology that it may be almost impossible for normal organizations, i.e., whose main job is not IT consulting or IT development to garner the technical expertise of an IT development firm and then develop a system from scratch. This will not only be very costly for the organization but may lead to unreliable results. In such a case, the managerial objectives will be clear and well adhered to but the technical objectives may suffer.




Relationship between Information Technology and Business Strategy

By Dinesh Thakur

Several categories of IS and BS relationships exit. Primarily, such relationships indicate the extent of maturity of an organization in the use of IS. An organization that uses IS for bringing in efficiency in its business processes is looking at IS from a different prism than an organization that is looking at IS to provide it with insights on how to be more competitive. The organizations are at different levels of maturity.

Using IS to Reduce Costs

Organizations use IS to bring in greater efficiency in their business processes to reduce cost of operations thereby also reducing the cost of offerings. Such a strategy of using IS with the motive of cost control alone takes a narrow view of the capability of IS in the overall scheme of doing business. In this case, IS follows the business strategy of cost reduction. Indeed IS are used as a weapon to implement the business strategy. IS in such organizations are structured and focused on delivering greater efficiency to the organization by streamlining the processes but is not tailored to provide the management of the organization.

Using IS to Differentiate Products and Services

Organizations at a higher maturity level of information system use it for creating a competitive advantage by helping organizations to take decisions that help in differentiation of products and services from their competitors. Organizations like Capital One, Google and NetFlix use the power of information to the fullest. They derive predictive value which enables them to be always one step ahead of competition as they are able to predict the direction of the market and differentiate their offerings to suit the market needs. They keep their ears close to the market pulse with the help of IS. They regularly check their own transaction data to see the emerging or changing patterns of customers who might help them to offer a new product or service to differentiate their offering. This requires complete top management support and a holistic approach towards IS. When the management is convinced of the benefits of IS and the organization as a whole has reached a degree of maturity in dealing with IS, then these kind of linkage with strategy and IS is possible.

Using IS to Focus on a Particular Market Segment

This is another example of IS being used in isolation. Organizations use IS to keep track of a particular segment of market which interests them. This sometimes requires integration of IS with external data sources.

Using IS to Build Stronger Linkages

IS can be an important tool to maintain linkages with your own network of suppliers and customers as the vendor relationship management systems run on this premise. A strong and reliable IS linking the organization with its business relations, like vendors, customers and regulators leads to better communication and understanding between the different business entities. This is another role in which IS is now being significantly used-the role of networking. In this role, IS is used more as a medium of communication rather than a decision support tools. In this role IS works as a source that determines the information flow among different business entities.

Using IS for Information, Knowledge and Leadership

IS can be used in itself as a strategy to provide the organization with information and knowledge leadership. The speed and insights provided by IS results in faster turnaround times for new products and services. Leadership in IS results in quicker and more incisive insights reaching the market from the organization. As Rand D times reduce, customer preference is easily mapped and organization is lean and always geared to manage change. This gives a strategic advantage to a firm.




Information System and Business Strategy

By Dinesh Thakur

Information systems when used for providing information to managers for their decision-making needs become a management information system. The goal of such information systems is to provide relevant information to management so that it helps in its functioning.

Since decision-making is the most important task performed by the management at different levels, information that helps managers to take decisions is the most important objective of any management information system. Other information that is relevant for managers in helping them in their planning, controlling, organizing and directing activity is the secondary objective of any MIS.

However, an information system is normally not dynamic enough to alter itself to a degree that it can handle changing requirements from users. Hence, information systems are planned to take care of every possible eventuality as far as type of information is concerned. Management may require diverse types and combination of information and this is factored in the planning process. The system is planned in a way that it can handle future new requirements of information from managers.

The business strategy of the company is very important in planning for information systems. The information systems plan is drawn up in a way that it supports the strategic objectives of the organization even in the near future. It is for this reason that the strategic role of information system has to be clearly defined in the planning processes itself.

What is Information System Strategy?

The information required to support business strategy and the development of information systems relevant to providing such information needs to be planned and fitted with each other. This alignment of business strategy with IS results in information systems strategy. It is a continuous process that helps the IS support structure to continuously remain relevant for any organization’s strategic goals and objectives.

Information System Infusion and Diffusion

Information systems can have the effects of infusion of diffusion in an organization. If the diffusion and infusion is low, information systems will be used only in silos for data processing. If diffusion is high and infusion is low then we will have a decentralized information system. If infusion is high and diffusion low, we will have information systems that are critical to operations only. However, if both diffusion and infusion is high, our information system will give us strategic and competitive advantage.

