Advantages and Disadvantages of Information Systems
Advantages and Disadvantages of Information Systems
In this post I thought to think about what advantages and disadvantages can
bring to the businesses and society the integrating information systems. Of
course, without any doubt the efficient usage of information systems will give
a lot opportunities to the companies and advantages to their
business. Sometime it can make kind of new job environments but on the
other hand it can make some group of employees unemployed.
Advantages
Communication – with help of information technologies the instant
messaging, emails, voice and video calls becomes quicker, cheaper and
much efficient.
Globalization and cultural gap – by implementing information systems we
can bring down the linguistic, geographical and some cultural boundaries.
Sharing the information, knowledge, communication and relationships
between different countries, languages and cultures becomes much easier.
Disadvantages
Unemployment and lack of job security – implementing the information
systems can save a great deal of time during the completion of tasks and
some labor mechanic works. Most paperwork’s can be processed
immediately, financial transactions are automatically calculated, etc. As
technology improves, tasks that were formerly performed by human
employees are now carried out by computer systems. For example,
automated telephone answering systems have replaced live receptionists in
many organizations or online and personal assistants can be good example
also. Industry experts believe that the internet has made job security a big
issue as since technology keeps on changing with each day. This means that
one has to be in a constant learning mode, if he or she wishes for their job to
be secure.
Dominant culture – while information technology may have made the world a
global village, it has also contributed to one culture dominating another
weaker one. For example it is now argued that US influences how most young
teenagers all over the world now act, dress and behave. Languages too have
become overshadowed, with English becoming the primary mode of
communication for business and everything else.
Security issues – thieves and hackers get access to identities and corporate
saboteurs target sensitive company data. Such data can include vendor
information, bank records, intellectual property and personal data on company
management. The hackers distribute the information over the Internet, sell it to
rival companies or use it to damage the company’s image. For example,
several retail chains were targeted recently by hackers who stole customer
information from their information systems and distributed Social Security
numbers and credit card data over the Internet.
* Requested: Anyone can request a change. The person making the
change request may or may not be the same person that performs the
analysis or implements the change. When a request for change is received, it
may undergo a preliminary review to determine if the requested change is
compatible with the organizations business model and practices, and to
determine the amount of resources needed to implement the change.
* Approved: Management runs the business and controls the allocation of
resources therefore, Management must approve requests for changes and
assign a priority for every change. Management might choose to reject a
change request if the change is not compatible with the business
model, industry standards or best practices. Management might also choose
to reject a change request if the change requires more resources than can be
allocated for the change.
* Planned: Planning a change involves discovering the scope and impact of
the proposed change; analyzing the complexity of the change; allocation of
resources and, developing, testing and documenting both implementation and
backout plans. Need to define the criteria on which a decision to back out will
be made.
* Tested: Every change must be tested in a safe test environment, which
closely reflects the actual production environment, before the change is
applied to the production environment. The backout plan must also be tested.
* Implemented: At the appointed date and time, the changes must be
implemented. Part of the planning process was to develop an implementation
plan, testing plan and, a back out plan. If the implementation of the change
should fail or, the post implementation testing fails or, other "drop dead"
criteria have been met, the back out plan should be implemented.
* Post change review: The change review board should hold a post
implementation review of changes. It is particularly important to review failed
and backed out changes. The review board should try to understand the
problems that were encountered, and look for areas for improvement.
Change management procedures that are simple to follow and easy to use
can greatly reduce the overall risks created when changes are made to
the information processing environment. Good change
managementprocedures improve the over all quality and success of changes
as they are implemented. This is accomplished through planning, peer review,
documentation and communication.
are often shown as a managerial pyramid – see the figure below (O'Brien, p. 393) and
Lecture 4:
ii. monitor the strategic performance of the organization and its overall direction
teams
company, and
ii. allocate resources and monitor the performance of their organizational sub-
other workgroups.
ii. direct the use of resources and the performance of tasks according to
procedures and within budgets and schedules they establish for the teams
Decision makers need information products whose characteristics, attributes or quality are
having the three dimensions of time, content, and form – see the figure below (O'Brien,
p. 393).
8
The point is, in order to have value, knowledge must be applied to a new situation on
which a decision or action can be made.
