GKM College Management Information System
description
Transcript of GKM College Management Information System
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
1
Period: 01
Topic: Introduction of MIS
A definition of management information system, as the term is generally
understood, is an integrated, user machine system for providing information to
support operations, management, and decision making functions in an organization.
The system utilizes computer hardware and software; manual procedures; models for
analysis, planning, control and decision making; and a database. The fact that it is an
integrated system does not mean that it is a single, monolithic structure; rather, it
means that the parts fit into an overall design.
The elements of the definition are highlighted below:
A management information system is an integrated user machine system for providing
information. To support the operation, management, analysis, and decision making
function in an organization
The system utilizes computer hardware and software manual procedures model for
analysis, planning, control and decision making and a database.
The elements of the definition are highlighted below:
A management information system is
an Integrated user machine system
for providing information
to support the operation, management, analysis, and decision making
function
in an organization
The system utilizes
computer hardware and software
manual procedures
mdel for analysis, planning, control and decision making and
a database
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
2
Period: 02
Topic: Data, Information, and Intelligence,
The term data means groups of information that represent the qualitative or quantitative
attributes of a variable or set of variables. Data are typically the results of measurements and
can be the basis of graphs, images, or observations of a set of variables.
Information is the result of processing, manipulating and organizing data in a way that
adds to the knowledge of the person receiving it.
Information is a term with many meanings depending on context, but is as a rule closely
related to such concepts as meaning, knowledge, instruction, communication, representation,
and mental stimulus. Information is a message received and understood. In terms of data, it
can be defined as a collection of facts from which conclusions may be drawn.
Information management (IM) is the collection and management of information from one
or more sources and the distribution of that information to one or more audiences. This
sometimes involves those who have a stake in, or a right to that information.
In short, information management entails organizing, retrieving, acquiring and
maintaining information.
Intelligence refers to discrete or secret information with currency and relevance, and the
abstraction, evaluation, and understanding of such information for its accuracy and value.
Theories of Intelligence:
We can become more intelligent through study and practice, through access to
appropriate tools, and through learning to make effective use of these tools (Perkins,
1995).
Howard Gardner
David Perkins
Robert Sternberg
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
3
Period: 03
Topic: Information Technology
Information technology (IT), as defined by the Information Technology Association of
America (ITAA), is "the study, design, development, implementation, support or
management of computer-based information systems, particularly software applications and
computer hardware."
IT deals with the use of electronic computers and computer software to convert, store,
protect process, transmit, and securely retrieve information.
IT can be defined as a collection of computer hardware, software, databases, networking and
telecommunication devices that helps the organization to manage the business process more
effectively and efficiently.
A Computer is essentially a system of input/output devices and a processor. The computer performs
arithmetic and logic operations in a CPU- central processing unit, based on program instructions.
The two capabilities most computer share are:
High speed processing
Arithmetic and logic
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
4
Period: 04
Topic: Meaning of IS & its functions
An information system is a collection of hardware, software, data, people and procedures that are
designed to generate information that supports the day-to-day, short-range, and long-range activities
of users in an organization. Information systems generally are classified into five categories: office
information systems, transaction processing systems, management information systems, decision
support systems, and expert systems
An information system (IS) - or application landscape - is any combination of information
technology and people's activities that support operations, management, and decision making.
Information system is computer system that support end-users, giving them access to the
information. The transformation of data into information is primary function of
information system [IS].
COLLECTION
OF DATA
DATA
PROCESSING OUTPUT
INFORMATION USER DECISION
SOURCE
TO REDUCE UNCERTAINITY
TACKLE BUSINESS PROBLEM
TO BE COMPETITIVE
ALLOCATION
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
5
Period: 05
Topic: Evolution of information system
Based on the needs and requirements of the organization MIS has been evolving though the
period of time. MIS was manually operational before the invention of computer application in
this area. The following table illustrates the evolution of information system.
Decade Information systems Characteristics of information systems
1951-60 Electronic data processing Collecting, manipulating, storing of data.
No scope for decision making
1961-70 Management information
system
Pervasive in all level of the management
decisions.
Solution for structured decisions
1971-80 Decision Support System,
expert system
Analytical models for semi structured decisions
1981 and above Artificial intelligence,
Executive information system
Solution for unstructured decision making
through advanced graphics
1985 and above Knowledge management
system, end user computing
Intelligence workstation for knowledge work
which involves thinking, processing information
and formulating analyses , recommendations and
procedures
types of information systems:
transaction processing systems
MIS
decision support systems
expert systems
executive information systems
geographical information systems
E-commerce systems
multi-media systems
differences in:
users
size, scope
complexity, certainty, familiarity
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
6
Period: 06
Topic: Types based on functions & hierarchy
The IT provides support in 3 major areas:
communication
collaboration
Data access (including knowledge sharing).
Such support is usually given by an information system that we call an application program.
An application is a system developed for specific purpose or function, such as facilitating
each function properly.
Types based on functions:
Departmental IS
Plant IS
Divisional IS
Enterprise wide IS
Inter organizational IS
Key functional areas.
A TYPE IS based on hierarchy:
One way to classify IS by their organizational structure and hierarchical structure.
Executive IS, DSS, MIS, and TPS.
