Professional Documents
Culture Documents
Managment Information System
Managment Information System
The subject of management information system (MIS) has different meaning for different
people. The concept of MIS has evolved over a period of last two decades or so. The initial
management information systems were built to process transactional data of an organization and
to produce regular reports. The reports were not targeted and individuals picked the required data
from the report.
The information systems evolved further and produced different reports according to
requirements. Instead of user looking through the report for required data, the system generated a
report in a suitable format that created an impact on its user and provoked an action, a decision
or an investigation. Today, an information system has evolved to the stage where they handle
databases and facilitate decision-making.
Accordingly, definition of MIS has also evolved. There are many closely related definitions in
use. The terms MIS is synonymously used with terms the Information System (IS), the
Information and Decision System and the Computer based Information System.
MIS is defined as an integrated system of man and machine for providing the
information to support the operations, the management, and the decision-making
functions in organizations.
An MIS deals with information that is systematically and routinely collected in accordance
with a well-defined set of rules. In other words, data collection is a planned activity for which
resources are allocated and rules are defined.
1
The information provided by an MIS assists managers in planning, organizing, staffing,
coordinating, directing and controlling the operations of an organization. The management
experts have viewed these steps as Management Control system.
In any organization that has planned activities leading to the achievement of the stated goals,
there is always a control process in place that measures progress towards these goals and enables
the manager to deduct the deviations from the original plan in time. It is the responsibility of the
management to take corrective actions before it is too late. The deviations may be due to
environmental changes or due to the mistakes made by people. An MIS is concerned with
planning and control. An MIS has large amount of data as its integral part that is stored and
managed by a data base management system.
1. It must be capable of handling voluminous data. The data as well as transactions must be
validated.
2. It must be able to perform operations on the data irrespective of the complexity of the
operations. Often time multi-dimensional analysis is required. As MIS can’t be developed
without making use of the various theories, principles, formulae, So MIS is viewed as
Multi-Disciplinary Subject.
3. An MIS should facilitate quick search and retrieval of information. An MIS must support
mass storage of data and information.
MIS must be "useable." The five elements of a useable MIS system are: timeliness,
accuracy, consistency, completeness, and relevance. The usefulness of MIS is hindered
whenever one or more of these elements are compromised.
2
Timeliness
Accuracy
A sound system of automated and manual internal controls must exist throughout all
information systems processing activities. Information should receive appropriate editing,
balancing, and internal control checks. A comprehensive internal and external audit program
should be employed to ensure the adequacy of internal controls.
Consistency
Completeness
Decision makers need complete and pertinent information in a summarized form. Reports
should be designed to eliminate clutter and voluminous detail, thereby avoiding "information
overload."
Relevance
3
Information adds to relevant Knowledge, reduces uncertainty, and supports the decision making
process in an organization. However, to be useful information must have the above mentioned
attributes.
The two approaches to defining the subsystems of MIS are according to the organizational
functions which they support and according to the managerial activities for which they are used.
Because organizational functions are somewhat separable in terms of activities and are
defined managerially as separate responsibilities, MIS may be viewed as a federation of
information system-one for each major organizational function. There may be common support
systems used by more than one subsystem, but each functional system is unique in its
procedures, programs, models, etc.
Marketing information Sales forecasting, sales planning, customer and sales analysis
4
B). Organizational Activities Subsystem
Management Control is the process by which managers assure that the resources are
obtained and used effectively and efficiently to attain the objectives of the organization.
Operational Control is the process of assuming that specific tasks are carried out
effectively and efficiently.
The activities subsystems are useful for various functional subsystems. The relationship
of activities subsystems to functional subsystems is illustrated in the following table 1.2.
5
Production • Machine settings • Rearrange work area • New factory
Some examples of Inputs, process and outputs of MIS at all levels of management
6
Rearranging
Calculating
A TPS is used primarily for record keeping which is required in any organization to conduct the
business. Examples of TPS are sales order entry, payroll, and shipping records etc. TPS is used
for periodic report generation in a scheduled manner. TPS is also used for producing reports on
demand as well as exception reports.
DSS serves the management of an organization. A decision support system has sophisticated data
analysis tools, which support and assist all aspects of problem specific decision-making. DSS
may use data from external sources such as current stock prices to enhance decision-making.
DSS is used when the problem is complex and the information needed to make the best decision
is difficult to obtain and use. DSS is developed with the help of decision makers. DSS helps in
decision-making process and does not make any decision.
An Executive Information System is also called Executive Support System. Senior managers of
an organization use the EIS. Therefore, it must be easy to use so that executives can use it
without any assistance. EIS can do trend analysis, exception reporting and have drill down
capabilities. The results are usually presented in a graphical form tailored to executive’s
information needs. EIS has on-line analysis tools and they access a broad range of internal and
external data.
7
MIS provides the management routine summary of basic operations of the organization. The
basic operations are recorded by the TPS of the organization and MIS consolidates the data on
sales, production etc. MIS provides routine information to managers and decision makers. The
main objective behind installing an MIS in the organization is to increase operational efficiency.
MIS may support marketing, production, finance etc.
A workflow system is a rule based management system that directs, coordinates, and monitors
execution of an interrelated set of tasks arranged to form a business process. A workflow system
is also known as a document image management system. For example, a workflow system is
used by banks for loan sanction process. An applicant fills out an electronic application form for
a bank loan at a bank’s web site. The application is then upload to the bank loan officer’s site.
The loan officer conducts an interview and fills in his feedback and passes the application form
to the credit check unit. The credit unit checks the credit limit and fills in the details. The
application is now complete and a final decision is made.
There are three types of workflow software. Administrative workflow systems focus on the
tracking of expense reports, travel requests, massages. An Ad-hoc workflow system deals with
the shaping of product, sales proposals, and strategic plans. Production workflow systems are
concerned with mortgage loans and insurance claims. A workflow system may be Internet based
and may be combined with e-mail. A workflow system may be based on client/server
architecture that may use a database/file server.
ERP system is a set of integrated programs capable of managing a company’s vital business
operations for an entire multi-site, global organization.
7. Expert Systems
The system has the ability to make suggestions and act like an expert in a particular field. An
expert system has an extensive knowledge base.
8
As far as history of computing is concerned, people tried to invent a computing machine as early
as 800 BC. Abacus is one of the oldest computing devices that are still in use. Every child in
China learns to use abacus in school. Our ancestors had built various other mechanical machines
using gears. All these efforts laid foundation for better computing machines. The diode tubes,
transistors, integrated circuits (ICs) and now very large integrated circuits (VLSI) are the electro-
mechanical devices that have been invented over a period of time.
The technology has improved since World War II many folds. The improved technology has
been the key factor in making better computing devices. Along with improvement in computing
technology, the communication technology has also improved in parallel. The software also
improved and became user friendly. The spreadsheets, the word processing packages, database
packages, simulation software packages, and decision support systems made IT popular among
managers as well. The terms Information Systems (IS) and Information Technology (IT) are used
synonymously. IS has evolved considerably since 1960.
1. Data Processing (DP) during the first half the twentieth century
MIS come to play a much larger role in the organizational life, as compared to the
1950’s. It has moved into managerial control and further into influencing the
“core” institutional activities.
9
Facilitates communication
Increases productivity among managers and office workers through the use of
electronic devices.
Limitation of ES: It doesn’t improve its intelligence over time. One way to
overcome this limitation is to use neural networks, electronic and mathematical
analogs of the human brain.
Information Technology (IT) has become a strategic necessity. Unless we believe in IT and act
on it, there is every chance of becoming a footnote in the records of history. IT has become a
vital component of successful businesses and organizations. Managers are expected to identify
opportunities to implement information systems to improve the business processes. Managers are
also required to lead IS projects in IT. Information Technology has become a major facilitator of
business activities. It is also a catalyst of fundamental changes in the structure, operations and
management of organizations.
10
1. Perform high-speed, high-volume, numeric computations.
3. Store huge amounts of data in an easy-to-access yet small space and allow quick and easy
access.
IT has been used for improving productivity, reducing cost, enhancing decision making process,
enhancing customer relationships, and developing new strategic applications. The business
paradigm has completely shifted from being sellers market to buyers market.
Customers have become the focal point of any business. The business environment is no more as
stable as it used to be and has become much more competitive. It became mandatory on the part
of the organizations to make full use of IT to survive. IT has become one of the standard
components of an organization.
The individuals are supported by IT to fulfill their roles. The management and the business
processes have become IT oriented. Organization structure and strategy are also supported by IT.
Whenever an external or internal pressure is felt by an organization, IT helps the organization to
plan critical response activities. The changed government policy may create a pressure on an
organization. But such a pressure is distributed over a long period as government gives enough
time to organizations to respond to changed policies. But if there is a change in the behavior of
consumers, the organization should be able to identify the change. Moreover, they should be able
to come up with a solution fast. IT helps an organization to anticipate and stay ahead of
problems. The organization can take proactive measures rather than firefighting measures.
An organization can use an IT supported strategic system to increase their market share. IT can
help an organization negotiate better with their suppliers. Maintaining and improving quality of
products and processes in an organization needs regular support, vigilance, and innovation. IT
has been used extensively for productivity improvement, reducing inventory and maintaining
quality. Management Information System (MIS) and decision support system (DSS) have been
used to help management in decision-making process.
11
Business process reengineering (BPR) has become the need to the day for every business; BPR
involves changing business processes in an innovative way. IT plays a major role in BPR.
Internet and Intranet help an organization in changing its business processes to reduce cycle time
and time to market a product. IT makes information available to employees with different level
of access. As a result, employees can be given more independence to make decisions. The ERP,
a strategic tool, heavily uses IT to integrate business processes of an organization.
Although information systems of some form or another have been around since the beginning of
time, information technology (IT) is a relative newcomer to the scene. The facilities provided by
such technology have had a major impact on individuals, organizations and society. There are
few companies that can afford the luxury of ignoring IT and few individuals who would prefer to
be without it . . . despite its occasional frustrations and the fears it sometimes raises.
An organization may regard IT as a ‘necessary evil’, something that is needed in order to stay in
business, while others may see it as a major source of strategic opportunity, seeking proactively
to identify how IT-based information systems can help them gain a competitive edge. Regardless
of the attitude taken, once an organization embarks on an investment of this kind there is little
opportunity for turning back.
As IT has become more powerful and relatively cheaper, its use has spread throughout
organizations at a rapid rate. Different levels in the management hierarchy are now using IT
where once its sole domain was at the operational level.
The aim now is not only to improve efficiency but also to improve business effectiveness and to
manage organizations more strategically.
As the managerial tasks become more complex, so the nature of the required information
systems (IS) changes – from structured, reutilized support to ad hoc, unstructured, complex
enquiries at the highest levels of management.
IT, however, not only has the potential to change the way an organization works but also the
very nature of its business. Through the use of IT to support the introduction of electronic
12
markets, buying and selling can be carried out in a fraction of the time, disrupting the
conventional marketing and distribution channels (Malone et al., 1989; Holland, 1998).
Electronic data interchange (EDI) not only speeds up transactions but allows subscribers to be
confident in the accuracy of information being received from suppliers/buyers and to reap the
benefits of cost reductions through automated reordering processes.