It is important to notice the distinction between knowledge and information. These two
are distinct entities. While 'information' stored in a computer system is not a very rich
carrier of human interpretation for potential action, ‘knowledge’ resides in the user’s
subjective context of action based on that information.
With a notion of what knowledge is, we can begin our discussion of Knowledge
Management.
"KM aims to achieve fast and easy access to all types of information and
emphasizes interpersonal communication rather than the mere capture and
storage of knowledge" [R1].
For the purpose of this paper we chose to adapt, with small alterations, the definition
adopted by Delphi [R3]:
This definition clearly establishes the three different entities, which, through their
interaction, aim to create new, knowledge-based, added value. None of these
components is "new" in the corporate world. The innovation lies in the cost
effectiveness and widespread capability of interaction between these three elements
anywhere, anytime coupled with the increasing market offer of powerful "tools sets"
capable of relating and operating them.
We can divide all the functions performed by KM in five main categories:
In the changing economy in recent times, there is a necessity to improvise the business
requirements according to the changing needs of the market, customers and technologies.
This in turn causes a change in the business environment and has to be tackled in an
appropriate way minimizing the costs while enhancing the benefits. To increase the overall
efficiency of the Organization’s operating components, the infrastructure management in the
areas like cloud, security, IT, networks, server, application,data and people is given prime
importance. In order to ensure good service and tremendous quality,a secure, reliable
infrastructure is essential to reduce the cost of the company, maintaining the standards,and
ensure the information flow is processed in undisruptive way and managing existing and
new staff.
Infrastructure of data center provides an insight into the assets of IT company and realigns
the physical infrastructure to improve efficiency of the company to the business needs.
Cloud infrastructure is solely based on virtualization tools to deploy sources from IT,
investments are utilized in a flexible and efficient manner and which further increases the
security in the organization. Network infrastructure provides an insight into the resources
and provides a connectivity between hardware, software, and bridges a communication gap
inside both internal and external networks. This bridging further helps to increase
communication, which in turn patches the operations of an organization.
Application Infrastructure helps in the assessment of organization’s applications, mapping
them to various underlying applications like databases, designing applications
infrastructure, migrating the application to a different destination from the source, monitoring
and management of vendors.
Server Infrastructure management helps to maximize the investments made in the IT by
standardizing and controlling the costs of a server. The servers are monitored
24/7,maintained by deleting the temporary files and updating the software versions to utilize
the optimum benefits of servers.
The overall concept of IT infrastructure management has been rapidly adapting in
companies to meet the existing demands of the customers and the market. Business needs
of the customers are met and in turn the organization is adapting to give a user rich
experience, enhancing and reevaluating their resources and remodeling them to increase
the substantial value of the organization.
The company’s assets are handled carefully to the changes in the technology, which in turn
helps to overcome the risk and decreases the complexity of the problems. All the areas of
infrastructure management are interlinked which mainly strive to adopt practices which are
best in industry and increase the scalability of the enterprise and improve the focus of the
business.
IT infrastructure management plays a key role in reducing the costs of a company, ensuring
the quality of the service is maintained to a greater extent overcoming the risk. The
operational efficiency of the organization will also rise to a new level, increasing the
company’s revenue.
Underlying principles of IT infrastructure and overall focus is to optimize the output, keeping
the data safe and secure, bridging a communication between internal and external
networks, meeting the demands of the customers and reducing the operating cost of a
company.
With the introduction of IT infrastructure management in an organization, end to end
solutions are provided to the customers, optimizing the data, process and application
infrastructure of the organization. Several MNC companies like Wipro, Tech Mahindra,
Infosys and cognizant are offering IT infrastructure management Services to various clients
across the globe which are a huge success and meeting the demands of the companies
and the customers.
This IT infrastructure forms the prominent backbone of the economy of a company, hence it
is of utmost importance to monitor and manage them and overcome the challenges of the
traditional system. It also helps to maintain the compliance with the government policies and
regulations and in turn reducing the operating costs.Infrastructure management is also
outsourced and monitored remotely (RIM) and provides all the necessary features to ensure
its security. The cost benefits are optimized, efficient, scalable, service and security are
improved.
