You are on page 1of 15

QUESTION # 01

Describe all the types of Information Systems


Following are the types of Information Systems which are as under;

➢ Transaction Processing System (TPS):

Transaction Processing System are information system that processes data resulting
from the occurrences of business transactions

Their objectives are to provide transaction in order to update records and generate
reports i.e. to perform store keeping function

The transaction is performed in two ways: Batching processing and Online


transaction processing.

Example: Bill system, payroll system, Stock control system.

➢ Management Information System (MIS):

Management Information System is designed to take relatively raw data available


through a Transaction Processing System and convert them into a summarized and
aggregated form for the manager, usually in a report format. It reports tending to be
used by middle management and operational supervisors.

Many different types of report are produced in MIS. Some of the reports are a
summary report, on-demand report, ad-hoc reports and an exception report.

Example: Sales management systems, Human resource management system.

➢ Decision Support System (DSS):

Decision Support System is an interactive information system that provides


information, models and data manipulation tools to help in making the decision in a
semi-structured and unstructured situation.

Decision Support System comprises tools and techniques to help in gathering relevant
information and analyzes the options and alternatives, the end user is more involved
in creating DSS than an MIS.

Example: Financial planning systems, Bank loan management systems.


➢ Experts System:

Experts systems include expertise in order to aid managers in diagnosing problems or


in problem-solving. These systems are based on the principles of artificial intelligence
research.
Experts Systems is a knowledge-based information system. It uses its knowledge
about specify are to act as an expert consultant to users.
Knowledgebase and software modules are the components of an expert system. These
modules perform inference on the knowledge and offer answers to a user’s question.
QUESTION # 02

CASE STUDY

PART A:

“Confidential Information at Stake”


PART B:

What security loopholes come to the fore in the situation described? How
can these be plugged?

SystemX used the Net extensively in dealing with its branches, customers and suppliers.
Information like contract documents, marketing plans, cheque and draft numbers, bank
account details and collection details were regularly transmitted by e-mail. These loopholes
come into our mind.
These loopholes can be plugged, if they update their antivirus which is virus signature files
free. Because they use e-mail, and net extensively so they need strong security measure in
order to secure their system.
For the following security loophole the plugged Mr. Utpal need some action like:

1. License windows operating system use in the all required system.


2. Using fire wale in main server.
3. The action in question can be reduced to operation of access modification and deletion.

PART C:

What is the importance of a “security budget” in the context of the given


situation?

Security budget is one of the important parts of every business. In this context "Security
Budget" is very important. They need to provide security to their system. If manager
recommends for appointing a new security consultant then it may not be granted because of
budget. Any how they need to provide security.
QUESTION # 03

CASE STUDY

PART 1:

How many levels of complexity can you identify in Schiphol’s baggage


conveyor network?

From the case study, there are 3 layers of complexity:

System complexity:
The conveyors network is large and complicated. It involved 21 kilometers of transport
tracks, 6 robotic units and 9,000 storage capacitors all behaving as one system. The system
needs to co-operate between many technological layers both at software and hardware levels,
for instances, conveyor belts, security checkers and scanners and so on.

Social complexity:
The system is needed to support and help out the work of humans, for instances to handle the
baggage automatically.
Business complexity:
The network needs to work in different way to cope with different company’s operation. The
conveyor network must cope with different baggage governance policies.
PART 2:
What are the management, organization, and technology components of
Schiphol’s baggage conveyor network?

Management of Schiphol’s Baggage Conveyor Network:


In terms of management, there are few elements to talk about. Setting the right goal is one of
the important elements to ensure the business is on the right track and being managed well.
The conveyors networks have a very simple goal, which is the right bag must be at the right
place at the right time.
To run the network smoothly, human resources are playing an important role. In every
department or section, there must be allocating a person in charge to control, manage and
handle the baggage just in case if there are any emergencies.