BASIC KINDS OF IS:
Operational-level systems
Management-level systems
Strategic-level systems
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
7
Period: 07
Topic: Introduction to System Analyst
A systems analyst researches problem, plans solutions, recommends software and systems,
and coordinates development to meet business or other requirements. They will be familiar
with multiple varieties of programming languages, operating systems, and computer
hardware platforms. Because they often write user requests into technical specifications, the
systems analysts are the liaisons between vendors and information technology professionals.
They may be responsible for developing cost analysis, design considerations, and
implementation time-lines.
A systems analyst may:
Plan a system flow from the ground up.
Interact with customers to learn and document requirements that are then used to
produce business requirements documents.
Write technical requirements from a critical phase.
Interact with designers to understand software limitations.
Help programmers during system development, ex: provide use cases, flowcharts or even
Database design.
Perform system testing.
Deploy the completed system.
Document requirements or contribute to user manuals.
Whenever a development process is conducted, the system analyst is responsible for
designing components and providing that information to the developer.
Who is system analyst: A system analyst is the person who selects and configures computer
systems for an organization or business. His or her job typically begins with determining the
intended purpose of the computers. When configuring computer systems for a business, the
analyst must select both hardware and software.
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
8
Period: 08
Topic: Role of System Analyst
The system analyst is the person (or persons) who guides through the development of an IS.
The primary objective of any system analyst is to identify the need of the organization by
acquiring information by various means and methods. Information acquired by the analyst
can be either computer based or manual. Collection of information is the vital step as
indirectly all the major decisions taken in the organizations are influenced. The system
analyst has to coordinate with the system users, computer programmers, manager and number
of people who are related with the use of system. Following are the tasks performed by the
system analyst.
The systems analyst systematically assesses how users interact with technology and
businesses function by examining the inputting and processing of data and the outputting of
information with the intent of improving organizational processes. Many improvements
involve better support of users work tasks and business functions through the use of
computerized information systems. This definition emphasizes a systematic, methodical
approach to analyzingand potentially improvingwhat is occurring in the specific context
experienced by users and created by a business.
In performing these tasks the analyst must always match the information system objectives
with the goals of the organization.
Systems analysts as a consultant
Systems analysts as a programmer
Systems analysts as supporting expert
Systems analysts as agent of change
The architects
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
9
Period: 09
Topic: Responsibilities & functions of system analysts
A person who conducts a methodical study and evaluation of an activity such as business to identify
its desired objective in order to determine procedures by which these objectives can be gained is
technically designated as system analysts.
Skills of system analysts:
Technical skills
Interpersonal skills
Management skills
Analytical skills
Functions:
Examining the existing IS and procedures of the procedures of the organization with a view to
find problems and inefficiencies.
Analyzing the findings to develop a basis for designing a new improved system effectively.
Designing a new system that maximizes efficiency, minimizes problem and achieves the set
objectives.
Testing and implementing the new system, including its appraisal before and after
implementation, its documentation and regular maintenance.
Examining the feasibility of new or replacement system proposal.
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
10
Unit -2 Period: 10
Topic: Introduction of system analysis & system design
System analysis is the process of investing a system, identifying problems, and using the
information to recommend improvements to the system.
System analysis is a systematic investigation of areal or planned system to determine the functions of the system and how they relate to each other and to other system
Characteristics:
Top-down approach Use of tools and techniques Abstraction of models Users role Iterative development Use of advanced technology
Objectives:
To describe what the customer requires. To establish a basis for the creation of a software design To define a set of requirement that can be validated once the software is built,
special notation and graphical symbols are used to describe and partition the
functionality of system.
System design is the process of planning a new business system or one to replace or
complement an existing system.
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
11
Unit -2 Period: 11
Topic: SDLC
System Development Life Cycle: The Systems Development Life Cycle (SDLC) is a
conceptual model used in project management that describes the stages involved in an
information system development project from an initial feasibility study through maintenance
of the completed application.
Phases of software development cycle:
System study
Feasibility study
System analysis
System design
Coding
Testing
Implementation
Maintenance
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
12
Unit -2 Period: 12
Topic: SSLC
SYSTEM SOFTWARE LIFE CYCLE MODELS: software development process, also
known as a software development life cycle (SDLC), is a structure imposed on the development of a
software product. Similar terms include software life cycle and software process. It is often considered
a subset of systems development life cycle. There are several models for such processes, each
describing approaches to a variety of tasks or activities that take place during the process. Some
people consider a lifecycle model a more general term and a software development process a more
specific term. For example, there are many specific software development processes that 'fit' the spiral
lifecycle model. ISO/IEC 12207 is an international standard for software lifecycle processes. It aims
to be the standard that defines all the tasks required for developing and maintaining software.
1. Classical waterfall model
2. Iterative waterfall model
3. Prototyping model
4. Evolutionary model
5. Spiral model
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
13
Unit -2 Period: 13
Topic: System analysis & system design
Systems analysis is a process of collecting factual data, understand the processes involved,
identifying problems and recommending feasible suggestions for improving the system
functioning. This involves studying the business processes, gathering operational data,
understand the information flow, finding out bottlenecks and evolving solutions for
overcoming the weaknesses of the system so as to achieve the organizational goals. System
Analysis also includes subdividing of complex process involving the entire system,
identification of data store and manual processes.