On a more strategic level, information may be passed from an organization to its suppliers or
customers in order to gain or provide a better service (Cash, 1985). Providing a better service to
its customers than its competitors may provide the differentiation required to stay ahead of the
competition in the short term. Continual improvements to the service may enable the
organization to gain a longer-term advantage and remain ahead.
The rapid change in IT causes an already uncertain business environment to be even more
unpredictable. Organizations’ ability to identify the relevant information needed to make
important decisions is crucial, since the access to data used to generate information for decision
making is no longer restricted by the manual systems of the organization.
IT can record, synthesize, analyze and disseminate information quicker than at any other time in
history. Data can be collected from different parts of the company and its external environment
and brought together to provide relevant, timely, concise and precise information at all levels of
the organization to help it become more efficient, effective and competitive.
Information can now be delivered to the right people at the right time, thus enabling well
informed decisions to be made. Previously, due to the limited information-gathering capability of
organizations, decision makers could rarely rely on up-to-date information but instead made
important decisions based on past results and their own experience.
This no longer needs to be the case. With the right technology in place to collect the necessary
data automatically, up-to-date information can be accessed whenever the need arises. This is the
information quality of IT about which Zuboff (1988) writes so eloquently.
With the use of IT, as with most things, comes the possibility of abuse. Data integrity and
security is of prime importance to ensure validity and privacy of the information being
13
held. Managing the information involves identifying what should be kept, how it should
be organized, where it should be held and who should have access to it.
The quality of this management will dictate the quality of the decisions being taken and
ultimately the organization’s survival. With the growth in the usage of IT to support
information provision within organizations, the political nature of information has come
into sharper focus. Gatekeepers of information are powerful people; they can decide
when and if to convey vital information, and to whom. They are likely to be either highly
respected, or despised for the power that they have at their fingertips.
Such gatekeepers have traditionally been middle managers in organizations. Their role
has been to facilitate the flow of information between higher and lower levels of
management. With the introduction of IT such information can now be readily accessed
by those who need it (if the right IT infrastructure is in place) at any time.
It is not surprising then that there is resistance to the introduction of IT when it has the
potential of changing the balance of power within organizations. Unless the loss in power,
through the freeing up of information, is substituted by something of equal or more value to
the individuals concerned then IT implementations may well be subject to considerable
obstruction.
Developments in IT have caused revolutionary changes not only for individual organizations but
for society in general. In order to understand the situation we now find ourselves in with respect
to IT, it is as well to reflect on their developments.
Information Technology means the collection, storage, processing, dissemination, and use of
Information. IT is not confined to hardware and software but acknowledges the importance of
man and the goals he sets for his technology, the values employed in making these choices, the
assessment criteria used to decide whether he is controlling the technology and is being enriched
by it.
14
The above definition clearly states that IT is an important tool, which must be used properly. At
one time, 60% people used to work in agriculture. Nowadays, in a developed country, about 10%
people work in agriculture and 40% people work in information related fields.
In a developed country such as US, 50% households have computers and Internet connection. In
India, only about 8 people out of every 1000 have access to computers. Ethiopia is presently
showing progress in usage of IT.
Both Information and the myriad of information systems it supports have created interesting,
challenging, and lucrative career opportunities for millions of men and women all over the globe.
For example: 55% of US labor force consists of knowledge and information workers and 60%
the gross domestic product comes from the Knowledge and information sectors. Present days,
the major source of wealth and prosperity is the production and distribution of information and
knowledge. Firms increasingly rely on digital technology to enable business processes.
Employment opportunities in the information systems field are strong with more new and
existing jobs emerging each day as organizations continue to expand their wide-scale use of
information technology.
In addition, these new jobs pose constant human resource management challenges to all
organizations since there are frequent shortages of qualified information systems personnel.
The constantly changing job requirements in information systems due to the dynamic
developments in business and information technologies will ensure that the long term job
outlook in IT remains both positive and exciting.
One major recruiter is the IT industry itself. Thousands of companies develop, manufacture,
market, and service computer hardware, software, data, and network products and services, or
provide e-business and commerce applications and services, end user training, or business
systems consulting.
However, the biggest need for qualified people comes from the millions of businesses,
government agencies, and other organizations that use information technology. They need many
types of IS professionals such as systems analysts, software developers, and network managers
15
to help them plan, develop, implement, and manage today's internet-based and web-enabled
business/IT applications.
CHAPTER 2
FOUNDATIONAL CONCEPTS IN MANAGEMENT
INFORMATION SYSTEM
Contents
Introduction
Objectives
Business and Management Functions
Data, Information, Knowledge and Wisdom
The Information Needs and Sources
System Concept
A Framework for Information Systems
E-Business
Summary
Review Questions
2.1. Objectives
After reading this unit, you should be able to:
Define data, information and knowledge;
Explain organizational information needs and sources;
Explain the characteristics and importance of system concept and E-Business; and
Explain the framework for understanding MIS.
2.2. Introduction
16
Management has been defined in a verity of ways, but for our purposes it comprises the
processes and activities that describe what managers do in the operation of their organization;
plan, organize, initiate, and control operations. Because decision making is such a fundamental
prerequisite to each of the foregoing processes, the role of MIS becomes that of facilitating
decisions necessary for planning, organizing, and controlling the work and functions of the
business. From the manager’s point of view, information serves the purpose of reducing
uncertainty regarding the alternative course of action, in the process of decision making.
Availability of information regarding the alternatives improves the odds in favor of making a
correct decision. Information is recognized as one of the most important corporate resources.
Activity B
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
Business Areas
Managers are found in various business areas of the firm. The three traditional business areas are
marketing, manufacturing, and finance in addition to other two areas that have gained major
importance-human resources and information services.
17
Figure-2.1: Management Functions
Data – raw facts about people, places, events, and things that are of importance in an
organization.
Information – data that has been processed or reorganized into a more meaningful form for
someone.
Knowledge – data and information that is further refined based on the facts, truths, beliefs,
judgments, experiences, and expertise of the recipient.
Wisdom-good sense: the ability to make sensible decisions and judgments based on
personal knowledge and experience.
Activity A
What would you suggest the difference between data and information?
………………………………………………………………………………………………
………………………………………………………………………………………………
18
2.5. The Information Needs and Sources
MIS starts from an appraisal of management needs and overall business objectives.
Who are the information users?
• Managers
From the managers’ point of view, information serves the purpose of reducing uncertainty
regarding the alternative course of action, in the process of decision making. Information is
recognized as one of the most important corporate resources. The idea of using the computer as a
management information system was a breakthrough because it recognized managers’ need for
problem solving information. Embracing the MIS concept made several firms develop
applications specifically aimed at management support.
• Non-managers
Non-manages and staff specialists also use the MIS output.
• Persons & organizations in the firm’s environment
Information generated by an organization can be valuable to many different people. Users
outside the company benefit from the MIS as well. They can be customers receiving invoices,
stockholders getting dividend checks, and the federal government checking tax reports.
19
Public records and statistics, historical documents and other sources of published
information.
In modern days, Internet is used as a base for information retrieval. One can have access to any
kind of information amounting to any quantity through Internet.
Simply put, a system is an organized collection of parts (or subsystems) that are highly integrated
to accomplish an overall goal. The system has various inputs, which go through certain processes
to produce certain outputs, which together, accomplish the overall desired goal for the system.
So a system is usually made up of many smaller systems, or subsystems. For example, an
organization is made up of many administrative and management functions, products, services,
groups and individuals. If one part of the system is changed, the nature of the overall system is
often changed, as well -- by definition then, the system is systemic, meaning relating to, or
affecting, the entire system. (This is not to be confused with systematic, which can mean merely
that something is methodological. Thus, methodological thinking -- systematic thinking -- does
not necessarily mean systems thinking.)
Systems range from simple to complex. There are numerous types of systems. For example,
there are biological systems (for example, the heart), mechanical systems (for example, a
thermostat), human/mechanical systems (for example, riding a bicycle), ecological systems (for
example, predator/prey) and social systems (for example, groups, supply and demand and also
friendship). Complex systems, such as social systems, are comprised of numerous subsystems, as
well. These subsystems are arranged in hierarchies, and integrated to accomplish the overall goal
of the overall system. Each subsystem has its own boundaries of sorts, and includes various
inputs, processes, outputs and outcomes geared to accomplish an overall goal for the subsystem.
Complex systems usually interact with their environments and are, thus, open systems.
A high-functioning system continually exchanges feedback among its various parts to ensure that
they remain closely aligned and focused on achieving the goal of the system. If any of the parts
20
or activities in the system seems weakened or misaligned, the system makes necessary
adjustments to more effectively achieve its goals.
A pile of sand is not a system. If you remove a sand particle, you have still got a pile of sand.
However, a functioning car is a system. Remove the carburetor and you no longer have a
working car.
Not all systems have the same combination of elements, but a basic configuration is illustrated in
the figure.2.2. below:
Input resources are transformed into output resources. The resources flow from the input
element, through the transformation element, and to the output element. A control mechanism
monitors the transformation process to ensure that the system meets its objectives. The control
mechanism is connected to the resource flow by means of a feedback loop, which obtains
information from the system output and makes it available to the control mechanism. The control
mechanism compares the feedback signals to the objectives and directs signals to the input
element when it is necessary to change the system operation.
21
What is a subsystem?
A subsystem is simply a system within a system. This means that systems exist on more than
one level and can be composed of subsystems or elemental parts.
What is interface?
An interface is a connection at system or subsystems boundaries. Example two typical business
systems that interface with each other are inventory control and purchasing.
Physical system: The business firm is a physical system, composed of physical resources
Conceptual system: It’s a system that uses conceptual resources-information and data-
to represent a physical system.
Example: The Computer is a physical system, but the data and information stored in it
– reduces complexity
– requires good objectives
– emphasizes working together
– acknowledges interconnections
– values feedback
Activity B
……………………………………………………………………………………………… 22
………………………………………………………………………………………………
2.7. A Framework for Information Systems
There is too much data and information in an organization. In order to design a MIS successfully,
we need a framework to structure the information so that the data and information relevant for
decision-making can be separated from rest of the data. For the successful designing of MIS in
business, we should understand well about the type of information required by managers of the
business.
Management can also be seen as structured into three hierarchical levels namely, top level,
middle level and bottom level or strategic, tactical and operational levels, respectively. Although
lines of demarcation are not absolute and clear-cut, one can usually distinguish certain layers
within the organization, which are characterized by, the classical pyramidical type of structures
as shown in Figure 2.1
23
Management Levels
Strategic Planning Level
The strategic planning level involves mangers at the top of the organizational hierarchy. The
term strategic indicates the long-term impact of top managers’ decisions on the entire
organization. The term executive is often used to describe a manager on the strategic planning
level.
When designing information systems, it is important to consider the manager’s level. Such levels
can influence both the source of information and how it is presented. Managers on the strategic
level place greater emphasis on environmental information than do managers on the lower levels.
Managers on the operational control level regard internal information as vital. In addition,
strategic planning-level managers prefer information in a summary format, whereas operational
control-level managers prefer detail.
2.8. E-Business
What is E-Business?
Electronic business, or e-business, means using the Internet and the web to perform business
processes. Although the terms e-business and e-commerce are used interchangeably, e-
commerce refers to selling online, while e-business encompasses all business transactions—
marketing, accounting, operations, procurement and supply management. E-business is about
using web technology to enhance your business practices. E-business is not a new concept.
