You are on page 1of 16

Mariano Marcos State University

COLLEGE OF BUSINESS, ECONOMICS AND ACCOUNTANCY

City of Batac, 2906

In partial fulfillment of the requirement in

BA 41

Submitted by:

Iann Vanjett L. Pasion

Rheavelle P. Adina

Wendelyn C. Bayangos

Mitzi Ann A. Ulit

Karen M. Valenciano

Submitted to:

Ms. Carmela G. Adriatico

Instructor

August 18, 2016


PART I. INFORMATION SYSTEMS IN BUSINESS - DSS & OAS

Reporter 1: Wendelyn C. Bayangos

A. DECISIONS SUPPORT SYSTEM

Decisions support system is a business information system designed to assist in decision making
where the decision process is relatively unstructured and only part of the information needed is
structured in advance. The DSS helps the individual to structure the problem by providing the
needed information. It is differentiated from traditional transaction processing and reporting
systems by its ability to stimulate, via mobiles, the outcomes of different courses of action being
considered by a decision maker. DSS offer significant potential for assisting and improving
management decision making (Nagpal D.P. and Chand S., 2011).

B. DSS DISTINGUISHED FROM MIS

DSS are used to provide support to analysts and decision makers within an organization that are
relevant to a specific problem or situation and make an evaluation of various different outcomes.
They are used by managers and other decision-makers in both unstructured and semi-structured
situations and largely in ad-hoc situations although it may involve repetitive decisions. A DSS is
used in situations where individual managerial judgment is required.

An MIS provides routine information typically on an ongoing basis in a standardized format.


Reports may be run routinely or be provided on demand. While an MIS can be used to solve
standardized and routine problems using specified criteria and the data from an MIS forms the
base pool of information for a DSS, MIS are also used for routine functions such as production
control and monitoring, forecasting, human resources management, financial analysis and
research. Because of the broad nature of the information presented, an MIS might be used by
lower, middle or upper level management.

While an MIS simply gathers data, a DSS manipulates that data and helps to develop tools that
aid in the decision-making process (Management Veristy).

Reporter 2: Rheavelle P. Adina


C. COMPONENTS OF DSS

1. Data Management Component


The data management component performs the function of storing and maintaining the
information that you want your Decision Support System to use. The data management
component, therefore, consists of both the Decision Support System information and the
Decision Support System database management system.

2. Model Management Component


The model management component consists of both the Decision Support System models
and the Decision Support System model management system. A model is a representation of
some event, fact, or situation. As it is not always practical, or wise, to experiment with
reality, people build models and use them for experimentation. Models can take various
forms.

Businesses use models to represent variables and their relationships. For example, you would
use a statistical model called analysis of variance to determine whether newspaper, TV, and
billboard advertizing are equally effective in increasing sales.

Decision Support Systems help in various decision-making situations by utilizing models that
allow you to analyze information in many different ways. The models you use in a Decision
Support System depend on the decision you are making and, consequently, the kind of
analysis you require. For example, you would use what-if analysis to see what effect the
change of one or more variables will have on other variables, or optimization to find the most
profitable solution given operating restrictions and limited resources. Spreadsheet software
such as excel can be used as a Decision Support System for what-if analysis.

The model management system stores and maintains the Decision Support System’s
models. Its function of managing models is similar to that of a database management system.
The model management component can not select the best model for you to use for a
particular problem that requires your expertise but it can help you create and manipulate
models quickly and easily.

3. User Interface Management Component


The user interface management component allows you to communicate with the Decision
Support System. It consists of the user interface management system. This is the component
that allows you to combine your know-how with the storage and processing capabilities of
the computer.The user interface is the part of the system you see through it when enter
information, commands, and models. This is the only component of the system with which
you have direct contract. If you have a Decision Support System with a poorly designed user
interface, if it is too rigid or too cumbersome to use, you simply won’t use it no matter what
its capabilities. The best user interface uses your terminology and methods and is flexible,
consistent, simple, and adaptable.

For an example of the components of a Decision Support System, let’s consider the Decision
Support System that Land’s End has tens of millions of names in its customer database. It
sells a wide range of women’s, men’s, and children’s clothing, as well various household
wares. To match the right customer with the catalog, land’s end has identified 20 different
specialty target markets. Customers in these target markets receive catalogs of merchandise
that they are likely to buy, saving Lands’ End the expense of sending catalogs of all products
to all 20 million customers. To predict customer demand, lands’ end needs to continuously
monitor buying trends. And to meet that demand, lands’ end must accurately forecast sales
levels. To accomplish these goals, it uses a Decision Support System which performs three
tasks:

Data management: The Decision Support System stores customer and product information. In
addition to this organizational information, Lands’ End also needs external information, such
as demographic information and industry and style trend information.