Organization of Schiphol’s Baggage Conveyor Network:


Just like the other organizations, Schiphol’s is made up of many different departments and
they work together to make sure the business run smoothly. For instances, the information
technology department to look over the network and system to make sure it is updated and
running smoothly to avoid mistake while the human resources department ensure the people
working with the company is happy and working efficiently to reduce mistake and increase
productivity. The rest of the departments such as the finance department and marketing &
sales department are also working together to ensure the business is on the right track and
profitable

Technology of Schiphol’s Baggage Conveyor Network:


The networks involve variety of sensors, mechanical devices, actuators and computers. It also
uses over 3 million lines of source code. As for the baggage-handling systems, it includes
destination-coded vehicles (DCVs), automatic bar code scanners, radio-frequency
identification (RFID) tags and high-tech conveyors equipped with sorting machines. All of
these technologies are used for the normal operation which is to move bags from the check-in
area to the departure gate, move bags from gate to gate, move bags from the arrival gate to
the baggage claim and plan and control the peripheral hardware and software.
PART 3:

What is the problem that Schiphol is trying to solve? Discuss the business
impact of this problem.

From the case study, I found that the most critical problem that Schiphol was facing is the
mishandled baggage problem. Schiphol was trying to increase the efficiency in baggage
handling in the airport. Mishandled baggage was bringing huge impact to the company, it is a
$2.5 billion problem for industry every year and about 51 million passengers traveling
through Schiphol alone may be affected annually. With an investment of around US$1 billion
over a period of about 10 years, the Baggage Control System has been renewed. With the
new system, the manager of Schiphol estimated that this system will be able to minimize
0.01% loss and damage when it operates 99.9% times. Although this system is expensive but
if it is being implemented right, it can save 0.1% of $2.5 billion.
QUESTION # 04

CASE STUDY

PART A:

Do you agree with the faculty member? Give reasons.

I am strongly agreed with the faculty member who commented that the University is
burdening itself with too many independent information systems. The integrated information
system is on the lines of an ERP for a business organization is easy to share the data with the
whole organization. This will increase the teamwork spirit and collaboration within the whole
business organization. Besides that, the reason that I support the integrated information
system is the management team is easier to manage the single system. They don’t have to
worry about the update of the independent information systems. Furthermore, the data in the
integrated system is more secure compared to the independent information system. It
provides a more comprehensive approach to security that’s less vulnerable to incidents and
better able to respond if one occurs.

PART B:

What do you understand by Integrated Information System, the faculty


member is talking about? Elaborate in the context of the X University.
The Integrated Information System on the lines of an ERP for a business organization that the
faculty member is talking about is a system that can connect different department. It connects
the finance department, accounting department, library, accommodation, canteen, registration
department and so on. Every department can easily access the same system and get the data.
They no need to go different location to access the independent information system to get the
data.
PART C:
Assess the role of Information System specialists and consultants in
situations as described in the case study.
The Role of Information System Specialists:

➢ Managing the distributed hardware environment.

➢ Resolve system problems, train and support office staff and system users.

➢ Operations of computer systems in data centers.

➢ Develop and document systems policies and standards and support system users.

The Role of Information System Consultants:

➢ Training staff to use the new IT system.

➢ Producing detailed reports on the efficacy of the technology.

➢ Monitoring the success of IT solution.

➢ Analyzing and determining security threats.


QUESTION # 05

CASE STUDY

PART 1:

Describe the kinds of big data collected by the organizations described in


this case.

There are mainly three kinds of big data collected by the organizations described in this case
which are as under;

➢ First, IBM Big sheets help the British Library to handle with huge quantities of data
and extract the useful knowledge.

➢ Second, State and federal law enforcement agencies are analyzing big data to discover
hidden patterns in criminal activity. The Real Time Crime Center data warehouse
contains millions of data points on city crime and criminals.

➢ Third, Vestas implemented a solution consisting of IBM InfoSphere BigInsights


software running on a high-performance IBM System x iDataPlex server.
PART 2:

List and describe the business intelligence technologies described in this


case.