24
Banks have been using electronic fund transfers to move money around the world for decades.
Large businesses have used electronic data interchange to place orders and send invoices since
the 1960s. What is new is the current accessibility of e-business to small businesses due to
reduced costs and simpler set-up.
25
Also, you can use e-business to compete on electronic procurement tenders. Many
government tenders are now posted on web sites so businesses can access these
opportunities electronically.
5. Improve your customer service
Many people prefer to research product information, download software updates, pay bills
and check warranty information online—all examples of enhanced customer service. You
can use your web site to gather customer feedback that helps you tailor your products and
services to your customers’ needs.
26
Consider creating a web site for your business. Web sites range from very simple online
brochures to very complex electronic storefronts or marketplaces. You can use a web site
to:
a. Promote your products or services
b. Sell products directly to your customers
c. Generate greater awareness of your business
d. Distribute business information to customers and company stakeholders
e. Gather client information and feedback
27
3. E-Commerce
Once you market your products and services online, the next step is to buy and sell online
either business to business (B2B) or business to consumer (B2C).
B2B e-commerce can be approached from a sell-side or a buy-side perspective. There are
companies that set up web sites to sell products (sell-side). Conversely, some cities,
governments and large companies set up sites to post tender online (buy-side). Either way,
it is easy to compare prices, set up delivery schedules, purchase products and track
information. Some B2B sites also include auction, collaboration and project management
capabilities. Virtually all goods and services can be sold online.
28
books, music, collectibles, clothe and consumer electronics online. They also sell financial
products, airline tickets, health information, digital goods and real estate.
E-business has the potential to increase the scope and profits of your business. Used
effectively, you and your staff will be more productive as you serve greater numbers of
customers in a wider marketplace at lower costs. At the same time, effective use of e-
business requires considerable thought and planning combined with a readiness to invest in
technical and human resources to do it right.
29
30
CHAPTER 3
3.1. Introduction
The technology plays an important role in delivering timely and error free information to its
recipients. Technology includes hardware, software, databases, and communication system.
Hardware is a set of devices such as processor, monitors, keyboard, and printer that accept
data, process them, and display them. Software is a set of programs that enable the hardware
to process data. Database is also an integral part of IT system, which is a collection of
related files, tables, relation etc. that stores data and the association among them. Network
connects computing resources of an organization and facilitates sharing of hardware and
software. The organization processes and people are integral part of an IT System.
Figure.3.1: IT Components/ Resources
31
3.2. Hardware: Computing, Storing and communicating
3.2.1. Basic Computer Operations
A computer as shown in Figure.3.2 performs basically five major operations or functions. These
are 1) it accepts data or instructions by way of input, 2) it stores data, 3) it can process data as
required by the user, 4) it gives results in the form of output, and 5) it controls all operations
inside a computer. We discuss below each of these operations.
1. Input: This is the process of entering data and programs in to the computer system. You
should know that computer is an electronic machine like any other machine which takes as
inputs raw data and performs some processing giving out processed data. Therefore, the input
unit takes data from us to the computer in an organized manner for processing.
Figure. 3.2: Basic computer Operations
32
2. Storage: The process of saving data and instructions permanently is known as storage. Data
has to be fed into the system before the actual processing starts. It is because the processing
speed of Central Processing Unit (CPU) is so fast that the data has to be provided to CPU with
the same speed.
Therefore the data is first stored in the storage unit for faster access and processing. This
storage unit or the primary storage of the computer system is designed to do the above
functionality. It provides space for storing data and instructions.
The storage unit performs the following major functions:
All data and instructions are stored here before and after processing.
Intermediate results of processing are also stored here.
3. Processing: The task of performing operations like arithmetic and logical operations is called
processing. The Central Processing Unit (CPU) takes data and instructions from the storage unit
and makes all sorts of calculations based on the instructions given and the type of data provided.
It is then sent back to the storage unit
4. Output: This is the process of producing results from the data for getting useful information.
Similarly the output produced by the computer after processing must also be kept somewhere
inside the computer before being given to you in human readable form. Again the output is also
stored inside the computer for further processing.
5. Control: The manner how instructions are executed and the above operations are performed.
Controlling of all operations like input, processing and output are performed by control unit. It
takes care of step by step processing of all operations inside the computer
The ALU and the CU of a computer system are jointly known as the central processing unit. You may call
CPU as the brain of any computer system. It is just like brain that takes all major decisions, makes all
sorts of calculations and directs different parts of the computer functions by activating and controlling the
operations.
33
operations performed by the ALU are addition, subtraction, multiplication, division, logic and
comparison. Data is transferred to ALU from storage unit when required. After processing the
output is returned back to storage unit for further processing or getting stored.
Primary Memory
Computer memory is used to store two things:
1) instructions to execute a program and
ii) data. When the computer is doing any job, the data that have to be processed are stored in
the primary memory. This data may come from an input device like keyboard or from a
secondary storage device like a floppy disk.
As program or the set of instructions is kept in primary memory, the computer is able to follow
instantly the set of instructions. For example, when you book ticket from railway reservation
counter, the computer has to follow the same steps: take the request, check the availability of
34
seats, calculate fare, wait for money to be paid, store the reservation and get the ticket printed
out. The program containing these steps is kept in memory of the computer and is followed for
each request.
The primary memory as you know in the computer is in the form of IC’s (Integrated Circuits).
These circuits are called Random Access Memory (RAM). Each of RAM’s locations stores one
byte of information. (One byte is equal to 8 bits). A bit is an acronym for binary digit, which
stands for one binary piece of information. This can be either 0 or 1. You will know more about
RAM later. The Primary or internal storage section is made up of several small storage locations
(ICs) called cells. Each of these cells can store a fixed number of bits called word length.
Each cell has a unique number assigned to it called the address of the cell and it is used to
identify the cells. The address starts at 0 and goes up to (N-1). You should know that the
memory is like a large cabinet containing as many drawers as there are addresses on memory.
Each drawer contains a word and the address is written on outside of the drawer.
2. Read Only Memory (ROM): There is another memory in computer, which is called Read
Only Memory (ROM). Again it is the ICs inside the PC that form the ROM. The storage of
program and data in the ROM is permanent. The ROM stores some standard processing
35
programs supplied by the manufacturers to operate the personal computer. The ROM can
only be read by the CPU but it cannot be changed. The basic input/output program is stored
in the ROM that examines and initializes various equipment attached to the PC when the
switch is made ON. The memories, which do not loose their content on failure of power
supply, are known as non-volatile memories. ROM is non-volatile memory.
3. PROM There is another type of primary memory in computer, which is called Programmable
Read Only Memory (PROM). You know that it is not possible to modify or erase programs
stored in ROM, but it is possible for you to store your program in PROM chip. Once the
programs are written it cannot be changed and remain intact even if power is switched off.
Therefore programs or instructions written in PROM or ROM cannot be erased or changed.
4. EPROM: This stands for Erasable Programmable Read Only Memory, which over come the
problem of PROM & ROM. EPROM chip can be programmed time and again by erasing the
information stored earlier in it. Information stored in EPROM exposing the chip for some
time ultraviolet light and it erases chip is reprogrammed using a special programming
facility.
5. Cache Memory: The speed of CPU is extremely high compared to the access time of main
memory. Therefore the performance of CPU decreases due to the slow speed of main
memory. To decrease the mismatch in operating speed, a small memory chip is attached
between CPU and Main memory whose access time is very close to the processing speed of
CPU. It is called CACHE memory. CACHE memories are accessed much faster than
conventional RAM. It is used to store programs or data currently being executed or
temporary data frequently used by the CPU. So each memory makes main memory to be
faster and larger than it really is. It is also very expensive to have bigger size of cache
memory and its size is normally kept small.
6. Registers: The CPU processes data and instructions with high speed, there is also movement
of data between various units of computer. It is necessary to transfer the processed data with
high speed. So the computer uses a number of special memory units called registers. They
are not part of the main memory but they store data or information temporarily and pass it
on as directed by the control unit.
Secondary memory
36
You are now clear that the operating speed of primary memory or main memory should be as
fast as possible to cope up with the CPU speed. These high-speed storage devices are very
expensive and hence the cost per bit of storage is also very high. Again the storage capacity of
the main memory is also very limited. Often it is necessary to store hundreds of millions of bytes
of data for the CPU to process. Therefore additional memory is required in all the computer
systems. This memory is called auxiliary memory or secondary storage. Most widely used
secondary storage devices are magnetic tapes and magnetic disk.
Magnetic Tape: Magnetic tapes are used for large computers like mainframe computers where
large volume of data is stored for a longer time. In PC also you can use tapes in the form of
cassettes. The cost of storing data in tapes is inexpensive. Tapes consist of magnetic materials
that store data permanently. It can be 12.5 mm to 25 mm wide plastic film-type and 500 meter
to 1200 meter long which is coated with magnetic material. The deck is connected to the central
processor and information is fed into or read from the tape through the processor. It is similar
to cassette tape recorder.
Each disk consists of a number of invisible concentric circles called tracks. Information
is recorded on tracks of a disk surface in the form of tiny magnetic spots. The presence of
a magnetic spot represents one bit and its absence represents zero bit.
37
The information stored in a disk can be read many times without affecting the stored data.
So the reading operation is non-destructive. But if you want to write a new data, then the
existing data is erased from the disk and new data is recorded.
Floppy Disk: It is similar to magnetic disk discussed above. They are 5.25 inch or 3.5
inch in diameter. They come in single or double density and recorded on one or both
surface of the diskette. The capacity of a 5.25-inch floppy is 1.2 mega bytes whereas for
3.5 inch floppy it is 1.44 mega bytes. It is cheaper than any other storage devices and is
portable. The floppy is a low cost device particularly suitable for personal computer
system.
Optical Disk: With every new application and software there is greater demand for
memory capacity. It is the necessity to store large volume of data that has led to the
development of optical disk storage medium.
Compact Disk/ Read Only Memory (CD-ROM): CD-ROM disks are made of reflective
metals. CD-ROM is written during the process of manufacturing by high power laser
beam. Here the storage density is very high, storage cost is very low and access time is
relatively fast. Each disk is approximately 4 1/2 inches in diameter and can hold over 600
MB of data. As the CD-ROM can be read only we cannot write or make changes into the
data contained in it.
Write Once, Read Many (WORM): The inconvenience that we can not write any thing in
to a CD-ROM is avoided in WORM. A WORM allows the user to write data permanently
on to the disk. Once the data is written it can never be erased without physically
damaging the disk. Here data can be recorded from keyboard, video scanner, OCR
equipment and other devices. The advantage of WORM is that it can store vast amount of
data amounting to gigabytes (109 bytes). Any document in a WORM can be accessed
very fast, say less than 30 seconds.
Erasable Optical Disk: These are optical disks where data can be written, erased and re-written.
This also applies a laser beam to write and re-write the data. These disks may be used as
38
alternatives to traditional disks. Erasable optical disks are based on a technology known as
magnetic optical (MO). To write a data bit on to the erasable optical disk the MO drive's laser
beam heats a tiny, precisely defined point on the disk's surface and magnetizes it.