The major business challenges faced by an organization are subsided when IT
infrastructure management plays a pivotal role in shaping the future, by providing improved
processes, policies which are adhered to the standards, collecting efficient data, managing
the networks , IT assets and the IT staff.
Handling infrastructure management at several levels increases the companies strategic
planning and business revenues. There is an extreme need and importance for the
infrastructure management in an organization which helps them to achieve higher targets.
There are four main types of information systems that serve different
functional systems:
Figure 2-2
FIGURE 2-2 EXAMPLE OF A SALES INFORMATION SYSTEM
This system captures sales data at the moment the sale takes place to help the business
monitor sales transactions and to provide information to help management analyze sales
trends and the effectiveness of marketing campaigns.
2. Manufacturing and production information systems deal with the
planning, development, and production of products and services, and
controlling the flow of production.
Figure 2-3
Figure 2-5
Figure 2-8
Figure 2-9
Figure 2-10
FIGURE 2-10 INTERRELATIONSHIPS AMONG SYSTEMS
The various types of systems in the organization have interdependencies. TPS are major
producers of information that is required by many other systems in the firm, which, in turn,
produce information for other systems. These different types of systems are loosely coupled
in most business firms, but increasingly firms are using new technologies to integrate
information that resides in many different systems.
Financial services
Banking services
Consumer goods
Retail sectors
Controlled manufacturing
Query-driven Approach
Update-driven Approach
Query-Driven Approach
This is the traditional approach to integrate heterogeneous databases. This
approach was used to build wrappers and integrators on top of multiple
heterogeneous databases. These integrators are also known as mediators.
Disadvantages
Query-driven approach needs complex integration and filtering processes.
This approach is very inefficient.
It is very expensive for frequent queries.
This approach is also very expensive for queries that require
aggregations.
Update-Driven Approach
This is an alternative to the traditional approach. Today's data warehouse
systems follow update-driven approach rather than the traditional approach
discussed earlier. In update-driven approach, the information from multiple
heterogeneous sources are integrated in advance and are stored in a
warehouse. This information is available for direct querying and analysis.
Advantages
This approach has the following advantages:
Metadata
Metadata is simply defined as data about data. The data that are used to
represent other data is known as metadata. For example, the index of a
book serves as a metadata for the contents in the book. In other words, we
can say that metadata is the summarized data that leads us to the detailed
data.
Metadata Repository
Metadata repository is an integral part of a data warehouse system. It
contains the following metadata:
Data Cube
A data cube helps us represent data in multiple dimensions. It is defined by
dimensions and facts. The dimensions are the entities with respect to which
an enterprise preserves the records.
The following table represents the 2-D view of Sales Data for a company
with respect to time, item, and location dimensions.
But here in this 2-D table, we have records with respect to time and item
only. The sales for New Delhi are shown with respect to time, and item
dimensions according to type of items sold. If we want to view the sales
data with one more dimension, say, the location dimension, then the 3-D
view would be useful. The 3-D view of the sales data with respect to time,
item, and location is shown in the table below:
The above 3-D table can be represented as 3-D data cube as shown in the
following figure:
Data Mart
Data marts contain a subset of organization-wide data that is valuable to
specific groups of people in an organization. In other words, a data mart
contains only those data that is specific to a particular group. For example,
the marketing data mart may contain only data related to items, customers,
and sales. Data marts are confined to subjects.
In order to make a decision, the managers need knowledge. In case of massive data amounts, issues
may occur because of data analysis and necessary knowledge extract. Data is analyzed through an
automated process, known as Knowledge Discovery in data mining techniques.
Data mining can be defined as a process of exploring and analysis for large amounts of data with a
specific target on discovering significantly important patterns and rules. Data mining helps finding
knowledge from raw, unprocessed data. Using data mining techniques allows extracting knowledge
from the data mart, data warehouse and, in particular cases, even from operational databases.
In this context, data mining gets an important role in helping organizations to understand their
customers and their behavior, keeping clients, stocks anticipation, sale policies optimization as well
as other benefits which bring a considerable competitive advantage to the organization.