Following are the list of business intelligence technologies which are as under;
➢ IBM Big sheets is an insight engine that helps extract, annotate, and visually analyze
vast amounts of unstructured Web data, delivering the results via a Web browser.
➢ State and federal law enforcement agencies are analyzing big data to discover hidden
patterns in criminal activity such as correlations between time, opportunity, and
organizations, or non-obvious relationships between individuals and criminal
organizations that would be difficult to uncover in smaller data sets.
➢ The Real Time Crime Center data warehouse contains millions of data points on city
crime and criminals.
➢ Vestas relies on location-based data to determine the best spots to install their
turbines.
➢ It implemented a solution consisting of IBM Info Sphere Big Insights software
running on a high-performance IBM System x iDataPlex server.

PART 3:

Why did the companies described in this case need to maintain and analyze
big data? What business benefits did they obtain?

THE BRITISH LIBRARY:


The British Library needed to maintain and analyze big data because traditional data
management methods proved inadequate to archive billions of Web pages and legacy
analytics tools couldn’t extract useful knowledge from such quantities of data.

NEW YORK POLICE DEPARTMENT (NYPD):


New York Police Department (NYPD) needs to maintain and analyze big data because,
➢ Allow the NYPD quickly respond on the criminals occurred.
➢ Help NYPD to obtain sources of the suspects, such as suspect’s photo, past offences
or addresses with maps, can be visualized in seconds on a video wall.
VESTAS:
Vestas need to maintain and analyze big data because,

➢ Vestas is the world’s largest wind energy company.


➢ Location data are important to Vestas so that can accurately place its turbines.
➢ Area with too much wind may damage the turbines.
➢ Therefore, Vestas relies on location-based data to determine the best spots to install
their turbines.
➢ Vestas Wind Library currently stores 2.8 petabytes od data.
HERTZ:
Car rental giant Hertz need to maintain and analyze big data because,

➢ Reducing time spent processing data.


➢ Improving company response time to customer feedback.
➢ Hertz was able to determine that delays were occurring for returns in Philadelphia
during specific time of the day.
➢ Enhanced Hertz’s performance and increased customer satisfaction.
BUSINESS BENEFITS:
The business benefits for maintaining and analyzing big data are as follows:

➢ Competitive advantages.
➢ Performance Enhancement.
➢ Increase customer satisfaction.
➢ Attract more customers and generate more revenue.
➢ Improved decision making (faster & accurate).
➢ Excellence operational.
➢ Reduce cost and time spent.

PART 4:

Identify three decisions that were improved by using big data.

OPTIMAL USES OF RESOURCES AND OPERATIONAL TIME:


By using the big data, the companies can optimal uses of their resources to enhance
performance. Vestas can forecast optimal turbine placement in 15 minutes instead of three
weeks, saving a months of development time for turbine site.

QUICK AND EFFECTIVE DECISION MAKING:


Decision making improves and can be quickly and effective by using big data. Visitor of The
British Library and NYPD can quickly and effective searches data from the British Library
Web sites. NYPD can make a faster decision to gather the suspect’s detail by using The Real
Time Crime Center.

REDUCE OPERATIONAL COST AND OTHER RELATED COST:


Companies quickly makes the right decision and hence will eliminate wrong decision.
Example, Hertz was able quickly adjust staffing levels at its Philadelphia office during those
peak times; ensuring a manager was present to resolve any issues.
QUESTION # 06

List down the five moral dimensions of the information age

Following are the five moral dimensions of the information age which are as under;

➢ Property rights and obligations

➢ System quality

➢ Accountability and control

➢ Quality of life

➢ Information rights and obligations

REFRENCES:
https://www.geeksforgeeks.org/types-of-information-system/

https://www.answers.com/Q/What_security_loopholes_come_to_the_fore_in_the_situation_descri
bed.how_can_these_be_plugged

http://itclasswithvicky.blogspot.com/2018/01/case-study-2-schipholinternational-hub.html

https://healthymealweb.wordpress.com/2016/07/28/caselet-too-many-information-systems/

https://www.bartleby.com/essay/Big-Data-Big-Reward-PK45P4KVJ

https://www.slideshare.net/niz73/case-31-big-data-big-rewards

https://www.coursehero.com/file/p55n5qf/Which-of-the-five-moral-dimensions-of-the-
information-age-do-the-central/

You might also like