Input Devices
Input devices are necessary to convert our information or data in to a form which can be
understood by the computer. A good input device should provide timely, accurate and useful data
to the main memory of the computer for processing followings are the most useful input devices
1. Keyboard: - This is the standard input device attached to all computers. The layout of
keyboard is just like the traditional typewriter of the type QWERTY. It also contains some
extra command keys and function keys. It contains a total of 101 to 104 keys. A typical
keyboard used in a computer is shown in Figure. 3.4. You have to press correct combination
of keys to input data. The computer can recognize the electrical signals corresponding to the
correct key combination and processing is done accordingly.
2. Mouse: - Mouse is an input device shown in Figure. 3.4 that is used with your personal
computer. It rolls on a small ball and has two or three buttons on the top. When you roll the
mouse across a flat surface the screen censors the mouse in the direction of mouse
movement. The cursor moves very fast with mouse giving you more freedom to work in any
direction. It is easier and faster to move through a mouse.
Figure. 3.4: Keyboard & mouse
39
3. Scanner: The keyboard can input only text through keys provided in it. If we want to input a
picture the keyboard cannot do that. Scanner is an optical device that can input any graphical
matter and display it back. The common optical scanner devices are Magnetic Ink Character
Recognition (MICR), Optical Mark Reader (OMR) and Optical Character Reader (OCR).
Magnetic Ink Character Recognition (MICR): - This is widely used by banks to process large
volumes of cheques and drafts. Cheques are put inside the MICR. As they enter the reading unit
the cheques pass through the magnetic field which causes the read head to recognize the
character of the cheques.
Optical Mark Reader (OMR): This technique is used when students have appeared in objective
type tests and they had to mark their answer by darkening a square or circular space by pencil.
These answer sheets are directly fed to a computer for grading where OMR is used.
Optical Character Recognition (OCR): - This technique unites the direct reading of any
printed character. Suppose you have a set of hand written characters on a piece of paper. You put
it inside the scanner of the computer. This pattern is compared with a site of patterns stored
inside the computer. Whichever pattern is matched is called a character read. Patterns that cannot
be identified are rejected. OCRs are expensive though better the MICR .
Output Devices
1. Visual Display Unit: The most popular input/output device is the Visual Display Unit (VDU).
It is also called the monitor. A Keyboard is used to input data and Monitor is used to display
the input data and to receive massages from the computer. A monitor has its own box which
is separated from the main computer system and is connected to the computer by cable. In
some systems it is compact with the system unit. It can be color or monochrome.
40
2. Terminals: It is a very popular interactive input-output unit. It can be divided into two types:
hard copy terminals and soft copy terminals. A hard copy terminal provides a printout on
paper whereas soft copy terminals provide visual copy on monitor. A terminal when
connected to a CPU sends instructions directly to the computer. Terminals are also classified
as dumb terminals or intelligent terminals depending upon the work situation.
3. Printer: It is an important output device which can be used to get a printed copy of the
processed text or result on paper. There are different types of printers that are designed for
different types of applications. Depending on their speed and approach of printing, printers
are classified as impact and non-impact printers. Impact printers use the familiar typewriter
approach of hammering a typeface against the paper and inked ribbon. Dot-matrix printers
are of this type. Non-impact printers do not hit or impact a ribbon to print. They use electro-
static chemicals and ink-jet technologies. Laser printers and Ink-jet printers are of this type.
This type of printers can produce color printing and elaborate graphics.
System software
1. Application Software: Application Software is a set of programs to carry out operations for a
specific application. For example, payroll is an application software for an organization to
produce pay slips as an output. Application software is useful for word processing, billing
41
system, accounting, producing statistical report, analysis of numerous data in research, weather
forecasting, etc. In later modules you will learn about MS WORD, Lotus 1-2-3 and dBASE III Plus.
All these are application software. Another example of application software is programming
language. Among the programming languages COBOL (Common Business Oriented Language) is
more suitable for business application whereas FORTRAN (Formula Translation) is useful for
scientific application.
2. System Software: You know that an instruction is a set of programs that has to be fed to the
computer for operation of computer system as a whole. When you switch on the computer the
programs written in ROM is executed which activates different units of your computer and
makes it ready for you to work on it. This set of program can be called system software.
Therefore system software may be defined as a set of one or more programs designed to
control the operation of computer system.
System software are general programs designed for performing tasks such as controlling all
operations required to move data into and out of the computer. It communicates with printers,
card reader, disk, tapes etc. monitor the use of various hardware like memory, CPU etc. Also
system software are essential for the development of applications software. System Software
allows application packages to be run on the computer with less time and effort. Remember that
42
The effectiveness of an IT infrastructure is a function of the type of IT personnel available to it.
In fact, best of computer hardware, software and data may be spoiled and may cause havoc if
human resources are not competent, honest or reliable. Qualities like competence, honesty and
reliability are critical to any work environment.
Those are the ones who have full-time responsibility for developing and maintaining
computer based systems. There are five categories of information specialists:
System analysts work with users to define the requirements for developing new systems and
improving existing ones.
Database administrator’s work with users and system analysts to create databases that contain
the data needed to produce the user’s information.
Network specialists work with system analysts and users to establish the data communication
networks that tie together widespread computing resources.
Programmers use the documentation prepared by the systems analysts to encode the
instructions that cause the computer to transform the data into information needed by the user.
Operators handle the large-scale computing equipment such as mainframe computers and mini-
computers.
Examples of procedures:
43
1. User instructions (for users of the application to record data, employ a terminal to enter or
retrieve data, or use the result.)
2. Instruction for preparation of input by data preparation personnel.
3. Operating instructions for computer operations personnel.
Information systems also help store managers make better decisions and attempt to gain a
strategic competitive advantage. For example, decisions on what lines of clothing or
appliances need to be added or discontinued, or what kind of investments they require, are
typically made after an analysis provided by computer-based information systems.
This not only supports the decision making of store managers but also helps them look for ways
to gain an advantage over other retailers in the competition for customers.
For example, store managers might make a decision to invest in a computerized touch-
screen catalog ordering system as a strategic information system. This might attract
customers away from other stores, based on the ease of ordering merchandise provided
by such a computer-based information system. Thus, strategic information helps provide
strategic products and services that given an organization a comparative advantage over
its competitors.
Business values of IT
44
The impact of IT on a business has been tremendous. One of the advantages of IT systems for a
business is the cost-performance ratio, which is better in case of computers. The labor cost
increases every year but the cost of computer does not increase. A better and more powerful
computer can be bought for the same price after a year. It is better to use computers for routine
jobs as far as possible. The IT has been used in every business and for every function of a
business. Some of the applications are as follows.
Finance and Accounting: IT has been used for forecasting revenues, determining the best
sources and uses of funds and managing cash and other financial resources. IT has also been used
to analyze investments and perform audits.
Sales and Marketing: IT has been used to develop new services, which may not exist without
IT. IT has helped management of various organizations to determine the best location for
production and distribution facilities. The operational data has been analyzed using IT to
determine the best advertising and sales approaches. The product prices have been set using IT to
get the highest total revenues. In other words, IT has been used for product analysis and price
analysis.
Manufacturing: IT has been extensively used for processing customer orders, controlling
inventory levels, developing production schedules and for monitoring product quality. A whole
new discipline— Computer Aided Design and Computer Aided Manufacturing has evolved due
to application of IT to design and manufacturing. The manufacturing is not what is used to be
due to the use of computers, Computer Integrated Manufacturing (CIM) dominates the
manufacturing sector.
Human Resource Management: Companies are using IT systems for screening applicants and
conducting various tests.
Project Management: A range of software packages are available in the market for managing
projects. These software products let the management set the schedules, milestones, facilitate
communication among group members, and monitor the project progress. These products help in
document and report preparation.
Data Analysis: Investment firms heavily use information systems to analyze stocks, bonds and
options to provide better service to their clients.
45
Global IT Applications
The search for systems economies was usually the initial driving force for global IT applications
in many firms. For instance, an engineering firm wished to use a common engineering database
to share project work between its U.S. and Asian offices. In addition to anticipated variations in
engineering codes and relative costs of materials, management soon discovered that the Asian
project requirements demanded far more detailed specifications for contractors than had
traditionally been required of their U.S. office. Except for the economies of scale for systems,
other divers were also to be considered. The following are the implications of some other
common drivers for the global IT.
Global customer -Firms that serve traveling customers (airlines, hotels etc.) find it necessary to
have worldwide customer databases. Corporate customers with global operations that more and
more are demanding integrated worldwide services are increasingly imposing a similar
requirement.
Global product -The product is either the same through the world (e.g., Coco Cola) or is
assembled from subsidiaries through the world (e.g., security), currency exchange etc.) .
Information systems can provide the ability to manage worldwide marketing programs.
Rationalized operation - Different subsidiaries build different parts of the same product based
on availability of skills, raw materials, or favorable business climate. For example, a computer
manufacturer might build software in Japan, monitors in China, and circuit boards in Cincinnati
and the U.S. MIS is used to coordinate the operations.
Flexible operations - Operations al-e moved from a plant in one country to a plant in another.
Fort in stance, a computer vendor moves production of personal computers between plants in
respond to labor strife or raw material shortages. Common systems exist across plants, which
facilitates the move.
Joint resource - National subsidiaries may share certain facilities or people. For instance,
the Chinese subsidiaries for a petroleum company jointly own tankers or storage tanks. A
material resource system is implemented to track the location of joint resource.
Risk reduction - Risks associated with currency conversions, multiple global markets,
and multiple traders are alleviated. For instance, a petroleum company develops a global
46
system for bidding on crude oil contracts, or a multinational bank implements a global
risk management system for currency trading.
47
Suppose a manager has to write several letters to various clients. First he has to use his PC and
Word Processing package to prepare his letter. If the PC is connected to the entire client's PCs
through networking, he can send the letters to all the clients within minutes. Thus irrespective
of geographical areas, if PCs are connected through communication channel, the data and
information, computer files and any other program can be transmitted to other computer
systems within seconds. The modern form of communication like e-mail and Internet is possible
only because of computer networking.
In data communication four basic terms are frequently used. They are
Data: A collection of facts in raw forms that become information after processing.
Signals: Electric or electromagnetic encoding of data.
Signaling: Propagation of signals across a communication medium.
Transmission: Communication of data achieved by the processing of signals.
Communication Protocols
You may be wondering how do the computers send and receive data across communication
links. The answer is data communication software. It is this software that enables us to
communicate with other systems. The data communication software instructs computer systems
and devices as to how exactly data is to be transferred from one place to another. The procedure
of data transformation in the form of software is commonly called protocol.
The data transmission software or protocols perform the following functions for the efficient
and error free transmission of data.
Data sequencing: A long message to be transmitted is broken into smaller packets of fixed size
for error free data transmission.
Data Routing: It is the process of finding the most efficient route between source and
destination before sending the data.
48
Flow control: All machines are not equally efficient in terms of speed. Hence the flow control
regulates the process of sending data between fast sender and slow receiver.
Error Control: Error detecting and recovering is the one of the main function of communication
software. It ensures that data are transmitted without any error.
Data Transmission Modes
There are three ways for transmitting data from one point to another
Simplex: In simplex mode the communication can take place in one direction. The receiver
receives the signal from the transmitting device. In this mode the flow of information is Uni.-
directional. Hence it is rarely used for data communication.