Model management: The Decision Support System has to have models to analyze the
information. The models create new information that decision makers need to plan product
lines and inventory levels. For example, Lands’ End uses a statistical model called regression
analysis to determine trends in customer buying patterns and forecasting models to predict
sales levels.

User interface management: A user interface enables Lands’ End decision makers to access
information and to specify the models they want to use to create the information they need.

4. Knowledge Management Component


The knowledge management component, like that in an expert system, provides
information about the relationship among data that is too complex for a database to represent.
It consists of rules that can constrain possible solution as well as alternative solutions and
methods for evaluating them.

For example, when analyzing the impact of a price reduction, a Decision Support System
should signal if the forecasted volume of activity exceeds the volume that the projected staff
can service. Such signaling requires the Decision Support System to incorporate some rules-
of-thumb about an appropriate ratio of staff to sales volume. Such rules-of-thumb, also
known as heuristics, make up the knowledge base (DSSSystem Blogspot).
Reporter: Karen Valenciano
D. USES OF DSS
DSS can come in handy by evaluating stock held in a facility, or any other type of business asset
that can be moved around or otherwise optimized. This is often one way a business can profit
from "itemizing" its assets with DSS. Decision support technology can also be a tool that
analyzes sales data and makes predictions, or monitors existing patterns. Whether it's big picture
decision support tools, active or passive solutions, or any other kind of DSS tool, planners often
tackle sales numbers using a variety of decision support resources. There are other uses for this
powerful software option - to make good projections on the future for a business, or to get an
overall "bird's eye view" of events that determine company's progress. This can come in handy in
difficult situations where a lot of financial projection may be necessary when determining
expenditures and revenues (Business.com).

E. GROUP DECISION SUPPORT SYSTEM


A Group Decision Support System (GDSS) is an interactive, computer-basedsystem that helps a
team of decision-makers solve problems and make choices.GDSS are targeted to supporting
groups in analyzing problem situations and in performing group decision-making tasks (cf.,
DeSanctis and Gallupe, 1987; Huber, 1984).

According to Techopedia, Group decision support system (GDSS) technology supports project
collaboration through the enhancement of digital communication with various tools and
resources. These types of programs are used to support customized projects requiring group work,
input to a group and various types of meeting protocols. GDSS proponents claim that these sorts
of technologies can advance the promotion of participation, help to streamline group
communications and foster learning. Different vendors have begun to offer group decision
support system products like ThinkTank and MeetingWorks, among others. There is also a move
to develop open-source tools that are often called discussion support systems. GDSS is another
term that can be used in various ways as makers develop ever more versatile and sophisticated
resources for helping to promote group work. Elements of local or distance participation, meeting
scheduling and documentation, and auxiliary support features for brainstorming can all be aspects
of a GDSS design. In the most basic sense, GDSS is related to decision support systems because
both support human decision-making. The difference is that GDSS is specifically engineered to
support a team or other group.

Reporter: Wendelyn Bayangos

F. GROUP DECISION SUPPORT SYSTEM ALTERNATIVES


Ravi stated that there are four alternative and these are:

Decision Room:
Participants at the meeting sit around a large horseshoe desk facing one end of the room.
There are several of these desks tiered in such a way that no one’s view is impaired.

Each participant is equipped with his or her own display monitor and terminal. At the
front of the room, facing the participants, are two large public screens. These screens can
display any information from internal or external databases, ideas generated by the group
or any individual’s monitor screen. A ‘Facilitator’ who sits to the side of the public
screen guides most meetings conducted in this environment.

The facilitator’s role is not to participate in the decision-making but to ensure that the
meeting progresses smoothly according to some agreed procedure. Thus, the facilitator
will have his own personal monitor and terminal: through these he can view and to a
certain extent control other participants’ monitors and the information displayed on them.
Although most communication between participants will be done through their terminals
and monitors, the facilitator may communicate with the whole group verbally. At his
disposal are two large whiteboards on which he can write. These whiteboards are also
huge photocopiers that can record everything written on them and produce hard copy at
the end of the meeting. Telecommunications tend to be of a highly sophisticated kind. For
a major multinational it will allow the company to call up information from databases and
analytical models from around the world. The setting is one of deep pile carpets, soft
lighting and monitors that are sunk into quality mahogany desks.