System Design
Based on the user requirements and the detailed analysis of the existing system, the new
system must be designed. This is the phase of system designing. It is the most crucial phase
in the developments of a system. The logical system design arrived at as a result of systems
analysis is converted into physical system design. Normally,
the design proceeds in two stages:
1. Preliminary or General Design
2. Structured or Detailed Design
Preliminary or General Design: In the preliminary or general design, the features of the
new system are specified. The costs of implementing these features and the benefits to be
derived are estimated. If the project is still considered to be feasible, we move to the detailed
design stage.
Structured or Detailed Design: In the detailed design stage, computer oriented work begins
in earnest. At this stage, the design of the system becomes more structured. Structure design
is a blue print of a computer system solution to a given problem having the same components
and inter-relationships among the same components as the original problem. Input, output,
databases, forms, codification schemes and processing specifications are drawn up in detail.
In the design stage, the programming language and the hardware and software platform in
which the new system will run are also decided.
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
14
Unit -2 Period: 14
Topic: Tools
Systems Analysis
Analysis of existing hardware/software
User requirements analysis
Logical systems design:
Conceptual data model (Entity-Relationship Diagram)
Conceptual process model (Data Flow Diagram)
Functional application description
Systems Design
Relational database model and data dictionary (sometimes included in Systems Analysis phase)
Detailed description of application inputs and outputs
Detailed conceptual design of forms, reports, application programs and other application components
Yields System Design Specification
There are several tools and techniques used for describing the system design of the system.
These tools and techniques are:
1. Flowchart
2. Data flow diagram (DFD)
3. Data dictionary
4. Structured English
5. Decision table
6. Decision tree
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
15
Unit -2 Period: 15
Topic: Data flow diagram & Entity relationship
A data-flow diagram (DFD) is a graphical representation of the "flow" of
data through an information system. DFDs can also be used for the
visualization of data processing (structured design).
An entity-relationship model (ERM) is an abstract and conceptual
representation of data.
Entity-relationship modeling is a database modeling
method, used to produce a type of conceptual representation data model of
a system, often a relational database. Diagrams created by this process are
called Entity-Relationship Diagrams (or) ER diagrams, or ERDs.
COMPONENTS OF AN ERD:
1. Object types
2. Relationships
3. Associative object type indicators
4. Super type / sub type indicators.
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
16
Unit -2 Period: 16
Topic: Object Modeling
OBJECT MODELING TECHNIQUE (OMT) is a well-known example of a software
engineering methodology .it deals with object- oriented development in the analysis &
design phases.
The analysis phase starts with a problem statement which includes a list of goals & a
definitive enumeration of key concepts within a domain.
This problem statement is then expanded into three views or models.
- object model
- dynamic model
-functional model
The system design phase follows the analysis phase. Here the overall architecture is
established.
The OMT software engineering methodology is sequential in the sense that first comes
analysis, followed by design. In each phase, a cyclical approach is taken among the smaller
steps. The OMT is very much like the Booch methodology where emphasis is placed on the
analysis and design phases for initial product delivery. Both the OMT and Booch do not
emphasize implementation, testing, or other life cycle stages.
OOAD-Object oriented analysis and design.
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
17
Unit -2 Period: 17
Topic: DBMS-database management system
DATA BASE: A Collection of integrated data items that can be retrieved for various applications. A Database is a collection of related files
DBMS is a set of systems software programs that organizes and maintains in a database for
providing the information.
DBMS is system software used to manage the organization, storage, access, security and
integrity of data in a structured database.
That permits an organization to centralize data, manage them efficiently, and provide
access to the stored data by application programs.
DBMS- Special software to create & maintain a database & enable individual business
applications to extracts the data they need without having to create separate files or
data definitions in their computer programs
A DBMS has three components:
Data Definition Language
Data Manipulation Language
Data dictionary
TYPES OF DATABASE
Operational database
Analytical database
Data warehouse
Distributed database
End-user database
External database
Function of DBMS: Stores data in a uniform and consistent way, Organizes the data,
Accesses the files updates the records, Retrieves data as requested, Adding and deleting
records, Reorganizing the data base by reassigning storage space processing more efficient.,
Provides data security
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
18
Unit -2 Period: 18
Topic: RBMS
RDBMS RELATIONAL DBMS
RDBMS may be a DBMS in which data is stored in the form of tables and the
relationship among the data is also stored in the form of tables.It represents all data in the
database as simple two dimensional tables called relations. Tables may be referred to as files.
Information in more than one file can be extracted and combined.
RDMBS structured query language (SQL) is the principal data manipulation language for
relational DBMS & major tool for querying , updating , reading a relational database.
The most popular RDBMS are MS SQLserver,DB2, Oracle, and MySQL
RDBMS components
Interface drivers
SQL engine
Transaction engine
Relational engine
Storage engine
Difference between DBMA & RDBMS
DBMS is single user system. RDBMS is a multi user system.
DBMS do not store data in the table format while RDBMS stores data in the form of
table.
Most of the DBMS are not supporting client / server architecture as it is supported by
RDBMS
Most of the DBMS do not support distributed databases while RDBMS is do that.
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
19
Unit -2 Period: 19
Topic: OODBMS
In programming languages is to utilize objects, thereby making OODBMS in the 1980s. OO (Object Oriented) programmers can develop the product, store them as
objects, and can replicate or modify existing objects to make new objects within the
OODBMS. Information today includes not only data but video, audio, graphs, and photos
which are considered complex data types that relational database could not.