                                             Diagrammatic Representation of the Linkage between Strategy and IS and IS Planning

 

                         Information Diffusion and Infusion relationship

How can IS be Used Strategically

In the absence of a cogent strategy for IS, it will deliver information that may be of little strategic value. Moreover, operationally the different technology platforms used, different systems that make up the entire information systems of an organization may not work in a synchronized manner unless all the systems and technology conform to a bigger strategic vision. Incompatibility will be the rule rather than the exception. Business goals and objectives will not be largely affected (positively or negatively) by such direction less IS. Opportunities will be missed. With a tactical focus IS cannot deliver strategic value to organizations. IS therefore must have a strategic focus. It must be closely aligned with business strategy and must be driven by business needs rather than technological possibilities. It should be integrated with the organizational strategy to deliver information that helps management to beat competition and thereby use IS as a tool for competitive advantage. IS in such a case has to deliver predictive insights into business issues.

                      Diagrammatic Representation of the Organization's Business and Information Technology Variables and Their Relationships

Why we need a strategic Approach to Information Systems

If we analyze the history of information systems and how they have been put to use in organizations, then we get to see three eras (Ward 1990). In the initial or first era, information systems were primarily used as data processing tools and the focus was improving efficiency of repetitive work by automating such data processing and back office work. In the second era, management information systems were the rage. MIS focused on improving information flow within the organization so that the right person gets the right information. Essentially, MIS was used as a reporting aid and thus by definition, reactive in nature. The third era of information systems is dominated by strategic information systems which work as a game changer in a competitive environment providing the organization with the upper hand. The focus in these kinds of IS is IT applications for predictive insights into the competitive market conditions and other strategic goals of the organization. In the present date, this kind of IS finds acceptability and is used extensively in the corporate world. The table below clearly lays down the differentiating characteristics of the different eras of IS.

                                   Strategy 1: Different Eras of Information Systems

Time

Eras

Characteristics

Fifties and sixties

Data processing

• Cost minimization

• Repetitive work

• Operational work/data

• Back office work

• Removed from actual users

• In silos

• On standalone system(T)

Seventies and eighties

Management information system

• Interconnected information flows

• Close to users

• Distributed processing

• Focus on providing right information to

the right person at the right time

• Focus on providing information that helps

in decision-making

• User need driven

• Supports the business processes

• Management oriented

Eighties and nineties

Strategic information system

• Networked

• Integrated

• Predictive insights

• Business driven

• Aligned to business strategy

Unless information systems fit into the broad strategy of the firm, it is likely to generate suboptimal results for the firm. The true potential of information systems can only be realized if the organization adopts a strategic approach towards the information system resource. IS in this regard should be considered as an asset that can provide insights that help in improving the business of the firm in any manner rather than as an expense (to get information about one’s own organization). Actually, IS should fit into the strategy of the firm and help in achieving the strategic objectives.

Information system needs a strategic orientation as without such orientation the will lose focus. More focus is given to technology whereas business needs are its primary focus. The strategic orientation of information systems helps it to have definable goals and objectives itself.

Information systems can be used strategically to:

  1. Improve integration or process within the organization. This helps in improving overall efficiency and performance.
  2. Link the organization with customers and suppliers. This ensures that the reaction time for the organization is low and that effectiveness of the firm improves.
  3. To provide top executives with critical information about the organization. This helps in better management as information flow improves and leads to better decision-making.
  4. To enable improvement in products and services. This helps in the competitiveness of the firm.

Use of Information Systems by Different Category of Companies

Information systems are used by different companies in different ways. One of the ways to find the use of information system in organizations is to use the BCG matrix. The use and adoption of information systems depends upon where they lie in the BCG matrix. Star companies use IS to improve products and services and for innovation, while, Dog companies use it for support and cost reduction only. Cash Cow companies use it to improve productivity and Wild cats use it for insights and differentiation.

