Você está na página 1de 11

MASTER OF BUSINESS ADMINISTRATION SEMESTER 2

MB0047-MANAGEMENT INFORMATION SYSTEM


Q.1) Professor A. Van Cauwenbergh of Antwerp University, in a paper
presented at the Tenth
Anniversary Conference of the European Institute for Advanced Studies in
Management, presented four revisions to traditional Management Theory.
In summary, the revisions are:
(1) The initiative for the renewal and adjustment of the activities of a firm
should come from the different levels in the management hierarchy.
Strategy is not a privilege of top management.
(2) Firms, especially big firms, are incoherent systems (goals of the
different component systems are not simply subdivisions of an overall goal;
there are individual, conflicting goals as well).
Some of these differences are manifestations of organizational initiative and
vitality. Using information systems and central planning and rule-making
to suppress all differences is destructive to organizations.
(3) The most vital fluid of an enterprise is the aggregate of its
entrepreneurial values. The most fundamental and motivation and control
come through these shared values relative to work, quality, efficiency, etc.
Management often neglects these values and assumes that the Collection
and dissemination of information will provide sufficient motivation and
control.
(4) Enterprises are open systems; their structure and operating processes
are determined by their environment. This means organizations must be
designed to continually adjust to the environment.
a. If these revisions are correct, how is planning to be organized?
b. How should the information system support the planning
organization?
Ans.) a) MEANING OF ORGANISATIONAL PLANNING
Process of identifying an organization's immediate and long-term objectives, and
formulating and monitoring specific strategies to achieve them. It
also entails staffing and resource allocation, and is one of the most
important responsibilities of a management team.

ORGANISATIONAL PLANNING PROCESS


1. PRE-PLAN POSITION: Obtain a pre-plan position for the organisation. This is
a combination of the information in the annual report and annual review, which

should include various financial, statistical and background information for both
the internal operations and external influences of the organisation.

1. PRE-PLAN POSITON

4. STRATEGIC
EVALUATION

2. STRATEGY
FORMULATION

3. STRATEGIC
FORMULATION

2. STRATEGY FORMULATION: One of the key activities will be either to review


or identify the vision, mission and objectives for both long and short term and
the key performance indicators to form the strategic plan.
3. STRATEGY IMPLEMENTATION: To ensure a planning document is relevant
to the people within the organisation using it as a management tool. The detail of
what, who, when, where, how and the financial implications will need to be
worked through.
4. STRATEGIC EVALUATION: Monitoring systems need to be put into the plan
to enable management to evaluate and review the progress of the organisations
planning documents.
b) Ans. INFORMATION SYSTEM SUPPORTING PLANNING ORGANISATION
GUIDELINES FOR PLANNING MIS
1. To provide information for decision-making and improve project
management.
2. To demonstrate results through project evaluation.

3. To empower communities and other project stakeholders.

4. To increase opportunities to learn from best practices.

COMPARISON BEETWEEN BUSINESS PLAN & MIS PLAN

Business Plan

MIS Plan

Business plan consists of business goals


and objectives.

Management information system,


objectives, consistent to the business
goals and objectives.

Business plan consists planning and


strategy

MIS consists information strategy for the


business plan implementation playing a
supportive role.

Business plan helps in strategy planning


and decisions.

MIS plan helps in architecture of the


Management Information system to
support decisions.

Business plan helps to exercise


management Plan for execution and
control.

MIS plan helps in system development


schedule, matching the plan execution.

Business plan helps in operation plan for


the execution.

MIS plan consists of hardware and


software plan for the procurement and
the implementation.

Q.2) Information Technology and Computers have brought information


age. The spread of Internet & relative ease of access made Information
Breach easier. Our future is not secure, if our information is not secure.
Information Resources need to be guarded, protected and controlled.
List the precautionary measures to be considered to prevent cybercrime?

Ans.) Weve probably heard the adage information is power, and that is certainly
true when it comes to cybercrime. Access to your personal information is what gives
hackers the power to tap into your accounts and steal your money or your identity. But
the right information can also empower you to protect yourself from being caught up in
the thriving industry that is cybercrime.
With that in mind, here are following measures we can take to avoid becoming a victim
of cybercrime.
MEASURES TO PREVENT CYBER CRIME
1) EDUCATION: Hackers arent the only ones who can gain power from information.
By educating yourself about the types of scams that exist on the Internet and how to
avert them, you are putting yourself one step ahead of the cybercriminals.