Half-duplex: In half-duplex mode the communication channel is used in both directions, but only
in one direction at a time. Thus a half-duplex line can alternately send and receive data.
Full-duplex: In full duplex the communication channel is used in both directions at the same
time. Use of full-duplex line improves the efficiency as the line turn-around time required in
half-duplex arrangement is eliminated. Example of this mode of transmission is the telephone
line.
Figure.3.7. Data Transmission Modes
49
Data is transmitted from one point to another point by means of electrical signals that may be in
digital and analog form. So you should know the fundamental difference between analog and
digital signals. In analog signal the transmission power varies over a continuous range with
respect to sound, light and radio waves. On the other hand a digital signal may assume only
discrete set of values within a given range.
Examples are computer and computer related equipment. Analog signal is measured in Volts
and its frequency in Hertz (Hz). A digital signal is a sequence of voltage represented in binary
form. When digital data are to be sent over an analog form the digital signal must be converted
to analog form. So the technique by which a digital signal is converted to analog form is known
as modulation. And the reverse process, that is the conversion of analog signal to its digital
form, is known as demodulation. The device, which converts digital signal into analog, and the
reverse, is known as modem.
50
Asynchronous and Synchronous Transmission
Data transmission through a medium can be either asynchronous or synchronous. In
asynchronous transmission data is transmitted character by character as you go on typing on a
keyboard. Hence there is irregular gaps between characters. However, it is cheaper to
implement, as you do not have to save the data before sending. On the other hand, in the
synchronous mode, the saved data is transmitted block by block. Each block can contain many
characters. Synchronous transmission is well suited for remote communication between a
computer and related devices like card reader and printers.
51
twisted together. Data transmission speed is normally 9600 bits per second in a distance of 100
meter.
Coaxial Cables: Coaxial cable is groups of specially wrapped and insulted wires that are able to
transfer data at higher rate. They consist of a central copper wire surrounded by an insulation
over which copper mesh is placed. They are used for long distance telephone lines and local
area network for their noise immunity and faster data transfer.
3. Fiber optics: A strand of fiber-optic cable reflects the light that passes through it back
into the fiber, so light cannot escape the strand. Fiber-optic cables carry more
information, suffer less interference, and require fewer signal repeaters over long
distances than wires. It also immune to the effects of moisture and lighting. Fiber optic
cable has the ability to transmit signals over much longer distances than coaxial and
twisted pair. It also has the capacity to carry information at greater speeds; however, it is
more difficult to install and modify.
Microwave: Microwave system uses very high frequency radio signals to transmit data through
space. The transmitter and receiver of a microwave system should be in line-of-sight because
52
the radio signal cannot bend. With microwave very long distance transmission is not possible. In
order to overcome the problem of line of sight and power amplification of weak signal,
repeaters are used at intervals of 25 to 30 kilometers between the transmitting and receiving
end.
Communication Satellite: The problem of line-sight and repeaters are overcome by
using satellites which are the most widely used data transmission media in modern days.
A communication satellite is a microwave relay station placed in outer space. INSAT-1B
is such a satellite that can be accessible from anywhere in India. In satellite
communication, microwave signal is transmitted from a transmitter on earth to the
satellite at space. The satellite amplifies the weak signal and transmits it back to the
receiver. The main advantage of satellite communication is that it is a single microwave
relay station visible from any point of a very large area. In microwave the data
transmission rate is 16 giga bits per second. They are mostly used to link big metropolitan
cities.
53
Flexible Working Environment- employees can work at home by networking computers to their
office, on trips through their portable computers, travel to remote offices and use telephones
and networks to perform their duties.
Computer Networks may be classified on the basis of geographical area in three broad
categories.
Local Area Network (LAN)
Metropolitan Area Networks(MANs)
Wide Area Network (WAN)
Local Area Network (LAN): Networks used to interconnect computers in a single room,
rooms within a building or buildings on one site are called Local Area Network (LAN).
6
LAN transmits data with a speed of several megabits per second (10 bits per second).
The transmission medium is normally coaxial cables.
LAN links computers, i.e., software and hardware, in the same area for the purpose of
sharing information. Usually LAN links computers within a limited geographical area
because they must be connected by a cable, which is quite expensive. People working in
LAN get more capabilities in data processing, work processing and other information
exchange compared to stand-alone computers. Because of this information exchange
most of the business and government organizations are using LAN.
3. Metropolitan Area Networks (MANs): are bigger versions of a LAN and normally uses similar
technology. It might cover a group of nearby corporate offices or a city and might be either
private or public. Cable television network is a good example of MAN. The key aspect of MAN is
that there is broadcast medium (two cables) to which all the computers are attached, which
simplifies its design compared to other kinds of networks
4. Wide Area Network (WAN): The term Wide Area Network (WAN) is used to describe a
computer network spanning a regional, national or global area. For example, for a large
company the head quarters might be at Delhi and regional branches at Bombay, Madras,
Bangalore and Calcutta. Here regional centers are connected to head quarters through WAN.
The distance between computers connected to WAN is larger. Therefore the transmission
mediums used are normally telephone lines, microwaves and satellite links.
5. Some Examples of WAN
54
6. Ethernet: Ethernet developed by Xerox Corporation is a famous example of WAN. This
network uses coaxial cables for data transmission. Special integrated circuit chips called
controllers are used to connect equipment to the cable.
Network Topology
The term topology in the context of communication network refers to the way the computers or
workstations in the network are linked together. According to the physical arrangements of
workstations and nature of work, there are three major types of network topology. They are
star topology, bus topology and ring topology.
1. Star topology: In star topology a number of workstations (or nodes) are directly linked to
a central node (see, Figure. 3.10). Any communication between stations on a star LAN
must pass through the central node. There is bi-directional communication between
various nodes. The central node controls all the activities of the nodes. The advantages of
the star topology are:
It offers flexibility of adding or deleting of workstations from the network.
Breakdown of one station does not affect any other device on the network.
a. The major disadvantage of star topology is that failure of the central node disables
communication throughout the whole network.
55
Figure. 3.10: Star Topology
2. Bus Topology: In bus topology all workstations are connected to a single communication line
called bus. In this type of network topology there is no central node as in star topology.
Transmission from any station travels the length of the bus in both directions and can be
received by all workstations. The advantage of the bus topology is that
1. It is quite easy to set up.
2. If one station of the topology fails it does not affect the entire system.
The disadvantage of bus topology is that any break in the bus is difficult to identify.
56
Figure. 3.11: Bus Topology
3. Ring Topology: In ring topology each station is attached nearby stations on a point to point
basis so that the entire system is in the form of a ring. In this topology data is transmitted in
one direction only. Thus the data packets circulate along the ring in either clockwise or anti-
clockwise direction. The advantage of this topology is that any signal transmitted on the
network passes through all the LAN stations. The disadvantage of ring network is that the
breakdown of any one station on the ring can disable the entire system.
Figure. 3.12: Ring Topology
57
4. Mesh Topology: A mesh topology network offers superior redundancy and reliability. In a
mesh topology, each computer is connected to every other computer by separate cabling.
This configuration provides redundant paths throughout the network so that if one cable
fails, another will take over the traffic. While ease of troubleshooting and increased
reliability are definite pluses, these networks are expensive to install because they use a lot
of cabling. Often, a mesh topology will be used in conjunction with other topologies to form
a hybrid topology.
3.7.3. Internet
The Internet is a network of networks. Millions of computers all over the world are
connected through the Internet. Computer users on the Internet can contact one another
anywhere in the world. If your computer is connected to the Internet, you can connect to
millions of computers. You can gather information and distribute your data. It is very
much similar to the telephone connection where you can talk with any person anywhere
in the world.
In Internet a huge resource of information is accessible to people across the world.
Information in every field starting from education, science, health, medicine, history, and
geography to business, news, etc. can be retrieved through Internet. You can also
download programs and software packages from anywhere in the world. Due to the
tremendous information resources the Internet can provide, it is now indispensable to
every organization.
Origin of Internet
58
any computer of NSFNET. By 1990 many computers were looking up to NSFNET giving
birth to Internet.
How Internet functions
Internet is not a governmental organization. The ultimate authority of the Internet is the
Internet Society. This is a voluntary membership organization whose purpose is to
promote global information exchange. Internet has more than one million computers
attached to it.
E-mail stands for electronic mail. This is one of the most widely used features of
Internet. Mails are regularly used today where with the help of postage stamp we can
transfer mails anywhere in the world. With electronic mail the service is similar. But here
data are transmitted through Internet and therefore within minutes the message reaches
the destination may it be anywhere in the world. Therefore the mailing system is
excessively fast and is being used widely for mail transfer.
Internet Service Provider (ISP), company that sells access to the Internet, allowing
computer users to send electronic mail (e-mail) and browse the World Wide Web
(WWW), among other tasks. In some cases, ISPs sell dial-up access, providing a phone
number that lets users dial into the Internet via a computer modem. In other cases, they
sell broadband access, a much faster connection to the Internet.
Some broadband services, known as Digital Subscriber Lines (DSL) services, run over
standard telephone lines, while others use cable television lines or wireless connections to
orbiting satellites. Typically, the ISP must visit the user’s home and install the broadband
service on the user’s computer, but some companies offer toolkits that let users install the
service on their own. ISPs typically charge a monthly fee for Internet access, and they
often charge an additional fee for broadband installation.
59
CHAPTER FOUR
61
FIGURE 4.1 A summary of six essential accounting information systems used in business.
62
4.1.2. Financial Management Systems
Computer-based financial management systems support business managers and professionals in
decisions concerning (1) the financing of a business and (2) the allocation and control of
financial resources within a business. Major financial management system categories include
cash and investment management, capital budgeting, financial forecasting, and financial
planning. For example, the capital budgeting process involves evaluating the profitability and
financial impact of proposed capital expenditures. Long-term expenditure proposals for facilities
and equipment can be analyzed using a variety of return on investment (ROI) evaluation
techniques. This application makes heavy use of spread sheet models that incorporate present
value analysis of expected cash flows and probability analysis of risk to determine the optimum
mix of capital projects for a business (O’Brien & Marakas 2011).
Financial analysts also typically use electronic spreadsheets and other financial planning
software to evaluate the present and projected financial performance of a business. They also
help determine the financing needs of a business and analyze alternative methods of financing.
Financial analysts use financial forecasts concerning the economic situation, business operations,
types of financing available, interest rates, and stock and bond prices to develop an optimal
financing plan for the business. Electronic spreadsheet packages, DSS software, and Web-based
group ware can be used to build and manipulate financial models. Answers to what-if and goal
seeking questions can be explored as financial analysts and managers evaluate their financing
and investment alternatives(Ibid).
63
FIGURE 4.2 Examples of important financial management systems.
64
Marketing information systems provide information technologies that support major
components of the marketing function. For example, Internet/ intranet Web sites and services
make an interactive marketing process possible where customers can become partners in
creating, marketing, purchasing, and improving products and services. Sales force automation
systems use mobile computing and Internet technologies to automate many information
processing activities for sales support and management. Other marketing information systems
assist marketing managers in product planning, pricing, and other product management
decisions; advertising, sales promotion, and targeted marketing strategies; and market research
and forecasting.(O’Brien 2009).
Let’s take a closer look at three of these marketing applications.