Surrounding this room will be other smaller rooms called ‘Breakaway Rooms’ which
may be used for smaller face-to-face discussions. These meetings clearly occur at the
same time and at the same place.

Local Decision Network:

This is probably the cheapest and simplest type of GDSS based around a Local Area
Network (LAN). Although participants sit separated from one another physically, the
distances involved are so small that they may be regarded as being in the same place.
Each has his or her own personal workstation. They have access to a wide variety of
information sources, both private and public. There is specialised equipment, such as
optical scanners for document imaging, and specialised software, for example: email and
workflow management programs. The latter allow scanned documents to be sent around a
network.

These documents can be viewed and perhaps altered by those on the network. The
program can let the originator of the document know the stage in the process the
document has reached, and who has dealt with it. Thus participants can easily
communicate with one another and share information or else work privately on their own
personal matters.

Participants in this type of environment usually work closely and regularly with one
another. Group decision making can take place over a protracted period. Unlike the
previous scenario, there is no facilitator to move the action along and to get a decision by
a certain deadline. Thus, a particular issue may be left and returned to intermittently by
an individual; while in between times he deals with other work. This type of decision-
making lends itself, for example: to a head of department who wishes to stimulate
discussion on a certain topic and solicit colleagues’ opinions. On the basis of this
discussion and opinion he may take the final decision himself.

Teleconferencing:

This type of GDSS is for participants who sit geographically separated, perhaps in
different countries, and are unable to meet in the same place but can meet at the same
time: this is achieved by using telecommunications to link together two or more Decision
Rooms. This is because of the large distances between the participants, it is essential that
the telecommunications equipment is highly reliable. In this system there are large cost
savings, due to the avoidance of travel costs and productivity losses from time spent
travelling.

Remote Decision-Making:
Finally, this type of GDSS is very similar to the Local Decision Network, but the
individuals involved in the joint decision-making are geographically dispersed. Again the
telecommunications, whether they be by satellite, microwave or telephonic link, must be
of the highest standard. Unlike teleconferencing, which can take a long time to set up and
is somewhat rigid in its format, remote decision-making has the advantage of flexibility
and is on-going.

Reporter: Rheavelle Adina

G. OFFICE AUTOMATION SYSTEM

Office automation systems (OAS) are configurations of networked computer hardware and
software. A variety of office automation systems are now applied to business and communication
functions that used to be performed manually or in multiple locations of a company, such as
preparing written communications and strategic planning. In addition, functions that once
required coordinating the expertise of outside specialists in typesetting, printing, or electronic
recording can now be integrated into the everyday work of an organization, saving both time and
money (Encyclopedia).

H. APPLICATIONS OF OAS IN BUSINESS

1. Electronic Publishing

Electronic publishing systems include word processing and desktop publishing. Word
processing software, (e.g., Microsoft Word, Corel Word-Perfect) allows users to create, edit,
revise, store, and print documents such as letters, memos, reports, and manuscripts. Desktop
publishing software (e.g., Adobe Pagemaker, Corel VENTURA, and Microsoft Publisher)
enables users to integrate text, images, photographs, and graphics to produce high-quality
printable output. Desktop publishing software is used on a microcomputer with a mouse,
scanner, and printer to create professional-looking publications. These may be newsletters,
brochures, magazines, or books.

2. Electronic Communication

Electronic communication systems include electronic mail (e-mail), voice mail, facsimile
(fax), and desktop videoconferencing.

3. Electronic Collaboration
Electronic collaboration is made possible through electronic meeting and collaborative work
systems and teleconferencing. Electronic meeting and collaborative work systems allow
teams of coworkers to use networks of microcomputers to share information, update
schedules and plans, and cooperate on projects regardless of geographic distance. Special
software called groupware is needed to allow two or more people to edit or otherwise work
on the same files simultaneously.

