Management Information System
Management Information System
Management Information System
ISLAMABAD
(Assignment # 1)
Question # 1:
Part (a):
Challenges in studying MIS:
Some of the distinguishing challenges
that the people face while planning, using or approving management
information systems are:
• MIS requires a wide variety of knowledge areas including accounting,
-1-
finance, marketing and manufacturing. Therefore having both technical
and practical experience in these subjects is very useful.
• Both technology and technology-related products are emerging at very
high pace. Consequently no one possibly be proficient in all new
technologies and compromises have to be taken.
• Many terms used in MIS are inaccurate and controversial because of
high pace of new hardware, software and communication technology.
• MIS problems are difficult to define. Some times a situation may be
seen as a problem but in fact it may be a symbol only.
• Not like other subjects like Physics, Chemistry that exists probably
from very beginning, MIS has only been recognized as a separate field of
study in 1960s.
• A large number of important areas of MIS are still not touched as said
by many professionals.
• There is a lack of sympathetic relationship between MIS personnel and
users and management and MIS personnel because employees are more
loyal to their profession rather than needs of the organizations.
• No universal standards have been established regarding how much to
spend on MIS.
When talking about the vast field of Information Systems there is not just
one pressing issue, there are three: Accuracy, Usability, and Time.
Without the combination of these three factors a business would go
under in the matter of months.
The first of these three and probably the most important of these is the
accuracy of the information. The information that you provide someone
with in order to make vital decisions must be precisely accurate. If one
piece of data is incorrect it could mean the difference between life and
death, literally. For example, if a doctor receives false information about
a patient’s allergies he may give that patient medicine that could
eventually kill them. Another recent instance where inaccurate
information caused a catastrophe is with Enron. They falsified financial
-2-
information causing the company to collapse. If a news station were to
give a report that was invalid, they would lose their credibility and
respect from the people. Accuracy is a must when it comes to
information that is provided to make decisions of any kind.
-3-
challenge of information getting to them will need also to become
faster.
These three aspects of Information Systems must be used in conjunction
with one another. Information may be received quickly and easy to use,
but if it is inaccurate it is worthless. Just the same if the information is
either too slow or incomprehensible it is useless as well. “Being an
information services provider, we especially understand the importance
of speed, accuracy, flexibility, technology and the highest level of
customer service as being key components of a successful marketing
strategy in a competitive environment,” states Berkshire Information
Systems Inc. The biggest challenge of these three issues is combining
them together in an efficient effective manner.
-4-
systems technology allows you to have this path to build upon. You must
be able to control the technology and not be locked into a standard
boxed solution that only its manufacturers control. You get no assurance
that their upgrades will be inline with your business needs of the future.
Learning about information systems will help you both personally and
professionally. An understanding of information systems can also help a
company. An effective information system can have a major impact on
corporate strategy and organizational success. This impact can benefit
the organization, users of the information system, and any individual or
group who will interact with the information system. Some of the
opportunities organizations seek to achieve through information systems
include:
Added value to products (goods and services)
Better safety
Better service
Competitive advantages
Fewer errors
Greater accuracy
Higher-quality products
Improved communications
Increased efficiency
Increased productivity
More efficient administration
More opportunities
-5-
Reduced labor requirements
Reduced costs
Superior financial decision making
Superior control over operations
Superior managerial decision making.
Part (b):
Computer hardware
Today even the smallest firms, as well as many households, own or lease
computers. These are usually microcomputers, also called personal
computers. Large organizations typically employ multiple computer,
from a few powerful mainframe machines (or even more powerful
supercomputers) and minicomputers to widely deployed personal
computers. Together with computer peripheral equipment, such
as magnetic disks, input-output devices, and telecommunications gear,
these constitute the hardware of information systems. The cost of
hardware has steadily and rapidly decreased, while processing speed
and storage capacity have increased vastly.
Computer software
Computer software falls into two broad classes: system software and
application software. The principal system software is known as
the operating system. It manages the hardware, files, and other system
resources and provides a systematic and consistent means for
controlling the computer, most commonly via a graphical user
interface (GUI). Application software is programs designed to handle
-6-
specialized tasks; many of these programs are sold as ready-to-use
packages. Examples include general-purpose spreadsheet and word
processing programs, as well as “vertical” applications that serve a
specific industry segment—for instance, an application that schedules,
routes, and tracks package deliveries. Larger firms often develop their
own application software or customize existing packages to meet
specific needs. Some companies, known as application service providers
(ASPs), have begun to rent specialized application software on a per-use
basis over the Web.