Its consistent, data independent, secure, controlled & extensible data management services to support the object oriented model. They were created to handle big & complex data that relational databases could not.
Its stores the data & procedure as objects that can be automatically retrieved & shared. OODBMS are becoming popular because they can be used to manage the
various multimedia components or java applets used in web applications, drawings
images , photographs, voice, and full motion videos etc.
OBJECT ORIENTED PROGRAMMING RESULTS IN 4 CHARACTERSITICS:
1. INHERITANCE
2. DATA ENCAPSULATION
3. OBJECT IDENTITY
4. POLYMORPHISM
ADVANTAGES:
Object oriented is a more natural way of thinking
The defined operations of those types of systems are dependent on the particular database applications running at a given moment.
Data types of object oriented databases can be extend to support complex data, such as images , digital & audio/ video along with other multi-media operations.
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
20
Unit -3 Period: 20
Topic: Financial Information system
FINANCIAL INFORMATION SYSTEM
Finance function is responsible for overall financial planning and raising of capital.
Financial IS has a significant impact on other IS when one considers that the ultimate
common denominator of many operating decisions in finance.
INPUT SUBSYSTEM: OUTPUT SUBSYSTEM:
Transactional data forecasting
Forecasting data funds management
Financial intelligence audit and control
Financial strategic data
INPUT SUBSYSTEM OUTPUT SUBSYSTEM
TRANSACTIONAL DATA
FORECASTING DATA
FINANCIAL
INTELLIGENCE DATA
FINANCIAL
STRATEGIC
DATA
DATA
BASE
FORECASTING
USERS
FUNDS
MANAGEMENT
AUDIT &
CONTROL
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
21
Unit -3 Period: 21
Topic: Marketing Information system
MARKETING INFORMATION SYSTEM
Marketing is concerned with identifying the needs & wants of customers & effectively offer
goods & services.The role of Marketing IS to assess the managers information needs, develop
the needed information and distribute that information in a timely fashion.
The INPUT subsystems of marketing IS are:
Internal records system
Marketing intelligence system
Marketing research system
Marketing decision support and analysis system
MARKETING INFORMATION SYSTEM
INTERNAL RECORDS
MARKETING
INTELIGENCE DATA
MARKETING
RESEARCH DATA
MARKETING
DECISION
SUPPORT
DATA
DATA
BASE
PRODUCT
PLAAN
PRICE PLAN
PLACE
PLAN
PROMOTION
PLAN
OTHER
AREAS
EXTERNAL
ENVIRONMENT
INPUT SUB SYSTEM OUTPUT SUB SYSTEM
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
22
Unit -3 Period: 21
Topic: Personnel Information system
PERSONNEL INFORMATION SYSTEM-PIS
PIS is a staff function that supports the activities of the firms line functions. The functions
carried out by personnel administration generally impact all other functional areas of an
organization.
INPUT SUBSYSTEM: OUTPUT SUBSYSTEM
Transactional Data organizational resource planning
Functional plans organizational management
External data payroll & admin
INPUT OUTPUT
TRANSACTIONAL DATA
FUNCTIONAL PLANS
EXTERNAL DATA
DATA
BASE
ORGANISATIONAL
RESOURCE
PLANNING
USERS ORGANISATIONAL
MANAGEMENT
PAYROLL
ADMIN
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
23
Unit -3 Period: 22
Topic: Production Information system
Inputs to the Manufacturing MIS
Strategic plan or corporate policies.
The TPS:
Order processing
Inventory data
Receiving and inspecting data
Personnel data
Production process
External sources
Manufacturing MIS Subsystems and Outputs
Design and engineering
Master production scheduling
Inventory control
Manufacturing resource planning
Just-in-time inventory and manufacturing
Process control
Computer-integrated manufacturing (CIM)
Quality control and testing
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
24
Unit -3 Period: 24
Topic: Materials Information System
Materials Information System signifies one and the same system, which
helps the materials managers to know where the required item is available
for production.
Materials intelligence
Selection of right quality, quantity, and supplier.
Planning for both short & long term
MRP
Budgeting
Unit -3 Period: 25
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
25
Topic: DSS-Decision Support System
MANAGEMENT SUPPORT SYSTEM MSS: Management support system focus on managerial uses of information resources. These systems provide information to managers for
planning and decision making by internal & external data.
3 types of Management support system:
Decision support system-DSS
Executive information support system-EIS
Expert system.
DSS are designed to support the decision making process of managers to improve their
effectiveness & thereby efficiency of the enterprise. DSS are also described as interactive IS
that help managers utilize data analysis models to solve unstructured problems.
A DSS is an interactive , flexible , and adaptable computer based information system that utilizes decision rules , models, & model base coupled with a comprehensive
database & the decision makers own insight, leading to specific, implemental decisions
in solving problems that would not be amenable to a management science models per..
This definition clearly presents the characteristics of a DSS:
Is a MSS whose capabilities go beyond those of MIS?
Is only supportive in nature & human decision makers still retain their supremacy.
Is individual specific.
Extensively uses databases.
Also incorporates various mathematical, statistical, operational research models.
Provides good user interfaces for decision makers.
TYPES AND FEATURES OF DSS:
DSS may be a data or model oriented.
The data oriented DSS have greater input of data RETRIEVEL & DATA ANALYSIS.
Model oriented DSS has powerful facilities for simulation of decision scenarios by estimating the outcome of action & generating suggestions.