65
• Community. Companies can customize their Web advertising messages and promotion
methods to appeal to people in specific communities. They can be communitiesof interest, such
as virtual communities of online sporting enthusiasts, or arts and crafts hobbyists, or geographic
communities formed by the Web sites of a city or other local organization.
• Content. Advertising, such as electronic billboards or banners, can be placed on a variety of
selected Web sites, in addition to a company’s Web site. The content of these messages is aimed
at the targeted audience. An ad for a product campaign on the opening page of an Internet search
engine is a typical example.
• Context. Advertising appears only in Web pages that are relevant to the content of a product or
service. So, advertising is targeted only at people who are already looking for information about
a subject matter (e.g., vacation travel) that is related to a company’s products (e.g., car rental
services).
• Demographic/Psychographic. Web marketing efforts can be aimed only at specific types or
classes of people: for example, unmarried, twenty-something, middle income, male college
graduates.
• Online Behavior. Advertising and promotion efforts can be tailored to each visit to a site by an
individual. This strategy is based on a variety of tracking techniques, such as Web “cookie” files
recorded on the visitor’s disk drive from previous visits. This enables a company to track a
person’s online behavior at its Web site so marketing efforts (such as coupons redeemable at
retail stores or e-commerce Web sites) can be targeted to that individual at each visit to its Web
site (O’Brien 2009).
66
FIGURE 4.3 marketing information systems provide information technologies to support major
components of the marketing function
67
• Simplify (reengineer) production processes, product designs, and factory organization as a vital
foundation to automation and integration.
• Automate production processes and the business functions that support them with computers,
machines, and robots.
• Integrate all production and support processes using computer networks, cross functional
business software, and other information technologies.
The overall goal of CIM and such manufacturing information systems is to create flexible, agile,
manufacturing processes that efficiently produce products of the highest quality. Thus, CIM
supports the concepts of flexible manufacturing systems, agile manufacturing, and total quality
management. Implementing such manufacturing concepts enables a company to respond to and
fulfill customer requirements quickly with high-quality products and services(O’Brien &
Marakas 2011).
4.1.4.2. Computer-aided manufacturing(CAM) systems are those that automate the production
process. For example, this could be accomplished by monitoring and controlling the production
process in a factory (manufacturing execution systems) or by directly controlling a physical
process (process control), a machine tool (machine control), or machines with some humanlike
work capabilities (robots).
4.1.4.3. Manufacturing execution systems(MES) are performance-monitoring information
systems for factory floor operations. They monitor, track, and control the five essential
components involved in a production process: materials, equipment, personnel, instructions and
specifications, and production facilities. MES includes shop floor scheduling and control,
machine control, robotics control, and process control systems. These manufacturing systems
monitor, report, and adjust the status and performance of production components to help a
company achieve a flexible, high-quality manufacturing process.
4.1.4.4. Process controlis the use of computers to control an ongoing physical process. Process
control computers control physical processes in petroleum refineries, cement plants, steel mills,
chemical plants, food product manufacturing plants, pulp and paper mills, electric power plants,
and so on. A process control computer system requires the use of special sensing devices that
measure physical phenomena such as temperature or pressure changes. These continuous
physical measurements are converted to digital form by analog-to-digital converters and relayed
to computers for processing.
68
4.1.4.5. Machine controlis the use of computers to control the actions of machines. This is also
popularly called numerical control. The computer-based control of machine tools to manufacture
products of all kinds is a typical numerical control application used by many factories throughout
the world.
The human resource management (HRM) function involves the recruitment, placement,
evaluation, compensation, and development of the employees of an organization.
The goal of human resource management is the effective and efficient use of the human
resources of a company. Thus, human resource information systems (HRIS) are designed to
support
planning to meet the personnel needs of the business,
Development of employees to their full potential and
Control of all personnel policies and programs.
Originally, businesses used computer-based information systems to (1) produce paychecks and
payroll reports, (2) maintain personnel records, and (3) analyze the use of personnel in business
operations. Many firms have gone beyond these traditional personnel management functions and
have developed human resource information systems that also support:-
Recruitment, selection, and hiring
Job placement
Performance appraisals
Employee benefits analysis
Training and development and
Health, safety, and security
69
the World Wide Web, posting messages in selected Internet newsgroups, and communicating
with job applicants via e-mail. The Internet has a wealth of information and contacts for both
employers and job hunters. Top Web sites for job hunters and employers on the World Wide
Web include Monster.com, HotJobs.com, and CareerBuilder.com And in Ethiopia
Ethiojobs.com. These Web sites are full of reports, statistics, and other useful HRM information,
such as job reports by industry, or listings of the top recruiting markets by industry and
profession (O’Brien & Marakas 2011).
70
FIGURE 4.4 Human resource information systems support the strategic, tactical, and
operational use of the human resources of an organization.
71
FIGURE 4.5 The new product development process in a manufacturing company. This is an
example of a business process that must be supported by cross-functional systems that cross the
boundaries of several business functions.
Many of the decision made are automatic and can be delegated to a computer. The stock re
ordering process, for example will be triggered when stock level below the re order level. These
tasks are routine but are made more efficient and cost effective by the use of computers, once
data has been put on computer. It can easily be manipulated and used to produce additional
information (Ibid).
TPS are special class of system designed to process business event and transaction.
Consequently TPS often reside close to customers, at the operational level of the organization (L.
Jussep and J. valacich, 2004).
72
The goal of TPS is to automate repetitive information processing activities within organization to
increases speed and accuracy and to lower the cost of processing each transaction. That is to
make the organization more effective (Ibid).
Transactions are events that occur as part of doing business, such as sales, purchases, deposits,
withdrawals, refunds, and payments. Think, for example, of the data generated whenever a
business sells something to a customer on credit, whether in a retail store or at an e-commerce
site on the Web. Data about the customer, product, salesperson, store, and so on, must be
captured and processed. This need prompts additional transactions, such as credit checks,
customer billing, inventory changes, and increases in accounts receivable balances, which
generate even more data. Thus, transaction processing activities are needed to capture and
process such data, or the operations ofa business would grind to a halt. Therefore, transaction
processing systems play a vitalrole in supporting the operations of most companies today.
Example of TPS;
73
• Data Entry. The first step of the transaction processing cycle is the capture of business data.
For example, transaction data may be collected by point-of-sale terminals using optical scanning
of bar codes and credit card readers at a retail store or other business. Transaction data can also
be captured at an e-commerce Web site on the Internet. The proper recording and editing of data
so they are quickly and correctly captured for processing is one of the major design challenges of
information systems
• Transaction Processing. Transaction processing systems process data in two basic ways: (1)
batch processing , where transaction data are accumulated over a period of time and processed
periodically, and (2) real-time processing (also called online processing), where data are
processed immediately after a transaction occurs.
All online transaction processing systems incorporate real-time processing capabilities. Many
online systems also depend on the capabilities of fault tolerant computer systems that can
continue to operate even if parts of the system fail.
• Database Maintenance. An organization’s databases must be updated by its transaction
processing systems so that they are always correct and up-to-date.
Therefore, transaction processing systems serve to assist in maintaining the corporate databases
of an organization to reflect changes resulting from day-to-day business transactions. For
example, credit sales made to customers will cause customer account balances to be increased
and the amount of inventory on hand to be decreased. Database maintenance ensures that these
and other changes are reflected in the data records stored in the company’s databases.
• Document and Report Generation. Transaction processing systems produce a variety of
documents and reports. Examples of transaction documents include purchase orders, paychecks,
sales receipts, invoices, and customer statements.
Transaction reports might take the form of a transaction listing such as a payroll register, or edit
reports that describe errors detected during processing.
• Inquiry Processing. Many transaction processing systems allow you to use the Internet,
intranets, extranets, and Web browsers or database management query languages to make
inquiries and receive responses concerning the results of transaction processing activity.
Typically, responses are displayed in a variety of pre specified formats or screens. For example,
you might check on the status of a sales order, the balance in an account, or the amount of stock
in inventory and receive immediate responses at your PC.
74
Figure 4.6 The transaction processing cycle
75
of managerial decision making that must be supported by information technology in a successful
organization are:
• Strategic Management. Typically, a board of directors and an executive committeeof the CEO
and top executives develop overall organizational goals, strategies, policies, and objectives as
part of a strategic planning process. They also monitor the strategic performance of the
organization and its overall direction in the political, economic, and competitive business
environment.
• Tactical Management. Increasingly, business professionals in self-directed teams as well as
business unit managers develop short- and medium-range plans, schedules, and budgets and
specify the policies, procedures, and business objectives for their subunits of the company. They
also allocate resources and monitor the performance of their organizational subunits, including
departments, divisions, process teams, project teams, and other workgroups.
• Operational Management. The members of self-directed teams or operating managers
develop short-range plans such as weekly production schedules. They direct the use of resources
and the performance of tasks according to procedures and within budgets and schedules they
establish for the teams and other workgroups of the organization (O’Brien & Marakas 2011).
I. Structured decision
It means that:-
This sort of decision can only be reached subjectively, example hiring of a new employee would
they fit in with the company ethos and existing practices.
Efforts are often made to them unstructured decision into structured one by setting hard and test
criteria. This practice is gaining ground in such field recruiting and granting credit facilities.
76
III. Semi structured decision
These leis between structured and unstructured decision
Some part of a decision making process are programmable (structured) other are not. For
example deciding how much to maintain for product will evolve an analyses of prior
usage but this may then have to be adjusted it a computer has recently gone out of
business and we expect additional but unknown demand.
For example, Sales managers typically rely on management information systems to produce sales
analysis reports. These reports contain sales performance figures by product line, salesperson,
sales region, and so on. A decision support system (DSS), however, would also interactively
show a sales manager the effects on sales performance of changes in a variety of factors (e.g.,
promotion expense and salesperson compensation). The DSS could then use several criteria (e.g.,
expected gross margin and market share) to evaluate and rank alternative combinations of sales
performance factors.
Therefore, DSS are designed to be ad hoc, quick-response systems that are initiated and
controlled by business decision makers. Decision support systems are thus able to support
directly the specific types of decisions and the personal decision-making styles and needs of
individual executives, managers, and business professionals.
77
of models used in computational and analytical routines that mathematically express
relationships among variables. For example, a spread sheet program might contain models that
express simple accounting relationships among variables, such as Revenue , Expenses and Profit.
A DSS model base could also include models and analytical techniques used to express much
more complex relationships.
For example, it might contain linear programming models, multiple regression forecasting
models, and capital budgeting present value models. Such models may be stored in the form of
spreadsheet models or templates, or statistical and mathematical programs and program modules.
In addition, DSS software packages can combine model components to create integrated models
that support specific types of decisions. DSS software typically contains built-in analytical
modeling routines and also enables you to build your own models. Many DSS packages are now
available in microcomputer and Web-enabled versions. Of course, electronic spreadsheet
packages also provide some of the model building (spreadsheet models) and analytical modeling
(what-if and goal-seeking analysis) offered by more powerful DSS software. As businesses
become more aware of the power of decision support systems, they are using them in ever-
increasing areas of the business (O’Brien & Marakas 2011).
Broad based approach to supporting decision making, it helps to identify important future
trends, adapt the organization to changing conditions.
Decision maker retains control over the decision making process.
It allows the capability to retrieve, manipulate, present and store data.
