Professional Documents
Culture Documents
Transaction Processing System are information system that processes data resulting
from the occurrences of business transactions
Their objectives are to provide transaction in order to update records and generate
reports i.e. to perform store keeping function
Many different types of report are produced in MIS. Some of the reports are a
summary report, on-demand report, ad-hoc reports and an exception report.
Decision Support System comprises tools and techniques to help in gathering relevant
information and analyzes the options and alternatives, the end user is more involved
in creating DSS than an MIS.
CASE STUDY
PART A:
What security loopholes come to the fore in the situation described? How
can these be plugged?
SystemX used the Net extensively in dealing with its branches, customers and suppliers.
Information like contract documents, marketing plans, cheque and draft numbers, bank
account details and collection details were regularly transmitted by e-mail. These loopholes
come into our mind.
These loopholes can be plugged, if they update their antivirus which is virus signature files
free. Because they use e-mail, and net extensively so they need strong security measure in
order to secure their system.
For the following security loophole the plugged Mr. Utpal need some action like:
PART C:
Security budget is one of the important parts of every business. In this context "Security
Budget" is very important. They need to provide security to their system. If manager
recommends for appointing a new security consultant then it may not be granted because of
budget. Any how they need to provide security.
QUESTION # 03
CASE STUDY
PART 1:
System complexity:
The conveyors network is large and complicated. It involved 21 kilometers of transport
tracks, 6 robotic units and 9,000 storage capacitors all behaving as one system. The system
needs to co-operate between many technological layers both at software and hardware levels,
for instances, conveyor belts, security checkers and scanners and so on.
Social complexity:
The system is needed to support and help out the work of humans, for instances to handle the
baggage automatically.
Business complexity:
The network needs to work in different way to cope with different company’s operation. The
conveyor network must cope with different baggage governance policies.
PART 2:
What are the management, organization, and technology components of
Schiphol’s baggage conveyor network?
What is the problem that Schiphol is trying to solve? Discuss the business
impact of this problem.
From the case study, I found that the most critical problem that Schiphol was facing is the
mishandled baggage problem. Schiphol was trying to increase the efficiency in baggage
handling in the airport. Mishandled baggage was bringing huge impact to the company, it is a
$2.5 billion problem for industry every year and about 51 million passengers traveling
through Schiphol alone may be affected annually. With an investment of around US$1 billion
over a period of about 10 years, the Baggage Control System has been renewed. With the
new system, the manager of Schiphol estimated that this system will be able to minimize
0.01% loss and damage when it operates 99.9% times. Although this system is expensive but
if it is being implemented right, it can save 0.1% of $2.5 billion.
QUESTION # 04
CASE STUDY
PART A:
I am strongly agreed with the faculty member who commented that the University is
burdening itself with too many independent information systems. The integrated information
system is on the lines of an ERP for a business organization is easy to share the data with the
whole organization. This will increase the teamwork spirit and collaboration within the whole
business organization. Besides that, the reason that I support the integrated information
system is the management team is easier to manage the single system. They don’t have to
worry about the update of the independent information systems. Furthermore, the data in the
integrated system is more secure compared to the independent information system. It
provides a more comprehensive approach to security that’s less vulnerable to incidents and
better able to respond if one occurs.
PART B:
➢ Resolve system problems, train and support office staff and system users.
➢ Develop and document systems policies and standards and support system users.
CASE STUDY
PART 1:
There are mainly three kinds of big data collected by the organizations described in this case
which are as under;
➢ First, IBM Big sheets help the British Library to handle with huge quantities of data
and extract the useful knowledge.
➢ Second, State and federal law enforcement agencies are analyzing big data to discover
hidden patterns in criminal activity. The Real Time Crime Center data warehouse
contains millions of data points on city crime and criminals.
Following are the list of business intelligence technologies which are as under;
➢ IBM Big sheets is an insight engine that helps extract, annotate, and visually analyze
vast amounts of unstructured Web data, delivering the results via a Web browser.
➢ State and federal law enforcement agencies are analyzing big data to discover hidden
patterns in criminal activity such as correlations between time, opportunity, and
organizations, or non-obvious relationships between individuals and criminal
organizations that would be difficult to uncover in smaller data sets.
➢ The Real Time Crime Center data warehouse contains millions of data points on city
crime and criminals.
➢ Vestas relies on location-based data to determine the best spots to install their
turbines.
➢ It implemented a solution consisting of IBM Info Sphere Big Insights software
running on a high-performance IBM System x iDataPlex server.
PART 3:
Why did the companies described in this case need to maintain and analyze
big data? What business benefits did they obtain?
➢ Competitive advantages.
➢ Performance Enhancement.
➢ Increase customer satisfaction.
➢ Attract more customers and generate more revenue.
➢ Improved decision making (faster & accurate).
➢ Excellence operational.
➢ Reduce cost and time spent.
PART 4:
Following are the five moral dimensions of the information age which are as under;
➢ System quality
➢ Quality of life
REFRENCES:
https://www.geeksforgeeks.org/types-of-information-system/
https://www.answers.com/Q/What_security_loopholes_come_to_the_fore_in_the_situation_descri
bed.how_can_these_be_plugged
http://itclasswithvicky.blogspot.com/2018/01/case-study-2-schipholinternational-hub.html
https://healthymealweb.wordpress.com/2016/07/28/caselet-too-many-information-systems/
https://www.bartleby.com/essay/Big-Data-Big-Reward-PK45P4KVJ
https://www.slideshare.net/niz73/case-31-big-data-big-rewards
https://www.coursehero.com/file/p55n5qf/Which-of-the-five-moral-dimensions-of-the-
information-age-do-the-central/