Você está na página 1de 11

Q: Note on MIS and its applications.

A management information system (MIS) provides information that organizations need to manage themselves efficiently and effectively. Management information systems are typically computer systems used for managing five primary components: hardware, software,data (information for decision making), procedures (design,development and documentation), people (individuals, groups, or organizations),. Management information systems are distinct from other information systems, in that they are used to analyze and facilitate strategic and operational activities Academically, the term is commonly used to refer to the study of how individuals, groups, and organizations evaluate, design, implement, manage, and utilize systems to generate information to improve efficiency and effectiveness of decision making, including systems termed decision support systems, expert systems, and executive information systems. Most business schools (or colleges of business administration within universities) have an MIS department, alongside departments of accounting, finance, management, marketing, and sometimes othersAdvantages The following are some of the benefits that can be attained for different types of management information systems

Companies are able to highlight their strengths and weaknesses due to the presence of revenue reports, employees' performance record etc. The identification of these aspects can help the company improve their business processes and operations. Giving an overall picture of the company and acting as a communication and planning tool. The availability of the customer data and feedback can help the company to align their business processes according to the needs of the customers. The effective management of customer data can help the company to perform direct marketing and promotion activities

Enterprise applications

Enterprise systemsalso known as enterprise resource planning (ERP) systemsprovide integrated software modules and a unified database that personnel use to plan, manage, and control core business processes across multiple locations. Modules of ERP systems may include finance,

accounting, marketing, human management, and distribution.

resources,

production,

inventory

Supply chain management (SCM) systems enable more efficient management of the supply chain by integrating the links in a supply chain. This may include suppliers, manufacturers, wholesalers, retailers, and final customers. Customer relationship management (CRM) systems help businesses manage relationships with potential and current customers and business partners across marketing, sales, and service. Knowledge management system (KMS) helps organizations facilitate the collection, recording, organization, retrieval, and dissemination of knowledge. This may include documents, accounting records, unrecorded procedures, practices, and skills. Q:Write in Brief about Decision support system(DSS).

A decision support system (DSS) is a computer-based information system that supports business or organizational decision-making activities. DSSs serve the management, operations, and planning levels of an organization and help to make decisions, which may be rapidly changing and not easily specified in advance. Decision support systems can be either fully computerized, human or a combination of both. DSSs include knowledge-based systems. A properly designed DSS is an interactive software-based system intended to help decision makers compile useful information from a combination of raw data, documents, and personal knowledge, or business models to identify and solve problems and make decisions. Typical information that a decision support application might gather and present includes:

inventories of information assets (including legacy and relational data sources, cubes, data warehouses, and data marts), comparative sales figures between one period and the next, projected revenue figures based on product sales assumptions

DSS components may be classified as:

1. Inputs: Factors, numbers, and characteristics to analyze 2. User Knowledge and Expertise: Inputs requiring manual analysis by the user 3. Outputs: Transformed data from which DSS "decisions" are generated 4. Decisions: Results generated by the DSS based on user criteria Benefits 1. Improves personal efficiency 2. Speed up the process of decision making 3. Increases organizational control 4. Encourages exploration and discovery on the part of the decision maker 5. Speeds up problem solving in an organization 6. Facilitates interpersonal communication 7. Promotes learning or training 8. Generates new evidence in support of a decision 9. Creates a competitive advantage over competition 10.Reveals new approaches to thinking about the problem space 11.Helps automate managerial processes 12.Create Innovative ideas to speed up the performance DSS is extensively used in business and management. Executive dashboard and other business performance software allow faster decision making, identification of negative trends, and better allocation of business resources. Due to DSS all the information from any organization is represented in the form of charts, graphs i.e. in a summarized way, which helps the management to take strategic decision. Q:Explian Transaction processing system?? Transaction processing is a style of computing that divides work into individual, indivisible operations, called transactions. A transaction processing system (TPS) or transaction server is a software system, or software/hardware combination, that supports transaction processing. Transaction processing systems also attempt to provide predictable response times to requests, although this is not as critical as for real-time systems. Rather than allowing the user to run arbitrary programs as time-sharing, transaction processing allows only predefined, structured transactions. Each transaction is usually short duration and the processing activity for each transaction is programmed in advance.