Utilization of appropriate mathematical and statistical model to assist the decision maker
in evaluating alternative solution.
Query capabilities to obtain into by requesting the interactive mode of the system extend
the individual’s reading process.
Output directed to organizational personnel at all level.
It can also provide lower management and their operating personnel with the necessary
output for supporting decision or controlling current operation.
Integrate subsystem allows manager and personnel to retrieve and manipulate
information to decision making.
78
Comprehensive database.
CHAPTER 5
KNOWLEDGE MANAGEMENT
Contents
Learning Objectives
Introduction
knowledge management-an overview
Critique to knowledge management
79
Sources of knowledge
Types of knowledge
Knowledge creation
Features and Functions of knowledge Management Products
Benefits Knowledge Management
Knowledge Management application in organizations
Trends and Challenges in Knowledge Management
Summary
Review Questions
5.2. Introduction
Present day’s organizations, large or small, gather vast amount of knowledge during the course
of their regular operations. This knowledge remains in the ‘minds’ of organizational members
conducting the operations- be it research, design, development, manufacturing, or services. The
effects of losing organizational knowledge is especially noticeable and can have far reaching
implications when people occupying important positions such as Chief of Designs or Chief
Marketing leave since all the knowledge they gathered over long years of experience is lost
permanently to the organization, along with them. Computers have not played a significant role
in this area, till recently, having mainly concentrated in the data processing field: obviously due
to the faster pay back period for the money invested.
80
KNOWLEDGE IS LIKE LIGHT. Weightless and intangible, it can easily travel the
world, enlightening the lives of people everywhere. Yet billions of people still live in
poverty unnecessarily. Knowledge about how to treat such a simple ailment as
diarrhea has existed for centuries but millions of children continue to die from it
because their parents do not know how to save them.
Source: Opening statement of the World Bank 1998/99 World Development Report:
Knowledge for Development.
Knowledge informs decisions and actions. Knowledge is intangible, dynamic, and difficult to
measure, but without it no organization can survive.
What is Knowledge?
Let us see some of the definitions given for the term Knowledge:
1. Knowledge comprises all cognitive expectancies—observations that have been
meaningfully organized, accumulated and embedded in a context through experience,
communication, or inference—that an individual or organizational actor uses to interpret
situations and to generate activities, behavior and solutions no matter whether these
expectancies are rational or used intentionally.
2. Knowledge – data and information that is further refined based on the facts, truths,
beliefs, judgments, experiences, and expertise of the recipient.
3. Knowledge is justified true belief.
4. Knowledge is a fluid mix of framed experience, values, contextual information and
expert insight that provides a framework for evaluating and incorporating new experience
and information. It originates and is applied in the minds of knower's. In organizations it
often becomes embedded not only in documents or repositories but also in organizational
processes, practices and norms.
5. Knowledge is information in action. Knowledge is viewed as a collection of facts, ideas,
learnings, policies, practices and a lot more.
The new source of wealth is knowledge, and not labor, land, or financial capital. It is the
intangible, intellectual assets that must be managed.
82
Activity A
“How can the organization manage and share knowledge for competitive
advantage?”
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.....................................................................................................................
2. Knowledge Management strives to integrate the data and information that can create
and preserve knowledge.
Knowledge management is still a young field with multidisciplinary roots. Thus, it is not
surprising that there seem to be almost as many definitions to the term than there are
approaches or “schools” of authors contributing to the field. On the one hand, this situation
can be characterized as a positive development because the lack of clear boundaries has
allowed the free influx of ideas, concepts and approaches.
Any Knowledge Management project should essentially have the following four
components;
Create knowledge (knowledge Repository)
Improve Knowledge Access
Enhance Knowledge Environment
Manage Knowledge as an Asset
84
what information and knowledge is worthwhile to include in the knowledge management
process, and what data and information should be kept out.
Thus, as with every emerging discipline or field of research, there is considerable variety in the
perspectives taken and there is no consensus yet what knowledge management is all about and
how to proceed.
Many authors have criticized knowledge management and/or suggested new directions for
research. Most of the authors agree that there are substantial benefits to be gained from the
systematic and conscious treatment of knowledge-related processes in organizations. The
diversity, interdisciplinary nature and dynamics of the field have resulted in a large variety of
KM approaches some of which seem to fail to recognize the abundant “lessons learned” in the
approaches that form the roots of KM, namely organizational development, organizational
learning and strategic management. As a consequence, organizations eager to improve their way
of handling knowledge are confronted with several theoretical “schools of thought” on the one
hand (human-oriented versus technology-oriented approaches, but also the intellectual capital
approach, newer forms of organizational learning approaches, HR approaches etc.) and a vast
and not transparent market supply of KMS on the other hand. Moreover, a theory-driven
implementation of ICT to support a strategically relevant KM initiative not only has to select a
85
KM perspective and often a combination of KM tools and systems, but also integrate
organizational design- and culture-oriented instruments with the supporting technology.
In other words, even though many authors regularly put emphasis on the (individual and
organizational) human side of KM, it is technology that all too often is employed as an enabler, a
catalyst, a vehicle to complement or implement the concepts that should change the way
organizations handle knowledge. Information and communication systems are used as enablers
because they provide a cost-efficient and time-efficient way of changing organizational routine
or at least managers believe so. Even though KMS can act as catalysts for KM initiatives, it has
to be warned against an implementation of such systems without considering the human and
organizational side. Instead, a careful coordination with a corresponding strategy, an
organizational design and people-oriented measures is required in order to provide a systematic
and potentially successful intervention into an organization’s way of handling knowledge.
Financial factor
The cost of not managing knowledge greatly exceeds the cost of managing important knowledge.
Organizations have the habit of externalizing the cost of not managing the knowledge to their
customers.
86
Future trends
Those who want to think and act in integrated, creative ways and solve complex problems need
rich, integrated, up-to-date knowledge management environments to support them. The gulf
between traditional knowledge-driven organizations is growing as knowledge-driven
organizations concentrate not only on present success but their own evolution so they can better
take advantage of the new knowledge intense environment.
Internal sources emerging from the operations of the organization-internal sources include
the organizational operations such as design, development, engineering, sales, marketing,
manufacturing, customer contact, etc. This is the basic source of organizational information,
which is controllable and can be easily canalized to Knowledge Resource.
87
some times through publications. Some of them could be free services and some could be for
a fee.
TACIT knowledge is highly personal and hard to formalize, making it difficult to communicate
or share with others. Subjective insights, intuitions and hunches fall into this category of
knowledge – Difficult to verbalize, such tacit knowledge is deeply rooted in an individual’s
actions and experience, as well as in the ideals, values, or emotions he or she embraces. The
following comparison adds clarity about the difference between explicit knowledge & implicit
(Tacit) knowledge.
These two types of knowledge are complementary to each other, and both are crucial to
knowledge creation. They interact with and change into each other in the creative activities of
human beings.
88
Knowledge creation is a function of an organization’s absorptive capacity. Absorptive capacity
requires a learning capability and develops problem-solving skills. Learning capability involves
the development of capacity to assimilate existing knowledge.
Knowledge creation in organizations takes place primarily through the dynamic process of four
different modes of conversion between the two dimensions of knowledge.
Socialization: Tacit knowledge to conversion takes place when tacit knowledge within one
individual is shared by another through training. The new economy has given rise to a culture of
working in teams.
Today no job in the knowledge industry can be performed in isolation. Since working in teams is
not a passing fad, companies are now designing a compensation structure, which rewards team
performance in addition to individual performance.
Externalization: Tacit knowledge to explicit knowledge conversion can be said to take place
when an individual is able to articulate the foundations of his and her tacit knowledge.
Internalization: Explicit knowledge to tacit knowledge conversion takes place when new
explicit knowledge is shared throughout the firm and other members begin to use it to broaden,
extend and reframe their own tacit knowledge.
Knowledge creation, whether for imitation or innovation, takes place at two levels- individual
and organizational. The prime actors in the process of knowledge creation are individuals within
the organization. Knowledge creation in organizations is not, however, the simple sum of
knowledge creation by individuals.
89
5.8. Features and Functions of knowledge Management Products
It's important to note and understand that knowledge management is not a technology, or a
solution, or a software package, but is rather a business practice. As such, the implementation of
knowledge management should be considered at a strategic level. Successful knowledge
management often requires a cultural change within an organization, and the most common
problem with knowledge management is that interpersonal and cultural issues have not been
adequately addressed. After all, individuals are being asked to give up unique knowledge and
experience on behalf of the organization- the very qualities that make the individual valuable
within the organization. If the individual 'gives up' their information, the perception is that they
become less valuable and therefore more at risk.
The tools available in the knowledge management toolbox include items like centralized
databases, electronic message boards; Web portals-(An electronic gateway to a comprehensive
pool of information and services that is organized and presented to serve the needs of a defined
user population.) , article management, search functions, statistical reporting, and other
collaborative tools. These tools can be used either within an organization or with external users
to give employees and customers' quicker access to better information.
Knowledge as a product: Knowledge not only guides organizational actions, but can also be
sold. For example, professional services companies sell knowledge services. Pharmaceutical
companies hold patents and license the production of drugs.
90
Information and communication technology represents a key enabler for knowledge
management initiatives. Consequently, both, computer scientists and MIS researchers show
substantial interest in the field. This is especially true for both, researchers and practitioners in
the field of AI who have changed their research focus from expert and knowledge-based systems
to knowledge management systems. The theory most notably used as the underlying basis of
socio-technical system research in general is systems theory. Additionally, the perspective on
organizations as knowledge processing systems provides useful insights for knowledge
management.
Examples for information and communication technologies that are related to knowledge
management are:
Intranet infrastructures provide basic functionality for communication—email,
teleconferencing—as well as storing, exchanging, search and retrieval of data and
documents,
Document and content management systems handle electronic documents or Web content
respectively throughout their entire life cycle,
Workflow management systems support well-structured organizational processes and handle
the execution of workflows,
Artificial intelligence technologies support for example search and retrieval, user profiling
and matching of profiles, text and Web mining,
Business intelligence tools support the analytic process which transforms fragmented
organizational and competitive data into goal-oriented “knowledge” and require an integrated
data basis that is usually provided by a data warehouse,
Visualization tools help to organize relationships between knowledge, people and processes,
Groupware and collaboration software supports for example the time management,
discussions, meetings or creative workshops of work groups and teams,
E-learning systems offer specified learning content to employees in an interactive way and
thus support the teaching and/or learning process.
91
Knowledge Management suites provide solutions for creating centralized repositories for storing
and sharing data as well as providing solutions and tools for searching, retrieving and managing
this data.
Some KM software suit examples:
Retrieval ware by Convera-www.convera.com: Retrieval ware creates a complete
inventory of all enterprise assets, then enables users to search more than 200
document types on file servers in groupware systems, relational databases, document
management systems, web servers and more while respecting access right all from a
common user interface.
92
actively participate in networks and communities, to create and exchange knowledge in these
networks, to augment the employees’ ability to learn and to understand relationships between
knowledge, people and processes.
A good knowledge management system should reinforce an organizational culture that promotes
sharing and learning, makes better information more widely available, reduces duplication of
efforts, helps companies develop 'best practices', and allows forth passing of valuable
information as members leave the organization.
An effective Knowledge Management program should help a company leverage the assets and
provide the following benefits:
Fostering innovation by encouraging free flow of ideas.