Since phishing is prevalent, read up on the latest phishing scams and learn how to
recognize a phishing attempt. Remember, phishing is when hackers attempt to lure you
into revealing personal information by pretending to be a legitimate organization or
person. These scams often play off major new stories, so keep informed on the latest
news-related scams.
2) USE A FIREWALL: Firewalls monitor traffic between your computer or network
and the Internet and serve as a great first line of defence when it comes to keeping
intruders out. Make sure to use the firewall that comes with your security software. And
if you have a home wireless network, enable the firewall that comes with your router.
3) CLICK WITH CAUTION: When youre checking your email or chatting over
instant messenger (IM), be careful not to click on any links in messages from people you
dont know. The link could take you to a fake website that asks for your private
information, such as user names and passwords, or it could download malware onto
your computer.
4) PRACTICE SAFE SURFING: When navigating the web, you need to take
precautions to avoid phony websites that ask for your personal information and pages
that contain malware. Use a search engine to help you navigate to the correct web
address since it will correct misspellings.
5) PRACTICE SAFE SHOPPING: In addition to practicing safe surfing, you also need
to be careful where you shop online. Be cautious when shopping at a site that youve
never visited before and do a little investigation before you enter your payment
information.

Q.3) a.) While implementing MIS in any organization change can occur in number of
ways. List and explain the steps in the process as suggested by Lewins model.
b.) Compare between prototype approach and Life Cycle approach.
Ans.) a.) KURT LEWINS CHANGE THEORY
Kurt Lewins change theory and Lewins three step model is very much a significant
part of change management strategies for managing change in the work place in the 21st
century. This change management model was developed during the 1940s and the
concept if Unfreezing-Transition-Freezing still remains very relevant today.
KURT LEWINS 3 PHASES CHANGE MANAGEMENT MODEL
Kurt lewins change management model is a fantastic change model for understanding
the basic concepts of a straight-forward change management process.

UNFREEZE

TRANSITION

FREEZE

Lewins Three Step Change Model Phases are:


1. UNFREEZE: In this first step, reducing the forces that are striving to maintain
the status quo, and dismantling the current mind set. Usually by presenting a
provocative problem or event to get people to recognise the need for change and
to search for new solutions.
2. TRANSITION: In second step, developing new behaviours, values and attitudes,
sometimes through organisational structure and process changes and
development techniques. There may be a period of some confusion as we move
from old ways of doing things to the new.
3. FREEZE: The final stage of crystallizing and the adaptation of ownership of the
new as is. The organisation may revert to former ways of doing things at this
point unless the changes are reinforced through freezing.

b.) COMPARISON BETWEEN PROTOTYPE APPROACH & LIFE CYCLE


APPROACH

PROTOTYPE APPROACH

LIFE CYCLE APPROACH

Client have a preview of the


system from the "quick design"
and the prototype developed early
at the top of the process.

Client can only preview the system


only after the final version of the
software is developed because there
is no feedback loop.

Developers can refine or add


requirements and specification to
the system after the prototype is
built.

Developers encounter a freezing


requirement where they are not
allow to modify the requirements or
specification of the previous phase
until the next iteration.

The complexity of an error is low


because the prototype enables the
developer to detect any deficiency
early at the process.

The complexity of an error increases


because of the nature of the model;
each phase is sequential of the other.

Q.4) There is an information explosion in todays society. There are lot of


advantages of DBMS like proper maintenance of the data and maintaining
security. Explain the process of data transition using diagram and an
example of your own.
Ans.) MEANING OF DATA TRANSITION
Data transition is the physical transfer of data over a point-to-point or point-tomultipoint communication channel. Examples of such channels are copper wires, optical
fibres, wireless communication channels, and storage media. The data are represented
as an electromagnetic signal, such as an electrical voltage, radio wave, microwave,
or infrared signal.
EXAMPLE OF DATA TRANSITION
Moving data to DnA
The data that is moved to DnA should be finished products, ready to archive or ready to
be shared between groups at the JGI. It is not for intermediate data.
Batch Scheduled Transfers
Use the xfer queue to schedule jobs that move the data. A basic transfer script is here:

1. kmfagnan@genepool12 ~ $ echo $DNAFS


2./global/dna

1. kmfagnan@genepool12 ~ $ cat projb_to_dna.sh


2.#!/bin/bash l
3. #$ -N projb2dna
4. #$ -l xfer.c
5. rsync /house/groupdirs/my_group/my_shared_files
$DNAFS/projectdirs/<my_group_dir>
6. kmfagnan@genepool12 ~ $ qsub projb_to_dna.sh
Interactive Data Transfers
If you would like to interactively transfer data, you can log in to one of the Data
Transfer Nodes.
kmfagnan@genepool10 ~ $ ssh dtn0
Then enter the commands that you'd like to use for data transfer and don't forget to
take advantage of the environment variables that are set up for you.
1. kmfagnan@dtn03~$ echo $DNAFS
2./global/dna
3. kmfagnan@dtn03~$ rsync /house/groupdirs/my_group/my_shared_files
$DNAFS/pprojectdirs/<my_group_dir>

DATA TRANSITION PROCESS

In the above diagram, files are transferred between the client and server over a second
connection, a full duplex connection known as the "data connection." This connection is
between the client's "data transition process" and the server's data transfer process.

Both the client and the server have a protocol interpreter. The protocol interpreters
receive commands or replies, send commands or replies, and govern the data
connection. The server's protocol interpreter listens for a connection from a client's
protocol interpreter.