4. Telecommuting and Collaborative Systems

Telecommuters perform some or all of their work at home instead of traveling to an office
each day, usually with the aid of office automation systems, including those that allow
collaborative work or meetings. A microcomputer, a modem, software that allows the sending
and receiving of work, and an ordinary telephone line are the tools that make this possible.
Telecommuting is gaining in popularity in part due to the continuing increase in population,
which creates traffic congestion, promotes high energy consumption, and causes more air
pollution. Telecommuting can help reduce these problems. Telecommuting can also take
advantage of the skills of homebound people with physical limitations. Studies have found
that telecommuting programs can boost employee morale and productivity among those who
work from home. It is necessary to maintain a collaborative work environment, however,
through the use of technology and general employee management practices, so that neither
on-site employees nor telecommuters find their productivity is compromised by such
arrangements. The technologies used in electronic communication and teleconferencing can
be useful in maintaining a successful telecommuting program.

5. Office Management

Office management systems include electronic office accessories, electronic scheduling, and
task management. These systems provide an electronic means of organizing people, projects,
and data. Business dates, appointments, notes, and client contact information can be created,
edited, stored, and retrieved. Additionally, automatic reminders about crucial dates and
appointments can be programmed. Projects and tasks can be allocated, subdivided, and
planned. All of these actions can either be done individually or for an entire group.
Computerized systems that automate these office functions can dramatically increase
productivity and improve communication within an organization.
Reporter: Mitzi Ulit

PART II. SECURITY, PIRACY & ETHICAL ISSUES IN INFORMATION SYSTEM

A. COMPUTER WASTES

Computer Wastes involves the inappropriate use of computer technology and resources (Josh
Isay). According to the book Fundamental of Information Systems, 5th Ed., these are the examples
of Computer wastes:
• Discarding old software and even complete computer systems when they still have value
• Building and maintaining complex systems that are never used to their fullest extent
• Using corporate time and technology for personal use
• Spam

B. COMPUTER MISTAKES
Computer Mistakes are errors, failures, and other computer problems that make computer output
incorrect or not useful. Computer Mistakes are caused by failure by users to follow proper
procedures, unclear expectations and a lack of feedback, program development that contains
errors, Incorrect data entry by data-entry clerk.

C. PREVENTIVE MEASURES FOR COMPUTER WASTES AND MISTAKES


Preventing waste and mistakes involves: Establishing policies and procedures, implementing
policies and procedures, monitoring policies and procedures, reviewing policies and procedures.

1. Establishing Policies and Procedures


Establish policies and procedures regarding efficient acquisition, use, and disposal of systems
and devices
• Training programs for individuals and workgroups
• Manuals and documents on how computer systems are to be maintained and used
• Approval of certain systems and applications to ensure compatibility and cost-effectiveness.
2. Implementing Policies and Procedures
Policies often focus on:
- Implementation of source data automation and the use of data editing to ensure data
accuracy and completeness
- Assignment of clear responsibility for data accuracy within each information system
• Training
- Key aspect of implementation
-
3. Monitoring Policies and Procedures
• Monitor routine practices and take corrective action if necessary
• Implement internal audits to measure actual results against established goals
4. Reviewing Policies and Procedures
During review, people should ask the following questions:
- Do current policies cover existing practices adequately?
- Does the organization plan any new activities in the future?
- Are contingencies and disasters covered?

Reporter: Vanjett Pasion


D. COMPUTER CRIMES
Computer crime is an act performed by a knowledgeable computer user, sometimes
referred to as a hacker that illegally browses or steals a company's or individual's private
information. In some cases, this person or group of individuals may be malicious and destroy or
otherwise corrupt the computer or data files (Computer Hope).

E. THE COMPUTER AS AN OBJECT OF CRIME


 Crimes fall into several categories such as:
- Illegal access and use
- Data alteration and destruction
- Information and equipment theft
- Computer-related scams
- International computer crime
1. Illegal Access and Use
• Hacker
- Learns about and uses computer systems
• Criminal hacker (cracker)
- Gains unauthorized use or illegal access to computer systems
• Script bunnies
- Automate the job of crackers
• Insider
- Employee who compromises corporate systems
 Virus
- Computer program file capable of attaching to disks or other files and replicating
itself repeatedly
• Worm
- Parasitic computer programs that replicate but do not infect other computer program
files
• Trojan horse
- Disguises itself as a useful application or game and purposefully does something the
user does not expect
-
2. Information and Equipment Theft
 Data and information
- Assets or goods that can also be stolen
• Password sniffer
- Small program hidden in a network or a computer system that records identification
numbers and passwords
3. Computer-Related Scams
To avoid becoming a scam victim:
- Do not agree to anything in a high-pressure meeting or seminar
- Do not judge a company based on appearances
- Avoid any plan that pays commissions simply for recruiting additional distributors
- Do your homework
4. International Computer Crime
• Computer crime is an international issue
• Software industry loses about $11 to $12 billion in revenue to software piracy annually