Improving customer service by streamlining response time.
Boosting revenues by getting products and services to market faster.
Enhancing employee retention rates by recognizing the value of employees knowledge
and rewarding them for it.
Streamlining operations and reducing costs by eliminating redundant or unnecessary
processes.
Enhance customer service and satisfaction by improving the speed and quality of
customer contacts.
Decrease customer service costs by improving self-service processes.
Decrease training costs and times for new employees.
Increase employee retention rates by recognizing and rewarding employee contributions.
93
5.10. Knowledge Management application in organizations
Presently the emphasis is being focused on Information Technology related KM-creating tools
and techniques that facilitate creating of KR (Knowledge Resource) and effectively utilizing it.
Groupware (IBM-lotus Notes, Microsoft Exchange Servers-Outlook) has become the more
popular tool. Reasons are not hard to guess:-
94
Easy to use for creation of Knowledge Resource and using it
Robust and reliable tools
The market place is increasingly competitive and the rate of innovation is rising. So that
knowledge must evolve and be assimilated at an ever-faster rate.
Competitive pressures are reducing the size of the workforce, which holds this
knowledge for this.
Knowledge takes time to experience and acquire. Employees have less and les time for
this.
There are trends for employees to retire earlier and for increasing mobility, leading to
loss of knowledge.
There is a need to manage increasing complexity as small operating companies are
transnational sourcing operations. A change in strategic direction may result in the loss of
knowledge in a specific area. A subsequent reversal in policy may then lead to a renewed
requirement for this knowledge, but the employees with that knowledge may no longer be
there.
Activity A
What would you suggest about the challenges and trends of Knowledge Management in
Ethiopian context?
………………………………………………………………………………………………
5.12. Summary
95
Knowledge management (KM) comprises a range of strategies and practices used in an
organization to identify, create, represent, distribute, and enable adoption of insights and
experiences. Such insights and experiences comprise knowledge, either embodied in
individuals or embedded in organizational processes or practice. “Knowledge management
(KM) is an effort to increase useful knowledge within the organization. Ways to do this
include encouraging communication, offering opportunities to learn, and promoting the
sharing of appropriate knowledge artifacts.”
96
CHAPTER 6
After reading and studying this chapter, you should be able to:
97
Recognize the importance of having a disaster recovery plan; and
Measure the threat of virus and identify ways of preventing them
6.2. Introduction
The use of IT presents major security challenges, poses serious ethical questions, and affects
society in significant ways. IT raises ethical issues in the areas of Crime, Privacy, Individuality,
Employment, Health, and Working conditions. But, IT has had beneficial results as well. For
example, computerizing a manufacturing process may have the adverse effect of eliminating
people's job, but also have the beneficial result of improving working conditions and producing
products of higher quality at less cost. So as managers, it is our responsibility to minimize the
detrimental effects and optimize the beneficial effects. That would represent an ethically
responsible use of information technology.
With their increasing power and versatility, computers simplify day-to-day life.
Unfortunately, as computer use becomes more widespread, so do the opportunities for
misuse. Computer hackers—people who illegally gain access to computer systems—
often violate privacy and can tamper with or destroy records.
Programs called viruses or worms can replicate and spread from computer to computer,
erasing information or causing malfunctions. Other individuals have used computers to
electronically embezzle funds and alter credit histories. New ethical issues also have
arisen, such as how to regulate material on the Internet and the World Wide Web.
98
Justice: Benefits and burdens of the technology should be distributed fairly. Those who
benefit should bear their fair share of the risks, and those who do not benefit should not
suffer a significant increase in risk.
Minimized Risk: Even if judged acceptable by the other three guidelines, the technology
must be implemented so as to avoid all unnecessary risk. These, four principles can serve
as basic ethical requirements that companies should meet to help ensure the ethical
implementation of information technologies and information systems in business. But
what more specific guidelines might help your ethical use of information technology?
To answer this question it is important to examine statements of responsibilities contained in
codes of professional conduct for IS professionals. A good example is the code of professional
conduct of Association of Information Technology Professionals (AITP), an organization of
professionals in computing field. Its code of conduct is a portion of ethical principles that can
serve as the bases for ethical conduct by managers, end users, and IS professionals.
99
Use my skill and knowledge in inform the public in all areas of my expertise.
To the best of my ability, ensure that the products of my work are used in a socially
responsible way.
Support, respect, and abide by the appropriate local, state, provincial and federal laws.
PRIVACY SOLUTIONS
Potential solutions to the loss of informational privacy can be grouped into three areas:
regulation, technical measures, and individual action. Protecting privacy is such a
100
complicated and difficult task that any workable solution will have to address all three
areas
What is a Virus?
Computer viruses are self-replicating programs which cannot exist without a host. These
programs have existed since the 1960's, but did not get the name of "virus" until 1984.
101
These programs can be relatively harmless, or can completely incapacitate your
computer. The damage done to your computer is called the payload, and can range from a
harmless message or image being displayed to destroying files and reformatting the hard
drive of your computer. With the popularity of the Internet, viruses have become more
widespread and common. Originally, the viruses were passed by floppy disks, but now
they are often passed through Internet downloads and especially email attachments. Over
50,000 viruses have been identified, and around 200 more are created each month.
There are other types of programs associated with viruses and sometimes seen to be
subsets of viruses. These are worms and Trojans. Many recent viruses have incorporated
viruses, worms, and Trojans into one virus.
Worms are also self-replicating, but they do not have the payload that viruses have.
Worms use the internet or a network to send copies of itself to other computers, often
using email programs. They are often incorporated into viruses, and are to blame for the
spreading of most of the recent viruses, such as Love letter and Sir Cam
Trojans on the other hand do not replicate themselves. Like the Trojan horse of legend,
Trojans seem harmless but transport harmful information to other computers. Trojans can
allow a hacker complete access to your computer so they can corrupt files, steal
passwords, and modify the system registry. Often, Trojans are used to attack websites by
having thousands of computers under their control trying to access one site at the same
time.
Additional information about viruses and/or virus hoaxes is available from the LTS Help
Desk Virus Information site and on the Internet at, Computer Virus Myths.
With the prevalence of viruses today, it is important for any computer accessing the
Internet to have protection against viruses. In addition to safe operating procedures, there
are many different programs which can help you to protect your computer. Viruses can
come from many different sources, so you must be aware to protect yourself from getting
a virus from any source. Remember that virus scanners can only catch the known viruses,
so do not rely solely on virus protection software. Viruses may take months before they
are discovered and solutions are found.
102
Some hints for preventing virus infections:
Don'ts
Never use storage media from an untrustworthy source
Never download files from a site or person that you do not trust
Never open an email attachment from a person you do not know
Never open an email attachment that looks unusual or suspicious
(To check email attachments against known infected attachments, see About. com's Infected
Attachment Names )
Do's
Use a real-time virus scanner or frequently check your system with an online virus
scanner
When using a real-time virus scanner, download virus updates every week
Use personal firewall software to prevent unauthorized Internet access to and from your
computer
Use of the RTF (Rich Text Format) file format preserves document content and
formatting AND reduces the spread of viruses. The Word .doc format has been a popular
target for those creating viruses. (Refer to Saving a Document in RTF Format.)
There are many different programs which scan for and correct viruses which are on your
computer. Many times you will not even know you have a virus until you scan for viruses. There
are many options for scanning and curing viruses. There are free software, free online scans,
downloadable trial versions of software, and software which you may purchase. The vast number
of software companies offering virus protection makes it difficult to include all companies, but
we have compiled a listing of the best rated virus protection solutions. The downloadable virus
103
software scans for viruses in real-time, which means that as your computer receives files, the
software checks the files for viruses. The software also constantly monitors the computer files to
search for viruses. It is very important when using a real-time virus scanner to download updates
frequently, so the software can detect all of the newly found viruses.
Firewall
Personal firewall software controls what programs are allowed to access the internet, and
prevents people from hacking into your computer. This can prevent Trojans which are already
on your computer from accessing the internet. There are companies which offer free and paid
software for personal firewalls as well.
104
Organizations and businesses that rely on computers need to institute disaster recovery plans that
are periodically tested and upgraded. This is because computers and storage components such as
diskettes or hard disks are easy to damage. A computer's memory can be erased or flooding, fire,
or other forms of destruction can damage the computer’s hardware. Computers, computer data,
and components should be installed in safe and locked facilities. In addition, the least one should
do is take a regular Backup & Security
Role of Backups
A backup is a copy of a disk or a file on a disk. When we make a spare copy of a disk or of a file,
we say we are “making a backup” or “backing up” a file. Suppose you have only one copy of an
important document. This file is on your hard disk. For some (unfortunate) reason this file is now
no longer available - this may happen because of a variety of reasons, like, Hard- disk crash;
Fire; Theft; Virus corruption & Inadvertent or deliberate delete/ overwrite .A loss of the file
means a loss of all the work that has gone, in. Not only is it a loss of me, it may also not be
possible to recreate the document.
Now suppose you have been taking a daily backup every evening. You just need to insert the
latest backup floppy and copy yesterday’s version of the file from it. Now your loss is restricted
to the work done today. The copying back of a file (or files} from a backup to get back (an older
version of) the file is called “restore”.
A backup can be created very simply. You can just copy the required files on a floppy of the files
are very large, you may need to “zip” them (use a compression utility to ‘compress the file
without losing any data in it). You can also simplify your backup procedure by including all the
required commands in a batch file, which you execute whenever you want a backup.
Hazards: Fire, Excessive heat, Moisture, Floods, Damage by insects and rodents, & Theft
Physical Security: Though all hazards cannot be prevented in a cost – effective manner, some of
the more common means are discussed below:
Locate computer installation away from electric transformers, boiler rooms, kitchens or
any other equipment that can cause a fire
Ensure that computer systems supporting mission critical application are housed in fire
proof construction
105
Take regular backups on tape/ floppies and store the backups in a fire safe. Also
periodically, take backup copies off-site. Off-site means a location away from the location
of the computer installation.
Install special fire extinguishers for electrical and electronic equipment like inert gas fire
extinguishers.
Do not install water sprinklers near costly computer equipment as these can accidentally
go off and damage the computers.
Do not allow employees to smoke near the computers ensure that power supply
equipment and wiring is done in a proper manner. Also ensure that appropriate fuse wires
are installed at the right places in the power supply
Ensure that the computer installation is relatively free of paper and other inflammable
material
Do not locate computer installations in the basement, as basements are typically the first
places to get flooded
As far as possible, avoid installing a computer system on the top floor of a building, as
these are affected by seepage. In case you have no choice, ensure that the roof is treated
against seepage.
Do not install computers near underwater tanks, large drains, sinks, etc.
Do not eat or drink near computer installations. The food or drink may spill over the
equipment. Also, the smell of the food and drink may attract insects and rats, who can
damage the equipment
Restrict the entry of personnel to persons with badges and persons who are accompanied
by an authorized employee
106
If machines or terminals are provided to individuals and are not kept at a centralized
place, encourage employees to use locks and keys to their rooms and machines.
The smart strategy is to be in pro-active mode rather than reactive mode. It may be less
expensive to plan ahead to avoid possible down time than suffer losses.
Activity A
Critically evaluate the security of computers by your organization?
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
107
108