Q.5) Write short note on


a. World wide web
b. Voice over IP
c. Intranet
d. Extranet
Ans.) a.) MEANING OF WORLD WIDE WEB
World Wide Web is a system of interlinked hypertext documents accessed via the
Internet. With a Web browser, one can view Web pages that may contain text, images,
videos, and other multimedia and navigate between them using hyperlinks.
The World Wide Web is used to view web pages that may contain text, images, videos
and other multimedia, and navigate between them via hyperlinks. The World Wide Web
has now become a pool of information, ideas and culture that can be shared and
accessed from various remote sites around the globe.

b.) MEANING OF VOICE OVER INTERNET PROTOCOL


VoIP stands for Voice over Internet Protocol. It is also referred to as IP Telephony or
Internet Telephony. It is another way of making phone calls, with the difference of
making the calls cheaper or completely free. The phone part is not always present
anymore, as you can communicate without a telephone set.
VoIP has a lot of advantages over the traditional phone system. The main reason for
which people are so massively turning to VoIP technology is the cost. VoIP is said to be
cheap, but most people use it for free.

c.) MEANING OF INTRANET


Intranet is the generic term for a collection of private computer networks within an
organization. An intranet uses network technologies as a tool to facilitate
communication between people or work groups to improve the data sharing capability
and overall knowledge base of an organization's employees.
Intranets utilize standard network hardware and software technologies
like Ethernet, Wi-Fi, TCP/IP, Web browsers and Web servers. An organization's
intranet typically includes Internet access but is firewalled so that its computers cannot
be reached directly from the outside.
Many schools and non-profit groups have deployed them, but an intranet is still seen
primarily as a corporate productivity tool. A simple intranet consists of an internal
email system and perhaps a message board service.

d.) MEANING OF EXTRANET


An extranet is a controlled private network allowing customers, partners, vendors,
suppliers and other businesses to gain information, typically about a specific company
or educational institution, and do so without granting access to the organization's entire
network. An extranet is often a private part of a website. It is restricted to select users
through user IDs, passwords and other authentication mechanisms on a login page.
An extranets may be viewed as an intranet mapped onto the public Internet or onto
some other private network.
Advantages of extranets include:

Sharing product data or catalogues with business partners

Joint company collaboration and training

Sharing services such as online banking applications among affiliated banks

Q.6) Artificial intelligent system functions like a human being and helps a
manager in taking quick decisions. Explain the different applications AI
using diagram.
Ans.) MEANING OF ARTIFICIAL INTELLIGENCE
It is the science and engineering of making intelligent machines, es- pecially intelligent
computer programs. It is related to the similar task of using computers to understand
human intelligence, but AI does not have to conne itself to methods that are
biologically observable.
DIAGRAM OF ARTIFICIAL INTELLIGENCE

DIFFERENT APPLICATIONS OF ARTIFICIAL INTELLIGENCE


1.) APPLICATIONS OF COGNITIVE SCIENCE: Cognitive science is the
interdisciplinary scientific study of the mind and its processes. It
examines what cognition is, what it does and how it works. It includes
research on intelligence and behaviour, especially focusing on how
information is represented, processed, and transformed within nervous
systems and machines.
For example, Cognitive scientists study memory just as psychologists do,
but tend to focus in more on how memory bears on cognitive processes,
and the interrelationship between cognition and memory. One example of
this could be, what mental processes does a person go through to retrieve
a long-lost memory?
2.) APPLICATIONS OF ROBOTICS: Robotics is the branch
of technology that deals with the design, construction, operation, and
application of robots, as well as computer systems for their control,
sensory feedback, and information processing.

Outer Space Manipulative arms that are controlled by a human are


used to unload the docking bay of space shuttles to launch satellites or to
construct a space station.
Exploration Robots can visit environments that are harmful to humans.
An example is monitoring the environment inside a volcano or exploring
our deepest oceans. NASA has used robotic probes for planetary
exploration since the early sixties.

Military Robots Airborne robot drones are used for surveillance in


todays modern army. In the future automated aircraft and vehicles could
be used to carry fuel and ammunition or clear minefields.

3.) APPLICATION OF NATURAL INTERFACE: Natural Interface is the


common parlance used by designers and developers of human-machine
interfaces to refer to a user interface that is effectively invisible, and
remains invisible as the user continuously learns increasingly complex
interactions. The word natural is used because most computer interfaces
use artificial control devices whose operation has to be learned.
For example, Multi-Touch
When Bill Buxton was asked about the iPhone's interface, he responded "Multi-touch
technologies have a long history. To put it in perspective, the original work undertaken
by my team was done in 1984, the same year that the first Macintosh computer was
released, and we were not the first.
Multi-Touch is a technology which could enable a natural user interface. However, most
UI toolkits used to construct interfaces executed with such technology are traditional
GUIs.

******

Você também pode gostar