Unit -3 Period: 26
Topic: EIS-EXECUTIVE INFORMATION SYSTEMS-EIS
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
26
The top executives need fast access to up-to-date, concise information & exception reports
with facilities to personalized information & analysis. The IS designed to provide to such
needs of top executives are called executive IS (EIS) or executive support systems. IS is a
software, front ended by a user-terminal and a interface. It electronically provides executives
with rapid & reliable access to information regarding key areas of business, and helps them to
perm their management functions and achieve business objectives.
CHARACTERISTICS OF EIS:
Need for a separate executive database.
Data aggregation facilities
Highly user-friendly interface
Flexible menu- based data retrieval
High-quality business graphics
Simple modeling facilities
Communications
Automated links to others databases.
HOW DOES AN EIS WORK
On the basis of identification & monitoring of key performance indicators (KPI) & critical success factors (CSF).
Typical status reporting facilities provided by an EIS include
Drill-down- offer highest level of summary data with over-view of performance of each.
Exception reporting- opposite of drill down , instead of starting with aggregate information and later digging for details , looks for details against user- defined levels
of acceptability.
Trend monitoring- finding out the directions in which a given set of numbers is
moving.
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
27
Unit -3 Period: 27
Topic: KMS
KMS refers to a system for managing knowledge in organizations for
supporting creation, capture, storage and dissemination of information.
The idea of a KM system is to enable employees to have ready access to the
organization's documented base of facts, sources of information, and solutions.
Sharing of valuable organizational information throughout organizational
hierarchy.
Can avoid re -inventing the wheel, reducing surplus work.
May reduce training time for new employees
Retention of Intellectual Property after the employee leaves if such knowledge
can be stored.
KNOWLEDGE WORK SYSTEMS (KWS):
The KWS are specially designed to promote the creation of
knowledge and to ensure that new knowledge & technical expertise are properly
integrated into the business.
Includes researchers, designers, architects, scientist and engineers who
primarily create knowledge and information for the org..
Examples CAD/CAM, 3D visualization, virtual reality systems, Investment
workstations.
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
28
Unit -3 Period: 28
Topic: GIS-GEOGRAPHICAL INFORMATION SYSTEM
A Geographic information system (GIS) is a computer program for storing, retrieving,
analyzing, & displaying cartographic data. Technically, a GIS is a system that includes
mapping software & its application to remote sensing, land surveying, aerial photography,
geography, & tools that can be implemented with GIS software.
A Geographic information system is a computer system that uses location information:
Address
Postal code
Census block
Latitude / longitude coordinates
With a GIS, you can:
Map customers to study demographics
Look for patterns in the way a disease is spreading
Model the path of atmospheric pollution
And much more
A GIS can also map information stored in:
Spreadsheets
Database
GIS allows you to see:
Patterns
Relationships
Trends
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
29
Unit -3 Period: 29
Topic: INTERNATIONAL INFORMATION SYSTEM-IIS
Business is turning themselves into global organization. To handle these challenges the
companies will need faster communications and information processing.
Company will have to rely more on information technology to manage global
organization. This type of creation of IS in co operating in one or more countries is
referred to as IIS.
Globalization
Barriers to ISS:
Legal issues
Market access issues
Financial issues
Language and translation
Purchasing in different currencies
Challenges of ISS:
Technological challenges
Regulations and tariffs
Differences in payment mechanisms
Language differences
Cultural differences
Conflicting economic, scientific and security interests
Political challenges
Different standards
Legal barriers
Different time zones.
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
30
Unit -4 Period: 30
Topic: Introduction to SECURITY AND CONTROL
SECURITY:
Security refers to the protection of computer based resources hardware, software,
data, procedures and people against alteration, destruction, or unauthorized use.
All computer systems & communications channels face security threats that can compromise
systems, the services provided by the systems, and data stored on or transmitted between
systems.
The most common threats are:
denial-of-service
Interception
Manipulation
Masquerading
repudiation
CONTROLS
The combination of manual and automated measures that safeguards IS and ensure that they perform according to management standards is termed controls.
Controls consist of all the methods, policies, and organizational procedures that ensure the safety of the organization assets the accuracy and reliability of its
accounting records, and operational adherence to management standards.
Properly designed controls may prevent errors from occurring, deter criminals from attacking the system, and deny access to authorized persons.
General controls
Physical controls
Access controls
Biometric controls
Data security controls
Other general controls
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
31
Unit -4 Period: 31
Topic: Security system & types of testing
CHALLENGES OF IS SECURITY:
Internal the mode of attack is within the organization. For example, employees misusing their authentication right and access permissions.
External originating outside the organization, for example, hackers and viruses.
Natural due to natural disasters or system failure, for example, earthquakes.
TESTING
Security testing is possibly the surest determinant of whether a system is configured and continues to be configured to the correct security controls and policy.
Security testing is a process to determine that an information system protects data and maintains functionally as intended.
Security testing provides insight into the other system development life cycle activities such as risk analysis and contingency planning.
Security testing results should be documented and made available foe staff involved in other IT AND Security related areas.
Specifically, security testing results can be used in the following ways:
As a reference point for corrective action.
In defining mitigation activities to address identified vulnerabilities.
As a benchmark for tracking an organization progress in meeting security
requirement.
To assess implementation status of system security requirement.