                     BCG Matrix of an Organization's Option for Implementing IT Solutions




The 7’S model

By Dinesh Thakur

McKinsey developed this model in the 1970’s to determine the ease or ability of an organization to adapt to change. The primary focus of this model is on coordination. It is an excellent tool for self-diagnosis of problems by organization as it clearly bares the problem areas of the organization and highlights them. Even though it was proposed in the 1970’s, it still has some use in today’s ever changing organizations. The component elements of this model are:

  1. Style-the first constituent element of this model is the style of functioning of the organization, its organizational culture and climate.
  2. Skills-the second element is the skill set of the organization and its people.
  3. System-is the third element of the model. The processes and systems make the organization which are used to maintain control and used for directing.
  4. Structure-is the fourth element of this model. It refers to the structure of the organization, i.e., rigid or flexible. It also indicates the powers of the executives and the channels through which the power is to be exercised.
  5. Staff-is the fifth constituent of the model and it refers to the employees of the organization.
  6. Strategy-is the sixth element and it stands for the activities that the organization indulges in for gaining competitive advantage in the market.
  7. Shared value-is the seventh and last element of the model and it refers to the common set of values that each employee of the organization stands for. This has today gained importance in view of the series of corporate governance challenges that are being faced by the companies.

                                McKinsey 7'S Model

Information is required in both strategy planning and strategy implementation. Without the right information about opportunities, threats, markets and changes in business environment, competitors and their plans, the organization’s own strengths and weaknesses and government guidelines and polices, business strategy can neither be planned nor the planning be implemented with elan. Information thus plays a very crucial role in strategy. This fact was however ignored by the top management until the mid-nineties when top executives began to realize the connection and the potential to leverage information systems for strategy development and implementation. Today in most organizations there is a buy in by top management on this linkage between strategy and information systems. In fact, information systems are now being developed in a way that they are aligned to the strategy and help in its planning and implementation. Thus, a new concept of strategic information systems has developed. New developments in the field of information management and information systems have contributed to the development of this area.




Next Page »

Primary Sidebar

MIS Tutorials

MIS Tutorials

  • MIS - Home
  • MIS - Classification
  • MIS - Characteristics
  • MIS - Implementation
  • MIS - Benefits
  • MIS - System Types
  • MIS - Simon’s Model
  • MIS - Different Systems
  • MIS - Open Vs Closed Systems
  • MIS - Different Functional IS
  • MIS - System Maintenance
  • MIS - MIS Functions
  • MIS - Information
  • MIS - Systems Approach
  • MIS - DSS
  • MIS - Information System Types
  • MIS - Deterministic Vs Probabilistic
  • MIS - System Analyst Role
  • MIS - MIS Planning
  • MIS - QoI
  • MIS - Types of System
  • MIS - Role of Information
  • MIS - Quality of Information
  • MIS - Home
  • MIS - Traditional Vs Modern Marketing
  • MIS - Development Approaches
  • MIS - Organizational Need
  • MIS - Nolan's Six-stage Model
  • MIS - Decisions Types
  • MIS - Selecting Hardware
  • MIS - Management Levels
  • MIS - Information Dimensions
  • MIS - System Design
  • MIS - Systems Types
  • MIS - Information Value
  • MIS - Business Strategy
  • MIS - Management Reports
  • MIS - Anthony's Framework
  • MIS - System Characteristics
  • MIS - Information Systems
  • MIS - Types of IS
  • MIS - Structure
  • MIS - Problems in Implementing
  • MIS - Limitations
  • MIS - Planning
  • MIS - Stages of Development
  • MIS - Conceptual Design
  • MIS - Four Stage Model
  • MIS - Prerequisites
  • MIS - System Investigation Stages
  • MIS - DSS Classification
  • MIS - Subsystems
  • MIS - Business Expert Systems
  • MIS - Nolan Stage Model
  • MIS - Control Systems Types
  • MIS - SQA Benefit
  • MIS - Development Factors
  • MIS - Systems Approach
  • MIS - Decision Support System
  • MIS - Efficiency and Effectiveness

Other Links

  • MIS - PDF Version

Footer

Basic Course

  • Computer Fundamental
  • Computer Networking
  • Operating System
  • Database System
  • Computer Graphics
  • Management System
  • Software Engineering
  • Digital Electronics
  • Electronic Commerce
  • Compiler Design
  • Troubleshooting

Programming

  • Java Programming
  • Structured Query (SQL)
  • C Programming
  • C++ Programming
  • Visual Basic
  • Data Structures
  • Struts 2
  • Java Servlet
  • C# Programming
  • Basic Terms
  • Interviews

World Wide Web

  • Internet
  • Java Script
  • HTML Language
  • Cascading Style Sheet
  • Java Server Pages
  • Wordpress
  • PHP
  • Python Tutorial
  • AngularJS
  • Troubleshooting

 About Us |  Contact Us |  FAQ

Dinesh Thakur is a Technology Columinist and founder of Computer Notes.

Copyright © 2025. All Rights Reserved.

APPLY FOR ONLINE JOB IN BIGGEST CRYPTO COMPANIES
APPLY NOW