F. THE COMPUTER AS A TOOL TO COMMIT CRIME


• Social engineering
- Using social skills to get computer users to provide information to access an
information system or its data
• Dumpster diving
- Going through the trash cans of an organization to find confidential information,
including information needed to access an information system
 Cyberterrorism
- Intimidates or coerces a government to advance his or her political or social
objectives by launching computer-based attacks against computers, networks, and the
information stored on them
 Identity Theft
- Imposter obtains key pieces of personal identification information in order to
impersonate someone else
- Consumers can help protect themselves by:
- Regularly checking their credit reports with major credit bureaus
- Following up with creditors if their bills do not arrive on time
- Not revealing any personal information in response to unsolicited e-mail or phone
calls
 Internet Gambling
- Size of the online gambling market is not known
- Estimate is that $10–20 billion is wagered on online poker alone each year
- Revenues generated by Internet gambling
- Represent a major untapped source of income for the state and federal governments
-
G. PREVENTIVE MEASURES FOR COMPUTER CRIMES
According to Norton these are the preventive measures for computer crimes:

1. Keep your computer current with the latest patches and updates.

One of the best ways to keep attackers away from your computer is to apply patches
and other software fixes when they become available. By regularly updating your computer,
you block attackers from being able to take advantage of software flaws (vulnerabilities) that
they could otherwise use to break into your system.

While keeping your computer up-to-date will not protect you from all attacks, it makes it
much more difficult for hackers to gain access to your system, blocks many basic and
automated attacks completely, and might be enough to discourage a less-determined attacker
to look for a more vulnerable computer elsewhere.

More recent versions of Microsoft Windows and other popular software can be configured to
download and apply updates automatically so that you do not have to remember to check for
the latest software. Taking advantage of "auto-update" features in your software is a great
start toward keeping yourself safe online.

2. Make sure your computer is configured properly.

Keep in mind that a newly purchased computer may not have the right level of
security for you. When you are installing your computer at home, pay attention not just to
making your new system function, but also focus on making it work securely.

Configuring popular Internet applications such as your Web browser and email software is
one of the most important areas to focus on. For example, settings in your Web browser such
as Internet Explorer or Firefox will determine what happens when you visit Web sites on the
Internet—the strongest security settings will give you the most control over what happens
online but may also frustrate some people with a large number of questions ("This may not be
safe, are you sure you want do this?") or the inability to do what they want to do.

Choosing the right level of security and privacy depends on the individual using the
computer. Oftentimes security and privacy settings can be properly configured without any
sort of special expertise by simply using the "Help" feature of your software or reading the
vendor's Web site. If you are uncomfortable configuring it yourself consult someone you
know and trust for assistance or contact the vendor directly.

3. Protect your Computer with Security Software


Several types of security software are necessary for basic online security. Security
software essentials include firewall and antivirus programs. A firewall is usually your
computer's first line of defense-it controls who and what can communicate with your
computer online. You could think of a firewall as a sort of "policeman" that watches all the
data attempting to flow in and out of your computer on the Internet, allowing
communications that it knows are safe and blocking "bad" traffic such as attacks from ever
reaching your computer.

The next line of defense many times is your antivirus software, which monitors all online
activities such as email messages and Web browsing and protects an individual from viruses,
worms, Trojan horse and other types malicious programs. More recent versions of antivirus
programs, such as Norton AntiVirus, also protect from spyware and potentially unwanted
programs such as adware. Having security software that gives you control over software you
may not want and protects you from online threats is essential to staying safe on the Internet.
Your antivirus and antispyware software should be configured to update itself, and it should
do so every time you connect to the Internet.

Integrated security suites such as Norton Internet Security combine firewall, antivirus,
antispyware with other features such as antispam and parental controls have become popular
as they offer all the security software needed for online protection in a single package. Many
people find using a security suite an attractive alternative to installing and configuring several
different types of security software as well as keeping them all up-to-date.

H. COMPUTER ETHICS

Ethics deals with placing a “value” on acts according to whether they are “good” or “bad”. Every
society has its rules about whether certain acts are ethical or not. These rules have been
established as a result of consensus in society and are often written into laws.