Databases
Many information systems are primarily delivery vehicles for databases.
A database is a collection of interrelated data (records) organized so that
individual records or groups of records can be retrieved that satisfy
various criteria. Typical examples of databases include employee records
and product catalogs. Particularly valuable are customer databases that
can be “mined” for information in order to design and market new
products more effectively. Anyone who has ever purchased something
with a credit card—in person, by mail order, or over the Web—is included
within some of the numerous customer databases.
Telecommunications
Telecommunications are used to connect, or network, computer systems
and transmit information. Various computer network configurations are
possible, depending on the needs of an organization. Local area
networks (LANs) join computers at a particular site, such as an office
building or an academic campus. Wide area networks (WANs) connect
machines located at different sites, and often within different
organizations. The Internet is a network of networks, connecting millions
of computers located on every continent. Through networking, personal
computer users gain access to information resources, such as large
-7-
databases, and to human resources, such as coworkers and people who
share their professional or private interests.
Question # 2:
Management solutions for End-User resistance to the
implementation of new information system:
-8-
enterprise system implementation indicate the central role of switching
costs in increasing user resistance. Further, switching costs also mediate
the relationship between other antecedents (colleague opinion and self-
efficacy for change) and user resistance. Additionally, perceived value
and organizational support for change are found to reduce user
resistance. This research advances the theoretical understanding of user
acceptance and resistance prior to a new IS implementation and offers
organizations suggestions for managing such resistance.
-9-
challenges that impact organizations and people on many levels.
Overcoming these challenges is not only essential but it is a must for a
successful IT project. Human factors contribute to some of the most
important issues that play a part in a project’s success or failure. One of
the indicators of a successful IT project is determined by how much it is
used by its users.
The goal of this research was to identify strategies that could be used to
deal with end-user resistance on IT projects; investigate the
effectiveness of these strategies and whether or not they are used IT
project managers.
- 10 -
evaluation, defining requirements, evaluating system prototypes
and performing user acceptance testing.
• End-user training. Some examples of training include conceptual
training (presenting end-users with an overview of how the system
is organized and how it works), procedural training (involves
explaining to end-users how to use specific set of the system
functionality), self-taught (involves end-users learning a new
system by themselves by means of trial and discovery), just-in-
time (training occurs just prior to implementation of the new
information system) and staged training (involves breaking up
training into smaller training sessions).
• End-user support. Some examples of end-user support involve
helping users with internally developed or purchased applications,
helping them with hardware use or problems and providing support
for work performed on a computer.
• Communication. Communication can take place in several forms
such as oral, written and non-verbal. Some examples of
communication are newsletters, e-mails, notice boards, making
information available on the intranet and direct face-to-face
meetings.
• Consultant involvement. IT consultants serve as a catalyst for
change by influencing a client's IT decisions. They can help to
implement applications successfully and ensure that users adapt to
new changes
- 11 -
Often Sometimes/On Some Occasionally
Projects
Communicati Communication by means Communicating with end- Communication
on strategy of e-mail, face-to-face and users by means of by means of
phone; teleconferencing and making newsletters.
Meeting up with end-user to information available via a
discuss any issues or website;
concerns.
End-user End-user participation Building prototypes and
participation during any of the stages of involving end-users in
IT project; prototype assessment and
End-users performing user evaluation;
acceptance testing; Encouraging end-users to
Involving end-users in appoint a formal user-liaison
system testing. to the project team;
End-user Providing training before, Repetitive
training during and after system training sessions
implementation;
Providing one-off training to
end-users;
Providing stage-wise training
to end-users.
End-user Providing end-user support Giving end-users that were
support after system involved in the project
implementation; support during system
implementation;
Consultant Consultant involvement in the
involvement project;
- 12 -
strategies were rated by IT project managers as the most effective
strategies for dealing with end-user resistance.
Question # 3:
System Software:
System software refers to the files and programs that make up your
computer's operating system. System files include libraries of functions,
system services, drivers for printers and other hardware, system
preferences, and other configuration files. The programs that are part of
the system software include assemblers, compilers, file management
tools, system utilites, and debuggers.