The main purpose of these techniques is to find patterns and hidden (but relevant) relations that
might lead to revenue increase. The essential difference between data mining techniques and the
conventional database operation techniques is that, for the second ones, the database becomes passive
and is only being used for large amounts of data population, therefore helping in future finding of
that specific data. Alternatively, the database is not passive anymore, being able to serve useful
information regarding the business plans put in discussion.
Regarding data mining studies, two major types of them exists. One of them is represented by the
hypothesis testing, which assumes exposing a theory regarding the relation between actions and their
results. The second type of study is represented by the knowledge discovery. For this type of
analysis, relations between data warehouse existing data are tracked. This can be done by using data
viewing tools or by using fundamental statistical analysis, such as correlation analysis.
Data mining techniques reside from classic statistical calculation, from database administration and
from artificial intelligence. They are not a substitute for traditional statistical techniques, but an
extension of graphical and statistical techniques.
Data mining uses a large variety of statistical algorithms, shape recognition, classification, fuzzy
logic, machine learning, genetic algorithms, neural networks, data viewing etc., from which we can
mention regression algorithms, decision algorithms, neural networks, clustering analysis.
Regression algorithms. Regression represents a basic statistical method. In the case of data mining, it
is also an important analysis tool, used in classification applications through logical regressions as
well as forecasted reports measured using the least square or other methods. Non-linear data can be
transformed into useful linear data and analyzed using linear regressions. The universal test for data
mining classification is the coincidence index matrix. It is primarily focused on data classification
abilities of the model. For continuous regressions, class inflection points must be identified. The
applications of the methods into solving business problems are multiple.
Decision trees. In data mining technology, decision trees represent rules tree-view structures, also
known as joining rules. The trees’ creation mechanism of the trees consists in collecting all the
variables the analyst assumes might help the decision making and analyzing them considering their
influence into result estimation.
The algorithm automatically determines which of the variables are the most relevant, based on the
ease of data sorting. The decision tree algorithms are applied in Business data mining in areas like:
loan request classification, applicants ranking for various positions.
Neural networks. This is one of the most commonly used data mining method. It consists of taking
sets of observations and placing them in a relational system through arc-connected nodes. This idea
derives from the way neurons act inside the human brain. Neural networks are usually structured in at
least three layers, having a constant structure allowing reflection of complex non-linear relations.
Each entry data has a node in the first layer, while the last layer represents the output data – the
result. In order to classify the neural network model, the last layer (containing the output) has a
corresponding node for each category. In most of the cases, this type of networks also have a mid
node layer (hidden) which adds complexity to the model. The obtained results are compared to the
targeted ones, and the difference is re-entered in the system for node’s cost adjustments. The process
keeps looping until the network correctly classifies the input data (at a tolerance level).
Clustering analysis. One of the most general forms of this type of analysis allows the algorithm to
determine the number of subsets. Partitioning is mainly used for defining new variable categories,
which divide raw data in a precise number of regions (k-means clustering). Considering a random
number of centers (k), data is associated to the center which is the closest to it. The basic principle
of this analysis is to identify the average characteristic for different indicators in sets of data. Thus,
new observations can be measured by reporting the deviation from the average. This analysis is
often the base technique applied in a data mining study, being used in client segmentation and,
implicitly, taking a segment-oriented action.
But with more and more companies now opting to deploy wireless rather than wired technology, are
they perhaps not fully informed, or is it that they see are making informed decisions and are opting to
avail themselves of the many advantages that working wirelessly facilitates?
The biggest concerns that are floated when debating wired v wireless networks are security and
speed. It has to be said that in both instances wired is superior. However, having said that, although
wired has a clear edge, that doesn’t mean to say that wireless is either insecure, or slow.
Network Security
The security of wireless is actually very good using the latest encryption technology. That’s not to
say it can’t be hacked into – it can – and being more open, in terms of accessibility, the danger is
certainly greater. This can be overcome by implementing strong passwords and both hardware and
software security solutions.
There are of course businesses that do have particularly desirable data that hackers would like to get
their hands on– like banks for instance, with all of the personal financial information they hold. For
these organisations, that sort of sensitive data warrants maximum security.
Network Speed
In terms of speed - for most small to medium-sized businesses, the slower speed that a wireless
network provides is still fast enough for what they need.