To conduct cost/ benefit analysis for improvement to system security
To enhance other life-cycle activities, such as risk assessments, certification and
authorization (C&A), performance improvement efforts.
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
32
Unit -4 Period: 32
Topic: Error Deduction & controls: Controls consist of all the methods, policies, and
organizational procedures that ensure the safety of the organization assets the accuracy and
reliability of its accounting records, and operational adherence to management standards.
Properly designed controls may prevent errors from occurring, deter criminals from attacking
the system, and deny access to authorized persons.
General controls
Physical controls
Access controls
Biometric controls
Data security controls
Other general controls
Application controls
Input controls
Processing controls
Output controls
Controls for network protection
Access control
Encryption
Cable testers
firewalls
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
33
Unit -4 Period: 33
Topic: IS Vulnerability
VULNERABILITY
In computer security, the term vulnerability is a weakness which allows an attacker to
reduce a system information assurance.
vulnerability is the intersection of 3 elements:
A system susceptibility or flaw, attacker access to the flaw, and attacker capacity to
exploit the flaw.
IS vulnerability
It is termed as a flaw [fault] or weakness in system security procedure, design,
implementation, or internal controls that could be exercised (accidentally triggered or
intentionally exploited) and result in a security breach or a violation of the system
security policy.
CAUSES OF VULNERABILITY
Complexity
Familiarity
Connectivity
Password management flaws
Fundamental operating system design flaws
Internet website browsing
Software bugs
Unchecked user input
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
34
Unit -4 Period: 34
Topic: Computer crimes
Its includes traditional criminal acts committed with a computer as well as new
offenses that lack any parallels with non-computer crimes
The U.S department of justice [DOJ] broadly defines computer crimes as any
violations of criminal law that involve knowledge of computer technology for their
perpetration, investigation, or prosecution.
Cyber-crimes are frequently grouped into 3 categories.
The first are those in which the computer comprises the object of crime and in which the perpetrator targets the computer itself.
The second category involves those in which the computer forms the subject of a crime, either as the physical site of the offense or as the source of some form of loss
or damage.
Third, which computer serves the instrument used to commit traditional crimes in cyberspaces? This encompasses offenses like cyber-fraud, online harassment, and
child pornography.
Types of computer crimes:
Spam
Fraud
Obscene or offensive content
Harassment
Drug trafficking
Cyber terrorism
Cyber crime: Any criminal activity that uses a computer either as an instrumentally, target
or means for perpetuating further crimes comes within the ambit of cyber crime. A
generalized definition is unlawful acts wherein the computer is either a tool or target or
both
Reasons for cyber crimes:
Capacity to store data in comparatively small space.
Easy to access. Complex, Negligence, Loss of evidence
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
35
Unit -4 Period: 35
Topic: SECURING THE WEBSITE
Right when choosing your web hosting company you need to ask about their servers & how
secure they are. Do they update software quickly & automatically? What operating system is
used & is used and is it secure?
Make sure that if you have sensitive data such as a customer credit card / personal
information that is transmitted or stored, keep data secure.
Use packet filtering and firewall settings to restrict unauthorized sites. Make it password
protected.
Vulnerability scanners are used in some cases to find the weakness in yours sites security.
Once your business is connected to the internet, its your responsibility to protect your
business data & information against unwanted intruders.
You should ensure that your connection to the internet is secure. Some issues to consider
when securing your website are:
Working procedures
Virus and spy ware protection software
Firewalls
Back up data
Using secure passwords
Ensure the security of your electronic transactions:
Spoofing
Unauthorized disclosure
Unauthorized action
Data alteration
Antivirus:
Malware Viruses, Trojans, Spy ware, Worms, Bots.
Anti-spy ware
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
36
Unit -4 Period: 36
Topic: security the Intranets and Wireless Networks
Securing the intranet: An intranet is an internal information system based on internet
technology, web services, TCP/IP and HTTP communication protocols and HTML
publishing
The intranet is a technology that allows an organization to define itself as a whole entity, a
group, where everyone knows their roles, and everyone is working on the improvement and
health of organization
Its a smaller version of internet that only the members of an organization can see internal
network by keeping it private, secure and affordable.
Business applications of intranet: organization use intranets for variety of internal functions.
Human resources intranet
Sales and marketing intranet
Information system intranet
Executive or corporate intranet
Customer service intranet
Finance intranet
Advantages of an intranet:
Exchange files with other branches, co or people is much faster than traditional
methods
Global communication is another advantages
Inter-office network communication network
Timely updates
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
37
Unit -4 Period: 37
Topic: Software Audit
AUDIT:
Audits provide an independent evaluation of software products or process to ascertain
compliance to standards, specifications, and procedures based on objectives criteria that
included documents that specify.
Software audit is a regular investigation of the software installed on all computers in an
organization to ensure that it is authorized or licensed.
Software audit minimize the risk of prosecution for software theft, minimize the risk of
viruses through uncontrolled software copying and ensure technical support is available to all
users.
Purpose or need for software audit:
To identify critical security issues before they are exploited.
To perform extensive, regular security audit on the installed software or systems to
reduce vulnerabilities
To locate the most problematic crashes of application, and improving debug (clear up,
correct, sort out) capabilities.
To conduct software vulnerability assessment, and gain control over organization
private data etc.
Auditing regularly the commercial software, provide quality assurance requirement .