Application software:
Application software is software designed to help the user to perform a
singular or multiple related specific tasks. Such programs are also
called software applications or applications software. Typical examples
are word processors, media players and database applications.
- 13 -
Role of System and Application Softwares for Business End User:
Computers and software are more tangible to most people than business
concepts such as marketing philosophy, competitive strategy and business
models. However, the business process that is built upon these fundamentals
provides the real key to success. Computers and software are essential tools
used to implement the business process, but they still are just tools in the
overall scheme of the business.
Construction software
Decision making software
Dashboards
Document Automation/Assembly
Electronic business
Electronic performance support systems
Legal Matter Management
Management information systems
- 14 -
Operational risk management
Product lifecycle management
Project management software
Retail software
Supply chain management
Supply chain management software
- 15 -
reading software engineering papers that refer to 'business processes' or
'business process modeling.'
- 16 -
Question # 4:
Part (a):
Database:
A database is an integrated collection of logically-related records or files
consolidated into a common pool that provides data for one or more
multiple uses. One way of classifying databases involves the type of
content, for example: bibliographic, full-text, numeric, and image. Other
classification methods start from examining database models or
database architectures: see below. Software organizes the data in a
database according to a database model. As of 2010 the relational
model occurs most commonly. Other models such as the hierarchical
model and the network model use a more explicit representation of
relationships.
Types of Database:
Relational Database
Analytical database
End-user database
- 17 -
These databases consist of a variety of data files developed by end-users
at their workstations. Examples of these are collections of documents in
spreadsheets, word processing and even downloaded files.
Data warehouse
A data warehouse stores data from current and previous years — data
extracted from the various operational databases of an organization. It
becomes the central source of data that has been screened, edited,
standardized and integrated so that it can be used by managers and
other end-user professionals throughout an organization. Data
warehouses are characterized by being slow to insert into but fast to
retrieve from. Recent developments in data warehousing have led to the
use of a Shared nothing architecture to facilitate extreme scaling.
Operational database
customer databases
personal database
inventory databases
accounting databases
Distributed database
External database
- 18 -
These databases provide access to external, privately-owned data online
— available for a fee to end-users and organizations from commercial
services. Access to a wealth of information from external database is
available for a fee from commercial online services and with or without
charge from many sources in the Internet.
Navigational database
In-memory databases
Document-oriented databases
- 19 -
relational databases, document-based databases do not store data in
tables with uniform sized fields for each record. Instead, they store each
record as a document that has certain characteristics. Any number of
fields of any length can be added to a document. Fields can also contain
multiple pieces of data.
Real-time databases
Part (b):
Types of Telecommunication Networks
Most networks can be classified into one of five different types. These
include wide area networks (WAN), local area networks, (LAN), virtual
private networks (VPN), client/server networks, network computing, and
peer-to-peer networks.
- 20 -
Wide Area Network (WAN)
There are three features that differentiate MANs from LANs or WANs:
1. The area of the network size is between LANs and WANs. The MAN will
have a physical area between 5 and 50 km in diameter.
- 21 -
Local Area Network (LAN)
Virtual Private Networks or VPNs are a type of network that builds on the
concept of a WAN however relies upon the internet and an encrypted
connection mechanism to establish a secure environment for internal or
external employees or customers.
Client/Server Network
Network Computing
- 22 -
architecture a computer uses its web browser to connect to another
network computer that actually is running the application. A good
example of this architecture in use is Google Docs or Microsoft Office
online. Both services allow users the ability to login to Google or
Microsoft servers respectively and work similarly to how it would be
performed on their own computing environment.
Peer-to-Peer Network
Peer to peer networks are now beginning to be realized for the positive
benefits they provide and not as only used for the sharing of copyrighted
material. Peer-to-peer networks can be separated into two major types:
Central Server and Pure.
Question # 5:
Part (a):
Electronic payment Processes:
- 23 -
1.
What is a virtual credit card?
This kind of card does not rely on any hardware, that is to say, they are
solely a number lodged in the server of the emitting organization.
2.
How is a virtual credit card used?
