Académique Documents
Professionnel Documents
Culture Documents
SYLLABUS
BUS 3.2: DECISION SUPPORT SYSTEMS AND MANAGEMENT
INFORMATION SYSTEM
UNIT – I
MANAGEMENT INFORMATION SYSTEM
Basic Concepts:
A management information system (MIS) is a system or process that
provides information needed to manage organizations effectively.
Management information systems are regarded to be a subset of the
overall internal controls procedures in a business, which cover the
application of people, documents, technologies, and procedures used by
management accountants to solve business problems such as costing a
product, service or a business-wide strategy. Management information
systems are distinct from regular information systems in that they are
used to analyze other information systems applied in operational activities
in the organization. Academically, the term is commonly used to refer to
the group of information management methods tied to the automation or
support of human decision making, e.g. Decision Support Systems, Expert
systems, and Executive information systems
Overview
Early on, business computers were mostly used for relatively simple
operations such as tracking sales or payroll data, often without much
detail. Over time these applications became more complex and began to
store increasing amounts of information while also interlinking with
previously separate information systems. As more and more data was
stored and linked man began to analyze this information into further
detail, creating entire management reports from the raw, stored data. The
term "MIS" arose to describe these kinds of applications, which were
developed to provide managers with information about sales, inventories,
and other data that would help in managing the enterprise. Today, the
term is used broadly in a number of contexts and includes (but is not
limited to): decision support systems, resource and people management
applications, ERP, SCM, CRM, project management and database retrieval
application.
Any successful MIS must support businesses Five Year Plan or its
equivalent. It must provide for reports based up performance analysis in
areas critical to that plan, with feedback loops that allow for titivation of
every aspect of the business, including recruitment and training regimens.
In effect, MIS must not only indicate how things are going, but why they
are not going as well as planned where that is the case. These reports
would include performance relative to cost centers and projects that drive
helps the top management in goal setting, strategic planning and evolving
the business plans and their implementation.
The MIS plays the role of information generation, communication,
problem identification and helps in the process of decision-making. The
MIS therefore plays a vital role in the management, administration and
operations of an organization.
The MIS is easy to operate and, therefore, the design of the MIS has
such features which make up a user-friendly design.
The MIS concentrates on the developing the information support to
manage critical success factors. It concentrates on the mission
critical applications serving the needs of the top management.
INTELLIGENCE
DESIGN
CHOICE
Intelligence
Raw data collected, processed and examined. Identifies a problem calling
for a decision.
Design
Inventing, developing and analyzing the different decision alternatives
and testing the feasibility implementation. Assess the value of the
decision outcome.
Choice
The MIS achieves this in an efficient manner without repeated use of the
Simon Model again and again. An ideal MIS is supposed to make a
decision for the manager.
The role and objective of DRS is to ensure that the organisation recovers
very fast from natural and human caused disasters and puts back the
information system on track for normal case.
While managing security related issues, one is forced to deal with the
individual by keeping a watch on movement, activities, including the
monitoring of information processing related activities.
Failure
Hardware, Software, Network failures are not uncommon causing
non-availability of the system to the users. Hardware failure is due to poor
upkeep and maintenance. Software failure is due to bad quality, and poor
maintenance, and incorrect, erroneous and incomplete user actions.
System failure is also caused by not providing power backup devices to
control power and frequency variations. Telecommunication networks also
fail due to misuse by system developers, computer operators,
maintenance staff, systems programmer and end users.
Human actions
Information systems are more vulnerable to human actions.
Information systems are used by internal personnel of the organisation as
well as by outside personnel who have been given access to it for limited
Security Controls
The entire SMS works with security controls designed for specific purpose
and introduced at appropriate place. Security controls can be explained by
classifying them in different categories as shown in the following
Table
Each individual user has unique physical traits, which can be used, as
'key' to control access as well as to identify who has accessed, the files
and records. The physical traits are fingerprints, hand geometry, and style
of signature, keyboard usage style, face geometry, voice recognition and
so on.
An individual's biometric profile built in the system using these traits is
processed every time when the user attempts to access the system. When
the user biometric profile is read by the system matches with the stored
biometric profile, access is granted to the user. In the event of a
mismatch, the permission to access is not granted.
6. Testing of Audit Trail
An audit trail is a definition of various steps through which the
transaction is processed. Audit trail is used to trace the flow of execution
of transaction. If the integrity of flow is tested and found correct then
system is reliable in quality assurance.
7. Virus Entry Protection
A virus is a hidden programme that gets entry through network and
forces the system to clone the virus. The virus scan travel from one
computer to another on networks. They are capable of damaging data,
erasing files, or formatting disks and so on. Antivirus software products
are available to prevent the entry of virus. It detects the virus and
destroys it through a process. The antivirus products are available for
standalone PC as well as for network. 'Norton Antivirus' of Symantec,
'Virus Scan' of McAfee are the popular anti virus software products. It is
advisable to use more than one anti virus software, as all of them are not
protective for all viruses.