The following features are considered important in evaluating transaction processing systems. Performance Fast performance with a rapid response time is critical. Transaction processing systems are usually measured by the number of transactions they can process in a given period of time. Continuous availability The system must be available during the time period when the users are entering transactions. Many organizations rely heavily on their TPS; a breakdown will disrupt operations or even stop the business. Data integrity The system must be able to handle hardware or software problems without corrupting data. Multiple users must be protected from attempting to change the same piece of data at the same time, for example two operators cannot sell the same seat on an airplane. Ease of use Often users of transaction processing systems are casual users. The system should be simple for them to understand, protect them from data-entry errors as much as possible, and allow them to easily correct their errors. Modular growth The system should be capable of growth at incremental costs, rather than requiring a complete replacement. It should be possible to add, replace, or update hardware and software components without shutting down the system. Since business organizations have become very dependent on TPSs, a breakdown in their TPS may stop the business' regular routines and thus stopping its operation for a certain amount of time. In order to prevent data loss and minimize disruptions when a TPS breaks down a well-designed backup and recovery procedure is put into use. The recovery process can rebuild the system when it goes down Q:Short note on Executive support system

An executive information system (EIS) is a type of management information system that facilitates and supports senior executive information and decisionmaking needs. It provides easy access to internal and external information relevant to organizational goals. It is commonly considered a specialized form of decision support system (DSS). EIS emphasizes graphical displays and easy-to-use user interfaces. They offer strong reporting and drill-down capabilities. In general, EIS are enterprise-wide DSS that help top-level executives analyze, compare, and highlight trends in important variables so that they can monitor performance and identify opportunities and problems. EIS and data warehousing technologies are converging in the marketplace EIS components can typically be classified as:

Hardware(explain in general I/O devices) Software(Text handling Sftware,database,graphic base, statistical analysis) User interface(Reports, I/O,question&answers) Telecommunications(transmission of data from one place to another) Applications: EIS helps executives find those data according to user-defined criteria and promote information-based insight and understanding. Unlike a traditional management information system presentation, EIS can distinguish between vital and seldom-used data, and track different key critical activities for executives, both which are helpful in evaluating if the company is meeting its corporate objectives. After realizing its advantages, people have applied EIS in many areas, especially, in manufacturing, marketing, and finance areas.

Advantages of EIS

Easy for upper-level executives to use, extensive computer experience is not required in operations Provides timely delivery of company summary information Information that is provided is better understood EIS provides timely delivery of information. Management can make decisions made promptly.

Improves tracking information Offers efficiency to decision makers

Disadvantages of EIS

System dependent Limited functionality, by design Information overload for some managers Benefits hard to quantify High implementation costs System may become slow, large, and hard to manage Need good internal processes for data management May lead to less reliable and less secure data Q:Write note on knowledge management system. Knowledge management (KM) comprises a range of strategies and practices used in an organisation to identify, create, represent, distribute, and enable adoption of insights and experiences. Such insights and experiences comprise knowledge, either embodied in individuals or embedded in organisations as processes or practices. Knowledge management efforts typically focus on organisational objectives such as improved performance, competitive advantage, innovation, the sharing of lessons learned, integration and continuous improvement of the organisation. KM efforts overlap with organisational learning, and may be distinguished from that by a greater focus on the management of knowledge as a strategic asset and a focus on encouraging the sharing of knowledge It is seen as an enabler of organisational learning and a more concrete mechanism than the previous abstract research. Perspectives of KM

Techno-centric with a focus on technology, ideally those that enhance knowledge sharing and creation. Organisational with a focus on how an organisation can be designed to facilitate knowledge processes best.

Ecological with a focus on the interaction of people, identity, knowledge, and environmental factors as a complex adaptive system akin to a natural ecosystem. Leading companies undertake KM for following considerations:

Making available increased knowledge content in the development and provision of products and services Achieving shorter new product development cycles Facilitating and managing innovation and organisational learning Leveraging the expertise of people across the organisation Increasing network connectivity between internal and external individuals Managing business environments and allowing employees to obtain relevant insights and ideas appropriate to their work Solving intractable or wicked problems Managing intellectual capital and intellectual assets in the workforce (such as the expertise and know-how possessed by key individuals) Technologies:

Software tools in knowledge management are a collection of technologies and are not necessarily acquired as a single software solution.Furthermore, these knowledge management software tools have the advantage of using the organisation existing information technology infrastructure. Organisations and business decision makers spend a great deal of resources and make significant investments in the latest technology, systems and infrastructure to support knowledge management. It is imperative that these investments are validated properly, made wisely and that the most appropriate technologies and software tools are selected or combined to facilitate knowledge management. Knowledge management has also become a cornerstone in emerging business strategies such as Service Lifecycle Management (SLM) with companies increasingly turning to software vendors to enhance their efficiency in industries including, but not limited to, the aviation industry Q: Note on Supply chain management(SCM) information system. Supply chain management SCM is the integration and management of supply chain organizations and activities through collaboration, effective business processes and high levels of information sharing. The supply chain

concept has become a concern due to global competition and increasing customer demand for value. Thus, the information must be available in real time across the supply chain and this can not be achieved without an integrated software system for supply chain management. Supply chain members have to collaborate, sharing information for improving customers satisfaction. Web technologies enable enterprises to become more effective, to trade with suppliers and customers over the Internet in real time. For this, businesses have to integrate their information systems and applications with those of their suppliers and customers. First, companies have to redesign their supply chain to create an integrated value system and afterwards, companies can develop business to business applications across supply chain structure for the optimization of the supply chain . The implementation of the supply chain information systems in companies facilitates an increase in their competitiveness and their profits. Q: Customer Relationship Management(CRM) information system. Customer relationship management (CRM) is a model for managing a companys interactions with current and future customers. It involves using technology to organize, automate, and synchronize sales, marketing, customer service, and technical support. Types/variations Sales force automation Sales force automation (SFA) uses software to streamline the sales process. The core of SFA is a contact management system for tracking and recording every stage in the sales process for each prospective client, from initial contact to final disposition. Many SFA applications also include insights into opportunities, territories, sales forecasts and work flow automation. Marketing CRM systems for marketing track and measure campaigns over multiple channels, such as email, search, social media, telephone and direct mail. These systems track clicks, responses, leads and deals. Customer service and support

CRMs can be used to create, assign and manage requests made by customers, such as call center software which help direct customers to agents. CRM software can also be used to identify and reward loyal customers over a period of time. Appointments Appointment CRMs automatically provide suitable appointment times to customers via e-mail or the web, which are then synchronized with the representative or agent's calendar. Small business For small businesses a CRM may simply consist of a contact manager system which integrates emails, documents, jobs, faxes, and scheduling for individual accounts. CRMs available for specific markets for professional markets (legal, finance) are frequently touted for their event management and relationship tracking opposed to financial return on investment (ROI). Social media Some CRMs coordinate with social media sites like Twitter, LinkedIn, Facebook and Google Plus to track and communicate with customers who share opinions and experiences about their company, products and services. Non-profit and membership-based Systems for non-profit and membership-based organizations help track constituents, fund-raising, demographics, membership levels, membership directories, volunteering and communications with individuals Q: Threats to Information system. Also explain how to handle them. In computer security a threat is a possible danger that might exploit a vulnerability to breach security and thus cause possible harm. A threat can be either "intentional" (i.e., intelligent; e.g., an individual cracker or a criminal organization) or "accidental" (e.g., the possibility of a computer malfunctioning, or the possibility of an "act of God" such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event.

People can be interested in studying all possible threats that can:


affect an asset, affect a software system are brought by a threat agent. Threats classification:

Spoofing of user identity Tampering Repudiation Information disclosure (privacy breach or Data leak) Denial of Service (D.o.S.) Elevation of privilege

Threat agents can take one or more of the following actions against an asset:

Access simple unauthorized access Misuse unauthorized use of assets (e.g., identity theft, setting up a porn distribution service on a compromised server, etc.) Disclose the threat agent illicitly discloses sensitive information Modify unauthorized changes to an asset Deny access includes destruction, theft of a non-data asset, etc. Threat Management:

Threats should be managed by operating an ISMS, performing all the IT risk management activities foreseen by laws, standards and methodologies. Very large organizations tend to adopt business continuity management plans in order to protect, maintain and recover business-critical processes and systems. Some of these plans foreseen to set up computer security incident response team (CSIRT) or computer emergency response team (CERT) There are some kind of verification of the threat management process:

Information security audit Penetration test

Most organizations perform a subset of these steps, adopting countermeasures based on a non systematic approach: Computer insecurity studies the battlefield of computer security exploits and defences that results. Information security awareness generates quite a large business: (see the category:Computer security companies). Countermeasures may include tools such as firewalls, intrusion detection system and anti-virus software, Physical Security measures, policies and procedures such as regular backups and configuration hardening, training such as security awareness education. A lot of software has been developed to deal with IT threats:

Open source software o see the category category:free security software Proprietary o see the category category:computer security software companies for a partial list

Você também pode gostar