This kind of card is used of the following way:
The user will load the virtual card with a determined amount; this will be
done through
the Internet, automatic tellers or branch of a bank. This upload is made
against any account that the user arranges in the issuing bank, one to
make the purchase of the empty card and in case a loaded card has not
been drained completely the rest could be "download" in the account
that the user chooses.
3.
What advantages does the use of the virtual credit cards offer?
The main advantages offered by this kind of card are that they do not
have to be necessarily associated to a certain account and also are free
of the costs of discharge or maintenance. In addition, many financial
organizations that commercialize this kind of card include an insurance
against fraud in purchases made on the Internet.
B. The E-cash Model
1.
What is an E-cash model?
This is a system that provides security and privacy through a scheme of
cryptography with public keys, and validity as much for open networks
(Internet) as for private networks. The system associates an application
of software online that allows the accomplishment of payments in
exchange for information, goods or services.
2.
Once the funds are bought from emitting organizations, the client uses
the funds to pay a salesman. At the moment of the purchase, the
- 24 -
salesman must resend the funds to the bank of issuance to make sure
that those funds have still not been spent. If the funds are valid, they will
be deposited in the account of the salesman. Then, the salesman can
send the merchandise and the invoice corresponding to the client.
3.
What is the disadvantage to the use of the E-cash model?
The main problem of E-cash is that, unlike credit cards with a world-wide
diffusion, it is necessary that the commercial establishment accept it as
payment method. Another problem resides in that at the present time in
the development of this model, the client and the salesman have to have
accounts in the same bank of issue of the E-cash, that is at the moment
the funds emitted by a bank are not valid in other banks.
Nevertheless, it is possible that as the use of E-cash extends, there will
appear organizations who are dedicated to the interchange of these new
currencies between banks.
4.
What are the advantages the use of the E-cash model?
It offers the possibility of maintaining the absolute privacy of the client,
provided there is an agreement between the bank of issue and the
organization from which the goods or services have been acquired.
C. Systems Based on NetBill Checks.
1.
What is the systems based on NetBill checks and how does it work?
This is a system that was developed by the University of Carnegie
Mellon. Its operation is based on a protocol of transactions of NetBill and
the use of symmetrical keys for the return of the acquired data.
This kind of transaction receives the name NetBill checks because its
operation is similar to a payment with a check, so that the payment (and
the transference of funds between accounts) are carried out at the
moment in which the purchase is made. So that the NetBill system can
function, the clients and the commercial organizations must belong to
the system supported by a server of NetBill, that is in charge of
- 25 -
maintaining the accounts of the clients and those of the commercial
organizations. These accounts can be associated with traditional
accounts in financial organizations. When a client buys information, it
loads the corresponding amount in its NetBill account, which is paid to
the NetBill account of the commercial organization.
2.
What are the advantages of the use of the systems based on NetBill
checks?
The advantages of this system are related to the possibility of paying
solely by the received information.
3.
What are the disadvantages of the use of the systems based on NetBill
checks?
Like the other systems analyzed previously, it has the disadvantage that
the clients and the commercial organizations must belong to the system
so that a transaction can be made.
Part (b):
E-commerce Business success:
Many small ecommerce businesses are one-to-five person shops whose
income is derived solely from their websites. As the ecommerce world
evolves and becomes more sophisticated, however, success for these
smaller merchants has become more challenging.
Through the past year, certainly a harrowing one economically, we have
seen quite a few smaller site owners thrive. We have also seen a
significant number succumb to the current economic conditions. Here
are six factors we see for those who are achieving success.
Product Line
A niche product line is a very good thing. If what you are selling is
available on Amazon, then you should ask yourself what you can offer as
a value-add, such as service, information, guarantees, or possibly even
- 26 -
some entertainment. Successful ecommerce niches can include pet
supplies, hobbies, industry-specific tools/supplies, and specialized
business-to-business markets. If your product line naturally generates
repeat orders or if you can creatively build your business to encourage
repeat orders, you will be doing yourself a big favor.
Mindset
If your business is small, then you want to use your size to your
advantage. You are going to have a tough time going head-to-head
against the big players in the industry. Instead, develop your
personalized message and emphasize the human touch that you
provide. Build relationships with your customers after your initial product
sale with follow-up emails, requests for reviews, and email marketing
with specials. The successful owner is pulling out all the stops. Sell
yourself with your photo and your story on your website. People want to
do business with someone they can trust. If you are a sincere, helpful,
and trustworthy person, don't be shy about sharing that with the world,
or at least with your customers.
