MIS Course Material
MIS Course Material
COURSE PLAN
&
COURSE MATERTIAL
SEMESTER II
Subject Teacher
1. b. Components of IS
An Information System is an organized combination of
people, hardware, software, communications networks,
and data resources that collects, transforms, and
disseminates information in an organization.
1. c. Data Vs Information
Data:
• Data is the plural of datum, though data commonly
represents both singular and plural forms.
• Data are raw facts or observations, typically about
physical phenomena or business transactions.
• Data should be viewed as raw material resources that are
processed into finished information products.
• Data are usually subjected to a value-added process
(data processing or information processing) where
• Its form is aggregated, manipulated, and organized
• Its content is analyzed and evaluated
• It is placed in a proper context for a human user
Information:
• Information can be defined as data that have been
converted into a meaningful and useful context for
specific end users.
• Information should be viewed as processed data which
has been placed in a context that gives it value for
specific end users.
Content Dimension:
Accuracy Information should be free from errors
Relevance Information should be related to the
information needs of a specific recipient for a specific
situation
Completeness All the information that is needed should
be provided
Conciseness Only the information that is needed should
be provided
Scope Information can have a broad or narrow scope,
or an internal or external focus
Performance Information can reveal performance by
measuring activities accomplished, progress made, or
resources accumulated.
Form Dimension:
Clarity Information should be provided in a form that is
easy to understand
Detail Information can be provided in detail or
summary form
Order Information can be arranged in a predetermined
sequence
Presentation Information can be presented in narrative,
numeric, graphic, or other forms.
Media Information can be provided in the form of
printed paper documents, video displays, or other media.
1. e. logical data element
1. f. Major roles of IS
3. a. Competitive environment
A firm can survive in the long run if it successfully develops
strategies to confront five generic competitive forces that
operate in the firm's relevant environment. As illustrated on
the slide these forces include:
Conclusion:
• Value chain concept can help you decide where and how
to apply the strategic capabilities of information
technology.
• Value chain shows various types of information
technologies that might be applied to specific business
processes to help a firm gain competitive advantages in
the marketplace.
3. e. Customer focused e-business
4. a. Overview of Hardware
Fig. Generations of computer (Microprocessor)
4.b. Software
4. c. Telecommunication
Fig. WAN
Fig.LAN
Mesh
Telecommunications Communication Media 1. Twisted Pair, 2.
Coaxial Cable 3. Fiber Optics 4.Terrestrial Microwave
Fig. Microwave
Architectures
Distributed Systems
Concurrency
Multi-programming
Multi-processing
Cloud Computing
Customer table
[More
Customer ID Tax ID Name Address
fields…]
555- 323
1234567890 Munmun …
5512222 Broadway
555- E. F.
4232342432 123 It Way …
5325523 Codd
DCL
DCL is short name of Data Control Language which includes
commands such as GRANT, and mostly concerned with
rights, permissions and other controls of the database
system.
TCL
TCL is short name of Transaction Control Language which
deals with transaction within a database.
Prototype
A prototype is an early sample, model, or release of a product
built to test a concept or process or to act as a thing to be
replicated or learned from.
Prototyping
Data Warehousing
• Data Mining,
Data Mining
Slicing
Dicing
The sales figures of all sales regions and all product
categories of the company in the year 2004 are "sliced" out
the data cube.
Pivoting
This operation is also called rotate operation. The whole cube
is rotated, giving another perspective on the data.
Business - to - Business
A website following the B2B business model sells its products
to an intermediate buyer who then sells the product to the
final customer.
Business - to - Consumer
A website following the B2C business model sells its products
directly to a customer. A customer can view the products
shown on the website. The customer can choose a product
and order the same.
Consumer - to - Consumer
A website following the C2C business model helps
consumers to sell their assets like residential property, cars,
motorcycles, etc., or rent a room by publishing their
information on the website.
Consumer - to - Business
In this model, a consumer approaches a website showing
multiple business organizations for a particular service. The
consumer places an estimate of amount he/she wants to
spend for a particular service. For example, the comparison
of interest rates of personal loan/car loan provided by various
banks via websites. A business organization who fulfills the
consumer's requirement within the specified budget,
approaches the customer and provides its services.
Business - to - Government
B2G model is a variant of B2B model. Such websites are
used by governments to trade and exchange information with
various business organizations. Such websites are accredited
by the government and provide a medium to businesses to
submit application forms to the government.
Example :- FirstTender.Com Is The Most Comprehensive
Tender-Specific Search Engine On The Internet Driven By The
Latest Search Engine Technology. We At FirstTender.Com
Believe In Customer Satisfaction. FirstTender.Com Helps
Companies Derive The Measurable Business Value That They
Have Always Been Looking For From Tender Related
Business.
Government - to - Business
Governments use B2G model websites to approach business
organizations. Such websites support auctions, tenders, and
application submission functionalities.
Government - to - Citizen
Governments use G2C model websites to approach citizen in
general. Such websites support auctions of vehicles,
machinery, or any other material. Such website also provides
services like registration for birth, marriage or death
certificates. The main objective of G2C websites is to reduce
the average time for fulfilling citizen’s requests for various
government services.
Computer Crime
Employment Challenges
he impact of information technologies on employment is a
major ethical concern to managers of today’s e-business.
Lost Job Opportunities. Information technology has created
new jobs and increased productivity, while also causing a
significant reduction in some types of job opportunities.
Individuality. A frequent criticism of e-business systems
concerns their negative effect on the individuality of people.
Computerized systems can depersonalize human
transactions, forcing people to confront and respond to
impersonal programmed logic. Information systems also
often require strict adherence to detailed procedures. Such
regimentation is incompatible with human ideals of flexibility
and empathy. However, widespread use of personal
computers and the Internet has dramatically improved the
development of people-oriented and personalized systems.
Working Conditions. Many others suggest that while computers
have eliminated monotonous or obnoxious tasks in the office
place, thereby improving the quality of work, they have also
made some jobs both repetitive and routine.
Computer Monitoring. Computer monitoring is used by many
employers to collect productivity data about their employees.
However, many argue that such technology can be used to
monitor individuals, not just their work, thus, violating their
privacy. Moreover, such ‘Big Brotherism’ increases stress in
the workplace. Political pressure is building to outlaw or
regulate computer monitoring in the workplace.
Stress is not the only health-related issue raised by the use of
information technology. Heavy use of computers is linked to
eyestrain, damaged arm and neck muscles, and radiation
exposure.
Solutions to some of these health problems are based on the
science of ergonomics. The goal of ergonomics is to design
healthy work environments that are safe, comfortable, and
pleasant for people to work in, thus increasing employee
morale and productivity.
Ergonomics examines three major factors in the workplace:
The tools used by the worker; e.g. computer screens,
computer human interfaces, etc.;
The work environment, e.g. lighting, work surfaces,
climate etc.; and
• The job content and context, e.g. characteristics of the
task, shift work, rest breaks etc.
Security Management of e-Business
Disaster Recovery
Intellectual Property
Trade Secrets
A trade secret refers to data or information relating to the
business which is not generally known to the public and which
the owner reasonably attempts to keep secret and
confidential.
• Employment agreement
• Trade Secret Policy
• Non-disclosure Agreements (NDAs)
• Adequate Documentation
• Security Systems
Copyright