So when it comes down to choosing between wired and wireless networking from a speed and
security angle, each individual business must examine its own needs, and if the hat fits... wear it
accordingly.
For those businesses where superfast speed and ultra secure methodology are not critically important,
going wireless has many advantages to offer.
Increased mobility is by far the biggest attraction that wireless networking holds for most businesses.
Being able to sit at any terminal, anywhere in the building and access the server is a great advantage.
When laptops were developed, because of the new mobility convenience factor that they brought
within them, this gave added impetus to the advantages of being able to work anywhere within range
of the wireless network signal. It means that not only can employees now access information from
the server, wherever they are in the premises, but it also enables colleagues to collaborate and share
information in meetings held anywhere; either in a corner of the office, a bespoke meeting room, or
even the staff canteen. It enables total mobility.
The increased mobility factor both enables and facilitates the Bring Your Own Device (BYOD)
phenomenon, which more and more businesses are now taking advantage of. Laptops, Tablets, and
Smartphones that belong to individual employees are now being brought into the workplace and are
being given access rights to the wireless network. As well, as making it more convenient for
employees to carry out their tasks, BYOD also represents a potential cost saving, as businesses no
longer have to fund the hardware cost of the devices themselves.
Another important by-product of the increased mobility factor is that it promotes increased
productivity, allowing employees to collaborate where and when they need to. It brings freedom of
operation and speeds up the working process. But there is another factor too, and that is that
employees take their device’s home with them, and can work, (as many do), in their own time when
it’s convenient to do so.
ADVANTAGE # 4 – PUBLIC WI-FI - HOTSPOTS
Wireless networking has also gone into the public domain, with Wi-Fi hotspots being available in
many high street coffee shops, hotels, railway stations, airports, universities, hospitals, etc. It enables
people to get onto the Internet when they’re away from the office, or away from home. People can
pick up their emails, both social and business, and if their place of work allows, can also connect into
the business network remotely.
ADVANTAGE # 5 – SCALABILITY
One of the inherent problems with a wireless network is coping with expansion. Having to add
additional cabling, and reroute existing cables, can be a disruptive and costly process. Whilst every
company should plan ahead when installing a wireless network, it is almost impossible to forecast
future requirements accurately unless sound planning is carried out.
There’s no such problem with a wireless network. Being able to add new users is no more difficult
than having to issue a new password, and update the server accordingly. It’s fast, and it’s relatively
convenient. It also means that offices can be relocated within the building with consummate ease,
furniture can be readily moved around, and, of course, employees can sit wherever they need to.
Not only is it so much more convenient to add new users to a wireless network, but it seldom
involves any additional expenditure.
Having a wireless network also means that a business can provide secure network access to visiting
colleagues from other sites within the organisation. It enables them to access the data they need and
pick up and respond to their emails.
It also grants Internet access to visiting customers and suppliers. It’s now something that most
business people who have reason to travel, have come to expect. It’s also how most public Wi-Fi
hotspots grant Internet access to their guests.
Another one of the benefits of having a wireless network is that it can be used to make telephone
calls using voice over Internet protocol. VoIP calls are often free, depending on the country and the
devices you are calling, and are considerably cheaper than using conventional technology to make
international calls.
Using wireless technology rather than having a hard wired network can be much more cost-effective.
The larger the network, both in terms of area and users, the more expensive a hard wired network
will be to install. It’s not just the amount of cabling, but the actual cost of the labour to install the
raceways, and chase the cabling all through the premises; through walls, up and down different floors
etc.
Once a wireless network is in place, and even if it costs a little more initially to install, maintenance
costs are lower, and there are normally no additional costs involved in scaling up, unless the signal
needs to be boosted.
Because there are no wires involved with a wireless connection, the potential risk of tripping over
any trailing cables that wired connectivity requires, can be avoided altogether.
WiMAX
is one of the hottest broadband wireless technologies around today. WiMAX
systems are expected to deliver broadband access services to residential
and enterprise customers in an economical way.
WiMAX would operate similar to WiFi, but at higher speeds over greater
distances and for a greater number of users. WiMAX has the ability to
provide service even in areas that are difficult for wired infrastructure to
reach and the ability to overcome the physical limitations of traditional
wired infrastructure.