SOFTWARE AUDIT REVIEW:
Type of software review in which one or more auditors who are not members of the
software development organization conduct.
An independent examination of software product, software process, or set of
software process to access compliance with specifications, standards, contractual
agreement, or other criteria.
Software product is kind of technical document, IEEE std.1028 offers a list of 32
examples of software products subjects to audit
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
38
Unit -4 Period: 38
Topic: Ethics in IT
Ethics is a moral code and set of rules which establishes boundaries of generally accepted
behavior. Morality is social conventions about right and wrong. Ethics is a set of beliefs
about right and wrong behavior. Ethical behavior conforms to generally accepted social
norms.
Ethics in IT:
Data mining
Social networking
E-mail spam
Intellectual property / IT
Filtering online content
Ethics and IT professionals:
The IT professional like programmers , system analysts, software, software engineers,
database administrators, local area network [LAN] administrators, chief information
officers [CIO's] are responsible to following stakeholders in terms of keeping ethical
behavior in IT.
Relationships between IT professionals and employers.
Relationships between IT professionals and clients
Relationships between IT professionals and suppliers
Relationships between IT professionals and other professionals
Relationships between IT professionals and IT users
Relationships between IT professionals and society
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
39
Unit -5 Period: 39
Topic: e-Business & its Classification
Electronic commerce or e-commerce refers to a wide range of online business activities for
products and services.1 It also pertains to any form of business transaction in which the parties interact electronically rather than by physical exchanges or direct physical contact.
Is e-commerce the same as e-business?
While some use e-commerce and e-business interchangeably, they are distinct concepts. In e-
commerce, information and communications technology (ICT) is used in inter-business or
inter-organizational transactions (transactions between and among firms/organizations) and in
business-to-consumer transactions (transactions between firms/organizations and
individuals).
In e-business, on the other hand, ICT is used to enhance ones business. It includes any process that a business organization (either a for-profit, governmental or non-profit entity)
conducts over a computer-mediated network.
A more comprehensive definition of e-business is: The transformation of an organizations processes to deliver additional customer value through the application of technologies, philosophies and computing paradigm of the new economy.
What are the different types of e-commerce?
The major different types of e-commerce are:
1. business-to-business (B2B);
2. business to-consumer (B2C);
3. business-to-government (B2G);
4. consumer-to-consumer (C2C);
5. mobile commerce (m-commerce)
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
40
Unit -5 Period: 40
Topic: e-governance
The term e-government is of recent origin and there exists no standard definition since the
conceptual understanding is still evolving. The generally accepted definition is: "e-
government" or electronic government refers to the use of Information and Communication
Technologies (ICTs) by government agencies for any or all of the following reasons:
Exchange of information with citizens, businesses or other government departments Speedier and more efficient delivery of public services Improving internal efficiency Reducing costs or increasing revenue Re-structuring of administrative processes
Defining e-governance: The application of electric means in: [1] the interaction between
government and citizens and government and business, as well as in [2] internal
government operations to simplify and improve democratic, government and business
aspects of governance.
E-administration
E-services
E-governance
E-democracy
Delivery models & activities of e- governance:
Government-to-citizen or Government-to-customer[G2C]
Government-to-business[G2B]
Government-to- Government[G2G]
Government-to-employees[G2E]
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
41
Unit -5 Period: 41
Topic: ERP
Enterprise resource planning (ERP) systems integrate internal and external management
information across an entire organization, embracing finance/accounting, manufacturing,
sales and service, customer relationship management, etc. ERP systems automate this activity
with an integrated software application. Their purpose is to facilitate the flow of information
between all business functions inside the boundaries of the organization and manage the
connections to outside stakeholders.ERP is a software architecture that facilitates the flow of
information among the different functions within an enterprise. Similarly, ERP facilitates
information sharing across organizational units and geographical locations. It enables
decision-makers to have an enterprise-wide view of the information they need in a timely,
reliable and consistent fashion.
A business strategy and set of industry-domain-specific applications that build customer and shareholder communities value network system by enabling and
optimizing enterprise and inter-enterprise collaborative operational and financial
processes
Installing an ERP system has many advantages - both direct and indirect. The direct
advantages include improved efficiency information integration for better decision-making,
faster response time to customer queries, etc.
The indirect benefits include better corporate image, improved customer goodwill, customer
satisfaction and so on. Some of the benefits are quantitative (tangible) while others are non-
quantitative (intangible).
Tangible benefits are those measured in monetary terms and intangible benefits cannot be
measured in monetary terms but they do have a very significant business impact.
Tangible benefits:
Improves the productivity of process and personnel
Lowering the cost of products and services purchased
Paper and postage cost reductions
Inventory reduction
Lead time reduction
Reduced stock obsolescence
Faster product / service look-up and ordering saving time and money
Automated ordering and payment, lowering payment processing and paper costs
Intangible benefits:
Increases organizational transparency and responsibility
Accurate and faster access to data for timely decisions
Can reach more vendors, producing more competitive bids ;
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
42
Unit -5 Period: 42
Topic: SCM
A supply chain is a network of facilities and distribution options that performs the functions of
procurement of materials, transformation of these materials into intermediate and finished products,
and the distribution of these finished products to customers. Supply chains exist in both service and
manufacturing organizations, although the complexity of the chain may vary greatly from industry to
industry and firm to firm.