When computers first began to be used in society at large, the absence of ethical standards about
their use and related issues caused some problems. However, as their use became widespread in
every facet of our lives, discussions in computer ethics resulted in some kind of a consensus.
Today, many of these rules have been formulated as laws, either national or
international. Computer crimes and computer fraud are now common terms. There are laws
against them, and everyone is responsible for knowing what constitutes computer crime and
computer fraud.

The Ten Commandments of computer ethics have been defined by the Computer Ethics
Institute. Here is our interpretation of them:

1) Thou shalt not use a computer to harm other people: If it is unethical to harm people by
making a bomb, for example, it is equally bad to write a program that handles the timing of the
bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books and
notebooks, it is equally bad to access and destroy their files.

2) Thou shalt not interfere with other people's computer work: Computer viruses are small
programs that disrupt other people’s computer work by destroying their files, taking huge
amounts of computer time or memory, or by simply displaying annoying messages. Generating
and consciously spreading computer viruses is unethical.

3) Thou shalt not snoop around in other people's files: Reading other people’s e-mail
messages is as bad as opening and reading their letters: This is invading their privacy. Obtaining
other people’s non-public files should be judged the same way as breaking into their rooms and
stealing their documents. Text documents on the Internet may be protected by encryption.

4) Thou shalt not use a computer to steal: Using a computer to break into the accounts of a
company or a bank and transferring money should be judged the same way as robbery. It is illegal
and there are strict laws against it.

5) Thou shalt not use a computer to bear false witness: The Internet can spread untruth as fast
as it can spread truth. Putting out false "information" to the world is bad. For instance, spreading
false rumors about a person or false propaganda about historical events is wrong.

6) Thou shalt not use or copy software for which you have not paid: Software is an
intellectual product. In that way, it is like a book: Obtaining illegal copies of copyrighted
software is as bad as photocopying a copyrighted book. There are laws against both. Information
about the copyright owner can be embedded by a process called watermarking into pictures in
the digital format.

7) Thou shalt not use other people's computer resources without authorization: Multiuser
systems use user id’s and passwords to enforce their memory and time allocations, and to
safeguard information. You should not try to bypass this authorization system. Hacking a system
to break and bypass the authorization is unethical.

8) Thou shalt not appropriate other people's intellectual output: For example, the programs
you write for the projects assigned in this course are your own intellectual output. Copying
somebody else’s program without proper authorization is software piracy and is
unethical. Intellectual property is a form of ownership, and may be protected by copyright laws.

9) Thou shalt think about the social consequences of the program you write: You have to
think about computer issues in a more general social framework: Can the program you write be
used in a way that is harmful to society? For example, if you are working for an animation house,
and are producing animated films for children, you are responsible for their contents. Do the
animations include scenes that can be harmful to children? In the United States,
the Communications Decency Act was an attempt by lawmakers to ban certain types of content
from Internet websites to protect young children from harmful material. That law was struck
down because it violated the free speech principles in that country's constitution. The discussion,
of course, is going on.

10) Thou shalt use a computer in ways that show consideration and respect: Just like public
buses or banks, people using computer communications systems may find themselves in
situations where there is some form of queuing and you have to wait for your turn and generally
be nice to other people in the environment. The fact that you cannot see the people you are
interacting with does not mean that you can be rude to them.

Works Cited

Prezi(2016) Computer waste and mistakes. Retrived at:


https://prezi.com/fp4ermfjgslj/computer-waste-and-mistakes/

Campbell, D.J. & Craig, T. (2005) Organisations & the Business Environment Retrived at:
http://dsssystem.blogspot.com/2010/01/components-of-decision-support-systems.html

Norton (2016) Decision support system. Retrived at:


http://www.business.com/business-intelligence/decision-support-systems-dss-
applications-and-uses/

Computer Hope(2016) Cyber Crime. Retrived at:


http://www.computerhope.com/jargon/c/compcrim.htm

https://www.techopedia.com/definition/27843/group-decision-support-system-gdss

https://www.reference.com/technology/difference-between-dss-mis-10ab10889dfdf245#

http://us.norton.com/cybercrime-prevention

http://www.encyclopedia.com/doc/1G2-3401200109.html
http://www.ravi.kahlon.co/2013/02/group-decision-support-systems-gdss.html

You might also like