Thus content in the network Thus content in the network is The content in the network is accessible
is accessible to everyone connected. accessible only to members of to members of organization & external
organization. memberswith access to network.
It is largest in terms of number of It is small network with minimal number The number of devices connected is
connected devices. of connected devices. comparable with Intranet.
Security is dependent of the user of Security is enforced via a firewall. Security is enforced via a firewall that
device connected to network. separates internet & extranet.
Example: What we are normally using Example: TCS using internal network Example: HP and Intel using network
is internet. for its business operations. for business related operations.
Users can access Internet anonymously. Users should have valid Users should have valid
username/password to access Intranet. username/password to access Extranet.
Answer:-The information systems investment challenge: How can organization obtain business
value from their information system?
-The strategic business challenge: What complementary assets are needed to use information
technology effectively?
-The globalization challenge: How can firm understand the business and system requirements
of a global economic environment?
-Ethic and security: The responsibility and control challenge: How can organization ensure that
their information systems are used in an ethically and socially responsible.
9
E-commerce or electronic commerce simply refers to carrying out business
transactions over the internet. Just like in conventional businesses, this type
of trade has all the aspects of a business transaction such as buying, selling,
and payments. The major difference is that this business model is based on
electronic transactions
Benefits of E-Commerce
Hopefully by now you're aware of the main benefits of E-Commerce, which are:
8
Data Warehouses
A database consists of one or more files that need to be stored on a computer. In large
organizations, databases are typically not stored on the individual computers of employees
but in a central system. This central system typically consists of one or more computer
servers. A server is a computer system that provides a service over a network. The server
is often located in a room with controlled access, so only authorized personnel can get
physical access to the server.
In a typical setting, the database files reside on the server, but they can be accessed from
many different computers in the organization. As the number and complexity of databases
grows, we start referring to them together as a data warehouse.
A data warehouse is a collection of databases that work together. A data warehouse makes
it possible to integrate data from multiple databases, which can give new insights into the
data. The ultimate goal of a database is not just to store data, but to help businesses make
decisions based on that data. A data warehouse supports this goal by providing an
architecture and tools to systematically organize and understand data from multiple
databases.
Data Mining
Once all the data is stored and organized in databases, what's next? Many day-to-day
operations are supported by databases. Queries based on SQL, a database programming
language, are used to answer basic questions about data. But, as the collection of data
grows in a database, the amount of data can easily become overwhelming. How does an
organization get the most out of its data without getting lost in the details? That's
where data mining comes in.
Data mining is the process of analyzing data and summarizing it to produce useful
information. Data mining uses sophisticated data analysis tools to discover patterns and
relationships in large datasets. These tools are much more than basic summaries or queries
and use much more complicated algorithms. When data mining is used in business
applications, it is also referred to as business analytics or business intelligence
7
Business process reengineering (BPR) is the analysis and redesign of
workflows within and between enterprises in order to optimize end-to-
end processes and automate non-value-added tasks.
6
RFID (radio frequency identification) is a technology that incorporates the
use of electromagnetic or electrostatic coupling in the radio frequency (RF)
portion of the electromagnetic spectrum to uniquely identify an object, animal,
or person.
5
Moore's law refers to an observation made by Intel co-founder
Gordon Moore in 1965. He noticed that the number of transistors per square
inch on integrated circuits had doubled every year since their
invention. Moore's law predicts that this trend will continue into the
foreseeable future.
4
REPEATED QUESTION
3
A core competency is a concept in management theory introduced by, C. K.
Prahalad and Gary Hamel. It can be defined as "a harmonized combination of
multiple resources and skills that distinguish a firm in the marketplace". Core
competencies fulfill three criteria: Provides potential access to a wide variety
of markets
2
An executive information system (EIS), also known as
anexecutive support system (ESS), is a type of managementinformation
system that facilitates and supports seniorexecutive information and
decision-making needs. It provides easy access to internal and
external informationrelevant to organizational goals.
1
A management information system (MIS) is a computerized database of
financial information organized and programmed in such a way that it
produces regular reports on operations for every level of management in a
company. It is usually also possible to obtain special reports from
the system easily.