Firewall
A firewall is placed between private networks such as LAN / WAN and
external network, Internet. The role of firewall is to control access to
internal network sought by the user. The user may be an employee,
visitor, supplier, customer or a person not related to the organisation.
Firewall processes names, Internet Protocol (IP) addresses, applications,
and all incoming requests and confirms the authenticity and validity of the
access by checking against access rules programmed into the system.
The basic advantage of firewall is that it prevents unauthorized
communication controlling the security threat to company's network.
Disaster Management
In spite of all care taken to secure information technology infrastructure,
there is an element of risk due to certain unforeseen circumstance, or
unpredictable and uncontrollable cause damaging information assets of
the organisation. To counter this threat, management resorts to disaster
management plan (DMP). DMP is a plan of action to recover from the
impact on the information systems. They are either collapsed or
dysfunctional. You need a recovery process to start them all over again.
Organizations like bank, airlines, railways, process automated
manufacturing companies, and hospitals have many critical applications,
which are their lifeline. In all such cases, a disaster recovery plan is a
prime necessity. The objective of DMP is not only to start the system
again but start properly from a stage when it is stopped and with all data
integrity maintained after recovery to ensure that quality of output is not
defective due to loss of data, incomplete data, or incorrect data.
DMP specifies the procedure of recovery action when disaster occurs. It
fixes roles and responsibilities on individuals to deal with the crisis
situation.
DMP also provides guidance on how to keep organisation running while
DMP is being acted upon. DMP plan includes measures such as following:
• Firewalls.
• Error detection and correction methods.
• Redundant lines.
• User IDs, Passwords and PINs.
• Access logs.
• Encryption, Decryption of key inputs / outputs.
• Log of system failures.
Threats to Database and DBMS
• Corruption of data
• Theft of data
• Unauthorized access
• Data inconsistency
Controls
• Use of antivirus software.
• Restart and recovery procedure.
• Backup copies.
• Concurrency protection.
• Restricted authority to update, delete.
• Limited, authorised access to Database.
• Dedicated DB administrator.
more decentralized,
more autonomous,
more customized.
Historically, we can identify five basic factors connected with the spread
of information technology. These factors, I believe, must be considered, in
one way or another, in all changes that are brought about by innovations
in information technology. And, as a consequence, they need to be
considered in all decision-making that is connected with the use of
information technology. People,
Most people are familiar with Moore’s Law. Roughly defined, Moore’s Law
states that the price of computing power will be cut in half every 18
months. This increase in computing power per dollar has led to the
One can make the argument, however, that Moore’s Law is just a small
component of the overall exponential increase in computing power that
has been in existence for a long time. That it was only in the 1960s that
the decline in the costs became large enough that anyone took the time
to call this to the attention of others.
There are two reasons to believe that the storage problem will not go
away. For one, people, businesses, and other organizations are collecting
almost every piece of data they can. In the past, information that could
have been saved and stored was not and, as a consequence, it was lost.
People do not want this to happen again. Because people don’t know what
data will be desired in the future, they don’t know what specifically to
save, so they save everything. In addition, some experts argue that chips
should be put in everything. By placing chips in people that are seriously
ill, their condition can be monitored all of the time. Putting chips in
children might reduce kidnappings. But, there are also arguments for
smart kitchens, smart houses, smart
The presence of these first three factors lead naturally into the argument
that people will prefer products that will tend to be “soft” as opposed to
those that are considered to be “hard”. We define “hard” things to be
items like refrigerators, cars, and chairs. The paradigm item for the “soft”
is computer software. But, “soft” products can also be things that are
intangible like ideas, information, relationships, media, and services that
come from abundance, networks, and interaction. In the past, people have
focused on the “hard”. It was important to own things or possess goods
that were physical assets. In the future, people will concentrate more on
what they can have access to, what they can use.
UNIT – II
MANAGERIAL DECISION MAKING
Decision Making Process:
Decision-making is a process which the decision maker uses to arrive at a
decision. The core of this process is described by Herbert Simon in a
model. He describes the model in three phases as shown in the following
Fig (a) Intelligence; (b) Design; and (c) Choice. MIS follow this model in its
development stage.
INTELLIGENC
E
DESIGN
CHOICE
Herbert Simon Model
Intelligence
Raw data collected, processed and examined. Identifies a problem
calling for a decision.
Design
Inventing, developing and analyzing the different decision alternatives
and testing the feasibility implementation. Assess the value of the
decision outcome.
Choice
There are several methods to help the manager decide among the
alternatives. The methods basically are search processes to select the
best alternative upon satisfying certain goals.
There methods for selection of decision alternatives with the goals in view
are: (a) Optimization Techniques; (b) Payoff Analysis; and
(c) Decision Tree Analysis.
columns show the conditions or the states of nature with the probability of
occurrence.