There are four major decision areas in supply chain management: 1) location, 2) production,
3) inventory, and 4) transportation (distribution), and there are both strategic and operational
elements in each of these decision areas.
Information In The Supply Chain
Source Make Deliver Sell
Suppliers Manufacturers Warehouses &
Distribution Centers
Retailer
Order Lead
Time
Delivery Lead
Time
Production Lead
Time
Each facility further away from actual customer demand must make forecasts of demand
Lacking actual customer buying data, each facility bases its forecasts on downstream orders, which are more variable than actual demand
To accommodate variability, inventory levels are overstocked thus increasing inventory carrying costs
Its estimated that the
typical pharmaceutical
company supply chain
carries over 100 days of
product to
accommodate
uncertainty
Plan
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
43
Unit -5 Period: 43
Topic: e-CRM
e-CRM This concept is derived from E-commerce. It also uses net environment i.e., intranet, extranet
and internet. Electronic CRM concerns all forms of managing relationships with customers making
use of Information Technology (IT). eCRM is enterprises using IT to integrate internal organization
resources and external marketing strategies to understand and fulfill their customers needs.
Comparing with traditional CRM, the integrated information for eCRM intraorganizational
collaboration can be more efficient to communicate with customers.
Major differences between CRM and eCRM :
Customer contacts
CRM Contact with customer made through the retail store, phone, and fax. eCRM All of the traditional methods are used in addition to Internet, email, wireless,
and PDA technologies.
System interface
CRM Implements the use of ERP systems, emphasis is on the back-end. eCRM Geared more toward front end, which interacts with the back-end through use of
ERP systems, data warehouses, and data marts.
System overhead (client computers)
CRM The client must download various applications to view the web-enabled applications. They would have to be rewritten for different platform.
eCRM Does not have these requirements because the client uses the browser.
Customization and personalization of information
CRM Views differ based on the audience, and personalized views are not available. Individual personalization requires program changes.
eCRM Personalized individual views based on purchase history and preferences. Individual has ability to customize view.
System focus
CRM System (created for internal use) designed based on job function and products. Web applications designed for a single department or business unit.
eCRM System (created for external use) designed based on customer needs. Web application designed for enterprise-wide use.
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
44
Unit -5 Period: 44
Topic: Data warehousing & data mining
In computing, a data warehouse (DW) is a database used for reporting and analysis. The
data stored in the warehouse is uploaded from the operational systems. The data may pass
through an operational data store for additional operations before it is used in the DW for
reporting.
A data warehouse maintains its functions in three layers: staging, integration, and access.
Staging is used to store raw data for use by developers. The integration layer is used to
integrate data and to have a level of abstraction from users. The access layer is for getting
data out for users.Data warehouses can be subdivided into data marts. Data marts store
subsets of data from a warehouse.
Data mining (the analysis step of the knowledge discovery in databases process or KDD),
a relatively young and interdisciplinary field of computer science is the process of
discovering new patterns from large data sets involving methods at the intersection of
artificial intelligence, machine learning, statistics and database systems. The goal of data
mining is to extract knowledge from a data set in a human-understandable structure and
involves database and data management, data preprocessing, model and inference
considerations, interestingness metrics, complexity considerations, post-processing of found
structure, visualization and online updating.
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
45
Unit -5 Period: 45
Topic: Business Intelligence
Business intelligence (BI) mainly refers to computer-based techniques used in identifying,
extracting and analyzing business data, such as sales revenue by products and/or departments,
or by associated costs and incomes. BI technologies provide historical, current and predictive
views of business operations. Common functions of business intelligence technologies are
reporting, online analytical processing, analytics, data mining, process mining, complex event
processing, business performance management, benchmarking, text mining and predictive
analytics.
BI is a business management term which refers to applications and technologies which are
used to gather, provide access to, and analyze data and information about their company
operations
The 5 key stages of BI:
1. Data sourcing
2. data analysis
3. data situation awareness
4. risk assessment
5. decision support
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
46
Unit -5 Period: 46
Topic: Pervasive computing
The word pervasive and ubiquitous mean existing everywhere. It is growing trend
towards embedding microprocessors in everyday objects so they can communicate
information.
According to Mark Weise, Pervasive computing is roughly the opposite of virtual
reality. Where virtual reality puts people inside a computer -generated world, Pervasive
computing forces the computer to live out here in the world with people.
PRINCIPLES:
DECENTRALIZATION
DIVERSIFICATION
CONNECTIVITY
SIMPLICITY
TECHNOLOGIES:
COMPUTING-DEVICES
COMMUNICATIONS-CONNECTIVITY
USER INTERFACES
-
G.K.M College of Engineering & Technology
Department of Management Studies
SubjectName: Management Information System R/TP/01
Subject Code: BA9225 Issue C: Rev 01 Class: MBAI year/II Semester PEer
Class: MBA I Year/II Semester
47
Unit -5 Period: 47
Topic: CMM
What is the Capability Maturity Model (CMM)?
The application of process management and quality improvement
concepts to software development and maintenance.
A guide for evolving toward a culture of engineering excellence.
A model for organizational improvement.
Focuses on practices that are under control of the software group
Presents a minimum set of recommended practices that have been shown to
enhance a software development and maintenance capability
It defines the expectation (the what)
Without overly constraining the implementation (the how)
Levels of CMM:
1. Initial level
2. Repeatable level
3. Defined level
4.Managed level
5.Optimizing level