Abilities
You can build a successful web business, even if you don't possess a
wealth of technical knowledge. Be realistic about where your skills and
abilities are. Don't get bogged down in the technical minutiae of running
a web server. Go with an ecommerce platform that provides the tools
and resources you need to be successful. Unless you have some
computer expertise, going the bare bones route is probably not going to
serve your business for very long. Make sure your site is built on top of a
solid content management system that allows you to focus on your
marketing and customer service and not the mechanics of having a
website.
Website Presentation
Your website is at the center of your success. You will want to put a
priority on nurturing and improving your site over time. The simplest
step you can take is to update your home page regularly so the
- 27 -
information is accurate and timely. The site owners we see who are
successful are pretty obsessive about their sites. The most successful
sites are not necessarily the most beautiful. But they have well-
developed category and product presentation. The home page is always
displaying a timely message.
Relationship Building
Over the past year, the social aspect of the web has flourished. As a
small business owner, you need to pick your spots carefully and develop
a social media plan. If you have time to devote to a blog, Facebook, or
Twitter, that is fabulous. It will benefit you to explore all available
channels. But if your time is limited, focus on taking small steps to
develop your website as a social hub. Build strong bonds with your
customers by asking for their feedback, giving them incentives to refer
others, and genuinely listening to what they say.
The successful site owner responds to customers immediately, has the
ability to communicate via online formats, and is a phenomenal resource
for customers. If you have a knack for writing then take advantage of
that at every turn, whether it is via a blog or some featured relevant
articles on your site. Always be asking yourself how you can connect and
build trust with your customers.
- 28 -
your own videos to YouTube and develop a whole new channel of
potential customers. Be willing to try new technologies and see if you
can align yourself with vendors who responsibly role out new
functionality.
Key success factors in e-commerce
1. Providing value to customers. Vendors can achieve this by offering
a product or product-line that attracts potential customers at a
competitive price, as in non-electronic commerce.
2. Providing service and performance. Offering a responsive, user-
friendly purchasing experience, just like a flesh-and-blood retailer,
may go some way to achieving these goals.
3. Providing an attractive website. The tasteful use of colour,
graphics, animation, photographs, fonts, and white-space
percentage may aid success in this respect.
4. Providing an incentive for customers to buy and to return. Sales
promotions to this end can involve coupons, special offers, and
discounts. Cross-linked websites and advertising affiliate programs
can also help.
5. Providing personal attention. Personalized web sites, purchase
suggestions, and personalized special offers may go some of the
way to substituting for the face-to-face human interaction found at
a traditional point of sale.
6. Providing a sense of community. Chat rooms, discussion boards,
soliciting customer input, loyalty schemes and affinity programs
can help in this respect.
7. Providing reliability and security. Parallel servers, hardware
redundancy, fail-safe technology, information encryption, and
firewalls can enhance this requirement.
8. Providing a 360-degree view of the customer relationship, defined
as ensuring that all employees, suppliers, and partners have a
complete view, and the same view, of the customer. However,
customers may not appreciate the big brother experience.
- 29 -
9. Owning the customer's total experience. E-tailers foster this by
treating any contacts with a customer as part of a total experience,
an experience that becomes synonymous with the brand.
10. Streamlining business processes, possibly through re-
engineering and information technologies.
11. Letting customers help themselves. Provision of a self-serve
site, easy to use without assistance, can help in this respect.
12. Helping customers do their job of consuming. E-tailers can
provide such help through ample comparative information and
good search facilities. Provision of component information and
safety-and-health comments may assist e-tailers to define the
customers' job.
13. Constructing a commercially sound business model. If this key
success factor had appeared in textbooks in 2000, many of the
dot.coms might not have gone bust.
14. Engineering an electronic value chain in which one focuses on
a "limited" number of core competencies -- the opposite of a one-
stop shop. (Electronic stores can appear either specialist or
generalist if properly programmed.)
15. Operating on or near the cutting edge of technology and
staying there as technology changes (but remembering that the
fundamentals of commerce remain indifferent to technology).
16. Setting up an organization of sufficient alertness and agility to
respond quickly to any changes in the economic, social and
physical environment.
- 30 -